1 Telematics and Informatics 20 (2003) A geographic perspective on commercial Internet survivability Tony H. Grubesic *, Morton E. OÕKelly, Alan T. Murray Department of Geography, The Ohio State University, Columbus, OH , USA Abstract The earliest predecessor to the commercial Internet oftoday was ARPANET, a packet switched computer network developed by the US Defense DepartmentÕs Advanced Research Projects Agency. Designed to withstand a nuclear attack, ARPANET utilized a deurbanized, decentralized, and distributed network topology. As ARPANET gradually evolved into NSFNET and eventually the commercial Internet, increasing traffic, demands for interconnection, and growing private interests required the movement from a distributed network topology to a more economically viable network configuration, hub-and-spoke. Although transmission speeds and capacities oftodayõs commercial Internet clearly surpass those ofits predecessors, the economics ofnetwork survivability and reliability have also become more relevant. With thousands ofbusinesses, corporations, universities, and governments relying on the Internet for day-to-day functions, major disruptions in service have the potential to be economically catastrophic. This paper explores the network topology ofthe commercial Internet, with a focus on network survivability. GIS based approaches are used to simulate both nodal and link failure in the US commercial backbone system in order to assess potential impacts. Results suggest that many ofthe larger metropolitan benefit from robust network infrastructure, while smaller cities are more prone to service disruptions. Ó 2002 Elsevier Science Ltd. All rights reserved. 1. Introduction Recent explorations ofthe geographical characteristics ofthe US commercial Internet reveal a complex network ofnetworks with scores ofindividual backbones linking hundreds ofcities with fiber-optic cables (Wheeler and OÕKelly, 1999; Gorman and Malecki, 2000; Malecki and Gorman, 2001). This infrastructure not * Corresponding author. Tel.: ; fax: address: (T.H. Grubesic) /02/$ - see front matter Ó 2002 Elsevier Science Ltd. All rights reserved. PII: S (02)
2 52 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) only provides the means to exchange information via basic services such as , but also facilitates the exchange of complex digital information such as audio and video. Although there is some debate as to the effects ofinformation technologies on productivity, there is little doubt ofthe overall impact ofinformation technology on the evolving digital economy (Leinbach, 2001). For example, a recent report by the US Census Bureau (2001) estimates that online purchases in the United States totaled $28 billion for This represents an increase of 62% over Moreover, evidence suggests that online retailing and e-commerce are not the only applications benefiting from advanced telecommunications infrastructure and technologies. Internet related applications for e-government are also growing rapidly. For example, a recent report from the Taubman Center for Public Policy (2001) at Brown University indicates that 93% ofgovernment publications are now available online, up from 74% in In addition, 54% of government databases are online, up from 42% from Results also reveal a modest increase in the number of applications that are fully executable on the web. Examples include filing taxes online, being able to order government publications online, filing complaints, registering vehicles and ordering hunting licenses. Although the number ofweb-based applications enabled by advanced infrastructure continues to grow, the previous examples fail to convey the overall importance of telecommunication infrastructure in the day-to-day operations for both private and public sectors ofthe US economy. The recent tragedy in New York City has made clear the extent to which an increasing dependence on telecommunication networks permeates day-to-day functions. After the collapse of the World Trade Center towers, three New York counties lost their connection to the statewide computer system when a major telecommunication hub located at Ôground zeroõ failed. As a result, Nassau, Suffolk, and Westchester counties lost the ability to make social services entries and payments and were cut off from the statewide heath network and most ofthe state police network (GovTech, 2001). With a combined population of3.7 million, all three counties have significant interaction with the state, making the service failure a noteworthy interruption. Fortunately, Westchester County was able to redirect network applications through a newly constructed fiberoptic network that connects to the stateõs new fiber backbone, NyeNet (GovTech, 2001). Nassau and Suffolk counties also utilized the Westchester network hub to bypass the crippled hub in Manhattan and access state computers located in Albany. Other telecommunication customers and facilities were not so lucky or flexible. Telecommunication carrier hotels were forced to utilize backup generators to maintain service because the Con Edison power grid was completely knocked out in lower Manhattan. Due to problems such as fuel shortages and overheating, the generators were not much help. As such, several major Internet services and e-business providers including Electronic Data Systems, which uses the New York facility to clear transactions for the European financial system, were left without service for nearly two days (Miller, 2001). This example ofnetwork telecommunications failure and its subsequent restoration (in stages) in the New York City area highlights the importance ofnetwork survivability for the Internet. Not only were city and county governments tempo-
3 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) rarily left without access to important information, global financial services that depend on the rapid transfer of information were also halted. Although most events stimulating a network failure are not as dramatic as those surrounding the World Trade Center collapse, the ability for networks to re-route, re-connect and to have redundancy is clearly an important asset for telecommunications services. To date, issues oftelecommunications network survivability and reliability are largely ignored in the literature on city accessibility to the commercial Internet. In fact, the existing work on city accessibility assumes 100% reliability and survivability and focuses on relative network location, infrastructure equity and bandwidth availability for analysis (Wheeler and OÕKelly, 1999; Gorman and Malecki, 2000; Moss and Townsend, 2000). This is a potentially problematic considering the social and economic implications ofnetwork failure. Albert et al. (2000) do provide a briefanalysis and discussion on attack tolerance and failure of complex networks. Their results indicate that scale-free networks such as the Internet are very tolerant to random failures at nodes providing a reliable system for information distribution. However, their results also suggest that targeted attacks at the most connected nodes have the potential to fragment scale-free networks, revealing a significant lack ofsurvivability. Because ofthe mutual relationship between survivability and reliability, it is important to make an initial clarification of their differences (more detail will be provided in Section 3). Network reliability measures are concerned with the dependability ofnetwork equipment and the ability ofa network to provide communication given component failure (Medhi, 1999). Network survivability measures are concerned with the smallest amount ofdamage that can disconnect a network or reduce its performance to unacceptable levels or total failure (Colbourn, 1999). Basic network failure can be categorized in the following ways: (1) arc failure (the severing of an optical cable); and (2) node failure (the failure of electronic equipment) (Lisser and Sarkissian, 1995). In this context, questions ofnetwork survivability are inherently geographic because component failures at an origin node (i.e. source node) have the potential to impact the entire network both downstream and upstream from the failure. This is particularly problematic for destination nodes (i.e. terminal node) on a network (Colbourn, 1999). Given the significance ofreliable network performance and the implications ofnetwork failure, additional questions ofcity accessibility to the commercial Internet must be addressed. The purpose ofthis paper is to explore various dimensions ofnetwork reliability and survivability, stressing the latter, for the US commercial Internet from a geographic perspective. More specifically, questions ofcity accessibility as they relate to network topology are addressed using GIS based approaches that simulate node failure in the US commercial backbone system. Not only will these simulations provide a more complete picture ofcity accessibility to the commercial Internet, they will also highlight the advantages and disadvantages offully meshed telecommunications networks versus the more cost effective hub-and-spoke topologies. The remainder ofthis paper is organized as follows. Section 2 briefly explores the historical context ofnetwork survivability and reliability as it relates to the commercial Internet. Section 3 compares and contrasts the differing perspectives oftelecommunication engineering and geography for network reliability and survivability.
4 54 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) Section 4 outlines a methodology for evaluating the geographic dimensions of network survivability as they relate to city accessibility. Section 5 presents the results of the application study. Finally, Section 6 provides a discussion and briefconclusion. 2. Evolution of a survivable telecommunications network The development ofthe US commercial Internet is well documented (Abbate, 2000). Initially conceived as a communication system able to survive a nuclear attack, the Internet was first developed through a series ofprojects in the 1960s conducted by the US Department ofdefense and the Advanced Research Project Agency. Numerous important technical innovations were realized from these early efforts, including packet switching and TCP/IP protocol. For a more thorough discussion on these topics see Abbate (2000). Although packet switching and TCP/IP would serve as the technological foundations ofthe Internet, they did not necessarily guarantee survivable communications in the event ofan attack at a node or a link. In conventional circuit switched communication systems, such as the public switched telephone network, switching is concentrated and hierarchical; providing a private, hardwired connection through a network between two subscribers (Sharma, 1990). For example, each call is routed through a local office, and then to a regional or national switching office ifa long distance connection is required. Because each local office serves thousands ofusers, destroying a single office would leave many thousands without service. Therefore, the combination ofpacket switching, TCP/IP and a distributed network topology were recommended for constructing a survivable telecommunications system (Abbate, 2000). Network topology defines the manner in which network nodes (cities) are interconnected. There are many different topological frameworks that are utilized in telecommunication systems. Fig. 1 illustrates several ofthe most basic system topologies, including centralized, decentralized, distributed, and partially connected. As Fig. 1a demonstrates, a partially connected mesh topology allows for a direct link between certain pairs ofnodes in a network. From an economic perspective, the partially connected mesh is advisable when traffic flow between certain nodes is low. The interaction between low-flow nodes can be switched to longer paths resulting in a better economy ofscale (Sharma, 1990). The centralized topology (Fig. 1b) utilizes a single switching node that directly connects subscribers. This type oftopology is frequently used for university campus networks in order to connect all subscribers to a PABX voice or data switch. 1 The hub-and-spoke (i.e. decentralized) network topology (Fig. 1c) is designed for serving information flows between multiple origins and destinations. As OÕKelly and Miller (1994) note, hubs allow for the construction ofa network where direct connections between all origins and destinations (fully connected mesh) is replaced with fewer indirect connections. This reduces construction costs and allows for scale economies through the consolidation of flows 1 PABX stands for Private Automatic Branch Exchange. Today, they are usually referred to as PBXs and are automatic, meaning that an operator is no longer needed to place a call (Newton, 2000).
5 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) Fig. 1. Basic network topologies: (a) partially connected mesh; (b) centralized; (c) hub-and-spoke (decentralized); (d) distributed. (OÕKelly and Miller, 1994). Considering that the cost oftransmission in most telecommunication networks is predominately influenced by link costs versus switching, the hub-and-spoke system for telecommunication can make good sense if capital is restricted. Finally, the distributed network (Fig. 1d) is the configuration that most closely resembles the design recommended by Baran (1964b) for the Internet The US commercial Internet Recent studies exploring the spatial characteristics ofthe US commercial Internet reveal complex interplays between market demand, network economics, and network topology. For example, Gorman and Malecki (2000) and Moss and Townsend (2000) suggest that patterns ofinternet backbone development have created an accessibility hierarchy, with the most accessible cities located at major network access points (NAPs). OÕKelly and Grubesic (in press) note that while network complexities are increasing, individual network connectivity and redundancy appear to be decreasing. This is significant for a number of reasons. First, and most obvious, a trend toward sparser networks suggests that providers are building network configurations that are not fully meshed or redundant. Although this has the potential to be problematic in a telecommunication system served by a single provider, peering agreements between commercial Internet service providers (ISPs) partially ensure that some form of redundancy between major nodes exists. However, locations
6 56 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) where redundancy is minimal and peering with other network providers is ofnegligible value, can pose a serious threat to robust network service. Second, given the competitive nature ofthe telecommunication industry, OÕKelly and Grubesic (in press) suggest that providers have moved to hub-and-spoke topologies. Consolidating flows using a hub-and-spoke system allows ISP networks to increase the geographic footprint of their service areas through the provision of lower capacity spokes in smaller markets. The information flows from these smaller markets are then consolidated at a larger hub and routed along a major trunkline to other major hubs for distribution. Clearly, hub-and-spoke topologies combined with peering agreements allows ISPs to operate at substantially lower costs than scenarios where direct, high-capacity connections are required between all nodes. This is directly analogous to the current air-passenger system (OÕKelly and Wheeler, 2002). The movement to hub-and-spoke topologies has clear and serious implications on network survivability, however, as illustrated in the introduction, the failure of a major node such as that in lower Manhattan has the potential to seriously disrupt Internet traffic flows. Consider, for example, the simultaneous failure of NAPs in Chicago, New York, Washington, DC, and San Francisco. Although the example is somewhat extreme, there is no doubt that Internet traffic and performance would be impacted. Recently, network reliability and survivability were tested when a train carrying hazardous materials derailed in a tunnel outside ofbaltimore, Maryland (Associated Press, 2001). Because fiber-optic backbones from major providers such as WorldCom, PSINet, and AboveNet were also located in the tunnel, significant Internet slowdowns, beginning in the Middle Atlantic States, rippled across the country as companies diverted web traffic to other paths (Associated Press, 2001). Although larger cities have displayed an ability to recover from the catastrophic failure oftelecommunication components because ofinfrastructure redundancy, questions ofsurvivability remain for smaller second and third tier nodes (cities) where network redundancy and provider alternatives are limited. This is especially important in smaller spoke cities, where the only connection to the Internet might be from a single network provider. The following section compares and contrasts the concepts of survivability and reliability in telecommunications network engineering and geography. This discussion will serve as a foundation for the examination of network survivability from a geographic perspective in Section 4, where simulations emulating node failures in a spatial context are explored. 3. Perspectives on network survivability and reliability 3.1. Telecommunications engineering As previously outlined, communication networks are comprised ofnodes and links. A wide variety ofsoftware and hardware components are required to enable communication through these networks. Network reliability refers to the ability of the overall network to provide communication in the event ofcomponent failure
7 (Medhi, 1999). Fault-tolerant refers to how reliable a particular component (element) ofthe network is. For example, switches and routers are elements ofa telecommunication network. Alternatively, fault-tolerant network refers to how resilient the entire network is against the failure of a component. Overall network reliability is also contingent on a variety ofexternal factors, which may or may not cause a portion of the network to fail. For example, environmental factors such as heat stress, construction, or attack may create significant disruptions in operation. Much oftelecommunications engineering is concerned with the probability of component failure and its ramifications on network performance. Consider the following example forwarded by Medhi (1999) for a basic telephone network. Fig. 2 illustrates two telephones connected by distribution segments ( A ) to local switches ( S ), with switches connected by the facility ( B ). Each element of this simple network is assigned an outage/downtime percentage: S, 0.01%, A, 0.01%, B, 0.03%. The availability ofthis connection is ð1 0:0001Þ 4 ð1 0:0003Þ ¼99:93%. This translates to a maximum of368 min ofdowntime per year for the system. Contrary to the circuit switched telephone network illustrated in Fig. 2, which provides a private, hardwired connection through a network between two subscribers, the Internet uses packet switching technology, permitting the transfer of information over multiple pathways simultaneously. In practical terms, therefore, a distributed network topology (Fig. 1d) with many redundant pathways offers significant advantages over decentralized and centralized networks having aggregating nodes that are vulnerable to attack (Baran, 1964b). With respect to the previous example, it is clear that network engineers must be concerned with both the causes and consequences ofcomponent failure. Clearly, a catastrophic failure causing network disconnection is the greatest concern, but the more frequent consequence of component failure is degraded performance (Colbourn, 1999). 2 Therefore, from the perspective of network engineers, survivability issues can be categorized in the following manner (Medhi, 1999). First, what is the smallest amount ofdamage that can disconnect the network or reduce its performance to an unacceptable level? Second, environmental failures caused by extrinsic factors, and failures associated with network overload, lead to probabilistic measures involving statistical dependence of failure. Finally, random failures such as wearout lead to probabilistic measures with statistical independence Geography T.H. Grubesic et al. / Telematics and Informatics 20 (2003) Geographic perspectives on network survivability and performance are quite different than those outlined above. Although component failure must be considered indirectly, the spatial ramifications ofelement failure and its impact on accessibility or service are ofgreater concern to geographers. For example, what are the impacts 2 It is important to note that recent technological advancements in synchronous transmission products such as SONET/SDH, include the development of self-healing rings. Self-healing rings allow for service to be restored very rapidly in the event ofa single link or node failure (Armony et al., 2000). For a more detailed discussion see Wasem et al. (1994) or Felekis and Milis (1996).
8 58 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) Fig. 2. Circuit switched network reliability. on city accessibility ifthe MAE-East node completely fails? Does the entire East Coast ofthe United States lose Internet service? Philadelphia and Baltimore only? It is probable that Internet service to the major cities will suffer in terms ofperformance (latency and network delays), but service will not completely shut down. Because the Internet is a packet switched network, traffic can be rerouted through the NAPs in New York or Washington, DC, or private peering points located on the East Coast. So, the larger networks such as Qwest, Sprint, and WorldCom have the ability to dynamically reroute packets within minutes ofcomponent failure. However, smaller networks with limited transit or peering partners may not be able to restore service as quickly. Cities serviced by smaller network providers or a limited number ofnetworks may be left without service until MAE-East is repaired. From a geographic perspective, it is clear that these scenarios are closely linked to the network topology ofthe commercial Internet. Consider the Multacom backbone illustrated in Fig. 3a and the IDT backbone shown in Fig. 3b. Both networks provide service to a number ofmajor cities in the Fig. 3. Internet backbone networks: (a) Multacom network; (b) IDT network; (c) combined network.
9 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) United States. First, let us consider the failure of a single node in the network, with a major Multacom component failing in Chicago, effectively disrupting service (Fig. 3a). Because Multacom fails to provide redundant connections between cities, all information originating in Los Angeles, Dallas, Miami, Tampa, Atlanta, Washington, and New York destined to Seattle, Portland, San Jose, and Denver cannot be delivered (and vice versa). Now, consider a single link failure on the IDT network, with the fiber-optic cable between Phoenix and Denver suffering a cut (Fig. 3b). Because IDT maintains multiple connections between Denver and other major cities, traffic destined for Phoenix can be rerouted from Denver to Los Angeles or Houston for delivery to its final destination. Given the size ofthe commercial Internet in the United States, it is clear that no network operates in complete isolation. As illustrated in Fig. 3c, simply combining the IDT and Multacom network substantially increases service coverage and redundancy especially ifthe two networks have a peering agreement. However, several nodes, including Portland and Seattle, remain vulnerable to node or link failure in this combined network. In reality, there are scores of networks that provide service to larger cities such as Portland and Seattle in the US, however, cities further down the hierarchy ofinternet accessibility (Townsend, 2001; OÕKelly and Grubesic, in press; Grubesic and OÕKelly, 2002) do not benefit from high connectivity and thus remain vulnerable to service disruptions. This is particularly problematic in smaller spoke cities. The next section outlines a methodological approach for simulating node failure for the US commercial Internet. The spatial implications of such failures are explored, with attention paid to the topological characteristics ofindividual backbone providers and the downstream impacts ofnode and link failure on city accessibility. 4. Methodology for estimating network survivability A viable option for evaluating the survivability of an Internet backbone network is to run a series ofscenarios examining failure ofnodes in a telecommunication system. Table 1 displays a sample connection matrix for six network backbones and ten cities utilized in OÕKelly and Grubesic (in press). Consider a set ofnodes (cities), each with a unique identification number from i ¼ 1;...; N, and a group ofbackbones with unique identification numbers, k ¼ 1;...; B which serves a subset of N nodes. Let A ik ¼ 1 when node i is in network k. Following the notation outlined in OÕKelly and Grubesic (in press): Nk indicates the set ofnodes in the kth network. N k is the number ofnodes in the kth network. Bi indicates the set ofnetworks in which node i appears. B i is the number ofnetworks in which node i appears. Nk ¼fijA ik ¼ 1g is the index set ofnodes in network k. Bi ¼fkjA ik ¼ 1g is the index set ofthe backbone networks in which node i appears.
10 60 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) Table 1 Example networks Node Network Row sum # Set B1 1; 3; 4; B2 2; 3; B3 2; 5; B B5 2; 4; B6 4; B7 1; 2; 3; B8 2; B9 1; 2; 3; 5; B10 1; 3; 5 Column sum # Set N1 N2 N3 N4 N5 N6 1; 4; 7; 9; 10 2; 3; 5; 7; 8; 9 1; 2; 7; 9; 10 1; 2; 5; 6; 8 1; 3; 6; 9; 10 3; 5; 7; 9 Relating this to Table 1, backbone 5 has N5 ¼f1; 3; 6; 9; 10g and thus N 5 ¼ 5. Each node may appear in one or many networks, and each network may have between two and ten nodes. For example, node 4 appears in the smallest number ofnetworks, B 4 ¼ 1, and is listed in B4 ¼f1g. The number ofnodes in network k is P i A ik ¼ N k. Similarly, the number ofnetworks that node i occurs in is P k A ik ¼ B i. Now that the various sets ofnodes and backbones are defined, the connection matrix for the kth network backbone is defined as X k ij, indicating the number ofdirect links between i and j. Similar to Table 1, the connection matrix for each backbone consists ofzeroes and ones. A zero in the cell means that there is no linkage between that particular origin node, i, and destination node, j, for network backbone k. The row sums represent the total number ofother nodes in the network that are connected to i by direct (one-step) connections. Therefore, P i X k ij represents the degree of a node. This measure will be utilized for simulating one aspect of network survivability. In this context, the degree ofnode describes two conditions. A degree of1 indicates that a city is a spoke city, with only one direct connection to a different node. As the degree increases from 1; 2;...; n, the more closely a city resembles a hub. For example, preliminary calculations on a backbone network used for analysis in this paper indicates the degree ofnode measure for the city ofchicago on the AT&T network in 2000 is 23. Meaning that a total of23 direct connections between Chicago and other cities exists. In contrast, the degree ofnode measure on the AT&T backbone for Salt Lake City was 3. In this example, Chicago is clearly more qualified as a hub than Salt Lake City. As such, loss of functionality in Chicago, for whatever reason, is likely to have more significant ramifications than the loss ofsalt Lake City because 23 cities are directly impacted. This is not to suggest that service becomes unavailable in these 23 cities, but there is a high probability that performance would be degraded.
11 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) Given the accounting system outlined above, several scenarios can be explored through simulation. First, ifan entire node is knocked out (e.g. complete system failure), an entire row of Table 1 disappears. This means that service to the city in question is impossible for any backbone. Clearly, the probability of a complete loss is low, particularly in large cities where providers maintain multiple points of presence (Grubesic and OÕKelly, 2002). However, the recent events in New York City showed the impact ofan important node sustaining damage. A second scenario might include the loss ofa backbone provider. In this case, a column would disappear. This means that peering between the disabled backbone and any other provider is not possible, but more importantly, it means that cities serviced by a single backbone (such as node 4) are completely without Internet service. Again, this is particularly problematic for spoke cities. Service is possible, however, if a second or third backbone operates connections to a node (such as node 10). Thus, backbone variety and the presence ofmultiple providers is a key element for network survivability. A third possibility is the failure of a single network node. In this case a cell disappears. For example, the router at node 1 for backbone 1 fails. Although this eliminates service to node 1 from a single provider, other backbones remain operational and traffic continues to flow. Similar to the loss ofa backbone provider, the failure of a single network node is most problematic for spoke cities because it effectively eliminates the delivery of all traffic destined for the node in question. In contrast, cities served by multiple providers or larger hub cities can reroute and take advantage ofpeering agreements in the delivery ofdata traffic, ifthere is some type oflocalized component failure. Finally, ifselect links in a network are severed, isolated nodes suffer loss ofservice, but nodes with multiple links remain functional. This is another example where the importance ofthe degree ofnode measure is evident. The availability ofmultiple connections, whether redundant (from a single ISP) or unique, the more survivable a node is Simulating network survivability This section, and the remainder ofthis paper, will explore the spatial ramifications of node failure for several Internet backbone networks. We will also attempt to highlight pertinent trends in our analysis by concentrating on the impacts ofcomplete node failure on city accessibility. Network backbone information from the 12th Edition ofthe Boardwatch Directory of Internet Services Providers will be utilized in this analysis (Boardwatch, 2000). These data are compiled annually by Boardwatch Magazine, one ofthe leading sources ofinformation on Internet backbone providers in the United States. The 12th Edition contains information on 41 commercial backbone providers. Additional confirmatory data were acquired from the Cooperative Association for Internet Data Analysis (CAIDA) (based on the Boardwatch data) for comparative purposes. In order to simulate node failure, a select group of cities, common to a majority of the 41 networks, were selected for analysis (Table 2). The subset of cities selected represents a mix ofcoastal and interior locations. Malecki and Gorman (2001) note that this is an important distinction because ofthe general trend for coastal cities to
12 62 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) Table 2 Cities (nodes) selected for stimulated failure 1 Atlanta 2 Boston 3 Chicago 4 Dallas 5 Kansas City 6 Los Angeles 7 Minneapolis 8 New York 9 Palo Alto 10 Phoenix 11 Salt Lake City 12 St. Louis 13 Tampa 14 Washington be relatively closer together in terms ofnetwork links than interior cities. In other words, this pattern represents a Ôcoastal wrappingõ where cities such as Los Angeles, New York, San Francisco, and Washington, DC, are topologically nearer to each other than to most interior cities (Malecki and Gorman, 2001). The major exceptions to this general trend are the interior cities ofchicago, Atlanta, and Dallas, which all contain major public or private NAPs. A scheme for simulating network survivability with a node failure is detailed as follows: (a) Select a network for analysis. (b) Select a node for failure (this node may or may not appear in all networks). (c) Close all links into or out ofthat node. (d) Calculate the new degree of node values for each node in the network. (e) Calculate the availability ofnetwork paths between nodes (for all nodes) in the network. This scheme provides several interesting measures pertaining to the impacts of node closure for individual networks as well as spatial impacts of node closure on city accessibility. First, it allows one to evaluate the centrality ofa city (node) to an individual network. In essence, the degree to which a node is central to the network is a measure ofits importance. Hub cities provide the majority ofswitching functions for networks on the Internet (Grubesic and OÕKelly, 2002). Therefore, in terms of functional hierarchies, hub cities are more important and central to a network than spoke cities. As a result, the loss ofa hub city has significant impacts on city accessibility. Second, this simulation scheme will also provide basic measures on the overall vulnerability ofa network. Ifnetworks utilize hub-and-spoke topologies, the loss ofcertain nodes is more dangerous than the loss ofothers to the overall functionality and performability of network. Thus, networks with several hub cities are
13 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) more likely to become disconnected than networks that utilize meshed or redundant topologies. 5. Application results Node failure simulations were computed for the 14 nodes listed in Table 2 on each ofthe 41 networks. To more clearly illustrate this process, the Multacom Internet backbone illustrated in Fig. 4a will be used for discussion. Fig. 4b displays the derived network survivability matrix for the Multacom backbone after node failure is simulated for all 14 nodes selected for analysis. Each row represents an actual node on the Multacom backbone (n ¼ 12). Row totals indicate the relative accessibility of a city in the Multacom backbone after failure. 3 In this case, lower totals indicate a more accessible network location because they maintain network access to more cities after a node failure. For example, the city of Washington is the most accessible node on the Multacom network, with a row total of28. IfTampa fails, Washington only loses access to Tampa and Miami. However, ifnew York fails, Washington loses access to six cities (New York, Chicago, Denver, San Jose, Portland, and Seattle). Clearly, the New York failure is a worst-case scenario for Washington. However, the loss ofperipheral nodes such as Miami, Seattle, or Los Angeles will have very little effect because oftheir location on the network, relative to Washington. Column totals indicate the relative centrality or importance ofa city on the Multacom network. In this case, higher totals suggest a higher centrality. For example, Atlanta is the most important node on the Multacom backbone, with a centrality score of75. This suggests that the loss ofatlanta and its hubbing functions limits the overall nodal accessibility for other cities on the network at a greater magnitude than the loss ofany other node. For example, ifatlanta fails, the cities of Dallas, Los Angeles, Miami and Tampa cannot reach ten ofthe Multacom network nodes (in different combinations). Similarly, the remaining Multacom network cities (Chicago, Denver, New York, Portland, San Jose, Seattle, and Washington) cannot reach five other cities. Again, this illustrates the importance ofhub cities on many networks and the major impact ofhub failure on network survivability. Individual city pairs and the impact ofnode failure can also be evaluated. For example, node failure in Dallas is the worst-case scenario for Los Angeles, eliminating access to 91% (11 of12) ofthe cities. Similarly, the loss oftampa eliminates access to 11 of12 cities on the network from Miami. In addition to individual network analysis, results illustrating the relative importance ofeach city across all 41 networks are informative. Fig. 5 illustrates the aggregate impact of node failure on network accessibility for each of the 14 nodes in the analysis. In other words, Fig. 5 highlights node failures that disrupt the largest 3 Nodes not appearing on the Multacom backbone are assigned a value of1. Column totals for nodes not appearing on the network will equal the number ofnodes on the network being analyzed, which in the case ofmultacom gives n ¼ 12.
14 64 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) Fig. 4. (a) Multacom backbone; (b) survivability simulation results for the Multacom network. number ofnetworks. As the Y-axis indicates, for the 14 cities analyzed, the most lethal node failure is Los Angeles. This relative measure of lethality indicates that more networks become disconnected with the failure of Los Angeles (n ¼ 34) than any other city in the analysis. The role oflos Angeles as an important interconnection point for the US commercial Internet (Grubesic and OÕKelly, 2002; OÕKelly and Grubesic, in press) is a primary reason such disconnects might occur. For many networks, Los Angeles represents an important hub location for connecting other major cities in the southern tier ofthe US. Therefore, the loss ofthis node not only impacts other larger cities in California, but also Las Vegas, Phoenix, Tucson, Denver, Dallas, and Houston. In fact, each of the top 6 cities illustrated in Fig. 5 are important hub cities for the commercial Internet each containing a major NAP or metropolitan area exchange (Grubesic and OÕKelly, 2002). Again, this suggests the relative importance ofthese hub cities for many ofthe 41 networks analyzed. The loss ofthese nodes negatively impacts both network accessibility and survivability.
15 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) Fig. 5. Closure impact by node. A final measure ofnetwork survivability is illustrated in Fig. 6. Given the 14 nodes utilized in the analysis of41 networks, Fig. 6 displays the overall vulnerability ofeach network. The most susceptible network to disconnection is AT&T. Eight of the 14 nodes (when failed) effectively disrupt and disconnect the AT&T network. Not surprisingly, many of the cities utilized for analysis are hub cities for AT&T (e.g. Chicago, Los Angeles, Dallas). Not only does the loss ofthese nodes have the potential to impact the performance of the network, it also has the potential to leave many smaller spoke cities without service. Therefore, the use of a hub-and-spoke system does have real implications for network survivability in the case of AT&T. Similarly, the GTE network also makes extensive use ofhub-and-spoke topological configurations. In this case, failure in 7 of the 14 cities utilized for analysis result in the disconnection ofthe GTE network. Contrasting the extreme examples ofat&t and GTE are 11 other networks where the loss ofa node does not result in a disconnection. This suggests a more robust, meshed network topology, with many alternative pathways for data transmission. Although meshed topologies are more expensive to construct, they clearly have advantages over hub-and-spoke configurations where survivability is concerned. In addition, meshed topologies are clearly more similar to the original topological structure recommended by Baran (1964a,b) than hub-and-spoke topologies.
16 66 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) Fig. 6. Network vulnerability. 6. Discussion and conclusions A valuable function of the literature on city accessibility to the commercial Internet is its documentation ofinfrastructure diffusion availability throughout the United States (Wheeler and OÕKelly, 1999; Gorman and Malecki, 2000; Malecki and Gorman, 2001; Grubesic and OÕKelly, 2002). Moss and Townsend (2000) note that the information infrastructure of today plays a very similar role to the transportation networks ofthe past two centuries (rail, road, air, water); where the Internet transports the valuable goods ofthe digital economy information, knowledge, and communications. Although the availability ofsuch infrastructure is clearly an important consideration, the ability for such infrastructure to perform without interruption is also a significant concern. As discussed previously, infrastructure failure has the potential to be economically catastrophic for businesses, cities, and regions. The analysis ofnetwork survivability from a geographic perspective illustrates a number ofimportant points. The competitive nature ofthe Internet backbone provider industry has created a situation where many backbones are prone to disconnection if there is a major failure in a hub city for a given network. This is partially attributable to the economic pressures ofnetwork construction. In extreme cases, the cost oflaying fiber-optic cable can reach nearly $1 million per mile including the costs associated with digging trenches and obtaining rights-of-way
17 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) (Kharif, 2001). Therefore, providers are in search of the most economically efficient network topology possible, one that does not sacrifice performance. This has motivated many providers to move to a hub-and-spoke topology (OÕKelly and Grubesic, in press). Hub-and-spoke topologies allow for economies of scale by consolidating flows from a set of geographically dispersed service points onto a fiberoptic trunk extending to a hub city where switching functions are performed. OÕKelly and Wheeler (2002) note that this is very similar to the existing commercial airpassenger system in the United States. Unfortunately, the movement to hub-andspoke topologies for Internet backbones suggests a significant departure from the original topological structure outlined for the Internet. The consolidation of flows to hub cities creates a topological hierarchy where hub cities maintain a central role in all Internet traffic. Therefore, the loss of a hub city through a massive node failure has the potential to create significant disruptions in service quality and city accessibility. Further, as illustrated in Section 4, node failure at a hub has the potential to completely disconnect a network. This can leave many cities completely without Internet access (e.g. smaller spoke cities). At the very least, the loss ofa major hub limits data traffic between origins and destinations on the network. 4 It was also shown that certain networks are more prone to disconnection than others, with GTE and AT&T being the two extreme cases. Both utilize the hub-and-spoke topology widely. However, these results are tempered by the fact that other networks may utilize a different subset ofhub cities. Future work will incorporate a more extensive analysis and a wider selection ofclosures in order to remedy this limitation. There are other directions in which future work should also will be directed. Although this paper employed a deterministic framework for modeling a series of node failures, there is the potential for application extensions that include probabilistic approaches. For example, Daskin (1983) and ReVelle and Hogan (1989) utilize probabilistic versions ofthe set covering model and the maximum covering location model to ensure adequate coverage within a given time standard. This approach helps determine the likelihood that the nodes in a covering problem would be covered with a given confidence level (e.g. 95%). Our analysis can be adapted to this framework and we are currently devising such a model. The key difference is that instead oflooking deterministically at the effect (one-by-one) ofa series ofproposed node failures, we tabulate what-if parameters under a wide variety of failures, each ofwhich occurs with probability. In this regard, it is very similar to the approach employed by telecommunication engineers (Colbourn, 1999). Thus, instead ofall 14 nodes failing on an all or nothing basis, we might expect that the mesh of cities have a certain probability of failure. More importantly, future work will also account for link failure in the network. Finally, it is important to note that our data are a snapshot ofinternet infrastructure. We have evidence that networks such as AT&T are constantly being re-engineered to configure the system for better survivability. Thus, a probabilistic analysis could very well prove even more useful than our 4 Recall that peering and transit agreements also play an important role in network survivability.
18 68 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) deterministic cases in spotting vulnerability, and consequently building sufficient redundancy to ensure survival. Acknowledgements This material is based upon work supported by the National Science Foundation under Award no. BCS References Abbate, J., Inventing the Internet. MIT Press, Cambridge. Albert, R., Jeong, H., Barabasi, A.L., Error and attack tolerance ofcomplex networks. Nature 406, Armony, M., Klincewicz, J.G., Luss, H., Rosenwein, M.B., Design ofstacked self-healing rings using a genetic algorithm. J. Heuristics 6, Associated Press, Fire in Baltimore Snarls Internet Traffic, Too. URL: 2001/07/20/technology/20BALT.html. Baran, P., 1964a. On Distributed Communications. Twelve volumes. Rand Report Series. Baran, P., 1964b. On distributed communication networks. IEEE Trans. Commun. CS-12 (1), 1 9. Boardwatch, Boardwatch MagazineÕs Directory ofinternet Service Providers, 12th ed. Penton Media, Cleveland. Colbourn, C.J., Reliability issues in telecommunications network planning. In: Sanso, B., Soriano, P. (Eds.), Telecommunications Network Planning. Kluwer Academic Press, Boston. Daskin, M.S., A maximum expected covering location model: formulation, properties and heuristic Solution. Transport. Sci. 17 (1), Felekis, A., Milis, D., Emerging Technologies for Fibre Network Survivability. URL: Gorman, S., Malecki, E.J., The networks ofthe Internet: an analysis ofprovider networks in the USA. Telecommun. Policy 24, GovTech., Westchester County Becomes Telecom Hub for Neighboring Counties. URL: ¼ Grubesic, T.H., OÕKelly, M.E., Using Points ofpresence to Measure City Accessibility to the Commercial Internet. Professional Geographer 54 (2), Kharif, O., The Fiber-Optic ÔGlutÕ in a New Light. Business Week. URL: wysiwyg://34/http:// Leinbach, T.R., Emergence ofthe digital economy and e-commerce. In: Leinbach, T.R., Brunn, S.D. (Eds.), Worlds ofe-commerce: Economic, Geographical and Social Dimensions. Wiley, New York. Lisser, A., Sarkissian, R., Vial, J.P., Survivability in Telecommunication Networks. Manuscript, HEC, Section ofmanagement Studies. University ofgeneva. Malecki, E.J., Gorman, S., Maybe the death ofdistance, but not the end ofgeography: the Internet as a network.. In: Leinbach, T.R., Brunn, S.D. (Eds.), Worlds ofe-commerce: Economic, Geographical and Social Dimensions. Wiley, New York. Medhi, D., Network reliability and fault-tolerance. In: Webster, J. (Ed.), Wiley Encyclopedia of Electrical and Electronics Engineering. John Wiley and Sons, New York. Miller, R., Challenging Week at 25 Broadway. URL: Moss, M., Townsend, A., The Internet backbone and the American metropolis. Info. Soc. J. 16 (1), Newton, H., NewtonÕs Telecom Dictionary, 16th ed. Telecom Books, New York.
19 T.H. Grubesic et al. / Telematics and Informatics 20 (2003) OÕKelly, M.E., Grubesic, T.H., in press. Backbone topology, access and the Commercial Internet, Environ. Plan. B. OÕKelly, M.E., Miller, H.J., The hub network design problem: a review and synthesis. J. Transport Geogr. 2 (1), OÕKelly, M.E., Wheeler, D., The spatial organization and development ofthe Commercial Internet: Analogies and contrasts to traditional transportation networks. Draft Manuscript, The Ohio State University. ReVelle, C., Hogan, K., The maximum availability location problem. Transport. Sci. 3 (23), Sharma, R., Network Topology Optimization. Van Nostrand Reinhold, New York. Taubman Center for Public Policy, State and Federal E-Government in the United States, URL: Townsend, A., The Internet and the rise ofthe new networked city, Environ. Plan. B 28, US Census Bureau, Second Quarter Release, URL: current.html. Wasem, O.J., Wu, T.-H., Cardwell, R.H., Survivable SONET networks design methodology. IEEE J. Selected Areas Commun. 12, Wheeler, D., OÕKelly, M.E., Network topology and city accessibility ofthe commercial Internet. Prof. Geogr. 51 (3),
Environment and Planning B: Planning and Design 2006, volume 33, pages 325 ^ 343 DOI:10.1068/b3187 Internet reliability with realistic peering Morton E O'Kelly, Hyun Kim Department of Geography, The Ohio
AlarmNet Network Overview AlarmNet is a family of communications services designed specifically for the security industry. AlarmNet is designed to be a cost effective alternative or backup to the transmission
Redundancy White Paper May 2009 Table of Contents Executive Overview 3 Towerstream Overview 4 Towerstream Difference 4 Page 5 of 9 Cost of Downtime To Businesses 5 Causes of Unplanned Downtime 6 Cost of
Failure-proofing Next Gen 9-1-1 Networks A Talari Networks White Paper INSIDE Accomplishing the mandated level of network reliability as Public Safety Answering Points (PSAPs) move to VoIP, add support
Computer Networks III Wide Area Networks and Packet Switching Network Protocols and the OSI Layers The Internet Internet Infrastructure 1 Wide Area Networks (recap) 2 Page 1 Basic WAN structure Host Router
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare
Good VoIP vs. Bad VoIP The term Voice over IP, or VoIP has been thrown around in a lot of different cirlces around the telecom industry. There seems to be growing confusion about what it is, whether or
NOTES ON INTERNET ECONOMICS AND MARKET STRUCTURE Robert S. Pindyck Revised: August 2014 These notes provide a brief overview of the economic structure of the Internet. Just as our system of highways, roads,
City of Seattle Paul Schell, Mayor Department of Information Technology Marty Chakoian, Director and Chief Technology Officer Office of Cable Communications Report on WIN Franchise Application December
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Backbone Topology, Access, and the Commercial Internet* Morton E. O Kelly and Tony H. Grubesic Department of Geography, The Ohio State University, Columbus, Ohio 43210-1361 (e-mail: firstname.lastname@example.org) *
MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of
HIGH AVAILABILITY FOR BUSINESS- CRITICAL PROCESSES WITH VIPRINET EXECUTIVE SUMMARY In order to be successful, companies today need more bandwidth with higher reliability than ever. Whether in retail or
Copyright 2002 Quick Eagle Networks Inc. All rights reserved. The White Paper Series Safety in Numbers Using Multiple WAN Links to Secure Your Network Roger J. Ruby Sr. Product Manager August 2002 Executive
MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force email@example.com Acknowledgement Reference:
Redundancy for Corporate Broadband WHITE PAPER December, 2012 Introduction Over the past twenty years, broadband service providers have been using different mediums to deliver their services. From wireless
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
Can Public Transportation Increase Economic Efficiency? M AT T H E W D R E N N A N A N D C H A R L E S B R E C H E R IN THEOR Y, PUBLIC INVESTMENTS IN MASS TRANSIT CAN MAKE URBAN economies more efficient
WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available
Learn More: Call us at 877.634.2728. www.megapath.com MegaPath is one of the largest nationwide facilities-based providers of data, voice, and managed security services. Our reach is nationwide with 4200
Objectives for Service Provider Shared Transport of 802.3 Higher Speed Ethernet George Young AT&T firstname.lastname@example.org IEEE 802.3 HSSG - November, 2006 802.3 HSE MAN/WAN Transport Issues 802.3 HSE
Network+ Guide to Networks, Fourth Edition Chapter 7 WANs, Internet Access, and Remote Connectivity Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages
A. Project Title 2008 NASCIO Recognition Awards The District of Columbia Public Schools Communications Enhancement Project Information Communications Technology (ICT) Innovations Category 1 EXECUTIVE SUMMARY
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
Backbone Capacity Planning Methodology and Process A Technical Paper prepared for the Society of Cable Telecommunications Engineers By Leon Zhao Senior Planner, Capacity Time Warner Cable 13820 Sunrise
The Strategic Assessment of the St. Louis Region 7th Edition, 2015 WHERE The 7th Edition of Where We Stand (WWS) presents 222 rankings comparing St. Louis to the 50 most populated metropolitan areas in
Locating Data Centers in Iowa s Creative Corridor Providing safe and cost-effective locations statewide for data centers In Iowa we found one of the best locations around the world with the right combination
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
2011 Trade Show Labor Rate Benchmarking Survey EXHIBITOR COSTS IN 41 U.S. CITIES labor drayage audio visual exhibitor services eventmarketing.com eventmarketing.com Produced by in association with eventmarketing.com
Presentation for Broadband for America Overview of recent changes in the IP interconnection ecosystem Michael Kende June 7 th, 2011 Ref: Introduction 2 Last year marked the 15 th anniversary of the commercialization
ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer
Home Prices in the New Year Continue the Trend Set in Late 2009 According to the S&P/Case-Shiller Home Price Indices New York, March 30, 2010 Data through January 2010, released today by Standard & Poor
Everything You Need to Know About Network Failover Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Overview Everything You Need to Know
TOPICS ASSESSING RISK OF SENIOR LIVING OVER-SUPPLY A LONG-TERM PERSPECTIVE The ratio of new openings to existing inventory ratio (the new openings ratio ) in combination with the ratio of units currently
The Century of Infinite Bandwidth Simon C. Lin Computing Centre, Academia Sinica Taipei, Taiwan January 2001 email@example.com Popular View of Internet Global Internet Traffic grows 10% to 12% per month
WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream
SOLUTION WHITE PAPER Leverage the power of the cloud without the security worry. Private Connectivity to Your Cloud Applications with EarthLink Cloud Express www.earthlink.com November 2015 Private connections
Timely Trends of Ethernet Technology Announcing AboveNet s Expanded Metro Ethernet Services Today s Moderator: MaryBeth Nance Executive Director, Business Development & Marketing MaryBeth Nance is Executive
Robert G. Britz Executive Vice Chairman, President and Co-Chief Operating Officer New York Stock Exchange, Inc. On Recovery and Renewal: Protecting the Capital Markets Against Terrorism Post 9/11 Committee
Understanding and Optimizing BGP Peering Relationships with Advanced Route and Traffic Analytics WHITE PAPER Table of Contents Introduction 3 Route-Flow Fusion 4 BGP Policy Visibility 5 Traffic Visibility
Before the Department of Energy Washington, D.C. 20585 In the Matter of Implementing the National Broadband Plan by Studying the Communications Requirements of Electric Utilities To Inform Federal Smart
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks Jerry Chou, Bill Lin University of California, San Diego Subhabrata Sen, Oliver Spatscheck AT&T Labs-Research USENIX Security
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
Pocket E-Guide Top disaster recovery tips for protecting your VoIP systems For today's enterprise, (VoIP) offers immense business benefits, including unified, voice-enabled applications and significant
Management Information Systems Basics of the Internet Dr. Shankar Sundaresan (Adapted from Introduction to IS, Rainer and Turban) Internet Basics Outline Internet History Internet Structure Switching Methods
White Paper January 2011 Introduction In today s demanding business environment, few companies can afford having a key facility or branch location go off-line, or face service interruptions at headquarters.
White Paper VoIP Crash Phone Systems John Purnell March 1 st, 2015 Page 2 of 10 Contents 1.0 Executive Summary... 3 2.0 Abbreviations and Definitions... 3 3.0 What is a Crash Phone System?... 4 4.0 Technology
May 2014 Safe Harbor Statements Safe Harbor Statement under the U.S. Private Securities Litigation Reform Act of 1995: Statements made in this presentation that relate to future plans, events or performances
PRESS RELEASE Sustained Recovery in Home Prices According to the S&P/Case-Shiller Home Price Indices New York, December 26, 2012 Data through October 2012, released today by S&P Dow Jones Indices for its
Synchronization Essentials of VoIP WHITE PAPER Synchronization Essentials of VoIP Introduction As we accelerate into the New World of VoIP we assume we can leave some of the trappings of wireline telecom
Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing
A SENSIBLE GUIDE TO LATENCY MANAGEMENT By Wayne Rash Wayne Rash has been writing technical articles about computers and networking since the mid-1970s. He is a former columnist for Byte Magazine, a former
Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical
AN INTRODUCTION TO BUSINESS CONTINUITY PLANNING AND SOLUTIONS FOR IT AND TELECOM DECISION MAKERS Executive Summary Today s businesses rely heavily on voice communication systems and data networks to such
NETWORK SERVICES: America Regional Capabilities The United States is the world s largest national economy the ability to connect to this region from anywhere in the world is vital. The dollar is the most
MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper 2006-20011 EarthLink Business Page 1 EXECUTIVE SUMMARY Multiprotocol Label Switching (MPLS), once the sole domain of major corporations
Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks Farnam Jahanian University of Michigan and Arbor Networks IFIP Working Group 10.4 June 29-30, 2006 What s the
Volume 1, Issue 2, July 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Network Structure or Topology Kartik
The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone
TAXONOMY OF TELECOM TERMS Prepared by TUFF Ltd This short taxonomy is designed to describe the various terms used in today s telecommunications industry. It is not intended to be all embracing but to describe
CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,
OSHA Inspection Checklist Prepared by: Edwin G. Foulke, Jr. Direct: (404) 240-4273 firstname.lastname@example.org 1075 Peachtree Street NE, Suite 3500 Atlanta, GA 30309 Atlanta Baltimore Boston Charlotte Chicago
Analyzing Distribution of Traffic Capacity D. Mancas, E. I. Manole, N. Enescu, S. Udristoiu Abstract In this paper, an evaluation of the network routing algorithms is made. In a real network, it is expected
Connecting Australia s NBN Future to the Globe Ross Pfeffer Whitepaper First published: January 2011 Abstract Is there sufficient capacity, market competition and network resilience to support Australia
CHAPTER 10 THE INTERNET Chapter Summary This chapter examines the Internet in more detail to explain how it works and why it is a network of networks. The chapter also examines Internet access technologies,
Overview The housing market is finally showing signs of life, with many metropolitan areas having hit the elusive bottom and seeing home value appreciation, however negative equity remains a drag on the
An INS White Paper Multi-protocol Label Switching An economic way to deliver integrated voice, video and data traffic March 2013 Run your business on one network Multi-protocol Label Switching (MPLS) is
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over
CS 40, Lecture 3: Internet economics Ramesh Johari Outline Contracts: transit and peer Example 1: Peering and pricing Example 2: Exchanges Example 3: Hot potato routing Example 4: 95 th percentile pricing
Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
Home Price Gains Lead Housing According to the S&P/Case-Shiller Home Price Indices New York, July 28, 2015 today released the latest results for the S&P/Case-Shiller Home Price Indices, the leading measure
provides it s customers with a single, reliable source for their wiring construction needs. Focused on Telephone, Cable Television, Data, Power and Security Wiring, C3 provides the construction management