SlideShare a Scribd company logo
After the Catastrophe:
IP Network Availability and Resiliency In The
Post-Disaster Environment.




Rakesh Bharania
Network Consulting Engineer
Cisco Tactical Operations
http://www.cisco.com/go/tacops
E-Mail: rbharani@cisco.com
Twitter: @densaer
Agenda – After the Catastrophe

 The Need for Information In A Post-Disaster Environment
 Questioning Assumptions
 The role of Cisco in the Infrastructure picture
 Examples:
            1. September 11, 2001 attacks
             2. 2011 Japan Earthquake and Tsunami
             3. 2010 San Bruno, CA gas pipeline explosion




ABAG – IP Resiliency   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   2
The Fundamental Problem…
   NGO / International Orgs                                                                                      Public Safety




                                                In complex disasters with multiple                                     National, State &
Transportation
                                                response organizations …                                               Local Government

                                                How to deliver the right information
                                                in the right format to the right
                                                person at the right time?
      Critical Infrastructure
                                                                                                                   Healthcare
                                                                                        Defense


                                                                                                                                     3



      ABAG – IP Resiliency   © 2012 Cisco and/or its affiliates. All rights reserved.             Cisco Public                             3
Changing Technologies Affect Mission Success
      Evolution in People, Process and Technologies to support
      Disaster and Humanitarian relief

 Radio, Phone                                                                         Integrated Mobile/Fixed
 Single Device                                                                        Any Device              Goal: Mission workflow
                                                                                                               and productivity
 Voice only                                                                           Voice, Video, Data
                                                                                                               benefits that save lives
 Closed Teams                                                                         Open Collaboration      and speed recovery.

 Command&Control Centric                                                              In the field, social media, public
 Fixed Locations                                                                      Deployable anywhere




     ABAG – IP Resiliency   © 2012 Cisco and/or its affiliates. All rights reserved.       Cisco Public                                   4
Mythbusting

 Assumption: “When a disaster happens, telecommunications will go down.”
 Reality: Not always. About 60% of Haiti telecom stayed operational after quake.
  Other examples: Chile Quake, Japan.


 Assumption: “I have a cellphone, an ordinary telephone line, a PBX (etc). Why
  should I care about the IP network?”
 Reality: Everything is IP now –and has been for some time.


 Assumption: “The Internet is an optional luxury for public safety.”
 Reality: Not anymore – just as critical as radio communications. Haiti was a data-
  driven response.


ABAG – IP Resiliency   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   5
Cisco’s Role in IP Resiliency

 As a vendor, Cisco doesn’t have direct responsibility for the health of the national
  telecommunications infrastructure (owned by the Service Providers such as
  AT&T, Verizon, etc.)
 But our products constitute a large part of the national communications
  infrastructure, We have an obligation to produce secure, reliable products and to
  assist where appropriate with our expertise.
 We participate in the National Coordinating Center
  for Telecommunications (DHS) –
  http://www.ncs.gov/ncc/ - ongoing public/private
  coordination for tech companies, service providers,
  Federal gov. agencies.
 Cisco has aggressive customer support available
  for crisis situations: CAP, Cisco Tactical Operations, etc.


ABAG – IP Resiliency   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   6
September 11, 2001

 Infrastructure to note:                     WTC 1/2: below-ground fiber from transatlantic
                                              cables & Telehouse and 60 Hudson St.
                                              60 Hudson St: termination point to many transatlantic cables
                                              NYIIX at 25 Broadway Telehouse: peering site for 40 ISPs from NY, Europe
                                              South America and South Africa.

 WTC 2 collapse severed fiber between 60 Hudson
  and 25 Broadway
 Reachability disruption to <1000 BGP prefixes
  (less than 1% of advertised prefixes globally)
 No global Internet routing instability occurred
  (But there was with Nimda worm on 9/18/2011)
 Global Internet routing continued normally.



ABAG – IP Resiliency   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public                           7
Location of Critical Internet Infra on 9/11/2001




ABAG – IP Resiliency   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   8
2011 Japan Quake and Tsunami

 M9.0 quake/tsunami on March 11, 2011 Internet impact:
                   Both IIJ redundant backbone fiber links Tokyo/Sendai were severed.
                   20% of Japan’s total traffic dropped immediately due to outages.
                   3 of 8 fiber links failed to USA, but good links remained available.
                   Japanese ISPs: “outside of immediately affected areas,
                   no region was disconnected from Japan or the world.”
                   Internet was used heavily by the Japanese public for
                   streaming video, social media, etc.

 Rapid recovery from the event:
                   One of the major Tokyo/Sendai fibers restored by March 12
                   All three trans-Pacific fibers restored by T+28 hrs
                   ISPs reported 85-90% normal traffic T+10 days after quake


 Were we lucky? Most of Japan’s core Internet
  infrastructure was outside of the affected region.
 ABAG – IP Resiliency            © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   9
Example: SINET4




 Japan’s Science and Information Network (SINET4) links 700
  universities, colleges, and national laboratories.
 While there was some network disruption (Sendai), restoration was rapid. Network
  continued to work normally outside of immediate area and was used for emergency
  information use (heavy ustream traffic, etc)
ABAG – IP Resiliency   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   10
San Bruno CA Explosion

 Local communications disruption to cellphones, mobile
  data services immediately around the affected neighborhood.
 Cisco TacOps mutual aid request via NCRIC in support
  of San Mateo County OES.
 Provided communications support to Incident Command Post.
 GIS support through
  Google disaster response
  team for NTSB.
 Extensive After Action:
  “San Bruno Fire Technical
  Debrief” from CMU-SV DMI




ABAG – IP Resiliency   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   11
Conclusion


 Internet infrastructure in developed countries is highly resilient to
  disasters at a macro scale – redundant links + dynamic routing.
 Local disruptions are possible – prepare redundancy into your organization.
 Recent Internet history in disaster demonstrates it is
  reliable and indispensable in a crisis.




     ABAG – IP Resiliency   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   12
Questions?




ABAG – IP Resiliency   © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   13
After the Catastrophe: IP Resiliency In the Post-Disaster Environment

More Related Content

What's hot

The Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster ReliefThe Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster Relief
Cisco Crisis Response
 
Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012
Cisco Crisis Response
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
Cisco Crisis Response
 
Working Together: The Private Sector in Humanitarian Response
Working Together: The Private Sector in Humanitarian ResponseWorking Together: The Private Sector in Humanitarian Response
Working Together: The Private Sector in Humanitarian Response
Cisco Crisis Response
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
Gavan Howe
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
Clay Melugin
 
Inside Cybero
Inside CyberoInside Cybero
Inside Cybero
swanislandnetworks
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
Irsandi Hasan
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
Cisco Security
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
Cisco do Brasil
 
Axoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesAxoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing Services
Bulent Buyukkahraman
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
Ivan Carmona
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
Shane Glenn
 
Structural organization of LSA architecture
Structural organization of LSA architectureStructural organization of LSA architecture
Structural organization of LSA architecture
José Ramón Martínez Salio
 
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
Ahmed Morsy
 
EXTENT Conference: Lease of Dedicated Servers
EXTENT Conference: Lease of Dedicated ServersEXTENT Conference: Lease of Dedicated Servers
EXTENT Conference: Lease of Dedicated Servers
Iosif Itkin
 
What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3
Asher Sterkin
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
Internap
 

What's hot (19)

The Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster ReliefThe Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster Relief
 
Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012Lessons Learned: What We Learned in 2012
Lessons Learned: What We Learned in 2012
 
The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)The Network Enabled Emergency Operations Center (EOC)
The Network Enabled Emergency Operations Center (EOC)
 
Working Together: The Private Sector in Humanitarian Response
Working Together: The Private Sector in Humanitarian ResponseWorking Together: The Private Sector in Humanitarian Response
Working Together: The Private Sector in Humanitarian Response
 
Howe Brand, smart security grid risks
Howe Brand, smart security grid risksHowe Brand, smart security grid risks
Howe Brand, smart security grid risks
 
GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1GR - Security Economics in IoT 150817- Rel.1
GR - Security Economics in IoT 150817- Rel.1
 
Inside Cybero
Inside CyberoInside Cybero
Inside Cybero
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Axoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesAxoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing Services
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Structural organization of LSA architecture
Structural organization of LSA architectureStructural organization of LSA architecture
Structural organization of LSA architecture
 
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
 
EXTENT Conference: Lease of Dedicated Servers
EXTENT Conference: Lease of Dedicated ServersEXTENT Conference: Lease of Dedicated Servers
EXTENT Conference: Lease of Dedicated Servers
 
What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3What is exactly anti fragile in dev ops - v3
What is exactly anti fragile in dev ops - v3
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 

Similar to After the Catastrophe: IP Resiliency In the Post-Disaster Environment

Securing Hastily Formed Networks For Disaster Relief & Emergency Response
Securing Hastily Formed Networks For Disaster Relief & Emergency ResponseSecuring Hastily Formed Networks For Disaster Relief & Emergency Response
Securing Hastily Formed Networks For Disaster Relief & Emergency Response
Rakesh Bharania
 
Hastily Formed Networks at the Waldo Canyon Fire
Hastily Formed Networks at the Waldo Canyon FireHastily Formed Networks at the Waldo Canyon Fire
Hastily Formed Networks at the Waldo Canyon Fire
Cisco Crisis Response
 
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedRamin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
HarshitParkar6677
 
AARNet services including specific Applications & Services
AARNet services including specific Applications & ServicesAARNet services including specific Applications & Services
AARNet services including specific Applications & Services
James Sankar
 
Building the Future with Technology: The Next Five Years
Building the Future with Technology: The Next Five Years Building the Future with Technology: The Next Five Years
Building the Future with Technology: The Next Five Years
Cisco Canada
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
Incubation & Industry
 
NEDAS DC Educational Summit - the Era of Convergence - Presentation Deck
NEDAS DC Educational Summit - the Era of Convergence - Presentation DeckNEDAS DC Educational Summit - the Era of Convergence - Presentation Deck
NEDAS DC Educational Summit - the Era of Convergence - Presentation Deck
Ilissa Miller
 
Ruckus: Emerging Smart WiFi Support of IP-based Voice Services
Ruckus: Emerging Smart WiFi Support of IP-based Voice ServicesRuckus: Emerging Smart WiFi Support of IP-based Voice Services
Ruckus: Emerging Smart WiFi Support of IP-based Voice Services
ScanSource, Inc.
 
Empires Idhs Red Cell White Paper
Empires Idhs Red Cell White PaperEmpires Idhs Red Cell White Paper
Empires Idhs Red Cell White Paper
martindudziak
 
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Advanced Logic Industries
 
Cisco
CiscoCisco
Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.
Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.
Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.
Natilik
 
Talkbox® (1)
Talkbox® (1)Talkbox® (1)
Talkbox® (1)
Sam Kelley
 
Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks
Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi NetworksHurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks
Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks
Rakesh Bharania
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
Massimiliano Falcinelli
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
cem lale
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud Computing
GovCloud Network
 
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Geographic Information Coordinating Council
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
Ollie Whitehouse
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)
Gerardo Pardo-Castellote
 

Similar to After the Catastrophe: IP Resiliency In the Post-Disaster Environment (20)

Securing Hastily Formed Networks For Disaster Relief & Emergency Response
Securing Hastily Formed Networks For Disaster Relief & Emergency ResponseSecuring Hastily Formed Networks For Disaster Relief & Emergency Response
Securing Hastily Formed Networks For Disaster Relief & Emergency Response
 
Hastily Formed Networks at the Waldo Canyon Fire
Hastily Formed Networks at the Waldo Canyon FireHastily Formed Networks at the Waldo Canyon Fire
Hastily Formed Networks at the Waldo Canyon Fire
 
Ramin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updatedRamin elahi fog_computing_ecosystem_final_dec22_updated
Ramin elahi fog_computing_ecosystem_final_dec22_updated
 
AARNet services including specific Applications & Services
AARNet services including specific Applications & ServicesAARNet services including specific Applications & Services
AARNet services including specific Applications & Services
 
Building the Future with Technology: The Next Five Years
Building the Future with Technology: The Next Five Years Building the Future with Technology: The Next Five Years
Building the Future with Technology: The Next Five Years
 
What is the internet of things v3
What is the internet of things v3What is the internet of things v3
What is the internet of things v3
 
NEDAS DC Educational Summit - the Era of Convergence - Presentation Deck
NEDAS DC Educational Summit - the Era of Convergence - Presentation DeckNEDAS DC Educational Summit - the Era of Convergence - Presentation Deck
NEDAS DC Educational Summit - the Era of Convergence - Presentation Deck
 
Ruckus: Emerging Smart WiFi Support of IP-based Voice Services
Ruckus: Emerging Smart WiFi Support of IP-based Voice ServicesRuckus: Emerging Smart WiFi Support of IP-based Voice Services
Ruckus: Emerging Smart WiFi Support of IP-based Voice Services
 
Empires Idhs Red Cell White Paper
Empires Idhs Red Cell White PaperEmpires Idhs Red Cell White Paper
Empires Idhs Red Cell White Paper
 
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMB
 
Cisco
CiscoCisco
Cisco
 
Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.
Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.
Breakfast Briefing- Natilik & Cisco Introducing The Network. Intuitive.
 
Talkbox® (1)
Talkbox® (1)Talkbox® (1)
Talkbox® (1)
 
Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks
Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi NetworksHurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks
Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Nat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud ComputingNat'l Defense Univ: Lessons Learned in CLoud Computing
Nat'l Defense Univ: Lessons Learned in CLoud Computing
 
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Reponse...
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

After the Catastrophe: IP Resiliency In the Post-Disaster Environment

  • 1. After the Catastrophe: IP Network Availability and Resiliency In The Post-Disaster Environment. Rakesh Bharania Network Consulting Engineer Cisco Tactical Operations http://www.cisco.com/go/tacops E-Mail: rbharani@cisco.com Twitter: @densaer
  • 2. Agenda – After the Catastrophe  The Need for Information In A Post-Disaster Environment  Questioning Assumptions  The role of Cisco in the Infrastructure picture  Examples: 1. September 11, 2001 attacks 2. 2011 Japan Earthquake and Tsunami 3. 2010 San Bruno, CA gas pipeline explosion ABAG – IP Resiliency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
  • 3. The Fundamental Problem… NGO / International Orgs Public Safety In complex disasters with multiple National, State & Transportation response organizations … Local Government How to deliver the right information in the right format to the right person at the right time? Critical Infrastructure Healthcare Defense 3 ABAG – IP Resiliency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
  • 4. Changing Technologies Affect Mission Success Evolution in People, Process and Technologies to support Disaster and Humanitarian relief  Radio, Phone Integrated Mobile/Fixed  Single Device Any Device Goal: Mission workflow and productivity  Voice only Voice, Video, Data benefits that save lives  Closed Teams Open Collaboration and speed recovery.  Command&Control Centric In the field, social media, public  Fixed Locations Deployable anywhere ABAG – IP Resiliency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
  • 5. Mythbusting  Assumption: “When a disaster happens, telecommunications will go down.”  Reality: Not always. About 60% of Haiti telecom stayed operational after quake. Other examples: Chile Quake, Japan.  Assumption: “I have a cellphone, an ordinary telephone line, a PBX (etc). Why should I care about the IP network?”  Reality: Everything is IP now –and has been for some time.  Assumption: “The Internet is an optional luxury for public safety.”  Reality: Not anymore – just as critical as radio communications. Haiti was a data- driven response. ABAG – IP Resiliency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
  • 6. Cisco’s Role in IP Resiliency  As a vendor, Cisco doesn’t have direct responsibility for the health of the national telecommunications infrastructure (owned by the Service Providers such as AT&T, Verizon, etc.)  But our products constitute a large part of the national communications infrastructure, We have an obligation to produce secure, reliable products and to assist where appropriate with our expertise.  We participate in the National Coordinating Center for Telecommunications (DHS) – http://www.ncs.gov/ncc/ - ongoing public/private coordination for tech companies, service providers, Federal gov. agencies.  Cisco has aggressive customer support available for crisis situations: CAP, Cisco Tactical Operations, etc. ABAG – IP Resiliency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
  • 7. September 11, 2001  Infrastructure to note: WTC 1/2: below-ground fiber from transatlantic cables & Telehouse and 60 Hudson St. 60 Hudson St: termination point to many transatlantic cables NYIIX at 25 Broadway Telehouse: peering site for 40 ISPs from NY, Europe South America and South Africa.  WTC 2 collapse severed fiber between 60 Hudson and 25 Broadway  Reachability disruption to <1000 BGP prefixes (less than 1% of advertised prefixes globally)  No global Internet routing instability occurred (But there was with Nimda worm on 9/18/2011)  Global Internet routing continued normally. ABAG – IP Resiliency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
  • 8. Location of Critical Internet Infra on 9/11/2001 ABAG – IP Resiliency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
  • 9. 2011 Japan Quake and Tsunami  M9.0 quake/tsunami on March 11, 2011 Internet impact: Both IIJ redundant backbone fiber links Tokyo/Sendai were severed. 20% of Japan’s total traffic dropped immediately due to outages. 3 of 8 fiber links failed to USA, but good links remained available. Japanese ISPs: “outside of immediately affected areas, no region was disconnected from Japan or the world.” Internet was used heavily by the Japanese public for streaming video, social media, etc.  Rapid recovery from the event: One of the major Tokyo/Sendai fibers restored by March 12 All three trans-Pacific fibers restored by T+28 hrs ISPs reported 85-90% normal traffic T+10 days after quake  Were we lucky? Most of Japan’s core Internet infrastructure was outside of the affected region. ABAG – IP Resiliency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
  • 10. Example: SINET4  Japan’s Science and Information Network (SINET4) links 700 universities, colleges, and national laboratories.  While there was some network disruption (Sendai), restoration was rapid. Network continued to work normally outside of immediate area and was used for emergency information use (heavy ustream traffic, etc) ABAG – IP Resiliency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
  • 11. San Bruno CA Explosion  Local communications disruption to cellphones, mobile data services immediately around the affected neighborhood.  Cisco TacOps mutual aid request via NCRIC in support of San Mateo County OES.  Provided communications support to Incident Command Post.  GIS support through Google disaster response team for NTSB.  Extensive After Action: “San Bruno Fire Technical Debrief” from CMU-SV DMI ABAG – IP Resiliency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
  • 12. Conclusion  Internet infrastructure in developed countries is highly resilient to disasters at a macro scale – redundant links + dynamic routing.  Local disruptions are possible – prepare redundancy into your organization.  Recent Internet history in disaster demonstrates it is reliable and indispensable in a crisis. ABAG – IP Resiliency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
  • 13. Questions? ABAG – IP Resiliency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 13

Editor's Notes

  1. Source: http://www.renesys.com/tech/presentations/pdf/renesys-030502-NRC-911.pdf
  2. Source: http://www.renesys.com/tech/presentations/pdf/renesys-030502-NRC-911.pdf
  3. Sources: http://conferences.sigcomm.org/co-next/2011/workshops/SpecialWorkshop/papers/1569500743.pdf Photos: NOAA, US Navy
  4. Source: http://conferences.sigcomm.org/co-next/2011/workshops/SpecialWorkshop/papers/1569500451.pdf
  5. San Bruno photo by Andrew Oh