Designing a Predictable Internet Backbone Network∗

Total Page:16

File Type:pdf, Size:1020Kb

Designing a Predictable Internet Backbone Network∗ Designing a Predictable Internet Backbone Network¤ Rui Zhang-Shen, Nick McKeown Computer Systems Laboratory Stanford University frzhang, [email protected] ABSTRACT the design process starts over. A well-designed network Designing a backbone network is hard. On one hand, users should support the tra±c matrices presented to it for expect the network to have very high availability, little or as long as possible. In the rest of this section, we will no congestion, and hence little or no queueing delay. On discuss some of the many challenges this presents to the other hand, tra±c conditions are always changing. Over network designers today. time usage patterns evolve, customers come and go, new ap- plications are deployed, and the tra±c matrices of one year 1.1 Obtaining a Traffic Matrix Estimation are quite di®erent from the next. Yet the network operator The key to designing a network is to understand how must design for low congestion over the multiple years that it will be used. The process starts by measuring how the network is in operation. Harder still, the network must the network is used today, and then extrapolating based be designed to work well under a variety of link and router on estimates of how tra±c will grow and change over failures. It is not surprising that most networks today are time. enormously overprovisioned, with typical utilizations around Obtaining a tra±c matrix { a matrix indicating the 10%. In this paper we propose that backbone networks use peak short-term average load between any pair of nodes Valiant Load-balancing over a fully-connected logical mesh. in the backbone { is not an easy task. It is impractical to This is quite a radical departure from the way backbones measure it directly, and the best estimation techniques are built today, and raises as many questions as it answers. (from link load measurements) give errors of 20% or But it leads to a surprisingly simple architecture, with pre- more [1]. Moreover, demand fluctuates over time as a dictable and guaranteed performance, even when tra±c ma- result of special events or even changes external to the trices change and when links and routers fail. It is provably network [2]. the lowest capacity network with these characteristics. In To design a network we need to know what the tra±c addition, it provides fast convergence after failure, making matrix will be in the future { years after the topology is it possible to support real-time applications. ¯rst deployed. Starting with an estimate of the tra±c matrix, and then extrapolating, inevitably leads to a 1. INTRODUCTION crude estimate of future demand. Typically, the tra±c Network design can be formulated as an optimiza- matrix is extrapolated based on historical growth rates, tion problem where total cost is minimized subject to and adjusted according to marketing forecasts and de- topology, demand, and performance constraints. The cisions such as addition and elimination of applications designer chooses where nodes and links are placed, their and services. However, it is impossible to predict future capacities, and how tra±c is routed. On the face of it, growth rates and new applications. Even if total growth this seems like a straightforward problem. We ¯rst de- rate is estimated correctly, the growth rate doesn't take termine the constraints on node and link location, and into account new applications which may change tra±c the expected demand, and then do our best to design patterns. For example, peer-to-peer tra±c has demon- an optimal network. In this paper, we will focus on strated how quickly usage patterns can change in the In- designing a backbone network. ternet. The widespread use of voice-over-IP and video- Once deployed, the expense of the infrastructure dic- on-demand may change usage patterns again over the tates that the backbone topology (i.e., the set of nodes next few years. What's more, the growth rate does not and their inter-connectivity) doesn't change for several take into account large new customers bringing new de- years. As tra±c patterns change, and usage grows, a mand. new topology will eventually need to be deployed, and 1.2 Failures and Routing Convergence ¤This research was funded by NSF under ITR award ANI- 0331653, and by the Lillie Family Stanford Graduate Fel- A network must be designed to continue to operate lowship. when there are failures and service or maintenance in- terruptions in the network. Failures cause two problems: Loss of connectivity, 1 2 which can take several seconds to recover from [3], and is too slow for real-time applications such as voice and N 3 gaming. Second, failures demand extra capacity to carry rerouted tra±c. Today, rerouting leads to large, coarse … 4 flows suddenly traversing a link, requiring large chunks of spare capacity. It is hard enough to design a predictable network when all links and routers are functioning correctly; it is even harder to ensure predictable behavior when there are unpredictable failures. Figure 1: A hierarchical network with N backbone nodes, each serving an access network. The backbone 1.3 Network Design in Practice nodes are connected by a logical full mesh. While network design can be formulated as an opti- mization problem, networks are not designed this way in the most e±cient network design (in the sense that it practice. Juggling the number of constraints, estimates, minimizes total link capacity) that can support an arbi- and unknowns means that network design is more of an trary set of tra±c matrices. Furthermore, the network art than a science, and is dominated by a number of can be designed to support any tra±c matrix under a rules-of-thumb that have been learned over the years. pre-de¯ned number of link and router failures. This explains why each network operator has built a In what follows, we will describe the general approach, very di®erent backbone network. and how Valiant Load-balancing can be applied to back- Ad-hoc design makes it hard or impossible to predict bone network design. We'll ¯rst consider how it works how a network will perform over a wide variety of con- when the network is homogeneous and all nodes have ditions. To o®set the intrinsic inaccuracies in the design the same capacity, and then show how the network can process, it is common to use tra±c engineering in which be designed to work under an arbitrary number of fail- operators monitor link utilization and route flows to re- ures. duce congestion [4], especially during failures [5]. In an accompanying paper [9], the authors indepen- Tra±c engineering only works if the underlying net- dently arrived at the same conclusion and describe a work is able to support the current tra±c matrix. With slightly di®erent scheme. the complicated topologies deployed today, it is not gen- erally possible to determine the set of tra±c matrices that a backbone network can support. 2. VALIANTLOAD-BALANCED NETWORKS The motivation for Valiant Load-balancing is that it 1.4 Problem Statement is much easier to estimate the aggregate tra±c entering In summary, it is extremely hard to design a network. and leaving a node than to estimate the tra±c matrix. First, it is nearly impossible to accurately estimate fu- The approach assumes a full-mesh topology among the ture demand, and how nodes will communicate with nodes, and load-balances tra±c over two-hop paths. each other. Despite inaccurate information, network designers have to ensure the network will operate when 2.1 General Approach links and routers fail unpredictably. Consider a backbone network consisting of multiple We propose a way to design backbone networks that PoPs interconnected by long-haul links. The whole net- are insensitive to the tra±c matrix (i.e., that work equal- work is arranged as a hierarchy, and each PoP connects ly well for all valid tra±c matrices), and continue to an access network to the backbone (see Figure 1). provide guaranteed performance under a user-de¯ned Although tra±c matrices are hard to obtain, it is number of link and router failures. straightforward to measure, or estimate, the total We believe that Valiant Load-balancing is a promising amount of tra±c entering (leaving) a PoP from (to) way to design backbone networks. The approach was its access network. When a new customer joins the ¯rst proposed by Valiant for processor interconnection network, we add its aggregate tra±c rate to the node. networks [6], and has received recent interest for scal- When new locations are planned, the aggregate traf- able routers with performance guarantees [7] [8]. Here ¯c demand for a new node can be estimated from the we apply it to backbone network design. population that the node serves. This is much easier There are several bene¯ts to Valiant Load-balancing. than trying to estimate the tra±c rates from one node First, it can be shown that { given a set of boundary to every other node in the backbone. nodes with a ¯xed maximum capacity { the network Imagine that we establish a full mesh of logical links will support any set of tra±c matrices. It is provably from each node to every other node. They are not nec- essarily physical links; they could be implemented us- What is the optimal interconnection pattern that can ing tunneling or an overlay mechanism. Tra±c enter- guarantee 100% throughput to any valid tra±c matrix ing the backbone is spread equally across all the nodes.
Recommended publications
  • Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C
    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Maller of ) ) Global Crossing Limited and Level 3 ) Communications, Inc., Application for ) Consent to Transfer Control ofAuthority to ) Provide Global facilities-Based and Global ) IB Docket No. I 1-78 Resale International Telecommunications ) Services and ofDomestic Common Carrier ) Transmission Lines, Pursuant to Section 214 ) of the Communications Act, as Amended ) ) Level 3 Communications, Inc., Petition for ) Declaratory Ruling Under Section 31 0(b)(4) ) Ofthe Communications Act of 1934, as ) AJnended ) DECLARATION OF MARCELLUS NIXON I. My name is Marcellus I ixon. I am the Director ofIP Network Planning at XO Communications, LLC. (XO). My business address is 13865 Sunrise Valley Drive, Hcrndon, VA 20171. 2. I have bcen employed at XO since 2002, initially as an IP Network Engineer. I have been in my current position as Dircctor ofIP Network Planning since 2008. My career with IP nctworks began in the US Army. I have also held networking positions with the NASD and internet MCT. I hold a Bachelor ofInterdisciplinary Studies from the University of Virginia. 3. In my current position, I am responsible for all strategic aspects of IP network planning, and I am the peering coordinator for XO. In that capacity, I manage relationships with other Tier I and lower tier Internet Backbone Providers (lI3Ps), including detennining wbere peering occurs, evaluating network arcbitecture needs such as capacity requirements, routing requirements, and the impact of technological changes on the peering arrangement. I also am responsible for negotiating interconnection (peering) agreements. To date, I have negotiated on behalf ofXO forty-seven (47) peering agreements.
    [Show full text]
  • Networking and the Internet
    Networking and Today’s lecture the Internet History of the Internet How the Internet works Lecture 4 – COMPSCI111/111G S2 2018 Network protocols The telephone WWII and the Cold War 1876: first successful bi-directional Computer technology played an important role transmission of clear speech in code-breaking during WW2 by Alexander Bell and Thomas Watson Cold War between US and USSR led to a technology and arms race Peaked with the launch of Sputnik in 1957 1958: Advanced Research Projects Agency (ARPA) 1940: first successful transmission established of digital data through over telegraph wires by George Stibitz April 1969: construction of ARPANET begins, a packet-switching network Circuit-switching network Packet-switching network Nodes are connected physically via a central Data is broken into packets, which are then sent node on the best route in the network Used by the telephone network Each node on the route sends the packet onto its next destination, avoiding congested or broken Originally, switchboard operators had to nodes manually connect phone calls, today this is done electronically B A ARPANET ARPANET in 1977 October 1969: ARPANET is completed with four nodes 1973: Norway connects to ARPANET via satellite, followed by London via a terrestrial link ARPANET ARPANET to the Internet 1983: TCP/IP implemented in ARPANET Networks similar to ARPANET sprang up around the USA and in other countries 1990: ARPANET is formally decommissioned 1984: domain name system (DNS) implemented 1985: NSFNET was established 1989: Waikato University connects to NSFNET 1991: World Wide Web (WWW) created at CERN (European Organization for Nuclear Research) by Tim Berners-Lee 1995: NSFNET is retired WWW vs Internet Internet growth The Internet is a global system of interconnected computer networks.
    [Show full text]
  • The Internet ! Based on Slides Originally Published by Thomas J
    15-292 History of Computing The Internet ! Based on slides originally published by Thomas J. Cortina in 2004 for a course at Stony Brook University. Revised in 2013 by Thomas J. Cortina for a computing history course at Carnegie Mellon University. A Vision of Connecting the World – the Memex l Proposed by Vannevar Bush l first published in the essay "As We May Think" in Atlantic Monthly in 1945 and subsequently in Life Magazine. l "a device in which an individual stores all his books, records, and communications, and which is mechanized so that it may be consulted with exceeding speed and flexibility" l also indicated the idea that would become hypertext l Bush’s work was influential on all Internet pioneers The Memex The Impetus to Act l 1957 - U.S.S.R. launches Sputnik I into space l 1958 - U.S. Department of Defense responds by creating ARPA l Advanced Research Projects Agency l “mission is to maintain the technological superiority of the U.S. military” l “sponsoring revolutionary, high-payoff research that bridges the gap between fundamental discoveries and their military use.” l Name changed to DARPA (Defense) in 1972 ARPANET l The Advanced Research Projects Agency Network (ARPANET) was the world's first operational packet switching network. l Project launched in 1968. l Required development of IMPs (Interface Message Processors) by Bolt, Beranek and Newman (BBN) l IMPs would connect to each other over leased digital lines l IMPs would act as the interface to each individual host machine l Used packet switching concepts published by Leonard Kleinrock, most famous for his subsequent books on queuing theory Early work Baran (L) and Davies (R) l Paul Baran began working at the RAND corporation on secure communications technologies in 1959 l goal to enable a military communications network to withstand a nuclear attack.
    [Show full text]
  • Review of the Development and Reform of the Telecommunications Sector in China”, OECD Digital Economy Papers, No
    Please cite this paper as: OECD (2003-03-13), “Review of the Development and Reform of the Telecommunications Sector in China”, OECD Digital Economy Papers, No. 69, OECD Publishing, Paris. http://dx.doi.org/10.1787/233204728762 OECD Digital Economy Papers No. 69 Review of the Development and Reform of the Telecommunications Sector in China OECD Unclassified DSTI/ICCP(2002)6/FINAL Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 13-Mar-2003 ___________________________________________________________________________________________ English text only DIRECTORATE FOR SCIENCE, TECHNOLOGY AND INDUSTRY COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY Unclassified DSTI/ICCP(2002)6/FINAL REVIEW OF THE DEVELOPMENT AND REFORM OF THE TELECOMMUNICATIONS SECTOR IN CHINA text only English JT00140818 Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format DSTI/ICCP(2002)6/FINAL FOREWORD The purpose of this report is to provide an overview of telecommunications development in China and to examine telecommunication policy developments and reform. The initial draft was examined by the Committee for Information, Computer and Communications Policy in March 2002. The report benefited from discussions with officials of the Chinese Ministry of Information Industry and several telecommunication service providers. The report was prepared by the Korea Information Society Development Institute (KISDI) under the direction of Dr. Inuk Chung. Mr. Dimitri Ypsilanti from the OECD Secretariat participated in the project. The report benefited from funding provided mainly by the Swedish government. KISDI also helped in the financing of the report. The report is published on the responsibility of the Secretary-General of the OECD.
    [Show full text]
  • UMTS Core Network
    UMTS Core Network V. Mancuso, I. Tinnirello GSM/GPRS Network Architecture Radio access network GSM/GPRS core network BSS PSTN, ISDN PSTN, MSC GMSC BTS VLR MS BSC HLR PCU AuC SGSN EIR BTS IP Backbone GGSN database Internet V. Mancuso, I. Tinnirello 3GPP Rel.’99 Network Architecture Radio access network Core network (GSM/GPRS-based) UTRAN PSTN Iub RNC MSC GMSC Iu CS BS VLR UE HLR Uu Iur AuC Iub RNC SGSN Iu PS EIR BS Gn IP Backbone GGSN database Internet V. Mancuso, I. Tinnirello 3GPP RelRel.’99.’99 Network Architecture Radio access network 2G => 3G MS => UE UTRAN (User Equipment), often also called (user) terminal Iub RNC New air (radio) interface BS based on WCDMA access UE technology Uu Iur New RAN architecture Iub RNC (Iur interface is available for BS soft handover, BSC => RNC) V. Mancuso, I. Tinnirello 3GPP Rel.’99 Network Architecture Changes in the core Core network (GSM/GPRS-based) network: PSTN MSC is upgraded to 3G MSC GMSC Iu CS MSC VLR SGSN is upgraded to 3G HLR SGSN AuC SGSN GMSC and GGSN remain Iu PS EIR the same Gn GGSN AuC is upgraded (more IP Backbone security features in 3G) Internet V. Mancuso, I. Tinnirello 3GPP Rel.4 Network Architecture UTRAN Circuit Switched (CS) core network (UMTS Terrestrial Radio Access Network) MSC GMSC Server Server SGW SGW PSTN MGW MGW New option in Rel.4: GERAN (GSM and EDGE Radio Access Network) PS core as in Rel.’99 V. Mancuso, I. Tinnirello 3GPP Rel.4 Network Architecture MSC Server takes care Circuit Switched (CS) core of call control signalling network The user connections MSC GMSC are set up via MGW Server Server (Media GateWay) SGW SGW PSTN “Lower layer” protocol conversion in SGW MGW MGW (Signalling GateWay) RANAP / ISUP PS core as in Rel.’99 SS7 MTP IP Sigtran V.
    [Show full text]
  • Guidelines for the Secure Deployment of Ipv6
    Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks NIST Special Publication 800-119 Guidelines for the Secure Deployment of IPv6 Recommendations of the National Institute of Standards and Technology Sheila Frankel Richard Graveman John Pearce Mark Rooks C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 December 2010 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr. Patrick D. Gallagher, Director GUIDELINES FOR THE SECURE DEPLOYMENT OF IPV6 Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-119 Natl. Inst. Stand. Technol. Spec. Publ. 800-119, 188 pages (Dec. 2010) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately.
    [Show full text]
  • Circuit Switching in the Internet
    CIRCUIT SWITCHING IN THE INTERNET A DISSERTATION SUBMITTED TO THE DEPARTMENT OF ELECTRICAL ENGINEERING AND THE COMMITTEE ON GRADUATE STUDIES OF STANFORD UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Pablo Molinero Fernandez June 2003 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. UMI Number: 3090644 Copyright 2003 by Molinero Fernandez, Pablo All rights reserved. ® UMI UMI Microform 3090644 Copyright 2003 by ProQuest Information and Learning Company. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ProQuest Information and Learning Company 300 North Zeeb Road P.O. Box 1346 Ann Arbor, Ml 48106-1346 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. © Copyright by Pablo Molinero Fernandez 2003 All Rights Reserved ii Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree ofD/pctor of Philosophy. Nick McKeown (Principal Adviser) I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. _______________ Balaji Prabhakar I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. NfSibTas Bambos Approved for the University Committee on Graduate Studies: iii Reproduced with permission of the copyright owner.
    [Show full text]
  • An Overview of DWDM Networks
    Telecommunication / Telecommunication An Overview of DWDM Networks 1.0 Introduction by Shaowen Song n traditional optical fiber networks, information is transmit- ted through optical fiber by a single lightbeam. In a Wilfrid Laurier University, Waterloo, ON I wavelength division multiplexing (WDM) network, the vast optical bandwidth of a fiber (approximately 30 THz corre- Abstract sponding to the low-loss region in a single-mode optical fiber) is carved up into wavelength channels, each of which carries a data stream indi- This article provides an overview of the applications of Dense Wavelength Division Multiplexing (DWDM) technology. It exam- vidually. The multiple channels of information (each having a different ines the network architecture and the recent development of two carrier wavelength) are transmitted simultaneously over a single fiber. The reason why this can be done is that optical beams with different major DWDM-based networks, namely the backbone network and the residential access network. The DWDM applications in Local wavelengths propagate without interfering with one another. When the Area Networks (LANs) are not included in the article. The article number of wavelength channels is above 20 in a WDM system, it is generally referred to as Dense WDM or DWDM. We use DWDM as a also looks into the future of broadband integrated service networks based on the DWDM technology. general term in this article. DWDM technology can be applied to different areas in the telecommu- nication networks, which includes the backbone networks, the residential access networks, and also the Local Area Networks (LANs). Sommaire Among these three areas, developments in the DWDM-based backbone network are leading the way, followed by the DWDM-based LANs.
    [Show full text]
  • Moonv6 Network Project November Test Set Observations and Results
    Moonv6 Network Project November Test Set Observations and Results Executive Summary Networking equipment and application vendors have heeded calls from commercial service providers and U.S. government agencies to begin manufacturing products compatible with the next generation of the Internet protocol, Internet Protocol version 6 (IPv6). There is an increasing interest in testing IPv6 technology to ensure legacy networks will sustain the market’s shift to a new underlying data communications transport protocol. Through service-provider-driven, multi-vendor interoperability tests and demonstrations, the Moonv6 project has globally demonstrated that the underlying infrastructure of IPv6 is stable for small deployments. Network vendors are now refining their IPv6 implementations to improve the interoperability and scalability of their products with legacy equipment and other vendors’ products. While continued testing is needed in areas such as firewalls, security and IPSec, the Moonv6 November Test Set, which ran from Oct. 30 until Nov. 12, 2004, pushed multi- vendor IPv6 testing into new territory. New areas explored inlucded VoIP via Session Initiation Protocol (SIP), wireless LANs and streaming video via multicast. Specific protocols tested included IPsec, DNS, Dynamic Host Configuration Protocol (DHCP), and iSCSI. Routing, tunneling and QoS were also included. Few abnormalities were found in the wide area network; some remote sites experienced configuration issues largely associated with staff inexperience with the protocol. Moonv6 is a collaborative project led by the North American IPv6 Task Force (NAv6TF) and includes the University of New Hampshire InterOperability Laboratory (UNH-IOL), U.S. government agencies and Internet2 (I2). The Moonv6 network, based at the UNH- IOL and the Joint Interoperability Test Command (JITC) located at Ft Huachuca, AZ, has rapidly deployed the most aggressive multi-vendor IPv6 backbone to date.
    [Show full text]
  • Analysis of Wifi and Wimax and Wireless Network Coexistence
    International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 ANALYSIS OF WIFI AND WIMAX AND WIRELESS NETWORK COEXISTENCE Shuang Song and Biju Issac School of Computing, Teesside University, Middlesbrough, UK ABSTRACT Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access) that uses the IEEE 802.16 standard are networks that we want to explore. WiMAX has been developed over 10 years, but it is still unknown to most people. However compared to WLAN, it has many advantages in transmission speed and coverage area. This paper will introduce these two technologies and make comparisons between WiMAX and WiFi. In addition, wireless network coexistence of WLAN and WiMAX will be explored through simulation. Lastly we want to discuss the future of WiMAX in relation to WiFi. KEY WORDS WiMAX, WiFi, wireless network, wireless coexistence, network simulation 1. INTRODUCTION With the development of multimedia communication, people need wireless broadband access with higher speed, larger coverage and mobility. The emergence of WiMAX (Worldwide Interoperability for Microwave Access) technology met the people's demand for wireless Internet to some extent. If wireless LAN technology (WLAN) solves the access problem of the "last one hundred meters", then WiMAX technology is the best access solution of the "last mile". Though WiMAX is an emerging and extremely competitive wireless broadband access technology, the development prospects of its market is still unknown. Hybrid networks as a supplement to cell based or IP packet based services, can fully reflect the characteristics of wide network coverage.
    [Show full text]
  • Comments of AT&T Global Network Services France, SAS: ARCEP
    Comments of AT&T Global Network Services France, SAS: ARCEP Consultation Paper on Internet and Electronic Communications Network Neutrality July 13, 2010 Introduction AT&T Global Network Services France SAS (“AT&T”) respectfully submits these comments on the ARCEP Public Consultation Paper on Internet and Electronic Communications Network Neutrality (the “Consultation Paper”). Operating globally under the AT&T brand, AT&T’s parent, AT&T Inc., through its affiliates, is a worldwide provider of Internet Protocol (IP)-based communications services to businesses and a leading U.S. provider of wireless, high speed Internet access, local and long distance voice, and directory publishing and advertising services, and a growing provider of IPTV entertainment offerings. AT&T Inc. operates one of the world's most advanced global networks, carrying more than 18.7 petabytes of total IP and data traffic on an average business day, the equivalent of a 3.1 megabyte music download for every man, woman and child on the planet. With operations in countries that cover 97% of the world’s economy, AT&T Inc. has extensive experience as an incumbent and a new entrant, as a fixed line operator and a mobile operator, and in the dynamic areas of converged technologies and services. In France and other EU Member States, AT&T Inc., through its affiliates, is a competitive provider of business connectivity and managed network services. AT&T Inc. also is a leading provider of bilateral connectivity services linking the U.S. with France and all other EU Member States. AT&T appreciates the opportunity to express its views in this public consultation on Network Neutrality.
    [Show full text]
  • Guidelines for IPX Provider Networks (Previously Inter- Service Provider IP Backbone Guidelines) Version 14.0 01 August 2018
    GSM Association Non-confidential Official Document IR.34 - Guidelines for IPX Provider networks (Previously Inter-Service Provider IP Backbone Guidelines) Guidelines for IPX Provider networks (Previously Inter- Service Provider IP Backbone Guidelines) Version 14.0 01 August 2018 This is a Non-binding Permanent Reference Document of the GSMA Security Classification: Non-confidential Access to and distribution of this document is restricted to the persons permitted by the security classification. This document is confidential to the Association and is subject to copyright protection. This document is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permitted under the security classification without the prior written approval of the Association. Copyright Notice Copyright © 2018 GSM Association Disclaimer The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice. Antitrust Notice The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy. V14.0 Page 1 of 53 GSM Association Non-confidential Official Document IR.34 - Guidelines
    [Show full text]