Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7130))

Abstract

The telecommunication network is a key critical infrastructure in any modern society. Any protracted loss of the ability for key personnel to communicate will inevitably lead to the complete collapse of that society. This chapter discusses many security and reliability concerns associated with the operation and maintenance of the telecommunications infrastructure. Telecommunications is a unique infrastructure in that other critical infrastructures are increasingly dependent on telecommunications as well as telecommunications itself being a critical infrastructure that serves many crucial needs such as Public Safety, communications for restoral of critical services, and informing the public regarding emergency situations. In this chapter we define the architecture of the next generation telecommunications network, and describe types of infrastructure failures that need to be prevented or at least minimized. In terms of protection schemes, we explain the different mechanisms that operate at different layers within the network. Particular emphasis is placed on the ability of the network to detect, isolate and resolve service impacting abnormalities. Thus, the network can restore itself to some level of operation and to maintain critical services for specified users, even when the network is degraded owing to internal or external failures or overload conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. International Telecommunications Union (ITU), http://www.itu.int/ITU-T/studygroups/com13/ngn2004/working_definition.html

  2. General principles and general reference model for Next Generation Networks, ITU-T Y.2011 (2004)

    Google Scholar 

  3. Multiprotocol Label Switching Architecture, RFC 3031, Internet Engineering Task Force (2001)

    Google Scholar 

  4. Framework for Multi-Protocol Label Switching (MPLS)-based Recovery, RFC 3469, Internet Engineering Task Force (2003)

    Google Scholar 

  5. RSVP-TE: Extensions to RSVP for LSP Tunnels, RFC 3209, Internet Engineering Task Force (2001)

    Google Scholar 

  6. Fast Reroute Extensions to RSVP-TE for LSP Tunnels, RFC 4090, Internet Engineering Task Force (2005)

    Google Scholar 

  7. OSI IS-IS Intra-domain Routing Protocol, RFC 1142, Internet Engineering Task Force (1990)

    Google Scholar 

  8. OSPF Version 2, RFC 2178, Internet Engineering Task Force (1998)

    Google Scholar 

  9. Internet Engineering Task Force (IETF) RFC 5478, http://bgp.potaroo.net/ietf/idref/rfc5478/index.html

  10. Botnets and Hackers and Spam, Federal Trade Commission (FTC), http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt132.pdf

  11. MLPP (Multi-Level Precedence and Preemption) for US Government, http://jitc.fhu.disa.mil/tssi/configurations/siemens/mlpp_fue.pdf

  12. Conrad, S.H., LeClaire, R.J., O’Reilly, G.P., Uzunalioglu, H.: Critical National Infrastructure Reliability Modeling and Analysis. Bell Labs Technical Journal 11(3), 57–71 (2006)

    Article  Google Scholar 

  13. Technical Specification Group Services and System Aspects (2006), IP Multimedia Subsystem (IMS), Stage 2, TS 23.228, 3rd Generation Partnership Project (2006)

    Google Scholar 

  14. Chen, T.M., Robert, J.-M.: Worm Epidemics in High-Speed Networks. ACM Computer 37(6), 48–53 (2004)

    Google Scholar 

  15. Bologna, S., Setola, R.: The Need to Improve Local Self-Awareness in CIP/CIIP. In: Proc. of First IEEE International Workshop on Critical Infrastructure Protection (IWCIP 2005), Darmstadt, Germany, November 3-4, pp. 84–89 (2005)

    Google Scholar 

  16. Albert, R., Jeong, H., Barabasi, A.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000)

    Article  Google Scholar 

  17. http://www.switched.com/2010/09/27/stuxnet-worm-strikes-nuclear-plant-in-iran/

  18. Panzieri, S., Setola, R.: Failures Propagation in Critical Interdependent Infrastructures. Int. J. Modelling, Identification and Control (IJMIC) 3(1), 69–78

    Google Scholar 

  19. Budka, K.C., Deshpande, J.G., Doumi, T.L., Madden, M., Mew, T.: Communication Network Architecture and Design Principles for Smart Grids. Bell Labs Technical Journal 15(2), 205–227 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Goldman, S., Uzunalioglu, H. (2012). Telecommunications. In: Lopez, J., Setola, R., Wolthusen, S.D. (eds) Critical Infrastructure Protection. Lecture Notes in Computer Science, vol 7130. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28920-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28920-0_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28919-4

  • Online ISBN: 978-3-642-28920-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics