Paper Diversity: Why Your IGP Redundancy is a Layer 1 Lie
Your contract says you have two separate paths. Your routing table shows two distinct IS-IS adjacencies formed over independent circuits, with the LSDB confirming unique paths to the remote site. Your logical diagrams look flawless, and your auditor just happily checked the box for high availability.
Then a guy in a high-vis vest with a backhoe takes your entire enterprise AS offline.
Welcome to "Paper Diversity", the biggest trap in enterprise networking.
When you engineer a network, it's easy to get protocol tunnel-vision. We spend years mastering routing protocols, failover states, and software-defined logic. Certifications teach you how to build highly available topologies in a frictionless lab environment. But civil engineering doesn't care about your software or your BGP skills.
Paper diversity occurs when a network architecture boasts logical redundancy at the routing layer while remaining fundamentally singular and highly vulnerable at the physical layer.
No amount of protocol tuning or expensive hardware can out-route a severed shared conduit. If you just took your telecom account manager's word for it, you are falling for a devastating illusion.
The IRU Shell Game
Companies frequently overbuild their fiber plants. They lay massive cable trunks containing bundles of 144 to 864 individual glass strands. They monetize this unlit "dark fiber" by selling it through an Indefeasible Right of Use (IRU) agreement.
An IRU is a permanent contractual agreement. It grants the purchaser the exclusive right to use a specific strand within that larger physical cable.
Provider B does not actually own a proprietary physical trench. They simply hold a 20-year IRU on strand #42. Provider A owns the trench and operates on strand #1.
The reality? Provider A and Provider B share the exact same high-density polyethylene conduit.
The DWDM Illusion
Now the trap gets even deeper. Once a carrier leases their specific strand inside the shared trunk they add a layer of Dense Wavelength Division Multiplexing (DWDM) on top of it.
DWDM leverages the properties of light by splitting the infrared spectrum into dozens of distinct colors or lambdas. Multiple entirely independent data signals can coexist on a single strand of glass without interfering with one another.
Provider A put their DWDM equipment on strand 1. Provider B put their own equipment on strand 42. They both slice their light into 96 channels and sell you a wavelength.
You buy circuits from both and assume you have redundancy. But the physics of failure remain the same.
If a backhoe cuts the main trunk every single strand and every single wavelength inside it dies instantly.
Sales reps will then try to upsell you on "Protected WDM" services.
They promise sub 50 millisecond failover. If the primary light path fails the hardware automatically switches to a backup path. Sounds great right?
Let me translate that for you.
Protected WDM is like buying spanning tree for optical networks. It is an expensive logical band aid for a physical problem.
I prefer to rely on entirely different paths. Or better yet different providers. That is the only way you get true physical diversity and actual usable links.
Unprotected WDM on truly diverse geographical paths beats Protected WDM in a single shared trench every single time.
The Three Deadly Pinch Points
True redundancy requires that two or more connections follow geographically separated routes that absolutely do not intersect. But civil engineering ensures telecommunications networks are rarely pristine parallel lines.
Even if your routes traverse opposite sides of a city for twenty miles, a single shared convergence point invalidates the entire strategy. Watch out for these three traps:
1. Bridge Attachments:
When an optical network must cross a major river or highway, subterranean trenching frequently becomes financially unviable. Departments of Transportation often force all telecom providers into a single shared utility tray suspended beneath the bridge deck. Diverse routes from multiple vendors are forced to collapse into a single highly vulnerable corridor.
2. The Last 100 Feet:
The most common failure of physical diversity occurs right at your front door. Telecommunications infrastructure enters a building at the Minimum Point of Entry (MPOE). Secondary carriers will take the path of least resistance and simply pull their fiber through the existing pipe that houses your primary cable. You must force them to enter from a completely different cardinal direction.
3. The Meet-Me Room Paradox:
If an enterprise colocation facility relies on a single Meet-Me Room (MMR), every external carrier connection must converge in one physical room. Elite modern data centers are engineered with intentional diversity, implementing dual, physically separated MMRs.
Catastrophic Proof
The risk of paper diversity is not a theoretical exercise:
- Baltimore Howard Street Tunnel Fire (2001): Network architects for major carriers routed diverse, redundant cables along opposite walls of the exact same rail tunnel. A chemical inferno melted the conduits on both sides simultaneously.
- California Fiber Vandalism (2015): A vandal bypassed security and severed high-capacity cables belonging to competing backbone providers (Level 3 and Zayo). The physical cables for all of those competing networks were bundled in the exact same underground vault.
- Dallas FAA Outage (2025): Air traffic controllers lost all critical radar data when a local construction crew cut two fiber optic cables. The providers had failed to audit physical separation, putting both the primary and secondary pathways in the exact same physical underground corridor.
The KMZ Mandate and Vendor Security Theater
You must demand empirical geographical proof of physical path separation. This validation is achieved through auditing KMZ files. These files map the exact physical coordinates of carrier infrastructure.
Vendors will aggressively fight this request. They will claim it poses a severe physical security risk or violates CPNI like regulations.
This is corporate security theater.
Telecom providers share this exact same physical routing data daily with municipal permit offices local construction firms and automated dig databases. If a random contractor needs to lay a water pipe the telecom provider maps it out for them.
But when a paying enterprise customer asks for it to secure a critical contract suddenly it is a national security threat.
Here is why they actually hide the data:
- Competitive Intelligence: It reveals their strategic footprint and build out costs.
- Legal Liability: Carrier GIS records are often appallingly inaccurate.
- Exposing the Illusion: The mapping data forces carriers to admit that their proprietary redundant backbone is actually just a leased IRU riding on a competitor glass.
This is why we draw a hard line in the sand.
If a provider cannot share a KMZ file we simply do not do business with them.
We know this is sensitive data. But we are running a sensitive business where trust is not enough and verify is mandatory.
The Auditing Framework
Do not trust marketing brochures. Follow this process before signing any fiber contract:
- Establish the Baseline: Request the specific KMZ file mapping the exact fiber route from your carriers.
- Solicit Under NDA: Competing carriers must provide their proposed KMZ routes prior to finalizing any contract.
- Geospatial Overlay: Import the KMZ files into Google Earth Pro or a comparable GIS suite.
- Hunt for Pinch Points: Trace the lines to identify any shared pathways, bridge crossings, railway intersections, and building entry points.
- Assess PoP Diversity: Trace the fiber back to the carrier Point of Presence (PoP) to ensure circuits are physically separated at the core.
Trust is a liability. Geospatial verification is the only guarantee of survival.
Stop buying fiber blind.