Feeds

Faulty network switched closed Melbourne tunnels

Traffic storm begat traffic chaos

  • alert
  • submit to reddit

Seven Steps to Software Security

Private road operator Transurban says a faulty network switch was to blame for a computer fault that crippled Melbourne’s traffic network early in October.

The 12-hour shutdown of two key tunnels in Melbourne, the Burnley and Domain tunnels, caused 20 km worth of gridlock. At the time, the company blamed a computer glitch.

The company has now released (PDF) the results of its investigation into the incident, blaming a network switch failure. Without naming the vendor involved, Transurban says the faulty switch caused a broadcast storm, and that the parallel backup switch failed to “operate as designed on the day”.

“Our investigation has identified a network switch failure that caused a broadcast storm. A broadcast storm creates countless transmissions, which, in the case of CityLink, utilised all the available computer capacity within the IT network. This rendered our tunnel safety systems, among others, ineffective,” CEO Scott Charlton says in the company’s statement.

The hardware failure at 4.30 am shut down the company’s safety systems, and at 5.30 am, the company decided to close the tunnels. The affected safety systems include emergency response, radio transmission systems, signage, smoke exhaust and water deluge.

Transurban has issued a statement saying that it identified the failed switch on the day of the incident, and has emphasised that its investigation “has not identified any external interference with the IT network”.

The company has brought forward a systems upgrade scheduled for 2014 and including the replacement of its network switches, to commence immediately. ®

Boost IT visibility and business value

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.