Subscribe to CIO Magazine »

ACCC seeks comment on 'pull through' activities for the NBN

NBN Co or its contractors will undertake any pull through activities.

The Australian Competition and Consumer Commission is seeking comment on Telstra's migration plan [PDF] for ‘pull through’ activities for the National Broadband Network (NBN).

The discussion paper relates to the ‘pull through’ process which will use existing copper or HFC lines to pull fibre through conduits to connect some premises to the NBN.

This process will result in existing telco services being temporarily cut, with Telstra required to seek permission from its wholesale customers to pull through lines which they are providing services over and also to notify wholesale customers if the process is not successful.

NBN Co or its contractors will undertake any pull through activities.

“These processes may have important implications for the ability of wholesale customers to minimise disruption to the supply of communication services to consumers,” the ACCC said in a statement.

Telstra filed a migration plan with the ACCC in August 2011 and lodged a draft response in October 2012 to required measures 2, 3, 4 and 6 that the ACCC was recently seeking comment on.

The ACCC was looking for public comment on four of the measures Telstra developed relating to the telco's NBN migration, including security measures around it receiving information from NBN Co’s to ensure it does not obtain an unfair advantage from information it receives from NBN Co.

Other measures in the discussion paper related to Telstra switching off its HFC and copper networks once an area is NBN-ready and situations where the telco will build copper paths to provide services which are not yet available on the NBN or do not have an NBN-comparable service.

Submissions for comment on pull activities close 1 February, 2012.

Follow Stephanie McDonald on Twitter: @stephmcdonald0

Follow Computerworld Australia on Twitter: @ComputerworldAU

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: Australian Competition and Consumer Commission (ACCC), pull through, National Broadband Network (NBN), Telstra
Latest Blog Posts
  • Siemens Redefines Efficiency with Pure Storage
    Challenges - Server consolidation stalled due to storage performance limits - IO-intensive Oracle database would not consolidate with other applications - Multiple instances of virtual applications plus the Oracle DB Results - Consolidated 30 servers to 5 - 23% increase in Oracle performance after virtualization - 6.7-to-1 data reduction - Provisioning time reduced by 4x - 2x increase in VMware snapshot release time
    Learn more »
  • The F5 DDoS Protection Reference Architecture part 1 of 3
    Distributed denial of service attacks (DDoS) attempt to make a machine or network resource unavailable to its intended users, with a wave of crippling attacks on enterprises since 2012. This whitepaper offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
    Learn more »
  • Using an Expert System for Deeper Vulnerability Scanning
    This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments