{"id":35566,"date":"2017-08-09T11:42:08","date_gmt":"2017-08-09T09:42:08","guid":{"rendered":"https:\/\/www.hiig.de\/?p=35566\/"},"modified":"2023-03-28T17:21:08","modified_gmt":"2023-03-28T15:21:08","slug":"the-secrets-of-de-peering","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/","title":{"rendered":"The secrets of de-peering"},"content":{"rendered":"<p><em>Handbooks, conferences, best practice documents \u2013 there are many resources to turn to in order to learn about Internet peering. But when it comes to de-peering, networkers are mostly left with their gut feeling.<\/em><\/p>\n<p>There is no \u201cBeginner\u2019s guide to de-peering\u201d, no \u201cDe-peering 101\u201d, no manual \u201cHow to de-peer respectfully in five easy steps\u201d. This absence of guidance exists for several reasons. The most obvious being that it appears counter-intuitive to busy oneself with de-peering and cutting down transmission capacity between networks when traffic levels on the Internet have kept going up and to the right since its inception.<br \/>\nAnd indeed, the network engineers I have spoken to for my PhD confirm that de-peering is not common. However, when it does happen, it is instructive to look at; by way of the arguments networkers use to justify or assess de-peering, they offer a rare glimpse into the networking industry and the manufacturing of connectivity. It becomes explicit what are accepted conventions and where there run lines of conflict. For instance, it may come as a surprise for some that not every de-peering indicates a dispute; and conversely, despite press coverage not every \u201cpeering war\u201d even implies de-peering.<\/p>\n<p>Ordinary dictionaries do not (yet) include peering or de-peering, so let\u2019s clarify the vocabulary. Networkers may want to skip this paragraph. Peering refers to a specific type of interconnection arrangement between network operators. On a technical level, to peer means to interconnect two Internet networks (autonomous systems in technical parlance) and exchange traffic that belongs to each other\u2019s customers \u2013 be they end users or other networks. (So peering offers limited reachability, which is a key difference between peering and so-called transit. In transit, one network offers the other to transmit data to and from any endpoint on the Internet for money.) Economically, the dominant understanding of peering was for the longest time that did not involve the exchange of money between the parties who peered. It was settlement free. More recently though, so-called paid peering has surfaced as a variation. In that case one network operator pays for her customers to reach the other network\u2019s customers directly. To de-peer then means to terminate a peering relationship and disconnect the networks.<\/p>\n<h3>Where networkers agree about de-peering<\/h3>\n<p>While de-peering always leads to loss of Internet connectivity between networks, it does not always cause a conflict between the networkers involved. In fact, there is a widely accepted rationale for de-peering among networkers: an industrial way of thinking. This rationale prioritizes functionality and efficiency. In the eyes of the colleagues, a networker may legitimately shut down a peering session when his network receives malicious traffic (such as a DDOS attack) from its neighbors, when it is sent incorrect route announcements, when it disconnects from an Internet exchange point all together, when it merges with another network or, when it experiences congestion due to a peer not providing the throughput capacity that had been promised. Networkers widely agree that protecting a network\u2019s functionality and performance has priority over any other criteria for assessing Internet interconnection. In the words of one interviewee: \u201cSomeone spamming my network is a damn good reason to de-peer. Is that a net neutrality issue? Of course not. It is an Internet peering issue.\u201d Often times, networkers re-establish peerings after such issues have been resolved, sometimes automatically.<\/p>\n<h3>When de-peering becomes contentious<\/h3>\n<p>De-peering becomes a contentious issue only when rationales about connectivity clash. (For those interested: I am thinking along the lines of the concept of the \u201corders of worth\u201d by French sociologists Th\u00e9venot and Boltanski.) These rationales include 1. a domestic rationale, which emphasizes personal relations, reputation and trust; 2. a market rationale where the legitimate criterion for evaluation is the price and legitimate leadership equates to purchasing power and 3. a civic rationale that demands to root decision-making about interconnection in collective interest and aims for solidarity and equality. All of these notions come to the fore in conflicts about de-peering.<\/p>\n<p>Let\u2019s look at them one by one.<\/p>\n<p>Personal relationships between networkers go way beyond peering (a topic for another article), but they surely accompany most peering relationships that are perceived as important by one of the parties. Some of these extend over long time. So de-peering can be emotional. One interviewee recalls a de-peering notice, \u201cwhich was a copy of the email I had sent him in my previous job, just with the names changed.\u201d Similarly, others say: \u201cDe-peering is often quite a sensitive matter\u201d, \u201cit is sometimes taken personally\u201d, \u201cusually, the counterpart is upset\u201d. \u201cThis is not just about the hard facts of interconnecting, it is also about wounded pride.\u201d \u2013 And on the other side of the de-peering: \u201cMy answer was: F**k you!\u201d<\/p>\n<p>One networker even described how he chose to execute a number of de-peerings by withdrawing from an Internet exchange point all together \u2013 just so to create the impression for everybody that the de-peering was impartial. He then took selected peers over to a private interconnection at another place.<\/p>\n<p>It is important to note though, that not one of the networkers I have interviewed questioned that the principles of a market economy should apply to Internet interconnection, including the liberty to strive for profits, to peer freely just as long as there is mutual interest and to engage in competition. In fact, networkers commonly contain and solve conflicts within the market rationale without it even becoming public. For instance, they will clearly shut down a connection with a network that starts peering with one\u2019s customer networks (and thereby lowers one\u2019s profits) or, they will likely de-peer a network that enters into direct competition.<\/p>\n<p>However, several networkers experience discomfort with an absolutism of the market rationale, which as a side effect, also puts pressure on what many think of as a community. The discomfort often becomes apparent in a specific situation: when a network seeks payment for a peering relationship that had previously been settlement free. Several interviewees have found themselves in such situations, on both sides. These cases are interesting, because it becomes a philosophical question whether settlement-free peering even constitutes a market relation at all. Peering does not cost the parties anything beyond connecting their networks to an Internet exchange. But when a peering is gone, it is costly to replace. In this sense, peering is quite open to definition.<\/p>\n<p>Now, depending on how it is communicated, asking for money for something that was free before can lead to a showdown between networkers. There are three ways for this situation to evolve. In the first, networkers accept to read the conflict as a power play in the market. Then, a de-peering announcement will eventually lead to re-establishing the session under commercial conditions, where one of the parties becomes a seller and the other one becomes a buyer:<\/p>\n<blockquote><p>\u201cWhen folk walk away, the other party kind of goes: \u2018Well, you know, I could chase them. But if I chased them, I would be a customer.\u2019 So if you and I are peering and you cut the wire, if it\u2019s a true peering relationship I would go: \u2018Well, I don\u2019t care.\u2019 But if I really needed that peering, and you cut the wire, I\u2019m a customer. Logically, I\u2019m more reliant on you than you\u2019re reliant on me. You demonstrated that by cutting the wire.\u201d<\/p><\/blockquote>\n<p>As the news travels, the paid-peering course of events reinforces the legitimacy of a market convention for others, too. The second option is for the network that was de-peered to accept the loss of connectivity, thereby keeping the definition of roles open.<\/p>\n<h3>Changing the benchmark of legitimacy<\/h3>\n<p>The third option involves a challenge: The network that was de-peered takes the position that it is not justifiable to apply a pure market mode of evaluation to this situation. It demands re-evaluation according to another rationale that it claims to be more legitimate. This is the civic rationale. We often see it when incumbent internet service providers are involved in a conflict in which they are accused of abuse of power.<\/p>\n<p>The argument goes that it is not in the collective interest to let the market solve the conflict alone and that the incumbent must treat all interested peers equally and fairly. The civic rationale translates to a formalisation of rules and eventually to public intervention. In 2012, a Swiss Internet service provider was invited to change his settlement free peering connection with the incumbent into a paid peering for traffic levels that exceeded a ratio of 1:2 (i.e., when it would send more traffic into the incumbent\u2019s network). The operator took the conflict to the Federal Competition Commission, arguing among other things that ratio-based price discrimination is at odds with the recent evolution of the Internet towards caching content at the edges of the network. The case was intermittently suspended when the incumbent became subject of a related preliminary anti-trust investigation with a third network, but has just recently been resumed.<\/p>\n<p>What this example shows though, is that peering practices can only be challenged fundamentally by making conflicts known and take them to a higher level in the public sphere. Publicity is what forces the parties to justify their actions and make them accessible to a broader evaluation. However, even the most insightful networkers warn against side-effects of \u201cwell-meant\u201d interconnection regulation. That is why calling upon the regulator more often remains a threat than that it is actually done.<\/p>\n<h3>Congestion is the new de-peering<\/h3>\n<p>With this in mind, two more recent developments may not come as a surprise:<\/p>\n<ol>\n<li>Peering policies are on the rise. Especially sought after Internet service providers document the criteria that another network has to fulfil to qualify for peering. This serves them in two ways: Vis \u00e0 vis the regulator, the peering policies allow them to argue that they will treat every peering partner equal. And vis \u00e0 vis potential peers, peering policies signal an impersonal decision process. In the meantime, every peering policy probably has a clause that allows the network to make business decisions, i.e., exceptions.<\/li>\n<li>Congestion is the new de-peering. Representatives from the largest networks were probably the first ones to realise that \u201cde-peering between Tier 1 networks is practically impossible\u201d. It would create a fragmented Internet and a public uproar would be guaranteed. But even with other legacy peerings \u201cit is easier to let things live on forever than create a fuss about it or potentially have a fuss created about it,\u201d so \u201cwe do not de-peer,\u201d says this Tier 1 networker. Or, as another interviewee put it provocatively:<br \/>\n<blockquote><p>\u201cIf I am a carrier, then it is better for me to not make any statement or decision that looks like an action. [&#8230;] Because if I make an action that looks like I am forcing an upgrade or forcing a network to pay, then that is potentially an area that particularly socially is kind of negative, and potentially from a regulatory viewpoint. [&#8230;] So it is better for me to appear incompetent rather than actively seeking to extract a rent. So if I do not upgrade, if I have very little contact with a company, all I have to do is wait.\u201d<\/p><\/blockquote>\n<p>Learning from bad experiences with regard to their reputation in the community, networkers who see the need to de-peer for commercial reasons may chose a softer tone to avoid open conflicts. This is actually in line with what most networkers wish for anyway in de-peering: personal communication, empathy, timely notice, appropriate grace periods that allow the de-peered networkers to transfer their traffic gracefully. What they also wish for is honesty and clarity, though, and no de-peering in disguise. In light of both regulatory threats and the fact that it is the uncertainties where market opportunities reside, the latter may be wishful thinking for the time being.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td>Dieser Beitrag spiegelt die Meinung des Autors und weder notwendigerweise noch ausschlie\u00dflich die Meinung des Institutes wider. F\u00fcr mehr Informationen zu den Inhalten dieser Beitr\u00e4ge und den assoziierten Forschungsprojekten kontaktieren Sie bitte info@hiig.de.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fthe-secrets-of-de-peering%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=The%20secrets%20of%20de-peering https%3A%2F%2Fwww.hiig.de%2Fen%2Fthe-secrets-of-de-peering%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fthe-secrets-of-de-peering%2F&subject=The%20secrets%20of%20de-peering\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>Handbooks, conferences, best practice documents \u2013 there are many resources to turn to in order to learn about Internet peering. But when it comes to de-peering, networkers are mostly left with their gut feeling. There is no \u201cBeginner\u2019s guide to de-peering\u201d, no \u201cDe-peering 101\u201d, no manual \u201cHow to de-peer respectfully in five easy steps\u201d. This&hellip;<\/p>\n","protected":false},"author":42,"featured_media":35570,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1579,224],"tags":[],"class_list":["post-35566","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ftif-plattformen-governance","category-policy-and-law"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The secrets of de-peering &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The secrets of de-peering &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"Handbooks, conferences, best practice documents \u2013 there are many resources to turn to in order to learn about Internet peering. But when it comes to de-peering, networkers are mostly left with their gut feeling. There is no \u201cBeginner\u2019s guide to de-peering\u201d, no \u201cDe-peering 101\u201d, no manual \u201cHow to de-peer respectfully in five easy steps\u201d. This&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-09T09:42:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-28T15:21:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/08\/randall-bruder-136626.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1598\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Uta Meier-Hahn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Uta Meier-Hahn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The secrets of de-peering &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/","og_locale":"en_US","og_type":"article","og_title":"The secrets of de-peering &#8211; Digital Society Blog","og_description":"Handbooks, conferences, best practice documents \u2013 there are many resources to turn to in order to learn about Internet peering. But when it comes to de-peering, networkers are mostly left with their gut feeling. There is no \u201cBeginner\u2019s guide to de-peering\u201d, no \u201cDe-peering 101\u201d, no manual \u201cHow to de-peer respectfully in five easy steps\u201d. This&hellip;","og_url":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/","og_site_name":"HIIG","article_published_time":"2017-08-09T09:42:08+00:00","article_modified_time":"2023-03-28T15:21:08+00:00","og_image":[{"width":1598,"height":900,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2017\/08\/randall-bruder-136626.jpg","type":"image\/jpeg"}],"author":"Uta Meier-Hahn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Uta Meier-Hahn","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/"},"author":{"name":"Uta Meier-Hahn","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/1dd5018d7a9fef3cacc6f193d89cf694"},"headline":"The secrets of de-peering","datePublished":"2017-08-09T09:42:08+00:00","dateModified":"2023-03-28T15:21:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/"},"wordCount":2006,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","articleSection":["Ftif Platform governance","Policy and Law"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/","url":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/","name":"The secrets of de-peering &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2017-08-09T09:42:08+00:00","dateModified":"2023-03-28T15:21:08+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":1598,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/the-secrets-of-de-peering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"The secrets of de-peering"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/1dd5018d7a9fef3cacc6f193d89cf694","name":"Uta Meier-Hahn","sameAs":["https:\/\/www.hiig.de\/staff\/uta-meier-hahn-3\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/35566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=35566"}],"version-history":[{"count":5,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/35566\/revisions"}],"predecessor-version":[{"id":35586,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/35566\/revisions\/35586"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/35570"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=35566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=35566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=35566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}