Private Use of Public Networks for Enterprise Customers

Total Page:16

File Type:pdf, Size:1020Kb

Private Use of Public Networks for Enterprise Customers 3 Com Technical Papers ® Private Use of Public Networks for Enterprise Customers New Standards-Based Virtual Private Networks Offer Cost Savings and Business Opportunities Private Use of Public Networks for Enterprise Customers New Standards-Based Virtual Private Networks Offer Cost Savings and Business Opportunities Contents Why Enterprises Need VPNs 2 What Is a VPN? 2 VPN Benefits 3 Cost Savings 3 Easy Scalability 4 Support for Ad-Hoc Business Relationships 4 Full Control 4 Enterprise VPN Applications 4 Global Internet Access 5 Dial Access Outsourcing 8 Virtual Leased Lines for Branch Office Connectivity 9 How VPNs Work 11 VPN Protocols 12 VPN Security 12 Microsoft Point-to-Point Encryption (MPPE) 12 Secure IP (IPsec) 13 Tunnel Switching: Improved Security and More Flexible VPN Applications 16 VPN Management 17 3Com VPN Solutions 17 3Com Solutions for Enterprises 17 Conclusion 18 1 Private Use of Public Networks for At the same time, IT must support grow- Enterprise Customers ing branch office connectivity. Particularly in organizations growing through acquisition or New Standards-Based Virtual Private Networks merger, the ability to rapidly integrate separate Offer Cost Savings and Business Opportunities and frequently incompatible infrastructures can be critical to the success of business relation- ships. In addition, there is the emerging Acronyms and Virtual private networks (VPNs) offer cost- requirement to deploy extranets that support Abbreviations effective solutions to some of today’s most crit- ical networking challenges. Enterprises need a unpredictable relationships with customers and AAL more affordable, scalable way to meet the business partners. IT also has to cope with the ATM adaptation layer demands of a growing community of remote plethora of management and security issues CHAP users and to manage branch office connectiv- these connections entail. Challenge Handshake ity. They need to be able to accommodate the Virtual private networks (VPNs) offer Authentication Protocol pace and unpredictability of business by link- solutions to these dilemmas. They provide IPsec ing customers and partners into extranets on enterprises with a number of ways to achieve Secure IP an ad-hoc basis. And they need to be able to substantial and immediate remote access and branch connectivity cost reductions by taking ISAKMP provide all of this access to networked Internet Security Association resources, including legacy systems and advantage of the networking infrastructures Key Management Protocol enterprise protocols, without compromising and services of Internet service providers (ISPs) and other network service providers ISDN security. Integrated Services Digital The benefits of VPNs include the opportu- (NSPs). VPNs offer a cost-effective, scalable, Network nity to save 50 percent or more in the cost of flexible, manageable, and secure means of handling network growth, of linking in newly ISP remote access and branch office connectivity. Internet service provider VPNs also offer tremendously increased strate- acquired business units, and of supporting ad- gic flexibility, which can lead to additional hoc business relationships. Companies can get L2F all these benefits while retaining central con- Layer 2 Forwarding cost savings and potentially important business advantages. trol over security and management of adds, L2TP This paper describes how VPNs cut costs moves, and changes. Layer 2 Tunneling Protocol and increase strategic flexibility. It describes Enterprises deploying VPNs will have an MPPE and diagrams some of the most popular VPN increasing range of VPN-based services to Microsoft Point-to-Point 2 applications. It explains the underlying chose from. Infonetics Research predicts that Encryption tunneling technology, including system compo- the VPN market will grow at more than 100 NSP nents and industry standards for tunneling and percent per year through 2001, when it will network service provider tunnel-based security. It introduces tunnel reach nearly $12 billion. They report that 92 POP switching and the advantages it offers for percent of large ISPs and 60 percent of all ISPs point of presence increased enterprise network security, more plan to offer value-added VPN services by PPP flexible access to network resources behind mid-1998. Point-to-Point Protocol firewalls, and more flexible service-level han- What Is a VPN? PPTP dling of tunneled traffic. The paper closes by Point-to-Point Tunneling discussing 3Com VPN solutions and their A VPN is a connection that has the appearance Protocol advantages. and many of the advantages of a dedicated link but occurs over a shared network. Using a Why Enterprises Need VPNs technique called “tunneling,” data packets are Industry analysts predict that by 1999, 80 per- transmitted across a public routed network, cent of corporate workers will have at least one mobile computing device.1 IT organizations 1. “Internet Remote Access,” Network Strategy everywhere are struggling to meet this balloon- Service, The Forrester Report, vol. 10, no. 8, July 1996. ing demand for remote connectivity and to deal with the resulting increases in network com- 2. “Virtual Private Networks,” Infonetics Research, plexity and end-user support costs. 1997. 2 such as the Internet or other commercially translation, VPNs can provide for data encryp- available network, in a private “tunnel” that tion, authentication, and authorization. simulates a point-to-point connection. This Tunneling devices perform these functions by approach enables network traffic from many communicating with security servers. Such sources to travel via separate tunnels across the servers also usually provide information on same infrastructure. It allows network proto- bandwidth, tunnel end points, and, in some cols to traverse incompatible infrastructures. It cases, network policy information and service Acronyms and also enables traffic from many sources to be levels. Abbreviations differentiated, so that it can be directed to spe- VPN capabilities can be added to existing cific destinations and receive specific levels of networking equipment through a software or PSTN service. board-level upgrade. Once installed, the capa- public switched telephone network The basic components of a tunnel are: bility can be used for multiple VPN applica- • A tunnel initiator (TI) tions, each delivering substantial cost and/or QoS • A routed network revenue benefits. Quality of Service • An optional tunnel switch RADIUS • One or more tunnel terminators (TT) VPN Benefits Remote Authorization Dial-In Tunnel initiation and termination can be User Service performed by a variety of network devices and Cost Savings SMDS software (Figure 1). A tunnel could be started, VPNs offer cost savings in the areas of com- Switched Multimegabit Data for example, by an end user’s laptop equipped munications charges, remote user support, and Service with an analog PC modem card and VPN- equipment. TI enabled dial-up software (basic tunneling and • Communications costs (leased line tariffs, tunnel initiator long-distance charges). Connecting two security capabilities are bundled into Windows TT 95 and Windows NT 4.0). It could also be computers over long distances using the tunnel terminator started by a VPN-enabled extranet router on an Internet can yield substantial savings over today’s dedicated leased lines and Frame VLAN enterprise branch or home office LAN, or by a virtual LAN VPN-enabled access concentrator at a network Relay networks. The Internet is also less expensive than long-distance direct modem VLL service provider point of presence (POP). A virtual leased line tunnel could be ended by a tunnel terminator or ISDN calls. VPNs are money-savers or switch on an enterprise network or by a VPN because they enable remote users to make VPN virtual private network gateway on an NSP’s network extranet router. local calls to an ISP, which are then tunneled In addition, there will usually be one or to a VPN device on the destination network. VTP more security servers. Along with the conven- Virtual Tunneling Protocol tional application of firewalls and address xDSL digital subscriber line Tunnel terminator Tunnel Tunnel initiator Tunnel termination device or tunnel switch on enterprise network Shared routed VPN gateway Access concentrator network at an NSP POP on NSP network Extranet router on a branch LAN Dial-up software on an end user laptop Figure 1. VPN Components 3 Users have the same experience as if they capacity and reach of their network simply by had dialed directly into the network—typi- setting up an account with a new NSP or cally at half the cost of the most economical expanding their agreement with an existing 800 number. provider. In addition, installing VPN capabili- Branch offices can use VPNs to replace ties in remote offices is typically a simple task dedicated leased lines to company headquar- that does not require a technical specialist on ters or to other branches. The branch LAN is site. A few simple commands should configure connected to a business class NSP, which an extranet router for both Internet and VPN tunnels traffic from LAN users over the connectivity, and workstations can get their Internet or over its own network backbone to configuration automatically from the router. a LAN in another part of the user’s enter- Easy scalability allows agile responses to prise. Branch users are still able to access the organizational change and market demands. A corporate network in the usual way, and the company completing an
Recommended publications
  • Leased-Line Replacement
    Leased-Line REPLACEMENT Utilizing gigabit wireless links to provide fiber-like performance at significant savings compared to leased lines. WHITE PAPER Leased-Line Replacement T1 (1.5 Mbps) line is not enough capacity to handle the need, four T1s When considering high-bandwidth connections between locations, the are ordered from the telco at a monthly rate of $500 each ($2,000 per thinking used to be that the only way to get service was to pick up the month). This twelve month commitment also requires a startup fee of phone, call the Local Exchange Carrier (LEC) and order a circuit. As long $1,000 to cover equipment and provisioning of the circuits. This amounts as the startup costs and monthly recurring charges were within the IT to $25,000 for the one year lease to provide a 6 Mbps connection budget, and the IT manager and business administrators were content between the corporate headquarters and the satellite office. with the level of service provided, writing a monthly check to the LEC was not a problem. If troubles were encountered with the service, a In the second scenario, a DS3 leased line is used to connect a school’s phone call to the provider was all that was necessary to resolve the LAN to the district office backbone three miles away. Services such as problem. voice, data, Internet access, and classroom video are transported over the circuit. To establish service, the local carrier requires a startup fee Businesses relying on leased lines find a wide range of performance of $3,000 that covers the cost of edge devices, as well as installation options tailored to suit their needs, from T1/E1 (1.5/2 Mbps), multiple and commissioning.
    [Show full text]
  • Digital Subscriber Lines and Cable Modems Digital Subscriber Lines and Cable Modems
    Digital Subscriber Lines and Cable Modems Digital Subscriber Lines and Cable Modems Paul Sabatino, [email protected] This paper details the impact of new advances in residential broadband networking, including ADSL, HDSL, VDSL, RADSL, cable modems. History as well as future trends of these technologies are also addressed. OtherReports on Recent Advances in Networking Back to Raj Jain's Home Page Table of Contents ● 1. Introduction ● 2. DSL Technologies ❍ 2.1 ADSL ■ 2.1.1 Competing Standards ■ 2.1.2 Trends ❍ 2.2 HDSL ❍ 2.3 SDSL ❍ 2.4 VDSL ❍ 2.5 RADSL ❍ 2.6 DSL Comparison Chart ● 3. Cable Modems ❍ 3.1 IEEE 802.14 ❍ 3.2 Model of Operation ● 4. Future Trends ❍ 4.1 Current Trials ● 5. Summary ● 6. Glossary ● 7. References http://www.cis.ohio-state.edu/~jain/cis788-97/rbb/index.htm (1 of 14) [2/7/2000 10:59:54 AM] Digital Subscriber Lines and Cable Modems 1. Introduction The widespread use of the Internet and especially the World Wide Web have opened up a need for high bandwidth network services that can be brought directly to subscriber's homes. These services would provide the needed bandwidth to surf the web at lightning fast speeds and allow new technologies such as video conferencing and video on demand. Currently, Digital Subscriber Line (DSL) and Cable modem technologies look to be the most cost effective and practical methods of delivering broadband network services to the masses. <-- Back to Table of Contents 2. DSL Technologies Digital Subscriber Line A Digital Subscriber Line makes use of the current copper infrastructure to supply broadband services.
    [Show full text]
  • Glossary of Communications Terms for Relay Engineers
    Glossary of Communications Terms For Relay Engineers A Working Group Report from the H14 WG Of the H – Relaying Communications Subcommittee May 2008 Participants Roger Ray, Chairman Ray Young, Vice Chairman Marc Benou Oscar Bolado Jim Huddelston Stan Klein Ken Martin John Miller Tim Phillippe Mark Simon Mal Swanson Disclaimer This document has been prepared in order to give the Protective Relay Engineer an insight and understanding of communication terms that they may encounter in their work. It is not meant to be a substitute for or replace the IEEE Dictionary. Glossary of Communications Terms For Relay Engineers AAL - ATM Adaptation Layer The standards layer that allows multiple applications to have data converted to and from the ATM cell. A protocol used that translates higher layer services into the size and format of an ATM cell. ACCUNET Switched 56 An AT&T digital service providing switched (dialup) digital service at 56 Kbps. ACCUNET T1.5 An AT&T tariffed data oriented digital service that provides leased end-to-end customer premises terminated T-1 links. ACCUNET T1.5 Reserved A disaster recovery service whereby a switched 1.544 Mbps link is available between COs and is activated when AT&T is notified of the T-1 link failure. ACCUNET T45 An AT&T tariffed service that provides 45 Mbps, DS3 service which can carry 28 T-1 connections (672 voice channels). ACD - Automatic Call Distributor A telephone facility that manages incoming calls and handles them based on the number called and an associated database of handling instructions. ADPCM - Adaptive Differential Pulse Code Modulation A speech coding method which uses fewer bits than the traditional PCM (Pulse Code Modulation).
    [Show full text]
  • Guide to Leased Lines
    Guide to Leased Lines 1 WHAT IS A LEASED LINE? The term ‘leased line’ refers to a dedicated connection that allows communication between two sites (a point‐to‐point leased line) or between a site and the Internet (an internet leased line). Leased lines typically deliver bandwidth over a leased fibre connection, although copper local tails can sometimes be used as well. Leased lines are considered a premium connectivity product because unlike various broadband services leased lines are dedicated, uncontended data lines with symmetrical bandwidth speeds. With dedicated lines, users can get higher speeds of service and a higher service level guarantee. 2 WHAT ARE THE BENEFITS OF A LEASED LINE? More bandwidth – leased lines can deliver between 2Mbit/s to 1,000Mbit/s of connectivity to most UK businesses, and up to 10Gbit/s in some urban locations. Consistent speeds – your bandwidth is reserved exclusively for your use, so you can experience a consistently high data throughput at all times – even during peak usage periods. Fast upload speeds – leased lines are symmetrical, meaning you get the same high speed upstream as you get ownstream. This is ideal for VoIP, terminal services, online data backup, video conferencing, server hosting and the sending of large files. Unlimited data transfer – you can use your connection flat out, all the time. You can do whatever you like with it (subject to the law). There are no extra charges if you go over some arbitrary monthly usage quota. No‐one’s going to slow down your connection if you exceed an unspecified ‘fair usage’ limit.
    [Show full text]
  • Wide Area Network
    Wide area network A wide area network (WAN) is a telecommunications network or computer network that extends over a large geographical distance. Wide area networks are often established with leased telecommunication circuits.[1] Business, education and government entities use wide area networks to relay data to staff, students, clients, buyers, and suppliers from various locations across the world. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet may be considered a WAN.[2] Related terms for other types of networks are personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs) which are usually limited to a room, building, campus or specific metropolitan area respectively. Contents Design options Connection technology List of WAN types See also References External links Design options The textbook definition of a WAN is a computer network spanning regions, countries, or even the world.[3] However, in terms of the application of computer networking protocols and concepts, it may be best to view WANs as computer networking technologies used to transmit data over long distances, and between different LANs, MANs and other localised computer networking architectures. This distinction stems from the fact that common LAN technologies operating at lower layers of the OSI model (such as the forms of Ethernet or Wi-Fi) are often designed for physically proximal networks, and thus cannot transmit data over tens, hundreds or even thousands of miles or kilometres. WANs do not just necessarily connect physically disparate LANs. A CAN, for example, may have a localized backbone of a WAN technology, which connects different LANs within a campus.
    [Show full text]
  • Understanding Wide Area Networks
    Understanding Wide Area Networks Module 7 Objectives Skills/Concepts Objective Domain Objective Domain Description Number Understanding routing Understanding routers 2.2 Defining common WAN Understanding wide area 1.3 technologies and networks (wan’s) connections Routing • Routing is the process of managing the flow of data between network segments and between hosts or routers • Data is sent along a path according to the IP networks and individual IP addresses of the hosts • A router is a network device that maintains tables of information about other routers on the network or internetwork Static and Dynamic Routing • A static route is a path that is manually configured and remains constant throughout the router’s operation • A dynamic route is a path that is generated dynamically by using special routing protocols Static Dynamic Dynamic Routing • Dynamic routing method has two conceptual parts: • Routing protocol used to convey information about the network environment • Routing Algorithm that determines paths through the network • Common Dynamic routing protocols: • Distance vector routing protocols: Advertise the number of hops to a network destination (distance) and the direction a packet can reach a network destination (vector). Sends updates at regularly scheduled intervals, and can take time for route changes to be updated • Link state routing protocols: Provide updates only when a network link changes state • Distance Vector Routing • Routing Information Protocol (RIP) • Link State Routing • Open Shortest Path First (OSPF) Interior
    [Show full text]
  • The Internet Development Process: Observations and Reflections
    The Internet Development Process: Observations and Reflections Pål Spilling University Graduate Center (UNIK), Kjeller, Norway [email protected] Abstract. Based on the experience of being part of the team that developed the internet, the author will look back and provide a history of the Norwegian participation. The author will attempt to answer a number of questions such as why was The Norwegian Defense Research Establishment (FFI) invited to participate in the development process, what did Norway contribute to in the project, and what did Norway benefit from its participation? Keywords: ARPANET, DARPA, Ethernet, Internet, PRNET. 1 A Short Historical Résumé The development of the internet went through two main phases. The first one laid the foundation for packet switching in a single network called ARPANET. The main idea behind the development of ARPANET was resource sharing [1]. At that time computers, software, and communication lines were very expensive, meaning that these resources had to be shared among as many users as possible. The development started at the end of 1968. The U.S. Defense Advanced Research Project Agency (DARPA) funded and directed it in a national project. It became operational in 1970; in a few years, it spanned the U.S. from west to east with one arm westward to Hawaii and one arm eastward to Kjeller, Norway, and then onwards to London. The next phase, the “internet project,” started in the latter half of 1974 [2]. The purpose of the project was to develop technologies to interconnect networks based on different communication principles, enabling end-to-end communications between computers connected to different networks.
    [Show full text]
  • Original Page 2
    PUERTO RICO TELEPHONE COMPANY, INC. Local Tariff Fifth Revision - Page F-7-1 Canceling Fourth Revision - Page F-7-1 ADDITIONAL SERVICES TARIFF SCHEDULE (Cont.) SECTION 7 – LEASED LINE SERVICE 7.1 General Leased Line Service provides the necessary facilities to enable the customer and authorized users to communicate between specified locations. (T) 7.1.1 The connections provided under the Leased Line Service can be either analog or (M,T) digital. Analog connections are differentiated by spectrum and bandwidth. Digital | connections are differentiated by bit rates. | | 7.1.2 Following is a brief description of each type of Leased Line Service: | | A. Metallic – a channel for the transmission of low speed varying signals at | rates up to 30 baud. | | B. Telegraph Grade – a channel for the transmission of binary signals at rates | of 0 to 75 baud or 0 to 150 baud. | | C. Voice Grade – a channel for the transmission of analog signals within an | approximate bandwidth of 300 to 3000 Hz. | | D. Program Audio – a channel for the transmission of audio signals. The | nominal frequency bandwidths are from 200 to 3500 Hz, from 100 to 5000 | Hz, from 50 to 8000 Hz, or from 50 to 15000 Hz. | | E. Digital Data – a channel for the digital transmission of synchronous serial | data rates of 2.4, 4.8, 9.6, 19.2, 56.0 or 64.0 Kbps. | | F. High Capacity – a channel for the transmission of synchronous serial digital | data at rates of 1.544, 6.312 or 44.736 Mbps. (M,T) (E) 7.2 Regulations 7.2.1 Leased Line Service is furnished subject to the availability of facilities and is provided over facilities elected by the Company.
    [Show full text]
  • NXU-2 Roip Link to Eliminate Voice-Grade Leased Line
    Application Note: AN-3001-2 NXU-2 RoIP Link to Eliminate Voice-Grade Leased Line Purpose This Application Note will describe a method at which NXU-2 Network Extension Units can be utilized on an existing digital network to eliminate costly Voice-Grade Leased Lines. Introduction Voice-Grade Leased Lines are regularly used in public safety land-mobile radios systems as dedicated baseband communication links between two remote points. Leased-Lines are also known as: Tie Lines, Wireline, Dedicated Line, Private Line, and Bell 3002, to name a few. This symmetric telecommunications link, consisting of a 2-Wire or 4-Wire path, can tie a dispatch console to a basestation, for example, or provide connectivity between radios or drop repeaters separated by many miles. Unlike dialup voice-grade switched-circuit PSTN telephone lines, these leased lines provide 24-hour, full-period connectivity, and reliability by detouring traditional switch- circuits at the telephone central office (CO). The following example is a typical leased-line dedicated link between a dispatch console and a remote basestation. Leased-Line Link Leased Lines Dispatch Basestation Console Depending upon the service provider the end-user can expect a virtual point-to-point link that encompass microwave, copper, optical fiber, and even satellite links. In any case, whichever methods are used to facilitate this reliable connection, the link is transparent to the end-user. Bell 3002 is a common provision for voice-grade leased-lines in public safety communications systems. Some of the specifications are as follows: 2-Wire or 4-Wire 600 Ω Impedance Audio Profile: 300- to 3000-Hz Frequency Shift: ±5 Hz Control: Tone Only, no DC Control due to lack of hard wire Raytheon Company JPS Communications 5800 Departure Drive Raleigh, NC 27616 919.790.1011 © Raytheon.Data is subject to change.
    [Show full text]
  • Proxim Wireless for Governments and Municipalities
    Proxim Wireless for Governments and Municipalities Municipalities and Governments demand secure, reliable and cost-effective solutions that can scale easily to connect various departments such as public works, fire and police departments etc. Typically, governments have been using leased line solutions, which involve connecting distant offices with copper or fiber. The Internet Service Provider charges the customer (governments) on a recurring basis, along with one time installation and deployment charges. As one might guess, these solutions result in high OPex and CAPex budgets. For over 30 years, Proxim’s line of outdoor point to point and multipoint solutions have provided secure, scalable, robust and high capacity solutions for governments all across the globe. Proxim Tsunami® radios are capable of operating in a wide range of frequencies with solutions from 25 Mbps to 600 Mbps +real world throughput. Proxim also provides indoor and outdoor WiFi for increased collaboration between teams inside offices and field and first responder teams. Proxim Enables a Wide Variety of Government Applications 1 Replace Leased Line Connections 2 Indoor and Outdoor WiFi 3 Video Surveillance © Proxim Wireless. All rights reserved. 1 Proxim Wireless Solutions Replace Leased Line Connections Proxim helps rapidly deploy cost-effective network solutions that come at a fraction of the traditional leased line costs. There are no recurring costs involved and Proxim’s solutions come at relatively low capital costs. In addition, wireless solutions are immune to cable cuts that are an inherent risk when deploying wirelines based solutions; making wireless networks a perfect solution for primary or secondary backup connectivity needs. Indoor and Outdoor WiFi Proxim’s ORiNOCO® product line features outdoor and indoor high speed WiFi Access Points capable of delivering speeds of up to 1750 Mbps.
    [Show full text]
  • DSL White Paper
    Allied Telesis | White Paper DSL White Paper Executive Summary Most mid-level home and small office computers are capable of more than 1GHz processing and are only seriously hampered when they log into a dial-up Internet connection. A Digital Subscriber Line (DSL) is a type of broadband connection that takes advantage of the existing telephone cables to enable high-speed data transmissions to and from a customer’s premises. There are a number of different types of DSL, which have been designed to suit a range of customer requirements. This white paper contains the following sections: A.What is DSL? Provides an overview of the technology and a description of the main types of DSL in use today. B. Focus on ADSL Focuses on Asymmetric DSL, providing details on how this technology works. C. How does Allied Telesis Support DSL? Outlines how Allied Telesis provides DSL support for their customers. Allied Telesis www.alliedtelesis.com DSL White Paper Contents A.WHAT IS DSL? 3 Introduction 3 What is DSL? 4 How does DSL work? 4 What are the benefits of DSL? 5 What are the variants of DSL? 5 Symmetric DSL 6 High data rate Digital Subscriber Line (HDSL) 6 Single line Digital Subscriber Line (SDSL) 6 Symmetric High bit rate Digital Subscriber Line (SHDSL) 6 Asymmetric DSL 7 Asymmetric Digital Subscriber Line (ADSL) 7 G.lite or Asymmetric Digital Subscriber Line Lite (ADSL lite) 7 Asymmetric Digital Subscriber Line 2 (ADSL2) 7 Asymmetric Digital Subscriber Line 2+ (ADSL2+) 7 Asymmetric Digital Subscriber Line 2++ (ADSL2++ or ADSL4) 7 Both Symmetric and Asymmetric DSL 8 Very high bit rate Digital Subscriber Line (VDSL) 8 Comparison of DSL Types 9 B.
    [Show full text]
  • Outstanding Reliability from the Ultimate Internet Connection Btnet
    Outstanding reliability from the ultimate internet connection BTnet. Dedicated internet access. When internet connectivity is the cornerstone of your business, nothing less than a 100% availability SLA and scorching speeds up to 10Gbps will do. Because it’s a dedicated line, you don’t share BTnet with anyone else. That means guaranteed bandwidth, 24/7, unlimited data usage, and no restrictions. With BTnet, you’ll always have access to your critical data, voice, video, and applications. Eight reasons why BTnet is the ultimate internet connection 1. Ridiculously reliable 5. We’re where you are BTnet is your connection. You don’t share it with We’ve got the best geographic network coverage in anyone else. And that means you get speed and the UK as an end-to-end service provider. And with a bandwidth you can rely on, all the time. No busy range of connectivity options at our disposal, we can periods, no variable line quality, just a totally reliable get you set up wherever you are. and predictable service, backed up by a market-leading 100% availability SLA (Service Level Agreement). 6. If something’s wrong, we’ll fix it fast In the rare event that anything goes wrong, our 2. Massive capacity, scorching speed UK-based support team has your back. We’ll go all You get the same upload speed as you do for out to get you back up and running within five hours: download, with a choice of speeds from 2Mbps to day, night, or weekend. 10Gbps. Because it’s truly unlimited, you can use it as much as you want: no caps, restrictions, traffic 7.
    [Show full text]