MPLS Networks

MPLS (otherwise known as Multiprotocol Label Switching) service offers businesses around the world with a centralized wide area network that can be controlled from the carrier core for enhanced security and performance. Using MPLS technology, businesses can communicate with all locations in a fully meshed network, instead of having different parts of the network communicate separately.


Software Defined Networking (SDN)

By application and by destination, this software can make intelligent routing decisions.  Thus, if you have traffic destined for Office 365, it will decide if the cable or the 4G path is best, based on who has the best peering and who is the closest. Voice and video can be prioritized whether is outgoing or incoming.  You can create a quality of service policy on both sides giving you end to end performance control that you would expect.


Ethernet WAN

A wide area network (WAN) is a computer network that spans across great distances typically a region or country. They can be used to transmit data to connect separate network structures together. WAN’s can connect local area networks through physical circuits or through the packet switching as a virtual connection.



VPLS (Virtual Private LAN Service) is a layer 2 solution where routing is a function owned and managed by the customer.  In a VPLS, the local area network (LAN) at each site is extended to the edge of the provider network. The provider network then emulates a switch or bridge to connect all of the customer LANs to create a single bridged LAN.  VPLS is a way to provide Ethernet-based multipoint to multipoint communication over IP or MPLS networks.


Point to Point Networks

Point-to-Point Networks are mainly used for two locations that need to securely send sensitive or confidential data between each location.  Its high performance it provides is due to the low latency of the network. For confidentiality purposes, this service doesn’t require the data traffic to be routed over the public internet, which is where many breaches in security can happen.