Home / Knowledge Hub / What is guides / What is Ethernet?

What is
Ethernet?

Ethernet is THE universal communications protocol commonly used for building Local and Wide Area Networks (LAN & WAN). Although it was commercially introduced more than 40 years ago, it is still the most widely adopted connectivity technology. Ethernet has evolved over time with improvements in speed, security, and quality to meet ever-changing network needs. From connecting computers within Local Area Networks to reaching Wide Area Networks, Ethernet continues to grow and is now becoming critical for the delivery of ubiquitous connectivity powered by mobile technology, cloud computing and big data.

Ethernet is used for business-critical network connections to data centers, corporate hubs, public and private clouds as well as backbone connectivity. It is especially favored by business verticals such as finance, health care, manufacturing, and other industry verticals where security and reliability are non-negotiable. Ethernet enables high speed connectivity and the efficient management of traffic growth, allowing business-critical networks to keep pace with explosive demand.

With well-established industry standards the configuration and adaptation of Ethernet is made easy. Different topologies support a variety of customer requirements:

Point-to-Point: provides a simple, point-to-point connection between two locations, with high security, low latency, and flexible bandwidth.

Hub & Spoke: simply explained, is a point-to-multipoint topology which is beneficial where a larger number of sites connect to a central head office, data center or cloud location.

Any-to-Any: based on the Virtual Private Network (VPN) concept, is ideal for connecting different business sites to support core interaction and communication services. Each location is simply connected to a common Ethernet VPL which facilitates secure any-to-any connectivity between all sites at Layer 2 allowing customers to manage their own BGP sessions.

The main advantages of Ethernet are:

  • High-speed private connectivity with low latency
  • Security and reliability – delivering high availability
  • Efficient management of traffic growth
  • Design flexibility for different topologies
  • A universal technology which is easy to adopt and implement
  • Comprehensive SLAs

Why Telia Carrier?

Our Ethernet solutions support demanding requirements from companies that need full network control and reliable connectivity to data centers, clouds, corporate hubs, or the Internet backbone.

Telia Carrier’s Ethernet solutions leverage our extensive, high-capacity Tier-1 global network and deliver guaranteed bandwidths from 10Mbps up to 10Gbps. Customers can take advantage of different topology options in compliance with MEF standards.

Our global network connects more than 320 PoPs in key connectivity hubs worldwide, the major Cloud providers and a network of over 450 certified local access partners.

Additionally, Telia Carrier provides exceptional customer care 24/7. Since 2014 we have been repeatedly recognized at the World Communications Awards for our Customer Experience and we have a high NPS score of 44 (2020).

Technical highlights

Ethernet Topology Telia Carrier Product MEF-defined services
EVPL

E-LINE - EVPL

E-LINE - EPL

ELAN

ELAN – EP-LAN

ELAN – EVP-LAN

 

 

 

Features
Ethernet over MPLS
High availability incl. end-to-end visibility with optional Network Interface Device (NID)
10Mbps – 10Gbps
Global reach with managed Network Interface Device (NID) in >120 countries
Multiple Services on One Point (MSOP)
Comprehensive SLAs and Ethernet CoS for traffic prioritization

Security highlights

Solid network security requires full traffic visibility. We offer various monitoring tools to check and maintain traffic performance.

Secure by design
Private connectivity – logically separated from any other traffic
Near real-time & historical bandwidth usage views
Network performance parameters, including latency in our MyCarrier portal
Dual NOCs situated in secure underground locations
Physical and logical security from design to deployment
Customer Service authentication procedures
Clear customer data handling policies
LOADING...
    LOADING...