Data leased line is a data transmission service that uses optical fiber, digital microwave, and open circuits, and uses a digital transmission channel to transmit digital signals. It can provide point-to-point and point-to-multipoint transparent transmission of data leased circuits for users to transmit data, images, Information such as voice provides circuit transmission services with a variety of rates from 2Mbps to 2.5Gbps, and is generally used in intra-enterprise intranet networking.
Data lines can be divided into local data lines, long-distance lines, and international long-distance lines according to geographical areas.
According to the line type, there are DDN, Frame Relay (FR), ATM, SDH, MSTP, Ethernet dedicated line, MPLS-VPN, etc.
MPLS-VPN refers to the use of MPLS (Multi-Protocol Label Switching) technology to build an enterprise IP private network on the backbone broadband IP network to achieve cross-regional, safe, high-speed, reliable data, voice, and image multi-service communication . According to the network structure, there are star network, mesh network and multi-layer network; according to the use of layer 2 or layer 3 technology, there are frame relay based on layer 2 technology, ATM VPN and IP VPN based on layer 3
Private line VPN line, this "special" is mainly reflected in the dedicated IP, after connecting to the VPN, the export IP obtained is unique. VPN is Virtual Private Network (Virtual Private Network, VPN for short) refers to the technology of establishing a private network on a public network. The reason why it is called a virtual network is mainly because the connection between any two nodes of the entire VPN network does not have the end-to-end physical link required by the traditional private network, but is built on the network provided by the public network service provider. Platforms, such as the logical network on the Internet, ATM (Asynchronous Transfer Mode), Frame Relay (Frame Relay), etc. User data is transmitted in logical links. It covers encapsulation, encryption, and identity across shared or public networks To verify the expansion of the linked private network. VPN mainly uses tunneling technology, encryption and decryption technology, key management technology and user and device identity authentication technology.