Crown Castle
Communications infrastructure solutions
Optical Encryption
Optical Encryption uses revolutionary technology to offer Federal Information Processing Standards (FIPS)-certified encryption of your in-flight data from end-point to end-point. Easy-to-implement solution offers maximum protection and throughput and optimizes latency by encrypting all of your in-flight data at the optical level—regardless of where it’s generated.
Bandwidth options & handoff protocols
- 10Gbps: 10 GigE, FC800, FC1200, OC-192, OC-192c
- Encryption over Wavelength
Encryption over Managed Private Optical Network
- 10Gbps: 10 GigE, FC800, FC1200, OC-192, OC-192c
- 40Gbps: 40 GigE, OC-768
- 100Gbps: 100 GigE
Protocols protected
- Optical Encryption is protocol agnostic, encrypting all payload data, at all packet and frame sizes, at full line rate. The service protects all major transport protocols, including Ethernet, IP, SONET, Fiber Channel, Video Transport and OTN.
Availability
- Availability specs are based on the design of the network delivering the encryption service. Options are available for route diversity with failover to ensure the highest availability possible.
Ethernet
Ethernet solutions combine the reliability and ubiquity of Carrier Ethernet with next-generation metro area transport technology. The result is an efficient, fully restorable network that’s easy to manage and ready for any vertical or application requirement.
- 24/7 network monitoring
- MEF Carrier Ethernet 2.0, MEF 9 and MEF 14 certified technology
- 802.1Q VLAN and 802.1 QinQ tunneling supported
- Standards-based IEEE Ethernet service for Layer 2 transport
- Dedicated access links with multiple protection options
- Switched and dedicated bandwidth configurations
- Speeds from 10Mbps to 100Gbps
Wavelength
Wavelengths are an ideal solution to support data center backup and recovery, cloud services, university research and development, electronic trading and more.
- MPON: Fully managed, custom-designed fiber solution with private fiber and dedicated WDM equipment.
- Availability: Both metro and long-haul networks.
- Optional optical protection on diverse routes: Switch between active and back-up paths to limit the impact of network events.
- Optional route diversity: Implement service on multiple routes to further ensure the highest availability possible.
- Protocol independent: Open interfaces support all major transport protocols: Ethernet, IP, SONET, Fiber Channel, SAN, SD/HD-Video.
- Bandwidth: OTU 1-4 Fiber Channel, 1 GigE, 10 GigE, 40 GigE, 100 GigE, OC-x, 1Gbps to 100 Gbps.
Managed SD-WAN
Managed SD-WAN creates a virtual overlay network with application-aware routing, enabling you to connect your branches and multiple remote locations. It's a turnkey solution that offers software-based control to provide a highly secure, scalable and reliable virtual network.
- Automated template provisioning
- Same IP address failover
- Application visibility and control
- Application QoS and SLA
- Dynamic path selection
- Multiple WAN links (2+)
- Monitoring, reporting, analytics
Internet Access
Enterprise-class fiber optic Internet Access keeps New South Wales State Government connected to the outside world while supporting mission-critical applications. Perfect for businesses and organizations, our high-performance internet offering connects your locations efficiently and affordably.
Network features:
- Configuration of routing and primary/secondary DNS registration
- Connections to multiple Tier-1 peering points and data centers
- IPv6-compatible, dual stack connection capable
- Connectivity and performance verification
Colocation
A colocation data center is a physical facility that offers space with the proper power, cooling and security to host businesses' computing hardware and servers. This capacity includes anything from cabinets to cages or private suites.
Performance and reliability
- Carrier-grade high-bandwidth, low-latency connectivity.
Scalability
- The ability to add or modify colocation space based on your configuration requirements, with multiple connectivity options.
Strategically located
- 900+ strategically positioned data centers, PoPs, and COs to facilitate high-bandwidth connectivity to key business customers, including carrier hotels, data centers, and content providers.
Support
- A long-term data center operator with a proven track record and around-the-clock monitoring from our Network Operations Center.
Wireless Solutions
A reliable solution that’s important for the future.
Towers
- Cell towers are known for ushering in the modern mobile phone era, but they are also playing a large role in the future of networks. They are the most established type of communications infrastructure and are still the most reliable way to deliver critical wireless coverage. That includes voice and data signals, of course, but increasingly, wireless broadband, TV, radio signals, and more. Towers are also being used as centralized hubs to communicate with remote networks of transmitters, monitors, and other devices—giving them new importance for the future as the internet of things (IoT) technologies advance.
Small cells
- Small cells are discreet, fiber-connected antennas, usually located on existing structures like streetlights and utility poles. They work in conjunction with tower infrastructure to provide greater wireless coverage and capacity.
Dark Fiber
Dark Fiber is a high-capacity network solution for those who need unlimited bandwidth, complete service control, and total reliability. We offer a variety of connectivity options from individual strands of fiber to complex multi-site designs customized for you. For more than 25 years, we’ve built Dark Fiber networking solutions for customers across a wide variety of industries—working closely with them to meet their needs through our dense, nationwide fiber footprint.
Flexibility
- Design your network to support the configurations, services, and applications you need since you’ll light the network with your own equipment.
Security
- Get maximum security with private physical network infrastructure on your own dedicated strands of fiber.
Control
- Select the equipment that’s best suited for your applications while utilizing your in-house optical expertise to manage your network—it’s all under your control.
Cloud Connect
As organizations continue to move critical business functions to the cloud, your underlying network performance becomes absolutely crucial. With Cloud Connect, you get a fast, secure, and direct connection between your office, data center, or colocation environment and your cloud service provider—ensuring your cloud-based applications perform at their optimal levels.
Speed and performance
- Increased performance of all throughput, transactions, and applications conducted between business locations and your cloud services.
Flexibility
- Connections that are tailored to your needs, allow you to build applications that span on-premises infrastructure without compromising security or performance. The ability to connect to IBM/Softlayer and VMware data centers via our secure fiber network.
Security
- A direct path that protects against the risks associated with routing through a public internet connection—providing the most secure method to add high-performance computing, big data analytics and storage capacity.
DDoS Defense
Any organization conducting business over the internet is at risk of a Distributed Denial of Service (DDoS) attack. This type of attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming it with a flood of internet traffic from multiple sources. DDoS Defense uses best-in-class security technology to monitor your traffic, detect threats and alert key personnel to mitigate these disruptive and costly attacks before your business operations are impacted.
Business continuity
- A low latency scrubbing facility identifies and removes malicious traffic while allowing legitimate traffic to reach your network uninterrupted.
Monitoring
- Traffic monitoring and attack detection centers are staffed by security experts who proactively monitor traffic around the clock. Mission-critical systems are protected through the identification of anomalies and quick response to attacks.
Efficiency
- Expert support and security without the need to buy on-premise equipment or hire additional resources to mitigate DDoS attacks—keeping expenses to a minimum.