As a computer network specialist for many years, the Network Engineering team has acquired significant experience allowing to propose the best technical choices for all deployment and development projects in information communication.
Our independence from any manufacturer, our long experience and our flexibility allow us to provide you with advice or a specific solution that will exactly answer your request.
Thanks to its know-how, this team of highly qualified Network and System engineers offers its services to companies in any environments in which they operate.
Network audit and new projects
The IT network is increasingly faced with new challenges such as bandwidth demand, security, mobility, availability, quality of service, unified communications, or monitoring and management. In this context, Multitel proposes a set of services in order to make the best use of the existing network, to improve or secure it and to deploy new applications.
Wi-Fi Networks and site surveys
In any implementation of a Wi-Fi network, Multitel brings you its expertise, independent of any manufacturer, to identify your needs and to provide the most appropriate answers: site survey, (pre)deployment, audit and training.
Wi-Fi networks integrate standardized, inter-operable (Wi-Fi Alliance) methods and powerful encryption solutions. The deployment of these WLAN networks is constantly evolving despite the congestion of the ISM frequency band at 2.4 GHz (IEEE 802.11b/g/n). Products and standards operating at 5 GHz (IEEE 802.11a/n/ac) for example are available to overcome this constraint and offer higher throughput.
Deployment and migration to IPv6
Multitel will accompany you in the various stages of any deployment or migration to IPv6. Indeed, the announced end of IPv4 addresses does not only concern Internet service providers (ISPs) but also has an impact on any organization, SME or other. Thus, as part of its activities, everyone should consider using IPv6, not only in the computer network (LAN and Internet) to access content in v6 but also in its various products, developments and services, in order to be ready and compatible with the new services related to IPv6.
GNU/Linux services and application deployment
Multi-user and multitasking, the GNU/Linux operating system provides an ideal environment for application development and optimization of an IT infrastructure or network. Many free software (FOSS) can also be deployed on these systems to enable IT managers to manage their network and their IT assets efficiently. Faced with the increasing use of Linux and free software in the industrial world, Multitel offers a range of services related to the design and deployment of solutions based on these GNU/Linux components and especially around Red Hat distribution.
LPWAN (Low-Power Wide-Area Network) networks
In addition to conventional wireless transmissions such as Wi-Fi or 3G / 4G / 5G, Multitel is also analysing low-power wireless links (LPWANs), increasingly used in the Internet of Things (IoT) or in Wireless Sensor Network (WSN) sensor networks. Multitel studies performance and monitors new developments in these networks (LoRa,Sigfox …), especially in the context of its Smart Cities projects where such sensors are particularly needed.
Dimensioning and analysis of IP telephony, VoIP and VoWi-Fi solutions
In any VoIP project, Multitel can bring you its expertise, independently of any manufacturer:
- Sizing of the computer network (LAN, Wi-Fi) for voice support
- Securing existing or future VoIP installations
- Performance analysis of the VoIP / VoWi-Fi infrastructure
- Network Certification
- Tests and pre-deployment
- Drafting of specifications and analysis of offers
In addition to the classic aspects of Cybersecurity (consultancy and training), Multitel focuses specifically on the security of very low-speed transmissions of LPWAN networks (used, among other things, in Smart Cities or Industry 4.0 applications.
The encryption of such communications must rely on cryptographic tools that must be selected and implemented according to the needs and limitations (in particular in terms of available computing resources, additional overhead on the network, etc.). In order to secure their communications.
Special attention is therefore paid to verify the suitability of the proposed solutions to the needs (low throughput, low power consumption) as well as to the distinction between the various operations of reciprocal authentication of the equipment, integrity check, signature and encryption information.