Network Management

Bruce Street Technologies 

As the Internet continues to mature, there continues to be a rapid growth of Internet traffic and an ever-increasing demand for service .  All providers must find ways to effectively and efficiently manage this growth so that all customers receive fair access to any service or application while ensuring that no customer's use of any service or application negatively affects or impairs the overall network operation.  Obviously, it would be preferable to just add more capacity for end-users but it is especially difficult to do this in rural communities, where access to advanced services and faster gateway connections are limited or non-existent.  A common method of managing traffic is through the use of Internet Traffic Management Protocols (ITMP's).  ITMP's search for, and restrict transmission of, certain data types at specific times or according to other usage criteria.  Bruce Street Technologies Limited, and their backbone/wholesale providers, do not employ any ITMP's within the network.  As aggregate usage increases, we continue to expand the capacity of our network in a timely fashion.    

As of September 15, 2010 (November 1, 2010 for existing customers) Bruce Street Technologies Limited (BST Limited) began adopting an economic model for managing Internet use.  As individual usage increases, the fees for using the network increase.  This way, users may modify their on-line activities to match the fees they are willing to pay.  This type of system encourages conservation and therefore lessens the overall burden on the network providing a more enjoyable on-line experience for everyone. 

Bruce Street Technologies Limited continues to make significant investments in the network and is committed to providing quality services at competitive prices while operating within the technical framework and limitations imposed by the serving area.

How do you monitor the network traffic?

BST Limited uses devices located at the various Internet gateways on the network that monitor bytes transferred and record them by IP address.  Every user on the network has a unique IP and MAC address assigned to the wireless device mounted at their location.  Log files generated by the gateways are automatically enumerated by the system daily and the data stored on a secure server.  This data is then available to each specific user in order for them to know and track their data usage.  Only usage data by IP address is enumerated and stored and no personal information is contained within these reports.  BST Limited does not proactively monitor content or customer activities. 

What is "Mail relay via Port 25"?  Why is this not allowed? 

Across the Internet, mail servers communicate with each other and deliver email over TCP/IP port 25.  By default, this is also the port that email clients such as Outlook, Outlook Express, Thunderbird, Windows Mail, etc use to send mail as well.  Spammers and viruses/malware programs exploit this fact and therefore attempt to find vulnerable email servers and computers through which they can relay the email they want to send.  In this manner, it would appear that the sender is the compromised machine not that of the actual sender.  In an effort to eliminate this activity, Internet providers usually modify their network in two ways.  First, they authenticate the user sending the email.  This may be by requiring a user to provide a username and password or they may restrict the sending of email through their network to only those who are connected to their network (users@mydomain.com can send mail on the mydomain.com network but not on the yourdomain.com network) .  Another method is to only accept email on a non-standard port on their mail server and then have the mail server deliver it to its destination over the standard port 25.  The end result is that without some sort of authentication method or advanced mail server configuration, traffic and users (legitimate or otherwise) are restricted from sending email.  Due to the ever increasing options for free email accounts, BST Limited does not provide customer email accounts or operate an email server on its wireless network.  Therefore, we do not provide an email gateway for sending mail.  Users must contact their email provider for instructions and support for their email application and setup. 

Accessing your email through a web browser ("Web Mail") does not require the use of port 25 and is not affected by the above.

Is this a shared Internet access service?

At no time are you able to "see" data belonging to another user like you would in a telephone party line.  If you have more than one Internet enabled device at your location, there is another level of sharing as those devices vie for a share of what is available at your specific location.  Therefore, your online activities and usage may negatively affect your own household and the activities of your neighbours and their activities may affect your online experience.  Traditional Internet traffic is "bursty" meaning that there is a short, high demand for data while a page gets loaded then no traffic while it is being read.  With the increasing popularity of P2P and streaming video applications, there is a constant demand and use of the network leaving less bandwidth available for the "bursts" with the overall effect of the network "feeling slow".

Can you do this?

BST Limited has an obligation to provide the highest level of service possible to all customers.  In order to do this, we operate within the framework set out in our Internet Access Service agreement, our Acceptable Use and Customer Privacy Policies and the relevant guidelines, directives and legislation as may be established from time to time by the CRTC or Industry Canada.  Through the proper application of network management procedures, we can manage customer demand and customer expectations while preserving network integrity.