Important Security Alert

Learn what to watch out for

III. Network Management

NCTC utilizes a redundant network architecture that is designed to provide users with true broadband speeds and reliability even during times of peak demand. The network has been constructed to meet projected traffic demands and is fully scalable to allow for capacity to be added to meet customer needs and to support newly developing and increasingly sophisticated applications well into the future. However, congestion can occur on any IP network, and, when it does, packets can be delayed or dropped, leading to service degradation and delays. Because network resources are shared by all end users, NCTC has implemented a traffic management policy that is designed to ensure that all users are able to utilize their fair share of network resources during periods of high demand.

Prioritization of packets can be used for other purposes as well, such as to ensure the reliability of applications that demand real time or near real time communications such as public safety communications and, in the context of mobile data services, E-911 communications. Generally, provisioned data speeds for [ISP’s] mass market services are sufficient to support such applications as Voice over IP (VoIP), gaming, web surfing, or most streaming video. However, because [ISP’s] residential, mass market broadband service generally does not prioritize such traffic, it is possible that certain applications requiring real time communications may perform at less than optimal levels, especially during periods of peak network demand.

NCTC does take measures to protect its network and ensure that its AUP is enforced. For example, NCTC has deployed measures to prevent spam, viruses, and other malware and to monitor and prevent denial of service attacks using MagicSpam by LinuxMagic. NCTC does not generally interfere with or manage the use of specific protocols or ports. However, in the interests of network security, the following ports may be blocked or unavailable:

PortTransportProtocolIn/OutboundReason for BlockWireline/Fiber
135139TCP/UDPNetBiosBothNetBios services allow file sharing over networks. When improperly configured, they can expose critical system files or give full file system access (run, delete, copy) to any malicious intruder connected to the network.Yes
445TCP/UDPMS-DS, SMBBothSecurity risks; vulnerable to attacks/exploits/worms such as the Sasser and Nimda worms.Yes

NCTC provides fixed data services.

With respect to fixed broadband services, users may generally attach the devices of their choice and run the applications of their choice, subject to the limitations of their data plan and the terms of their service agreement and AUP. While many devices such as routers, Bluetooth and WiFi cards, laptops, notebooks and tablets are readily available from third party sources, such as consumer electronics retailers, other devices, such as DSL modems, proprietary network gateways must be provided by or leased from NCTC. NCTC is not responsible for the compatibility, suitability or functionality of any equipment that is provided by the customer or any third party, and the customer remains fully responsible for ensuring that any such equipment does not cause any harm to the network or degrade the service of other users.

All users are fully responsible for securing their equipment, including wireless routers, to prevent unauthorized access to the network by third parties and will be held fully responsible for the actions of such third parties that gain unauthorized access to the network through unsecured end user equipment.