Congestion Management. LOGAN COUNTY GIG currently offers different levels of Residential and Business Broadband Access differentiated by downstream and upstream data rates. LOGAN COUNTY GIG does not adjust or manage an individual end user’s use of their capacity, but the actual use by an end user can affect the user experience. Downstream refers to the information coming to you from the network and upstream refers to the information going from you to the network. End user experience can be negatively impacted when the end user attempts to run too many tasks simultaneously or by running individual tasks that utilize 100% of the end user’s upstream capacity. For example, uploading large files to cloud-based back up servers may occupy 100% of the end user’s upstream capacity. This could preclude the end user from running other network-related tasks while the file is uploading.
The LOGAN COUNTY GIG network, as a whole, is shared among its users and has a set capacity for downstream and upstream communication. While LOGAN COUNTY GIG will not manage an individual end user’s capacity, LOGAN COUNTY GIG may take action to manage the capacity of the entire network or part of the network if an end user’s actions unreasonably impact the ability of others to use the network. For example, LOGAN COUNTY GIG may employ reasonable network management practices to protect against security or denial of service attacks that can negatively affect our network and may cause service degradation. End users can minimize the possibility of these problems by maintaining an up-to-date anti-virus program on their computer and following common sense practices like avoiding unsolicited attachments from unknown parties.
LOGAN COUNTY GIG wants all end users and edge providers to be able to use the network for all legal purposes at all times. Toward this end, LOGAN COUNTY GIG employs reasonable network management practices to ensure that no single application uses more than 35% of total network capacity. This practice is employed to avoid a single application from overwhelming the network and rendering some end users unable to use the application of their choice or reach the edge provider of their choice. If/when a single application exceeds 35% of total network capacity LOGAN COUNTY GIG monitors that application and may restrict the bandwidth, so as not to overwhelm the network.
Usage Limits. LOGAN COUNTY GIG reserves the right to manage network usage to ensure that the activities of a small number of customers do not degrade, inhibit or interfere with the use of our network. The goal is to ensure that all users have reasonable access to the network at all times. LOGAN COUNTY GIG does not currently enforce specific limitations on the amount of Internet data utilized by its customers through data caps or usage-based billing.
Application Specific Behavior. LOGAN COUNTY GIG does not discriminate against or prevent users of its broadband Internet access service from accessing lawful content or services; running lawful applications and services of their choice; or connecting their choice of legal devices, so long as such applications, services and/or devices do not harm the network or the provision of broadband Internet access service, facilitate theft of service, or harm users of the service. Moreover, LOGAN COUNTY GIG does not impair or degrade specific content, applications, services or non-harmful devices so as to render them effectively unusable, subject to any reasonable network management practices described herein.
LOGAN COUNTY GIG reserves the right to employ reasonable network management practices to prevent specific harmful or illegal activity, such as the dissemination of viruses or other malicious code or the transfer of child pornography or other unlawful content.
Device Attachment Rules. LOGAN COUNTY Gig provides the customer with an Optical Network Terminal equipped with a minimum of one IEEE standards based Ethernet port as part of the service. LOGAN COUNTY Gig may provide an IEEE standard based Residential or Business Gateway/Router with or without WiFi as part of the service during introductory promotional periods. As technology changes, LOGAN COUNTY Gig reserves the right to update their list of approved models and require the customer to replace a previously-approved models that is no longer compatible.
Security. LOGAN COUNTY GIG employs certain practices to ensure the security of our customers and our right to protect our network. These include practices intended to protect LOGAN COUNTY GIG servers against Denial of Service attacks and to prevent harmful elements such as viruses, spam and identity theft.
To that end, LOGAN COUNTY GIG blocks a limited number of ports that are commonly used to send spam, perpetrate identity theft or launch attacks on the network.
Port & Reason
- tcp/udp 135: Viruses
- udp 402: Unsafe Compaq Client
- udp 427: Unsafe Service Discovery
- tcp/udp 445: Win 2k File Sharing
- tcp/udp 548: MacOS File Sharing
- udp 1900: Unsafe Universal PnP
- tcp 3127: MyDoom Worm
- tcp 4444: Blaster Worm
- udp 9009: Unsafe LDAP
- udp 12345: Common Trojan Port
- tcp/udp 27374: Sub7 Trojan
- udp 31337: Back Orifice Trojan
- udp netbios-ns: Viruses
- udp netbios-dgm: Viruses
- udp netbios-ss: Viruses
- tcp 25(smtp): Viruses/Spam Relays
- icmp echo: Viruses/Hacking Exposure
- tcp 80 (www): Unsafe WWW Port/Viruses
- udp 5351: Shadowserver
- udp 161: SNMP
- udp 389 (LDAP)