top of page

Network Management Policy

Plainview Telephone Company (“We”, “Our”, “Us”) provides this Network Management Policy (“Policy”) in accordance with Federal Communications Commission (“FCC”) requirements to disclose certain network management practices, performance characteristics, and commercial terms.

Network Practices

We engage in network management practices that are tailored and appropriate for achieving optimization on our network considering the particular network architecture and technology of our broadband Internet access service. Our goal is to ensure that all our customers experience a safe and secure broadband Internet environment that is fast, reliable, and affordable. We want our customers to experience all the Internet offers, whether it is social networking, streaming videos, listening to music, or communicating through e-mail and videoconferencing.

 

Our network practices include congestion- and security-protocol-management. Such protocols and practices generally will not affect our customers’ user experience. We manage our network using various tools and industry-standard techniques to ensure fast, secure, and reliable Internet service.

 

  1. Blocking: We do not block or discriminate against lawful Internet content, applications, services, or non-harmful devices. We conduct only reasonable network management.

  2. Throttling: We do not throttle, impair, or degrade lawful Internet traffic based on content, application, service, user, or use of a non-harmful device. We engage only in reasonable network management practices.

  3. Affiliated Prioritization: We do not favor any Internet traffic over others, including through the use of techniques such as traffic shaping, prioritization, or resource reservation, to benefit an affiliate, and we have no plans to do so.

  4. Paid Prioritization: We do not favor or prioritize any Internet traffic over others, and we do not prioritize Internet websites over others in exchange for any consideration to benefit any content, applications, services, or devices.

 

Network Management Practices

 

Our network management practices are intended to ensure that we provide our customers with the best possible Internet access. We do not inspect traffic for any purposes other than to keep track at the network level of where traffic flows, thereby ensuring that the network is adequate for the demands of customers. To achieve this goal, we employ network management techniques such as identifying spam and preventing its delivery to customer e-mail accounts, detecting malicious Internet traffic, and preventing the distribution of, or inadvertent access to, malware, phishing, viruses, or other harmful code or content.

 

1. Congestion Management

 

Our Internet network is a shared network, consistent with industry standards. This means customers share upstream and downstream bandwidth. The goal of our congestion management practices is to enable better network availability and speeds for all our customers by:

 

  • Adapting and upgrading our network to maintain or improve network performance as demand for our Internet service increases.

  • Adapting and upgrading our network to maintain or improve network performance as demand for higher bandwidth applications increases.

  • Identifying potential bandwidth abuses.

 

Because our Internet service network is a shared network, periods of high network demand may result in Internet traffic congestion. Our network monitoring practices are continually conducted, and adjustments are made accordingly to provide our customers with the best possible experience. Congestion tends to occur during periods of peak demand for higher bandwidth applications. Generally, the frequency of congestion tends to increase from 7 pm to 11 pm, especially on Friday and Saturday nights and holidays.

 

Our network and congestion management practices do not discriminate based on the type of application being used, nor are they based on any particular customer’s aggregate monthly data usage. We examine only current network conditions, not our customers’ online activities. We also check for abnormal traffic flows, network security breaches, malware, loss, and damage to the network. If a breach is detected or high-volume users are brought to light by complaint, we provide notification to the customer via e-mail or phone.

 

If we take any congestion management actions, the vast majority of our customers’ Internet activities will be unaffected. Some customers may, however, experience more extended download or upload times or slower surf speeds.

 

2. Application-Specific Behavior

 

Except as may be provided elsewhere herein, we do not engage in any application-specific network management activities on our network. We do not inhibit or favor applications or classes of applications over our High-Speed Internet/broadband data network. All traffic is treated in a “protocol-agnostic” manner, which means management is not based on applications and is also content neutral. We do not block or rate-control specific protocols or protocol ports, modify protocol fields, or otherwise inhibit or favor certain applications or classes of applications.

 

3. Customer provided equipment

 

For any questions regarding the types of devices allowed or required, customers should contact customerservice@plvwtelco.net. While there are no formal approval procedures to get a specific device approved for connection to the network, all devices must be UL certified and carry the FCC Part 64 certification.

 

4. Security

 

We know the importance of securing our network and customers from network threats and annoyances. As normal practice, we do not block protocols, content, or traffic for network management, but we may block or limit traffic such as spam, viruses, malware, or denial-ofservice attacks to protect network integrity and the security of our customers.

 

We use the following practices to ensure end-user security and network security:

 

  • Employ S-Flow –This protocol attaches an identifier for all traffic on the network. SFlow captures the source and destination of all traffic, allowing us to engineer and troubleshoot the network properly.

  • Implement DDOS mitigation software which blocks malicious attacks that intend to disrupt service from the internet to our network.

  • Utilize Anti-Spoof software, which is intended to identify and isolate one user’s hardware from impersonating another user’s hardware.

  • Utilize the industry practice of blacklisting and blocking access from other Internet service provider networks that are spreading malicious software.

  • Utilize these protocols and practices to protect and secure our customer data and network for the benefit of all customers. These protocols allow us to comply with federal CALEA (Communications Assistance for Law Enforcement Act, 1994) and other Law Enforcement requirements.

 

These tools and practices may change from time to time to keep up with changing network technologies and new and innovative ways our customers use the network.

 

We continually monitor our network. In the event of a security breach, an alarm would trigger. We will react to the network intrusion and will refer to Law Enforcement Agencies as needed.

 

Customer conduct that abuses or threatens our network or violates our Acceptable Use Policy, Subscriber Agreement, or other policies will be asked to stop immediately. If a customer fails to respond or cease such conduct, we may suspend or terminate that customer’s service.

 

Additionally, Users are prohibited from violating or attempting to violate our security, including, without limitation, (a) accessing data not intended for such User or logging into a server or account which such User is not authorized to access, (b) attempting to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without proper authorization, (c) attempting to interfere with, disrupt or disable service to any user, host or network, including, without limitation, via means of overloading, flooding, mail bombing or crashing, (d) forging any packet header or any part of the header information in any E-mail or newsgroup posting, or (e) taking any action in order to obtain services to which such User is not entitled. Violations of system or network security may result in civil or criminal liability. We may investigate occurrences that may involve such violations, and we may involve and cooperate with law enforcement authorities in prosecuting Users who are alleged to be involved in such violations.

 

Performance Characteristics

 

1. Service Description

 

Our Internet service products enable residential and commercial customers to access all lawful content, applications, and services of their choice available on the Internet. We offer Internet service over fixed Fiber-to-the-Home (“FTTH”) or Wireless service. Information about our different service offerings can be found at Nyecom.net.

 

All of our Internet services can support typical real-time applications, including messaging, voice applications, video chat applications, gaming, and Internet video. If users or developers have questions about real-time applications, please contact us at (402)582-4242.

 

2. Network Performance

 

We offer customers a variety of Internet service levels/speeds. Each service level is described with the expected maximum transfer speeds associated with it. We test our network routinely to address any issues concerning network congestion. Our goal is to provide the customer with the speeds to which they have subscribed.

 

The speeds we identify for each Internet access service level/speed are the maximum upload and download speeds that customers could experience. We provide and engineer our network to deliver the speeds to which customers subscribe. However, we do not guarantee that a customer will achieve those speeds, as it is possible to experience slower speeds for a variety of factors. Such factors potentially affecting speed include customer equipment, premises wiring, network equipment, congestion in our network, congestion beyond our network, performance issues with an Internet application, content, or service, and more.

 

Latency is another measurement of Internet performance. Latency is the time delay in transmitting or receiving packets on a network. Latency is primarily a function of the distance between two points of transmission but can also be affected by the quality of the network or networks used in transmission. Latency is typically measured in milliseconds and generally has no significant impact on typical everyday Internet usage. As latency varies based on any number of factors, most importantly the distance between a customer’s computer and the ultimate Internet destination (as well as the number and variety of networks your packets cross), it is not possible to provide customers with a single figure that will define latency as part of a user experience.

 

Each customer’s actual speed experienced will be based on the service level/speed subscribed to and the factors described above.

bottom of page