Teksavvy Solutions Inc. ("Teksavvy") does not employ technical Internet traffic management practices ("ITMPs") to manage the use of bandwidth on its network. However, some underlying carriers from which TekSavvy must purchases high-speed access services in order to provide its high-speed Internet access services to its customers do employ ITMPs. In such cases, those underlying carriers' ITMPs are unavoidably flowed through to TekSavvy's high-speed Internet access services.
In order to find out which, if any, ITMPs apply to the services you obtain from TekSavvy, you must first identify the underlying carrier that provides the wholesale high-speed service that TekSavvy uses to provide its high-speed Internet access service to you. There is a simple way of doing this.
First, determine whether you obtain your high-speed Internet access service from TekSavvy using DSL technology (i.e., over a telephone line) or cable (i.e., over the type of cable used by a cable company to deliver its TV signals). If you obtain DSL service, then the underlying provider is the incumbent telephone company that provides telephone service in your neighbourhood (i.e., one of Bell Canada, Bell Aliant, Telus, SaskTel or MTS Allstream). If you obtain cable service, then the underlying provider is the cable company that provides cable TV service in your neighbourhood (i.e., one of Rogers, Cogeco, Shaw or Videotron).
Once you have identified the applicable underlying carrier, go to the section below related to that carrier for a description of the ITMPs, if any, applied by that carrier and flowed through to the high-speed Internet access service that TekSavvy provides to you.
BELL ALIANT – ATLANTIC PROVINCES:
BELL CANADA AND BELL ALIANT IN ONTARIO AND QUEBEC:
COGECO CABLE INC.:
ROGERS COMMUNICATIONS INC.:
Rogers Network Management Policy
Applicable to Rogers Hi-Speed Internet customers in Ontario, New Brunswick, and Newfoundland
On March 1, 2012, Rogers began phasing out the management of peer-to-peer (P2P) file sharing traffic on the upstream with a target completion date of December 31, 2012. This management involves slowing down P2P file sharing traffic on the upstream above 80 kpbs as more fully described below. For more details on which areas we no longer manage, please see www.rogers.com/traffic.
1. Why does Rogers manage traffic on its network?
Rogers is committed to ensuring the best possible online experience for all our valued customers. To meet this goal, Rogers uses a variety of traffic management techniques. These techniques have evolved as the internet has changed. We manage the network to limit spam, viruses and other security threats. In some areas, Rogers Hi-Speed Internet (delivered over cable) also manages peer-to-peer (P2P) file sharing traffic on the upstream. This management ensures a high level of service for time-sensitive tasks such as sending email, requesting web pages, video conferencing and voice services.
2. Which applications does Rogers manage?
In some areas, Rogers manages traffic associated with certain P2P file sharing protocols for customers of Rogers Hi-Speed Internet (delivered over cable). We use packet inspection to determine the type (but not the content) of upstream traffic only. High-volume, low time-sensitive traffic (such as P2P file sharing) is limited to ensure all customers have a high level of service for time-sensitive tasks like sending email, requesting web pages, video and voice applications. For Rogers Hi Speed Internet, the maximum upload speed for P2P file sharing traffic is 80 kbps at all times. There are no limits on download speed for any application or protocol.
Rogers does not use packet inspection for individual monitoring. We do not examine packet content, or use the information for any other purpose than traffic management.
3. Are there other applications that could be impacted by Rogers traffic management measures?
If your internet connection cannot attain full speed while using an application, such as encrypted FTP, please ensure that you are using the standard port assigned for the application/protocol in question (as per the IANA: http://www.iana.org/assignments/port-numbers).
If you cannot find the application/protocol listed in the IANA's website or you're not currently using the assigned port listed, it is possible that the application/protocol being used may be impacted by traffic management if your internet connection is using a P2P file sharing application at the same time.
To resolve this issue, please close the affected application and check that all P2P file sharing applications are not running on the Internet connection. When you turn the affected application back on, ensure you are using the standard port assigned and there are no P2P file sharing applications running.
Note: Allow up to 10 minutes after terminating the P2P applications before you restart the affected application to ensure the application is not affected by traffic management. Verify that all computers connected to the internet follow the trouble shooting process above.
If the problem still persists, please use our online chat at http://rogershelp.com/trafficmanagement/ for further assistance.
4. Does Rogers block some types of protocols?
We do not block any protocols, content or traffic for the purposes of traffic management.
Rogers does block or limit certain types of traffic or activity to protect network integrity and the security of our customers. These include, spam, viruses, malware, denial of service attacks and other malicious activities.
5. Does Rogers look at any of the content that passes over its network?
Rogers does not look at content. Our traffic management is not used to identify content: it identifies only the type of traffic. This is similar to a letter carrier who, while delivering mail to your home, only sees the envelope and would not know what is inside, whether it be a cheque, bill or something else. Rogers network assigns an IP address to each of our customer's modem so that it can properly route traffic to and from that customer. In some areas, our traffic management technology sorts P2P file sharing traffic from the other types of traffic associated with your IP address in real time. However, we do not record or retain any information about the types of traffic associated with your IP address. Since IP addresses have the potential to be linked to an individual's customer account, IP addresses could be considered personal information.
6. Is P2P download speed impacted by Rogers traffic management policy?
Rogers does not manage download P2P file sharing traffic; however, some P2P applications will limit download speeds based on various factors, including the amount of P2P upload traffic and protocol acknowledgments. These factors may be responsible for customers experiencing slow download P2P file sharing speeds.
SHAW COMMUNICATIONS INC. :
1.1 In accordance with Telecom Regulatory Policy CRTC 2009-657, Shaw’s ITMPs are not approved by the CRTC and as such the information contained herein with regard to Shaw’s ITMPs is provided for information purposes only.
1.2 To ensure the proportional use by all end-users and to maintain the integrity of the network, Shaw has implemented technical ITMPs that will apply equally to Shaw’s own Retail IS End-Users and the End-Users of the Shaw TPIA Service.
1.3 Shaw’s ITMPs were introduced to quickly address upstream congestion caused by some classes of applications while standard network expansion activities are undertaken to increase the bandwidth availability for all users.
1.4 In the event of upstream congestion on a serving area node, the amount of upstream bandwidth allotted to P2P applications completing non real-time file transfer activity within that serving area node may be reduced to 80 kbps per End-User. This could result in the upload of the non real-time P2P file transfer taking longer to complete than during times of non-congestion. Shaw’s ITMPs are not applied to downstream data transfer, real-time interactive or time-sensitive Internet applications.
1.5 Prior to implementing new ITMPs or undertaking material changes to existing ITMPs, Shaw will provide the TPIA Customer with a minimum of sixty (60) days advance notice.
1.6 Shaw will not be required to provide advance notification of any changes to its ITMPs that are a matter of housekeeping or result in a less restrictive ITMP. In these situations the changes will be effective on the date Shaw provides notification to TPIA Customers.
1.7 Pursuant to paragraph 64 of Telecom Regulatory Policy CRTC 2009-657, TPIA Customers are required to provide information regarding technical ITMPs to their End-Users within thirty (30) days of Shaw issuing revised ITMP tariff pages, or where applicable, Commission approval of the tariff pages is granted.
1.8 If Shaw provides notification of changes in accordance with Item 1.6 above, TPIA Customers are required to provide notification of the changes to their customers as soon as reasonably possible.
1.9 Pursuant to paragraph 104 of Telecom Regulatory Policy CRTC 2009-657, any End-User personal information collected by TPIA Customers for the purpose of traffic management cannot be used for other purposes or disclosed to other parties. The aggregated information may only be collected and used for the purposes of network planning and engineering of the network.
TELUS COMMUNICATIONS COMPANY:
Does Videotron apply Internet traffic management measures?
Why does Videotron apply Internet traffic management measures?
What kind of traffic does Videotron target?
How and when does Videotron manage traffic on its network?
Every 15 minutes, a system verifies the traffic rate of each upstream channel (typically, one upstream channel serves a few dozen modems).
If the traffic rate exceeds the threshold above which congestion occurs, the system identifies the USI 120 or USI 200* modems that are uploading a large amount of data. The upload capacity of these modems is then given a low-priority rating. However, if the congestion persists or increases, then the upload speed of these modems may slow down.
When the amount of data uploaded by the modem is diminished or the traffic on that channel reverts to a normal enough rate that congestion is no longer an issue, the upload capacity will go back to its usual priority. Even when they are no longer prioritized, USI 120 or USI 200* modems can use up all the upload bandwidth that other modems are not using, at a speed equivalent to these modems’ nominal speed.
The measures described above are implemented on an ongoing basis.