Small CAUSE logoCAUSE/EFFECT

Copyright 1996 CAUSE. From CAUSE/EFFECT Volume 19, Number 4, Winter 1996, pp. 14-21. Permission to copy or disseminate all or part of this material is granted provided that the copies are not made or distributed for commercial advantage, the CAUSE copyright and its date appear, and notice is given that copying is by permission of CAUSE, the association for managing and using information resources in higher education. To disseminate otherwise, or to republish, requires written permission. For further information, contact Julia Rudy at CAUSE, 4840 Pearl East Circle, Suite 302E, Boulder, CO 80301 USA; 303-939-0308; e-mail: [email protected]


Guidelines for Outsourcing Remote Access

by Ardoth Hassler and Michael Neuman

As demand for Internet resources explodes on campus, faculty and students increasingly want network access from off-campus locations. Soaring demand has led numerous colleges and universities to investigate outsourcing. This article offers a discussion of the advantages and disadvantages of outsourcing remote access, including a sample checklist for an RFP, based on the examination of the RFPs for outsourcing remote access of six universities and a follow-up survey to determine their outcomes.

As the resources of the Internet -- electronic mail, discussion groups, and the World Wide Web -- become an integral part of the process of scholarly communication, faculty and students increasingly want access to these resources from the locations where they do their work. And given the asynchronous nature of Internet communication, faculty and students want this access from home as well as from campus. In the summary of his 1995 campus computing survey, Kenneth C. Green noted that between 1994 and 1995, use of e-mail (to cite just the most common Internet utility) increased from 8 percent to 20 percent among faculty surveyed.1 In the past year, growth in professors' use of the World Wide Web is likely to prove still more striking. Because computing services departments find it difficult enough simply to meet the needs for on-campus computing, the demand for remote access naturally leads a chief information officer (CIO) or a computing services director to consider three advantages of outsourcing remote access:

Improved Service
Outsourcing can provide broader (and sometimes better) services than those currently available from on-campus systems, and it can permit extending those services to segments of the campus community (especially alumni) not served by existing systems.

Cost-sharing by Clients
Computing services, like library services, are generally not charged back to the segments of the campus community that use them, so there is a limit to the number of new services that can be introduced. Outsourcing remote access establishes or extends the precedent of cost-sharing with the college or university community so that scarce institutional resources can be used for other priorities.

Partnerships with Vendors
While many institutions are simply seeking to add such basic services such as PPP (Point-to-Point Protocol), TCP/IP (Transmission Control Protocol/Internet Protocol), and asynchronous access, contracts with vendors (commonly one to two years with the possibility of a one-year extension) may soon extend to an array of other protocols and information resources.

These advantages for outsourcing are compelling, but drawbacks become apparent when the remote access is viewed in relation to the current institution-based services and systems. This article draws upon experience at the authors' university, Requests for Proposals (RFPs) for remote access obtained from five other universities, and a follow-up survey conducted by the authors to determine outcomes of those RFPs (see sidebar for details). The article describes the key technical and customer-support services that must be provided by the vendor, then describes ways to avoid the potential institutional problems of decreased control of systems and services, and concludes with a checklist of factors to consider when creating an RFP for remote access.

Outsourcing And Improved Service

Outsourcing, in conjunction with passing along the costs to the consumer, can expand services and extend them to a broader segment of the institution without significantly increasing charges incurred by computing services departments. Many such departments are under increasing pressure to extend service beyond the traditional client base to include alumni, patrons of the institution, and the community at large. Offering an array of network services to this extended community is good for public relations, but expanding the client base will inevitably impose peripheral demands on an infrastructure already overtaxed. Consequently, identifying in detail the vendor's services-both technical and customer -- support -- will help to clarify both the extent to which outsourcing can extend campus services as well as the peripheral demands likely to be placed on the system.

Technical Services

For what problems is the vendor's service a solution? Circumventing a busy modem pool, extending Internet access to alumni, providing students with remote access to the Web, expanding access to the institution's high-speed network -- whatever the problems, the following five technical components of the vendor's service are likely to require careful consideration, and information about them must be sought in the RFP for a remote-access vendor partnership.

Supported Protocols
Should the vendor provide merely dial-up Internet access or should it supply access to campus servers as well? For the former, TCP/IP through SLIP (Serial Line Internet Protocol) and PPP are givens; for the latter, other protocols such as IPX (Internet Packet Exchange) or Appletalk may be necessary and will entail more serious considerations of security measures and policy issues.2 Once the Internet is available by remote access, members of the community are likely to want remote access to the resources of the institution's high- speed network as well. Currently, the majority of vendors are only able to support PPP. Only one institution responding to our survey reported a local provider offering IPX and Appletalk. Many indicated that supporting such protocols as IPX and Appletalk is under consideration.

Client Software
Because the RFP should itemize the software that the vendor will supply, it is necessary to specify what the campus community will need in order to operate in a stable, familiar, and cost-effective environment. For stability, the vendor's software must function on a full range of client operating systems, including DOS, Windows 3.11 or 95, and Mac OS. For familiarity, the vendor's software should include common Internet utilities. For economy, the vendor's pricing mechanisms should be noted carefully; for example, Netscape provides free licenses to its Navigator browser for the Web, so the RFP should seek to avoid charges for this utility. In our survey results, as specified by the institutions, the provider and/or institution are providing Trumpet Winsock (for Windows 3.1 clients), Netscape, Telnet, FTP, MAC dialer, terminal emulation (TN3270 and Telnet), and POP (Post Office Protocol) mailer client software.

Bandwidth
Access speeds/bandwidths determine the response time needed for downloading image files or large text files over the Internet, so the RFP should specify such standards as 28.8 kbps (or greater) and V.34 for dial-in ports. In the RFPs reviewed in our study, ISDN dedicated telephone lines, when mentioned at all, were generally included in future plans. Indeed, in the outcomes, only two institutions have obtained ISDN from their providers.

Absence of busy signals
The users' tolerance for busy signals (as a percentage of calls to the vendor's host computer) is generally known to the CIO or computing services director on the basis of previous complaints. The vendor of remote access, therefore, should be expected to match or exceed the current on-campus standards for minimizing busy signals. The RFPs generally specify the grade of service between P.00 (no busy signals) and P.05 (busy signals occurring on five percent of the calls). The majority of agreements examined in our study accepted P.05.

Scope of access
An increasing number of faculty members want remote access to the Internet not only from home but from a "home away from home," when traveling for a conference or a vacation. Some vendors provide such "remote remote access" by means of an 800/888 phone number. The charges per minute should be negligible (either free or no more than $.10). Other vendors can provide local access numbers in all major cities, a service that can reduce the difficulties from dropped modem connections associated with cross-country dial-in on a toll- free (800) line. As would be expected, the larger, national vendors are better able to provide 800/888 access and/or local points of presence in major metropolitan areas. There is often an extra charge for this feature.

Customer Services

The vendor's success in providing customer services will be even more obvious to the campus community than its success with technical services. And the vendor's success in easing the faculty, staff, and students past obstacles -- especially in the following four areas -- will reflect well on the computing services department for brokering the contract.

Rapid Implementation
Once the contract is signed, the campus community will be eager to take advantage of the service; consequently, a minimal implementation period is recommended. In the RFPs examined, the institutions typically expected implementation within sixty to ninety days of signing the contract. By contrast, survey respondents reported that implementation ranged from two days to four months. Those institutions in major metropolitan areas obtained connectivity more quickly.

Installation and Trouble-shooting
Easily installed software is essential. It is important to consider setting a requirement that the client software will "plug and play" for 90 percent of the users, and to determine if the vendor offers installation assistance at a fee. Good documentation is also essential in order to minimize the impact on the computing services help desk. Even so, the help desk must be prepared for questions about the vendor's service and will need its own special access to the vendor's support mechanisms.

Scope of Support
The RFP should specify expectations for service from the vendor's help desk. Is coverage required twenty-four hours a day, seven days a week, 365 days a year? What are the minimum requirements for access to the vendor's customer service organization for order processing, billing information, etc.? The RFPs in our study typically called for toll-free services extending Monday through Friday from 7:00 a.m. to 10:00 p.m., and Saturday and Sunday from 7:00 a.m. to 8:00 p.m.

Pricing
Considerations here include start-up, usage time, and tiering. If there is a start-up fee, what services will it cover? Will the user incur a new start-up fee if he or she leaves home for the summer, or will the vendor permit a "stop out" fee that would keep the user's account open but inactive? Will the vendor provide unlimited access? If not, what is an acceptable level of service? Typically, the study RFPs requested that "N" hours be included in the base rate with an hourly charge for anything over an N of about fifteen hours.

Can the vendor support tiering, that is, lower rates for off- peak usage? For example, usage might be unlimited between 1:00 a.m. and 6:00 a.m. or summer usage may be available at a lower rate. Most importantly, the cost of the remote access must be competitive. On the basis of the completed surveys, those institutions using local providers have typically been able to obtain flat fees for unlimited access. Those using a national provider typically have a base rate averaging around $12-13/month for sixty hours with a $.95/hour charge after that. Some have an option of a higher rate for unlimited use. One vendor offers unlimited use in off-peak hours, which vary from agreement to agreement. The majority have a $10-25 start-up fee.

Relationship to Current Institution-based Services

Consideration of the scope of the vendor's technical and customer services naturally raises the issue of the relationship of the outsourced services to the institution's own. At one end of the outsourcing continuum, the vendor could be asked to provide all Internet services for the institution, though in the RFPs examined all preferred to maintain the relationships with their current providers of campus-to-Internet connections, while reserving the option to transfer to the dial-up vendor in the future.

More frequently at issue is the question of modem pools, which many institutions maintain simply for access to their mainframes and minicomputers. Should these be dismantled in favor of support from the vendor? If so, restricted-use pools may be desirable to allow institution staff access to these systems in an emergency. These "backdoor" pools may present a security threat if not closely monitored, so a backdoor pool with specified maximum size should be included in the RFP to ensure that this resource does not appear to "compete" with the vendor's resources. Only one of the institutions surveyed is not continuing to maintain a modem pool. The majority have no plans to stop maintaining their modem pools because they support different services from those provided by the vendors.

Electronic mail and personal Web space constitute another issue, since some vendors will offer to provide them on their servers as part of the base offering. Vendor-supplied electronic mailboxes may not integrate well if the college or university system is attempting to standardize on one on- campus system for all users. The RFP should specify whether or not these services are available to subscribers who are funded from the institution. On the other hand, if alumni or other "friends" of the institution pay their own way under this plan, it may be desirable to allow them to select electronic mail and Web pages as an option, particularly if the institution does not provide this service for them. All of the institutions surveyed continue to provide e-mail to their users; however, eleven institutions permit the vendors to offer additional e-mail services. In some cases, there is an added fee for this service.

Finally, it is important to determine whether "downstream" connections through the institution will be blocked from off campus. Institutions are sensitive to having people from off campus access the Internet through their connection. Further, it is important not to impact the institution's bandwidth to the Internet. By requiring the vendor to provide direct Internet service to those who dial in, the institution can filter traffic at the router level to ensure that dial-in users cannot leave the campus backbone by way of the institution's Internet connection. This would allow the institution to use a separate provider for Internet service for the campus backbone. However, vendors generally assign users an IP number from a block of their own. This may prevent off-campus users from accessing some online services, such as Encyclopedia Britannica, since they must be accessed from an IP number with the institution's domain. As for campus users of the Internet, a "non-circuitous" routing should be specified, since institutions will not want their clients routed "across town" or across campus via distant nodes.

Because the vendor's technical and customer services will have an impact on so many corresponding systems on campus, the institution ought to conduct a pre-test of the remote access. Prior to signing the contract, the institution should obtain five to ten demonstration accounts, encourage faculty and computing personnel to experiment with them for at least a month, and gauge the effect on the institution's systems.

Outsourcing and Decreased Control of Systems and Services

In ways even more important than modem pools and mailboxes, outsourcing remote access must be carefully coordinated with the institution's existing computing services and systems. At the most basic level, directors of academic computing frequently must balance the conflicting goods of responding to requests for new services while managing the limited resources of a complex system. The new services available by remote access, even though provided by a vendor and billed directly to the customer, nevertheless come at a cost of decreased control over systems and services, especially in such areas as security and management. In preparing their RFPs, CIOs and computing services directors can minimize the complications of decreased control.

Security and Authentication

As faculty experience network access from home, their list of requested resources has grown beyond e-mail and discussion groups to include the World Wide Web and, more recently, the resources of the campus high-speed network. Protecting the institution's Internet connection and the campus LAN infrastructure will become increasingly difficult as remote users press for more complete access to files and servers. Systems that had not been previously exposed outside the campus backbone, such as Novell file servers running IPX, may suddenly be open to attack if IPX is specified as a protocol requirement. These dial-in ports may need to be classed as on-campus resources in order for legitimate users to have complete access.

If alumni or other "friends" of the institution are permitted access to the modem pool, the vendor may be exposing the campus network and its resources to outsiders who would otherwise be considered unauthorized. Access to this pool should be restricted to faculty, staff, and students in order to reduce security risks. Consequently, the institution's needs for security must be carefully spelled out in the RFP in four distinct areas.

Global network security
Teamwork with the vendor is essential. All of the RFPs in our study articulated general responsibilities for security, including working closely with one another, with the campus Internet provider, with the Computer Emergency Response Team (CERT), and with organizations such as College and University Information Security Professionals (CUISP).

Authentication
The conditions under which the vendor seeks authentication from legitimate users at remote sites must strike a balance between maintaining security of campus systems and avoiding inconvenience to the campus community. For example, while it is appropriate to permit only one session per username, it may be helpful to achieve consistency between the vendor's policies and the institution's on such matters as length of usernames and passwords so that the user need not learn two different sets of rules.

Audits
The vendor should be required to provide complete auditing of every user given access to the system. The institution may also require the vendor to accept requests for new accounts only from an on-campus service provider who can screen the applications. Or the vendor may need access to the student information system and lists of faculty and staff in order to validate requests to sign up for the service.

Non-disclosure
Because the vendor is likely to learn a great deal about the security systems that the institution has in place, the contract must contain a non-disclosure clause about security and privacy. The good news from the completed surveys in our study is that most respondents who have had sufficient time to evaluate security and procedures report that the vendor's security provisions meet or exceed their expectations.

Management and Marketing

Campus computing organizations are continually engaged in the effort to establish control over an array of constantly growing and changing systems; consequently, the decreased control of systems and services that accompanies outsourcing must be managed satisfactorily within the terms of the contract.

Location of Equipment and Maintenance
If the servers and other equipment necessary for remote access are located at the vendor's site, the institution must determine (and express in the RFP) its tolerance for outages. If the equipment is to be located on campus, the vendor is likely to request conditioned space and utilities. The vendor may also expect the institution staff to monitor the equipment and swap "hot spares," returning the bad parts by mail for repair. If such "pair-of-hands" maintenance is considered acceptable, the institution should have exclusive use of the equipment and could expect a per-user rebate as well. In either case, it is necessary to specify how much notification must be given for maintenance and upgrades (typically, forty-eight hours). Given the likelihood that computing services staff will become engaged in on-campus support of the vendor's equipment, it may be advisable to reject that option. Indeed, the majority of institutions responding to the survey report that the equipment is located off campus. Of the four institutions in our study who have the equipment located on campus, the vendor is performing monitoring and maintenance.
Management reports
It is important to specify the types and frequency of reports required -- including utilization reports, sign-up rates, time-of-day usage statistics, lists of complaints and their resolutions, and statistics on blocked calls -- and to determine the frequency of the reports -- either monthly or quarterly -- and specify that they be delivered in machine- readable format as well as hard copy.
Marketing
Even though the vendor will be providing services to the campus community and charging individuals directly, the institution must still have the final word on how, when, and where the remote access is marketed. Because faculty and students are likely to argue that Internet access has always been free on campus and should be free from off campus as well, a careful job of publicizing and "selling" the service will be necessary. Consequently, while information from the vendor can facilitate the process of education, it will be the task of the computing services department to muster the fiscal arguments for remote access in order to win the endorsement of relevant advisory committees and constituencies. For this purpose computing services will need data on the costs of maintaining and upgrading modem pools and of adding new SLIP/PPP services, and then will need to weigh these services against enhancing and maintaining wiring, equipment, facilities, and services on campus for faculty, students, and staff in offices, labs, and residence halls.

In the context of this educational effort, the institution may want to promote the new remote access service by giving it a name that resembles its telephone and video services. For example, at Georgetown University, where the sports teams are known as the Hoyas, the service could be called "Hoyanet Access" or "GUnet Access." It is important, however, for the institution to guard the use of its logos and trademarks, and designs for all marketing materials should receive the expressed permission of the institution before being distributed to clients. One-third of the institutions responding to our survey have elected to let the vendor solely market the services.

Billing
Ideally the institution should also be able to propose billing practices to serve the interests and practices of its clients. For example, since the institution may want to subsidize its faculty in varying degrees, the vendor should agree to bill academic departments, or even to share the billing between a department and one of its members. Flexibility in payment plans should also be arranged, so that users can choose to be billed by the month, academic term (semester or quarter), or academic or fiscal year. Discounts for pre-payments -- either by individual or the institution -- should be incorporated into the plan.

Summary

Information Week reports that by 1997, corporate spending for remote access will average $8.[5] million per company, up 81 percent from 1995. Hardware and software acquisition costs for remote access will be about 23 percent of the $8.5 million, meaning that about 77 percent of the costs will be for sustaining an installed base.3 While we have not found data specific to higher education, similar trends must be occurring in colleges and universities as the demand for remote access increases. For many institutions, outsourcing remote access is proving to be a viable option for providing service. Nevertheless, the institution's request for proposals from vendors must carefully spell out the technical services to be provided and acceptable levels of performance, the customer services ranging from implementation to pricing, and the relationship of the new service to such current services as modem pools and Internet access. In addition, the RFP should attempt to ensure high standards of security and authentication, marketing and management, and use of the institution's name and insignia.


Sidebar 1

                  CHECKLIST FOR AN RFP ON
                OUTSOURCING INTERNET ACCESS

             Services from the Vendor's Server

Supported Protocols
     ___ TCP/IP
     ___ SLIP, PPP
     ___ IPX
     ___ Appletalk
     ___ Others: 

Client Software Provided
     Software                              Cost
     ___ Trumpet Winsock                   _____
     ___ Netscape Navigator                _____
     ___ TN3270                            _____
     ___ VTxxx emulation                   _____
     ___ MAC dialer                        _____
     ___ FTP                               _____
     ___ Telnet                            _____
     ___ Others:                           _____

Speed/Bandwidth
Specify the modem speed capable of being supported by the 
host:
     ___ 28.[8] Kbps
     ___ 14.[4] Kbps
     ___ 9600 baud
     ___ V.34 protocols for dial-in ports

Busy Signals
Specify the grade of service desired (and cost):
     Response                                         Cost
     ___ P.00 (no busy signals)                      _____
     ___ P.05 (busy signals on 5 percent of calls)   _____
     ___ Other:                                      _____

Scope of Access
Specify the telephone charges required for the following 
connections:
     Point of Call                                    Cost
     From institution city or town                   _____
     From surrounding metropolitan area              _____
     U.S. connections from beyond current area code  _____
     International connections                       _____


Vendor's Customer Services

Implementation Period for Contract
     ___ 30 days
     ___ 45 days
     ___ 60 days
     ___ Other:

Guaranteed success rate for software installation
     ___ N.A.
     ___ 75 percent
     ___ 90 percent
     ___ Other:

Vendor's documentation
     Content. Check all that apply:
          ___ Software installation guide
          ___ Trouble-shooting guide
          ___ Vendor help-desk information
     Availability. Check all that apply:
          ___ from vendor by surface mail
          ___ from institution
          ___ via World Wide Web

Vendor's help-desk coverage
Hours per day     Specified days per week     Weeks per year

Pricing Options
  Start-up: Specify any costs and conditions.
  Stop out: Specify any costs and conditions.
  Usage time and costs per month
       Unlimited use:
  Base costs: (number of hours) (incremental costs per hour)
 
  Tiering options for off-peak use: 
  Specify options and prices.


Institution Systems and Services

Current Systems
     Modem pool:
          ___ Retain ___ Discontinue
     Electronic mail and Internet access:
          ___ Retain ___ Discontinue

Security
     ___ Collaboration with security professionals: Specify.
     ___ Consistency with institution structures and
         policies:
          ___ simultaneous logins
          ___ passwords
          ___ other:
     ___ Auditing of access privileges and user transactions
     ___ Non-disclosure clause about institutional security 
         and privacy procedures

Management
     Location of vendor's servers and maintenance
          ___ on campus ___ off campus

     Reports requested of vendor:
        Kinds       Frequency        Format
          ___ Utilization reports
          ___ Sign-up rates
          ___ Time-of-day usage statistics
          ___ Lists of complaints and resolutions
          ___ Statistics on blocked calls
          ___ Other:

Marketing
     Access to addresses:
       ___ students ___ faculty ___ administrators ___staff

Permissions/safeguards regarding institutional logos
and trademarks. Specify.

     Billing mechanisms. Check all that apply:
    ___ Direct billing to customers only
    ___ Full and partial billing to institutional departments


Sidebar 2

Five universities contributing RFPs to author Ardoth Hassler's study were Florida Atlantic University, Florida State University, North Carolina State University, University of Alabama/Birmingham, and University System of Georgia. Georgetown University's own "Memorandum of Understanding" was also used in the study. The RFPs were obtained through the electronic discussion list of the Southern Computer Center Directors. (This directors' group, with participating institutions from Texas to Washington, D.C., has held an annual meeting each spring for more than twenty years.)

In October 1996, a follow-up survey to determine outcomes of RFP processes for outsourcing remote access was distributed to the Southern Directors' discussion list and to the CAUSE CIO electronic discussion list. All five of the institutions that originally submitted RFPs completed the survey, with two indicating that they are still negotiating agreements with a provider. In addition, twelve other institutions that have chosen to outsource remote access responded to the survey: Brigham Young University, George Mason University, Georgia State University, Hamilton College, Lewis and Clark College, Pepperdine University, Rice University, University of Georgia, the University of Montana, University of Puget Sound, University of Tennessee/Chattanooga, and University of Tennessee/Martin.

Of the seventeen institutions responding, seven have contracted (and one is in process) with MCI, one has contracted with Sprint, one has contracted with IBM Advantis, one has contracted with BellSouth, and six use local providers. The average length of the agreement is two-plus years. Most institutions signed on for only one or two years; three signed on for five years. As this article goes to press, Georgetown University's own service contract is in the process of being awarded.

Georgetown's Memorandum of Understanding is accessible through the CAUSE Information Resources Library at http://www.cause.org/ir/library/text/csd1099.txt; Florida Atlantic University's RFP is available at http://www.fau.edu/irm/css/modem-rfp.html; and a copy of the author's follow-up survey is available at: http://www.georgetown.edu/acs/people/hassler/.


Endnotes:

1 Reported in Thomas DeLoughry, "Reaching a Critical Mass," The Chronicle of Higher Education, 26 January 1996, A17.

Back to the text

2 IPX is required for Novell files servers that have bound IPX as their only protocol. Novell servers can also bind TCP/IP to eliminate the need for additional protocols on the campus backbone, although this will come at some cost to performance and security. Windows NT servers bind the TCP/IP protocol by default.

Back to the text

3 Richard Adhikari, "So Far Away, Yet So Close," Information Week, 8 July 1996, 58-64.

Back to the text


Ardoth A. Hassler ([email protected]) is Executive Director of Academic Computing and Information Technology and CIO for the main campus at Georgetown University. She has served as chair of the CAUSE Nomination and Election Committee, is a member of the CAUSE Recognition Committee, and is serving as program chair for EDUCOM'97. She has made numerous presentations at CAUSE, Educom, ACUTA, Southern Directors, and other professional organization conferences.

Michael Neuman ([email protected]) is Director of the Research, Curriculum, and Development Group within Academic Computing Services at Georgetown University. In that capacity he helps faculty integrate computing into their research, teaching, and developmental projects. Currently Dr. Neuman is president of the Association for Computers and the Humanities, and he has recently published articles on developing electronic texts of standard critical editions, and maintaining humanities resources on the Internet.

...to the table of contents


[Comments] [Search] [Home]