Nothing Special   »   [go: up one dir, main page]

CT012 3 3 CSM NP000391

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

1

2
Table of Contents
1 Weakness............................................................................................................................................3
1.1 Few number of branches.............................................................................................................3
1.1.1 Recommendation for the first weakness.............................................................................3
1.2 Coverage only in core cities areas................................................................................................3
1.2.1 Recommendation for second weakness..............................................................................4
2 Security threat with recommendation................................................................................................4
2.1 Address space hijacking (IP prefixes)...........................................................................................4
2.1.1 Recommendation.................................................................................................................4
2.2 Domain name collision................................................................................................................4
2.2.1 Recommendation.................................................................................................................5
3 Supply chain........................................................................................................................................5
3.1 Cloud Services..............................................................................................................................5
3.2 AI.................................................................................................................................................5
4 References...........................................................................................................................................7

3
1 Weakness
1.1 Few number of branches
There are limited number of branches of the world link. Due to this, many customers are lacking
in their internet services. They have to walk a miles to visit the office area for the problem facing
in internet and for the services. There are only seven branches of world link, which are only in
core city areas of Nepal. Limited number of branches faced the problem in getting feedback of
the customers and to provide the customer’s satisfaction, whereas this service provider is missing
in follow up of the customers.

1.1.1 Recommendation for the first weakness


Focus and alliance are the best option based on the Porter’s Competitive Advantages Strategy.
The service provider should focus on the service branches. The internet service provider should
expand their branches in different places. They should also collaborate with the others
competitors, customers and staffs members to make the effective customers services, to extend
more offices in different parts of the country. It lacked a federal authority's agency, so ISPs
should care about the reliability of their communication networks. This could be changed by
collaborating with the national security body. ISPs should periodically check their network,
scanned for users' confinement to the Use Acceptable Policies (UAP).

1.2 Coverage only in core cities areas


World link have only provided the coverage area in the core citites. Many parts of the
undeveloped area are still lacking from the internet services. To expand the organization, the
world link should make use of internet to all the area. Rural regions don't have enough
prospective consumers to induce Internet Service Providers (ISPs) to spend money constructing
those networks. Yet, the reliability of the internet in remote region is still lacking (Blinq
Networks, n.d.). Many people of Nepal have still zero knowledge of internet services.

1.2.1 Recommendation for second weakness


Cost leadership and Growth are the two best option based on porter’s Competitive Advantage
Strategy. The World ink should provide internet facility in low of the cost in the rural area so that
every people can access it easily. The ISP should extend their internet service in every parts of
the country to make growth in the business within the budget, so that the company can earn more
and expand more branches. World link should use the satellites based ISP in context of Nepal to

4
provide access of internet in rural area. The broadband should be rise. World link can pick one of
these solutions over satellites if DSL broadband, wireless mobile internet, or wireless broadband
online services which are available in the remote region because ISP provider won't have to
worry about the cellular connection which occurs with such internet providers (ISP Family,
2021).

2 Security threat with recommendation


2.1 Address space hijacking (IP prefixes)
Address space hijacking is the unauthorized acquisition of groupings of IP addresses through the
corruption of Internet route cache provided by the Border Gateway Protocol. While expanding to
a new overseas market the un-used IP address by the service provider will be stolen and used for
the criminal activities. This exploit some weakness in the border Gateway Protocol (BGP),
which designs paths for routed date packets and redirect the addresses to criminal activities. The
attackers maliciously reroute Internet traffic by falsely announcing ownership of IP prefixes.

2.1.1 Recommendation
To provide AS genuine authentication, employ resources certification (RPKI) should be used.
Set up unicast opposite direction route relaying to validate the primary source IP. Monitor the
state of BGP to detect unusual actions such as route changes or unusual announcements.
Modifications to the routing organizational architecture may be easily performed using a
specified authorization and good authentication. Filter out the routing announcements and use
approaches that diminish the risk of overburdening routing formed by illegal path notifications.
Filter out the routing announcements and use techniques that reduce the risk of overloading
routing caused by illegal route notifications.

2.2 Domain name collision


While trying to find an organization domain name in a private DNS zone, a request to a public
Domain Name System is generated (DNS) (Icann, n.d.). It's an issue because if two or more
devices give out signals at the same time, they will collide and have to wait for each other to
send their signals again one at a time. It only occurs while using a half-duplex mode by the
service provider. Name resolution may provide unwanted or negative outcomes when the
administrative boundaries of private and public namespaces overlap. The introduction of a new

5
domain name into the DND, whether a generic TLD, country code TLD, or second-level domain
name, presents the possibility of name collision. (Essays, 2003)

2.2.1 Recommendation
Domain names that do not belong to the company must not be utilized for internal infrastructure.
For example, the private domain name account area cannot be preserved as top-level domains.
Using firewall restrictions to prevent DNS demand for internal namespaces from leaking into the
internet. Use reserved TLDs like invalid, test, localhost, or example. Set up proxies and firewalls
to record and deny outgoing queries to wpad.dat files. Even as root for the company as well as
other local namespaces, think about utilizing a full-qualified domain name (FQDN) from the
worldwide DNS.

3 Supply chain
The Supply Chain concept and practice have existed for a great many years. A supply chain is
described as all of the concerned parties, whether directly or indirectly, in satisfying the
instructions of the end-customer (Klein, Davis, & Hairston). Manufacturers and suppliers, as
well as truckers, storage facilities, retail chains, and even clients, are all part of a supply chain. A
supply chain is evolved over the centuries that includes commodity, assistance, details, and
financing bubbling constantly, alike upstream and downstream among numerous supply chain
members. Supply networks fit into various typical supply chain business concepts. The models
are divided into two categories: sensitivity and effectiveness. Each model tries for some mix of
the two, but achieves these objectives in a unique way (Lutkevich, n.d.).

3.1 Cloud Services


A cloud services is a firm that provide the cloud (Chai, 2022). Cloud services enables the
execution of any form of computing operation without regard for server distance, ping, location,
and so on. It also offers organization benefit such as data and security testing and reliability.
Within an ISP, the cloud allows for the maintenance of a massively scalable infrastructure. In an
ISP, the cloud enables for the maintenance of a high availability network. For a market that is
always increasing, technology that satisfies the demands of various target groups is required.
Providing cloud-based computing services to consumers is a method to distinguish while still
competing for connection. Every cloud solution is different and dependent on demands that can

6
assist ISP in choosing the appropriate resources to satisfy needs. To ensure you make the most
viable enterprise, World link can do a cost comparison.

3.2 AI
AI is an intelligent bot that will assist in the management of organizational work and will handle
monotonous duties for organization so that it can concentrate on what's essential (ISP, n.d.). AI is
used to manage the complexities that came with the surge in internet traffic in the organization.
Without human intervention, AI will modify the network, separate devices and flows, and repair
the network. This will help operators to make better use of their human resources and also reduce
the cost of operating the networks. The number of devices is poised to expand, controlled by the
internet of things (IoT) and edge computing, and the capacity to deploy AI to all those networks
will allow humans to scale (Weckel, 2019). AI will increase ISP suggest possible solutions and
network management while retaining a human in the loop to review or authorize network
improvements of the ISP. However, operators will fast adapt and depend less on humans.

The company could collaborate with SPs to examine data flow and system settings. AI is helping
SPs to detect possible concerns before deploying new settings or experiencing an outage. This
technology is assisting in making the SP network better resilient and stable, as well as enabling
management.

7
4 References
Blinq Networks. (n.d.). Communication components Inc. Retrieved from Blinq Networks:
https://blinqnetworks.com/top-3-challenges-to-provide-internet-for-rural-areas/

Chai, W. (2022, october). cloud service provider (cloud provider). Retrieved from Techtarget:
https://www.techtarget.com/searchitchannel/definition/cloud-service-provider-cloud-provider

Essays, U. (2003). UKESSAYS. Retrieved from UKESSAYS TRUSTED BY STTUDENT SINCE 2003:
https://www.ukessays.com/essays/information-technology/isp-network-potential-threats-
5152.php

Icann. (n.d.). ICANN.ORG. Retrieved from icann: https://www.icann.org/resources/pages/name-


collision-2013-12-06-en

ISP Family. (2021, May 4). How to Get Internet in Rural Areas 2021. Retrieved from ISP Family:
https://ispfamily.com/how-to-get-internet-in-rural-areas/

ISP. (n.d.). ISP. Retrieved from ISP: https://ispolitical.com/what-is-aiisp/

Klein, E. P., Davis, Z., & Hairston, A. J. (n.d.). TECHNOLOGICAL ENABLERS FOR SUPPLY CHAIN
MANAGEMENT. Department of Business Information Systems, Tennessee State.

Lutkevich, B. (n.d.). Whatls.com. Retrieved from https://www.techtarget.com/whatis/definition/supply-


chain

Weckel, A. (2019, june 24). Technically Speaking. Retrieved from Ai expanding its rolein service provider
network: https://www.blog.adva.com/en/ai-expanding-its-role-in-service-provider-networks

You might also like