CT012 3 3 CSM NP000391
CT012 3 3 CSM NP000391
CT012 3 3 CSM NP000391
2
Table of Contents
1 Weakness............................................................................................................................................3
1.1 Few number of branches.............................................................................................................3
1.1.1 Recommendation for the first weakness.............................................................................3
1.2 Coverage only in core cities areas................................................................................................3
1.2.1 Recommendation for second weakness..............................................................................4
2 Security threat with recommendation................................................................................................4
2.1 Address space hijacking (IP prefixes)...........................................................................................4
2.1.1 Recommendation.................................................................................................................4
2.2 Domain name collision................................................................................................................4
2.2.1 Recommendation.................................................................................................................5
3 Supply chain........................................................................................................................................5
3.1 Cloud Services..............................................................................................................................5
3.2 AI.................................................................................................................................................5
4 References...........................................................................................................................................7
3
1 Weakness
1.1 Few number of branches
There are limited number of branches of the world link. Due to this, many customers are lacking
in their internet services. They have to walk a miles to visit the office area for the problem facing
in internet and for the services. There are only seven branches of world link, which are only in
core city areas of Nepal. Limited number of branches faced the problem in getting feedback of
the customers and to provide the customer’s satisfaction, whereas this service provider is missing
in follow up of the customers.
4
provide access of internet in rural area. The broadband should be rise. World link can pick one of
these solutions over satellites if DSL broadband, wireless mobile internet, or wireless broadband
online services which are available in the remote region because ISP provider won't have to
worry about the cellular connection which occurs with such internet providers (ISP Family,
2021).
2.1.1 Recommendation
To provide AS genuine authentication, employ resources certification (RPKI) should be used.
Set up unicast opposite direction route relaying to validate the primary source IP. Monitor the
state of BGP to detect unusual actions such as route changes or unusual announcements.
Modifications to the routing organizational architecture may be easily performed using a
specified authorization and good authentication. Filter out the routing announcements and use
approaches that diminish the risk of overburdening routing formed by illegal path notifications.
Filter out the routing announcements and use techniques that reduce the risk of overloading
routing caused by illegal route notifications.
5
domain name into the DND, whether a generic TLD, country code TLD, or second-level domain
name, presents the possibility of name collision. (Essays, 2003)
2.2.1 Recommendation
Domain names that do not belong to the company must not be utilized for internal infrastructure.
For example, the private domain name account area cannot be preserved as top-level domains.
Using firewall restrictions to prevent DNS demand for internal namespaces from leaking into the
internet. Use reserved TLDs like invalid, test, localhost, or example. Set up proxies and firewalls
to record and deny outgoing queries to wpad.dat files. Even as root for the company as well as
other local namespaces, think about utilizing a full-qualified domain name (FQDN) from the
worldwide DNS.
3 Supply chain
The Supply Chain concept and practice have existed for a great many years. A supply chain is
described as all of the concerned parties, whether directly or indirectly, in satisfying the
instructions of the end-customer (Klein, Davis, & Hairston). Manufacturers and suppliers, as
well as truckers, storage facilities, retail chains, and even clients, are all part of a supply chain. A
supply chain is evolved over the centuries that includes commodity, assistance, details, and
financing bubbling constantly, alike upstream and downstream among numerous supply chain
members. Supply networks fit into various typical supply chain business concepts. The models
are divided into two categories: sensitivity and effectiveness. Each model tries for some mix of
the two, but achieves these objectives in a unique way (Lutkevich, n.d.).
6
assist ISP in choosing the appropriate resources to satisfy needs. To ensure you make the most
viable enterprise, World link can do a cost comparison.
3.2 AI
AI is an intelligent bot that will assist in the management of organizational work and will handle
monotonous duties for organization so that it can concentrate on what's essential (ISP, n.d.). AI is
used to manage the complexities that came with the surge in internet traffic in the organization.
Without human intervention, AI will modify the network, separate devices and flows, and repair
the network. This will help operators to make better use of their human resources and also reduce
the cost of operating the networks. The number of devices is poised to expand, controlled by the
internet of things (IoT) and edge computing, and the capacity to deploy AI to all those networks
will allow humans to scale (Weckel, 2019). AI will increase ISP suggest possible solutions and
network management while retaining a human in the loop to review or authorize network
improvements of the ISP. However, operators will fast adapt and depend less on humans.
The company could collaborate with SPs to examine data flow and system settings. AI is helping
SPs to detect possible concerns before deploying new settings or experiencing an outage. This
technology is assisting in making the SP network better resilient and stable, as well as enabling
management.
7
4 References
Blinq Networks. (n.d.). Communication components Inc. Retrieved from Blinq Networks:
https://blinqnetworks.com/top-3-challenges-to-provide-internet-for-rural-areas/
Chai, W. (2022, october). cloud service provider (cloud provider). Retrieved from Techtarget:
https://www.techtarget.com/searchitchannel/definition/cloud-service-provider-cloud-provider
Essays, U. (2003). UKESSAYS. Retrieved from UKESSAYS TRUSTED BY STTUDENT SINCE 2003:
https://www.ukessays.com/essays/information-technology/isp-network-potential-threats-
5152.php
ISP Family. (2021, May 4). How to Get Internet in Rural Areas 2021. Retrieved from ISP Family:
https://ispfamily.com/how-to-get-internet-in-rural-areas/
Klein, E. P., Davis, Z., & Hairston, A. J. (n.d.). TECHNOLOGICAL ENABLERS FOR SUPPLY CHAIN
MANAGEMENT. Department of Business Information Systems, Tennessee State.
Weckel, A. (2019, june 24). Technically Speaking. Retrieved from Ai expanding its rolein service provider
network: https://www.blog.adva.com/en/ai-expanding-its-role-in-service-provider-networks