October 1, 2024 Version

WeLink Network Management Practices

1. Overview

This document outlines the network management practices of Welink Communications, Inc. and provides transparency to our customers regarding how we manage network traffic, ensure security, and maintain performance on our broadband network. Our goal is to provide high-quality internet access while ensuring fair and efficient network usage. This document is intended to meet the transparency requirements and regulations promulgated by the Federal Communications Commission (“Commission”) (codified in 47 C.F.R. Part 8).

2. Congestion Management

Objective: To manage network congestion and ensure all users experience optimal service quality, especially during periods of high demand.

  • Congestion Policy: Our network is engineered to handle typical user traffic loads. During peak usage periods, we may implement temporary measures to manage congestion, such as adjusting traffic flows to ensure the network remains responsive for all users.
  • Traffic Prioritization: We do not prioritize specific applications or services (e.g., streaming video, VoIP) unless there are critical issues such as network emergencies. All traffic is treated equally. WeLink does not participate in paid prioritization.

Congestion Thresholds: In the event periods of congestion necessitate network management s, we may temporarily slow down the speeds of users who are engaged in high-volume activities (e.g., streaming, large file downloads). This ensures bandwidth availability for all users.

3. Application-Specific Behavior

Objective: To manage the performance of different types of internet traffic in a fair and transparent way.

  • Blocking/Throttling: our network management practices do not involve widespread blocking or throttling of traffic, ensuring an open and accessible internet experience for users. However, we do implement a targeted blocking of port 25 (SMTP) to prevent unauthorized email relay activity, which helps reduce spam and protect network security. This measure aligns with best practices for network management, mitigating the risk of abuse while maintaining the integrity and performance of our services without broadly impacting user traffic. No other blocking or throttling is applied to any legitimate internet usage.
  • Traffic Management: We do not engage in application-specific traffic management (e.g., prioritizing streaming or gaming services over other traffic). All lawful traffic is treated equally on our network.

Exceptions: Certain activities, such as malicious attacks (e.g., DDoS) or extreme bandwidth hogging, may result in temporary restrictions to ensure the stability and safety of our network for other users.

4. Security and Privacy

Objective: To maintain network security and protect users’ personal data.

  • DDoS Mitigation: We implement automatic traffic filtering to identify and mitigate potential distributed denial-of-service (DDoS) attacks that could compromise the network.
  • Device Authentication: We require devices to adhere to standard security protocols, such as WPA3 for wireless networks, to prevent unauthorized access and ensure network integrity.
  • Privacy Measures: We do not inspect, store, or modify the content of internet traffic beyond what is necessary for network management or required by law. User data is protected in accordance with applicable privacy laws.
5. Monitoring

Objective: To ensure network performance is continuously monitored.

  • Performance Monitoring: Our network is monitored in real-time to ensure service quality and detect any performance issues. This includes monitoring traffic flow, speed, latency, and other metrics.