Skip to main content

🖌 Documentation

Session Seven: Understanding the strengths and weakness of various access technologies

In this session, we have Claire and Jane to talk about the different technologies for access and connectivity, to advocate the implementation for technology based on the needs of the community, as well as the regulations surrounding technology and community networks. 

In her presentation, Claire spoke of the analogy between the human body and network. 

  • Backbone: top level connectivity
  • Head: network intelligence (where the brain is)
  • Backbone, head, and pelvis: core network
  • Arms and legs: backhaul (middle mile)
  • Fingers and toes: access (last mile)

Claire mentioned that the fingers and toes part - the access part as the emphasis of this session. While the parts can work independently, everything must be joined to work right, which is the importance of fingers and toes, as access or last/first mile. It was also noted that in order for access to work, there is a need for electricity.

Access can be connected using wires (cooper or optic fibre), or wireless (terrestrial or satellite). Claire asked the participants, what are the pros and cons of wired and wireless connections. Participants offered their insights.

Wired connections

Pros

Cons

No packet loss

Speed and stability

Always on (where there is no load shedding)

If connections are available nearby, not too expensive

No spectrum requirement

High capacity and range for optic fibre

Reliable (especially underground)

Can last week if protected from hazards

Cost (material, expensive to repair and install)

Debugging

No mobility

Difficult to trace the problem because too many wires

Lack of proper cable labelling

The installation often needs regulatory permission and landowner agreement

One termination serves one location

Fixed to one spot 

Breakages can take time to find and mend

 Wireless connections

Pros

Cons

Mobility

Network topography is more optimised, such as mesh networks

Easy to expand and cover a wide area

Good network

Spectrum saturation with wifi bands

Initial installation can be at a low cost

One access point can serve many users

Mobility at varying amounts

End-user equipment is now often at a low cost

Points where failure may occur, are mostly known

Easy interference

Could be affected by weather

High cost of third party e.g. towers

Difficult to maintain

Pollutes the sky (satellite)

Needs spectrum, which must be managed to avoid interference (wifi typically uses unlicensed spectrum) 

Installation may need regulatory permission and a landowner agreement

Both network and user equipment may be expensive

Claire then spoke about the difference between wired vs wireless connections for community networks. Both connections may need operational licensing. Wired connections may work well in urban areas where there are existing cables, many people already live close together and might be expensive. On the other hand, wireless is often better for community networks, because it allows for a wide length of cable to be spread, and or primarily works well in areas where people live in small groups and far apart. It also would work well where very little money is needed. The wireless options for CNs include satellite, cellular mobile, and wifi.

Jane then took over to speak about policy and regulations surrounding access in community networks. In many cases, policy and regulation can sometimes delay network deployment. The strengths and weaknesses of various technologies may be impacted by the readiness of regulators and policymakers. As such, it is important to know the environment and to conduct a community readiness assessment before deciding the kind of technology to deploy in your community networks. 

Jane asked the participants - especially those who have built their own networks - what they look for when deploying the networks. Some answers:

  • Understanding the area, the needs of the community, and the potential of the connectivity in terms of economy and sustainability — especially when it is a pilot project and the area is quite remote and isolated from others
  • Gain community’s trust, do topographical study, knowledge building workshops and then deploy
  • Training and capacity building for the local people involved in the deployment 
  • Community readiness assessment — having some form of methodology to assess the needs of the community before network deployment (Dani shared the resource “Let us rethink communication technologies. Methodological proposals to design and implement community communication projects”: https://www.redesac.org.mx/_files/ugd/68af39_4bda81212a9c42c4b15f43c9a1e208f7.pdf )

The session concluded with Claire and Jane summarising the input, and Cynthia invited the participants to reimagine more creative solutions to centre the environmental changes that are happening in the design of our community networks — how can we design a network that is environmentally and communally sustainable? 

Memorable Quotes

“The word backhaul comes from the haulage industry, where lots of trucks full of fruits were taken out from the orchard to markets, and back. Backhaul is what you put in the truck.” — Claire

“In Bhutan, you can see all of these white prayer flags underneath the microwave satellites. Reminds me of other means of long-distance communication besides the physical ones.” — Claire 

“In the community network we work with, it is important to have the conversation with the people to understand their values and the technology. We told them that the tech we are deploying is not necessarily better than what they already have, and we are careful not to frame the Internet as the saviour for them.” — Brunz


Session Eight: Language is political. Hacking the language of intimidation

In this session, Kim and Karla introduced strategies and tools to suppress language that impedes policy development and advocacy efforts. They also shared intimidatory examples drawing on their own experiences at ITU’s Plenipotentiary Conference and WTDC 2022. Participants were also invited to share their own experiences in handling difficult experiences and spaces. 

Kim started the session by asking the participants about their first thought when we mentioned ‘intimidation’. A few examples were thrown in: fear, oppression, ego, power play, control, discrimination, bullying, fail, alienation, selfish, threat, and many others. Kim then shared a few official definitions of ‘intimidation’ from a few sources. Intimidation, in a summary, can be defined as a serious act or course of conduct directed at a specific person that can frighten, or cause fear or apprehension in such a person, in order to persuade them to do something you want them to do. In order to illustrate the examples of intimidation better, Kim shared a video called That Little Voice https://www.youtube.com/watch?v=Ll56imVATLk 

Language of intimidation can go across many domains, and they involve power and control. The language can be masculinised (induce manly physiological characteristics to exert power), primacy (the state of being above others in rank or importance), gender-based violence (harmful acts directed at an individual based on their gender) and enthusiastic consent (looking for the presence of ‘yes’ rather than the absence of ‘no’). Kim also shared a few examples of patronising language and its alternatives, which include ‘relax’, ‘you know’, ‘I hear you but’, ‘actually’, and many others. Language can also be used to exert power through many means. Some examples include rhetorical questions, tautology, prevarication, emotive language, and many others. 

Intimidation takes all forms and can manifest in many dimensions, not just through written and spoken language. They can be seen in expressions (verbal or non-verbal), vocabulary (patronising, chauvinistic, technical etc.), context (in the workplace, home etc.), and target (race, sex, gender, sexuality, age etc.). Due to intimidation, many people can experience fear, disempowerment, self-doubt, and low confidence. More importantly, it can also extend to overall low functioning and capping potential to achieve objectives including those related to community network advocacy, planning, deployment and operations. As such, Kim urged for all of us to be cautious not only of intimidation caused to us (as victims) but also of the way we ourselves may have inadvertently perpetrated it (perpetrator) and just casually observing it (bystander) without contributing to anything that might help hinder it. 

Kim then shared a number of tools as the bases for action against various forms of intimidation. One of them is from the UN declaration and resolutions including the Declaration on the Elimination of Violence against Women (OHCHR 1996 and UN 1993) which have a few provisions for the rights of women to the entitlement of equal enjoyment and protection of all human rights, and the responsibilities of States and agencies of the UN to uphold them. Kim also stressed that in the event that these declarations against intimidation do not exist or are limited, it is important that women and gender-diverse people of all levels (local, regional, national, and international) take the space and expand them accordingly. 

In this session, Kim also took the time to announce the appointment of Doreen Bogdan-Martin as the new Secretary-General Elect of the International Telecommunication Union, the first woman to lead the ITU in 157 years of history. Doreen’s appointment is monumental for the inclusion of more women and gender-diverse folks in the ITU, where their voices will be more heard and considered. 

Kim and Karla then shared their experiences at WTDC in Kigali, Rwanda. Kim shared her experiences having to chair the group of the digital inclusion cluster, particularly in gender mainstreaming. She was fully prepared and made sure everything was in place for the stakeholder consultation, including sending comprehensive emails outlining the process, ensuring equal representation to all participants (including those participating virtually), and starting on time. She also made sure that her personal biases and position never factored in how she chaired the session. In short, she was fair, firm, uniform in her treatment, fully prepared, and made sure that everyone had ample opportunities to voice out. 

Karla then shared her examples at the same conference, where she spoke as a representative of APC, REDES, and Rhizomatica to systematise the experiences of community networks at international forums. She mentioned in these forums, many people do not quite have the on-ground experiences to understand some of the issues, such as community networks. Karla also spoke of how ITU spaces are very heavily masculine, and she was often judged based on what she wore, how she spoke, and how she conducted herself. She was also often sidelined by fellow women advocates who refused to let her speak. The participants agreed that sometimes this happened to them as well and it hurt, even more, to see fellow women intimidating each other. As such, it is important to not participate in this same act of intimidation. This can be done through actions such as active listening, avoiding generalisations, watching body language, respecting silence, keeping the conversation confidential, avoiding stereotypes, and using gender-neutral pronouns and titles.

Kim also shared a strategy to prepare for difficult situations in each role: first, identify who are the victims, perpetrators, and bystanders, then prepare your mindset (not to be intimidated), plan your delivery (specify your desired outcomes) and breathe (consolidate your power). Kim, Karla, and Tineca then conducted a role play to show examples of how these are done. 

At the end of the session, participants took the time to share their own experiences and strategies. Cynthia closed the session by inviting the participants to rethink how to create and hack spaces that are more harmonious and open to more inclusive forms of interactions.

 Memorable Quotes

“The term patronising shares the same root as patriarchy. It shares the same hierarchical system in which the man is in the position of relative power.” — Kim

“When we think of intimidation, let’s look at this not only as victims, but also as perpetrators and bystanders. What can we do when we see intimidation happening?” - Kim

“Where the declarations [against intimidation against women] don't exist, we must create them! Where it is limited, we must expand them!” - Kim

“My message to you in whatever role you are, conduct yourself with grace, adequate preparation, and be fierce!” — Kim

“I think we have a duty to promote good sorority and not let men use this woman's worst enemy are women.” — Adriana