🖌 Documentation
Session Seven: Understanding the strengths and weakness of various access technologies
In this session, we have Claire and Jane to talk about the different technologies for access and connectivity, to advocate the implementation for technology based on the needs of the community, as well as the regulations surrounding technology and community networks.
In her presentation, Claire spoke of the analogy between the human body and network.
- Backbone: top level connectivity
- Head: network intelligence (where the brain is)
- Backbone, head, and pelvis: core network
- Arms and legs: backhaul (middle mile)
- Fingers and toes: access (last mile)
Claire mentioned that the fingers and toes part - the access part as the emphasis of this session. While the parts can work independently, everything must be joined to work right, which is the importance of fingers and toes, as access or last/first mile. It was also noted that in order for access to work, there is a need for electricity.
Access can be connected using wires (cooper or optic fibre), or wireless (terrestrial or satellite). Claire asked the participants, what are the pros and cons of wired and wireless connections. Participants offered their insights.
Wired connections
Pros |
Cons |
No packet loss Speed and stability Always on (where there is no load shedding) If connections are available nearby, not too expensive No spectrum requirement High capacity and range for optic fibre Reliable (especially underground) Can last week if protected from hazards |
Cost (material, expensive to repair and install) Debugging No mobility Difficult to trace the problem because too many wires Lack of proper cable labelling The installation often needs regulatory permission and landowner agreement One termination serves one location Fixed to one spot Breakages can take time to find and mend |
Wireless connections
Pros |
Cons |
Mobility Network topography is more optimised, such as mesh networks Easy to expand and cover a wide area Good network Spectrum saturation with wifi bands Initial installation can be at a low cost One access point can serve many users Mobility at varying amounts End-user equipment is now often at a low cost Points where failure may occur, are mostly known |
Easy interference Could be affected by weather High cost of third party e.g. towers Difficult to maintain Pollutes the sky (satellite) Needs spectrum, which must be managed to avoid interference (wifi typically uses unlicensed spectrum) Installation may need regulatory permission and a landowner agreement Both network and user equipment may be expensive |
Claire then spoke about the difference between wired vs wireless connections for community networks. Both connections may need operational licensing. Wired connections may work well in urban areas where there are existing cables, many people already live close together and might be expensive. On the other hand, wireless is often better for community networks, because it allows for a wide length of cable to be spread, and or primarily works well in areas where people live in small groups and far apart. It also would work well where very little money is needed. The wireless options for CNs include satellite, cellular mobile, and wifi.
Jane then took over to speak about policy and regulations surrounding access in community networks. In many cases, policy and regulation can sometimes delay network deployment. The strengths and weaknesses of various technologies may be impacted by the readiness of regulators and policymakers. As such, it is important to know the environment and to conduct a community readiness assessment before deciding the kind of technology to deploy in your community networks.
Jane asked the participants - especially those who have built their own networks - what they look for when deploying the networks. Some answers:
- Understanding the area, the needs of the community, and the potential of the connectivity in terms of economy and sustainability — especially when it is a pilot project and the area is quite remote and isolated from others
- Gain community’s trust, do topographical study, knowledge building workshops and then deploy
- Training and capacity building for the local people involved in the deployment
- Community readiness assessment — having some form of methodology to assess the needs of the community before network deployment (Dani shared the resource “Let us rethink communication technologies. Methodological proposals to design and implement community communication projects”: https://www.redesac.org.mx/_files/ugd/68af39_4bda81212a9c42c4b15f43c9a1e208f7.pdf )
The session concluded with Claire and Jane summarising the input, and Cynthia invited the participants to reimagine more creative solutions to centre the environmental changes that are happening in the design of our community networks — how can we design a network that is environmentally and communally sustainable?
Memorable Quotes
“The word backhaul comes from the haulage industry, where lots of trucks full of fruits were taken out from the orchard to markets, and back. Backhaul is what you put in the truck.” — Claire
“In Bhutan, you can see all of these white prayer flags underneath the microwave satellites. Reminds me of other means of long-distance communication besides the physical ones.” — Claire
“In the community network we work with, it is important to have the conversation with the people to understand their values and the technology. We told them that the tech we are deploying is not necessarily better than what they already have, and we are careful not to frame the Internet as the saviour for them.” — Brunz
Session Eight: Language is political. Hacking the language of intimidation
In this session, Kim and Karla introduced strategies and tools to suppress language that impedes policy development and advocacy efforts. They also shared intimidatory examples drawing on their own experiences at ITU’s Plenipotentiary Conference and WTDC 2022. Participants were also invited to share their own experiences in handling difficult experiences and spaces.
Kim started the session by asking the participants about their first thought when we mentioned ‘intimidation’. A few examples were thrown in: fear, oppression, ego, power play, control, discrimination, bullying, fail, alienation, selfish, threat, and many others. Kim then shared a few official definitions of ‘intimidation’ from a few sources. Intimidation, in a summary, can be defined as a serious act or course of conduct directed at a specific person that can frighten, or cause fear or apprehension in such a person, in order to persuade them to do something you want them to do. In order to illustrate the examples of intimidation better, Kim shared a video called That Little Voice https://www.youtube.com/watch?v=Ll56imVATLk
Language of intimidation can go across many domains, and they involve power and control. The language can be masculinised (induce manly physiological characteristics to exert power), primacy (the state of being above others in rank or importance), gender-based violence (harmful acts directed at an individual based on their gender) and enthusiastic consent (looking for the presence of ‘yes’ rather than the absence of ‘no’). Kim also shared a few examples of patronising language and its alternatives, which include ‘relax’, ‘you know’, ‘I hear you but’, ‘actually’, and many others. Language can also be used to exert power through many means. Some examples include rhetorical questions, tautology, prevarication, emotive language, and many others.
Intimidation takes all forms and can manifest in many dimensions, not just through written and spoken language. They can be seen in expressions (verbal or non-verbal), vocabulary (patronising, chauvinistic, technical etc.), context (in the workplace, home etc.), and target (race, sex, gender, sexuality, age etc.). Due to intimidation, many people can experience fear, disempowerment, self-doubt, and low confidence. More importantly, it can also extend to overall low functioning and capping potential to achieve objectives including those related to community network advocacy, planning, deployment and operations. As such, Kim urged for all of us to be cautious not only of intimidation caused to us (as victims) but also of the way we ourselves may have inadvertently perpetrated it (perpetrator) and just casually observing it (bystander) without contributing to anything that might help hinder it.
In this session, Kim also took the time to announce the appointment of Doreen Bogdan-Martin as the new Secretary-General Elect of the International Telecommunication Union, the first woman to lead the ITU in 157 years of history. Doreen’s appointment is monumental for the inclusion of more women and gender-diverse folks in the ITU, where their voices will be more heard and considered.
Kim and Karla then shared their experiences at WTDC in Kigali, Rwanda. Kim shared her experiences having to chair the group of the digital inclusion cluster, particularly in gender mainstreaming. She was fully prepared and made sure everything was in place for the stakeholder consultation, including sending comprehensive emails outlining the process, ensuring equal representation to all participants (including those participating virtually), and starting on time. She also made sure that her personal biases and position never factored in how she chaired the session. In short, she was fair, firm, uniform in her treatment, fully prepared, and made sure that everyone had ample opportunities to voice out.
At the end of the session, participants took the time to share their own experiences and strategies. Cynthia closed the session by inviting the participants to rethink how to create and hack spaces that are more harmonious and open to more inclusive forms of interactions.
Memorable Quotes
“The term patronising shares the same root as patriarchy. It shares the same hierarchical system in which the man is in the position of relative power.” — Kim
“When we think of intimidation, let’s look at this not only as victims, but also as perpetrators and bystanders. What can we do when we see intimidation happening?” - Kim
“Where the declarations [against intimidation against women] don't exist, we must create them! Where it is limited, we must expand them!” - Kim
“My message to you in whatever role you are, conduct yourself with grace, adequate preparation, and be fierce!” — Kim
“I think we have a duty to promote good sorority and not let men use this woman's worst enemy are women.” — Adriana