Wireless Networking in Africa
Previous in-house experiences with the UNIX system (SunOS and Sun Solaris) led us to test, within the project, the commercial Solaris 2.4 (x86 version) and Linux. While this version of Solaris required specific hardware components to function on the available (486) PCs, Linux was found to be more flexible than Solaris in terms of hardware compatibility and low memory requirements. On top of that, the possibility of having high-quality free compilers and software applications motivated us to continue using Linux. In 1995, Windows NT was just starting to become popular, so this possibility was not considered. At that time, Linux was also unknown in the Nigerian academic world. The main operating systems available there were MS-DOS and Windows 3.1.
The Linux distribution chosen was Slackware. Although more difficult to install than other distributions, right from the first trials the system configuration (start-up scripts, etc.) was easier to locate, understand, manage and, most importantly, to teach. After a whole cycle of Linux setup experiences and training, autonomous management of all aspects is today a reality. Part of the system installed at the OAU is shown in Figure 2.
In order to achieve campus wireless connectivity, the requirements needed from the system administrator's point of view were to have a network working all day and night, the least amount of human intervention and reasonable throughput (bandwidth). The technology adopted to do this job was, as mentioned above, spread spectrum.
The first attempts were implemented using a direct-sequence, spread-spectrum card supported by the Linux kernel. Most recently, alternative spread-spectrum equipment that does not require Linux kernel support is being tested, not because of Linux unreliability, but because this new equipment has an Ethernet interface instead of an ISA (industry standard architecture) card that plugs into a PC. This configuration makes the installation of a wireless link much easier and more flexible, because you can place the radio unit very close to the antenna (keeping attenuation very low) and connect it to the PC using a UTP (unshielded twisted pair) cable. In the case of an ISA card, the RF output is at the rear of the PC, and it is there that the antenna is connected. Due to the small output power and the attenuation of the cable, it is not advisable to use more than 10m of coax. This new equipment uses a different spreading method called frequency hopping and provides a higher bandwidth.
The possibility of using packet radio technologies, which are well supported and documented under Linux (AX-25 HOW-TO), was analyzed at the beginning of the project. However, due to the specific training required, implementation of this technology was postponed. An advantage of the present spread-spectrum installation (running two years without major interventions) is that it is almost plug, play and go.
The local network is stable and does not suffer if there is a failure of the main power supply, because a standby generator and UPS facilities are available. The number of registered users of the network increased from 150 in August 1996 to about 290 in September 1996 to more than 600 at present.
Campus-wide services such as e-mail, FTP, WWW and NFS are available today within the OAUNET. As connection to the rest of the world is done on a dial-up line, only e-mail exchange is provided freely to local users. There is no limitation on the amount and size of the information being transferred on campus.
Some of the communication applications like TALK or WRITE became important due to poor performance of the local PABX (private automatic branch exchange). For example, after the launch of the network, people who used to walk to another location to speak with an administrative officer or colleague now enjoy a TALK between two buildings located a few kilometers apart. To reduce bandwidth usage, only text-based conference tools are implemented. We will also experiment with voice-over input in the future.
All of these new communication tools are certainly providing a revolutionary change in the local academic life.
The next phase of the wireless network requires the installation of other Internet services on the OAUNET. For example, arrangements are being made to provide connectivity to the library and other faculties such as Agriculture.
The success of the Ile-Ife experience stimulated cooperation with other Nigerian universities. A large program of cooperation with the National Universities Commission for the establishment of a national academic network started in 1996 and is still progressing. Linux is part of the technical basis of this activity. The most interesting applications of radio have been in individual universities. Among these is the Bayero University (Kano) which decided to build a link to connect the new campus with the old campus of the university (about 9 kilometers). This connection was implemented using commercial wireless equipment and two Linux machines as routers, with one of them as the whole university mail server and uucp gateway.
Following these results, a series of additional proposals have been received at our headquarters in Trieste. The first of these new projects, being carried out in Ghana in collaboration with countries such as the Democratic Republic of Congo, Ivory Coast and Morocco, will begin soon.
These initial experiences with Linux in Africa are proof of the success and reliability of Linux.
Any of the authors can be reached at email@example.com.
Dr. Enrique Canessa is a theoretical physicist currently working as a scientific consultant at the ICTP. His main areas of research and interest are in the field of Condensed Matter and scientific software applications. He has been lost in the Internet since 1987.
Mr. Fulvio Postagna is an Electrical Engineering student at the University of Trieste and a Scientific Consultant at the ICTP. He has been a radio amateur since high school and has carried out radio and telecommunications studies. He enjoys upgrading the Linux kernel for our wireless communications.
Mr. Carlo Fonda is a Physics student at the University of Trieste, a Scientific Consultant at the ICTP and radio amateur. From time to time he visits our laboratory after long walks in the marvelous Trieste countryside. He also sends us greetings via radio and enjoys drawing.
Professor Gabriel O. Ajayi works in the Department of Electronic & Electrical Engineering of the Obafemi Awolowo University. Besides computer networking using wireless radio techniques, his main research topics include rain attenuation on earth-satellite paths in the tropical regions.
Professor Sandro Radicella is head of the Aeronomy and Radiopropagation Laboratory and coordinator of the Programme of Training and System Development on Networking and Radiocommunications at the ICTP. His interests include, among others, radiopropagation issues and the relationship between social and economic development and telecommunications.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide