Wireless Networking in Africa
Global connectivity in Africa is in an early stage due to installation costs, insufficient basic infrastructures, low quality of available telecommunication services and limited financial support. The application of wireless technology is an effective choice to overcome some of these problems, at least within smaller areas. This is true even if transmission speeds are lower than the ones achieved by wired networks.
Within a university campus, it is easier to install a radio link system than to place cables or expensive optical fibers in the ground. Furthermore, radio installations are easier to protect from external natural phenomena such as flood, landslide, etc. At first glance, wireless LANs look more expensive than wired LANs, but in the long term they have lower maintenance costs and are relatively easy to configure. The use of Linux and standard radio-communication technologies, in conjunction with the many Linux software applications, makes this task even easier.
With this scenario in mind, the “Programme of Training and System Development on Networking and Radio Communications” was initiated in 1995 at the Abdus Salam ICTP, Trieste, Italy. The objective of this programme is to provide technical assistance and training to academic and scientific institutions in developing countries—institutions with a need for small area computer networks and a connection to the Internet, either directly or through national networks.
The Abdus Salam ICTP in Italy and the Obafemi Awolowo University (OAU) of Ile-Ife in Nigeria agreed to collaborate in the establishment and future evolution of a Pilot Educational and Research Computer Network at OAU. Such a network, based principally on personal computers running Linux, today provides connectivity between several faculties and departments on the campus.
Training technical staff on the hardware (PCs, cabling, radio techniques) and software (network and system administration) took place initially in Trieste. The developmental and simulation work was completed in four months, ending in January 1996, when all the necessary equipment was sent to OAU. The system was installed in April 1996. At that time, staff members of other Nigerian universities came to Ile-Ife in order to benefit from this exercise and be introduced to Linux for the first time. Besides getting acquainted with the new technology, this experience led to further connections to the OAUNET. The campus network has been in operation since June 1996 without any major problems and has proven to be highly beneficial for academic life at the University.
As shown in Figure 1, the wireless campus network (OAUNET) is based on a radio system in the UHF band; it initially involved three separate buildings and had the capacity to be rapidly extended to other university structures. The wireless link uses a spread-spectrum, direct-sequence technique providing data transmission at 2Mbps. The so-called “spread-spectrum” is a digital coding method in which the signal is transformed or spread so that it cannot be received by any receiver except the designated one that understands the transmitted signal code. It minimizes interference to other users and normally does not require an operation license in the ISM (International Scientific and Medical Band), depending on the regulation adopted by the country.
Inside each building, an Ethernet 10-BASE 2 cabling structure is installed in order to keep the initial costs as low as possible (i.e., no hubs, less cable) and to ensure the local availability of spares (BNC), etc. In each of these buildings, a Linux PC acts as “faculty server” and provides mail services for the local users and does routing to the backbone. This strategy has been selected to keep the user-generated traffic local and reduce the access to the main backbone. All services are TCP/IP-based to keep the system as standard as possible with Internet protocols, avoiding future modifications when full connectivity might be provided to the university.
The academic network gateway and the main mail host are located the Department of Computer Science at the university. Due to national regulations and the lack of a permanent connection to the Internet, the gateway is linked on a dial-up base (uucp) using an international direct-dialing line to the ICTP computer network in Trieste, Italy. Software was developed by OAU staff with some assistance from ICTP to refine the basic uucp mail transfer: a custom sendmail delivery program batches mail in intermediate-sized, BSMTP (batch simple mail transfer protocol) formatted files; these files are compressed as much as possible before being transferred over uucp. To cope with telephone line instabilities, a uucp relay was placed in Lagos; the uucp configuration takes care of selecting the path either directly to Trieste or through the Lagos relay, automatically choosing the one that works.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Firefox 46.0 Released
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide