skip to main content
10.1145/1899503.1899554acmconferencesArticle/Chapter ViewAbstractPublication PageshtConference Proceedingsconference-collections
short-paper

Wireless network deployment configurations: Dwesa marginalized area as a case study

Published:11 October 2010Publication History

ABSTRACT

Several technological initiatives have been, and will continue to be implemented across the world to tackle the major barriers in bridging the digital divide. These include the use of Internet and other ICTs. This is seen as a gigantic step in the alleviation of the different paramount social-economic problems, at the same time, in the transformation of the society and realization of a truly free and democratic world society. The use of technology in bridging this gap is a fundamental advancement because it also brings with it a mutual understanding and elimination of differential powers within communities in both developing and developed countries worldwide. This paper describes how different wireless access technologies can be combined and deployed to facilitate a continuous flow of information, in and out of the marginalized areas in developing countries. It further explains again, the major role of having Internet connectivity in these areas and how it's seen as an improvement in successfully deployment of ICT4D activities. Different technologies such as WiFi, WiMAX and VSAT will be explored and discussed for the best wireless deployment configurations for the Siyakhula Living Lab (SLL). SLL was chosen as our test bed and it is located in Dwesa Community. This is one of the deep marginalized rural communities in South Africa found in the Eastern Cape Region.

References

  1. Heeks R, 'ICT and the MDGs: on the wrong track?' I4D, vol. 3, no. 2 (2005) pp 9--12Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Thinyane M, Slay H, Terzoli A, Clayton P: A preliminary Investigation into the Implementation of ICTs in Marginalized Communities, South African Telecommunications Network Applications Conference, Western Cape, South Africa (2006)Tavel, P. 2007Google ScholarGoogle Scholar
  3. Intel (2006)a, Enabling Eye Care in Rural India Research at Intel. Last Accessed August 2009, {Online}. Available: http://www.intel.com/research/eyecareindia.htmGoogle ScholarGoogle Scholar
  4. Available online: http://www.cda.co.za/Manguzi/.../Manguzi%20Wireless%20Internet/Manguzi%20Internet.html Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289--1305. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Rensburg. J. J, Investigation of the deployment of 802.11 wireless networks, MSc thesis from University of Rhodes, (2006)Google ScholarGoogle Scholar
  6. Everett J. L: Introduction to VSATs, Very Small Aperture Terminals, IEEE Telecom Series 28, Peter Peregrinus Ltd, (1992)Google ScholarGoogle Scholar
  7. Sweeny D., WiMAX operator's manual: Building 802.16 Wireless Networks. 2560 Ninth street, Suite 219, Berkley, CA 94710: Apress, (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Alvarion BreezeMAX 3500, System Manual, (2005)Google ScholarGoogle Scholar
  9. Essex D. Wow! Wireless Works! (1999) Last Accessed April. 2009 Available online: http://www.healthcareinformatics.com/issues/1999/10_99/cover.htmGoogle ScholarGoogle Scholar
  10. Theodossis G. T: Broadband on the Move: Facilitating the ICT Revolution (2007) http://www.ifad.org/events/op/2004/mdg.html.Google ScholarGoogle Scholar
  1. Wireless network deployment configurations: Dwesa marginalized area as a case study

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SAICSIT '10: Proceedings of the 2010 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists
      October 2010
      447 pages
      ISBN:9781605589503
      DOI:10.1145/1899503

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 October 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      Overall Acceptance Rate187of439submissions,43%

      Upcoming Conference

      HT '24
      35th ACM Conference on Hypertext and Social Media
      September 10 - 13, 2024
      Poznan , Poland
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader