0% found this document useful (0 votes)
32 views40 pages

Question One

Uploaded by

Ferdinard Mambo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views40 pages

Question One

Uploaded by

Ferdinard Mambo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 40

SCHOOL OF ENGINEERING,ENERGY AND BUILT ENVIRONMENT

DEPARTMENT OF ENERGY AND ENVIRONMENTAL ENGINEERING

BACHELOR OF SCIENCE IN REAL ESTATE MANAGEMENT

UNIT:INFORMATION COMMUNICATION TECHNOLOGY

CODE:BIT4116

GROUP PRESENTATION:GROUP 5

GROUP 5 MEMBERS ARE AS FOLLOWS;

1.FERDINARD MAMBO BRM/2022/51452

2.JOHN MUNEENI BRM/2022/51108

3.CLAIRE KARIMI BRM/2022/50715

4.KELVIN MACHARIA BRM/2018/84233

5.EMMANUEL ISOBOKE BRM/2023/72675

QUESTION ONE
QN 1(a)What does the constitution of kenya 2010 say about access to information in articles 33,35 and 232?

Article 33 of the Constitution of Kenya 2010 is about freedom of expression. It states that every person has
the right to freedom of expression, which includes the freedom to seek, receive or impart information or
ideas

Article 35 of the Constitution of Kenya 2010 addresses the right to access information. Let’s delve into the
details:
1. Access to Information:
o Every Citizen’s Right: Article 35 grants every Kenyan citizen the right of access to
information. This includes information held by the State (government) and information held
by private entities that is necessary for the exercise or protection of any right or fundamental
freedom.
o Correction or Deletion: Additionally, every person has the right to request the correction or
deletion of untrue or misleading information that affects them. This provision ensures that
individuals can rectify inaccuracies in their personal data.
2. Transparency and Accountability:
o State Obligation: The State is obligated to publish and publicize any important information
affecting the nation. This promotes transparency, accountability, and informed decision-
making.
o Empowering Citizens: By granting access to information, Article 35 empowers citizens to
actively participate in governance, hold public officials accountable, and make informed
choices. It also supports investigative journalism and civil society efforts to promote good
governance and combat corruption.
3. Article 232 of the Constitution of Kenya 2010 pertains to the values and principles of public service. It does
not directly address access to information. However, it does emphasize the need for transparency and
provision of timely and accurate information¹. This can be seen as supporting the broader framework of access
to information within the public service sector. For specific rights regarding access to information, you would
refer to Article 35, which I described earlier

Article 33 of the Constitution of Kenya 2010 enshrines the right to freedom of expression, which is a
fundamental aspect of access to information. It guarantees every person the right to seek, receive, or impart
information or ideas, freedom of artistic creativity, and academic freedom and freedom of scientific
research. However, this right is not absolute and does not extend to propaganda for war, incitement to
violence, hate speech, or advocacy of hatred that constitutes ethnic incitement, vilification of others, or
incitement to cause harm. In exercising this right, individuals must respect the rights and reputation of
others, ensuring a balance between freedom of expression and the protection of societal values.

Article 35 specifically addresses the right of access to information. It stipulates that every citizen has the
right to access information held by the State and information held by another person that is required for the
exercise or protection of any right or fundamental freedom. Additionally, it provides for the right to
correction or deletion of untrue or misleading information that affects a person. The State is also mandated
to publish and publicize any important information affecting the nation, which underscores the commitment
to transparency and accountability in governance.

Article 232 outlines the values and principles of public service, which indirectly relate to access to
information. It emphasizes the need for high standards of professional ethics, efficient and effective use of
resources, and the provision of services in a responsive, prompt, impartial, and equitable
manner.Importantly, it includes the principle of transparency and the provision to the public of timely and
accurate information. This article ensures that the public service operates in a manner that is open and
accountable to the public, reinforcing the rights provided under Articles 33 and 35.
QN 1 (b)How does Article 31 of the constitution of Kenya 2010 attempt to put a disclaimer that balances out the
previous Articles?

Article 31 of the Constitution of Kenya 2010 focuses on the right to privacy. It serves as a balance to the
freedoms expressed in the previous articles by setting boundaries to protect individuals' personal spaces and
information. Here's what Article 31 states:

Every person has the right to privacy, which includes the right not to have:

- (a) their person, home, or property searched;

- (b) their possessions seized;

- (c) information relating to their family or private affairs unnecessarily required or revealed; or

- (d) the privacy of their communications infringed³.

This article ensures that while citizens have the right to access information and freedom of expression, these
rights do not infringe upon the privacy of individuals. It creates a legal framework that respects and protects
personal boundaries while upholding the principles of transparency and freedom enshrined in the
Constitution¹.

Article 31 of the Constitution of Kenya 2010 is a critical provision that serves as a counterbalance to the
freedoms outlined in Articles 33, 35, and 232, by emphasizing the right to privacy. It ensures that while the
state and individuals have obligations and rights to freedom of expression and access to information, these
do not infringe upon an individual’s personal space and private life. Specifically, Article 31 protects against
unlawful searches of a person, their home, or property; seizure of possessions; unnecessary revelation of
family or private affairs; and infringement of communication privacy. This article is a disclaimer that sets
boundaries to safeguard individuals from the potential overreach that could arise from the application of the
other articles.

In relation to Article 33, which deals with freedom of expression, Article 31 ensures that this freedom does
not extend to violating someone’s privacy. For instance, while individuals have the right to impart
information, they must not do so in a way that intrudes on another’s private life. Similarly, Article 35 grants
citizens the right to access information held by the state or required for exercising rights, but Article 31
ensures that this access does not compromise personal data privacy.

Article 232 lays out the values and principles of public service, including transparency and the provision of
timely and accurate information. However, Article 31 ensures that the pursuit of transparency does not come
at the cost of violating individual privacy. Public servants must respect the privacy rights of individuals even
as they adhere to the principles of accountability and openness. Thus, Article 31 acts as a necessary check,
maintaining a delicate balance between the need for an open government and the protection of individual
privacy rights.

QN 1(c)Apart from the constitution of Kenya 2010,what other laws and government policies govern the usage
of ICT within territorial boundaries of kenya?(Discuss any five(5)

In Kenya, apart from the Constitution of Kenya 2010, there are several laws and government policies that
govern the usage of information and communication technology (ICT) within the country's territorial
boundaries. Here are some of the key ones:

1. National Information, Communications and Technology (ICT) Policy: This policy outlines the
government's approach to the design, development, acquisition, deployment, operation, support, and
evolution of public and private ICTs¹.
The National Information, Communication and Technology (ICT) Policy of Kenya has been instrumental in
governing the usage of ICT within the country's territorial boundaries. It has provided a comprehensive
framework that aligns with Kenya's Vision 2030, aiming to transform the nation into a knowledge-based
economy. The policy emphasizes a 'Mobile First' strategy, recognizing the widespread adoption of mobile
technology and its potential to drive socio-economic development. It also focuses on creating a favorable
market environment that encourages innovation, skills development, and public service delivery through
ICT. By setting out the operational environment and regulatory background, the policy has enabled the
expansion of ICT infrastructure, thus facilitating access to digital services and promoting digital literacy
among Kenyans.

Additionally, the policy has set forth objectives to grow the ICT sector's contribution to the economy and
establish Kenya as a hub for data centers, Internet of Things (IoT), and local manufacturing. It underscores
the importance of security within the ICT ecosystem and fosters an environment conducive to innovation.
The policy also highlights the role of ICT in achieving Sustainable Development Goals and improving
access to government services, ensuring that the benefits of ICT are enjoyed by all citizens. Through these
strategic directives, the National ICT Policy has not only governed the usage of ICT but has also propelled
Kenya towards becoming a regional leader in technological innovation and efficiency.

2. Kenya Information Communication Act: This act provides regulations for telecommunication services,
duties of telecommunications operators and subscribers, and other related matters.
Kenya Information Communication Act has played a pivotal role in shaping the landscape of ICT within
Kenya's territorial boundaries. It has established a regulatory framework that governs telecommunications
services, ensuring that operators and subscribers adhere to set standards and practices. This act has
facilitated the liberalization of the telecommunications sector, inviting private enterprises and fostering
competition, which has been instrumental in improving the quality and accessibility of ICT services across
the nation. The act also addresses issues related to consumer protection, privacy, and the responsible use of
technology, contributing to a robust and dynamic ICT environment.

Furthermore, the act has been amended to keep pace with the evolving digital landscape, addressing
contemporary challenges such as cybercrime, data protection, and digital taxation. For instance, the
introduction of the Digital Services Tax and the Personal Data Protection Act reflects the government's
commitment to protecting citizens' data and ensuring fair taxation in the digital economy. These legislative
measures have not only enhanced Kenya's ICT infrastructure but also supported the country's Vision 2030
by promoting technological innovation and ensuring that ICT remains a key driver of economic growth and
social development.

3. ICT Sector Policy: Published by the Communications Authority of Kenya, this policy replaced the
Telecommunications and Postal Sector Guidelines of December 2001 and outlines the priorities for the ICT
sector in supporting the realization of Vision 2030
The ICT Sector Policy in Kenya has been a cornerstone in the governance and usage of ICT within the
country's territorial boundaries. It has provided a strategic direction for the growth and development of the
ICT sector, aligning with the national development agenda outlined in Kenya's Vision 2030. The policy
emphasizes the importance of a mobile-first approach, ensuring that mobile technologies are leveraged to
drive socio-economic development. It also focuses on creating a conducive market environment that fosters
innovation and skills development, while enhancing public service delivery through the use of ICT. By
addressing the operational environment and regulatory background, the policy has facilitated the expansion
of ICT infrastructure, enabling widespread access to digital services and promoting digital literacy among
the population.

Moreover, the policy has set ambitious targets to grow the contribution of ICT to the economy, aiming to
reach 10% by 2030. It seeks to establish Kenya as a hub for data centers, Internet of Things (IoT), machine
learning, and local manufacturing, while fostering a secure and innovative ecosystem. The policy also
underscores the significance of regional and international cooperation, positioning Kenya to harness global
opportunities and trends such as the shared and gig economy. Through these strategic initiatives, the ICT
Sector Policy has not only governed the usage of ICT but has also propelled Kenya towards global
recognition for innovation, efficiency, and quality in public service delivery.

Kenya information and communication(interconnection) regulations,2022

The Kenya Information and Communications (Interconnection) Regulations, 2022 play a crucial role in
governing the usage of ICT within Kenya’s territorial boundaries. These regulations provide a framework for
interconnection between different telecommunications service providers, ensuring fair competition, efficient
network connectivity, and seamless communication. Let’s explore the key aspects:

1. Purpose and Scope:


o The regulations aim to promote fair and efficient interconnection between telecommunications
licensees. They facilitate the exchange of traffic, data, and services across networks.
o The scope covers various aspects, including negotiation of interconnection agreements,
principles of interconnection, the role of the regulatory authority, and obligations of dominant
telecommunications service licensees.
2. Principles of Interconnection:
o The regulations emphasize several fundamental principles:
 Non-Discrimination and Transparency: All licensees must treat each other fairly and
transparently during negotiations and execution of interconnection agreements.
 Interconnection Charging Structure: The regulations define how charges for
interconnection services should be structured, ensuring cost-based pricing.
 Quality of Service: Licensees must maintain specified quality standards for
interconnection services.
 Confidentiality: Protection of trade secrets and sensitive information during negotiations.
 Calling Line Identity: Ensuring that calling numbers are correctly transmitted across
networks.
 Modification, Suspension, and Termination: Procedures for modifying, suspending, or
terminating interconnection agreements.
3. Role of the Regulatory Authority (Communication Authority of Kenya):
o The regulations empower the authority to:
 Facilitate and intervene in negotiations where necessary.
 Issue guidelines related to interconnection.
 Review and update interconnection guidelines periodically.
 Investigate contraventions of laws, guidelines, and interconnection agreements.
4. Dominant Telecommunications Service Licensee:
o The regulations address the obligations of dominant players in the industry.
o A dominant telecommunications service licensee must publish an interconnection offer, provide
unbundling options, and avoid abuse of dominance.
o Cost-based charges for interconnection services are essential to ensure fair competition.
5. Dispute Resolution:
o The regulations establish mechanisms for resolving disputes related to interconnection.
o Disputes may arise from disagreements over terms, quality of service, or compliance with
agreements.
o Timely resolution ensures smooth operations and fair treatment for all parties involved.

In summary, the Kenya Information and Communications (Interconnection) Regulations, 2022 promote
efficient, transparent, and equitable interconnection practices among telecommunications service providers.
By adhering to these regulations, Kenya fosters a robust and competitive ICT ecosystem.

E-Government strategy

Certainly! The E-Government Strategy in Kenya outlines a comprehensive framework for leveraging
Information and Communications Technology (ICT) to enhance government operations, improve service
delivery, and promote transparency. Let’s delve into the details:

1. Objectives of the E-Government Strategy:


o Enhancing Transparency and Accountability: The strategy aims to make government
processes more transparent by providing citizens with easy access to information. Through
online portals, citizens can track government activities, budgets, and decision-making
processes.
o Efficiency and Citizen-Centric Services: E-Government focuses on streamlining
administrative processes. By digitizing services, citizens can access government information,
apply for permits, pay taxes, and interact with government agencies online. The goal is to
make services citizen-centric, efficient, and responsive.
o Empowering Citizens and Businesses: The strategy seeks to empower citizens and businesses
by enabling them to access government services and information efficiently. Whether it’s
applying for licenses, checking land records, or accessing health services, e-Government
ensures equal access for all.
2. Implementation and Institutional Framework:
o The strategy outlines an institutional framework to oversee and coordinate e-Government
initiatives:
 Cabinet Committee on ICT: At the apex, this committee oversees the implementation
of the strategy.
 Permanent Secretaries ICT Committee: This committee coordinates e-Government
initiatives across ministries and departments.
 Ministry-Level e-Government Committees: Each ministry reviews ICT projects,
audits IT capacity, and identifies gaps.
 Directorate of e-Government: Responsible for coordinating and preparing the e-
Government Strategy, implementation plan, and monitoring progress.
o The strategy emphasizes training and change management to equip government personnel
with the necessary skills for effective e-Government implementation.

In summary, Kenya’s E-Government Strategy aims to transform government operations, enhance citizen
engagement, and improve service delivery through ICT. By promoting transparency, efficiency, and
accessibility, e-Government contributes to Kenya’s development goals and empowers citizens and
businesses.

These laws and policies are designed to ensure that ICT services are used in a way that is beneficial to the
citizens and the economy, while also safeguarding against misuse and ensuring data privacy and security.

QN 1(d)Discuss five(5) reasons why ICT usage has to be regulated in any country

Regulating Information and Communication Technology (ICT) usage is essential for several reasons, and
here are five detailed explanations:

1. Data Privacy and Protection:


The digital age has made data a valuable commodity. With vast amounts of personal information being
collected, stored, and processed by various entities, the potential for abuse is significant. Regulations like the
General Data Protection Regulation (GDPR) in Europe provide a framework for data handling, ensuring that
individuals have control over their personal information. These regulations mandate consent for data
collection, provide rights for data access and erasure, and impose strict penalties for breaches. They protect
individuals from identity theft, financial fraud, and privacy invasion, which could result from mishandled
data.
2. Cybersecurity:
As ICT systems become integral to national infrastructure, the threat of cyber attacks grows. These can
range from disrupting essential services like healthcare and banking to compromising national security.
Regulations enforce cybersecurity standards, requiring organizations to implement robust security measures
such as firewalls, encryption, and regular audits. They also mandate reporting of breaches, ensuring that
affected parties are informed and can take protective action. This regulatory environment helps to prevent
attacks, minimize damage, and maintain public trust in ICT systems.

3. Consumer Rights and Fair Competition:


In the absence of regulation, monopolistic practices could emerge, stifling innovation and leading to
unfair pricing. Regulations ensure that consumers have access to a variety of services and that new entrants
can compete in the market. They protect consumers from unfair terms of service, misleading advertising,
and substandard products. Regulatory bodies can enforce antitrust laws, investigate anti-competitive
behavior, and promote a healthy market dynamic that benefits both consumers and the industry.

4.Content Management:
The internet is a vast repository of information, not all of which is beneficial or legal. Regulations help
manage online content, curbing the spread of harmful material such as child exploitation, hate speech, and
incitement to violence. They also combat digital piracy, protecting the rights of content creators. By setting
content standards, regulations ensure that the internet remains a safe space for users, particularly minors, and
supports the ethical distribution of digital content.

5.Sustainable Development:
ICT equipment manufacturing and disposal can have significant environmental impacts. Regulations can
enforce the responsible design, use, and recycling of electronic devices, reducing electronic waste and
promoting sustainability. They can also encourage the development of energy-efficient technologies,
contributing to efforts to combat climate change. By integrating environmental considerations into ICT
policies, regulations help ensure that the growth of the digital economy is sustainable and does not come at
the expense of the planet's health.

In conclusion, the regulation of ICT usage is multifaceted and vital for protecting individuals, ensuring
national security, maintaining a fair and competitive market, managing online content, and promoting
sustainable development. As technology continues to advance, these regulations must evolve to address new
challenges and opportunities.

QUESTION TWO
(a)The word internet was coined from two distinct words INTERconnection and NETwork.Explain how the
internet works in order to enable information to be accessible worldwide.

Definition of Interconnection –it refers to the linking or connection of multiple systems or devices together
to enable communication or exchange of information between them.It involves establishing pathways or
channels through which data can flow between entities.
Definition of Network-it is a collection of interconnected systems,devices or nodes that are linked together
to share resources such as data ,information or services.Network can be physical like cables and voulers,or
virtual,like connection established over the internet.

In the context of internet,interconnection and network come together to form a vast global system of
interconnected devices and infrastructure that allows for the exchange of data and communication across the
world.

Definition of Internet-it is a network of computer networks all across the world that are connected. The
purpose of the internet is to send data between different computer.

The internet is a global network of interconnected devices that allows information to flow seamlessly across
the globe. Here’s a detailed breakdown:

1. Hardware Infrastructure:
o Transmission Lines: The internet relies on physical infrastructure such as fiber-optic cables,
satellites, and cell towers. These transmission lines carry data signals across vast distances.
o Routers and Switches: At various points along the network, routers and switches direct data
packets to their intended destinations. Think of them as traffic controllers for internet data.
2. Data Packets and Protocols:
o Data Packets: When you send an email, stream a video, or load a webpage, your data is
broken down into smaller chunks called packets. Each packet contains a piece of your
message.
o Protocols: These are sets of rules that machines follow to complete tasks. The most
fundamental protocol on the internet is the Internet Protocol (IP). It assigns unique addresses
(IP addresses) to devices and ensures data packets find their way to the right destination.
3. Routing and Domain Name System (DNS):
o Routing: When you request a webpage, your data packets travel through various networks.
Routers analyze the destination address and forward packets along the most efficient path.
o DNS: Imagine the internet as a giant phone book. The Domain Name System (DNS)
translates human-friendly domain names (like “google.com”) into IP addresses. When you
type a URL, DNS servers resolve it to the correct IP address, allowing your browser to find
the website.
4. Client-Server Model:
o Clients: These are your devices (computers, smartphones, tablets). They request information
from servers.
o Servers: Servers store and serve data. When you visit a website, your browser acts as a client,
requesting web pages from servers.
5. HTTP and HTTPS:
o HTTP (Hypertext Transfer Protocol): This protocol governs how web browsers and servers
communicate. When you visit a non-secure website (e.g., “http://example.com”), your data
packets travel using HTTP.
o HTTPS (Hypertext Transfer Protocol Secure): For secure communication, websites use
HTTPS. It encrypts data between your browser and the server, ensuring privacy and
preventing eavesdropping.
6. Web Pages and Content Delivery:
o When you click a link or enter a URL, your browser sends an HTTP request to the server
hosting the website.
o The server processes the request, retrieves the relevant web page (which may include text,
images, videos, and scripts), and sends it back to your browser as data packets.
o Your browser assembles the packets, renders the web page, and displays it on your screen.

In summary, the internet is a vast interconnected system where data travels in packets, guided by protocols
and routed through various devices. Whether you’re reading this explanation, watching a cat video, or
collaborating with colleagues across the world, it’s all thanks to the intricate dance of data packets and the
underlying infrastructure that makes the internet accessible worldwide.

(b)Using a well labbelled-diagram explain the principle of packet switching used to transmit signals via the
internet

Principle of Packet Switching


1. Data Division into Packets:
o When you send information over the internet (such as a web page request or an email), the data is first
divided into smaller chunks called packets.
o Each packet contains a portion of the original data, along with additional information in its header.

2. Header Information:
o The header of each packet includes essential details:
 Source Address: The IP address of the sender.
 Destination Address: The IP address of the intended recipient.
 Sequence Number: Helps reassemble packets in the correct order.
 Checksum: Ensures data integrity during transmission.

3. Routing and Switching:


o The packets travel through various network devices, such as routers and switches.
o These devices examine the header information to determine the best path for each packet.
o Routers make decisions based on routing tables and algorithms to forward packets toward their destination.

4. Variable Routes:
o Unlike traditional circuit-switched networks, where a dedicated path is established for the entire
communication, packet switching allows packets to take different routes.
o This flexibility ensures efficient use of network resources and resilience against failures.

5. Buffering and Queuing:


o As packets traverse the network, they encounter buffering and queuing at each router.
o Routers temporarily store incoming packets in buffers before forwarding them.
o Queues prioritize packets based on factors like quality of service (QoS) requirements and congestion levels.

6. Store-and-Forward Process:
o Routers use a store-and-forward mechanism:
 They receive a packet.
 Check its header.
 Store it in a buffer.
 Forward it to the next hop.
o This process ensures reliable delivery and error handling.
7. Reassembly at Destination:
o When packets reach their destination, they are reassembled based on their sequence numbers.
o The receiving device extracts the payload from each packet and reconstructs the original data.

Packet Switching in computer networks is a method of transferring data to a network in the form of
packets. In order to transfer the file fast and efficiently over the network and minimize the transmission
latency, the data is broken into small pieces of variable length, called Packet. At the destination, all these
small parts (packets) have to be reassembled, belonging to the same file. A packet is composed of a
payload and various control information. No pre-setup or reservation of resources is needed.
Packet Switching uses the Store and Forward technique while switching the packets; while forwarding the
packet each hop first stores that packet then forwards. This technique is very beneficial because packets
may get discarded at any hop for some reason. More than one path is possible between a pair of sources
and destinations. Each packet contains the Source and destination address using which they independently
travel through the network. In other words, packets belonging to the same file may or may not travel
through the same path. If there is congestion at some path, packets are allowed to choose different paths
possible over an existing network.
Diagram of Packet Switching
In packet switching the data is divided into small packets which allow faster movement of data. Each
packet contains two parts that is Header and Payload, the header on each packet conation information.
Below is the diagram of how packet switching works .

Packet Switching

Types of Delays in Packet Switching


 Transmission Delay: Time required by the spentstation to transmit data to the link.
 Propagation Delay: Time of data propagation through the link.
 Queueing Delay: Time spent by the packet at the destination’s queue.
 Processing Delay: Processing time for data at the destination.
Advantages of Packet Switching over Circ

Types of Packet Switching


1. Connection-oriented Packet Switching (Virtual Circuit)
Before starting the transmission, it establishes a logical path or virtual connection
using a signaling protocol, between sender and receiver and all packets belongs to
this flow will follow this predefined route. Virtual Circuit ID is provided by
switches/routers to uniquely identify this virtual connection. Data is divided into
small units and all these small units are appended with help of sequence numbers.
Packets arrive in order at the destination. Overall, three phases take place here-
The setup, data transfer and tear-down phases.

Virtual Circuit

All address information is only transferred during the setup phase. Once the route
to a destination is discovered, entry is added to the switching table of each
intermediate node. During data transfer, packet header (local header) may contain
information such as length, timestamp, sequence number, etc.
Connection-oriented switching is very useful in switched WAN. Some popular
protocols which use the Virtual Circuit Switching approach are X.25, Frame-Relay,
ATM, and MPLS(Multi-Protocol Label Switching).
2. Connectionless Packet Switching (Datagram)
Unlike Connection-oriented packet switching, In Connectionless Packet Switching
each packet contains all necessary addressing information such as source address,
destination address, port numbers, etc. Packets belonging to one flow may take
different routes because routing decisions are made dynamically, so the packets
that arrived at the destination might be out of order. It has no connection setup
and teardown phase, like Virtual Circuits.
Packet delivery is not guaranteed in connectionless packet switching, so reliable
delivery must be provided by end systems using additional protocols.
Datagram Packet Switching

A—R1—R2—BA is the sender (start)R1, R2 are two routers that store and forward
dataB is receiver(destination)
To send a packet from A to B there are delays since this is a Store and Forward
network.

(c)Explain the role of undersea cables (i.e submarine communication cables) in the transmission of internet
traffic

These fiber-optic cables lie on the ocean floor and serve as the backbone of international communications.
Let’s delve into their critical role:

1. Global Connectivity:
o Undersea cables connect continents, enabling seamless data transmission across the world.
They carry a vast majority of international internet traffic, including emails, webpages, video
calls, and streaming services.
o For example, when you send an email from Kenya to the United States or stream a movie
from Europe, chances are the data travels through undersea cables.
2. High-Speed Data Transmission:
o Undersea cables provide high bandwidth and low latency. Unlike satellite communication,
which introduces significant delays due to signal travel time, cables offer near-instantaneous
data transfer.
o The speed of light in fiber-optic cables allows for rapid transmission, making them ideal for
real-time applications.
3. Capacity and Redundancy:
o These cables have immense capacity, measured in terabits per second (Tbps). They can
handle massive data flows simultaneously.
o To ensure reliability, multiple cables connect continents, creating redundancy. If one cable is
damaged (due to natural disasters or other factors), traffic automatically reroutes through
alternate paths.
4. Examples of Undersea Cables:
o SEA-ME-WE 5: This cable system connects Southeast Asia, the Middle East, and Western
Europe. It spans over 20,000 kilometers and provides critical connectivity for countries along
its route.
o Transatlantic Cables: Cables like MAREA (between the U.S. and Spain) and HAVFRUE
(connecting the U.S. and Denmark) link North America and Europe.
o Africa-1: This cable system connects South Africa, West Africa, and Europe, enhancing
Africa’s internet connectivity.
5. Challenges and Security:
o Physical Damage: Undersea cables are susceptible to accidental damage from ship anchors,
fishing activities, and earthquakes.
o Security Threats: Protecting these cables is crucial. Intentional sabotage or cyberattacks could
disrupt global communication.
o Geopolitical Considerations: Ownership and control of cable landing points impact data
sovereignty and national security.

In summary, undersea cables silently carry the digital pulse of our interconnected world, enabling seamless
communication and driving global progress.

(d)Describe any five(5) undersea cables that land in the coast of Kenya

1.SEACOM
SEACOM is a 17,000 km (11,000 mi) submarine cable connecting South Africa, Kenya, Tanzania,
Mozambique, Djibouti, France and India. The SEACOM cable system was ready for service on 23 July
2009, supplied by SubCom.

SEACOM Cable System was upgraded to 1.5Tbps capacity in 2018.

Cable Landing Stations:

 Mtunzini, South Africa, in a partnership with Neotel as landing party in South Africa and extending
to Neotel data centre in Midrand, Johannesburg
 Mombasa, Kenya
 Dar Es Salaam, Tanzania
 Maputo, Mozambique
 YAC A CLS, Djibouti
 Zafaranan, Egypt
 Abu Talat, Egypt
 Marseille, France
 Mumbai, India

The SEACOM cable system is variously described as a $600 million investment. The initial private
investment in the SEACOM project was US$375 million: $75 million from the developers, $150 million
from private South African investors, and $75 million as a commercial loan from Nedbank (South Africa).
The remaining $75 million was provided by Industrial Promotion Services (IPS), which is the industrial and
infrastructure arm of the Aga Khan Fund for Economic Development. The IPS investment was funded by
$15 million in equity, and a total of $60.4 million in debt from the Emerging Africa Infrastructure Fund and
the FMO.
Current ownership structure of SEACOM is as follows: 30% IPS, 30% Remgro, 15% Sanlam, 15%
Convergence Partners, and 10% Brian Herlihy.

SEACOM and TGN-EA are a common cable in some segments. SEACOM represents the East African
portion of the system as well as two fiber pairs between Egypt and India. Tata Communications TGN-EA
has two fiber pairs from Egypt to India and the branch to Jeddah. Both SEACOM and Tata Communications
TGN EA have one fiber pair on TE North for connectivity across Egypt to Europe.

SEACOM NETWORK
2.TEAMS

The TEAMS cable system was completed in August 2009 and went live for commercial service on 1st
October 2009.

The East African Marine Systems (TEAMS) is a 5,000Km subsea cable connecting Mombasa in Kenya
to Fujairah in the UAE, with two fiber pairs and upgradable system capacity of 5.6Tbps.

TEAMS cable system is 85% owned by TEAMs (Kenya) Ltd and 15% owned by Etisalat of the United Arab
Emirates (UAE).

The shareholders of TEAMS (Kenya) Ltd includes:

 20% - Government of Kenya


 32% - Safaricom Ltd
 23% - Telkom Kenya
 10% - Kenya Data Networks Ltd
 6% - Wananchi Group
 5% - Jamii Telecom Ltd
 1.8% - Access Kenya Group
 1.2% - BCS Group

Alcatel-Lucent Submarine Networks (ASN) was awarded the $79 million contract to supply and construct
the TEAMS cable system in October 2007.

3.EASSy
Eastern Africa Submarine System (EASSy) is a 10,000km submarine cable system along the east coast of
Africa, with 9 landing stations in Sudan, Djibouti, Somalia, Kenya, Tanzania, Comoros, Madagascar,
Mozambique and South Africa, provides a backhaul system for at least 12 landlocked countries, enabling
wide coverage in the East African region.
The EASSy cable system was ready for service in July 2010.

The EASSy cable system comprises two fiber pairs, initially designed with 68*10Gbps DWDM technology.
The design capacity was upgraded to 4.72 Tbps in 2011 with ASN's 40Gbps wavelength technology, further
upgraded to more than 10Tbps with ASN's 100Gbps technology in 2014. The system has deployed a
latest upgrade with Ciena's GeoMesh Extreme solutions to reach a system capacity of 36Tbps.

The EASSy project costs an initial investment at approximately US$ 235 million.

The EASSy Consortium consists of 18 members, including Bharti Airtel, Botswana Fibre Networks, BT,
Comores Telecom, Djibouti Telecom, Etisalat, Mauritius Telecom, MTN Group, Neotel, Orange, Saudi
Telecom, Sudan Telecom Company, Tanzania Telecommunications Company Limited (ZANTEL), Telkom
Kenya, Telkom South Africa, Telma (Telecom Malagasy), Vodacom DRC, WIOCC, Zambia Telecom.

According to Many Possibilities, EASSy is 90% African-owned although that ownership is underwritten by
a substantial investment by Development Financial Institutions (DFIs) including World Bank/IFC, EIB,
AfDB, AFD, and KfW. Total DFI investment is apparently $70.7 million, with $18.2 million coming from
IFC, 14.5 million from AfDB. This is a smaller amount than the originally advertised $120 million
investment from DFIs.

South African investors in EASSY include Telkom/Vodacom ($18.9 million) , MTN ($40.3 million), and
Neotel (~$11 million). MTN is the largest operator investor in the EASSy project. Telkom is the landing
party and owner of the Mtunzini cable landing station in South Africa.

WIOCC is the largest shareholder in the EASSy Consortium and owns 29% of the EASSy cable system.

AfDB funding was a vital element in the setting up of the West Indian Ocean Cable Company (WIOCC),
which was established as a “Special Purpose Vehicle” (SPV) and largest shareholder in the EASSy
submarine cable system.

WIOCC consortium members include: Botswana Telecommunications Corporation, Dalkom Somalia,


Djibouti Telecom, Gilat Satcom Nigeria Ltd., the Government of Seychelles, the Lesotho
Telecommunications Authority, ONATEL Burundi, Telkom Kenya Ltd., Telecommunicacões de
Mocambique (TDM), U-COM Burundi, Uganda Telecom Ltd., Zantel Tanzania and most recently, TelOne
Zimbabwe and Libyan Post, Telecom and Information Technology Company (LPTIC).
EASSY CABLE SYSTEM CONNECTIVITY

4.LION & LION2


LION (Lower Indian Ocean NetWork) is a 1000km submarine cable connecting Madagascar, Réunion
and Mauritius, ready for service in March, 2010.

The LION cable system consists of two fiber pairs, with an initial design capacity of 1.28Tbps (26410Gbps).

The LION consortium comprises Orange Madagascar, Mauritius Telecom and France Telecom S.A..
Overall, the LION project cost an estimated US$37 million.

LION2 (Lower Indian Ocean NetWork II) is a 2700km submarine cable network connecting LION to
Mayotte and Mombasa, Kenya. The LION2 is an extension of the LION cable system.
The LION2 consortium includes France Telecom-Orange and its subsidiaries Mauritius Telecom, Orange
Madagascar and Telkom Kenya, Emtel, Societe Reunionnaise du Radiotelephone and STOI Internet.

Telkom Kenya operates a cable landing station in Nyali, Mombasa for the LION2 cable system.

The LION2 cable system costs about $76 million with $42 million coming directly from France Telecom.

The LION2 cable system was ready for service in April 2012, with an initial design capacity of 1.28Tbps
(2*64*10Gbps).

LION
& LION2 CABLE MAP
LION & LION2 SYSTEM CONNECTIVITY

5.DARE1
The Djibouti Africa Regional Express 1(DARE1) submarine cable system connects Djibouti (Djibouti),
Bosaso (Somalia), Mogadishu (Somalia) and Mombasa (Kenya). With a finalized route length of 4,854km,
DARE1 cable system delivers up to 36 Tbps of capacity to East Africa.

The DARE1 cable system is designed with a three-fibre-pair trunk, with each fibre pair delivering capacity
of 120 channels at 100 Gbps. The Bosaso branch of the DARE1 cable is of 108 km and two fiber pairs.

The DARE1 consortium is currently composed of Djibouti Telecom, Somtel, Hormuud Telecom and Telkom
Kenya as landing partner in Kenya.

The initial investment cost of the DARE1 cable system is about US$86million.

The DARE1 cable system is supplied by SubCom.

DARE1
CABLE MAP, SOURCE: SUBCOM
(e)How can Kenya and surrounding countries reap maximum benefit from internet connectivity provided by
the undersea cables you have discussed?

The undersea cables landing in Kenya—SEACOM, DARE 1, EASSY, TEAMS, LION, and LION 2—have
immense potential to transform Kenya and the surrounding regions.

1.Enhanced Connectivity:

o These cables provide high-speed internet access, reducing latency and enhancing communication across
borders.
o Kenya can leverage this connectivity to foster collaboration, trade, and knowledge sharing with
neighboring countries.

2.Economic Growth:

o Reliable internet infrastructure attracts foreign investment and supports local businesses.
o Kenya can position itself as a regional hub for technology, e-commerce, and digital services, creating
jobs and boosting GDP.

3.Digital Services and Innovation:

o Access to undersea cables enables cloud computing, streaming, and e-services.


o Kenya can develop innovative solutions in areas like fintech, e-health, and e-learning, benefiting citizens
and businesses.

4.Data Centers and Content Hosting:

o High-speed connectivity encourages data center development.


o Kenya can host regional content, improving access to local information and reducing reliance on
international servers.

5.Education and Research:

o Universities and research institutions benefit from seamless access to global knowledge.
o Kenya can collaborate on research projects, participate in online courses, and enhance educational
outcomes.

6.Tourism and Marketing:

o Reliable internet facilitates tourism promotion and booking services.


o Kenya can showcase its natural beauty, wildlife, and cultural heritage to a global audience .

7.E-Government and Public Services:

o Undersea cables support efficient government services, e-governance, and citizen engagement.
o Kenya can digitize processes, improve transparency, and enhance public service delivery.

8.Telemedicine and Healthcare:

o High-speed internet enables telemedicine consultations and medical data exchange.


o Kenya can improve healthcare access, especially in remote areas.

9.Financial Inclusion:

o Digital banking and mobile money services thrive with robust connectivity.
o Kenya can expand financial inclusion, empowering citizens economically.

10.Collaboration with Neighbors:

o Kenya can partner with neighboring countries for joint projects, such as cross-border e-commerce
platforms or shared data centers.
o Regional cooperation can lead to mutual growth and stability.

In summary, these undersea cables offer Kenya and its neighbors a gateway to a digital future. By leveraging
this connectivity wisely, they can drive economic progress, innovation, and societal well-being.

QUESTION THREE
(a)Provide any three definition of the term information and communication technology as given in literature
available to you

 UNESCO: "Information and Communication Technology (ICT) refers to forms of technology that
are used to transmit, process, store, create, display, share, or exchange information by electronic
means. This broad definition of ICT includes technologies such as radio, television, video, DVD,
telephone (both fixed-line and mobile), satellite systems, computer and network hardware and
software, as well as the services and applications associated with them, such as videoconferencing
and distance learning.
 "World Bank: "Information and Communication Technologies consist of the hardware, software,
networks, and media for the collection, storage, processing, transmission, and presentation of
information (voice, data, text, images). ICT can be divided into two main components: information
technology (IT), which refers to systems for processing, storing, and transmitting information, and
communications technology (CT), which includes telecommunications technologies and networks."
 European Commission: "ICT is a term used to describe technologies that provide access to
information through telecommunications. It is similar to Information Technology (IT), but focuses
primarily on communication technologies. This includes the Internet, wireless networks, cell phones,
and other communication mediums."
 Oxford Dictionary: "Information and Communication Technology (ICT) is the study or use of
systems (especially computers and telecommunications) for storing, retrieving, and sending
information."
 Australian Curriculum, Assessment and Reporting Authority (ACARA): "ICT refers to the
technologies that provide access to information through telecommunications. This includes the
Internet, wireless networks, cell phones, and other communication mediums. ICTs are used to
manage information and assist communication."
 National Institute of Standards and Technology (NIST): "Information and Communications
Technology (ICT) encompasses all the technology used to handle telecommunications, broadcast
media, intelligent building management systems, audiovisual processing and transmission systems,
and network-based control and monitoring functions."

(b)What are components of ICT?

ICT encompasses various elements that work together to enable communication, data processing, and
information exchange. Here are the key components:

1. Hardware:
o Definition: Hardware refers to the physical devices used in an ICT system. These devices
facilitate data input, processing, and output.
o Examples:
 Input Devices: Keyboards, scanners, barcode readers, touchscreens, and cameras
allow users to input data.
 Processing Units: Microprocessors (CPUs), memory (RAM), and storage devices
(hard drives, SSDs) process and store data.
 Output Devices: Monitors, printers, and speakers display or produce information.
o Importance: Proper hardware selection ensures efficient data handling and user interaction.
2. Software:
o Definition: Software includes programs and applications that manage data, perform
calculations, and control hardware.
o Examples:
 Operating Systems: Windows, macOS, Linux.
 Application Software: Word processors (e.g., Microsoft Word), databases (e.g.,
MySQL), web browsers (e.g., Chrome), video players, and graphics editors.
o Importance: Software enables data manipulation, analysis, and communication.
3. Data:
o Definition: Data is raw information entered into an ICT system. It can be text, numbers,
images, or any other form.
o Sources of Data:
 Manual entry via keyboards.
 Electronic transfer over networks or the internet.
 Scanning barcodes or smart cards.
o Importance: Data serves as the foundation for generating meaningful information.
4. People:
o Definition: People are users of the ICT system. They interact with hardware, software, and
data.
o Roles:
 End Users: Individuals who input data, retrieve information, and use applications.
 System Analysts: Design and oversee system development.
 ICT Support Staff: Train users and troubleshoot issues.
o Importance: People drive system usage, efficiency, and effectiveness.
5. Procedures:
o Definition: Procedures outline how tasks should be performed within an organization’s ICT
system.
o Examples:
 Data entry guidelines.
 System development processes.
 Security protocols.
o Importance: Consistent procedures ensure smooth operations and data integrity.
6. Information:
o Definition: Information results from processing data. It is meaningful, organized, and
relevant.
o Forms of Information:
 Displayed on screens.
 Printed as reports.
 Transferred between systems.
o Importance: Information informs decision-making, supports communication, and drives
actions.
7. Integration:
o Definition: Integration refers to combining all components into a cohesive ICT system.
o Example: An integrated system allows seamless data flow from input to processing and
output.
o Importance: Integration ensures efficient communication and maximizes system
effectiveness.
8. ICT Services and Applications:
o Services:
 Communication Services: Email, instant messaging, video conferencing.
 Cloud Services: Storage, collaboration tools (e.g., Google Drive).
 Security Services: Antivirus, firewalls, encryption.
o Applications:
 Office Productivity: Word processing, spreadsheets, presentations.
 Enterprise Resource Planning (ERP): Integrated business management software.
 Customer Relationship Management (CRM): Managing customer interactions.
 Educational Applications: E-learning platforms.
o Importance: Services and applications enhance productivity, collaboration, and efficiency.

In summary, ICT integrates hardware, software, data, people, procedures, and information to create
functional systems. Whether it’s a simple office computer or a complex network, understanding these
components is essential for effective technology utilization.

(c)How is ICT used in supermarkets of Thika Town?

Supermarkets play a crucial role in retail, and ICT enhances their efficiency, customer experience, and
overall management. Here are the ways ICT is employed in Thika’s supermarkets:

1. Point of Sale (POS) Systems:


o Description: Supermarkets use POS systems for sales transactions. These systems include
barcode scanners, cash registers, and software that record sales, manage inventory, and
calculate prices.
o Benefits:
 Faster checkout process.
 Accurate inventory tracking.
 Real-time sales data for decision-making.
2. Inventory Management:
o Description: ICT helps manage stock levels, reorder supplies, and track product movement.
o Components:
 Barcode Scanners: Scan product barcodes during stock intake and sales.
 Inventory Software: Monitor stock levels, set reorder points, and generate reports.
o Benefits:
 Reduced stockouts.
 Efficient restocking.
 Minimized wastage.
3. Electronic Shelf Labels (ESL):
o Description: ESLs display product prices and information electronically on shelves.
o Benefits:
 Real-time price updates.
 Consistent pricing across the store.
 Reduced manual label changes.
4. Customer Loyalty Programs:
o Description: Supermarkets use ICT to manage loyalty cards or mobile apps.
o Benefits:
 Customer retention.
 Targeted promotions.
 Data-driven insights into customer preferences.
5. Security and Surveillance:
o Description: CCTV cameras and access control systems enhance security.
o Benefits:
 Theft prevention.
 Employee monitoring.
 Incident investigation.
6. Supply Chain Management:
o Description: ICT streamlines the supply chain from suppliers to shelves.
o Components:
 Electronic Data Interchange (EDI): Automates communication with suppliers.
 Warehouse Management Systems (WMS): Efficiently manage stock in warehouses.
o Benefits:
 Timely restocking.
 Reduced manual paperwork.
 Improved order accuracy.
7. Online Ordering and Delivery:
o Description: Supermarkets offer online platforms for customers to order groceries.
o Components:
 E-commerce Websites: Customers browse, select, and pay online.
 Delivery Management Systems: Coordinate deliveries.
o Benefits:
 Convenience for customers.
 Expanded market reach.
 Efficient delivery logistics.
8. Employee Management:
o Description: ICT tools assist in scheduling, payroll, and performance tracking.
o Components:
 Human Resource Management Systems (HRMS): Manage employee data.
 Time and Attendance Systems: Track work hours.
o Benefits:
 Efficient workforce management.
 Accurate payroll processing.
 Compliance with labor laws.
9. Energy Management:
o Description: ICT monitors energy usage and optimizes lighting, cooling, and heating.
o Components:
 Smart Meters: Measure electricity consumption.
 Building Management Systems (BMS): Control HVAC and lighting.
o Benefits:
 Cost savings.
 Environmental sustainability.
10. Data Analytics and Business Intelligence:
o Description: Supermarkets analyze sales data, customer behavior, and trends.
o Components:
 Business Intelligence (BI) Tools: Generate reports and visualizations.
 Data Warehouses: Store historical data.
o Benefits:
 Informed decision-making.
 Personalized marketing.
 Competitive advantage.

In summary, ICT plays a pivotal role in Thika’s supermarkets, enhancing operations, customer satisfaction,
and overall business performance. As technology continues to evolve, supermarkets will further integrate
ICT to stay competitive and meet customer expectations. 🛒🌐💡123

(d)How is ICT used at MKU main campus?

MKU has made significant strides in integrating technology across various aspects of campus life. Here are
the key areas where ICT plays a crucial role:

1. Interactive Displays and Smart Classrooms:


o MKU has integrated interactive displays to enhance teaching and learning experiences. These
displays serve as dynamic platforms for content delivery, fostering participation and
interactivity.
o Lecturers can incorporate useful apps and teaching aids, simplifying complex concepts during
virtual classes.
o The university intends to build smart classrooms across campuses, further enhancing the e-
learning environment.
2. Biometric Access Control and CCTV:
o MKU employs biometric-controlled access systems for security. These systems restrict entry
to authorized personnel.
o Closed-circuit television (CCTV) surveillance enhances safety and monitors campus
activities.
3. SAKAI E-Learning Platform:
o MKU utilizes the SAKAI platform for e-learning. Students access course materials, submit
assignments, and engage in online discussions.
o E-learning platforms provide flexibility and support self-paced learning.
4. KOHA and OPAC Library Systems:
o The library uses KOHA (an open-source integrated library management system) and the
Online Public Access Catalog (OPAC).
o Students can search for books, journals, and other resources electronically, streamlining
research.
5. Computer Laboratories:
o MKU’s main campus houses well-equipped computer labs with modern hardware and
software.
o Students have access to over 3,000 PCs, supporting research, programming, and coursework.
o The university aims to increase this number to 5,000, ensuring favorable student-to-computer
ratios.
6. Research and Innovation:
o MKU encourages students to research and develop digital innovations.
o Labs, software licenses, and mentorship support innovation in areas like artificial
intelligence, data science, and cybersecurity.
7. Online Student Services:
o MKU’s ICT systems enable online registration, fee payment, and course enrollment.
o Students access academic records, exam results, and timetables through the student portal.
8. Collaboration Tools and Communication:
o MKU uses email, intranet platforms, and virtual meeting tools for communication.
o These tools facilitate collaboration among students, faculty, and administrative staff.
9. Smart Expansion Site:
o Five kilometers east of the main campus lies a proposed expansion site—a 23.5-hectare piece
of real estate.
o The site will host a unique Science and Technology complex, further enhancing MKU’s
capabilities.
10. Embracing Digital Transformation:
o MKU recognizes the importance of digital technologies and the fourth industrial revolution.
o Integrating technology-mediated teaching and learning ensures competitiveness in the higher
education landscape.

In summary, MKU’s Main Campus leverages ICT to create engaging learning environments, enhance
security, streamline administrative processes, and foster innovation. The university remains committed to
providing students with the best possible learning experiences. 🌐💡123

(e)How is ICT in hospitals around Thika?

ICT plays a critical role in enhancing healthcare delivery, improving patient outcomes, and streamlining
administrative processes. Here are some key aspects:

1. Electronic Health Records (EHRs):


o Description: Hospitals in Thika use EHR systems to digitize patient records. EHRs store
medical histories, diagnoses, treatments, and test results.
o Benefits:
 Efficiency: Instant access to patient data for healthcare providers.
 Accuracy: Reduced errors due to manual record-keeping.
 Continuity of Care: Seamless information sharing across departments.
2. Telemedicine and Teleconsultations:
o Description: ICT enables remote consultations between patients and healthcare professionals.
o Examples:
 Video Calls: Doctors consult with patients virtually.
 Teleradiology: Radiologists interpret images remotely.
o Benefits:
 Access: Rural patients can consult specialists without traveling.
 Timeliness: Faster diagnosis and treatment planning.
3. Health Information Systems (HIS):
o Description: HIS integrates various healthcare processes, including patient management,
billing, and inventory control.
o Components:
 Hospital Management Systems (HMS): Streamline administrative tasks.
 Laboratory Information Systems (LIS): Manage lab tests.
o Benefits:
 Efficiency: Coordinated workflows.
 Data-Driven Decisions: Insights for hospital management.
4. Mobile Health (mHealth):
o Description: Mobile apps and SMS services support healthcare delivery.
o Examples:
 Appointment Reminders: SMS alerts for patient appointments.
 Health Education Apps: Provide information on diseases, nutrition, and hygiene.
o Benefits:
 Patient Engagement: Improved adherence to treatment plans.
 Preventive Education: Promotes healthier lifestyles.
5. Biometric Authentication:
o Description: Hospitals use biometrics (fingerprint or iris scans) for secure access to patient
data.
o Benefits:
 Privacy: Protects sensitive information.
 Efficiency: Quick and accurate identification.
6. Inventory Management:
o Description: ICT systems track medical supplies, drugs, and equipment.
o Benefits:
 Stock Control: Prevent shortages or excess inventory.
 Cost Savings: Efficient resource utilization.
7. Healthcare Analytics:
o Description: Hospitals analyze data to improve decision-making.
o Examples:
 Predictive Analytics: Forecast disease outbreaks.
 Clinical Outcome Analysis: Evaluate treatment effectiveness.
o Benefits:
 Quality Improvement: Evidence-based practices.
 Resource Allocation: Optimal use of resources.
8. Emergency Response Systems:
o Description: ICT facilitates rapid emergency communication.
o Components:
 Ambulance Dispatch Systems: Efficiently route ambulances.
 Emergency Alerts: Notify relevant personnel during crises.
o Benefits:
 Lives Saved: Faster response times.
 Coordination: Seamless communication among responders.
9. Healthcare Training and Education:
o Description: ICT supports medical education and continuous professional development.
o Examples:
 Virtual Simulations: Train medical students.
 Online CME (Continuing Medical Education): Update healthcare professionals.
o Benefits:
 Skill Enhancement: Realistic training scenarios.
 Global Access: Learning beyond geographical boundaries.
10. Security and Privacy Measures:
o Description: Hospitals implement ICT security protocols.
o Components:
 Firewalls: Protect against cyber threats.
 Encryption: Secure data transmission.
o Benefits:
 Patient Confidentiality: Safeguard sensitive health information.
 Compliance: Adherence to data protection regulations.

In summary, ICT in Thika’s hospitals transforms healthcare by enabling efficient data management,
telemedicine, analytics, and patient engagement. These technological advancements contribute to better
health outcomes and streamlined operations.

Information and communication technology (ICT) has revolutionized the healthcare sector in recent years.
ICT has made it possible to store, share and manage patient data more effectively. It has also enhanced
communication between healthcare professionals and patients.

The use of ICT in healthcare has led to better patient care and improved clinical outcomes. It has also helped
to reduce the cost of healthcare delivery.

Some of the benefits of using ICT in healthcare include:

1. Improved patient care

The use of ICT in healthcare has led to better patient care. ICT tools such as electronic health records
(EHRs), telemedicine and health information portals have made it possible to store, share and manage
patient data more effectively.

2. Improved clinical outcomes

The use of ICT in healthcare has also helped to improve clinical outcomes. ICT tools such as decision
support systems and clinical decision support systems have been shown to improve the quality of care.

3. Reduced cost of healthcare delivery

The use of ICT in healthcare has helped to reduce the cost of healthcare delivery. ICT tools such as
telemedicine and e-prescribing have been shown to reduce the cost of care.

4. Enhanced communication
The use of ICT in healthcare has enhanced communication between healthcare professionals and patients.
ICT tools such as health information portals and patient portals have made it possible for patients to access
their health information and communicate with their healthcare providers.

5. Improved access to care

The use of ICT in healthcare has improved access to care. ICT tools such as telemedicine and e-health have
made it possible for patients to access care from anywhere at any time.

6. Increased efficiency

The use of ICT in healthcare has increased the efficiency of healthcare delivery. ICT tools such as EHRs and
health information portals have made it possible for healthcare providers to access and share patient data
more effectively.

7. Improved quality of care

The use of ICT in healthcare has improved the quality of care. ICT tools such as clinical decision support
systems and quality improvement programs have been shown to improve the quality of care.

8. Greater patient satisfaction

The use of ICT in healthcare has led to greater patient satisfaction. ICT tools such as patient portals and
health information portals have made it possible for patients to access their health information and
communicate with their healthcare providers.

9. Increased transparency

The use of ICT in healthcare has increased transparency in the healthcare sector. ICT tools such as health
information portals and patient portals have made it possible for patients to access their health information
and communicate with their healthcare providers.

10. Improved coordination

The use of ICT in healthcare has improved coordination between healthcare professionals. ICT tools such as
EHRs and health information portals have made it possible for healthcare providers to access and share
patient data more effectively.

(f)How is ICT used in hotels and restaurants around Thika?

ICT plays a crucial role in enhancing customer experiences, streamlining operations, and improving overall
efficiency. Here are some key aspects:

1. Reservation Systems and Online Booking:


o Hotels: ICT enables online booking platforms where guests can reserve rooms, check
availability, and receive confirmation emails.
o Restaurants: Reservation systems allow diners to book tables in advance, reducing waiting
times and ensuring efficient table management.
2. Point of Sale (POS) Systems:
o Hotels: POS systems handle guest check-ins, room charges, and billing. They integrate with
housekeeping and inventory management.
o Restaurants: POS systems process orders, track inventory, and manage payments. They
enhance order accuracy and speed up service.
3. Guest Wi-Fi and Connectivity:
o Hotels: High-speed Wi-Fi is essential for guests. Hotels provide connectivity in rooms,
lobbies, and common areas.
o Restaurants: Offering free Wi-Fi encourages diners to stay longer and share their experiences
on social media.
4. Property Management Systems (PMS):
o Hotels: PMS handles reservations, guest profiles, housekeeping, and billing. It ensures
smooth operations.
o Restaurants: Some upscale restaurants use PMS for table management, guest preferences, and
loyalty programs.
5. Mobile Apps and Loyalty Programs:
o Hotels: Mobile apps provide guests with information about amenities, room service, and local
attractions.
o Restaurants: Apps allow diners to view menus, make reservations, and earn loyalty points.
6. Digital Menus and Ordering:
o Restaurants: Digital menus displayed on tablets or screens enhance the dining experience. QR
codes enable contactless ordering.
o Hotels: Room service menus can be accessed via TV screens or mobile apps.
7. Automated Check-in and Check-out:
o Hotels: Self-check-in kiosks reduce front desk queues. Guests can use mobile apps for
express check-out.
o Restaurants: Some establishments allow diners to pay directly through apps, avoiding the
need for physical bills.
8. Security and Surveillance:
o Hotels: CCTV cameras monitor common areas, entrances, and parking lots. Access control
systems secure guest floors.
o Restaurants: Surveillance ensures safety and prevents theft.
9. Energy Management Systems:
o Hotels: ICT controls lighting, heating, and cooling based on occupancy. Energy-efficient
practices reduce costs.
o Restaurants: Smart lighting and HVAC systems optimize energy usage during peak hours.
10. Feedback and Review Platforms:
o Hotels: Online reviews influence bookings. Hotels encourage guests to leave feedback on
platforms like TripAdvisor.
o Restaurants: Reviews on platforms like Yelp or Google My Business impact reputation and
customer choices.

In summary, ICT transforms the hospitality industry by enhancing guest experiences, improving efficiency,
and enabling personalized services. Whether it’s booking a room or ordering a meal, technology plays a vital
role in Thika’s hotels and restaurants.

(g)How is ICT used by transport and courier companies around Thika?


Certainly! Information and Communications Technology (ICT) plays a pivotal role in the operations of
transport and courier companies around Thika. Let’s delve into the ways ICT enhances efficiency, customer
service, and overall logistics in this sector:

1.Fleet Management and Tracking:

o Description: Transport companies use ICT to monitor their fleet of vehicles. GPS tracking
systems provide real-time information on vehicle location, speed, and routes.
o Benefits:
 Route Optimization: Companies can choose the most efficient routes, reducing fuel
consumption and delivery time.
 Security: Tracking systems enhance security by preventing theft and ensuring driver
safety.
 Maintenance: ICT alerts companies about vehicle maintenance schedules, minimizing
breakdowns.

2.Automated Booking and Dispatch Systems:

o Description: Courier companies use ICT platforms for booking and dispatching orders.
o Examples:
 Online Booking Portals: Customers can book deliveries online.
 Automated Dispatch Algorithms: Assign orders to the nearest available courier.
o Benefits:
 Efficiency: Streamlined order processing.
 Accuracy: Reduced manual errors.
 Real-time Updates: Customers receive notifications about their deliveries.

3.Electronic Proof of Delivery (ePOD):

o Description: Couriers capture delivery details electronically using mobile devices.


o Benefits:
 Instant Confirmation: Customers receive proof of delivery via email or SMS.
 Reduced Paperwork: Eliminates manual paperwork.
 Dispute Resolution: ePOD records serve as evidence in case of disputes.

4.Warehouse Management Systems (WMS):

o Description: ICT systems manage inventory, storage, and order fulfillment in warehouses.
o Components:
 Barcode Scanners: Track items during storage and retrieval.
 Inventory Software: Monitor stock levels.
o Benefits:
 Efficient Order Picking: WMS guides warehouse staff to the right items.
 Inventory Accuracy: Real-time updates prevent stockouts.

5.Last-Mile Delivery Optimization:

o Description: ICT helps optimize the final leg of delivery from the distribution center to the
customer.
o Examples:
 Delivery Route Algorithms: Determine the most efficient sequence for multiple stops.
 Crowdsourced Delivery Platforms: Utilize local couriers or independent drivers.
o Benefits:
 Timeliness: Faster last-mile delivery.
 Cost Reduction: Efficient routes save fuel and labor costs.

6.Customer Communication and Tracking:

o Description: ICT enables real-time communication with customers.


o Examples:
 SMS Notifications: Inform customers about delivery status.
 Online Tracking: Customers can track their parcels using unique codes.
o Benefits:
 Transparency: Customers know when to expect their deliveries.
 Improved Customer Experience: Real-time updates reduce anxiety.

7.E-commerce Integration:

o Description: ICT links courier services with e-commerce platforms.


o Benefits:
 Seamless Order Fulfillment: Orders from online stores flow directly to courier
systems.
 Scalability: Handles high volumes during peak seasons.

8.Security and Authentication:

o Description: ICT ensures secure access to delivery hubs and warehouses.


o Components:
 Biometric Access Control: Fingerprint or facial recognition.
 CCTV Surveillance: Monitors premises.
o Benefits:
 Prevents Unauthorized Access: Enhances security.
 Traceability: Records who enters and exits.

9.Data Analytics for Demand Forecasting:

o Description: Companies analyze historical data to predict future demand.


o Benefits:
 Resource Planning: Allocate vehicles and staff effectively.
 Inventory Management: Stock the right items in the right locations.

10.Collaboration with Customs and Regulatory Authorities:

o Description: ICT facilitates electronic customs declarations and compliance.


o Benefits:
 Efficient Cross-Border Operations: Streamlines international shipments.
 Compliance with Regulations: Avoids delays and penalties.
In summary, ICT revolutionizes the transport and courier industry in Thika, enhancing logistics, customer
satisfaction, and operational efficiency. These technological advancements ensure timely deliveries and
seamless communication throughout the supply chain.

(h)How is ICT used by government agencies in Thika Town?

ICT plays a crucial role in enhancing service delivery, improving efficiency, and promoting transparency.
Here are some key aspects:

1. Kiambu County Government:


o The County Government of Kiambu actively embraces ICT to enhance governance and
public services. Their vision is to empower the society through quality education, social
services, and technology adoption.
o The Youth Affairs, Sports & Communication Department focuses on youth empowerment,
sporting excellence, and effective communication. They promote youth employment,
education, health, and participation in decision-making processes.
o The department aims to create an enabling environment for youth development, enhance
sporting infrastructure, and provide relevant information to the community.
2. Water, Environment & Natural Resources:
o About 90% of Kiambu County’s water resources comprise both surface and groundwater
potential.
o The Athi Water Services Board (AWSB) licenses nine Water Service Providers (WSPs)
companies in the county. These companies ensure domestic water supply and have improved
access to potable water over the last five years.
o The county focuses on sustainable water management, environmental conservation, and
natural resource utilization.
3. Thika Technology City:
o Governor Kimani Wamatangi envisions turning Thika Town into a technologically advanced
city. The plan involves an investment of Ksh 15 billion over the next three years.
o By 2026, Thika aims to be a technology and industrial hub, fostering economic growth and
innovation.
4. Thika ICT Hub:
o The government plans to construct an ICT hub in Thika. The hub will empower hundreds of
young school leavers by providing access to technology and online jobs.
o The project is a partnership between the State Department for ICT, Parliament, and the Public
Works grounds in Thika’s industrial area.
o The hub will accommodate between 300 and 500 people, creating job opportunities and
promoting youth empowerment.
5. E-Government Services:
o Thika Town benefits from e-government services, including online platforms for business
registration, land transactions, and revenue collection.
o Citizens can access services, pay bills, and obtain information without physical visits to
government offices.
6. Digital Transformation in Health Services:
o The County Health Office in Thika has embraced ICT. The former Directorate of Health
building now houses health services.
o The use of electronic health records (EHRs) and digital communication tools improves
patient care and administrative efficiency.
7. Public Safety and Security:
o Thika Police Station and other law enforcement agencies leverage ICT for crime prevention,
surveillance, and emergency response.
o CCTV cameras, biometric access control, and communication networks enhance public
safety.
8. Education and E-Learning:
o The government promotes ICT in schools and colleges. Students benefit from digital learning
materials, online assessments, and virtual classrooms.
o Thika’s educational institutions use technology to bridge learning gaps and prepare students
for the digital age.
9. Smart Infrastructure and Urban Planning:
o Thika’s urban development incorporates ICT for efficient traffic management, waste disposal,
and energy conservation.
o Smart streetlights, waste sensors, and real-time data analytics contribute to sustainable urban
living.
10. Transparency and Citizen Engagement:
o The government uses ICT to disseminate information, engage citizens, and collect feedback.
o Social media platforms, town hall meetings, and online portals facilitate communication
between government agencies and residents.

In summary, Thika Town leverages ICT across various sectors, from youth empowerment and health
services to infrastructure development and public safety. The government’s commitment to digital
transformation ensures a brighter future for Thika’s residents.

REFERENCES

https://klrc.go.ke/index.php/constitution-of-kenya/112-chapter-four-the-bill-of-rights/part-2-rights-and-
fundamental-freedoms/199-33-freedom-of-expression

https://afrocave.com/access-to-information/

http://kenyalaw.org:8181/exist/rest//db/kenyalex/Kenya/Legislation/English/Acts and Regulations/A/Access


to Information Act - No. 31 of 2016/docs/AccesstoInformationAct31of2016.pdf

https://ombudsman.go.ke/sites/default/files/2023-09/AccesstoInformationActNo31of2016.pdf

The Constitution of Kenya - Parliament of Kenya.


http://www.parliament.go.ke/sites/default/files/2017-05/The_Constitution_of_Kenya_2010.pdf..

Access to information - Kenya Law Reform Commission (KLRC). https://klrc.go.ke/index.php/constitution-


of-kenya/112-chapter-four-the-bill-of-rights/part-2-rights-and-fundamental-freedoms/201-35-access-to-
information.

THE ACCESS TO INFORMATION ACT - Kenya Law Reports.


http://kenyalaw.org:8181/exist/rest//db/kenyalex/Kenya/Legislation/English/Acts%20and%20Regulations/
A/Access%20to%20Information%20Act%20-%20No.%2031%20of%202016/docs/
AccesstoInformationAct31of2016.pdf

232. Values and principles of public service - Kenya Law Reform ....
https://klrc.go.ke/index.php/constitution-of-kenya/174-chapter-thirteen-the-public-service/part-1-values-and-
principles-of-public-service/401-232-values-and-principles-of-public-service.

Article 232. Values and Principles of Public Service.


https://afrocave.com/constitution/chapter-13/part-1/article-232/values-and-principles-of-public-service/.

The Technical University of Kenya Commitment to National Values and ....


https://tukenya.ac.ke/sites/default/files/downloads/ARTICLE%2010%20and%20232%20of%20The
%20Constitution.pdf.

Article 33 of the constitution of kenya 2010 - UNESCO. https://www.unesco.org/creativity/en/policy-


monitoring-platform/article-33-constitution-kenya-2010-freedom-expression.

The Constitution of Kenya 2010. http://libraryir.parliament.go.ke/xmlui/handle/123456789/1090?show=full.

31. Privacy - Kenya Law Reform Commission (KLRC).


https://klrc.go.ke/index.php/constitution-of-kenya/112-chapter-four-the-bill-of-rights/part-2-rights-and-
fundamental-freedoms/197-31-privacy.

The Constitution of Kenya - Parliament of Kenya.


http://www.parliament.go.ke/sites/default/files/2017-05/The_Constitution_of_Kenya_2010.pdf.

The Constitution of Kenya 2010. http://libraryir.parliament.go.ke/xmlui/handle/123456789/1090.

Article 31. Privacy | The Constitution of Kenya 2010 - AfroCave. https://afrocave.com/constitution/chapter-


4/part-2/article-31/privacy/.

Kenya 2010 Constitution - Constitute. https://www.constituteproject.org/constitution/Kenya_2010.

National Information, Communications and Technology (ICT) Policy.


https://ict.go.ke/wp-content/uploads/2019/12/NATIONAL-ICT-POLICY-2019.pdf.

ICT Sector Policy | Communications Authority of Kenya. https://www.ca.go.ke/ict-sector-policy.

National Information, Communications and Technology (ICT) Policy.


https://ict.go.ke/wp-content/uploads/2019/12/NATIONAL-ICT-POLICY-2019.pdf.

KENYA INFORMATION AND COMMUNICATIONS ACT - Kenya Law Reports.


http://www.kenyalaw.org:8181/exist/rest//db/kenyalex/Kenya/Legislation/English/Acts%20and
%20Regulations/K/Kenya%20Information%20and%20Communications%20Act%20Cap.%20411A%20-
%20No.%202%20of%201998/docs/KenyaInformationandCommunicationsAct2of1998.pdf.

ICT Sector Policy | Communications Authority of Kenya. https://www.ca.go.ke/ict-sector-policy.

The National Information, Communication and Technology (ICT) Policy .... https://cfllegal.com/the-
national-information-communication-and-technology-ict-policy-guidelines-2020/.

KENYA INFORMATION AND COMMUNICATIONS ACT. https://www.kfcb.go.ke/The


~kfcbgok/sites/default/files/2021-03/Kenya_Information_and_Communications_Act.pdf.

https://desklib.com/document/usage-and-value-of-ict-in-courier-company-operations/

https://www.cybo.com/KE/thika/couriers-and-package-delivery/

https://klrc.go.ke/index.php/constitution-of-kenya/174-chapter-thirteen-the-public-service/part-1-values-and-
principles-of-public-service/401-232-values-and-principles-of-public-service
https://klrc.go.ke/index.php/constitution-of-kenya/112-chapter-four-the-bill-of-rights/part-2-rights-and-
fundamental-freedoms/201-35-access-to-information

http://kenyalaw.org:8181/exist/rest//db/kenyalex/Kenya/Legislation/English/Acts and Regulations/A/Access


to Information Act - No. 31 of 2016/docs/AccesstoInformationAct31of2016.pdf

https://www.ict.go.ke/wp-content/uploads/2019/05/KENYA-E-GOVERNMENT-STRATEGY-2004.pdf

https://www.ca.go.ke/sites/default/files/2023-06/Consumer-Protection-Regulations-2010-1.pdf

https://www.geeksforgeeks.org/packet-switching-and-delays-in-computer-network/

https://techxplore.com/news/2024-04-undersea-cables-unseen-backbone-global.html

https://theconversation.com/undersea-cables-are-the-unseen-backbone-of-the-global-internet-226300

https://kiambu.go.ke/

https://www.businesslist.co.ke/category/information-technology/city:thika

https://www.g4s.com/en-ke/what-we-do/services/courier-services

https://www.ict.ac.ke/

https://www.tripadvisor.ca/Restaurants-g1026018-zfp58-Thika_Central_Province.html

https://www.expedia.com/Thika-Hotels-Hotels-With-Restaurants.0-0-d3000001022-
tHotelswithRestaurants.Travel-Guide-Filter-Hotels

https://www.bing.com/travel/hotels/detail?
q=hotels+in+Thika&id=YN8091x14770704172843240341&hotellistid=YN8091x14770704172843240341
&hname=Eton+Hotel&cin=Sunday%2c+August+04+2024&cout=Monday
%2c+August+05+2024&guests=2A&rooms=1&displaytext=thika&loc=thika&lat=-
1.040185&lon=37.073364&type=hotel&form=HTCHAT&entrypoint=HTCHAT

https://www.the-star.co.ke/news/2024-03-22-mku-rolls-out-major-ict-infrastructure-upgrade-with-focus-on-
digital-learning/

https://www.mku.ac.ke/school-of-computing-informatics/

http://ir.jkuat.ac.ke/bitstream/handle/123456789/2883/ADOPTION AND USE OF INFORMATION AND


COMMUNICATION TECHNOLOGY %28ICT%29 BY SMALL ENTERPRISES.pdf?sequence=1

https://www.academia.edu/101034138/
Factors_that_influence_ICT_adoption_by_small_and_medium_enterprises_a_case_study_of_SMEs_in_Thi
ka_municipality

https://computingway.com/ict-system-components-services-applications/

https://techbilion.com/what-are-the-five-5-components-of-ict/

https://www.submarinenetworks.com/en/systems/asia-europe-africa/dare1/dare1-cable-achieves-final-
landing-in-kenya

https://telkom.co.ke/press-release/telkom-and-peace-cable-company-land-new-submarine-cable-in-kenya/
https://tech-ish.com/2022/03/29/telkom-undersea-cable-mombasa/

https://www.the-star.co.ke/news/2022-03-29-kenya-gets-sixth-submarine-fibre-cable-worth-sh44-billion/

https://www.the-star.co.ke/business/kenya/2022-03-31-internet-cost-in-kenya-to-drop-on-new-high-speed-
submarine-cable/

https://www.techjockey.com/blog/comprehensive-guide-to-ict-information-communication-technology

You might also like