Question One
Question One
CODE:BIT4116
GROUP PRESENTATION:GROUP 5
QUESTION ONE
QN 1(a)What does the constitution of kenya 2010 say about access to information in articles 33,35 and 232?
Article 33 of the Constitution of Kenya 2010 is about freedom of expression. It states that every person has
the right to freedom of expression, which includes the freedom to seek, receive or impart information or
ideas
Article 35 of the Constitution of Kenya 2010 addresses the right to access information. Let’s delve into the
details:
1. Access to Information:
o Every Citizen’s Right: Article 35 grants every Kenyan citizen the right of access to
information. This includes information held by the State (government) and information held
by private entities that is necessary for the exercise or protection of any right or fundamental
freedom.
o Correction or Deletion: Additionally, every person has the right to request the correction or
deletion of untrue or misleading information that affects them. This provision ensures that
individuals can rectify inaccuracies in their personal data.
2. Transparency and Accountability:
o State Obligation: The State is obligated to publish and publicize any important information
affecting the nation. This promotes transparency, accountability, and informed decision-
making.
o Empowering Citizens: By granting access to information, Article 35 empowers citizens to
actively participate in governance, hold public officials accountable, and make informed
choices. It also supports investigative journalism and civil society efforts to promote good
governance and combat corruption.
3. Article 232 of the Constitution of Kenya 2010 pertains to the values and principles of public service. It does
not directly address access to information. However, it does emphasize the need for transparency and
provision of timely and accurate information¹. This can be seen as supporting the broader framework of access
to information within the public service sector. For specific rights regarding access to information, you would
refer to Article 35, which I described earlier
Article 33 of the Constitution of Kenya 2010 enshrines the right to freedom of expression, which is a
fundamental aspect of access to information. It guarantees every person the right to seek, receive, or impart
information or ideas, freedom of artistic creativity, and academic freedom and freedom of scientific
research. However, this right is not absolute and does not extend to propaganda for war, incitement to
violence, hate speech, or advocacy of hatred that constitutes ethnic incitement, vilification of others, or
incitement to cause harm. In exercising this right, individuals must respect the rights and reputation of
others, ensuring a balance between freedom of expression and the protection of societal values.
Article 35 specifically addresses the right of access to information. It stipulates that every citizen has the
right to access information held by the State and information held by another person that is required for the
exercise or protection of any right or fundamental freedom. Additionally, it provides for the right to
correction or deletion of untrue or misleading information that affects a person. The State is also mandated
to publish and publicize any important information affecting the nation, which underscores the commitment
to transparency and accountability in governance.
Article 232 outlines the values and principles of public service, which indirectly relate to access to
information. It emphasizes the need for high standards of professional ethics, efficient and effective use of
resources, and the provision of services in a responsive, prompt, impartial, and equitable
manner.Importantly, it includes the principle of transparency and the provision to the public of timely and
accurate information. This article ensures that the public service operates in a manner that is open and
accountable to the public, reinforcing the rights provided under Articles 33 and 35.
QN 1 (b)How does Article 31 of the constitution of Kenya 2010 attempt to put a disclaimer that balances out the
previous Articles?
Article 31 of the Constitution of Kenya 2010 focuses on the right to privacy. It serves as a balance to the
freedoms expressed in the previous articles by setting boundaries to protect individuals' personal spaces and
information. Here's what Article 31 states:
Every person has the right to privacy, which includes the right not to have:
- (c) information relating to their family or private affairs unnecessarily required or revealed; or
This article ensures that while citizens have the right to access information and freedom of expression, these
rights do not infringe upon the privacy of individuals. It creates a legal framework that respects and protects
personal boundaries while upholding the principles of transparency and freedom enshrined in the
Constitution¹.
Article 31 of the Constitution of Kenya 2010 is a critical provision that serves as a counterbalance to the
freedoms outlined in Articles 33, 35, and 232, by emphasizing the right to privacy. It ensures that while the
state and individuals have obligations and rights to freedom of expression and access to information, these
do not infringe upon an individual’s personal space and private life. Specifically, Article 31 protects against
unlawful searches of a person, their home, or property; seizure of possessions; unnecessary revelation of
family or private affairs; and infringement of communication privacy. This article is a disclaimer that sets
boundaries to safeguard individuals from the potential overreach that could arise from the application of the
other articles.
In relation to Article 33, which deals with freedom of expression, Article 31 ensures that this freedom does
not extend to violating someone’s privacy. For instance, while individuals have the right to impart
information, they must not do so in a way that intrudes on another’s private life. Similarly, Article 35 grants
citizens the right to access information held by the state or required for exercising rights, but Article 31
ensures that this access does not compromise personal data privacy.
Article 232 lays out the values and principles of public service, including transparency and the provision of
timely and accurate information. However, Article 31 ensures that the pursuit of transparency does not come
at the cost of violating individual privacy. Public servants must respect the privacy rights of individuals even
as they adhere to the principles of accountability and openness. Thus, Article 31 acts as a necessary check,
maintaining a delicate balance between the need for an open government and the protection of individual
privacy rights.
QN 1(c)Apart from the constitution of Kenya 2010,what other laws and government policies govern the usage
of ICT within territorial boundaries of kenya?(Discuss any five(5)
In Kenya, apart from the Constitution of Kenya 2010, there are several laws and government policies that
govern the usage of information and communication technology (ICT) within the country's territorial
boundaries. Here are some of the key ones:
1. National Information, Communications and Technology (ICT) Policy: This policy outlines the
government's approach to the design, development, acquisition, deployment, operation, support, and
evolution of public and private ICTs¹.
The National Information, Communication and Technology (ICT) Policy of Kenya has been instrumental in
governing the usage of ICT within the country's territorial boundaries. It has provided a comprehensive
framework that aligns with Kenya's Vision 2030, aiming to transform the nation into a knowledge-based
economy. The policy emphasizes a 'Mobile First' strategy, recognizing the widespread adoption of mobile
technology and its potential to drive socio-economic development. It also focuses on creating a favorable
market environment that encourages innovation, skills development, and public service delivery through
ICT. By setting out the operational environment and regulatory background, the policy has enabled the
expansion of ICT infrastructure, thus facilitating access to digital services and promoting digital literacy
among Kenyans.
Additionally, the policy has set forth objectives to grow the ICT sector's contribution to the economy and
establish Kenya as a hub for data centers, Internet of Things (IoT), and local manufacturing. It underscores
the importance of security within the ICT ecosystem and fosters an environment conducive to innovation.
The policy also highlights the role of ICT in achieving Sustainable Development Goals and improving
access to government services, ensuring that the benefits of ICT are enjoyed by all citizens. Through these
strategic directives, the National ICT Policy has not only governed the usage of ICT but has also propelled
Kenya towards becoming a regional leader in technological innovation and efficiency.
2. Kenya Information Communication Act: This act provides regulations for telecommunication services,
duties of telecommunications operators and subscribers, and other related matters.
Kenya Information Communication Act has played a pivotal role in shaping the landscape of ICT within
Kenya's territorial boundaries. It has established a regulatory framework that governs telecommunications
services, ensuring that operators and subscribers adhere to set standards and practices. This act has
facilitated the liberalization of the telecommunications sector, inviting private enterprises and fostering
competition, which has been instrumental in improving the quality and accessibility of ICT services across
the nation. The act also addresses issues related to consumer protection, privacy, and the responsible use of
technology, contributing to a robust and dynamic ICT environment.
Furthermore, the act has been amended to keep pace with the evolving digital landscape, addressing
contemporary challenges such as cybercrime, data protection, and digital taxation. For instance, the
introduction of the Digital Services Tax and the Personal Data Protection Act reflects the government's
commitment to protecting citizens' data and ensuring fair taxation in the digital economy. These legislative
measures have not only enhanced Kenya's ICT infrastructure but also supported the country's Vision 2030
by promoting technological innovation and ensuring that ICT remains a key driver of economic growth and
social development.
3. ICT Sector Policy: Published by the Communications Authority of Kenya, this policy replaced the
Telecommunications and Postal Sector Guidelines of December 2001 and outlines the priorities for the ICT
sector in supporting the realization of Vision 2030
The ICT Sector Policy in Kenya has been a cornerstone in the governance and usage of ICT within the
country's territorial boundaries. It has provided a strategic direction for the growth and development of the
ICT sector, aligning with the national development agenda outlined in Kenya's Vision 2030. The policy
emphasizes the importance of a mobile-first approach, ensuring that mobile technologies are leveraged to
drive socio-economic development. It also focuses on creating a conducive market environment that fosters
innovation and skills development, while enhancing public service delivery through the use of ICT. By
addressing the operational environment and regulatory background, the policy has facilitated the expansion
of ICT infrastructure, enabling widespread access to digital services and promoting digital literacy among
the population.
Moreover, the policy has set ambitious targets to grow the contribution of ICT to the economy, aiming to
reach 10% by 2030. It seeks to establish Kenya as a hub for data centers, Internet of Things (IoT), machine
learning, and local manufacturing, while fostering a secure and innovative ecosystem. The policy also
underscores the significance of regional and international cooperation, positioning Kenya to harness global
opportunities and trends such as the shared and gig economy. Through these strategic initiatives, the ICT
Sector Policy has not only governed the usage of ICT but has also propelled Kenya towards global
recognition for innovation, efficiency, and quality in public service delivery.
The Kenya Information and Communications (Interconnection) Regulations, 2022 play a crucial role in
governing the usage of ICT within Kenya’s territorial boundaries. These regulations provide a framework for
interconnection between different telecommunications service providers, ensuring fair competition, efficient
network connectivity, and seamless communication. Let’s explore the key aspects:
In summary, the Kenya Information and Communications (Interconnection) Regulations, 2022 promote
efficient, transparent, and equitable interconnection practices among telecommunications service providers.
By adhering to these regulations, Kenya fosters a robust and competitive ICT ecosystem.
E-Government strategy
Certainly! The E-Government Strategy in Kenya outlines a comprehensive framework for leveraging
Information and Communications Technology (ICT) to enhance government operations, improve service
delivery, and promote transparency. Let’s delve into the details:
In summary, Kenya’s E-Government Strategy aims to transform government operations, enhance citizen
engagement, and improve service delivery through ICT. By promoting transparency, efficiency, and
accessibility, e-Government contributes to Kenya’s development goals and empowers citizens and
businesses.
These laws and policies are designed to ensure that ICT services are used in a way that is beneficial to the
citizens and the economy, while also safeguarding against misuse and ensuring data privacy and security.
QN 1(d)Discuss five(5) reasons why ICT usage has to be regulated in any country
Regulating Information and Communication Technology (ICT) usage is essential for several reasons, and
here are five detailed explanations:
4.Content Management:
The internet is a vast repository of information, not all of which is beneficial or legal. Regulations help
manage online content, curbing the spread of harmful material such as child exploitation, hate speech, and
incitement to violence. They also combat digital piracy, protecting the rights of content creators. By setting
content standards, regulations ensure that the internet remains a safe space for users, particularly minors, and
supports the ethical distribution of digital content.
5.Sustainable Development:
ICT equipment manufacturing and disposal can have significant environmental impacts. Regulations can
enforce the responsible design, use, and recycling of electronic devices, reducing electronic waste and
promoting sustainability. They can also encourage the development of energy-efficient technologies,
contributing to efforts to combat climate change. By integrating environmental considerations into ICT
policies, regulations help ensure that the growth of the digital economy is sustainable and does not come at
the expense of the planet's health.
In conclusion, the regulation of ICT usage is multifaceted and vital for protecting individuals, ensuring
national security, maintaining a fair and competitive market, managing online content, and promoting
sustainable development. As technology continues to advance, these regulations must evolve to address new
challenges and opportunities.
QUESTION TWO
(a)The word internet was coined from two distinct words INTERconnection and NETwork.Explain how the
internet works in order to enable information to be accessible worldwide.
Definition of Interconnection –it refers to the linking or connection of multiple systems or devices together
to enable communication or exchange of information between them.It involves establishing pathways or
channels through which data can flow between entities.
Definition of Network-it is a collection of interconnected systems,devices or nodes that are linked together
to share resources such as data ,information or services.Network can be physical like cables and voulers,or
virtual,like connection established over the internet.
In the context of internet,interconnection and network come together to form a vast global system of
interconnected devices and infrastructure that allows for the exchange of data and communication across the
world.
Definition of Internet-it is a network of computer networks all across the world that are connected. The
purpose of the internet is to send data between different computer.
The internet is a global network of interconnected devices that allows information to flow seamlessly across
the globe. Here’s a detailed breakdown:
1. Hardware Infrastructure:
o Transmission Lines: The internet relies on physical infrastructure such as fiber-optic cables,
satellites, and cell towers. These transmission lines carry data signals across vast distances.
o Routers and Switches: At various points along the network, routers and switches direct data
packets to their intended destinations. Think of them as traffic controllers for internet data.
2. Data Packets and Protocols:
o Data Packets: When you send an email, stream a video, or load a webpage, your data is
broken down into smaller chunks called packets. Each packet contains a piece of your
message.
o Protocols: These are sets of rules that machines follow to complete tasks. The most
fundamental protocol on the internet is the Internet Protocol (IP). It assigns unique addresses
(IP addresses) to devices and ensures data packets find their way to the right destination.
3. Routing and Domain Name System (DNS):
o Routing: When you request a webpage, your data packets travel through various networks.
Routers analyze the destination address and forward packets along the most efficient path.
o DNS: Imagine the internet as a giant phone book. The Domain Name System (DNS)
translates human-friendly domain names (like “google.com”) into IP addresses. When you
type a URL, DNS servers resolve it to the correct IP address, allowing your browser to find
the website.
4. Client-Server Model:
o Clients: These are your devices (computers, smartphones, tablets). They request information
from servers.
o Servers: Servers store and serve data. When you visit a website, your browser acts as a client,
requesting web pages from servers.
5. HTTP and HTTPS:
o HTTP (Hypertext Transfer Protocol): This protocol governs how web browsers and servers
communicate. When you visit a non-secure website (e.g., “http://example.com”), your data
packets travel using HTTP.
o HTTPS (Hypertext Transfer Protocol Secure): For secure communication, websites use
HTTPS. It encrypts data between your browser and the server, ensuring privacy and
preventing eavesdropping.
6. Web Pages and Content Delivery:
o When you click a link or enter a URL, your browser sends an HTTP request to the server
hosting the website.
o The server processes the request, retrieves the relevant web page (which may include text,
images, videos, and scripts), and sends it back to your browser as data packets.
o Your browser assembles the packets, renders the web page, and displays it on your screen.
In summary, the internet is a vast interconnected system where data travels in packets, guided by protocols
and routed through various devices. Whether you’re reading this explanation, watching a cat video, or
collaborating with colleagues across the world, it’s all thanks to the intricate dance of data packets and the
underlying infrastructure that makes the internet accessible worldwide.
(b)Using a well labbelled-diagram explain the principle of packet switching used to transmit signals via the
internet
2. Header Information:
o The header of each packet includes essential details:
Source Address: The IP address of the sender.
Destination Address: The IP address of the intended recipient.
Sequence Number: Helps reassemble packets in the correct order.
Checksum: Ensures data integrity during transmission.
4. Variable Routes:
o Unlike traditional circuit-switched networks, where a dedicated path is established for the entire
communication, packet switching allows packets to take different routes.
o This flexibility ensures efficient use of network resources and resilience against failures.
6. Store-and-Forward Process:
o Routers use a store-and-forward mechanism:
They receive a packet.
Check its header.
Store it in a buffer.
Forward it to the next hop.
o This process ensures reliable delivery and error handling.
7. Reassembly at Destination:
o When packets reach their destination, they are reassembled based on their sequence numbers.
o The receiving device extracts the payload from each packet and reconstructs the original data.
Packet Switching in computer networks is a method of transferring data to a network in the form of
packets. In order to transfer the file fast and efficiently over the network and minimize the transmission
latency, the data is broken into small pieces of variable length, called Packet. At the destination, all these
small parts (packets) have to be reassembled, belonging to the same file. A packet is composed of a
payload and various control information. No pre-setup or reservation of resources is needed.
Packet Switching uses the Store and Forward technique while switching the packets; while forwarding the
packet each hop first stores that packet then forwards. This technique is very beneficial because packets
may get discarded at any hop for some reason. More than one path is possible between a pair of sources
and destinations. Each packet contains the Source and destination address using which they independently
travel through the network. In other words, packets belonging to the same file may or may not travel
through the same path. If there is congestion at some path, packets are allowed to choose different paths
possible over an existing network.
Diagram of Packet Switching
In packet switching the data is divided into small packets which allow faster movement of data. Each
packet contains two parts that is Header and Payload, the header on each packet conation information.
Below is the diagram of how packet switching works .
Packet Switching
Virtual Circuit
All address information is only transferred during the setup phase. Once the route
to a destination is discovered, entry is added to the switching table of each
intermediate node. During data transfer, packet header (local header) may contain
information such as length, timestamp, sequence number, etc.
Connection-oriented switching is very useful in switched WAN. Some popular
protocols which use the Virtual Circuit Switching approach are X.25, Frame-Relay,
ATM, and MPLS(Multi-Protocol Label Switching).
2. Connectionless Packet Switching (Datagram)
Unlike Connection-oriented packet switching, In Connectionless Packet Switching
each packet contains all necessary addressing information such as source address,
destination address, port numbers, etc. Packets belonging to one flow may take
different routes because routing decisions are made dynamically, so the packets
that arrived at the destination might be out of order. It has no connection setup
and teardown phase, like Virtual Circuits.
Packet delivery is not guaranteed in connectionless packet switching, so reliable
delivery must be provided by end systems using additional protocols.
Datagram Packet Switching
A—R1—R2—BA is the sender (start)R1, R2 are two routers that store and forward
dataB is receiver(destination)
To send a packet from A to B there are delays since this is a Store and Forward
network.
(c)Explain the role of undersea cables (i.e submarine communication cables) in the transmission of internet
traffic
These fiber-optic cables lie on the ocean floor and serve as the backbone of international communications.
Let’s delve into their critical role:
1. Global Connectivity:
o Undersea cables connect continents, enabling seamless data transmission across the world.
They carry a vast majority of international internet traffic, including emails, webpages, video
calls, and streaming services.
o For example, when you send an email from Kenya to the United States or stream a movie
from Europe, chances are the data travels through undersea cables.
2. High-Speed Data Transmission:
o Undersea cables provide high bandwidth and low latency. Unlike satellite communication,
which introduces significant delays due to signal travel time, cables offer near-instantaneous
data transfer.
o The speed of light in fiber-optic cables allows for rapid transmission, making them ideal for
real-time applications.
3. Capacity and Redundancy:
o These cables have immense capacity, measured in terabits per second (Tbps). They can
handle massive data flows simultaneously.
o To ensure reliability, multiple cables connect continents, creating redundancy. If one cable is
damaged (due to natural disasters or other factors), traffic automatically reroutes through
alternate paths.
4. Examples of Undersea Cables:
o SEA-ME-WE 5: This cable system connects Southeast Asia, the Middle East, and Western
Europe. It spans over 20,000 kilometers and provides critical connectivity for countries along
its route.
o Transatlantic Cables: Cables like MAREA (between the U.S. and Spain) and HAVFRUE
(connecting the U.S. and Denmark) link North America and Europe.
o Africa-1: This cable system connects South Africa, West Africa, and Europe, enhancing
Africa’s internet connectivity.
5. Challenges and Security:
o Physical Damage: Undersea cables are susceptible to accidental damage from ship anchors,
fishing activities, and earthquakes.
o Security Threats: Protecting these cables is crucial. Intentional sabotage or cyberattacks could
disrupt global communication.
o Geopolitical Considerations: Ownership and control of cable landing points impact data
sovereignty and national security.
In summary, undersea cables silently carry the digital pulse of our interconnected world, enabling seamless
communication and driving global progress.
(d)Describe any five(5) undersea cables that land in the coast of Kenya
1.SEACOM
SEACOM is a 17,000 km (11,000 mi) submarine cable connecting South Africa, Kenya, Tanzania,
Mozambique, Djibouti, France and India. The SEACOM cable system was ready for service on 23 July
2009, supplied by SubCom.
Mtunzini, South Africa, in a partnership with Neotel as landing party in South Africa and extending
to Neotel data centre in Midrand, Johannesburg
Mombasa, Kenya
Dar Es Salaam, Tanzania
Maputo, Mozambique
YAC A CLS, Djibouti
Zafaranan, Egypt
Abu Talat, Egypt
Marseille, France
Mumbai, India
The SEACOM cable system is variously described as a $600 million investment. The initial private
investment in the SEACOM project was US$375 million: $75 million from the developers, $150 million
from private South African investors, and $75 million as a commercial loan from Nedbank (South Africa).
The remaining $75 million was provided by Industrial Promotion Services (IPS), which is the industrial and
infrastructure arm of the Aga Khan Fund for Economic Development. The IPS investment was funded by
$15 million in equity, and a total of $60.4 million in debt from the Emerging Africa Infrastructure Fund and
the FMO.
Current ownership structure of SEACOM is as follows: 30% IPS, 30% Remgro, 15% Sanlam, 15%
Convergence Partners, and 10% Brian Herlihy.
SEACOM and TGN-EA are a common cable in some segments. SEACOM represents the East African
portion of the system as well as two fiber pairs between Egypt and India. Tata Communications TGN-EA
has two fiber pairs from Egypt to India and the branch to Jeddah. Both SEACOM and Tata Communications
TGN EA have one fiber pair on TE North for connectivity across Egypt to Europe.
SEACOM NETWORK
2.TEAMS
The TEAMS cable system was completed in August 2009 and went live for commercial service on 1st
October 2009.
The East African Marine Systems (TEAMS) is a 5,000Km subsea cable connecting Mombasa in Kenya
to Fujairah in the UAE, with two fiber pairs and upgradable system capacity of 5.6Tbps.
TEAMS cable system is 85% owned by TEAMs (Kenya) Ltd and 15% owned by Etisalat of the United Arab
Emirates (UAE).
Alcatel-Lucent Submarine Networks (ASN) was awarded the $79 million contract to supply and construct
the TEAMS cable system in October 2007.
3.EASSy
Eastern Africa Submarine System (EASSy) is a 10,000km submarine cable system along the east coast of
Africa, with 9 landing stations in Sudan, Djibouti, Somalia, Kenya, Tanzania, Comoros, Madagascar,
Mozambique and South Africa, provides a backhaul system for at least 12 landlocked countries, enabling
wide coverage in the East African region.
The EASSy cable system was ready for service in July 2010.
The EASSy cable system comprises two fiber pairs, initially designed with 68*10Gbps DWDM technology.
The design capacity was upgraded to 4.72 Tbps in 2011 with ASN's 40Gbps wavelength technology, further
upgraded to more than 10Tbps with ASN's 100Gbps technology in 2014. The system has deployed a
latest upgrade with Ciena's GeoMesh Extreme solutions to reach a system capacity of 36Tbps.
The EASSy project costs an initial investment at approximately US$ 235 million.
The EASSy Consortium consists of 18 members, including Bharti Airtel, Botswana Fibre Networks, BT,
Comores Telecom, Djibouti Telecom, Etisalat, Mauritius Telecom, MTN Group, Neotel, Orange, Saudi
Telecom, Sudan Telecom Company, Tanzania Telecommunications Company Limited (ZANTEL), Telkom
Kenya, Telkom South Africa, Telma (Telecom Malagasy), Vodacom DRC, WIOCC, Zambia Telecom.
According to Many Possibilities, EASSy is 90% African-owned although that ownership is underwritten by
a substantial investment by Development Financial Institutions (DFIs) including World Bank/IFC, EIB,
AfDB, AFD, and KfW. Total DFI investment is apparently $70.7 million, with $18.2 million coming from
IFC, 14.5 million from AfDB. This is a smaller amount than the originally advertised $120 million
investment from DFIs.
South African investors in EASSY include Telkom/Vodacom ($18.9 million) , MTN ($40.3 million), and
Neotel (~$11 million). MTN is the largest operator investor in the EASSy project. Telkom is the landing
party and owner of the Mtunzini cable landing station in South Africa.
WIOCC is the largest shareholder in the EASSy Consortium and owns 29% of the EASSy cable system.
AfDB funding was a vital element in the setting up of the West Indian Ocean Cable Company (WIOCC),
which was established as a “Special Purpose Vehicle” (SPV) and largest shareholder in the EASSy
submarine cable system.
The LION cable system consists of two fiber pairs, with an initial design capacity of 1.28Tbps (26410Gbps).
The LION consortium comprises Orange Madagascar, Mauritius Telecom and France Telecom S.A..
Overall, the LION project cost an estimated US$37 million.
LION2 (Lower Indian Ocean NetWork II) is a 2700km submarine cable network connecting LION to
Mayotte and Mombasa, Kenya. The LION2 is an extension of the LION cable system.
The LION2 consortium includes France Telecom-Orange and its subsidiaries Mauritius Telecom, Orange
Madagascar and Telkom Kenya, Emtel, Societe Reunionnaise du Radiotelephone and STOI Internet.
Telkom Kenya operates a cable landing station in Nyali, Mombasa for the LION2 cable system.
The LION2 cable system costs about $76 million with $42 million coming directly from France Telecom.
The LION2 cable system was ready for service in April 2012, with an initial design capacity of 1.28Tbps
(2*64*10Gbps).
LION
& LION2 CABLE MAP
LION & LION2 SYSTEM CONNECTIVITY
5.DARE1
The Djibouti Africa Regional Express 1(DARE1) submarine cable system connects Djibouti (Djibouti),
Bosaso (Somalia), Mogadishu (Somalia) and Mombasa (Kenya). With a finalized route length of 4,854km,
DARE1 cable system delivers up to 36 Tbps of capacity to East Africa.
The DARE1 cable system is designed with a three-fibre-pair trunk, with each fibre pair delivering capacity
of 120 channels at 100 Gbps. The Bosaso branch of the DARE1 cable is of 108 km and two fiber pairs.
The DARE1 consortium is currently composed of Djibouti Telecom, Somtel, Hormuud Telecom and Telkom
Kenya as landing partner in Kenya.
The initial investment cost of the DARE1 cable system is about US$86million.
DARE1
CABLE MAP, SOURCE: SUBCOM
(e)How can Kenya and surrounding countries reap maximum benefit from internet connectivity provided by
the undersea cables you have discussed?
The undersea cables landing in Kenya—SEACOM, DARE 1, EASSY, TEAMS, LION, and LION 2—have
immense potential to transform Kenya and the surrounding regions.
1.Enhanced Connectivity:
o These cables provide high-speed internet access, reducing latency and enhancing communication across
borders.
o Kenya can leverage this connectivity to foster collaboration, trade, and knowledge sharing with
neighboring countries.
2.Economic Growth:
o Reliable internet infrastructure attracts foreign investment and supports local businesses.
o Kenya can position itself as a regional hub for technology, e-commerce, and digital services, creating
jobs and boosting GDP.
o Universities and research institutions benefit from seamless access to global knowledge.
o Kenya can collaborate on research projects, participate in online courses, and enhance educational
outcomes.
o Undersea cables support efficient government services, e-governance, and citizen engagement.
o Kenya can digitize processes, improve transparency, and enhance public service delivery.
9.Financial Inclusion:
o Digital banking and mobile money services thrive with robust connectivity.
o Kenya can expand financial inclusion, empowering citizens economically.
o Kenya can partner with neighboring countries for joint projects, such as cross-border e-commerce
platforms or shared data centers.
o Regional cooperation can lead to mutual growth and stability.
In summary, these undersea cables offer Kenya and its neighbors a gateway to a digital future. By leveraging
this connectivity wisely, they can drive economic progress, innovation, and societal well-being.
QUESTION THREE
(a)Provide any three definition of the term information and communication technology as given in literature
available to you
UNESCO: "Information and Communication Technology (ICT) refers to forms of technology that
are used to transmit, process, store, create, display, share, or exchange information by electronic
means. This broad definition of ICT includes technologies such as radio, television, video, DVD,
telephone (both fixed-line and mobile), satellite systems, computer and network hardware and
software, as well as the services and applications associated with them, such as videoconferencing
and distance learning.
"World Bank: "Information and Communication Technologies consist of the hardware, software,
networks, and media for the collection, storage, processing, transmission, and presentation of
information (voice, data, text, images). ICT can be divided into two main components: information
technology (IT), which refers to systems for processing, storing, and transmitting information, and
communications technology (CT), which includes telecommunications technologies and networks."
European Commission: "ICT is a term used to describe technologies that provide access to
information through telecommunications. It is similar to Information Technology (IT), but focuses
primarily on communication technologies. This includes the Internet, wireless networks, cell phones,
and other communication mediums."
Oxford Dictionary: "Information and Communication Technology (ICT) is the study or use of
systems (especially computers and telecommunications) for storing, retrieving, and sending
information."
Australian Curriculum, Assessment and Reporting Authority (ACARA): "ICT refers to the
technologies that provide access to information through telecommunications. This includes the
Internet, wireless networks, cell phones, and other communication mediums. ICTs are used to
manage information and assist communication."
National Institute of Standards and Technology (NIST): "Information and Communications
Technology (ICT) encompasses all the technology used to handle telecommunications, broadcast
media, intelligent building management systems, audiovisual processing and transmission systems,
and network-based control and monitoring functions."
ICT encompasses various elements that work together to enable communication, data processing, and
information exchange. Here are the key components:
1. Hardware:
o Definition: Hardware refers to the physical devices used in an ICT system. These devices
facilitate data input, processing, and output.
o Examples:
Input Devices: Keyboards, scanners, barcode readers, touchscreens, and cameras
allow users to input data.
Processing Units: Microprocessors (CPUs), memory (RAM), and storage devices
(hard drives, SSDs) process and store data.
Output Devices: Monitors, printers, and speakers display or produce information.
o Importance: Proper hardware selection ensures efficient data handling and user interaction.
2. Software:
o Definition: Software includes programs and applications that manage data, perform
calculations, and control hardware.
o Examples:
Operating Systems: Windows, macOS, Linux.
Application Software: Word processors (e.g., Microsoft Word), databases (e.g.,
MySQL), web browsers (e.g., Chrome), video players, and graphics editors.
o Importance: Software enables data manipulation, analysis, and communication.
3. Data:
o Definition: Data is raw information entered into an ICT system. It can be text, numbers,
images, or any other form.
o Sources of Data:
Manual entry via keyboards.
Electronic transfer over networks or the internet.
Scanning barcodes or smart cards.
o Importance: Data serves as the foundation for generating meaningful information.
4. People:
o Definition: People are users of the ICT system. They interact with hardware, software, and
data.
o Roles:
End Users: Individuals who input data, retrieve information, and use applications.
System Analysts: Design and oversee system development.
ICT Support Staff: Train users and troubleshoot issues.
o Importance: People drive system usage, efficiency, and effectiveness.
5. Procedures:
o Definition: Procedures outline how tasks should be performed within an organization’s ICT
system.
o Examples:
Data entry guidelines.
System development processes.
Security protocols.
o Importance: Consistent procedures ensure smooth operations and data integrity.
6. Information:
o Definition: Information results from processing data. It is meaningful, organized, and
relevant.
o Forms of Information:
Displayed on screens.
Printed as reports.
Transferred between systems.
o Importance: Information informs decision-making, supports communication, and drives
actions.
7. Integration:
o Definition: Integration refers to combining all components into a cohesive ICT system.
o Example: An integrated system allows seamless data flow from input to processing and
output.
o Importance: Integration ensures efficient communication and maximizes system
effectiveness.
8. ICT Services and Applications:
o Services:
Communication Services: Email, instant messaging, video conferencing.
Cloud Services: Storage, collaboration tools (e.g., Google Drive).
Security Services: Antivirus, firewalls, encryption.
o Applications:
Office Productivity: Word processing, spreadsheets, presentations.
Enterprise Resource Planning (ERP): Integrated business management software.
Customer Relationship Management (CRM): Managing customer interactions.
Educational Applications: E-learning platforms.
o Importance: Services and applications enhance productivity, collaboration, and efficiency.
In summary, ICT integrates hardware, software, data, people, procedures, and information to create
functional systems. Whether it’s a simple office computer or a complex network, understanding these
components is essential for effective technology utilization.
Supermarkets play a crucial role in retail, and ICT enhances their efficiency, customer experience, and
overall management. Here are the ways ICT is employed in Thika’s supermarkets:
In summary, ICT plays a pivotal role in Thika’s supermarkets, enhancing operations, customer satisfaction,
and overall business performance. As technology continues to evolve, supermarkets will further integrate
ICT to stay competitive and meet customer expectations. 🛒🌐💡123
MKU has made significant strides in integrating technology across various aspects of campus life. Here are
the key areas where ICT plays a crucial role:
In summary, MKU’s Main Campus leverages ICT to create engaging learning environments, enhance
security, streamline administrative processes, and foster innovation. The university remains committed to
providing students with the best possible learning experiences. 🌐💡123
ICT plays a critical role in enhancing healthcare delivery, improving patient outcomes, and streamlining
administrative processes. Here are some key aspects:
In summary, ICT in Thika’s hospitals transforms healthcare by enabling efficient data management,
telemedicine, analytics, and patient engagement. These technological advancements contribute to better
health outcomes and streamlined operations.
Information and communication technology (ICT) has revolutionized the healthcare sector in recent years.
ICT has made it possible to store, share and manage patient data more effectively. It has also enhanced
communication between healthcare professionals and patients.
The use of ICT in healthcare has led to better patient care and improved clinical outcomes. It has also helped
to reduce the cost of healthcare delivery.
The use of ICT in healthcare has led to better patient care. ICT tools such as electronic health records
(EHRs), telemedicine and health information portals have made it possible to store, share and manage
patient data more effectively.
The use of ICT in healthcare has also helped to improve clinical outcomes. ICT tools such as decision
support systems and clinical decision support systems have been shown to improve the quality of care.
The use of ICT in healthcare has helped to reduce the cost of healthcare delivery. ICT tools such as
telemedicine and e-prescribing have been shown to reduce the cost of care.
4. Enhanced communication
The use of ICT in healthcare has enhanced communication between healthcare professionals and patients.
ICT tools such as health information portals and patient portals have made it possible for patients to access
their health information and communicate with their healthcare providers.
The use of ICT in healthcare has improved access to care. ICT tools such as telemedicine and e-health have
made it possible for patients to access care from anywhere at any time.
6. Increased efficiency
The use of ICT in healthcare has increased the efficiency of healthcare delivery. ICT tools such as EHRs and
health information portals have made it possible for healthcare providers to access and share patient data
more effectively.
The use of ICT in healthcare has improved the quality of care. ICT tools such as clinical decision support
systems and quality improvement programs have been shown to improve the quality of care.
The use of ICT in healthcare has led to greater patient satisfaction. ICT tools such as patient portals and
health information portals have made it possible for patients to access their health information and
communicate with their healthcare providers.
9. Increased transparency
The use of ICT in healthcare has increased transparency in the healthcare sector. ICT tools such as health
information portals and patient portals have made it possible for patients to access their health information
and communicate with their healthcare providers.
The use of ICT in healthcare has improved coordination between healthcare professionals. ICT tools such as
EHRs and health information portals have made it possible for healthcare providers to access and share
patient data more effectively.
ICT plays a crucial role in enhancing customer experiences, streamlining operations, and improving overall
efficiency. Here are some key aspects:
In summary, ICT transforms the hospitality industry by enhancing guest experiences, improving efficiency,
and enabling personalized services. Whether it’s booking a room or ordering a meal, technology plays a vital
role in Thika’s hotels and restaurants.
o Description: Transport companies use ICT to monitor their fleet of vehicles. GPS tracking
systems provide real-time information on vehicle location, speed, and routes.
o Benefits:
Route Optimization: Companies can choose the most efficient routes, reducing fuel
consumption and delivery time.
Security: Tracking systems enhance security by preventing theft and ensuring driver
safety.
Maintenance: ICT alerts companies about vehicle maintenance schedules, minimizing
breakdowns.
o Description: Courier companies use ICT platforms for booking and dispatching orders.
o Examples:
Online Booking Portals: Customers can book deliveries online.
Automated Dispatch Algorithms: Assign orders to the nearest available courier.
o Benefits:
Efficiency: Streamlined order processing.
Accuracy: Reduced manual errors.
Real-time Updates: Customers receive notifications about their deliveries.
o Description: ICT systems manage inventory, storage, and order fulfillment in warehouses.
o Components:
Barcode Scanners: Track items during storage and retrieval.
Inventory Software: Monitor stock levels.
o Benefits:
Efficient Order Picking: WMS guides warehouse staff to the right items.
Inventory Accuracy: Real-time updates prevent stockouts.
o Description: ICT helps optimize the final leg of delivery from the distribution center to the
customer.
o Examples:
Delivery Route Algorithms: Determine the most efficient sequence for multiple stops.
Crowdsourced Delivery Platforms: Utilize local couriers or independent drivers.
o Benefits:
Timeliness: Faster last-mile delivery.
Cost Reduction: Efficient routes save fuel and labor costs.
7.E-commerce Integration:
ICT plays a crucial role in enhancing service delivery, improving efficiency, and promoting transparency.
Here are some key aspects:
In summary, Thika Town leverages ICT across various sectors, from youth empowerment and health
services to infrastructure development and public safety. The government’s commitment to digital
transformation ensures a brighter future for Thika’s residents.
REFERENCES
https://klrc.go.ke/index.php/constitution-of-kenya/112-chapter-four-the-bill-of-rights/part-2-rights-and-
fundamental-freedoms/199-33-freedom-of-expression
https://afrocave.com/access-to-information/
https://ombudsman.go.ke/sites/default/files/2023-09/AccesstoInformationActNo31of2016.pdf
232. Values and principles of public service - Kenya Law Reform ....
https://klrc.go.ke/index.php/constitution-of-kenya/174-chapter-thirteen-the-public-service/part-1-values-and-
principles-of-public-service/401-232-values-and-principles-of-public-service.
The National Information, Communication and Technology (ICT) Policy .... https://cfllegal.com/the-
national-information-communication-and-technology-ict-policy-guidelines-2020/.
https://desklib.com/document/usage-and-value-of-ict-in-courier-company-operations/
https://www.cybo.com/KE/thika/couriers-and-package-delivery/
https://klrc.go.ke/index.php/constitution-of-kenya/174-chapter-thirteen-the-public-service/part-1-values-and-
principles-of-public-service/401-232-values-and-principles-of-public-service
https://klrc.go.ke/index.php/constitution-of-kenya/112-chapter-four-the-bill-of-rights/part-2-rights-and-
fundamental-freedoms/201-35-access-to-information
https://www.ict.go.ke/wp-content/uploads/2019/05/KENYA-E-GOVERNMENT-STRATEGY-2004.pdf
https://www.ca.go.ke/sites/default/files/2023-06/Consumer-Protection-Regulations-2010-1.pdf
https://www.geeksforgeeks.org/packet-switching-and-delays-in-computer-network/
https://techxplore.com/news/2024-04-undersea-cables-unseen-backbone-global.html
https://theconversation.com/undersea-cables-are-the-unseen-backbone-of-the-global-internet-226300
https://kiambu.go.ke/
https://www.businesslist.co.ke/category/information-technology/city:thika
https://www.g4s.com/en-ke/what-we-do/services/courier-services
https://www.ict.ac.ke/
https://www.tripadvisor.ca/Restaurants-g1026018-zfp58-Thika_Central_Province.html
https://www.expedia.com/Thika-Hotels-Hotels-With-Restaurants.0-0-d3000001022-
tHotelswithRestaurants.Travel-Guide-Filter-Hotels
https://www.bing.com/travel/hotels/detail?
q=hotels+in+Thika&id=YN8091x14770704172843240341&hotellistid=YN8091x14770704172843240341
&hname=Eton+Hotel&cin=Sunday%2c+August+04+2024&cout=Monday
%2c+August+05+2024&guests=2A&rooms=1&displaytext=thika&loc=thika&lat=-
1.040185&lon=37.073364&type=hotel&form=HTCHAT&entrypoint=HTCHAT
https://www.the-star.co.ke/news/2024-03-22-mku-rolls-out-major-ict-infrastructure-upgrade-with-focus-on-
digital-learning/
https://www.mku.ac.ke/school-of-computing-informatics/
https://www.academia.edu/101034138/
Factors_that_influence_ICT_adoption_by_small_and_medium_enterprises_a_case_study_of_SMEs_in_Thi
ka_municipality
https://computingway.com/ict-system-components-services-applications/
https://techbilion.com/what-are-the-five-5-components-of-ict/
https://www.submarinenetworks.com/en/systems/asia-europe-africa/dare1/dare1-cable-achieves-final-
landing-in-kenya
https://telkom.co.ke/press-release/telkom-and-peace-cable-company-land-new-submarine-cable-in-kenya/
https://tech-ish.com/2022/03/29/telkom-undersea-cable-mombasa/
https://www.the-star.co.ke/news/2022-03-29-kenya-gets-sixth-submarine-fibre-cable-worth-sh44-billion/
https://www.the-star.co.ke/business/kenya/2022-03-31-internet-cost-in-kenya-to-drop-on-new-high-speed-
submarine-cable/
https://www.techjockey.com/blog/comprehensive-guide-to-ict-information-communication-technology