Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
97 views16 pages

Network Solutions for Rural Ethiopia

network
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views16 pages

Network Solutions for Rural Ethiopia

network
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

MADDA WALABU UNIVERSITY

COLLEGE OF COMPUTING
DEPARTMENT OF INFORMATION TECHNOLOGY
FOURTH YEAR SUMMER STUDENTS
SECTION D
GROUP A:
Proposal Title: Enhancing Network Connectivity in East Bale Zone Dawe Kachen Distirict.

S.No Group Members ID NO


1 Abubeker Burka Kelda CISP/0134/11

2 Abduraman Mohammed Abdulkadir CISP/0132/11

3 Teha Mohammed Abdulahi CISP/0168/11

4 Jewaro Dedefo Home CISP/0152/11

5 Yusuf Mohammed Fato CISP/0172/11

6 Gete Motuma Lami CISP/0148/11

7 Gadise Birhanu Ketema CISP/0147/11

Submitted to:
August, 2024
Bale Robe, Ethiopia

Contents
1. Introduction.............................................................................................................................................3
1. 1 Introduction......................................................................................................................................3
1.2 statement of the problem.................................................................................................................4
1.3. Objectives.........................................................................................................................................5
1.3.1 General objectives......................................................................................................................5
1.3.2 Specific objectives.......................................................................................................................5
1.4 Scope and limitations of the research...............................................................................................5
1.5 Significance of the research /contribution.........................................................................................5
1.6 Organization of the study..................................................................................................................6
2 LITERATURE REVIEW.................................................................................................................................7
2.1 Introduction.......................................................................................................................................7
2.2 Network.............................................................................................................................................7
2.2.1 Essential Elements of a Computer Network................................................................................8
2.3 Factors of network performance degradation...................................................................................8
3 RESEARCH METHODOLOGY......................................................................................................................9
3.1 Introduction.......................................................................................................................................9
3.2 Research design...............................................................................................................................10
3.3 Research method.............................................................................................................................10
3.4 Population Size and Sampling..........................................................................................................11
3.4.1 Target Population.....................................................................................................................11
3.4.2 Sampling frame.........................................................................................................................11
3.5 Methods and tools of Data collection..............................................................................................11
3.5.1 Methods of data collection.......................................................................................................11
3.6 Data Analysis Method......................................................................................................................12
3.6.1 Using the Google Form.............................................................................................................12
3.7 Proposing Network Performance Optimizing Framework...............................................................12
4. Work plan and budget...........................................................................................................................12
4.1: Time break down for each activity..................................................................................................12
4.2. Cost.................................................................................................................................................14
.References................................................................................................................................................15
1. Introduction
1. 1 Introduction:
The availability of reliable and efficient network connectivity is essential for
promoting economic development, access to information, and improved
communication in rural areas. This research proposal aims to investigate and
propose solutions to enhance network connectivity in the East Bale Zone,
specifically focusing on the Dawe Kachen District. The study will assess the
existing connectivity infrastructure, identify gaps and challenges, and
propose strategies to improve network connectivity in the district.
In today’s digital age, access to the internet is crucial for individuals to participate fully in the
global economy, access educational resources, and connect with others. However, there are still
communities around the world that lack reliable internet connectivity, limiting their opportunities
for growth and development. This project proposal aims to address this issue by establishing
public internet access points in communities without internet connectivity, ensuring that all
individuals have equal access to the benefits of the digital world.

The Internet consists of thousands of Autonomous Systems (ASes), operated by many different
administrative domains. ASes should cooperate with each other to provide global Internet
connectivity using an inter-domain routing protocol. BGP is the dominant routing protocol used
to exchange reach ability information across ASes.

Since the early days of growing the internet, people found out that a simple shortest-path routing
protocol is insufficient to handle operational, economic, and political factors involved in routing.
Internet Service Providers (ISPs) would like to control the way traffic flowed for economic and
political reasons. So they modified BGP which was originally a simple path-vector protocol to
support routing policies. The range of these policies is long and there are various reasons for
enforcing such policies such as economic, performance, security, political and scalability factors.
A link between ASes is established when a contractual agreement to exchange traffic is made
between them. AS relationships have a deep influence on traffic flow in the Internet. On the
other hand, policies enforced by ISPs shape routing behaviors. Reversely, routing behaviors
represents general relationship between two ASe. Using this property, routing behaviors can be
employed to reveal some hidden business or political relationships between two entities. This
notion is the main motivation of the current project.
Networking is a network that permits sharing of information and transfer between a number of
devices. Hardware, such as routers, modems, computers, servers, network firewalls, switches that
are needed, and gateways, link together to establish networks of computers. These gadgets have
both wireless and physical connectivity. A across the globe computer network called the
Internet . Here thousands of millions of individuals all over the globe are linked to the global
Internet as a collaborative, autonomous, freely accessible resource. That is employed to share
content on social networking and as a way to consume information. It has encouraged its own
social ecosystem to grow. Social media is essential for gathering and sharing information, but it
also increases bandwidth usage, which reduces network performance. For the network to
function effectively and efficiently, many conditions must be met. The order in which they rank
greatest is performance, throughput, delay, and security . Misuse of the network, unstable
connections, and a decrease in internet speed are just a few of the numerous network issues that
arise when we utilize the network. As a result, it becomes essential to keep an eye on network
traffic to make sure everything is running efficiently.

1.2 statement of the problem


Information technology should thus assist it in order to guarantee the seamless and effective
operation of office services. The field of information technology offers a few services. These are
to have an optimized network to guarantee quick and dependable operational services and to
have effective network access. The current network infrastructure of the internet in east Bale
bureau is slow, and there are interruption problems. To overcome this problem, identify the
network performance status and optimize it to propose a better framework for the office.
Network performance is determined by many factors. A few of the performance problems with
networks are sluggish internet, hinders, west of information, redeliver information, high speed
usage . If the network speed is less than normal and the application access is not fast when using
it, what do we call network lag. Latency is the time lag between the sender and the recipient of
data. Users may find it challenging to access resources due to high latency, which can also lead
to lags and a decline in network performance

Information loss is the term used to describe the dropping of a data packet during transmission.
The simultaneous use of resources by multiple users results in low response, network congestion,
and a decline in network speed. The bale zone Bureau faces challenges related to suboptimal
network performance, which hinder efficient operations and service delivery. These challenges
include slow network speeds, frequent downtime, inadequate bandwidth, security vulnerabilities
and inefficient resource utilization

1.3. Objectives
1.3.1 General objectives
The general objective of the study is to internet connectivity in Bale zone,Dawe kechen
woreda,oromia Region,East Ethiopia

1.3.2 Specific objectives


The research will have the following immediate objectives:
 Evaluate the current state of network connectivity in Dawe Kachen
District, including internet accessibility, mobile network coverage, and the
state of infrastructure.
 Identify the specific challenges and barriers hindering effective network
connectivity in the district.
 Explore potential solutions and strategies to enhance network
connectivity, taking into account local needs, resources, and technological
feasibility.
 Assess the potential impact of enhanced network connectivity on
economic growth, access to services, and community development.
 Develop an implementation plan outlining actionable steps, key
stakeholders, and required resources to enhance network connectivity in
the district.

1.4 Scope and limitations of the research


In our study without addressing application performance, the work's scope is restricted to the
onle Dawa kachin in bale zone. Data from organization network devices and responses from
specific ICT specialists were gathered to analyze network performance. The limitations of this
study are as follows:
- The respondents can’t deliver accurate data because of their ignorance.
- Due to time limitations and being unfamiliar with some devices,
1.5 Significance of the research /contribution
By optimizing network conectivity within the Bale zone woreda Bureau, the research can
enhance the efficiency and effectiveness of service delivery. This could lead to faster response
times, improved accessibility to government services. Regarding resource allocation a more
efficient network can lead to better utilization of resources within the bureau. By identifying and
addressing network performance issues, the bureau can allocate resources more effectively.

1.6 Organization of the study


There are five chapters in this research study. The study's background, research questions,
problem statement, goal, particular goal, importance, and scope were all covered in the first
chapter, or introduction. An overview of relevant literature on frameworks for network
performance improvement and related studies is included in the second. The study's
methodology for the exploratory research design, sample frame, sampling procedures, data
gathering strategies, and data analysis approaches were covered in the third chapter
2 LITERATURE REVIEW
2.1 Introduction
This chapter's primary goal is to provide a coherent theoretical and practical/empirical
foundation for the main topic of the research. To fully comprehend the current research, the
researcher has looked through a wide range of relevant literature sources, including books,
journal articles, conference proceeding papers, and the Internet.

2.2 Network
A computer network consists of two or more connected devices that may share
resources .Nowadays, people may share information with another person anywhere in the world
due to computer networking . Email, the Internet, an online library, instant messaging, video and
audio conversations are some of the few advantages that have arisen as a result of several
computer devices being connected via wired or wireless connections. Asset sharing is one of the
preferences of computer systems. When utilizing computer systems for trade, any client or asset
on the organization ought to be able to get information, equipment, and computer programs from
anyplace within the world .
Utilizing remote or cable media systems, the gadgets can communicate with each other. In order
for the information to be traded between the two, they must be physically associated with each
other by a medium such as an electrical cable. In case the distance between two communication
gadgets in an open or undertaking organization exceeds one kilometer, at that point optical
filaments are ordinarily utilized to transmit information wirelessly . Depending on their distance,
we classify computer systems as neighborhood region systems (LANs), which implies they
interface and organize gadgets over a brief distance. As a rule, it is constrained to a single region,
such as a building or instructive institution [16]. Due to low costs and poor application
execution, conventional LAN-oriented frameworks are inadequate to encourage worldwide
collaboration. The term "metropolitan range organize" (MAN) depicts a strategy of
interconnection organize gadgets over different towns. MAN, systems are more extensive than
LANs and require the help of broadcast communications suppliers as implies of communication
between computer systems. Enormous Region Systems, or WANs, which have been made to
associate computer systems that span a gigantic topographical locale through utilize of
profoundly complex equipment. As compared to MAN and LAN systems . Connect systems over
advance separations. Satellite uplinks or specialized transoceanic cables may be utilized to
interface together such sorts of worldwide arrange . A common set of guidelines and signals that
computers on a network use to interact are specified by protocol. Ethernet is used by most
networks. Ethernet is a competition media access technique that enables a network's hosts to
share a link's bandwidth. The terms "architecture" applies the two main kinds of network
architecture: via peer-to clients and servers [9]. These networks rely on machines connecting to
one another for sharing documents, printing device, including internet access; they have no need
for a server every desktop or laptop joins to an NT The domain controller. This may offer
network safety while providing a host of other services, such as including electronically mail),
the sharing of files, printing availability, and remotely handled internet access

2.2.1 Essential Elements of a Computer Network


Links and devices for networking which is the computer networking's principal structural
elements. Any number of nodes can be connected using these connections. Communication
standards describe the information interchange methods across these kinds of networks.
Interaction terminals, which are also knowns as ports .

2.3 Factors of network performance degradation


There are several performance metrics that should be used to gauge performance . Applications
running over a WAN may rapidly see a decline in performance due to a variety of issues that are
not often present in local area networks (LANs) . The high latency brought on by lengthy
transmission distances, protocol translations, and network congestions is a hurdle in wide area
networks. One main cause of the extended application response time is the prolonged latency in
the wide-area network. Transmit management protocol (TCP) serves as a transport layer protocol
that is impacted by overcrowding; these results in unexpected behavior, repeated transmissions,
and packets being lost. One of the problems that corporations face is data loss due to corruption
or crashes of their current databases, so having a backup copy of your data on a different server
is crucial. Numerous protocols do not function effectively in in WAN conditions because the
majority of existing protocols are not built for WAN situations. Our usage of the Internet has
increased recently. Even though it's critical that everyone use the Internet, some Internet users
damage networks. The following network issues are listed. Misuse of networks, harmful
connections and slowness of the internet possibly happen when using the network . The
expansion of communication channels and network technology has given rise to a number of
problems that are adversely affecting the channel that the technology operates on. Virus,
intrusion, and denial-of-service attack on network services are a few of those issues . As
information technology advances and data usage rises, the primary concern regarding speed and
latency is growing degradation of network performance results from this. Due to the rise of
social media and other entertainment websites, there is a growing gap between the amount of
bandwidth available to users and their demand, as network bandwidth usage rises daily[6]. The
network performance can be impacted by clients transmitting zero windows because they are out
of buffer space, applications generating too little data to populate the network, network
congestion, buffer overflow, and bottleneck links' limited capacity. Throughput can be
significantly reduced by a modest receive buffer. The network's underperformance can be
attributed to various factors, such as structural in equivalent, overloads, improper system tuning,
and protocol overheads. These factors can lead to issues such as poor resource and link
utilization, packet discards and errors, high device response times, and issues with ISP service
availability. The impact of network data on performance, including traffic, channel condition,
and network architecture . Network performance is greatly impacted by the devices' memory and
CPU use .
3 RESEARCH METHODOLOGY
3.1 Introduction
An overview of the population, sample frame, sampling procedure, research design, methods,
and instruments utilized in the research process, and data collecting tools is given in this chapter.

3.2 Research design


In this research, the investigator employed the Design Science methodology. The sequence of the
design science process is as follows: Recognized Difficulty: Conduct a comprehensive analysis
of the network infrastructure within the Bale zone district especial Dawa kechani woreda Bureau
to pinpoint specific obstacles and shortcomings that are impacting overall performance.
Framework development: Constructing a framework for enhancing network performance
optimization specific to the bureau's requirements involves addressing the identified issues
alongside an in-depth exploration of pertinent literature and industry best practices. Constructing
Artifacts: Transform the theoretical framework into a physical artifact, like series of
recommendations, approaches, or resources, created to aid in enhancing network performance
within the organization. Evaluation: Implement the suggested framework in the network
infrastructure of the Addis Evaluation: Implement the suggested framework in the network
infrastructure of the Bale zone district especialy Dawa kechani woreda Bureau for artifact
evaluation. Assess the efficiency and user-friendliness of the artifact to enhance network
performance by assessing quantitative metrics such as network speed, latency, and throughput,
along with collecting qualitative feedback from stakeholders Contemplation and Repetition:
During the process of artifact evaluation, take time to reflect on the findings and pinpoint areas
within the framework that could benefit from enhancements. Continuously fine-tune the artifact
by incorporating feedback and insights gathered throughout the implementation phase.

3.3 Research method


The methods of research involve the particular techniques utilized to gather and evaluate data.
Here are basically three distinct types of study practices: hybrid, qualitative, and quantifiable.
The method that is qualitative will be expressed via words, and the statistical method will be
represented through statistics. Gathering information through conversation is a means for
conducting qualitative investigation. The responses which have been gathered are basically not
numerical. Focus groups, in-person discoveries, and the interviewing represent a few of the
techniques employed for the collection and interpretation of qualitative information. Methods
that are quantitative address data that has numerical and tangible forms and apply a systematic
approach for handling information. This investigation incorporated qualitative as well as
quantitative study methods. In this research, information has been collected via observations,
inquiries, conversations, and other techniques.

3.4 Population Size and Sampling


3.4.1 Target Population
In research, there is a relationship between the terms population and sample. A sample represents
a subset of the population that has been chosen, whereas the population itself is the entire
collection of items. As a result of the researcher's conviction that they can understand the
questions on the questionnaire, the entire population was taken into account for this study. In this
work, the population of the research is the ICT experts who use the public service and human
resource bureau network. In this research the total number of the population was 30.

3.4.2 Sampling frame


A frame of sampling includes a list containing every item within the population. In the frame of
sampling the sample will be collected depending on specifying sampling units. This implies that
while determining a sample number, a researcher should set the criteria for inclusion and
exclusion. The ICT professionals who used the public service and human resource bureau
network are the study's focal demographic. Target population separated into four sample frames:
ICT employees in public service and human resources, TVT bureau employees, youth and sports
bureau employees, and innovation bureau personnel. This is the sample frame used in our
research

3.5 Methods and tools of Data collection


method Data collecting methods refer to the many procedures used to gather data. We need
certain tools in order to gather and measure the data. A tool is a measurement, data collection,
and analysis tool.

3.5.1 Methods of data collection


Primary as well as secondary sources of data constitute a possibility from which to gather
information. Our capture the initial data via inquiries and observations as a way to address our
research topic, making is the main source of data. Second-hand data pertains to knowledge which
has been previously utilized. In this study, the techniques used to acquire information are
discussed.
3.5.1.1 Interview
Interview was conducted with 3 persons the ICT director of the Bale zone district especial Dawa
kechani woreda Bureau ICT team leaders through the open ended questions which is designed to
about the problems of network performance of the organization. The interview is primary type’s data
source and its qualitative type of research method.

3.5.1.2 Questionnaire
Questions come in two types: open and closed. Closed inquiries were used by the investigator in
this work. Using a scale made up of five Likert points that encompasses "Strongly do not agree"
= 1 up "Highly Agreed" = 5, then the investigator will administer it. Questioner the primary form
of information sources as well as a quantifiable form of research strategy

3.6 Data Analysis Method


In this work the data analysis is done in following methods.

3.6.1 Using the Google Form


Data is gathered from the targeted ICT expert using the online Google Form Questioner
technique. The data is then analyzed using the Google Form tool.

3.7 Proposing Network Performance Optimizing Framework


The primary goal of this effort is to provide the institution with a framework for network
performance improvement. The framework that was built was based on the findings of the
network performance analysis from the Ethernet interface of traffic, the interview, and the
conduct of the questioner from the user replies who were ICT specialists. The validation of the
framework done In addition to the respondent of ten senior ICT experts the validation process
has been done implement framework have confirmed the suggested methodology for optimizing
network performance
4. Work plan and budget
4.1: Time break down for each activity

No Activities Periods

Sep Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug
y

1 Title selection

2 Proposal development

3 Submission of Research
proposal to advisor

4 Accepting proposal
comments

5 Designing questionnaires

6 Selecting respondents or
key informants

7 Data collection

8 First round data


processing analysis

9 First phase research


paper writing
10 Submission of a research
paper

11 Correcting Comments

12 Submission of a research
paper

4.2. Cost
There are various costs involved when we carry out research. Therefore, we

have listed the items we need for this research in the table below.

No Items Quantity Price per unit Total price


.

1 Paper 100 5 500

2 Pen (blue) 7 50 350

3 Pen (red) 7 50 350

4 Dot pencil 3 15 45
5 Writing the final essay 100 5 500
with computer

6 Printing final essay 100 10 1000

Total 2745

.References
Research method and technical writing in information technology (InTc 2106)Include a list of all
references cited in the proposal, Following the appropriate citation style.
5

You might also like