2. ISPAB GOAL AND OBJECTIVES
Our Primary goal is- “ICT development in Bangladesh”. To do so, we want
to provide Internet to customers and ICT partners all over the Bangladesh
at minimal price and to bring relevant services closer to communities in
which citizens reside.
• Creating value of ISPAB and increase the number of ISPAB members.
• Formulating a win-win arrangement with our channel partners IIGs, NTTNs,
ITCs, BSCCL, BTCL, Cable Operators, Telcos and other partners.
• Arranging training, awareness programs, exhibition & conference visits for
ISPAB members, partially funded by Government and Development agencies
• Promoting and legalizing of infrastructure sharing in order to reduce the
operating cost of ISPs
• Bringing down the VAT, Tax and other duties on internet service and network
products.
Goal:
Objectives:
4. The Technologies
Category Subscribers
(Thousands)
Remarks
Mobile Internet 31330.766 3.13 Crore
ISP + PSTN 1221.12 12.21 Lac
WiMAX 491.238 4.921 Lac
Total 33043.124 3.13 Crore
Internet Subscribers in Bangladesh
The total number of Internet Subscribers has reached 33043.124 thousand at the end of April 2013.
Asia Bangladesh %
1076681 33043 3.1 %
6. Regional Internet Price – Leased Line 2013
1,610
3,166
4,800
11,000 11,150
16,000
-
2,000
4,000
6,000
8,000
10,000
12,000
14,000
16,000
18,000
Sri Lanka India Bangladesh Nepal Bhutan Pakistan
Leased Internet Line Price in BDT
(1Mbps/Month)
Source
http://www.trc.gov.lk/tariffs.html
http://broadband.sify.com/business.php
http://www.btrc.gov.bd
http://www.netmax.com.np/article-services
http://www.bt.bt/?page_id=60
http://www.ispak.pk/
http://www.cam.gov.mv/dhr_dia.htm
7. Internet Price – Mobile vs leased Line Comparison
Airtel
Bangladesh
Airtel
India
Airtel
Srilanka
300
165 180
275
120
300
394
275
96
Bangladesh (1GB) India (1GB) Srilanka (1GB) Pakistan (1GB)
Mobile Internet Price in BDT
Airtel Orascom Telenor Axiata
1,610
3,166
5,400
16,000
Sri Lanka India Bangladesh Pakistan
Leased Internet Line Price in BDT
(1Mbps/Month)
8. International Connectivity
SEAMEWE4 Bandwidth Capacity
Total Capacity – 200 Gbps
Existing Usage – 39 Gbps
BW Import through ITCs from India
Total Capacity – 50 Gbps
Existing Usage – 15 Gbps
“28% of total current Capacity going
through India at 40% growth/annum”
Issues - Routing through India
Political uncertainty
Significantly higher price
Growing dependency
10. Cost Components of Internet Delivery
Cost of 1 Mbps Bandwidth Capacity Delivery (within Dhaka only)
1. Bangladesh Half Circuit (BSCCL) – 22%
2. Foreign IP port – 14%
3. Bangladesh Backhaul – 10%
4. NTTN Service Charge – 28%
5. IIG – 19%
6. BTRC Share – 7%
Singapore/Malaysia/India
Public IP Port + Backhaul + Half circuit = BDT 40 lacs/month
Bangladesh
Public IP Port + Backhaul + Half Circuit = BDT 1 crore/month
11. End User Price – Cost Components
1. Bandwidth Cost
2. Operational Cost
Hardware
Software
Backup Power (Gas/Fuel based generators)
Human Resource
Multiple POPs (rent + utilities) – minimum 20 POPs to cover Dhaka only
NTTN Cost
Overhead Cabling (NTTN blank spots)
Radio (Fiber Optic blank zones)
12. SL Product Name
HS Code
C
D
R
D
S
O
VAT
AI
T
ATV TTI
1
Modem; Ethernet interface card; computer network
switch, hub and router
85176230 3 0 0 15 0 3 22.16
2
Optical Fibres, Optical Fibre Bundles And Cables
(Excl. Those Of 84.55)
90011000 12 0 0 15 5 3 37.83
3 Winding Wire Of Copper 85441100 25 5 0 15 5 3 59.18
4
Co-Axial Cable And Other Co-Axial Electric
Conductors
85442000 25 5 20 15 5 3 90.02
5 UPS/IPS (Capacity upto 2000 VA) 85044020 5 0 0 15 5 3 29.53
Major Internet Hardware import Duty
13. Nation Wide Telecommunication Network (NTTN)
Issues
Lack of Nationwide Capacity Coverage
Insufficient QoS
Lack of competition – leading to high price
Capacity is not allowed by 1 operator
Operators – Two (2)
Since Jan’ 2009
Current Coverage – Mostly Dhaka (only)
14. Impact & Solutions
Airtel
Bangladesh
Airtel
India
Airtel
Srilanka
High Local Half Circuit Cost
Impacts:
High cost of internet to end user
Business risk due to sourcing of capacity from foreign country
Local providers are pushing circuits towards other country (s)
Payment through foreign currency
Solutions
Reduce local half circuit cost significantly – increased capacity
consumption will increase BSCCL revenue
Zero tax/Tax holiday on import of related hardware/goods
NTTN operators should provide capacity and increase coverage
NTTN Operations
Impacts:
Lack of competition, capacity & coverage leading to high cost of service to end user
Existing unutilized NTTN resources lead to increase in per capacity cost to service
providers
15. The Technologies - 2013
1. Internet Browser
2. Search Engines
3. E-mail
4. Social Network
17. The Technologies
02. Search Engines of 2013
Most people don't want 290 search engines, especially people who are internet beginners.
Most users want a single search engine that delivers three key features:
01. Relevant results (results you are actually interested in)
02. Uncluttered, easy to read interface
03. Helpful options to broaden or tighten a search
With this criteria, 5 Reader Favorite Search Engines come to mind. These 5 search sites should
meet 98% of the searching needs of a regular everyday user.
18. The Technologies
Search Engines of 2013
Google is the undisputed king of 'spartan searching'. Google is fast, relevant,
and the largest single catalogue of Web pages available today. Make sure you
try the Google 'images', 'maps' and 'news' features... they are outstanding
services for locating photos, geographic directions, and news headlines.
19. The Technologies
Search Engines of 2013
Yahoo! is several things: it is a search engine, a news aggregator, a shopping
center, an emailbox, a travel directory, a horoscope and games center, and
more. This 'web portal' breadth of choice makes this a very helpful site for
Internet beginners. Searching the Web should also be about discovery and
exploration, and Yahoo! delivers that in wholesale quantities.
20. The Technologies
Web Tools of 2013
Bing is Microsoft's attempt at unseating Google. Bing used to be MSN
search until it was updated in summer of 2009. Touted as a 'decision
engine', Bing tries to support your researching by offering suggestions
in the leftmost column, while also giving you various search options
across the top of the screen. Things like 'wiki' suggestions, 'visual
search', and 'related searches' might be very useful to you. Bing is not
dethroning Google in the near future, no. But Bing is definitely worth
trying.
Bing
21. The Technologies
Search Engines of 2013
The Ask/AJ/Ask Jeeves search engine is a longtime name in the World
Wide Web. The super-clean interface rivals the other major search
engines, and the search options are as good as Google or Bing or
DuckDuckGo. The results groupings are what really make Ask.com
stand out. The presentation is arguably cleaner and easier to read
than Google or Yahoo! or Bing, and the results groups seem to be
more relevant. Decide for yourself if you agree... give Ask.com a whirl,
and compare it to the other search engines you like.
Ask (aka 'Ask Jeeves')
29. The Read-Only Web The Read/Write Web
Blogs
Web
The Technologies - 2014
30. The Read-Only Web
• Powerful resource for
educators and students,
but…
• Information moves from
publishers to consumers
• Information cannot be
edited
• One-Way Web (Web 1.0)
• The hyperlinks between
webpages began with the
release of the world wide
web(www) to the public in
1993.
31. Read only Web - Wikipedia
• Online encyclopedia
• Collaboratively
authored and edited
• Over 1 millions users
worldwide
• Over 1 million articles
in English
• Great resource, but..
• Use with caution
www.wikipedia.org
32. The Read/Write Web
• It is now as easy to create as
it is to consume.
• Anyone can publish, share,
and change information
• Two-Way Web (Web 2.0)
• This is changing our world!
• Web 2.0 include social
networking sites, blogs,
wikis, video sharing sites,
hosted services, web
applications.
33. Blogs
• Web + Log = weblog
or “we blog”
• Easily created
• Easily updated
• If you can email, you
can blog.
• Blogs allow visitors to
comment. Bangla Blogs
Most Popular English Blogs
34. Podcasts
• Podcasts are blogs
with audio or video.
• Podcasts are like
Internet radio shows
or TV shows.
• Podcasts are
consumed on
demand.
www.podomatic.com
35. Wikis
• Websites anyone can
edit!
• If you can use a word
processor, you can use
a wiki.
• Visitors can see a
history of changes and
revert to earlier
versions. http://www.wikispaces.com/
36. Other Services
FURL.net - Annotate,
save, and share
bookmarks online!
Flickr.com - Upload, tag,
and share images
online!
Thinkfree - Create and
share office
documents online!
www.youtube.com
40. Reflection
• Students read, think,
and compose
• Writing is learning
• So is creating and
editing other media
• Metacognition
• Reflective Practice
• And Feedback!
42. Inappropriate Content
• Offensive, sexual, or
violent content
• Due Diligence
• Increasingly difficult to
filter
• Appropriate responses
to the inevitable
43. Inappropriate Sharing
• Students may post:
– Inappropriately
– Unsafely
– Irresponsibly
– Provocatively
– Illicit or illegal behavior
• Students will post
outside of school!
44. Threats and Cyber-bullying
• Students may post
threats
• Threats that impact
attendance or
academics are a
school concern
• Credible threats may
be a criminal matter
www.cyberbully.org
45. Free Speech Concerns
• Students do have 1st
Amendment Rights
• Parody is protected
• We cannot control
students, we can
educate them
46. A New Perspective
• Citizen Journalism
• Citizen Police Work
• Threats, suicides, and
risky behavior are
often reported
• Sting operations catch
criminals
• “My space is safer for
teens than predators.”
47. Keeping Students Safe
• Responsibility,
Appropriateness, and
Common Sense
• Planning
• Discussions
• Teachable Moments
• A letter home &
permission slips
48. Guidelines for Students
• Do not reveal personal
information
• Do not post
provocative pictures
• Consider the
consequences
• Consider the future
49. Code of Ethics
• Seek Truth and
Express It
• Minimize Harm
• Be Accountable
• Respect Information
and its Infrastructure
50. Establishing a Defense
• A Chain of Command
• An Organizational
Policy on Blogs etc.
• Transparency
• Exploit the New
Medium
51. Staying Safe OnlineI.
Social NetworkingII.
CyberbullyingIII.
Solutions and StrategiesIII.
Raising Responsible Digital Citizens
Internet Safety
52. STAYING SAFE ONLINE
Guard Your Information
• Address
• Phone number
• School
• City
• Sports teams
• Parent’s workplace
• Passwords
53. STAYING SAFE ONLINE
Limit Time Online
• Unplug and play
• Take time for family
• Face-to-face time with friends
• No substitute for real exercise and
sports
54. STAYING SAFE ONLINE
Friend or Foe?
• Seeing is not believing
• Never schedule offline meeting with
“online only” friends
• Tell your parents if anyone tries to
meet with you offline
15-year-old girl on Facebook
55. STAYING SAFE ONLINE
Communicate
• Don’t bottle it up
• Ok to ask questions
• Stay away from “adults only” sections
of the Internet
• Tell your parents about anything that
makes you feel uncomfortable
56. STAYING SAFE ONLINE
Webcam Safety
• Never do random chat
• Only chat with family and friends
• Never do anything on a webcam you
wouldn’t want up on this screen
• Think before uploading video
responses
57. STAYING SAFE ONLINE
Time and a Place
• Carefully consider whether to use
geolocation on social
networks/games
• Never check in at school, church, or
any place you visit regularly
• Check privacy settings
• Ask parents for permission before
using any geolocation
58. STAYING SAFE ONLINE
Be “Scam Smart”
• Don’t open strange emails
• Beware “free” downloads
• Don’t use P2P
• Don’t be a pirate
59. STAYING SAFE ONLINE
Keep It in the Family
• Don’t share family photos without
permission
• Ask before uploading
60. STAYING SAFE ONLINE
Privacy? On the Web?
• All media is permanent
• All information is available
• If you don’t want people to know
about it, don’t do it, and especially
don’t do it online
61. STAYING SAFE ONLINE
Sign the Gameplan
• Work as a team
• Talk with your parents
• Be a tech-teacher
• Accept help (from parents,
teachers, and law enforcement)
63. SOCIAL NETWORKING
Choose Your Friends
• Only friend people you know well
• Don’t get into contest for who has the
most friends
• Keep your group of friends small and
get more out of Facebook
64. SOCIAL NETWORKING
Protect Your Info
• Don’t post phone #
• Don’t post address
• Avoid status updates with time and
place references
• Don’t use Places
• Set all privacy settings to “Friends
Only”
65. SOCIAL NETWORKING
A picture is worth…
• Ask permission to post photos of
friends
• You can untag yourself
• Avoid photos that reveal locations
like home and school
• Report harmful photos
66. SOCIAL NETWORKING
What’s Wrong With This Update?
Bethany is such a loser. She asked in class whether
Hitler was around before or after the Last Supper…lol
67. SOCIAL NETWORKING
What’s Wrong With This Update?
Woohoo! Going to Orlando for a whole week! Be back
next Sunday! C-ya!!!
73. CYBERBULLYING
Response
• Don’t react: responding to the
bully only makes it worse
• Report the bullying to parents,
teachers, and site admin
• Don’t participate
• Encourage others to stand up
75. STRATEGY
Be a Parent
• Decide when your kids are
ready
• Stress respect of others
• Consider maturity of peers
and child
• Set clear rules
• Set clear consequences
76. STRATEGY
Cyberbullying
• Take the problem seriously
• Assure your child you will
make it stop
• Don’t react to the bully
• Record and report
77. SOLUTIONS
Use of Internet
01. The Three Security Basics of Home Computing
a. Install and maintain anti-virus software.
b. Do not open unknown or suspicious email.
c. Keep your computer patched against known vulnerabilities.
02. Securing Windows
a. Password Protect The Guest Account
b. Enable The Internet Connection Firewall (ICF)
c. Use Private Folders To Protect Data
d. Use Limited Accounts For Everyday Use
e. Upgrade to Windows
78. SOLUTIONS
Use of Internet
03. Creating Secure Passwords
a. Do not use personal information.
b. Do not use real word.
c. Mix different character types.
d. Use a passphrase.
e. Use a password management tools
04. Internet Setting
a. Internet Security Suites Software
b. Internet Filter Software
c. Privacy Setting
- Through browser Internet Explorer or Fire Fox
79. Q & A
Syed Mohammed Tariqul Islam
Joint Secretary General, ISPAB