International Telecommunication Union   ITU
عربي  |  中文  |  Espańol  |  Français  |  Русский
 Advanced Search Advanced Search Site Map Contact us Print Version
Home : ITU-D : Conferences
IT Facilities


  The Cybercafe is located in Royal Room. There are PCs with US keyboard and Internet connection, wired Ethernet connections for laptops and network printers. Wireless connections for laptops are also available.

A service desk located in the cybercafé is available to assist Delegates on IT-related issues.


Connections to the printers can be done:

  • Via the network (wired/wireless) through a print server. Printers have the server name and share name marked on them;
  • Via USB;
  • Via parallel cable.

Wired Ethernet LAN

Twenty (20) Ethernet connections (RJ45) 10/100 Mbps are provided in the cybercafé to connect laptops to the Internet.

Delegates equipped with 802.11a/b/g cards will be able to take advantage of the wireless LAN facility installed throughout the Hotel. Delegates will be informed of the SSID of the wireless LAN when they are onsite.

Wireless LAN cards

Delegates are advised to procure a Wi-Fi certified card before travelling to the Meeting. Before buying a card, it is advisable to check that it has Wi-Fi CERTIFIED logo.

Wireless LAN configuration parameters

Please follow the installation instructions delivered with the card. You may need to log in with administrator privileges depending on your PC’s operating system and the card purchased.

LAN configuration (wired and wireless)

Common LAN configuration parameters:

·      Enable DHCP so that your laptop will obtain the IP address and other network parameters automatically.

·      Web-proxy: Ensure that your Internet browser’s proxy setting is removed.

·      SOCKS: Disable any SOCKS configurations.

Outgoing e-mail: If you want to use your own email application (e.g. Outlook) on your laptop for sending emails, the outgoing SMTP server to be used is


Please be aware that network communication can be intercepted, either wired or wireless. As such end-to-end encryption is recommended for confidentiality. Please use VPN or end-to-end encryption solutions and personal firewall software to protect your system.

It should be noted that some firewall software configurations may prevent access to local resources (e.g. network shares and printers). In case of problems, please consult our support staff at the service desk.




Top - Feedback - Contact Us -  Copyright © ITU 2010 All Rights Reserved
Contact for this page : BDT Web Support
Updated : 2009-07-06