(707) 268-8850    Get SUPPORT

Network Management Services Blog

5G is Still Going to Take A While

5G is Still Going to Take A While

As technology has improved in function and convenience, we seem to demand more and more of it at an increasing pace. Take mobile data as an example: 4G was introduced in 2009, and less than a decade later, there is high demand for 5G. Unfortunately, while 5G has been worked on for some time already, it isn’t likely that it will be commonly available anytime soon.

The technology being touted as the driving force behind 5G has quite a few practical issues, many of which may prove to be too much for the anticipated improvements to offset. Many of these issues are rooted in the proposed use of enhanced mobile broadband (eMBB) via millimeter wave (mmWave) and the inherent issues with this plan.

Range
A big problem comes from the range of mmWave. Currently, 4G signals can reach anywhere between three and thirty miles, while mmWave can only reach a third of a mile - one ninth of its range now, under ideal circumstances. In order for 5G through mmWave to be successful, there would need to be some major infrastructure updates.

This has been addressed in the planning processes, as it is likely that the cell towers we are accustomed to today would instead be replaced by shorter-range femtocells. These femtocells would be approximately the size of a microwave oven, and could be added to existing pieces of infrastructure, like light poles, traffic signs, and even public transportation vehicles like buses. However, these open up the idea of implementing 5G to more complications.

Connectivity
For example, mmWave signals are incredibly easy to block, which is why there would need to be so many femtocells added to the existing infrastructure. When something as simple as an unfortunately positioned traffic sign can block a signal, signals need to be coming from more than one direction.

There is also the matter of bandwidth that needs to be addressed. Consider how much usage each femtocell would see - they just wouldn’t be able to network as efficiently as necessary for proper use. This would mean that the entire network of femtocells would also need to be connected via costly high-speed fiber cabling, which would be an expensive and time-consuming endeavor.

Cloud Confusion
With cloud computing having become such a widely utilized tool, it only makes sense that the femtocell network would be managed via the cloud. By creating a virtual network in the cloud, software-defined networks (SDNs) and network function virtualization (NFV) could be leveraged to manage the 5G network. Trouble is, there are various kinds of SDNs and NFV, with no one standard. The Linux Foundation is working to change this, but this still isn’t an issue that will likely be resolved in the near future.

Regardless, 5G is going to happen - femtocells are inexpensive and, for all their faults, a potentially beneficial way to make it possible. Furthermore, people want better mobile bandwidth. The technology is just going to take some time to develop.

However, if you want to improve your business’ connectivity now, we can help. Give Network Management Services a call at (707) 268-8850.

The Internet of Things Gives Great Power to Our Ph...
Know Your Tech: Safe Mode
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Malware Hackers Backup Data Backup Google VoIP Mobile Devices Hosted Solutions Email IT Support Outsourced IT Innovation Microsoft Software Data Recovery Cloud Computing Business Continuity Saving Money Internet Data Tech Term Internet of Things Cybercrime Efficiency Business Ransomware Communications Small Business BDR IT Services Hardware Cybersecurity Disaster Recovery Android Avoiding Downtime User Tips Smartphones How To Managed IT Server Computers Communication Alert Smartphone Artificial Intelligence Windows Browser Social Engineering Chrome Law Enforcement BYOD Phishing Save Money Mobile Device Management Network Two-factor Authentication Business Intelligence Mobility Money Business Management Data Security Data Protection Collaboration Managed IT Services Vulnerability Router Office 365 Identity Theft Firewall Upgrade Remote Monitoring Word Social Media Operating System Spam Productivity Virtualization Bandwidth Flexibility Telephone Systems Proactive IT Computer Connectivity VPN Passwords Windows 10 Redundancy Managed Service Provider Document Management Gadgets Budget Private Cloud Compliance Windows 7 Big Data Content Management Paperless Office Workers Website Smart Tech Facebook Quick Tips Miscellaneous Public Cloud Employer-Employee Relationship IT Plan Data Breach Update Blockchain Credit Cards Content Filtering Office Tips Data storage Analysis Unsupported Software Mobile Device Servers Windows 10 Data Storage App Wi-Fi Value Solid State Drive Infrastructure Hacking Spam Blocking Networking Holiday Bring Your Own Device Password IT Support Business Owner Physical Security Information Technology Automation Apps Productivity Government Data loss Work/Life Balance CES OneNote Comparison Google Drive IT Management Recovery Online Shopping Access Control Patch Management Screen Mirroring Software as a Service Password Management Training Outlook Specifications Humor CrashOverride Tools Save Time Gmail Cache Computing Infrastructure Strategy Computer Care Settings Audit Telephony Applications Theft Streaming Media Current Events Files Trending Virtual Assistant Reputation Internet Exlporer Regulations Evernote Authentication Scam Apple Cast HaaS NIST Students Frequently Asked Questions Millennials Insurance Downtime Recycling Wireless Internet webinar Samsung Hybrid Cloud Computer Fan Skype Google Apps Content Filter Knowledge Lifestyle HIPAA Charger Emails Customer End of Support Wireless Charging Nanotechnology Hard Drives iPhone Entertainment Cryptocurrency Human Resources Healthcare Excel Workforce Workplace Tips USB Fraud Practices Root Cause Analysis Botnet eWaste Wire Conferencing Monitor History Accountants FENG Start Menu Storage Electronic Medical Records Network Congestion Software Tips Mobile Computing Internet exploMicrosoft Flash PDF Black Market Fiber-Optic Google Docs Safe Mode Staff Electronic Health Records Tip of the week Telecommuting Amazon Hosted Computing Meetings Travel Data Management HVAC Criminal Sports Keyboard Wireless Technology Office Mobile Password Manager IT Consultant Cortana Digital Signature Machine Learning Unified Threat Management Advertising Windows 10s IBM Cables Devices Supercomputer Data Warehousing Voice over Internet Protocol Safety User Error Windows Server 2008 Remote Work Hosted Solution The Internet of Things Amazon Web Services Inventory Emergency Enterprise Content Management Marketing Hacker Smart Office Microsoft Office IoT SaaS Relocation Professional Services Business Mangement Addiction Leadership Colocation HBO Encryption YouTube Cleaning Netflix Sync Education Unified Communications Thought Leadership Hiring/Firing Health Multi-Factor Security Legal Risk Management Content IP Address Scalability Music Fun Users Computer Accessories Company Culture Customer Service Two Factor Authentication Best Practice Politics Shadow IT Audiobook Mobile Office Vendor Management Wearable Technology Domains Assessment Bluetooth Administration Wireless Managing Stress Virtual Reality Telephone System Transportation WiFi Public Speaking Books Television Search Automobile Presentation Worker Commute Webinar Benefits Lithium-ion battery Instant Messaging Troubleshooting Augmented Reality Public Computer Worker Video Games 5G Loyalty Tech Support Twitter IT solutions Battery Smart Technology File Sharing How to Techology Rootkit Remote Computing Experience Employer Employee Relationship Customer Relationship Management Business Technology Competition