(707) 268-8850    Get SUPPORT

Network Management Services Blog

5G is Still Going to Take A While

5G is Still Going to Take A While

As technology has improved in function and convenience, we seem to demand more and more of it at an increasing pace. Take mobile data as an example: 4G was introduced in 2009, and less than a decade later, there is high demand for 5G. Unfortunately, while 5G has been worked on for some time already, it isn’t likely that it will be commonly available anytime soon.

The technology being touted as the driving force behind 5G has quite a few practical issues, many of which may prove to be too much for the anticipated improvements to offset. Many of these issues are rooted in the proposed use of enhanced mobile broadband (eMBB) via millimeter wave (mmWave) and the inherent issues with this plan.

Range
A big problem comes from the range of mmWave. Currently, 4G signals can reach anywhere between three and thirty miles, while mmWave can only reach a third of a mile - one ninth of its range now, under ideal circumstances. In order for 5G through mmWave to be successful, there would need to be some major infrastructure updates.

This has been addressed in the planning processes, as it is likely that the cell towers we are accustomed to today would instead be replaced by shorter-range femtocells. These femtocells would be approximately the size of a microwave oven, and could be added to existing pieces of infrastructure, like light poles, traffic signs, and even public transportation vehicles like buses. However, these open up the idea of implementing 5G to more complications.

Connectivity
For example, mmWave signals are incredibly easy to block, which is why there would need to be so many femtocells added to the existing infrastructure. When something as simple as an unfortunately positioned traffic sign can block a signal, signals need to be coming from more than one direction.

There is also the matter of bandwidth that needs to be addressed. Consider how much usage each femtocell would see - they just wouldn’t be able to network as efficiently as necessary for proper use. This would mean that the entire network of femtocells would also need to be connected via costly high-speed fiber cabling, which would be an expensive and time-consuming endeavor.

Cloud Confusion
With cloud computing having become such a widely utilized tool, it only makes sense that the femtocell network would be managed via the cloud. By creating a virtual network in the cloud, software-defined networks (SDNs) and network function virtualization (NFV) could be leveraged to manage the 5G network. Trouble is, there are various kinds of SDNs and NFV, with no one standard. The Linux Foundation is working to change this, but this still isn’t an issue that will likely be resolved in the near future.

Regardless, 5G is going to happen - femtocells are inexpensive and, for all their faults, a potentially beneficial way to make it possible. Furthermore, people want better mobile bandwidth. The technology is just going to take some time to develop.

However, if you want to improve your business’ connectivity now, we can help. Give Network Management Services a call at (707) 268-8850.

Is Blockchain the Future of Cybersecurity?
Know Your Tech: Safe Mode
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, February 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup Hosted Solutions Mobile Devices VoIP Google Email Outsourced IT Data Tech Term Data Recovery IT Support Cloud Computing Saving Money Internet Microsoft IT Services Software Internet of Things BDR Efficiency Communications Hardware Business Continuity Cybercrime Ransomware Smartphones Business Cybersecurity Communication Small Business User Tips Server Disaster Recovery Android Artificial Intelligence Gadgets Save Money Browser Managed IT Network Computers How To Alert Smartphone Windows Avoiding Downtime Managed IT Services Vulnerability Chrome Phishing Firewall Workplace Tips Miscellaneous Social Media Mobility Money Mobile Device Management Collaboration Two-factor Authentication Computer Business Intelligence Router Passwords Windows 10 Social Engineering Business Management Law Enforcement Data Security Data Protection BYOD Productivity Applications Budget Remote Monitoring Compliance Operating System Virtualization Office 365 Flexibility Identity Theft Telephone Systems Upgrade Blockchain Word Productivity Spam VPN Bandwidth Managed Service Provider Connectivity Document Management Proactive IT Private Cloud IT Support Facebook Redundancy Microsoft Office OneNote Comparison IT Management Office Tips Encryption Data storage Mobile Device Access Control Big Data Content Management Paperless Office Training Workers Windows 7 Website Virtual Assistant Smart Tech IT Plan App Settings Data Breach Update Solid State Drive Hacking Holiday Credit Cards Content Filtering Unsupported Software Password Analysis Windows 10 Data Storage Business Owner Servers Physical Security Information Technology Automation Infrastructure Government Mobile Computing Work/Life Balance Value Wi-Fi Networking Spam Blocking Bring Your Own Device Information Google Drive Sports File Sharing Unified Threat Management Apps Quick Tips Managed Service Data loss Public Cloud CES Employer-Employee Relationship Business Technology Reputation Internet Exlporer Professional Services Business Mangement Addiction Leadership Apple HBO HaaS IoT SaaS Sync Unified Communications Thought Leadership Wiring Multi-Factor Security YouTube Cleaning Netflix Password Management HIPAA Online Shopping Patch Management Screen Mirroring Hybrid Cloud Software as a Service Customer CrashOverride End of Support Tools Gmail Cache Hard Drives iPhone Outlook Specifications Entertainment Monitor Audit History Telephony USB Theft Streaming Media Current Events Camera Trending Strategy Computer Care NIST Evernote Authentication Scam Cast Students Regulations Telephone System Downtime Internet exploMicrosoft PDF Black Market Recycling Wireless Internet webinar Frequently Asked Questions Millennials Insurance Computer Fan Skype Google Apps Content Filter Knowledge Lifestyle Data Management Samsung Cryptocurrency Keyboard Wireless Charging Nanotechnology Office Human Resources Healthcare Charger Emails Cortana Root Cause Analysis Advertising Botnet eWaste Wire Conferencing Excel Workforce Fraud Practices Safe Mode FENG User Error Start Menu Hosted Solution Storage Electronic Medical Records Network Congestion Software Tips Accountants Fiber-Optic MSP Relocation Google Docs Staff Electronic Health Records HVAC Colocation Flash Hosted Computing Augmented Reality Meetings Travel Education Criminal Hiring/Firing Health Tip of the week Telecommuting Legal Risk Management Amazon Mobile Recovery Password Manager IT Consultant Wireless Technology Cables Devices Supercomputer IBM Remote Worker Humor Data Warehousing Voice over Internet Protocol Save Time Digital Signature Machine Learning Safety Enterprise Content Management Windows 10s Computing Infrastructure Amazon Web Services Inventory Emergency The Internet of Things Smart Office Marketing Hacker Files Windows Server 2008 Remote Work Shadow IT Employer Employee Relationship Audiobook Administration Wearable Technology Customer Relationship Management Competition Proactive Virtual Reality IP Address Computer Accessories Users Two Factor Authentication Customer Service Search Automobile Company Culture Remote Monitoring and Maintenance Worker Commute Vendor Management Mobile Office Assessment Domains Bluetooth Instant Messaging Troubleshooting Printers Managing Stress Wireless Video Games Transportation Line of Business WiFi Books Television Public Speaking Regulation Battery How to Techology Presentation Remote Computing Experience Benefits Webinar Lithium-ion battery Public Computer Worker 5G Twitter Tech Support Content Loyalty Scalability Music Smart Technology Fun IT solutions Politics Rootkit Best Practice