XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5G is Still Going to Take A While

5G is Still Going to Take A While

As technology has improved in function and convenience, we seem to demand more and more of it at an increasing pace. Take mobile data as an example: 4G was introduced in 2009, and less than a decade later, there is high demand for 5G. Unfortunately, while 5G has been worked on for some time already, it isn’t likely that it will be commonly available anytime soon.

The technology being touted as the driving force behind 5G has quite a few practical issues, many of which may prove to be too much for the anticipated improvements to offset. Many of these issues are rooted in the proposed use of enhanced mobile broadband (eMBB) via millimeter wave (mmWave) and the inherent issues with this plan.

Range
A big problem comes from the range of mmWave. Currently, 4G signals can reach anywhere between three and thirty miles, while mmWave can only reach a third of a mile - one ninth of its range now, under ideal circumstances. In order for 5G through mmWave to be successful, there would need to be some major infrastructure updates.

This has been addressed in the planning processes, as it is likely that the cell towers we are accustomed to today would instead be replaced by shorter-range femtocells. These femtocells would be approximately the size of a microwave oven, and could be added to existing pieces of infrastructure, like light poles, traffic signs, and even public transportation vehicles like buses. However, these open up the idea of implementing 5G to more complications.

Connectivity
For example, mmWave signals are incredibly easy to block, which is why there would need to be so many femtocells added to the existing infrastructure. When something as simple as an unfortunately positioned traffic sign can block a signal, signals need to be coming from more than one direction.

There is also the matter of bandwidth that needs to be addressed. Consider how much usage each femtocell would see - they just wouldn’t be able to network as efficiently as necessary for proper use. This would mean that the entire network of femtocells would also need to be connected via costly high-speed fiber cabling, which would be an expensive and time-consuming endeavor.

Cloud Confusion
With cloud computing having become such a widely utilized tool, it only makes sense that the femtocell network would be managed via the cloud. By creating a virtual network in the cloud, software-defined networks (SDNs) and network function virtualization (NFV) could be leveraged to manage the 5G network. Trouble is, there are various kinds of SDNs and NFV, with no one standard. The Linux Foundation is working to change this, but this still isn’t an issue that will likely be resolved in the near future.

Regardless, 5G is going to happen - femtocells are inexpensive and, for all their faults, a potentially beneficial way to make it possible. Furthermore, people want better mobile bandwidth. The technology is just going to take some time to develop.

However, if you want to improve your business’ connectivity now, we can help. Give XFER a call at 734-927-6666 / 800-Get-XFER.

Is Blockchain the Future of Cybersecurity?
Know Your Tech: Safe Mode
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Software Workplace Tips Managed Service Provider Business Computing Data Hackers Small Business Hardware Hosted Solutions Google Mobile Devices Productivity Mobile Office VoIP Email Gadgets Malware Quick Tips Network Network Security IT Support Innovation Efficiency Business Management Business Social Media IT Services Miscellaneous Business Continuity Smartphones Server Upgrade Virtualization Communication Windows Disaster Recovery Data Backup Communications Computer User Tips Microsoft Office Managed IT Services Users Passwords Browser Mobile Device Management Data Recovery Android Save Money Smartphone WiFi Marketing Holiday Ransomware Alert Mobile Computing Cybercrime BDR Tech Term Outsourced IT Vendor Management Chrome Internet of Things Operating System Windows 10 Remote Monitoring Bring Your Own Device Computers Apple BYOD Information Technology Avoiding Downtime Cloud Computing The Internet of Things Artificial Intelligence Current Events Router History Best Practice Going Green Automation Big Data Telephone Systems Cybersecurity Remote Computing VPN Firewall IT Solutions Phone System Trending Wireless Technology Application Health Collaboration Hacking IT Consultant Social Engineering Spam Managed IT Services Employer-Employee Relationship Printer Facebook Lithium-ion Battery Bandwidth Money Excel Proactive IT App Office Budget Business Managament Applications Mouse Productivity Recovery Content Filtering Fax Server Windows 10 Maintenance Windows 8 Networking Unified Threat Management Business Intelligence Two-factor Authentication Mobility iPhone How To Hard Drives Office 365 Training Tutorials Encryption Virus Information Phishing Sports Value Data Protection Website Apps Blockchain Managed IT Gmail PowerPoint Antivirus User Error Data Security Private Cloud Analytics Redundancy Humor Customer Relationship Management Law Enforcement Outlook File Sharing Memory IT Management Inbound Marketing Servers Network Congestion Conferencing Administration Analysis Search Save Time Tablet Google Drive Mobile Device Twitter Office Tips Digital Payment Tech Support IT Support Document Management Social Networking Computer Repair Vulnerability Streaming Media Risk Management Compliance Scam Connectivity Word Flexibility Entertainment Administrator Identity Theft Saving Time Settings Retail Data Management Downtime Data loss IT service Access Control Solid State Drive Best Available Black Market Smart Tech Hacker Social CES Webinar Bluetooth Fraud Spam Blocking Machine Learning People IT Plan Wireless Physical Security Cleaning Password Samsung Touchscreen Public Cloud Content Management Robot SaaS USB Unsupported Software Online Currency Infrastructure OneNote Point of Sale Data storage Managed Service Recycling Paperless Office Update Video Surveillance Education Internet Exlporer Data Storage Statistics eWaste Comparison Keyboard PDF Skype Safety Wi-Fi Piracy Virtual Assistant Work/Life Balance Data Breach Programming Windows 7 HaaS End of Support IBM YouTube Instant Messaging Government Leadership Running Cable Meetings Workers Augmented Reality Intranet Environment Voice over Internet Protocol Computer Accessories Telephone System Wearable Technology Human Resources Biometrics Credit Cards DDoS Electronic Health Records Millennials WIndows 7 Customers Alerts Line of Business Windows 8.1 Update Mobile Cortana Uninterrupted Power Supply Virtual Reality FENG Multi-Factor Security Strategy Printer Server Shortcut Knowledge Display Wireless Charging Advertising Wire Microchip Worker Commute Chromecast Text Messaging Cryptocurrency Debate Frequently Asked Questions Distributed Denial of Service User Files Content Filter Camera Patch Management Gaming Console Screen Mirroring Workforce Managing Stress Domains Work Station Authentication MSP 360 Emails Professional Services Google Apps Bloatware Help Desk Electronic Medical Records Lifestyle Insurance Flash Fiber-Optic Notifications Science Smart Office Software as a Service Laptop Safe Mode Business Owner Tip of the week Amazon Colocation Storage Windows 10s Entrepreneur HVAC Charger Cast Telecommuting SharePoint Nanotechnology Remote Worker Tools Shadow IT Search Engine Hiring/Firing Practices HIPAA Sync Cables Tablets Hybrid Cloud Windows Media Player Touchpad Virtual Desktop Accountants Business Technology IT Security Windows Server 2008 Amazon Web Services Hiring/Firing IaaS Computing Infrastructure Addiction Virtual Private Network Cost Management Legal Enterprise Content Management Computer Care Print Server Software Tips Remote Work Relocation Wiring Hosted Solution Password Manager Students Bing nternet Crowdfunding Monitor Hosted Computing Proactive Macro Remote Support Telephony Unified Communications Upgrades Analyitcs Webcam Google Docs Staff Customer Service Co-managed IT Online Shopping Cache Project Management Audit Business Mangement Password Management Law Firm IT Consultant Devices GDPR Netflix Company Culture Botnet Healthcare Root Cause Analysis Data Warehousing Specifications Reputation PC Care Inventory Remote Monitoring and Maintenance Start Menu Theft LinkedIn Digital Signature Cameras 3D IoT Supercomputer Regulations Evernote Internet exploMicrosoft Scheduling Wireless Internet Warranty Computer Fan Travel Criminal NarrowBand eBay NIST HBO Licensing Thought Leadership E-Commerce Net Neutrality Worker Music Regulation Audiobook Scalability Assessment Rootkit Politics Utility Computing How to Television Thank You Printers Transportation Techology Troubleshooting Webinar Automobile Public Computer Congratulations Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Experience Battery Content Two Factor Authentication Video Games Emergency

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name
      • First Name *
      • Last Name *
      • Phone *
      • Phone Ext.
      • Comments:
      • Yes, subscribe me to: