XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5G is Still Going to Take A While

5G is Still Going to Take A While

As technology has improved in function and convenience, we seem to demand more and more of it at an increasing pace. Take mobile data as an example: 4G was introduced in 2009, and less than a decade later, there is high demand for 5G. Unfortunately, while 5G has been worked on for some time already, it isn’t likely that it will be commonly available anytime soon.

The technology being touted as the driving force behind 5G has quite a few practical issues, many of which may prove to be too much for the anticipated improvements to offset. Many of these issues are rooted in the proposed use of enhanced mobile broadband (eMBB) via millimeter wave (mmWave) and the inherent issues with this plan.

Range
A big problem comes from the range of mmWave. Currently, 4G signals can reach anywhere between three and thirty miles, while mmWave can only reach a third of a mile - one ninth of its range now, under ideal circumstances. In order for 5G through mmWave to be successful, there would need to be some major infrastructure updates.

This has been addressed in the planning processes, as it is likely that the cell towers we are accustomed to today would instead be replaced by shorter-range femtocells. These femtocells would be approximately the size of a microwave oven, and could be added to existing pieces of infrastructure, like light poles, traffic signs, and even public transportation vehicles like buses. However, these open up the idea of implementing 5G to more complications.

Connectivity
For example, mmWave signals are incredibly easy to block, which is why there would need to be so many femtocells added to the existing infrastructure. When something as simple as an unfortunately positioned traffic sign can block a signal, signals need to be coming from more than one direction.

There is also the matter of bandwidth that needs to be addressed. Consider how much usage each femtocell would see - they just wouldn’t be able to network as efficiently as necessary for proper use. This would mean that the entire network of femtocells would also need to be connected via costly high-speed fiber cabling, which would be an expensive and time-consuming endeavor.

Cloud Confusion
With cloud computing having become such a widely utilized tool, it only makes sense that the femtocell network would be managed via the cloud. By creating a virtual network in the cloud, software-defined networks (SDNs) and network function virtualization (NFV) could be leveraged to manage the 5G network. Trouble is, there are various kinds of SDNs and NFV, with no one standard. The Linux Foundation is working to change this, but this still isn’t an issue that will likely be resolved in the near future.

Regardless, 5G is going to happen - femtocells are inexpensive and, for all their faults, a potentially beneficial way to make it possible. Furthermore, people want better mobile bandwidth. The technology is just going to take some time to develop.

However, if you want to improve your business’ connectivity now, we can help. Give XFER a call at 734-927-6666 / 800-Get-XFER.

Is Blockchain the Future of Cybersecurity?
Know Your Tech: Safe Mode
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, September 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Small Business Hackers Hosted Solutions Data Google Productivity Hardware Mobile Devices Mobile Office VoIP Email Gadgets Quick Tips Malware IT Support Network Security Efficiency Network Innovation Social Media Business Management IT Services Miscellaneous Business Continuity Server Smartphones Business Virtualization Upgrade Windows Disaster Recovery Communication Microsoft Office Managed IT Services Users Communications Computer User Tips Data Backup Mobile Device Management Passwords Android Browser Save Money Marketing Smartphone WiFi Holiday Alert Mobile Computing Vendor Management Ransomware Data Recovery Tech Term Remote Monitoring Windows 10 Internet of Things Outsourced IT Cybercrime Operating System Avoiding Downtime Bring Your Own Device Cloud Computing Apple Computers BYOD BDR Information Technology VPN Remote Computing Best Practice History IT Solutions The Internet of Things Artificial Intelligence Router Firewall Chrome Going Green Telephone Systems Automation Current Events Big Data Employer-Employee Relationship Trending Phone System Wireless Technology Cybersecurity Application IT Consultant Facebook Collaboration Hacking Spam Social Engineering Health Office Managed IT Services Excel Lithium-ion Battery Budget App Printer Money Bandwidth Proactive IT Maintenance Applications Windows 8 iPhone Two-factor Authentication Mobility Content Filtering How To Recovery Business Managament Unified Threat Management Fax Server Business Intelligence Networking Gmail Office 365 Analytics Customer Relationship Management Training Hard Drives Mouse Data Security User Error Managed IT Sports Value Humor Outlook Apps Tutorials Windows 10 Phishing Virus Website PowerPoint Private Cloud Redundancy Antivirus Data Protection Law Enforcement Flexibility Vulnerability Blockchain Word Encryption Entertainment Downtime Tech Support File Sharing Memory Settings Retail Inbound Marketing Identity Theft Conferencing Google Drive Analysis Network Congestion Administration Search IT Management Tablet Productivity Mobile Device Twitter Connectivity Digital Payment Document Management Social Networking Save Time Computer Repair Streaming Media Risk Management Office Tips Data Management Saving Time Compliance IT Support Running Cable Update Augmented Reality Intranet Solid State Drive Computer Accessories Black Market Wearable Technology Data Storage Access Control Comparison Smart Tech Instant Messaging Wireless Physical Security Work/Life Balance Data Breach Environment Windows 7 Cleaning Password Scam Machine Learning Human Resources Social Public Cloud Best Available Bluetooth SaaS Workers Information Biometrics People IT service Touchscreen Data storage Hacker Credit Cards Samsung Paperless Office Data loss Managed Service eWaste Online Currency Servers Internet Exlporer Spam Blocking CES Recycling PDF Point of Sale Video Surveillance Safety Wi-Fi Education USB IT Plan HaaS End of Support Robot Statistics Government Virtual Assistant YouTube Webinar Meetings Content Management Piracy Infrastructure Programming IBM Unsupported Software Skype OneNote Leadership DDoS Administrator Thought Leadership E-Commerce PC Care Customers Upgrades NIST Analyitcs Windows Server 2008 Uninterrupted Power Supply Amazon Web Services Customer Service 3D Password Manager Computer Care Electronic Health Records Scheduling Software Tips Remote Work Advertising LinkedIn Hosted Solution Line of Business Telephony Chromecast Unified Communications Wire Consultant Distributed Denial of Service Files Net Neutrality Keyboard eBay Content Filter Audit Alerts Google Docs Staff Windows 8.1 Update Cryptocurrency Online Shopping Authentication Cameras Netflix MSP Botnet Business Mangement Display Notifications Text Messaging Start Menu Laptop Theft Debate Licensing Smart Office Root Cause Analysis Macro Data Warehousing Specifications Colocation Insurance Storage WIndows 7 Computer Fan Co-managed IT Work Station SharePoint Voice over Internet Protocol Digital Signature Supercomputer Safe Mode Virtual Reality Gaming Console Regulations Shadow IT Evernote Nanotechnology Printer Server Remote Worker Shortcut Travel Criminal HVAC HBO Hybrid Cloud Mobile Touchpad Cortana User IaaS Millennials Computing Infrastructure Practices Worker Commute Addiction Managing Stress FENG Domains Multi-Factor Security Relocation Strategy Accountants Knowledge Business Technology Bloatware Wireless Charging Legal Patch Management Wiring Monitor Enterprise Content Management Science Frequently Asked Questions Fraud Professional Services Google Apps IT Security Students Screen Mirroring Workforce 360 Hosted Computing Emails Proactive Print Server Electronic Medical Records Cache Lifestyle Entrepreneur Flash Fiber-Optic Devices Windows 10s GDPR Software as a Service Reputation Remote Support Business Owner Password Management Tablets Webcam Tip of the week Amazon nternet Crowdfunding Tools Hiring/Firing Charger Healthcare Cast Telecommuting Internet exploMicrosoft Inventory Windows Media Player Remote Monitoring and Maintenance Virtual Desktop NarrowBand Cables Law Firm IT Hiring/Firing Wireless Internet Company Culture HIPAA IoT Help Desk Telephone System Cost Management Sync Benefits Automobile Thank You Public Computer IT solutions Scalability Employer Employee Relationship CrashOverride Regulation Smart Technology Camera Congratulations Loyalty Books How to Experience Two Factor Authentication Printers Content Techology Emergency Worker Music Audiobook Assessment Rootkit Politics Transportation Television Battery Troubleshooting Webinar Video Games

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *