XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5G is Still Going to Take A While

5G is Still Going to Take A While

As technology has improved in function and convenience, we seem to demand more and more of it at an increasing pace. Take mobile data as an example: 4G was introduced in 2009, and less than a decade later, there is high demand for 5G. Unfortunately, while 5G has been worked on for some time already, it isn’t likely that it will be commonly available anytime soon.

The technology being touted as the driving force behind 5G has quite a few practical issues, many of which may prove to be too much for the anticipated improvements to offset. Many of these issues are rooted in the proposed use of enhanced mobile broadband (eMBB) via millimeter wave (mmWave) and the inherent issues with this plan.

Range
A big problem comes from the range of mmWave. Currently, 4G signals can reach anywhere between three and thirty miles, while mmWave can only reach a third of a mile - one ninth of its range now, under ideal circumstances. In order for 5G through mmWave to be successful, there would need to be some major infrastructure updates.

This has been addressed in the planning processes, as it is likely that the cell towers we are accustomed to today would instead be replaced by shorter-range femtocells. These femtocells would be approximately the size of a microwave oven, and could be added to existing pieces of infrastructure, like light poles, traffic signs, and even public transportation vehicles like buses. However, these open up the idea of implementing 5G to more complications.

Connectivity
For example, mmWave signals are incredibly easy to block, which is why there would need to be so many femtocells added to the existing infrastructure. When something as simple as an unfortunately positioned traffic sign can block a signal, signals need to be coming from more than one direction.

There is also the matter of bandwidth that needs to be addressed. Consider how much usage each femtocell would see - they just wouldn’t be able to network as efficiently as necessary for proper use. This would mean that the entire network of femtocells would also need to be connected via costly high-speed fiber cabling, which would be an expensive and time-consuming endeavor.

Cloud Confusion
With cloud computing having become such a widely utilized tool, it only makes sense that the femtocell network would be managed via the cloud. By creating a virtual network in the cloud, software-defined networks (SDNs) and network function virtualization (NFV) could be leveraged to manage the 5G network. Trouble is, there are various kinds of SDNs and NFV, with no one standard. The Linux Foundation is working to change this, but this still isn’t an issue that will likely be resolved in the near future.

Regardless, 5G is going to happen - femtocells are inexpensive and, for all their faults, a potentially beneficial way to make it possible. Furthermore, people want better mobile bandwidth. The technology is just going to take some time to develop.

However, if you want to improve your business’ connectivity now, we can help. Give XFER a call at 734-927-6666 / 800-438-9337.

Is Blockchain the Future of Cybersecurity?
Know Your Tech: Safe Mode
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Hackers Data Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Network Security Malware Gadgets Email Quick Tips Efficiency Network Innovation IT Support Business Management IT Services Business Social Media Business Continuity Smartphones Miscellaneous Server Upgrade Virtualization User Tips Communication Windows Disaster Recovery Communications Data Backup Computer Managed IT Services Microsoft Office Smartphone Data Recovery Users Passwords Browser Mobile Device Management Android Holiday Internet of Things WiFi Save Money Marketing Alert Tech Term Ransomware Outsourced IT Vendor Management Cloud Computing Artificial Intelligence BDR Mobile Computing Cybercrime Remote Monitoring Windows 10 Router Productivity Operating System Chrome Automation Cybersecurity Bring Your Own Device Apple BYOD Information Technology Computers Avoiding Downtime Managed IT Services Spam Health Current Events Big Data History Best Practice Remote Computing Going Green IT Solutions The Internet of Things Collaboration Firewall Telephone Systems VPN Social Engineering Phone System Proactive IT Employer-Employee Relationship Wireless Technology IT Consultant Trending Application Printer Facebook Hacking Money Lithium-ion Battery Office Budget Mobile Device Mobility Excel Windows 10 App IT Support Bandwidth Private Cloud iPhone Business Managament Training Networking Office 365 Mouse Encryption Fax Server Applications Business Intelligence Content Filtering How To Maintenance Windows 8 Two-factor Authentication Phishing Recovery Unified Threat Management Website Outlook Tutorials Redundancy Customer Relationship Management Data Security Law Enforcement Information Hard Drives Virus Gmail Antivirus Settings Analytics Google Drive Apps File Sharing Managed IT PowerPoint User Error Data Protection Access Control Save Time Blockchain Value Word Humor Sports Twitter Office Tips Document Management Data Management Machine Learning Compliance Identity Theft Streaming Media Risk Management Analysis Inbound Marketing Flexibility Social Entertainment Voice over Internet Protocol Managed Service IT Management Saving Time Retail Administration Servers Connectivity Human Resources Tech Support Digital Payment Social Networking Downtime Scam Computer Repair Memory Network Congestion Hacker Software as a Service Conferencing Vulnerability Wi-Fi Administrator Tablet Search Comparison Computer Accessories Online Currency Telephony Keyboard Meetings Recycling Windows 7 Work/Life Balance Data Breach Point of Sale Google Docs DDoS Botnet Education Webinar Solid State Drive Workers Statistics Black Market Programming Instant Messaging Credit Cards Skype Paperless Office Help Desk Wireless Physical Security Business Technology Touchscreen Data loss Cleaning Password Environment Augmented Reality Intranet Public Cloud Running Cable Wearable Technology Biometrics SaaS Fraud CES Spam Blocking IT Plan Virtual Assistant Net Neutrality IT service Video Surveillance Data storage Display Best Available Content Management Healthcare eWaste Unsupported Software Telephone System Internet Exlporer Infrastructure Bluetooth Piracy OneNote PDF IBM People Robot HaaS End of Support Leadership Samsung USB Safety Update Government Smart Tech Data Storage YouTube Cryptocurrency 3D Unified Communications Content Filter Scheduling Camera Tablets Reputation Audit Windows Media Player Virtual Desktop Internet exploMicrosoft Online Shopping Authentication MSP Hiring/Firing Staff Vendor eBay Cost Management Insurance Alerts ISP NarrowBand Business Mangement Smart Office Netflix IT Security Data Warehousing Customers Specifications Safe Mode Root Cause Analysis Uninterrupted Power Supply Start Menu Theft Storage Print Server Upgrades Analyitcs Text Messaging Computer Fan Remote Support Customer Service Regulations Advertising Evernote Nanotechnology Remote Worker Supercomputer nternet Crowdfunding Digital Signature HVAC Security Cameras Distributed Denial of Service HBO Files Practices Work Station File Versioning Consultant Chromecast Travel Criminal Gaming Console Search Engine Millennials Accountants Smartwatch Company Culture Mobile Cortana Addiction Virtual Private Network Law Firm IT Employee/Employer Relationship FENG Cameras Notifications Wireless Charging Wiring Knowledge Multi-Factor Security Strategy Enterprise Content Management Frequently Asked Questions Colocation Hosted Computing Proactive Multiple Versions LinkedIn Licensing Laptop Students Bing Patch Management SharePoint Workforce Employee Screen Mirroring WIndows 7 Shadow IT Professional Services Google Apps Cache Project Management 360 Emails Virtual Reality Password Management Electronic Medical Records Windows 8.1 Update Printer Server Shortcut Flash Hybrid Cloud Fiber-Optic Devices GDPR Lifestyle Windows 10s Worker Commute IaaS Tip of the week Computing Infrastructure Amazon Inventory Remote Monitoring and Maintenance Restore Data Business Owner Macro User Touchpad Shortcuts Relocation Telecommuting IoT Digital Signage Co-managed IT Charger Cast Managing Stress Domains Tools Legal Wireless Internet Webcam Warranty Debate Bloatware NIST Hiring/Firing Sync Cables Thought Leadership E-Commerce HIPAA Science Monitor Windows Server 2008 Amazon Web Services Line of Business Backup and Disaster Recovery Electronic Health Records eCommerce Entrepreneur Software Tips Remote Work PC Care Google Search Computer Care Password Manager Wire Microchip Hosted Solution Employer Employee Relationship CrashOverride Smart Technology Cryptomining Battery Loyalty Video Games Utility Computing Books Printers Experience Two Factor Authentication Content Scalability Emergency Worker Thank You Music Audiobook Assessment How to Rootkit Techology Congratulations Politics Television Transportation Troubleshooting Webinar Benefits Automobile Public Computer Regulation IT solutions

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *