crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Get Your Hopes Up about 5G Yet

There’s no getting around it: technology has spoiled us. We have had access to 4G mobile data speeds since 2009, and we’re already clamoring for the next thing. While 5G has been in development for some time now, it will likely be quite a while before it is available for common use. Here, we examine why 5G is likely going to take at least a few more years to arrive.

Technological Hang-ups and Impracticalities
The technology that is currently being proposed and developed to power 5G connectivity is rife with shortcomings and conflicts, many of which make its practical use unrealistic and complicated, if not effectively impossible. For example:

Range
One of the biggest issues is the range that the anticipated 5G signals are projected to have - more specifically, the range that Enhanced Mobile Broadband (eMBB) through millimeter wave (mmWave) is capable of reaching. This eMBB is what smartphones would utilize.

A 4G signal, the current standard, has a range of anywhere from three to thirty miles. In comparison, mmWave reaches about a third of a mile. Just imagine how many new cell towers would have to be added to the existing infrastructure for 5G to be implemented. Of course, it’s also likely that looming cell towers will be replaced by then through the adoption of microwave oven-sized femtocells that can be affixed to other pieces of infrastructure, like traffic signs, light poles, and even buses.

Connectivity
Unfortunately, it would seem that there would need to be quite a few of these femtocells, just to ensure a clear signal to a device at any given time. This is because, in addition to being relatively short-ranged, mmWave is a notoriously easy signal to block.

Furthermore, there is also the question of providing each femtocell with enough bandwidth to support the high volume of use. This will require expensive high-speed fiber wiring to connect them, as the femtocells won’t be able to share their data with each other efficiently enough to make up for the difference.

Cloud Complications
Cloud computing has made it easier to manage networks by far, so it is only to be expected that these femtocells will leverage the cloud as a management tool. Virtual networks can be created in the cloud to help manage 5G through the utilization of software-defined networks (SDNs) and network function virtualization (NFV).

The problem here is that there are multiple SDNs and NFVs, which means there is no unified standard. While there is an effort being made by the Linux Foundation to resolve this, it will take some time before this can be ironed out.

Don’t get us wrong, 5G is definitely on its way. There are too many potential benefits for femtocells to be abandoned as a solution (did we mention how cheap they are to use?) and demand for better mobile bandwidth is too high to ignore. It is just going to take some time to overcome some of the technical hurdles.

In the meantime, Integrated Business Technologies can help you optimize your current business connectivity. Give us a call at (918) 770-8738 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 20 November 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Business Computing Best Practices Microsoft Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Business Malware Software Data Mobile Devices IT Support Small Business Network Hardware Server Communication Smartphones Computer VoIP Business Continuity Upgrade Windows Efficiency Innovation Google Data Backup Disaster Recovery Mobile Device Management Virtualization Microsoft Office Outsourced IT Vendor Management Tech Term Miscellaneous Mobile Office Gadgets Social Media Network Security Holiday Productivity User Tips Quick Tips Passwords BYOD Mobile Computing Browser Android Smartphone Windows 10 Internet of Things Data Recovery Managed IT services WiFi Bring Your Own Device Best Practice Users The Internet of Things Remote Monitoring Ransomware Spam Alert Data Management Collaboration Save Money Trending Wireless Technology Operating System Apple Remote Computing Artificial Intelligence Firewall Office Customer Relationship Management Unified Threat Management Encryption Content Filtering Going Green History Gmail Managed IT Maintenance Big Data App Analytics IT Support IT Solutions Lithium-ion Battery Facebook IT Consultant Router Printer Tech Support Information Technology Current Events Cloud Computing Avoiding Downtime Employer-Employee Relationship Website Customer Service Hard Drives Applications Two-factor Authentication Managed IT Services Windows 8 Antivirus Phishing Bandwidth Document Management Humor Mobile Device Saving Time Paperless Office Wi-Fi Application Virus Hacking Computers Fax Server Phone System Outlook Health Government Compliance Automation Marketing Excel Office Tips Retail Project Management Cybersecurity IT service Digital Payment Chrome Business Growth VPN Apps Risk Management Unified Communications Training Tablet Data Security Help Desk Office 365 iPhone User Error Password Healthcare Infrastructure Co-Managed IT Administration Presentation Augmented Reality Vulnerability Budget Managed Service Computer Repair BDR Proactive IT Point of Sale Regulations Recovery Inbound Marketing Mouse Files Money Social Net Neutrality Running Cable Licensing Wireless File Sharing PowerPoint Social Networking Hiring/Firing Windows 10 Printing Display Alerts End of Support LiFi Tip of the week Computing Statistics Intranet Business Intelligence Competition Network Congestion Recycling Downtime eWaste Remote Workers Search Virtual Desktop USB Piracy Business Owner Information Data loss Blockchain Sports HIPAA Hacker Programming Scam User Redundancy Company Culture Analyitcs Twitter Education Machine Learning Safety Specifications IBM Internet Exlporer Settings Flexibility Hosted Solution Cost Management Remote Monitoring and Management Storage Mobility Smart Technology Data storage Cybercrime communications Save Time Mobile Security Wearable Technology Conferencing IoT Robot Entrepreneur Vulnerabilities Hotspot Halloween Networking PC Care Sync Multi-Factor Security Undo Fleet Tracking Chatbots Features Macro Value People Star Wars Zero-Day Threat Software Tips Managed IT Service 5G PDF Geography eBay Language Scary Stories Virtual Reality Leadership Mobile Device Managment Google Calendar Asset Tracking Remote Support Identity Electronic Health Records Streaming Media Utility Computing Backup and Disaster Recovery New Additions Break Fix Monitors Skype Deep Learning Print Server High-Speed Internet Gaming Console Text Messaging Server Management Computing Infrastructure SaaS Techology Legislation Domains Google Wallet OneNote Work Station Cyberattacks Human Error Congratulations Dark Web Fun Writing LinkedIn Word Law Firm IT Development Video Surveillance Cooperation Chromebook Disaster Resistance G Suite Public Speaking Drones Windows 8.1 Update Employee-Employer Relationship Motherboard Read Only Hard Drive Permission Data Warehousing Cortana Social Engineering Best Available Buisness Identities Cables Patch Management Staff IT Consulting Travel Software as a Service Backups Modem Bookmarks Cache Test Adminstration Microsoft Excel Knowledge Environment CIO Solid State Drive Bluetooth Wires 3D Operations Politics Data Breach Meetings Technology Tips Legal Online Currency Samsung Cookies Favorites Debate Management Experience Troubleshooting Heating/Cooling Alt Codes Computer Accessories Virtual Private Network Telephony Technology Laws Instant Messaging Comparison Consumers Monitoring Crowdfunding Nanotechnology Enterprise Resource Planning How To Permissions YouTube Typing MSP IT Technicians Unified Threat Management Screen Reader Finance Scheduling Identity Theft Black Friday IP Address Google Drive Mobile Assessment Fraud How To Access Control Refrigeration Cryptocurrency Disaster Proactive Touchscreen Mirgation Consulting Smart Tech Authentication Cyber Monday Google Docs Managing Stress IT Management Private Cloud SharePoint Bitcoin Digital Signature Business Technology Managed Services Provider Connectivity Authorization Memory Enterprise Content Management Network Management Laptop Public Cloud Downloads Hacks WPA3 Migration E-Commerce Employees Distributed Denial of Service Documents

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code