crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Don’t Get Your Hopes Up about 5G Yet

There’s no getting around it: technology has spoiled us. We have had access to 4G mobile data speeds since 2009, and we’re already clamoring for the next thing. While 5G has been in development for some time now, it will likely be quite a while before it is available for common use. Here, we examine why 5G is likely going to take at least a few more years to arrive.

Technological Hang-ups and Impracticalities
The technology that is currently being proposed and developed to power 5G connectivity is rife with shortcomings and conflicts, many of which make its practical use unrealistic and complicated, if not effectively impossible. For example:

One of the biggest issues is the range that the anticipated 5G signals are projected to have - more specifically, the range that Enhanced Mobile Broadband (eMBB) through millimeter wave (mmWave) is capable of reaching. This eMBB is what smartphones would utilize.

A 4G signal, the current standard, has a range of anywhere from three to thirty miles. In comparison, mmWave reaches about a third of a mile. Just imagine how many new cell towers would have to be added to the existing infrastructure for 5G to be implemented. Of course, it’s also likely that looming cell towers will be replaced by then through the adoption of microwave oven-sized femtocells that can be affixed to other pieces of infrastructure, like traffic signs, light poles, and even buses.

Unfortunately, it would seem that there would need to be quite a few of these femtocells, just to ensure a clear signal to a device at any given time. This is because, in addition to being relatively short-ranged, mmWave is a notoriously easy signal to block.

Furthermore, there is also the question of providing each femtocell with enough bandwidth to support the high volume of use. This will require expensive high-speed fiber wiring to connect them, as the femtocells won’t be able to share their data with each other efficiently enough to make up for the difference.

Cloud Complications
Cloud computing has made it easier to manage networks by far, so it is only to be expected that these femtocells will leverage the cloud as a management tool. Virtual networks can be created in the cloud to help manage 5G through the utilization of software-defined networks (SDNs) and network function virtualization (NFV).

The problem here is that there are multiple SDNs and NFVs, which means there is no unified standard. While there is an effort being made by the Linux Foundation to resolve this, it will take some time before this can be ironed out.

Don’t get us wrong, 5G is definitely on its way. There are too many potential benefits for femtocells to be abandoned as a solution (did we mention how cheap they are to use?) and demand for better mobile bandwidth is too high to ignore. It is just going to take some time to overcome some of the technical hurdles.

In the meantime, Integrated Business Technologies can help you optimize your current business connectivity. Give us a call at (918) 770-8738 to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 20 July 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Microsoft Best Practices Business Computing Saving Money Productivity Workplace Tips IT Services Hackers Backup Hosted Solutions Mobile Devices Email Malware Software IT Support Business Small Business Hardware Network Data Communication Server Smartphones Upgrade Computer Business Continuity VoIP Google Windows Mobile Device Management Microsoft Office Disaster Recovery Virtualization Efficiency Miscellaneous Innovation Mobile Office Vendor Management Holiday Gadgets Social Media Outsourced IT BYOD Passwords User Tips Mobile Computing Data Backup Android Smartphone Quick Tips Windows 10 Internet of Things Browser Managed IT services Network Security WiFi Bring Your Own Device Tech Term Remote Monitoring The Internet of Things Ransomware Best Practice Spam Wireless Technology Alert Data Management Trending Operating System Apple Users Remote Computing Data Recovery Save Money Going Green Firewall Content Filtering Artificial Intelligence History Gmail Big Data Printer Tech Support Office Analytics IT Solutions Encryption Lithium-ion Battery Facebook Information Technology Current Events IT Consultant App Managed IT Customer Relationship Management Unified Threat Management Windows 8 Employer-Employee Relationship Router Humor Two-factor Authentication Saving Time Avoiding Downtime Cloud Computing Antivirus Maintenance Document Management Paperless Office Hard Drives Applications Productivity Managed IT Services Marketing Website Customer Service Hacking Excel Computers Phone System Collaboration Compliance Cybersecurity Apps Application Automation Bandwidth Virus Office Tips Retail Phishing Fax Server IT service Digital Payment Mobile Device Chrome Outlook Health VPN Business Growth Risk Management Tablet Office 365 Inbound Marketing iPhone Password Government Project Management Administration Presentation Augmented Reality Budget Regulations Proactive IT Training Computer Repair Data Security Mouse Recovery Money Net Neutrality Running Cable Social User Error Licensing Co-Managed IT Unified Communications File Sharing PowerPoint Infrastructure Social Networking Wi-Fi Computing Hiring/Firing Alerts IT Support Display Vulnerability Blockchain Statistics HIPAA Scam Data loss Intranet Competition Business Intelligence Redundancy BDR Network Congestion Recycling eWaste Downtime Internet Exlporer Files Search Piracy Smart Technology Virtual Desktop USB Business Owner Mobile Security IoT Mobility Sports Hacker User Point of Sale Programming Company Culture Analyitcs Hosted Solution Twitter Tip of the week Flexibility Help Desk Education Data storage Specifications Safety Settings IBM Cost Management Robot Wireless Cybercrime Printing Save Time End of Support Wearable Technology LiFi Modem Halloween Software as a Service Entrepreneur Adminstration 3D Cache PC Care Microsoft Excel Undo Monitors SaaS Data Breach PDF Deep Learning Value People Wires Operations 5G Cookies Scary Stories G Suite Technology Tips Google Wallet eBay Remote Support Management Leadership Writing Chromebook Technology Laws Skype Streaming Media New Additions Virtual Private Network Nanotechnology Travel Comparison Drones Print Server Text Messaging Buisness Work Station Enterprise Resource Planning Permissions Domains Social Engineering Unified Threat Management LinkedIn Identities Scheduling Congratulations IT Technicians Fun Screen Reader Black Friday Word Backups Law Firm IT Video Surveillance CIO Mobile Assessment Fraud Public Speaking Windows 8.1 Update Cortana Telephony Access Control Best Available Solid State Drive Mirgation Smart Tech Identity Theft Cyber Monday Legal Managing Stress IT Management Knowledge SharePoint Environment Alt Codes Business Technology Storage Connectivity Bluetooth Online Currency YouTube Samsung Enterprise Content Management Network Management Experience Machine Learning Downloads Troubleshooting Typing Debate Networking Migration Computer Accessories Distributed Denial of Service Heating/Cooling Google Drive Consumers Crowdfunding Vulnerabilities Macro Windows 10 Hotspot How To Private Cloud Multi-Factor Security Cryptocurrency Chatbots Star Wars Managed IT Service Google Docs Geography Language IP Address Public Cloud Google Calendar Bitcoin Techology Identity Gaming Console Touchscreen Utility Computing Software Tips Break Fix Refrigeration Disaster communications High-Speed Internet Server Management Computing Infrastructure Sync Legislation Hacks Healthcare Dark Web Digital Signature Memory Development Cooperation Disaster Resistance Laptop Mobile Device Managment Motherboard Hard Drive Data Warehousing Documents Conferencing Cables Patch Management Staff Virtual Reality IT Consulting

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...