Network Synergy Blog

Don’t Get Your Hopes Up about 5G Yet

Don’t Get Your Hopes Up about 5G Yet

There’s no getting around it: technology has spoiled us. We have had access to 4G mobile data speeds since 2009, and we’re already clamoring for the next thing. While 5G has been in development for some time now, it will likely be quite a while before it is available for common use. Here, we examine why 5G is likely going to take at least a few more years to arrive.

Technological Hang-ups and Impracticalities
The technology that is currently being proposed and developed to power 5G connectivity is rife with shortcomings and conflicts, many of which make its practical use unrealistic and complicated, if not effectively impossible. For example:

Range
One of the biggest issues is the range that the anticipated 5G signals are projected to have - more specifically, the range that Enhanced Mobile Broadband (eMBB) through millimeter wave (mmWave) is capable of reaching. This eMBB is what smartphones would utilize.

A 4G signal, the current standard, has a range of anywhere from three to thirty miles. In comparison, mmWave reaches about a third of a mile. Just imagine how many new cell towers would have to be added to the existing infrastructure for 5G to be implemented. Of course, it’s also likely that looming cell towers will be replaced by then through the adoption of microwave oven-sized femtocells that can be affixed to other pieces of infrastructure, like traffic signs, light poles, and even buses.

Connectivity
Unfortunately, it would seem that there would need to be quite a few of these femtocells, just to ensure a clear signal to a device at any given time. This is because, in addition to being relatively short-ranged, mmWave is a notoriously easy signal to block.

Furthermore, there is also the question of providing each femtocell with enough bandwidth to support the high volume of use. This will require expensive high-speed fiber wiring to connect them, as the femtocells won’t be able to share their data with each other efficiently enough to make up for the difference.

Cloud Complications
Cloud computing has made it easier to manage networks by far, so it is only to be expected that these femtocells will leverage the cloud as a management tool. Virtual networks can be created in the cloud to help manage 5G through the utilization of software-defined networks (SDNs) and network function virtualization (NFV).

The problem here is that there are multiple SDNs and NFVs, which means there is no unified standard. While there is an effort being made by the Linux Foundation to resolve this, it will take some time before this can be ironed out.

Don’t get us wrong, 5G is definitely on its way. There are too many potential benefits for femtocells to be abandoned as a solution (did we mention how cheap they are to use?) and demand for better mobile bandwidth is too high to ignore. It is just going to take some time to overcome some of the technical hurdles.

In the meantime, Network Synergy can help you optimize your current business connectivity. Give us a call at 203.261.2201 to learn more.

The G Suite Just Got Smarter
Tip of the Week: Better Understand BYOD
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Firefox HIPAA Managed IT Service Connectivity Identities Wires Cache Conferencing Google Wallet Computer Accessories VoIP Downloads Wi-Fi Cortana Trainging Halloween Employee-Employer Relationship Data Hard Drives Geography IT Technicians Virtual Private Network Buisness Mail Merge Backups Scheduling Best Available Spam Server Hackers Computer Repair Virtual Reality How To Tip of the Work Small Business Facebook Data Management Touchscreen Drones Windows 8 IT Support Memory Migration Cybersecurity Quick Tips Cloud Computing Logs IT Solutions Avoiding Downtime Unified Communications Wireless Technology Office Tips Outlook Managed Services Provider Website Notifications Hotspot Collaboration How To 3D Managed IT services Networking Alerts Business Windows History Telephony Healthcare PDF App Licensing Firewall High-Speed Internet PC Care Video Surveillance Mirgation Gadget IT budget Cooperation Phone System Disaster Recovery Personal Information CIO Scary Stories Information Technology Managing Stress Computing Infrastructure Customer Service Documents People Legal Cabling Paperless Office Virtualization Smartphones Content Filtering Access Control Processors IT Consulting Router Mobile Devices Lithium-ion Battery Best Practices Vulnerability Gaming Console Time Management Hardware Two-factor Authentication SharePoint The Internet of Things Administration Typing Unsupported Software Bookmarks E-Commerce Humor Chromebook Computer Care Best Practice Smart Tech Save Time Infrastructure Business Owner YouTube Asset Tracking Domains Printer Mobile Device Management Big Data Hacks Alt Codes 5G VPN Streaming Media Internet of Things Chrome Law Firm IT Money Government Social Microsoft Excel Wireless Users Vulnerabilities Employer-Employee Relationship Permissions Value Travel Remote Computing Point of Sale Troubleshooting Upgrade Education Remote Monitoring and Management Settings Managed Service Provider Printers Saving Time Recovery Augmented Reality CCTV Features Fun Regulation MSP Productivity Phishing SaaS Windows 8.1 Update IT service Start Menu Macro Backup and Disaster Recovery Nanotechnology Business Computing Remote Workers Social Media Privacy Legislation Gadgets Android Recycling Virtual Desktop Cyberattacks Running Cable Shortcut Remote Monitoring Environment IBM Password Flexibility Disaster Resistance Corporate Profile Staff Cables Data Backup Technology Laws Assessment BDR Redundancy Inbound Marketing End of Support Budget Company Culture Human Error Internet IT Consultant Online Currency Skype Disaster Sync Fraud Physical Security Maintenance Administrator Distributed Denial of Service Techology Project Management Experience Laptop Managed IT Services Regulations Bandwidth Screen Reader Text Messaging Data Loss Save Money Going Green Information Help Desk Hacking Utility Computing Google Maps Spyware Tracking Mobile Device Address Comparison Modem Data Recovery Cybercrime Chatbots Search Alert Samsung Public Speaking iPhone Compliance Network Trending Electronic Medical Records communications Finance Business Intelligence Health Writing Mobile Data Technology Tips Statistics Tutorials Microsoft 3D Printing Ransomware Smartphone Cryptocurrency Holiday Windows 10 Enterprise Resource Planning Hard Disk Drive Thank You Word Tech Support Heating/Cooling Secruity Error Smart Technology USB Patch Management Robot WiFi Work Station Current Events Print Server Battery Google Drive Consultation Automobile Mobile Technology Training Business Technology Mobile Computing IoT Office 365 Refrigeration File Sharing Digital Payment Software as a Service Supercomputer Hosted Solution Co-managed IT Security Mouse LiFi Consumers Zero-Day Threat Operating System Permission Retail Data storage Unified Threat Management Google Docs Proactive Antivirus Managed Service Cloud Social Engineering Managed IT Data Warehousing Encryption Digital Presentation Customer Relationship Management Superfish Relocation User Specifications Cleaning Downtime Piracy Wearable Technology Mobile Security Workplace Tips Competition Net Neutrality Tip of the week Hacker Knowledge Motion sickness Digital Signature Proactive IT Instant Messaging User Tips Undo Lenovo Monitoring Bitcoin Mobile Office Fax Server Test Technology Authentication Staffing Black Market Emoji Debate Charger Dark Web Browser Private Cloud Hiring/Firing Language Congratulations Social Networking Vendor Management Leadership Applications Programming Gmail Google Analytics Solid State Drive Politics Enterprise Content Management Management LinkedIn Intranet Software Tips Black Friday Tech Term Crowdfunding Taxes G Suite Webcam Internet Exlporer GPS Unified Threat Management Public Cloud Data Security Food Backup Computers eBay Service-based Business PowerPoint BYOD User Error Business Growth Malware Google Hard Drive Telephone Systems Mobile Analyitcs Efficiency Operations Saving Money Network Management Twitter Passwords Cost Management Google Calendar Tip of the Week Machine Learning Remote Support Cyber Monday Printing eWaste Monitors Electronic Health Records Business Management Software Email Hosted Solutions Botnet Communication Windows 10 IT Management Employees Display Apps Computer Automation Consulting Break Fix Development Blockchain Entrepreneur Business Continuity Identity Miscellaneous Microsoft Office Star Wars Office Authorization Marketing IT Services Mobility Network Congestion Motherboard Crowdsourcing Multi-Factor Security CrashOverride Servers Deep Learning Artificial Intelligence Computing Upgrades Outsourced IT Meetings Work/Life Balance Identity Theft Scam Cookies Innovation WPA3 Files Webinar Law Enforcement Favorites Fleet Tracking Web Server Risk Management Server Management Productivity Virus Read Only Excel Websites Uninterrupted Power Supply Document Management IP Address IT Support Application Bluetooth Tablet Network Security Data Breach Bring Your Own Device Cameras Apple Safety Sports OneNote Storage

      Latest Blogs

      Data backup can be the difference between a business that fails and a business that succeeds. After all, if an organization suffers from a data loss incident so bad that it has to ...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube