Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5G is Still Going to Take A While

5G is Still Going to Take A While

As technology has improved in function and convenience, we seem to demand more and more of it at an increasing pace. Take mobile data as an example: 4G was introduced in 2009, and less than a decade later, there is high demand for 5G. Unfortunately, while 5G has been worked on for some time already, it isn’t likely that it will be commonly available anytime soon.

The technology being touted as the driving force behind 5G has quite a few practical issues, many of which may prove to be too much for the anticipated improvements to offset. Many of these issues are rooted in the proposed use of enhanced mobile broadband (eMBB) via millimeter wave (mmWave) and the inherent issues with this plan.

Range
A big problem comes from the range of mmWave. Currently, 4G signals can reach anywhere between three and thirty miles, while mmWave can only reach a third of a mile - one ninth of its range now, under ideal circumstances. In order for 5G through mmWave to be successful, there would need to be some major infrastructure updates.

This has been addressed in the planning processes, as it is likely that the cell towers we are accustomed to today would instead be replaced by shorter-range femtocells. These femtocells would be approximately the size of a microwave oven, and could be added to existing pieces of infrastructure, like light poles, traffic signs, and even public transportation vehicles like buses. However, these open up the idea of implementing 5G to more complications.

Connectivity
For example, mmWave signals are incredibly easy to block, which is why there would need to be so many femtocells added to the existing infrastructure. When something as simple as an unfortunately positioned traffic sign can block a signal, signals need to be coming from more than one direction.

There is also the matter of bandwidth that needs to be addressed. Consider how much usage each femtocell would see - they just wouldn’t be able to network as efficiently as necessary for proper use. This would mean that the entire network of femtocells would also need to be connected via costly high-speed fiber cabling, which would be an expensive and time-consuming endeavor.

Cloud Confusion
With cloud computing having become such a widely utilized tool, it only makes sense that the femtocell network would be managed via the cloud. By creating a virtual network in the cloud, software-defined networks (SDNs) and network function virtualization (NFV) could be leveraged to manage the 5G network. Trouble is, there are various kinds of SDNs and NFV, with no one standard. The Linux Foundation is working to change this, but this still isn’t an issue that will likely be resolved in the near future.

Regardless, 5G is going to happen - femtocells are inexpensive and, for all their faults, a potentially beneficial way to make it possible. Furthermore, people want better mobile bandwidth. The technology is just going to take some time to develop.

However, if you want to improve your business’ connectivity now, we can help. Give Professional Computer Associates a call at 845-876-6561.

Is Blockchain the Future of Cybersecurity?
Know Your Tech: Safe Mode
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Hackers Network Security Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Disaster Recovery Mobile Devices Microsoft Software Productivity Business Internet Email Business Continuity Data Innovation Outsourced IT Data Backup Efficiency Cybercrime communications Ransomware Smartphones IT Support Windows 10 Computer Cloud Computing IT Services Browser Data Recovery Android Hardware BDR Internet of Things Office Alert Telephone Systems Tech Term Computers Server Windows Business Management Saving Money Upgrade User Tips Cybersecurity Mobile Device Management Small Business Smartphone Virtualization Network Quick Tips BYOD Managed IT Social Engineering Microsoft Office Collaboration Save Money Law Enforcement Chrome Workplace Tips Firewall Artificial Intelligence Private Cloud Bandwidth Password Hacking Facebook Office Tips Managed Service Provider Communication Mobility Router Work/Life Balance Holiday How To Avoiding Downtime Money Office 365 Social Media Productivity Miscellaneous Passwords Recovery App Health Information Technology Redundancy Business Intelligence Budget VPN Data Management Two-factor Authentication Bring Your Own Device Flexibility Wi-Fi Operating System Data Protection Gmail Phishing Proactive IT Data Security HaaS Applications Automation Remote Monitoring Connectivity Identity Theft Risk Management Value Gadgets Employer-Employee Relationship Windows 10 Document Management Black Market Word Google Drive Cleaning Blockchain Apps Compliance SaaS Spam Mobile Device User Error Marketing Data Breach Entertainment Big Data Vulnerability Safety Managed IT Services Hiring/Firing Data Storage HIPAA Public Cloud Website Computer Care Remote Computing Workers Wireless Technology Paperless Office Samsung Patch Management Business Owner Keyboard PDF DDoS Credit Cards Windows 7 Scam Computing Infrastructure IT Management CES Physical Security Mobile Computing Smart Tech OneNote Save Time Meetings IT Plan Content Management Wireless Apple Worker Automobile Unsupported Software USB Downtime Servers History eWaste Legal Comparison Battery Training Best Practice Settings Shadow IT Data storage Government Streaming Media Spam Blocking Education End of Support Data loss Internet Exlporer Content Filtering YouTube Access Control Infrastructure Encryption Update Charger Networking IT Support The Internet of Things Electronic Medical Records Solid State Drive Wearable Technology Sports Analysis NarrowBand Start Menu Nanotechnology Audit Virtual Reality Mobile Office Business Mangement Smart Office Remote Work NIST Supercomputer IT solutions Tip of the week Accountants Emergency Instant Messaging Reputation Files Mobile Employer Employee Relationship Computer Fan Worker Commute Recycling Knowledge Hybrid Cloud Voice over Internet Protocol Cryptocurrency Current Events Windows Server 2008 Search Customer Colocation Chromecast Professional Services Devices Computer Accessories FENG Wireless Charging Data Warehousing Criminal Network Congestion Antivirus Multi-Factor Security Students Safe Mode IoT Emails How to Tools Thought Leadership Bluetooth Fiber-Optic Uninterrupted Power Supply Experience Techology Trending Healthcare Loyalty Distributed Denial of Service Fraud File Sharing WiFi Regulations Transportation hacker Content Filter Cables Music IT Consultant Lifestyle Electronic Health Records Amazon Business Technology Insurance Benefits Botnet Storage Unified Communications Leadership Machine Learning Assessment Mouse Amazon Web Services Virtual Assistant Practices Smart Technology Netflix Going Green Travel Rootkit Root Cause Analysis Theft Tech Support Software Tips Human Resources Troubleshooting Robot Television Relocation Online Shopping Telephone System Flash Hosted Computing Lithium-ion battery Laptop Environment Addiction Cortana Content Public Computer Staff Hosted Solution webinar Running Cable Specifications Evernote Sync Inventory Two Factor Authentication IaaS Audiobook Touchpad Software as a Service Cache Vendor Management Google Apps HVAC HBO Digital Signature Conferencing Outlook Millennials SharePoint Telephony Windows 10s Politics Hard Drives Internet exploMicrosoft Wireless Internet Screen Mirroring Enterprise Content Management Frequently Asked Questions Strategy Video Games Humor Workforce iPhone Skype Authentication Users Password Manager Advertising Notifications Google Docs Wire Unified Threat Management People Cast Telecommuting Password Management IBM Fax Server Excel Books Scalability Monitor Webinar Thank You IT solutions Administration CrashOverride Congratulations Twitter Company Culture Managing Stress

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!