What Is The Fuss About 5G?

Superfast fifth generation, or 5G, mobile Internet services are already on offer. Although not avilable everywhere yet  and with a limited choice of handset supplier , although that will change in the coming months. So what difference will 5G make to our lives and what exactly is it? 

5G stands for fifth-generation cellular wireless, and the initial standards for it were set at the end of 2017. But a standard doesn't mean that all 5G will work the same, or that we even know what applications 5G will enable. There will be slow but responsive 5G, and fast 5G with limited coverage.  What, then, is all the fuss about 5G?

It's the next generation of mobile Internet connection and offers much faster data download and upload speeds.Through greater use of the radio spectrum it will allow far more devices to access the mobile internet at the same time.

The G in this 5G means it's a generation of wireless technology. While most generations have technically been defined by their data transmission speeds, each has also been marked by a break in encoding methods, or "air interfaces," that make it incompatible with the previous generation.

  • 1G was analog cellular.
  • 2G technologies, such as CDMA, GSM, and TDMA, were the first generation of digital cellular technologies.
  • 3G technologies, such as EVDO, HSPA, and UMTS, brought speeds from 200kbps to a few megabits per second. 
  • 4G technologies, such as WiMAX and LTE, were the next incompatible leap forward, and they are now scaling up to hundreds of megabits and even gigabit-level speeds.
  • 5G brings three new aspects to the table:
    • bigger channels to speed up data. 
    • lower latency to be more responsive.
    • the ability to connect a lot more devices at once for sensors and smart devices. 

5G is an enormous capital improvement project, replacing one wireless architecture created this century with another. Construction of 5G networks will require an estimated investment of over $2.7 trillion globally in 2020 alone

The single most important feature of 5G wireless technology for the telecommunications service providers, the transmission equipment makers, the antenna manufacturers, and even the server manufacturers is that once all of 5G's components are fully deployed and operational, you will not need any kind of wire or cable to deliver communications or even entertainment service to your mobile device, to any of your fixed devices (HDTV, security system, smart appliances), or to your automobile. 

If everything works, 5G would be the optimum solution to the classic "last mile" problem: Delivering complete digital connectivity from the tip of the carrier network to the customer, without drilling another hole through the wall. 

 The initial costs of these 5G infrastructure improvements may well be enormous ous and consumers have already demonstrated their intolerance for rate hikes. Trecover those costs, telecoms organisations will need to offer new classes of service to new customer segments, for which 5G has made provisions. Customers have to be persuaded that 5G wireless is capable of accomplishing feats not possible for 4G. 

Once complete, the 5G transition plan would constitute an overhaul of communications infrastructure unlike any other in history. Imagine if, at the close of the 19th century, the telegraph industry had come together in a joint decision to implement a staged transition to fax. That's essentially the scale of the shift from 4G to 5G. 

The 5G wireless standard aims to be global, which is the hard part, because each participating country (e.g., China, Russia, South Korea) or amalgamated body of countries (e.g., the EU, the UN) will maintain its own definition of 5G networks, its own concepts of 5G speed, and its own regulations for where 5G transmissions may take place.

Because of the much higher number of local transmitters required, 5G will primarily be an urban service for densely populated areas and the commercial reality of this means that for people in very remote areas, connectivity will only be patchy  without government subsidy making it worthwhile for network operators to go to more remote places.

ZDNet:        PCMag:       BBC:         Foreign Policy:

You Might Also Read:

Can A 5G Network Really Be Secure?:

Britain Allows Huawei 5G Network Access Against US Advice:

 

 

« Leaked Report: The United Nations Was Hacked
WEBINAR: How To Leverage Endpoint Detection & Response (EDR) In AWS Investigations »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

Mocana

Mocana

Mocana provides a software platform that allows you to develop, test and distribute more secure IoT devices and services.

KPN Security

KPN Security

KPN Security is the largest and most complete provider of IT security services in the Netherlands.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

BicDroid

BicDroid

BicDroid is a world leader in data and cyber security with innovative solutions that protect your data anywhere, anytime, against everything.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

CICRA Consultancies

CICRA Consultancies

Cicra Consultancies is a company that specializes in cyber security. Our major activities are guided by three main principles: Prevent, Investigate, Prosecute.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

SGTech

SGTech

SGTech is the leading trade association for Singapore's tech industry, offering focused support and development to both strategic and emerging sectors in the industry.

Blackwell Security

Blackwell Security

Blackwell is a driving force in healthcare cybersecurity, transforming how security operations are conducted within this critical sector.

The Aerospace Corporation

The Aerospace Corporation

The Aerospace Corporation is playing a key role in advancing space cybersecurity through innovative prototypes that can quickly detect and mitigate cyber threats.