UNIT 2 Mobile Communication Notes
UNIT 2 Mobile Communication Notes
The HLR (home location register) and VLR (visitor location register) are two
sets of pointers that support mobility and enable the use of the same
telephone numbers worldwide.
The HLR is located at the MSC where MS is initially registered and is the
initial home location for billing and access information.
In simple words, any incoming call, based on the calling number, is directed
to the HLR of the home MS where the MS is registered. The HLR then points
to the VLR of the MSC where the MS is currently located.
Bidirectional HLR-VLR pointers help in carrying out various functionalities, as
illustrated in the figure:
ADVERTISEMENT
The VLR contains information about all MS visiting that particular MSC and
hence points to the HLR of the visiting MSs for exchanging related
information about the MS.
GSM architecture
A GSM network comprises of many functional units. These functions and interfaces are
explained in this chapter. The GSM network can be broadly divided into −
The MS consists of the physical equipment, such as the radio transceiver, display and digital
signal processors, and the SIM card. It provides the air interface to the user in GSM networks. As
such, other services are also provided, which include −
Voice teleservices
Data bearer services
The features' supplementary services
The MS also provides the receptor for SMS messages, enabling the user to toggle between the
voice and data use. Moreover, the mobile facilitates access to voice messaging systems. The MS
also provides access to the various data services available in a GSM network. These data services
include −
What is SIM?
The SIM provides personal mobility so that the user can have access to all subscribed services
irrespective of both the location of the terminal and the use of a specific terminal. You need to
insert the SIM card into another GSM cellular phone to receive calls at that phone, make calls
from that phone, or receive other subscribed services.
The BTS and the BSC communicate across the specified Abis interface, enabling operations
between components that are made by different suppliers. The radio components of a BSS may
consist of four to seven or nine cells. A BSS may have one or more base stations. The BSS uses
the Abis interface between the BTS and the BSC. A separate high-speed line (T1 or E1) is then
connected from the BSS to the Mobile MSC.
The BTS houses the radio transceivers that define a cell and handles the radio link protocols with
the MS. In a large urban area, a large number of BTSs may be deployed.
The BTS corresponds to the transceivers and antennas used in each cell of the network. A BTS is
usually placed in the center of a cell. Its transmitting power defines the size of a cell. Each BTS
has between 1 and 16 transceivers, depending on the density of users in the cell. Each BTS
serves as a single cell. It also includes the following functions −
The BSC manages the radio resources for one or more BTSs. It handles radio channel setup,
frequency hopping, and handovers. The BSC is the connection between the mobile and the MSC.
The BSC also translates the 13 Kbps voice channel used over the radio link to the standard 64
Kbps channel used by the Public Switched Telephone Network (PSDN) or ISDN.
It assigns and releases frequencies and time slots for the MS. The BSC also handles intercell
handover. It controls the power transmission of the BSS and MS in its area. The function of the
BSC is to allocate the necessary time slots between the BTS and the MSC. It is a switching
device that handles the radio resources.
The Network switching system (NSS), the main part of which is the Mobile Switching Center
(MSC), performs the switching of calls between the mobile and other fixed or mobile network
users, as well as the management of mobile services such as authentication.
The HLR is a database used for storage and management of subscriptions. The HLR is
considered the most important database, as it stores permanent data about subscribers, including
a subscriber's service profile, location information, and activity status. When an individual buys a
subscription in the form of SIM, then all the information about this subscription is registered in
the HLR of that operator.
The central component of the Network Subsystem is the MSC. The MSC performs the switching
of calls between the mobile and other fixed or mobile network users, as well as the management
of mobile services such as registration, authentication, location updating, handovers, and call
routing to a roaming subscriber. It also performs such functions as toll ticketing, network
interfacing, common channel signaling, and others. Every MSC is identified by a unique ID.
The VLR is a database that contains temporary information about subscribers that is needed by
the MSC in order to service visiting subscribers. The VLR is always integrated with the MSC.
When a mobile station roams into a new MSC area, the VLR connected to that MSC will request
data about the mobile station from the HLR. Later, if the mobile station makes a call, the VLR
will have the information needed for call setup without having to interrogate the HLR each time.
The Authentication Center is a protected database that stores a copy of the secret key stored in
each subscriber's SIM card, which is used for authentication and ciphering of the radio channel.
The AUC protects network operators from different types of fraud found in today's cellular
world.
The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile
equipment on the network, where its International Mobile Equipment Identity (IMEI) identifies
each MS. An IMEI is marked as invalid if it has been reported stolen or is not type approved.
The operations and maintenance center (OMC) is connected to all equipment in the switching
system and to the BSC. The implementation of OMC is called the operation and support system
(OSS).
The operation and Maintenance functions are based on the concepts of the Telecommunication
Management Network (TMN), which is standardized in the ITU-T series M.30.
Following is the figure, which shows how OMC system covers all the GSM elements.
The OSS is the functional entity from which the network operator monitors and controls the
system. The purpose of OSS is to offer the customer cost-effective support for centralized,
regional, and local operational and maintenance activities that are required for a GSM network.
An important function of OSS is to provide a network overview and support the maintenance
activities of different operation and maintenance organizations.
The additional components of the GSM architecture comprise of databases and messaging
systems functions −
The following diagram shows the GSM network along with the added elements −
The MS and the BSS communicate across the Um interface. It is also known as the air
interface or the radio link. The BSS communicates with the Network Service Switching (NSS)
center across the A interface.
GSM network areas
Cell − Cell is the basic service area; one BTS covers one cell. Each cell is given a Cell
Global Identity (CGI), a number that uniquely identifies the cell.
Location Area − A group of cells form a Location Area (LA). This is the area that is
paged when a subscriber gets an incoming call. Each LA is assigned a Location Area
Identity (LAI). Each LA is served by one or more BSCs.
MSC/VLR Service Area − The area covered by one MSC is called the MSC/VLR
service area.
PLMN − The area covered by one network operator is called the Public Land Mobile
Network (PLMN). A PLMN can contain one or more MSCs.
GSM architecture is a layered model that is designed to allow communications between two
different systems. The lower layers assure the services of the upper-layer protocols. Each layer
passes suitable notifications to ensure the transmitted data has been formatted, transmitted, and
received accurately.
Based on the interface, the GSM signaling protocol is assembled into three general layers −
Layer 1 − The physical layer. It uses the channel structures over the air interface.
Layer 2 − The data-link layer. Across the Um interface, the data-link layer is a modified
version of the Link access protocol for the D channel (LAP-D) protocol used in ISDN,
called Link access protocol on the Dm channel (LAP-Dm). Across the A interface, the
Message Transfer Part (MTP), Layer 2 of SS7 is used.
Layer 3 − GSM signalling protocol’s third layer is divided into three sublayers −
o Radio Resource Management (RR),
o Mobility Management (MM), and
o Connection Management (CM).
MS to BTS Protocols
The RR layer is the lower layer that manages a link, both radio and fixed, between the MS and
the MSC. For this formation, the main components involved are the MS, BSS, and MSC. The
responsibility of the RR layer is to manage the RR-session, the time when a mobile is in a
dedicated mode, and the radio channels including the allocation of dedicated channels.
The MM layer is stacked above the RR layer. It handles the functions that arise from the mobility
of the subscriber, as well as the authentication and security aspects. Location management is
concerned with the procedures that enable the system to know the current location of a powered-
on MS so that incoming call routing can be completed.
The CM layer is the topmost layer of the GSM protocol stack. This layer is responsible for Call
Control, Supplementary Service Management, and Short Message Service Management. Each of
these services are treated as individual layer within the CM layer. Other functions of the CC
sublayer include call establishment, selection of the type of service (including alternating
between services during a call), and call release.
BSC Protocols
The BSC uses a different set of protocols after receiving the data from the BTS. The Abis
interface is used between the BTS and BSC. At this level, the radio resources at the lower
portion of Layer 3 are changed from the RR to the Base Transceiver Station Management
(BTSM). The BTS management layer is a relay function at the BTS to the BSC.
The RR protocols are responsible for the allocation and reallocation of traffic channels between
the MS and the BTS. These services include controlling the initial access to the system, paging
for MT calls, the handover of calls between cell sites, power control, and call termination. The
BSC still has some radio resource management in place for the frequency coordination,
frequency allocation, and the management of the overall network layer for the Layer 2 interfaces.
To transit from the BSC to the MSC, the BSS mobile application part or the direct application
part is used, and SS7 protocols is applied by the relay, so that the MTP 1-3 can be used as the
prime architecture.
MSC Protocols
At the MSC, starting from the BSC, the information is mapped across the A interface to the MTP
Layers 1 through 3. Here, Base Station System Management Application Part (BSS MAP) is said
to be the equivalent set of radio resources. The relay process is finished by the layers that are
stacked on top of Layer 3 protocols, they are BSS MAP/DTAP, MM, and CM. This completes
the relay process. To find and connect to the users across the network, MSCs interact using the
control-signaling network. Location registers are included in the MSC databases to assist in the
role of determining how and whether connections are to be made to roaming users.
Each GSM MS user is given a HLR that in turn comprises of the user’s location and subscribed
services. VLR is a separate register that is used to track the location of a user. When the users
move out of the HLR covered area, the VLR is notified by the MS to find the location of the
user. The VLR in turn, with the help of the control network, signals the HLR of the MS’s new
location. With the help of location information contained in the user’s HLR, the MT calls can be
routed to the user.
#Connection establishment
Step 1: A user dials the phone number of GSM subscriber. The fixed network
PSTN notices that the number belongs to the user in the GSM network and
forwards the call setup to the Gateway MSC .
Step 2: The GMSC identifies the HLR for the subscriber and signals the call setup
to the HLR.
Step 3: The HLR now checks whether the number exists and whether the user has
subscribed to the requested services, and the requests an MSRN from the current
VLR.
Step 5 : HLR can determine the MSC responsible for the MS and forwards this
information to GMSC
Step 6 : GMSC can now forward the call setup request to MSC indicated.
Step 7: From this, MSC is responsible for all further steps. First it requests the
current status of MS from VLR.
Step 11: The BTSs of all BSSs transmit this paging signal to MS.
Step 12 & 13: If MS answers ( 12 and 13) the VLR has to perform security checks
set up be encryption techniques.
Radio transmission can take place using many different frequency bands. Each
frequency band exhibits certain advantages and disadvantages. Figure gives a
rough overview of the frequency spectrum that can be used for data transmission.
The figure shows frequencies starting at 300 Hz and going up to over 300 THz.
where c ≅ 3·108 m/s (the speed of light in vacuum) and f the frequency. For
Directly coupled to the frequency is the wavelength λ via the equation: λ = c/f,
traditional wired networks, frequencies of up to several hundred kHz are used for
distances up to some km with twisted pair copper wires, while frequencies of
several hundred MHz are used with coaxial cable (new coding schemes work with
several hundred MHz even with twisted pair copper wires over distances of some
100 m).
Fiber optics are used for frequency ranges of several hundred THz, but
here one typically refers to the wavelength which is, e.g., 1500 nm, 1350 nm etc.
(infra red). Radio transmission starts at several kHz, the very low
frequency (VLF) range. These are very long waves. Waves in the low frequency
(LF) range are used by submarines, because they can penetrate water and can
follow the earth‟s surface. Some radio stations still use these frequencies, e.g.,
between
UHF allow for small antennas and relatively reliable connections for mobile
telephony. Super high frequencies (SHF) are typically used for directed
microwave links (approx. 2–40 GHz) and fixed satellite services in the C-band (4
and 6 GHz), Ku-band (11 and 14 GHz), or Ka-band (19 and 29 GHz). Some
systems are planned in the extremely high frequency (EHF) range which comes
close to infra-red. All radio frequencies are regulated to avoid interference, e.g., the
German regulation covers 9 kHz–275 GHz.
Routing
Routing is the process of finding the best path for traffic in a network, or
across multiple networks. The role of routing is similar to the road map for a
hotel. In both cases, we need to deliver messages at proper location and in
an appropriate way.
ADVERTISEMENT
Routing Classification
Routing protocol can be classified as:
1. Proactive Protocol
2. Reactive Protocol
3. Hybrid Protocol
1. Proactive Protocol
Proactive protocols attempt to evaluate continuously the routes within the
network. It means proactive protocol continuously maintain the routing
information, so that when a packet needs to be forwarded, the path is known
already and can be immediately used. The family of distance vector
protocols is an example of proactive scheme.
2. Reactive Protocols
Reactive protocols do not maintain routes but invoke a route determination
procedure only on demand or we can say reactive protocols build the routes
only on demand. Thus, when a route is required, some sort of global search
procedure is initiated. The family of classical flooding algorithms belongs to
the reactive protocol group. Examples of reactive ad-hoc network routing
protocols include ad hoc on demand distance vector (AODV) and temporally
ordered routing algorithm (TORA).
3. Hybrid Protocols
Hybrid protocols attempt to take advantage of best of reactive and proactive
schemes. The basic idea behind such protocols is to initiate route discovery
on demand but at a limited search cost. One of the popular hybrid protocols
is zone routing protocol (ZRP).
1. Table-driven protocols
2. Source initiated on -demand protocols
For example the routing table of Node A from the above network is:
A A 0 A46 001000
B B 1 B36 001200
C B 2 C28 001500
Basically the table stores description of all possible paths reachable by node
A, along with the hop, number of hops, sequence number and install time.
Advantages
ADVERTISEMENT
ADVERTISEMENT
o The cluster head (CH) gateway switch routing (CGSR) protocol is different
from the destination sequenced distance vector routing in the type of
addressing and the network organization scheme employed.
o Instead of a flat network, CGSR uses cluster heads, which control a group of
ad hoc nodes and hence achieve a hierarchical framework for code
separation among clusters, routing, channel access, and bandwidth
allocation.
o Identification of appropriate clusters and selection of cluster heads is quite
complex. Once clusters have been defined, it is desirable to use a distributed
algorithm within the cluster to elect a node as the cluster head.
o The disadvantage of using a cluster head scheme is that frequent changes
adversely affect performance as nodes spend more time selecting a cluster
head rather than relaying packets. Hence, the least cluster change (LCC)
clustering algorithm is used rather than CH selection every time the cluster
membership changes. Using LCC, CHs change only when two CHs come into
contact, or when a node moves out of contact with all other CHs.
o In this scheme, each node must maintain a cluster member table (CMT),
which stores the destination CH for each node in the network. The cluster
member tables are broadcast periodically by the nodes using the DSDV
algorithm.
o When a node receives such a table from a neighbor, it can update its own
information. As expected, each node also maintains a routing table to
determine the next hop required to reach any destination.
For the wireless routing protocol (WRP) each node maintains 4 tables:
o Distance table
o Routing table
o Link cost table
o Message retransmission list (MRL) table
Each entry in the message retransmission list has a sequence number of the
update message, a retransmission counter, an acknowledgment required
flag vector with one entry per neighbor, and a list of updates sent in the
update message. When any node receives a hello message from a new node,
it adds the new node to its routing table and sends the new node a copy of
its routing table. A node must send a message to its neighbors within a
certain time to ensure connectivity.
Advantages
o The advantage of WRP is similar to DSDV. In addition, it has faster
convergence and adds fewer table updates.
Disadvantage
o AODV is a routing protocol for MANETs (mobile ad hoc networks) and other
wireless ad hoc networks.
o It is a reactive routing protocol; it means it establishes a route to a
destination only on demand.
o AODV routing is built over the DSDV algorithm. It is a significant improvement
over DSDV.
o The devices that are not on a particular path do not maintain routing
information, nor do they participate in the routing table exchanges.
o When a source requires sending a message to a destination and does not
have a valid route to the latter, the source initiates a route discovery process.
o Source sends a route request (RREQ) packet to all its neighbors, the latter
forward the request to all their neighbors, and so on, until either the
destination or an intermediate mobile (node) with a "fresh enough" route to
the destination is reached.
The broadcast ID, together with the IP address of node, uniquely identifies
every RREQ.
Intermediate mobile reply only if they have a route to the destination with a
sequence number greater than or at least equal to that contained in the
RREQ. To optimize the route performance, intermediate nodes record the
address.
From the above figure, since RREP (route reply packet) travels back on the
reverse path, the nodes on this path set up their forward route entries to
point to the node from which RREP had just been received. These forward
route records indicate the active forward route. The RREP continues traveling
back along the reverse path till it reaches the initiator of the route discovery.
Thus, AODV can support only the use of symmetric links.
Mobility management
The mobile station attempts to find a suitable cell by passing
through the list in descending order of received signal strength, the
first BCCH channel, which satisfies a set of requirements it has
selected.
Location Area
As the MS moves through the network area, the signal received from
the selected control channel gradually diminishes in strength until it
is no longer the strongest. At this point the MS re-tunes to the
channel that has become dominant and examines the LAI code that
it is broadcasting. If the received LAI code differs from that stored on
the SIM, then the MS has entered another location area and initiates
a location update procedure to report the change to the MSC. At the
end of the procedure, the LAI code in the SIM is also updated.
The MNC is a 2-digit code (3-digit code for GSM-1900) that identifies
the home GSM PLMN of the mobile subscriber. If more than one GSM
PLMN exists in a country, a unique MNC is assigned to each of them.
It is assigned by the government of each country. (For example Cell
one, Chennai 64).
MSC areas
An MSC area is a region of the network in which GSM operations are
controlled by a single MSC. An MSC area consists of one more
location areas. The boundary of an MSC area follows the external
boundaries of the location areas on its periphery. Consequently, a
location area never spans beyond the boundary of an MSC area.
VLR area
A VLR contains a data record for each of the MS that are currently
operating in its area. Each record contains a set of subscriber
identity codes, related subscription information, and a Location Area
Identity (LAI) code. This information is used by the MSC when
handling calls to or from an MS in the area. When an MS moves from
one area to another, the responsibility for its supervision passes
from one VLR to another. A new data record is created by the VLR
that has adopted the MS, and the old record is deleted. Provided
that aninter-working agreement exists between the network
operators concerned, data transaction can cross both network and
national boundaries.
Subscription Information
Location Information
The location information includes the address of the VLR in the area
where the subscribers MS is currently located and the address of the
associated MSC.
The MNC component is a 2-digit code that identifies the home GSM
PLMN of the mobile subscriber. It is assigned by the government of
each country. For GSM-1900 a 3-digit MNC is used.
The MSIN is a code that identifies the subscriber within a GSM PLMN.
It is assigned by the operator.
Temporary Mobile Subscriber Identity (TMSI)
The TMSI is an identity alias which is used instead of the IMSI when
possible. The use of a TMSI ensures that the true identity of the
mobile subscriber remains confidential by eliminating the need to
transfer a non ciphered IMSI code over a radio link.
Hand Over
Figure 1-1
GPRS/UMTS Network Components with GGSNs Implemented on Cisco 7200 Routers
Figure 1-2 shows the network components with the GGSNs implemented on the Cisco MWAM
in the Catalyst 6500 / Cisco 7600 platform.
Figure 1-2 GPRS/UMTS Network Components with GGSNs Implemented on the Cisco
MWAM in the Catalyst 6500 / Cisco 7600 Platform
Note that, as Figure 1-1 and Figure 1-2 show, the RAN is made up of different components for
2.5G and 3G.
In a 2.5G environment, the RAN is composed of mobile stations that connect to a base
transceiver station (BTS) that connects to a base station controller (BSC). In a 3G environment,
the RAN is made up of mobile stations that connect to NodeB, which connects to a radio
network controller (RNC).
The RAN connects to the GPRS/UMTS core through an SGSN, which tunnels user sessions to a
GGSN that acts as a gateway to the services networks (for example, the Internet and intranet).
The connection between the SGSN and the GGSN is enabled through a tunneling protocol called
the GPRS tunneling protocol (GTP): GTP Version 0 (GTP V0) for 2.5G applications, and GTP
Version 1 (GTP V1) for 3G applications. GTP is carried over IP. Multiple SGSNs and GGSNs
within a network are referred to collectively as GPRS support nodes (GSNs).
Note Depending on the specific operator configuration, the RAN, the GPRS/UMTS core, and the
services networks can be made up of IP or Multiprotocol Label Switching (MPLS) networks.
To assign mobile sessions an IP address, the GGSN uses the Dynamic Host Configuration
Protocol (DHCP), Remote Authentication Dial-In User Service (RADIUS) server, or a local
address pool defined specified for an access point configured on the GGSN. The GGSN can use
a RADIUS server to authorize and authenticate remote users. DHCP and RADIUS services can
be specified either at the global configuration level or for each access point configured on the
GGSN.
In Cisco IOS Release 12.1(5)T and later, the GGSN on the Cisco 7200 series router (with an
Integrated Services Adapter [ISA] card) supports IP Security (IPSec) protocol to provide data
confidentiality, data integrity, and data authentication between participating peers.
On the Cisco MWAM installed in a Catalyst 6500 series switch / Cisco 7600 series Internet
router platform, IPSec encryption is performed on the IPSec Virtual Private Network (VPN)
Acceleration Services Module.
GPRS Interface Reference Model
The 2.5G GPRS and 3G UMTS standards use the term interface to label (or identify) the
communication path between different network elements. The GPRS/UMTS standards define the
requirements and characteristics of communication between different GPRS/UMTS network
elements over these interfaces. These interfaces are commonly referred to in descriptions of
GPRS/UMTS networks.
Figure 1-3 shows the interfaces that are implemented in the Cisco IOS GGSN feature:
• Gn interface—Interface between GSNs within the same public land mobile network (PLMN)
in a GPRS/UMTS network. GTP is a protocol defined on the Gn interface between GSNs in
a GPRS/UMTS network.
• Gi interface—Reference point between a GPRS/UMTS network and an external packet data
network.
• Ga interface—Interface between a GGSN and charging gateway (CG) in a GPRS/UMTS
network.
Figure 1-3 GPRS Interfaces Configured in the Cisco IOS GGSN Feature Implemented on
the Cisco 7200 Series Router
Benefits
The 2.5G GPRS technology provides the following benefits:
• Enables the use of a packet-based air interface over the existing circuit-switched GSM
network, which allows greater efficiency in the radio spectrum because the radio bandwidth
is used only when packets are sent or received
• Supports minimal upgrades to the existing GSM network infrastructure for network service
providers who want to add GPRS services on top of GSM, which is currently widely
deployed
• Supports enhanced data rates in comparison to the traditional circuit-switched GSM data
service
• Supports larger message lengths than Short Message Service (SMS)
• Supports a wide range of access to data networks and services, including VPN/Internet
service provider (ISP) corporate site access and Wireless Application Protocol (WAP).
In addition to the above, the 3G UMTS technology includes the following:
• Enhanced data rates of approximately
– 144 kbps—Satellite and rural outdoor
– 384 kbps—Urban outdoor
– 2048 kbps—Indoor and low-range outdoor
Handover mechanism
When a mobile user A moves from one cell to another cell then BSC 1 signal
strength loses for the mobile User A and the signal strength of BSC 2 increases
and thus ongoing calls or data connectivity for mobile users goes on without
interrupting.
Types of Handoff
Hard Handoff
Soft Handoff
Delayed Handoff
Mobile-Assisted Handoff
Hard Handoff
When there is an actual break in the connectivity while switching from one Base
Station to another Base Station. There is no burden on the Base Station and
MSC because the switching takes place so quickly that it can hardly be noticed
by the users. The connection quality is not that good. Hard Handoff adopted the
‘break before make’ policy.
It is generally implemented in Time Division Multiplexing and Frequency
Division Multiplexing when a user connects to the base station with a fluctuating
radio frequency.
Hard Handoff is cheaper in cost as compared to soft Handoff because only
one channel needs to be active at a time.
It is more efficient than soft handoff, that’s why hard handoffs are widely
implemented.
Sometimes, a delay can be experienced while switching base stations.
Soft Handoff
Soft Handoff is a mechanism in which the device gets connected with two or
more base stations at the same time. At least one of the links is kept when
radio signals are added or removed to the Base Station. Soft Handoff adopted
the ‘make before break’ policy. If a channel is in power loss then another
channel will always be on standby mode so this makes it best in terms of quality
as compared to Hard handoff. Soft handoffs are used in devices
supporting CDMA/WDMA networks
High Transmission speed as more than one repeater can transmit signals.
It has a very low delay in signals.
It can’t be implemented on devices supporting GSM or LTE networks.
Delayed Handoff
Delayed handoff occurs when no base station is available for accepting the
transfer. The call continues until the signal strength reaches a threshold, and
after that, the call is dropped. Generally, it happens when the user is out of the
network coverage area, or at some dead spots where network reach is very low.
Mobile-Assisted Handoff
Mobile-Assisted handoff is generally used when a mobile phone helps a base
station to transfer the call to another base station with better-improvised
connectivity and more signal strength. This handoff is used in TDMA technique-
based GSM devices.
INTRODUCTION
5G Technology stands for 5th generation mobile technology. 5G denote the next major phase of
mobile telecommunication standards beyond the upcoming 4G standards. 5G technology is
offering the service in Product Engineering, Documentation, supporting electronic transactions,
etc. As the customer become more and more aware of the mobile phone technology, he or she
will look for a decent package all together including all the advanced features a cellular phone
can have. Hence the search for new technology always the main motive of the leading cell phone
giants to out innovate their competitors. The goal of a 5G based telecommunication network
would ideally answer the challenges that a 4G model would present once it has entered
widespread use.
Wireless systems using orthogonal frequency division multiplexing (OFDM) with wide area
coverage, high throughput at millimeter waves (10 mm to 1 mm) covering a frequency range of
30 GHz to 300 GHz, and enabling a 20 Mbps data rate to distances up to 2 km. The millimeter-
wave band is the most effective solution to the recent surge in wireless Internet usage. These
specifications are capable of providing wireless world wide web (WWWW) applications.
The WWWW allows a highly flexible network (flexible channel bandwidth between 5 and 20
MHz, optimally up to 40 MHz), and dynamic ad-hoc wireless network (DAWN). This technique
employs intelligent antennae (e.g., switched beam antennae and adaptive array antennae) and the
flexible modulation method, which helps in obtaining bidirectional high bandwidth, i.e., transfer
of a large volume of broadcasting data in giga bytes, sustaining more than 60,000 connections
and providing 25 Mbps connectivity. Users of 5G technology can download an entire film to
their tablets or laptops, including 3D movies; they can download games and avail of remote
medical services. With the advent of 5G, Piconet and Bluetooth technologies will become
outdated. The 5G mobile phones would be akin to tablet PCs, where you
FEATURES
Features of 5G Technology:
5G technology offer high resolution for crazy cell phone user and bi-directional large
bandwidth
Shaping
The advanced billing interfaces of 5G technology makes it more attractive and
effective.
5G technology also providing subscriber supervision tools for fast action.
The high quality services of 5G technology based on Policy to avoid error.
5G technology is providing large broadcasting of data in Gigabit which supporting
almost 65,000
Connections.
5G technology offer transporter class gateway with unparalleled consistency.
The traffic statistics by 5G technology makes it more accurate.
Through remote management offered by 5G technology a user can get better and fast
solution.
The remote diagnostics also a great feature of 5G technology.
The 5G technology is providing up to 25 Mbps connectivity speed.
The 5G technology also support virtual private network.
The new 5G technology will take all delivery service out of business prospect
The uploading and downloading speed of 5G technology touching the peak.
5th generation technology offers a wide range of features, which are beneficial for all
group of people including, students, professionals (doctors, engineers, teachers,
governing bodies, administrative bodies, etc.) and even for a common man.
IMPORTANT ADVANTAGES
DISADVANTAGES OF 5G TECHNOLOGY
Technology is still under process and research on its viability is going on.
The speed, this technology is claiming seems difficult to achieve (in future, it might
be) because of the incompetent technological support in most parts of the world.
Many of the old devices would not be competent to 5G, hence, all of them need to be
replaced with new one expensive deal.
Developing infrastructure needs high cost.
Security and privacy issue yet to be solved.
CONCLUSION
5G Technology stands for 5th Generation Mobile technology. 5G mobile technology has
changed the means to use cell phones within very high bandwidth. User never experienced ever
before such a high value technology.
Nowadays mobile users have much awareness of the cell phone (mobile) technology. The 5G
technologies include all type of advanced features which makes 5G mobile technology most
powerful and in huge demand in near future.
A user can also hook their 5G technology cell phone with their Laptop to get broadband internet
access. 5G technology including camera, MP3 recording, video player, large phone memory,
dialing speed, audio player and much more you never imagine. For children rocking fun
Bluetooth technology and Piconets has become in market.
REFERENCES
1. http://www.slideshare.net/upadhyayniki/5g-wireless- technology-14669479
2. 5G – https://en.wikipedia.org/wiki/5G
3. http://recode.net/2015/03/13/what-is-5g-and-what-does-it- mean-for-consumers/