scholarly journals 5G: ARCHITECTURE OVERVIEW AND DEPLOYMENTS SCENARIOS

Author(s):  
I. Zaame ◽  
T. Mazri ◽  
A. Elrhayour

Abstract. Due to the exclusory, growth in the number of connected devices- predicted 50 billion connected devices in 2020 (Gary Davis, 2020) that demand internet access, an upgraded network is required. The fifth generation is the newest mobile network replacing the 4G technology. Deployed from 2020 in many countries, 5G will provide revolutionary innovations in mobile technologies that will reach various high-level goals to the costumers as well as Companies .To benefit from 5G network services, the whole word is growing up rapidly towards the 5G by developing a clear perspective to include the main challenges, opportunities and key technology components. In this paper, an attempt has been made to provide an overview about the evolution of mobile generations from 1G to 5G by comparing the challenges and features that have evolved from each generation, describe the various scenario of 5G deployment, and discuss the best choice Implementation of 5G NR.

2018 ◽  
Vol 10 (10) ◽  
pp. 3626 ◽  
Author(s):  
Yousaf Zikria ◽  
Sung Kim ◽  
Muhammad Afzal ◽  
Haoxiang Wang ◽  
Mubashir Rehmani

The Fifth generation (5G) network is projected to support large amount of data traffic and massive number of wireless connections. Different data traffic has different Quality of Service (QoS) requirements. 5G mobile network aims to address the limitations of previous cellular standards (i.e., 2G/3G/4G) and be a prospective key enabler for future Internet of Things (IoT). 5G networks support a wide range of applications such as smart home, autonomous driving, drone operations, health and mission critical applications, Industrial IoT (IIoT), and entertainment and multimedia. Based on end users’ experience, several 5G services are categorized into immersive 5G services, intelligent 5G services, omnipresent 5G services, autonomous 5G services, and public 5G services. In this paper, we present a brief overview of 5G technical scenarios. We then provide a brief overview of accepted papers in our Special Issue on 5G mobile services and scenarios. Finally, we conclude this paper.


Electronics ◽  
2021 ◽  
Vol 10 (13) ◽  
pp. 1608
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Device-to-Device (D2D) communications will be used as an underlay technology in the Fifth Generation mobile network (5G), which will make network services of multiple Service Providers (SP) available anywhere. The end users will be allowed to access and share services using their User Equipments (UEs), and thus they will require seamless and secured connectivity. At the same time, Mobile Network Operators (MNOs) will use the UE to offload traffic and push contents closer to users relying on D2D communications network. This raises security concerns at different levels of the system architecture and highlights the need for robust authentication and authorization mechanisms to provide secure services access and sharing between D2D users. Therefore, this paper proposes a D2D level security solution that comprises two security protocols, namely, the D2D Service security (DDSec) and the D2D Attributes and Capability security (DDACap) protocols, to provide security for access, caching and sharing data in network-assisted and non-network-assisted D2D communications scenarios. The proposed solution applies Identity-based Encryption (IBE), Elliptic Curve Integrated Encryption Scheme (ECIES) and access control mechanisms for authentication and authorization procedures. We formally verified the proposed protocols using ProVerif and applied pi calculus. We also conducted a security analysis of the proposed protocols.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5202
Author(s):  
Wasan Kadhim Saad ◽  
Ibraheem Shayea ◽  
Bashar J. Hamza ◽  
Hafizal Mohamad ◽  
Yousef Ibrahim Daradkeh ◽  
...  

The massive growth of mobile users will spread to significant numbers of small cells for the Fifth Generation (5G) mobile network, which will overlap the fourth generation (4G) network. A tremendous increase in handover (HO) scenarios and HO rates will occur. Ensuring stable and reliable connection through the mobility of user equipment (UE) will become a major problem in future mobile networks. This problem will be magnified with the use of suboptimal handover control parameter (HCP) settings, which can be configured manually or automatically. Therefore, the aim of this study is to investigate the impact of different HCP settings on the performance of 5G network. Several system scenarios are proposed and investigated based on different HCP settings and mobile speed scenarios. The different mobile speeds are expected to demonstrate the influence of many proposed system scenarios on 5G network execution. We conducted simulations utilizing MATLAB software and its related tools. Evaluation comparisons were performed in terms of handover probability (HOP), ping-pong handover probability (PPHP) and outage probability (OP). The 5G network framework has been employed to evaluate the proposed system scenarios used. The simulation results reveal that there is a trade-off in the results obtained from various systems. The use of lower HCP settings provides noticeable enhancements compared to higher HCP settings in terms of OP. Simultaneously, the use of lower HCP settings provides noticeable drawbacks compared to higher HCP settings in terms of high PPHP for all scenarios of mobile speed. The simulation results show that medium HCP settings may be the acceptable solution if one of these systems is applied. This study emphasises the application of automatic self-optimisation (ASO) functions as the best solution that considers user experience.


Author(s):  
Ambika Samarthya-Howard ◽  
Debbie Rogers

This chapter explores three existing financial approaches to scaling mobile technologies in low- and middle-income countries: user-paid services, reverse billing, and zero-rated platforms. As affordability is an impediment to internet access, key strategies focusing around the involvement of mobile network operators and governments are investigated in relation to sustainability, scale, reach, and impact for mobile technology projects in the world. Various examples under each type are explored as a starting point for understanding the risks and benefits of each approach. The chapter also discusses the importance of mobile initiatives in tackling social issues today.


Author(s):  
Musa H. Wali ◽  
Ali Khalid Jassim ◽  
Hasan Ma Almgotir

To obtain a high data rate that is commensurate with the growing demand for internet services, the fifth generation (5G) cellular networks will use the bandwidth beyond 6 GHz, called millimeters waves (mm-waves), to obtain a higher. The first phase (phase I) of the 5G network design for high user density, where the optimized microcells are deployed at carrier frequency 700 MHz with 20 MHz bandwidth. The second phase (phase II) of the design consists of the deployment of microcells which are operating at 3.6 GHz with 100 MHz bandwidth; this phase is planned to cover 200000 users within the province. The third phase (phase III) of the design is represented by the deployment of picocells, which are planned to operate at 26 GHz frequency and bandwidth 500 MHz; this phase is planned to cover 3,500,000 users within the province. Two types of modulation are adopted for the network (orthogonal frequency division multiplexing (OFDM) and 256 quadrature amplitude modulation (QAM)); the overall performance of the network is studied with regards to the percentage of coverage, power overlapping ratio, frequency interference, and quality of service (QoS).


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 434
Author(s):  
Qingqi Hong ◽  
Yiwei Ding ◽  
Jinpeng Lin ◽  
Meihong Wang ◽  
Qingyang Wei ◽  
...  

With the rapid development of artificial intelligence and fifth-generation mobile network technologies, automatic instrument reading has become an increasingly important topic for intelligent sensors in smart cities. We propose a full pipeline to automatically read watermeters based on a single image, using deep learning methods to provide new technical support for an intelligent water meter reading. To handle the various challenging environments where watermeters reside, our pipeline disentangled the task into individual subtasks based on the structures of typical watermeters. These subtasks include component localization, orientation alignment, spatial layout guidance reading, and regression-based pointer reading. The devised algorithms for orientation alignment and spatial layout guidance are tailored to improve the robustness of our neural network. We also collect images of watermeters in real scenes and build a dataset for training and evaluation. Experimental results demonstrate the effectiveness of the proposed method even under challenging environments with varying lighting, occlusions, and different orientations. Thanks to the lightweight algorithms adopted in our pipeline, the system can be easily deployed and fully automated.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ramaraj Palanisamy ◽  
Yang Wu

Purpose This study/ paper aims to empirically examine the user attitude on perceived security of enterprise systems (ES) mobility. Organizations are adopting mobile technologies for various business applications including ES to increase the flexibility and to gain sustainable competitive advantage. At the same time, end-users are exposed to security issues when using mobile technologies. The ES have seen breaches and malicious intrusions thereby more sophisticated recreational and commercial cybercrimes have been witnessed. ES have seen data breaches and malicious intrusions leading to more sophisticated cybercrimes. Considering the significance of security in ES mobility, the research questions in this study are: What are the security issues of ES mobility? What are the influences of users’ attitude towards those security issues? What is the impact of users’ attitude towards security issues on perceived security of ES mobility? Design/methodology/approach These questions are addressed by empirically testing a security model of mobile ES by collecting data from users of ES mobile systems. Hypotheses were evolved and tested by data collected through a survey questionnaire. The questionnaire survey was administered to 331 users from Chinese small and medium-sized enterprises (SME). The data was statistically analysed by tools such as correlation, factor analysis, regression and the study built a structural equation model (SEM) to examine the interactions between the variables. Findings The study results have identified the following security issues: users’ attitude towards mobile device security issues; users’ attitude towards wireless network security issues; users’ attitude towards cloud computing security issues; users’ attitude towards application-level security issues; users’ attitude towards data (access) level security issues; and users’ attitude towards enterprise-level security issues. Research limitations/implications The study results are based on a sample of users from Chinese SMEs. The findings may lack generalizability. Therefore, researchers are encouraged to examine the model in a different context. The issues requiring further investigation are the role of gender and type of device on perceived security of ES mobile systems. Practical implications The results show that the key security issues are related to a mobile device, wireless network, cloud computing, applications, data and enterprise. By understanding these issues and the best practices, organizations can maintain a high level of security of their mobile ES. Social implications Apart from understanding the best practices and the key issues, the authors suggest management and end-users to work collaboratively to achieve a high level of security of the mobile ES. Originality/value This is an empirical study conducted from the users’ perspective for validating the set of research hypotheses related to key security issues on the perceived security of mobile ES.


IEEE Network ◽  
2021 ◽  
pp. 1-8
Author(s):  
Oussama Bekkouche ◽  
Faqir Zarrar Yousaf ◽  
Xi Li ◽  
Tarik Taleb

LastMile ◽  
2021 ◽  
Vol 98 (6) ◽  
Author(s):  
A. Ivashkin

Today, many countries around the world are actively building fifth generation mobile networks (5G/IMT-2020). The magazine Last Mile asked the director of the Republican unitary enterprise for supervision on telecommunications "BelGIE" of the Republic of Belarus (hereinafter: State Enterprise "BelGIE") A.A. Ivashkin about the situation with the implementation of the 5G network in the Republic of Belarus.


Sign in / Sign up

Export Citation Format

Share Document