Networking 1 Contents Introduction................................................................................................................................2 Motivation..................................................................................................................................2 A Detailed Comparison of wireless mobile networks................................................................3 2G Mobile Network...............................................................................................................4 3G Mobile Network...............................................................................................................4 4G Mobile Network...............................................................................................................5 5G Mobile Network...............................................................................................................5 5G Architecture..........................................................................................................................6 Identification and Analysis of 5G Attacks.................................................................................7 Identification and Analysis of 5G limitation in-network coverage............................................9 Conclusion................................................................................................................................10 References................................................................................................................................11
Networking 2 Evaluation of 5G Network and the Security Introduction This research paper is focused on wireless networks and security as well as risk associated with them. The purpose of conducting research on various wireless networks is to compare the 5G cellular network technology with the already existing mobile network technologies in the literature. Besides, the report is going to evaluate the 5G wireless network security with the help of testing many types of wireless networks’ performance as compared to each other. In addition to that, the comparison of the standard-based technologies used by the various networks will be done on the basis of some pre-defined factors such as communication spectrum. In this context, this study will explore the 5G network architecture for further researching more about 5G wireless networks1. Apart fromthis, with the help of this study, identification and analysis of the 5G attacks over the access as well as core networks will be done. In addition to that, this report will also identify and analyze the issues in relation to 5G network coverage. Furthermore, a solution to address this limitation will also be discussed in detail. In this way, a summary will be provided at the end of this report. Motivation This is necessary to know the reason why using 5G network is necessary. Therefore, this section will include a discussion on why utilizing the 5G network is suggested for data services and other mobile services. In this context, the features of 5G wireless network are helpful, as follows: It has been found that 5G owns huge data capacity, which is the first key reason to use it over 4G. As the 4G network is having less speed hence 5G should be used over 4G From the perspective of latency, it has been found that 5G offers really low latency Lastly, a 5G cellular network marks a big step by the predecessor2. Moreover, 5G mobile networks are significantly capable to optimize efficiency through revealing the opportunities like new technologies and automation. Recent surveys show that 5G will allow the world to use advanced technologies such as augmented reality (AR) and virtual reality (VR). Therefore, the target audience and readers should note that using 5G
Networking 3 networks will offer next-generation network connectivity to all of them. In this way, 5G must be used for reinventing the world in the following mentioned ways: ï‚·Autonomous vehicles in the future ï‚·Immersive amusement ï‚·IoT technologies3. ï‚·Smart cities4. ï‚·Better communication ï‚·Better collaboration among global people From this above discussion, it can be said that the 5G network can definitely help us in future through supporting remote-place working. Thus, 5G will be helpful for the public for working effectively and efficiently on cloud-based platforms in real3. A Detailed Comparison of wireless mobile networks In order to demonstrate an illustrative comparison of the current wireless cellular network generations several factors have been chosen. For instance, medium access control (MAC) mechanism,securitytechniques,networkspeed,communicationspectrum,network bandwidth, and modulation techniques have been used for illustrative comparison. Source:1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Networking 4 The above-mentioned figure is motivating the readers to perceive an overview of all 5 wireless networks so that implementation of 5G can be successful in the near future. Here, ‘G’ in the name of 2G, 3G, and 4G stands for ‘generation’. In this context, the purpose of wireless communication is to offer reliable, high-quality communication similar to wired communication. Besides, every new wireless network generation denotes a huge step in the relevant direction. In this way, for comparing mobile communication technologies first we need to know the key attributes of all of these cellular technologies. 2G Mobile Network Here, 2G refers to second generation of cellular networks on the basis of GSM. In this context, the radio signals or modulation techniques used in 1G network were analog in nature, on the other hand 2G networks were digital in nature. Additionally, 2G cellular network qualities were attained while allowing multiple users over a sole channel through multiplexing. The key features of 2G are as follows: 2G uses digital signals in place of analog signals 2G has a data speed of up to 64 Kbps 2G brought a revolution for its users with SMS and MMS services The bandwidth of 2G is 30-200 kHz 2G has a communication spectrum of 1.8 GHz, digital communication 2G uses modulation techniques of GSM and digital cellular Security techniques and risks in 2G are WPA authentication that is Wi-Fi protected access Security risks are DoS, physical and man-in-the-middle attacks 3G Mobile Network The 3G mobile network often uses UMTS (universal mobile telecommunications system) because it is core network architecture. It has been found that 3G technologies comprise various aspects of the 2G network with novel technologies as well as protocols for delivering a faster data rate. The features are as follows: 3G uses network speed of up to 2Mbps 3G network technology uses communication spectrum as its operating rand which is 2100 MHz 3G technology has a network bandwidth of 15-20 MHz.
Networking 5 ï‚·The bandwidth and data transfer rates are improved as compared to 2G and 1G. ï‚·3G has the capability to send or receive huge email messages ï‚·3G uses digital signals in place of analog signals ï‚·The bandwidth of 3G is 15-20 MHz ï‚·3G has a communication spectrum of 2100 MHz ï‚·3G uses modulation techniques of UMTS ï‚·Securitytechniquesin3GareWideBandWirelessNetwork(WBWN)which increases the clarity of voice ï‚·Security risks are user identity theft, DoS, data breach, physical and man-in-the- middle attacks and many more 4G Mobile Network The key difference between 3G and 4G technology is the data rate. The key modulation technologies which have created 4G are MIMO (Multiple Input Multiple Output) as well as OFDM (Orthogonal Frequency Division Multiplexing). In addition to that, 4G standards are WiMAX and LTE. It has been found that 4G LTE is the key improvement over 3G speeds. The 4G network can be seen as a predetermined standard for mobile network generations. Besides, the features of 4G LTE are as follows: ï‚·4Guses CDMA while using technologies like LTE ï‚·4Ghas a data speed of the network as 1 Gbps-50 Gbps ï‚·4Gbrought a revolution with Ad hoc as well as multi-hop networks ï‚·The bandwidth of4Gis 100 MHz ï‚·4Ghas a communication spectrum of packet switching and ultra-broadband ï‚·4Guses modulation techniques of VOLTE and WiMAX ï‚·Security techniques in4Gare encryption ï‚·Security risks are saturation, penetration, complexity, high bandwidth, scanning issues, data theft and many more 5G Mobile Network In this context, 5G mobile network will be introduced in near future most probably in 2020. 5G technology will use MIMO with mm Waves. The access system in the case of 5G is OFDMandBDMA.Theswitchingtypewhich5Gusesispacketswitching.Most importantly, 5G uses WWWW internet service technology that stands for the wireless world wide web. Network bandwidth for 5G is 30 GHz-300 GHz. The key merits of 5G technology
Networking 6 will be low latency and extremely high speeds. The key application of 5G technologies can be: ï‚·Remote control of autonomous cars ï‚·Remote place working in the business ï‚·High-resolution video streaming ï‚·Medical field progress 5G Architecture The discussion conducted in this section of the report is containing the 5G architecture. There can be the number of architectures proposed for 5G networks such as cognitive radio-based, multi-tier, cloud-based, energy-efficient architectures and device proximity-based ones. In this way, some important architectures of the future or 5G mobile networks are as follows: 1.CRN-based 5thgeneration architectures: this is based on how CRNs are usually deployed within a macro-cell of 5G system. 2.Two-tier 5thgeneration architectures: this one is based on how small cells are deployed under macro-cells. 3.D2D Communication 5thgeneration architectures: this 5G architecture is based on how devices communicate to the closest devices while not involving an MBS. 4.Energy-efficient 5thgeneration architectures: the 5G architecture is containing the mechanism of saving energy in future 5G networks. Cloud-based 5thgeneration architectures: if we talk about, cloud-based 5G architecture, then it is based on how cloud typically facilitates effective communication within future 5G networks5.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Networking 7 Source:6 Identification and Analysis of 5G Attacks In order to identify and analyze security challenges in 5G mobile network technologies, several attacks can be discussed as follows: Hijacking attacks are all about violating security barricades of the wireless network. These attack targets on the SDN controller and hypervisor while affecting the technologies include NFV, SDN irrespective of privacy issues7. Signaling storms are those attacks that considerably affect 5G core network’s key elements. It also affects technologies like cloud and channels. Resource theft is a kind of security attack on mutual cloud resources and hypervisor of the 5G networks. This kind of 5G attacks affect NFV and cloud elements along with the technologies associated. User identity theft is the 5G attack that targets user info databases majorly while also influencing cloud technology. It is worth knowing that this 5G attack also leaves impact on the privacy of the users3.
Networking 8 ï‚·Boundary attacks out of all 5G attacks target subscriber location. Apart from this, semantic info, as well as timing attack, targets subscriber locations within 5G wireless networks. Besides, boundary attacks raise privacy issues largely. ï‚·IMSI catching are those 5G attacks that affect subscriber identity while mainly affecting channels of 5G. In addition, IMSI catching type 5G attack significantly gives rise to privacy issues. In this way, it can be summarized that 5G attacks such as man-in-the-middle, user identity theft, scanning attacks, IMSI catching, boundary, timing, and semantic information attacks critically affect the privacy of the users in 5G mobile networks8. Source:3
Networking 9 Source:5 Identification and Analysis of 5G limitation in-network coverage The identification and analysis of 5G limitations as network coverage is focused on the issues related to network coverage in 5G specifically9.Post identifying the reasons behind the 5G limitations of network coverage, possible solutions will be discussed. As we know that 5Gmobile network uses millimeter wavelengths which are significantly lower than 4G as well as 3G, thus it is an issue for network coverage10. The above is the reason that 5G network waves are not capable totravel as far as 4G and 3G can. In addition to that, the5G wireless network coverageprofile is less efficient than 4G and 3G, which restricts the network’ssignalstocovermuchregionthan4Gnetworksignalscan.However, the5Gsignals are capable to store more data than the 3G and 4G networks11.Consequently, the remote, as well as rural regions, probably will not able to leverage 5G cellular services in the near future. Therefore, 5G cellular technologies will provide better network services as compared to the currently used wireless network generations. On the other hand, as key limitation proximity in 5G network is a weakness which must be considered by the modern businesses. In order to address suchlimitation, 5G network signal carriers should be continuouslyplannedinamuchgreaternetworkofantennasforefficientlyproviding adequatenetworkcoverage to its users12. Source:2 Apart from this, potential security solutions for the 5G limitations are as follows:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Networking 10 ï‚·Traffic isolation ï‚·Access control11. ï‚·Dos and DDoS detection ï‚·Link security ï‚·Configuration verification ï‚·Identity security and verification ï‚·Location and IMSI security ï‚·Integrity verification ï‚·Service access control ï‚·HX-Dos mitigation13. Conclusion In conclusion, this report has successfully found important benefits as well as challenges within5Gmobilenetworktechnologyascomparedtothecurrentwirelessnetwork technologies. Besides, the paper has meaningfully proposed key solutions for addressing the 5G challenges, security issues, and limitations. In addition to that, the discussion has successfully evaluated the wireless communication standards for various wireless cyber- physical systems as well as IoT. Moreover, proposed research report on wireless networks and security has covered all possible features of 5G cellular networks in order to encourage the readers to utilize 5G technology for efficient business and other operations. Finally, the research study has successfully engaged the readers and thereby motivated them for using 5G in the near future.
Networking 11 References x [1]A. Gupta and R.K. Jha, "A survey of 5G network: Architecture and emerging technologies,"IEEE access, vol. 3, pp. 1206-1232, 2015. [2]A. Gohil, H. Modi, and S.K. Patel, "5G technology of mobile communication: A survey.," inInternational conference on intelligent systems and signal processing ISSP, US, 2013, pp. 288-292. [3]X. Foukas, G. Patounas, A. Elmokashfi, and M.K. Marina, "Network slicing in 5G: Survey and challenges,"IEEE Communications Magazine, vol. 55, no. 5, pp. 94-100, 2017. [4]T. Bakici, E. Almirall, and J. Wareham, "A smart city initiative: the case of Barcelona," Journal of the Knowledge Economy, vol. 4, no. 2, pp. 135-148, 2013. [5]N. Ameen and R. Willis, "Current and future challenges facing the mobile telecommunications industry in the Arab world," inthe 3rd world congress on computer applications and information systems, Dubai, 2016. [6]G. Cecere, N. Corrocher, and R.D. Battaglia, "Innovation and competition in the smartphone industry: Is there a dominant design?,"Telecommunications Policy, vol. 39, no. 3-4, pp. 162-175, 2015. [7]N. Panwar, S. Sharma, and A.K. Singh, "A survey on 5G: The next generation of mobile communication,"Physical Communication, vol. 18, pp. 64-84, 2016. [8]S. Bi, Y. Zeng, and R. Zhang, "Wireless powered communication networks: An overview,"IEEE Wireless Communications, vol. 23, no. 2, pp. 10-18, 2016. [9]W. Stallings,Wireless communications & networks.: Pearson Education India, 2009. [10]D.P. Agarwal and Q.A. Zeng,Introduction to wireless and mobile systems. USA: Cengage Learning, 2015. [11]R.N. Mitra and D.P. Agarwal, "5G mobile technology: A survey,"ICT Express, vol. 1,
Networking 12 no. 3, pp. 132-137, 2015. [12]W. Xiang, K. Zheng, and X.S. Shen,5G mobile communications. UK: Springer, 2016. [13]Y. Huo, X. Dong, and W. Xu, "5G Cellular User Equipment: From Theory to Practical Hardware Design,"IEEE Access, vol. 5, pp. 13992-14010, 2017. x