logo

Network and the Security Case Study 2022

   

Added on  2022-10-04

9 Pages2341 Words36 Views
NETWORKING 0
Evaluation of 5G Network
and the Security

NETWORKING 1
Table of Contents
Introduction................................................................................................................ 2
Comparison of cellular networks................................................................................2
Architecture of 5G...................................................................................................... 4
5G attacks on the access and core networks.............................................................5
DDOS attack............................................................................................................ 5
Malware attack........................................................................................................ 5
Man in the middle attack......................................................................................... 5
Limitations of 5G........................................................................................................ 5
Recommendation/solution.......................................................................................... 6
Conclusion.................................................................................................................. 6
References................................................................................................................. 7

NETWORKING 2
Introduction
5G is defined as the fifth generation of network technology which is able to improve
the performance of communication networks and systems. It is an advanced version
of 4G technology that provides large data rate and reduces energy consumption
and cost-related problems occurred in the 4G network technology [1]. In terms of
communication and security 5G technology is more effective and reliable rather
than other generations due to which it can be used for long-distance communication
activities. The key goal of this investigation is to evaluate the key aspects of 5G
technologies and describe the architecture of 5G network technology. Security is a
key part of network technology which directly impacts on the performance of
computing networks. In the case of 5G technologies, there are numerous attacks
occur including malware, DDOS, phishing and so on. This report will cover the main
three sections including a comparison of cellular networks, 5G architecture, and
identification of 5G attacks and limitations of 5G networks.
Comparison of cellular networks
2G is one of the oldest mobile technologies that were developed in 1980 using
digital cellular technology and 14.64 kbps bandwidth. Security of data was a major
problem linked with 2G network technology and which also used TDMA multiplexing
technology as communication spectrum. As compare with 2G networks 3G is more
effective that has the potential to 2 Mbps bandwidth by which the users can send
data over the networks in an effective manner [6]. A recent study identified that 3G
technology uses CDMA modulation techniques and wireless medium access control
process that have the ability to improve the overall performance of the networks
[2].
Moreover, the data transfer rate of 3G technology is around 3.1 MB per second
which is very less as compared with 4G and 5G networks. In terms of security, 3G
technology is less effective which uses WPA as a security system that produces
various kinds of risks including data breach, loss of data, cyber-crimes and so on. In
order to reduce the drawbacks of 3G technology, the developers implemented 4G
networks that are able to control and manage errors and conflict-related issues
occurred in the previously developed networks. Therefore, it is stated that with the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
5G Networks Technology | Report
|10
|2657
|12

Wireless Network and Security Research Paper 2022
|10
|2652
|20

5G Networks | Wireless Networks and Security
|11
|2788
|27

Wireless And Network Security Assignment 2022
|10
|2527
|22

Evaluation On 5g Network And Security Report
|20
|2663
|31

Wireless Networks and Security
|11
|2619
|37