ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Wireless Networks And Security Report 2022

Verified

Added on  2022/09/18

|13
|2844
|24
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: WIRELESS NETWORKS AND SECURITY
WIRELESS NETWORKS AND SECURITY
Name of the Student
Name of the University
Author Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
WIRELESS NETWORKS AND SECURITY 1
Table of Contents
Introduction:...............................................................................................................................2
Comparison:...............................................................................................................................2
Communication spectrum:.....................................................................................................2
Modulation techniques:..........................................................................................................3
Medium access control mechanism:......................................................................................4
Network Speed and Bandwidth utilization:...........................................................................4
Security techniques and risk:.................................................................................................6
Architecture of 5g network:.......................................................................................................6
Identification and Analysis of 5G Attacks:................................................................................7
Identification and Analysis of 5G limitation in network coverage:...........................................8
Conclusion:................................................................................................................................9
References:...............................................................................................................................10
Document Page
2WIRELESS NETWORKS AND SECURITY
Introduction:
5g is basically a term that is used for describing the next generation of the mobile
networking that is more functional than the LTE mobile networks. Four of the major phones
carries in the United States are Verizon, AT&T, Sprint and lastly T-Mobile. All of the mobile
network providers are having solid plans for introducing the 5g mobile network [1]. The
company AT&T has even begun the trails with the hotspots of the 5g network in around 12
cities. The purpose of this paper is to discuss about the 5g network. This paper will also do
the comparison of 5g network with the other cellular networks that are currently existed. This
paper will also provide the architecture of 5g network and at the end of the paper there will be
a conclusion based on the entire paper.
Comparison:
Communication spectrum:
The time when people think that the latency of the network connections, the latency
could not be the first thing that can come to the mind however this is so much important as
well as definitely required to be discussed at the time the performance of the networks is
being compared [4]. Latency is essentially the estimation of time between the users request
for information to a server and the arrival of that information. For internet gamers with
snappy triggers, a little dormancy time is significant for gunning down the adversaries of
them. The thing is, with regards to 5G where velocities are as of now anticipated to take off
over its antecedents, most specialists will in general concur that the greater effect 5G will
have on the world may be in its prevalent inactivity [5]. This is on the grounds that to the
extent paces go, the internet isn't actually gradually moving for the users and keeping in mind
that download times are certain for seeing some really cool reductions, they are as of now
quite quick. The network latency comparison table is as follows:
Document Page
3WIRELESS NETWORKS AND SECURITY
Network Latency (milliseconds)
2G 300-1000ms
3G 100-500ms
4G 50-100ms
5G 1-10ms
Modulation techniques:
The 5g network is starting out slowly and this is limited extremely in the availability
as well as right now the 5g network is in the beta phase, some of the devices has already been
begun to made the 5g ready devices, at the same time the 4g network in still improving as
well as people are also getting benefit from that [7]. However as per the GSMA (Groupe
Special Mobile Association), for qualifying as the 5g network, the network has to meet the
following 8 criteria:
1. 1 to 10Gbps connections
2. 1000x bandwidth per unit area
3. 10 to 100x number of devices that will be connected
4. (Perception of) 99.999% availability
5. 1 ms end to end round-trip delay
6. (Perception of) 100% coverage

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4WIRELESS NETWORKS AND SECURITY
7. Up to ten years battery life for the low power as well as for the machine type devices
8. 90% reduction in usage of network energy.
Medium access control mechanism:
The mm Wave is one of the major technologies for the 5g technology. The core of
FDMAC is the graph that is for a graph colouring based schedule algorithm, it can compute
the schedules with respect to the entire transmission time with having low complexity. The
3g network was one of the biggest breakthroughs in the communication by carrying faster
data significantly with the text messages as well as phone calls [8]. The next generation 5g
network is going to be faster even. The hectic speed of the previous networks is going to
render each of the successive generation of the obsolete of the smartphones.
Network Speed and Bandwidth utilization:
The 5g network is set for making the impact of it, from downloading of applications
within a blink of eye to watch 4k videos seamlessly as well as much more. The next
generation of the mobile network can be a game changer [2]. At present there ate existed 2g,
3g and 4g network. Most of the people use 3g and 4g network for better connectivity. When
this comes to the mobile network, the users can do a lot with the network. The speed of the
internet is the most important to the users as well as at the time it comes to the comparison
between the mobile networks when this comes to the comparison between the networks [3].
Probably that is one of biggest benchmark which most of the people are looking at for
determining which one is better. The 5g network has been set to be the fastest network form
all of the predecessors of it. Even, by comparing the 5g network with the 4g, it is ten times
faster than the 4g network.
The speed of network generation is as follows:
Document Page
5WIRELESS NETWORKS AND SECURITY
Generation Top Speed Average Speed
2G 0.3 Mbps 0.1 Mbps
3G (HSPA+) 42 Mbps 8 Mbps
4G LTE (ADV CAT-16) 1 Gbps 50 Mbps
5G 10 Gbps 1 Gbps
The table has represented the average and top speeds of each of the networks in the
best version. Though, some reports indicate that the 5g network will be having a speed of 20
Gbps. Speaking of the apps, the users can download all of them. Below the given table will
give a brief idea of application downloading time of each of the network [6]. The table is as
follows:
Network Generation Time to Download
2G 35-40 minutes
3G 45 seconds-1 minute
4G 5-8 seconds
5G <1 second
Document Page
6WIRELESS NETWORKS AND SECURITY
Security techniques and risk:
At the time of installing the 4G LTE , there was right around one year of talks inside
the 3GPP before a choice could be made on whether to designate radio interface insurance in
the eNodeB or in the centre system. ETSI (3GPP) and the IETF will keep on being two
significant institutionalization bodies for 5G security, and characterizing another trust model
will be one of their first needs.
Architecture of 5g network:
The architecture of the 5g network is advanced highly. The elements of the network
and the terminals of the servers are characteristically upgraded for affording a situation that
will be new. The service providers of the mobile network can easily implement this advanced
technology for adopting the value added services. The 5g network is basically an IP based
model that is designed for the mobile network as well as for the wireless networks [9]. The
architecture of the 5g network is as follows:
(Figure: 5G architecture)

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7WIRELESS NETWORKS AND SECURITY
This system comprises of the terminal of the primary users as well as then the number
of autonomous and independent radio access technologies. Every radio technology can be
considered as the link of an IP for the internet based world that remain on the outside [10].
The IP technology is exclusively designed for ensuring the sufficient control in the data for
the appropriate route of the IP packets that are related to one of the certain applications or
sessions that are existed between the servers as well as the client based applications that are
available on the internet.
Identification and Analysis of 5G Attacks:
A multi stakeholder approach that is involving vendors, operators, policy makers,
regulators as well as representative of the users of 5g is fundamental for the security baseline
of the cost effective, trustworthy as well as 5g networks that are manageable. One example is
the 5g for the Sweden research program [11]. It is the joint collaboration that is between
telecom companies, academic institutions and some of the other industries with the purpose
to take the lead position in digitalization. One more example is the 5g ensure. This is a co-
operation between operators, equipment vendors, SMEs and academic institutions. The EU
horizon 2020 project will do the study in the security architecture of the 5g network such as
identity management and virtualization. A lake of such efforts can detrimentally affect time
to advertise [12]. For instance, during the 4G LTE institutionalization stage, there was right
around one year of talks inside the 3GPP before a choice could be made on whether to
designate radio interface insurance in the eNodeB or in the centre system. ETSI (3GPP) and
the IETF will keep on being two significant institutionalization bodies for 5G security, and
characterizing another trust model will be one of their first needs.
Document Page
8WIRELESS NETWORKS AND SECURITY
Identification and Analysis of 5G limitation in network coverage:
As the excitement is growing for the 5g mobile network technology, there are some
limitations too. The drawbacks of the 5g network are as per following:
1. For taking advantages of the full suite of the capabilities that are existed in the 5g
network, one 5g supported device is needed at both of the ends of the connections. On
the side of the user a 5g enabled mobile device for the mobile communication or one
5g IOT related device is required [13]. On the side of the carrier, the antennas of the
5g as well as the infrastructure is required. Some of the 5g enabled IOT device are
started rolling out.
2. One more drawback of the 5g network is the proximity that the business must have to
consider 5G utilizes millimetre wavelengths, which are littler than 3G and 4G, and
they don't go as far. While the 5G inclusion profile is littler, the 5G sign can convey
more information. To battle this constraint, transporters are arranging a lot bigger
system of reception apparatuses to give enough inclusion. In any case, organizations
planning to utilize this innovation should research their bearers' 5G inclusion maps.
Bearers are beginning pilots now, yet inclusion is just in a couple of urban zones; this
will extend after some time as enormous scale arrangements start.
3. The remote and rural locations are not having the 5g related services. The applications
that are related to the 5g network in the areas like mining and agriculture where the
remotely access is needed, so this is so much cost effective for deploying the 5g
network in the rural areas and in remote locations.
4. The 5g network will be having a different type of security model than the 4g and 3g
network as this will be including security capabilities that are new [14]. To understand
those new security models will be so much critical for ensuring that they are building
secure and comprehensive devices.
Document Page
9WIRELESS NETWORKS AND SECURITY
Conclusion:
Thus, it can be concluded from the entire report that the 5g network is the fifth
generation mobile network technology. The networks that belongs to 5g are digital cellular
networks, in that the area of the services can be covered by the network providers who are
divided into some of the small graphical areas that are known as cells. The 5g network is set
for making the impact of it, from downloading of applications within a blink of eye to watch
4k videos seamlessly as well as much more. The next generation of the mobile network can
be a game changer. The 5g network is starting out slowly and this is limited extremely in the
availability as well as right now the 5g network is in the beta phase, some of the devices has
already been begun to made the 5g ready devices, at the same time the 4g network in still
improving as well as people are also getting benefit from that.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10WIRELESS NETWORKS AND SECURITY
References:
[1] A. Gupta and R. Jha, "A Survey of 5G Network: Architecture and Emerging
Technologies", IEEE Access, vol. 3, pp. 1206-1232, 2015. Available:
10.1109/access.2015.2461602.
[2] K. Samdanis, X. Costa-Perez and V. Sciancalepore, "From network sharing to multi-
tenancy: The 5G network slice broker", IEEE Communications Magazine, vol. 54, no. 7, pp.
32-39, 2016. Available: 10.1109/mcom.2016.7514161.
[3] X. Foukas, G. Patounas, A. Elmokashfi and M. Marina, "Network Slicing in 5G: Survey
and Challenges", IEEE Communications Magazine, vol. 55, no. 5, pp. 94-100, 2017.
Available: 10.1109/mcom.2017.1600951.
[4] H. Zhang, N. Liu, X. Chu, K. Long, A. Aghvami and V. Leung, "Network Slicing Based
5G and Future Mobile Networks: Mobility, Resource Management, and Challenges", IEEE
Communications Magazine, vol. 55, no. 8, pp. 138-145, 2017. Available:
10.1109/mcom.2017.1600940.
[5] T. Taleb, K. Samdanis, B. Mada, H. Flinck, S. Dutta and D. Sabella, "On Multi-Access
Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and
Orchestration", IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1657-1681,
2017. Available: 10.1109/comst.2017.2705720.
[6] D. Bega, M. Gramaglia, A. Banchs, V. Sciancalepore and X. Costa-Perez, "A Machine
Learning approach to 5G Infrastructure Market optimization", IEEE Transactions on Mobile
Computing, pp. 1-1, 2019. Available: 10.1109/tmc.2019.2896950.
Document Page
11WIRELESS NETWORKS AND SECURITY
[7] C. Campolo, A. Molinaro, A. Iera and F. Menichella, "5G Network Slicing for Vehicle-
to-Everything Services", IEEE Wireless Communications, vol. 24, no. 6, pp. 38-45, 2017.
Available: 10.1109/mwc.2017.1600408.
[8] N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan and M. Renzo, "Safeguarding 5G
wireless communication networks using physical layer security", IEEE Communications
Magazine, vol. 53, no. 4, pp. 20-27, 2015. Available: 10.1109/mcom.2015.7081071.
[9] K. Samdanis, S. Wright, A. Banchs, A. Capone, M. Ulema and K. Obana, "5G Network
Slicing - Part 1: Concepts, Principles, and Architectures", IEEE Communications Magazine,
vol. 55, no. 5, pp. 70-71, 2017. Available: 10.1109/mcom.2017.7926919.
[10] P. Rost et al., "Mobile network architecture evolution toward 5G", IEEE
Communications Magazine, vol. 54, no. 5, pp. 84-91, 2016. Available:
10.1109/mcom.2016.7470940.
[11] X. Ge, S. Tu, G. Mao, C. Wang and T. Han, "5G Ultra-Dense Cellular Networks", IEEE
Wireless Communications, vol. 23, no. 1, pp. 72-79, 2016. Available:
10.1109/mwc.2016.7422408.
[12] T. Maksymyuk, M. Brych and V. Pelishok, "Stochastic Geometry Models for 5G
Heterogeneous Mobile Networks", The Smart Computing Review, pp. 89-101, 2015.
Available: 10.6029/smartcr.2015.02.002.
[13] Rost, Peter, Christian Mannweiler, Diomidis S. Michalopoulos, Cinzia Sartori, Vincenzo
Sciancalepore, Nishanth Sastry, Oliver Holland et al. "Network slicing to enable scalability
and flexibility in 5G mobile networks." IEEE Communications magazine 55, no. 5: 72-79,
2017.
Document Page
12WIRELESS NETWORKS AND SECURITY
[14] Taleb, Tarik, Miloud Bagaa, and Adlen Ksentini. "User mobility-aware virtual network
function placement for virtual 5G network infrastructure." In 2015 IEEE International
Conference on Communications (ICC), pp. 3879-3884, 2015
1 out of 13
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]