Wireless Network Technology: 5G Analysis and Future Trends
VerifiedAdded on 2022/09/14
|14
|3074
|11
Report
AI Summary
This report provides a comprehensive overview of 5G wireless network technology. It begins by highlighting the importance of 5G and its advantages over 4G, including higher data rates, lower latency, and increased device connectivity. The report then delves into a comparison of various mobile network generations (1G to 5G), discussing communication spectrum, modulation techniques, and medium access control mechanisms. It examines network speed, bandwidth utilization, and security techniques, including potential risks and vulnerabilities. Furthermore, the report explores the architecture of 5G networks, identifying potential attacks and addressing network coverage issues, such as those related to dense small cell deployment, millimeter-wave frequency bands, and massive MIMO and beamforming. The report concludes with a discussion of the future trends and potential solutions to overcome coverage limitations, providing a detailed analysis of 5G technology and its impact on wireless communication.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: WIRELESS NETWORK TECHNOLOGY
WIRELESS NETWORK TECHNOLOGY
Name of the Student:
Name of the University:
Author Note:
WIRELESS NETWORK TECHNOLOGY
Name of the Student:
Name of the University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1WIRELESS NETWORK TECHNOLOGY
Table of Contents
Introduction......................................................................................................................................3
Importance of 5G.............................................................................................................................3
Various generations in mobile network...........................................................................................4
Communication spectrum............................................................................................................4
Modulation techniques.................................................................................................................5
Mechanism of medium access control.........................................................................................5
Network speed and bandwidth utilization...................................................................................6
Security techniques and risk........................................................................................................6
5G architecture.................................................................................................................................7
5G attacks........................................................................................................................................7
Network Coverage Issues in 5.........................................................................................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................10
Table of Contents
Introduction......................................................................................................................................3
Importance of 5G.............................................................................................................................3
Various generations in mobile network...........................................................................................4
Communication spectrum............................................................................................................4
Modulation techniques.................................................................................................................5
Mechanism of medium access control.........................................................................................5
Network speed and bandwidth utilization...................................................................................6
Security techniques and risk........................................................................................................6
5G architecture.................................................................................................................................7
5G attacks........................................................................................................................................7
Network Coverage Issues in 5.........................................................................................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................10

2WIRELESS NETWORK TECHNOLOGY
Introduction
The current shift in the technology of the mobile network is the emergence of the 5G or
fifth generation technology which is in the process of replacing the technology of the fourth
generation or 4G which is currently being utilized by the individuals. Different kinds of
advantages are being provided by the technology of 5G which are not provided by the 4G
technology and this is the main reason behind the 4G technology getting replaced by the new and
evolving 5G technology. Many plans are being made by the providers of the mobile services for
the immigrating to the technology of 5G as it supports a various number of growing devices. The
main focus of this report is to discuss the ongoing technology of the fifth generation. This report
purposes to make a comparison among the different kinds of generations of the cellular network
on the basis of the techniques which are referred for the modulation to take place, spectrum for
communication, the mechanism related to the Medium Access Control or MAC, risks and
various techniques of security related to it, usage of the bandwidth along with the speed of the
network. The architecture involved in the process of the 5G technology will also be explored
widely in the report. The report focuses on identifying the various kinds of attacks that are faced
by the 5G network. In this report different kinds of issues regarding the coverage of the network
will be identified as well as analyzed and the solutions for avoiding the faced limitations will
also be mentioned.
Importance of 5G
The motivation regarding the 5G technology is it is the major reason behind the industry
getting inspired by the successive as well as huge growth in the approaches for witnessing a
Introduction
The current shift in the technology of the mobile network is the emergence of the 5G or
fifth generation technology which is in the process of replacing the technology of the fourth
generation or 4G which is currently being utilized by the individuals. Different kinds of
advantages are being provided by the technology of 5G which are not provided by the 4G
technology and this is the main reason behind the 4G technology getting replaced by the new and
evolving 5G technology. Many plans are being made by the providers of the mobile services for
the immigrating to the technology of 5G as it supports a various number of growing devices. The
main focus of this report is to discuss the ongoing technology of the fifth generation. This report
purposes to make a comparison among the different kinds of generations of the cellular network
on the basis of the techniques which are referred for the modulation to take place, spectrum for
communication, the mechanism related to the Medium Access Control or MAC, risks and
various techniques of security related to it, usage of the bandwidth along with the speed of the
network. The architecture involved in the process of the 5G technology will also be explored
widely in the report. The report focuses on identifying the various kinds of attacks that are faced
by the 5G network. In this report different kinds of issues regarding the coverage of the network
will be identified as well as analyzed and the solutions for avoiding the faced limitations will
also be mentioned.
Importance of 5G
The motivation regarding the 5G technology is it is the major reason behind the industry
getting inspired by the successive as well as huge growth in the approaches for witnessing a

3WIRELESS NETWORK TECHNOLOGY
higher quality of experience in the context of broadband for matching up the level of future
expectations and demands regarding the performance as well as the capacity [1]. The 5G
technology comes along with a numerous benefits which involves higher rates of data, reduction
in the portion of latency, helps in saving of energy, reduction in cost, increment in the ability and
the capacity of the system with the massive connectivity of the numerous devices [3]. In other
words, it can be said that the technology of the 5G network consists of three main specializations
which involves more remarkable speed which could be utilized for working of higher data
quantity, very lower latency levels which can be helpful for transforming it to become more
responsive than earlier and also the ability of interconnection with numerous growing devices at
the very first attempt initially for the devices like the smart phone and the sensors as well [2].
The technology of the 5G network contains all the possible features which are a must for the
different types of the industries, models, applications to get enabled which are basically required
in the business and also are emerging fundamentally step by step [4].
Various generations in mobile network
Communication spectrum
In the context of first generation or 1G the only feature that was allowed was calling but the
text messaging was never supported by 1G which is different in the case of 2G because the
feature of text messaging is supported by 2G. The 3G technologies always supported the
numerous facilities that were present in the mobile itself [5]. The technology of 4G was the first
who introduced the LTE genre for the wireless mobile devices. The only requirement in the
application of the 5G technology is the usage of the bands which is unconventional with a larger
higher quality of experience in the context of broadband for matching up the level of future
expectations and demands regarding the performance as well as the capacity [1]. The 5G
technology comes along with a numerous benefits which involves higher rates of data, reduction
in the portion of latency, helps in saving of energy, reduction in cost, increment in the ability and
the capacity of the system with the massive connectivity of the numerous devices [3]. In other
words, it can be said that the technology of the 5G network consists of three main specializations
which involves more remarkable speed which could be utilized for working of higher data
quantity, very lower latency levels which can be helpful for transforming it to become more
responsive than earlier and also the ability of interconnection with numerous growing devices at
the very first attempt initially for the devices like the smart phone and the sensors as well [2].
The technology of the 5G network contains all the possible features which are a must for the
different types of the industries, models, applications to get enabled which are basically required
in the business and also are emerging fundamentally step by step [4].
Various generations in mobile network
Communication spectrum
In the context of first generation or 1G the only feature that was allowed was calling but the
text messaging was never supported by 1G which is different in the case of 2G because the
feature of text messaging is supported by 2G. The 3G technologies always supported the
numerous facilities that were present in the mobile itself [5]. The technology of 4G was the first
who introduced the LTE genre for the wireless mobile devices. The only requirement in the
application of the 5G technology is the usage of the bands which is unconventional with a larger
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4WIRELESS NETWORK TECHNOLOGY
value that ranges from 6Hz to 100Hz by the usage of the waveforms in sub millimeter and
millimeter.
Modulation techniques
The modulation technique that are applied in case of 2G is Global System for Mobile
communication or GSM which makes the usage of the technique related to modulation that can
be termed as Gaussian filtered Minimum Shift Keying. A numerous systems that are utilized for
the communication purposes makes usage of this and these communication systems make good
usage of the digital radio. QAM and QPSK are the various modulation techniques that take place
in case 3G technology. Its usage finds place in WiMax and in Wi-Fi along with some other
wireless technologies like the HSDPA/WCDMA. Signals are first modulated and after the
modulation is over, the process of demodulation takes place and at side of the receiver end, the
digital message that is authentic in nature is then recovered here [6]. The technique of
modulation which finds its usage in case of 4G is FDM or Frequency Division Multiplex. The
LTE makes the usage of the scheme of modulation of OFDM or Orthogonal Frequency Division
Multiplex that is very helpful for proving the spectral efficiency that is very much necessary in
the process of achievement of larger rate of data. The utilization of OFDM can find its place in
the field of 5G technology.
Mechanism of medium access control
In simple words, Medium Access Control can be elaborated by utilization of a sphere
which is the reason behind the handling of hardware of any sort of devices that is liable for the
occurrence of the interactional activities with the wireless transmission and the medium. PSTN
or Public Switched Telephonic network is utilized the technology of 2G. The usage of the packet
value that ranges from 6Hz to 100Hz by the usage of the waveforms in sub millimeter and
millimeter.
Modulation techniques
The modulation technique that are applied in case of 2G is Global System for Mobile
communication or GSM which makes the usage of the technique related to modulation that can
be termed as Gaussian filtered Minimum Shift Keying. A numerous systems that are utilized for
the communication purposes makes usage of this and these communication systems make good
usage of the digital radio. QAM and QPSK are the various modulation techniques that take place
in case 3G technology. Its usage finds place in WiMax and in Wi-Fi along with some other
wireless technologies like the HSDPA/WCDMA. Signals are first modulated and after the
modulation is over, the process of demodulation takes place and at side of the receiver end, the
digital message that is authentic in nature is then recovered here [6]. The technique of
modulation which finds its usage in case of 4G is FDM or Frequency Division Multiplex. The
LTE makes the usage of the scheme of modulation of OFDM or Orthogonal Frequency Division
Multiplex that is very helpful for proving the spectral efficiency that is very much necessary in
the process of achievement of larger rate of data. The utilization of OFDM can find its place in
the field of 5G technology.
Mechanism of medium access control
In simple words, Medium Access Control can be elaborated by utilization of a sphere
which is the reason behind the handling of hardware of any sort of devices that is liable for the
occurrence of the interactional activities with the wireless transmission and the medium. PSTN
or Public Switched Telephonic network is utilized the technology of 2G. The usage of the packet

5WIRELESS NETWORK TECHNOLOGY
internet is executed in the technology of 3G. The usage of the core network type in done in both
4G and 5G technologies. Seamless mixtures of broadband and the unified IP such as Local Area
Network is given by 4G [7]. The unified IP is given by 5G too. The mixtures of the broadband
like WLAN is given by both 4G and 5G. The technologies of GSM is utilized in 2G and 3G
makes the usage of WCDMA. 4G extends its support for the technologies like WiMax and LTE
but 5G extends its support to VOLTE.
Network speed and bandwidth utilization
The 2G network speed is 64 kbps. The 3G network speed spans from 144 kbps to 2 mbps.
The development in the speed of the network took place in both 4G and 5G technologies of the
industries where the wireless communication is preferred and where the speed of the network
ranges from 100 mbps to 1gbps that is given by 4G and 5G provides a network speed of more
than 1gbps [8].
The range of bandwidth that is utilized in 2G is 900 MHz which makes the utilization of
the narrow bands. In 3G, 100 MHz is the bandwidth and the usage of the wide bandwidth is
done. 4G consists of 100 MHz bandwidth and the ultra-wide bandwidth is considered [9]. The
assumed bandwidth which should be utilized in case of 5G must be (Bandwidth * 1000) per unit
area.
Security techniques and risk
The several techniques related to security which are in interconnection to the technology
of the mobile networks that are wireless involves spoofing of network, spyware, data leak,
insecure Wi-Fi, several attacks regarding incorrect handling of session, phishing etc [10]. The
various drawbacks related to the data leak can be solved by authorizing the viable applications in
internet is executed in the technology of 3G. The usage of the core network type in done in both
4G and 5G technologies. Seamless mixtures of broadband and the unified IP such as Local Area
Network is given by 4G [7]. The unified IP is given by 5G too. The mixtures of the broadband
like WLAN is given by both 4G and 5G. The technologies of GSM is utilized in 2G and 3G
makes the usage of WCDMA. 4G extends its support for the technologies like WiMax and LTE
but 5G extends its support to VOLTE.
Network speed and bandwidth utilization
The 2G network speed is 64 kbps. The 3G network speed spans from 144 kbps to 2 mbps.
The development in the speed of the network took place in both 4G and 5G technologies of the
industries where the wireless communication is preferred and where the speed of the network
ranges from 100 mbps to 1gbps that is given by 4G and 5G provides a network speed of more
than 1gbps [8].
The range of bandwidth that is utilized in 2G is 900 MHz which makes the utilization of
the narrow bands. In 3G, 100 MHz is the bandwidth and the usage of the wide bandwidth is
done. 4G consists of 100 MHz bandwidth and the ultra-wide bandwidth is considered [9]. The
assumed bandwidth which should be utilized in case of 5G must be (Bandwidth * 1000) per unit
area.
Security techniques and risk
The several techniques related to security which are in interconnection to the technology
of the mobile networks that are wireless involves spoofing of network, spyware, data leak,
insecure Wi-Fi, several attacks regarding incorrect handling of session, phishing etc [10]. The
various drawbacks related to the data leak can be solved by authorizing the viable applications in

6WIRELESS NETWORK TECHNOLOGY
the mobile. The drawbacks related to insecure Wi-Fi can be overcome by making connections
only to the mobile data.
5G architecture
Aggregator, Nano core, networks of internet protocol etc. are building blocks of the 5G
network architecture. The total system model is based on the IP model basically designed for the
wireless and the mobile networks. This typical system encompasses a main terminal for the user.
Numerous technologies of the radio access are a part of this system which are autonomous and at
the same time independent. Every single radio technology is presumed in the form of the IP links
[13]. The technology within the IP is constructed so that sufficient control of data for appropriate
routing the IP packets remains ensured that is joined to the interconnections of those prioritized
applications which indicates the sessions that took place are present on the internet. There should
be fixed number of packets regarding the policies provided by the user for making the access to
the routing easier. The concept of IP is utilized in 5G so that the single [14] Nano core can be
utilized by the radio access networks. GPRS, GSM are the radio access networks that are
supported by the architecture of 5G [11]. For identifying the devices flat IP are utilized where the
symbolic names are utilized than that of the hierarchical architecture that makes usage of the
simple IP addresses. Numerous elements related to the network are reduced in the field of data
with the help of this architecture. The traffics related to RAN are routed to the gateway and
the mobile. The drawbacks related to insecure Wi-Fi can be overcome by making connections
only to the mobile data.
5G architecture
Aggregator, Nano core, networks of internet protocol etc. are building blocks of the 5G
network architecture. The total system model is based on the IP model basically designed for the
wireless and the mobile networks. This typical system encompasses a main terminal for the user.
Numerous technologies of the radio access are a part of this system which are autonomous and at
the same time independent. Every single radio technology is presumed in the form of the IP links
[13]. The technology within the IP is constructed so that sufficient control of data for appropriate
routing the IP packets remains ensured that is joined to the interconnections of those prioritized
applications which indicates the sessions that took place are present on the internet. There should
be fixed number of packets regarding the policies provided by the user for making the access to
the routing easier. The concept of IP is utilized in 5G so that the single [14] Nano core can be
utilized by the radio access networks. GPRS, GSM are the radio access networks that are
supported by the architecture of 5G [11]. For identifying the devices flat IP are utilized where the
symbolic names are utilized than that of the hierarchical architecture that makes usage of the
simple IP addresses. Numerous elements related to the network are reduced in the field of data
with the help of this architecture. The traffics related to RAN are routed to the gateway and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7WIRELESS NETWORK TECHNOLOGY
aggregated by the aggregator.
Figure 1: 5G architecture
(Source: [12])
5G attacks
The 5G attacks related to the core as well as the access networks are Denial of Service or
DOS attacks which comes under the traffic regarding the flash network on the infrastructure user
devices, man in the middle attack, signaling of storms, roaming security and others [15]. The
challenges of security related to SDN are the rules in the components of data under forwarding of
data are transformed by SDN. The traffic connected to the controlling information can be
verified that makes it an entity to be rendered by the DOS attack.
The NFV contains a lot of vulnerability regarding the chosen set of threats like the side-
channel attacks, injection of malicious software, flooding attacks, hypervisor hijacking and
numerous attacks which are naturally cloud-specific. The deployments regarding NFV which are
private tends to be more vulnerable and in addition to it only to those insiders which are naturally
malicious like that of the administrators are malicious too due to the system access prevention.
aggregated by the aggregator.
Figure 1: 5G architecture
(Source: [12])
5G attacks
The 5G attacks related to the core as well as the access networks are Denial of Service or
DOS attacks which comes under the traffic regarding the flash network on the infrastructure user
devices, man in the middle attack, signaling of storms, roaming security and others [15]. The
challenges of security related to SDN are the rules in the components of data under forwarding of
data are transformed by SDN. The traffic connected to the controlling information can be
verified that makes it an entity to be rendered by the DOS attack.
The NFV contains a lot of vulnerability regarding the chosen set of threats like the side-
channel attacks, injection of malicious software, flooding attacks, hypervisor hijacking and
numerous attacks which are naturally cloud-specific. The deployments regarding NFV which are
private tends to be more vulnerable and in addition to it only to those insiders which are naturally
malicious like that of the administrators are malicious too due to the system access prevention.

8WIRELESS NETWORK TECHNOLOGY
The VNF interference with the operations regarding the infrastructure takes place due to the
numerous ways of accessibility of the physical resources of those infrastructure are very similar.
Figure 2: 5G attacks and their impacts
Source: ([16])
Network Coverage Issues in 5G
The performance of the network coverage is done on the basis of the data that is gathered
initially from the test done regarding the field. With the help of inter-site distance that in turn is
derived from the density of the base station, the capacity of the macro cell is calculated. By the
The VNF interference with the operations regarding the infrastructure takes place due to the
numerous ways of accessibility of the physical resources of those infrastructure are very similar.
Figure 2: 5G attacks and their impacts
Source: ([16])
Network Coverage Issues in 5G
The performance of the network coverage is done on the basis of the data that is gathered
initially from the test done regarding the field. With the help of inter-site distance that in turn is
derived from the density of the base station, the capacity of the macro cell is calculated. By the

9WIRELESS NETWORK TECHNOLOGY
removal of the small dense cells, utilization of mm wave and M-MIMO and beam forcing. The
limited cell radius should take the place of the small cells as that will help in increasing the
capacity of the network. The MIMO will help in strengthening the signals that will increase the
cell throughput.
Dense small cell deployment:
The drawback which takes place in case of dense small cell deployment is the rate of
increment of the handoffs. The constant motion of the users from the area of one cell coverage to
the other cells helps in creating numerous handoffs. For addressing this issue, some measures
should be opted like the rates of handoff could be minimized in the future networks contained in
5G.
Millimeter-wave frequency band
The frequency of the millimeter-wave is constantly becoming scarcer as it consists of
numerous qualities that tends to contain a propagation that would be favorable. This type of
scarcity can be sorted by 5G networks in various ways for instance, a network with higher
capacity, good connectivity along with an additional spectrum is very highly important and is
required.
Massive MIMO and beam forming.
The drawback that is faced in context of Massive MIMO and beam forming is the pilot is
getting contaminated from those sort of cells that are placed near to it because of the occurrence
of the increment in the total number of the antennas. Because of this particular reason the process
of estimating the channels have become a demanding issue. This issue can be addressed by
pairing the M-MIMO with the Millimeter-wave band.
removal of the small dense cells, utilization of mm wave and M-MIMO and beam forcing. The
limited cell radius should take the place of the small cells as that will help in increasing the
capacity of the network. The MIMO will help in strengthening the signals that will increase the
cell throughput.
Dense small cell deployment:
The drawback which takes place in case of dense small cell deployment is the rate of
increment of the handoffs. The constant motion of the users from the area of one cell coverage to
the other cells helps in creating numerous handoffs. For addressing this issue, some measures
should be opted like the rates of handoff could be minimized in the future networks contained in
5G.
Millimeter-wave frequency band
The frequency of the millimeter-wave is constantly becoming scarcer as it consists of
numerous qualities that tends to contain a propagation that would be favorable. This type of
scarcity can be sorted by 5G networks in various ways for instance, a network with higher
capacity, good connectivity along with an additional spectrum is very highly important and is
required.
Massive MIMO and beam forming.
The drawback that is faced in context of Massive MIMO and beam forming is the pilot is
getting contaminated from those sort of cells that are placed near to it because of the occurrence
of the increment in the total number of the antennas. Because of this particular reason the process
of estimating the channels have become a demanding issue. This issue can be addressed by
pairing the M-MIMO with the Millimeter-wave band.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10WIRELESS NETWORK TECHNOLOGY
Conclusion
Therefore it can be concluded that the wireless mobile technology has developed in a
gigantic way in these few decades. Among those generations it is expected that the fifth
generation of the wireless mobile network will impact the society in huge amount. It will change
the lifestyles of the people. In this report, the various generations of the technologies have been
compared regarding the various aspects like the various techniques that are involved for
modulation, the spectrum involved for the communication, the mechanisms that are involved in
the medium access control, usability of the bandwidth, network speed, security techniques and
risks is performed. The architecture has also been discussed. The main goal of 5G is to provide a
strong network connection to the clients and thus all identified network coverage issues should
be resolved as soon as possible which will increase the efficiency of the network connection.
Conclusion
Therefore it can be concluded that the wireless mobile technology has developed in a
gigantic way in these few decades. Among those generations it is expected that the fifth
generation of the wireless mobile network will impact the society in huge amount. It will change
the lifestyles of the people. In this report, the various generations of the technologies have been
compared regarding the various aspects like the various techniques that are involved for
modulation, the spectrum involved for the communication, the mechanisms that are involved in
the medium access control, usability of the bandwidth, network speed, security techniques and
risks is performed. The architecture has also been discussed. The main goal of 5G is to provide a
strong network connection to the clients and thus all identified network coverage issues should
be resolved as soon as possible which will increase the efficiency of the network connection.

11WIRELESS NETWORK TECHNOLOGY
References
[1] Zhang, J., Zhang, X. and Wang, W. Cache-enabled software defined heterogeneous networks
for green and flexible 5G networks. IEEE Access, 4, pp.3591-3604, 2016.
[2] Yang, Y., Xu, J., Shi, G. and Wang, C.X. 5G Wireless Systems. Springer Nature, 2018.
[3] Andrews, J.G., Buzzi, S., Choi, W., Hanly, S.V., Lozano, A., Soong, A.C. and Zhang, J.C.
What will 5G be?. IEEE Journal on selected areas in communications, 32(6), pp.1065-1082,
2014.
[4] Rodriguez, J. ed. Fundamentals of 5G mobile networks. John Wiley & Sons, 2015.
[5] Bhushan, N., Li, J., Malladi, D., Gilmore, R., Brenner, D., Damnjanovic, A., Sukhavasi, R.T.,
Patel, C. and Geirhofer, S. Network densification: the dominant theme for wireless evolution into
5G. IEEE Communications Magazine, 52(2), pp.82-89, 2014.
[6] Costa-Pérez, X., Swetina, J., Guo, T., Mahindra, R. and Rangarajan, S. Radio access network
virtualization for future mobile carrier networks. IEEE Communications Magazine, 51(7), pp.27-
35, 2013.
[7] Hasan, M., Hossain, E. and Niyato, D. Random access for machine-to-machine
communication in LTE-advanced networks: Issues and approaches. IEEE communications
Magazine, 51(6), pp.86-93, 2013.
[8] Sharma, P. Evolution of mobile wireless communication networks-1G to 5G as well as future
prospective of next generation communication network. International Journal of Computer
Science and Mobile Computing, 2(8), pp.47-53, 2013.
References
[1] Zhang, J., Zhang, X. and Wang, W. Cache-enabled software defined heterogeneous networks
for green and flexible 5G networks. IEEE Access, 4, pp.3591-3604, 2016.
[2] Yang, Y., Xu, J., Shi, G. and Wang, C.X. 5G Wireless Systems. Springer Nature, 2018.
[3] Andrews, J.G., Buzzi, S., Choi, W., Hanly, S.V., Lozano, A., Soong, A.C. and Zhang, J.C.
What will 5G be?. IEEE Journal on selected areas in communications, 32(6), pp.1065-1082,
2014.
[4] Rodriguez, J. ed. Fundamentals of 5G mobile networks. John Wiley & Sons, 2015.
[5] Bhushan, N., Li, J., Malladi, D., Gilmore, R., Brenner, D., Damnjanovic, A., Sukhavasi, R.T.,
Patel, C. and Geirhofer, S. Network densification: the dominant theme for wireless evolution into
5G. IEEE Communications Magazine, 52(2), pp.82-89, 2014.
[6] Costa-Pérez, X., Swetina, J., Guo, T., Mahindra, R. and Rangarajan, S. Radio access network
virtualization for future mobile carrier networks. IEEE Communications Magazine, 51(7), pp.27-
35, 2013.
[7] Hasan, M., Hossain, E. and Niyato, D. Random access for machine-to-machine
communication in LTE-advanced networks: Issues and approaches. IEEE communications
Magazine, 51(6), pp.86-93, 2013.
[8] Sharma, P. Evolution of mobile wireless communication networks-1G to 5G as well as future
prospective of next generation communication network. International Journal of Computer
Science and Mobile Computing, 2(8), pp.47-53, 2013.

12WIRELESS NETWORK TECHNOLOGY
[9] Dahlman, E., Parkvall, S. and Skold, J. 4G: LTE/LTE-advanced for mobile broadband.
Academic press, 2013.
[10] Liyanage, M., Ahmed, I., Ylianttila, M., Santos, J.L., Kantola, R., Perez, O.L., Itzazelaia,
M.U., de Oca, E.M., Valtierra, A. and Jimenez, C., 2015, September. Security for future software
defined mobile networks. In 2015 9th International Conference on Next Generation Mobile
Applications, Services and Technologies (pp. 256-264). IEEE.
[11] Gupta, A. and Jha, R.K. A survey of 5G network: Architecture and emerging technologies.
IEEE access, 3, pp.1206-1232, 2015.
[12] Huo, Y., Dong, X. and Xu, W. 5G cellular user equipment: From theory to practical
hardware design. IEEE Access, 5, pp.13992-14010, 2017.
[13] Wang, C.X., Haider, F., Gao, X., You, X.H., Yang, Y., Yuan, D., Aggoune, H.M., Haas, H.,
Fletcher, S. and Hepsaydir, E. Cellular architecture and key technologies for 5G wireless
communication networks. IEEE communications magazine, 52(2), pp.122-130, 2014.
[14] Ku, I., Lu, Y. and Gerla, M. Software-defined mobile cloud: Architecture, services and use
cases. In 2014 international wireless communications and mobile computing conference
(IWCMC) (pp. 1-6). IEEE, 2014, August.
[15] Schneider, P. and Horn, G. Towards 5G security. In 2015 IEEE Trustcom/BigDataSE/ISPA
(Vol. 1, pp. 1165-1170). IEEE, 2015, August.
[16] Tehrani, M.N., Uysal, M. and Yanikomeroglu, H. Device-to-device communication in 5G
cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine,
52(5), pp.86-92, 2014.
[9] Dahlman, E., Parkvall, S. and Skold, J. 4G: LTE/LTE-advanced for mobile broadband.
Academic press, 2013.
[10] Liyanage, M., Ahmed, I., Ylianttila, M., Santos, J.L., Kantola, R., Perez, O.L., Itzazelaia,
M.U., de Oca, E.M., Valtierra, A. and Jimenez, C., 2015, September. Security for future software
defined mobile networks. In 2015 9th International Conference on Next Generation Mobile
Applications, Services and Technologies (pp. 256-264). IEEE.
[11] Gupta, A. and Jha, R.K. A survey of 5G network: Architecture and emerging technologies.
IEEE access, 3, pp.1206-1232, 2015.
[12] Huo, Y., Dong, X. and Xu, W. 5G cellular user equipment: From theory to practical
hardware design. IEEE Access, 5, pp.13992-14010, 2017.
[13] Wang, C.X., Haider, F., Gao, X., You, X.H., Yang, Y., Yuan, D., Aggoune, H.M., Haas, H.,
Fletcher, S. and Hepsaydir, E. Cellular architecture and key technologies for 5G wireless
communication networks. IEEE communications magazine, 52(2), pp.122-130, 2014.
[14] Ku, I., Lu, Y. and Gerla, M. Software-defined mobile cloud: Architecture, services and use
cases. In 2014 international wireless communications and mobile computing conference
(IWCMC) (pp. 1-6). IEEE, 2014, August.
[15] Schneider, P. and Horn, G. Towards 5G security. In 2015 IEEE Trustcom/BigDataSE/ISPA
(Vol. 1, pp. 1165-1170). IEEE, 2015, August.
[16] Tehrani, M.N., Uysal, M. and Yanikomeroglu, H. Device-to-device communication in 5G
cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine,
52(5), pp.86-92, 2014.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13WIRELESS NETWORK TECHNOLOGY
1 out of 14
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.