So what is 5G?

Issue 1 2020 Infrastructure

Wikipedia describes 5G as “the fifth generation wireless technology for digital cellular networks that began wide deployment in 2019. As with previous standards, the covered areas are divided into regions called ‘cells’, serviced by individual antennas. … The frequency spectrum of 5G is divided into millimetre waves, mid-band and low-band. Low-band uses a similar frequency range as the predecessor, 4G.”

Hi-Tech Security Solutions asked Nokia’s Deon Geyser for more on this new technology that has created enormous expectations.

What is 5G and why is it getting so much attention?

5G transformation is much more than a radio network upgrade challenge. While 5G New Radio is clearly important to the network buildout, 5G requires a much more comprehensive approach. 5G involves E2E technology (radio, core, cloud, high bandwidth and programmable transport, management, automation, BSS, security, and more), business and people capabilities. Nokia as the industry leader can help on all these fronts, so that operators deliver the extraordinary potential of 5G to their customers and their stakeholders.

5G will change the game for everyone. It will transform business models and create new revenue streams for enterprises. It will revolutionise the way consumers interact with the world around them and create opportunities for mobile operators to deliver extraordinary experiences.

There are several use cases for 5G, ranging from video surveillance and analytics, machine remote control, assisted and autonomous vehicles, and cloud robotics and process automation to name a few.

There is talk of health risks associated with 5G, are these valid?

For Nokia, product safety is a key consideration. All Nokia products, including 5G, comply with established international exposure standards and regulations. Those exposure limits are based on extensive reviews of research publications covering the radio spectrum used for 5G.

What benefits will we see from a 5G rollout? What challenges will there be?

5G technology has enormous potential to transform the way people live and work as well as transform multiple sectors. 5G will provide ultra-high bandwidth and low-latency services, as well as new applications in areas such as virtual reality, augmented reality and artificial intelligence. Energy, healthcare, education, transport, and entertainment sectors will benefit from various IoT use cases enabled by 5G. These use cases will enhance operational efficiencies and user experiences.

Africa is as capable of embracing the huge potential of this technology as the rest of the world, even within the limitations of existing infrastructure and complex connectivity challenges. Industries have adopted 2G, 3G and 4G in incremental steps as these technologies have evolved within the constraints of legacy technologies and capabilities. Now, 5G is introducing an opportunity for the industry to embrace growth and innovation. But only if it is done with a clear focus on what 5G can realistically deliver and a clear eye on the future.

As far as challenges are concerned, to capitalise on 5G, the industry has to re-architecture the networks because new services will not only be about high bandwidth but also about low latency. The future is about ensuring that systems and solutions are ‘always on’ and intelligent, providing industry verticals with the ability to fully recognise the capabilities of automation.

It has become clear that great 5G runs on top of great 4G. In non-standalone architectures, the 5G control information goes through the LTE eNodeBs and the throughput can tap the resources of 5G and 4G through dual connectivity. This means that if you have the best performing 4G network, you are already ahead of the game in 5G.

What about the security of 5G?

The challenging nature of 5G networks to support unique and diverse business requirements of various sectors has rendered current network security less than adequate. In 5G networks, reliability does not only refer to the network infrastructure but also to ensuring high connectivity, infinite capacity and coverage (and other promised 5G features) anytime and anywhere. This implies a security makeover of how confidentiality, integrity, and availability will be maintained and managed in 5G networks. Furthermore, the complexity of securing a network has increased due to the introduction of SDN and NFV in 5G networks.

Nokia’s end-to-end security solutions help mitigate these security risks in a three-step process. We collaborate with 3GPP and other specification bodies to influence the security requirements, which are then implemented into all our products by our DFSEC (Design For Security Process).

Lastly, we have a wide range of network security solutions and services that help operators to automate and orchestrate the security requirements by consolidating network security requirements into a single operations view via our SOAR (security, orchestration, analytics, and response) approach. It leverages our best-in-class global threat intelligence repository and automated workflow management to help CISOs and CIOs develop end-to-end visibility and control of their security operations which will become far more critical as the adoption of 5G accelerates.

Will the security market (intrusion monitoring, surveillance, etc.) benefit from 5G communications?

Yes, it will. For example, wireless video surveillance is a cost-effective way to enhance safety and security in industrial sites, campuses and public spaces. It’s also increasingly popular.

Wireless broadband makes it possible to mount cameras on drones and land-based vehicles, or in places that are difficult to reach with fixed cables. These cameras can provide footage that enhances situational awareness and decision making for a variety of industries. For example, drone-mounted cameras can help first responders address fires or natural disasters more effectively. They can enable terminal operators to inspect container ships before they reach the port. Or allow wind farm operators to detect problems before they cause costly turbine outages.

The addition of video analytics creates more valuable applications. In factory environments, video analytics can enhance quality, security and efficiency by enabling automatic fault detection, intrusion detection and control of robots.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.