So what is 5G?

Issue 1 2020 Infrastructure

Wikipedia describes 5G as “the fifth generation wireless technology for digital cellular networks that began wide deployment in 2019. As with previous standards, the covered areas are divided into regions called ‘cells’, serviced by individual antennas. … The frequency spectrum of 5G is divided into millimetre waves, mid-band and low-band. Low-band uses a similar frequency range as the predecessor, 4G.”

Hi-Tech Security Solutions asked Nokia’s Deon Geyser for more on this new technology that has created enormous expectations.

What is 5G and why is it getting so much attention?

5G transformation is much more than a radio network upgrade challenge. While 5G New Radio is clearly important to the network buildout, 5G requires a much more comprehensive approach. 5G involves E2E technology (radio, core, cloud, high bandwidth and programmable transport, management, automation, BSS, security, and more), business and people capabilities. Nokia as the industry leader can help on all these fronts, so that operators deliver the extraordinary potential of 5G to their customers and their stakeholders.

5G will change the game for everyone. It will transform business models and create new revenue streams for enterprises. It will revolutionise the way consumers interact with the world around them and create opportunities for mobile operators to deliver extraordinary experiences.

There are several use cases for 5G, ranging from video surveillance and analytics, machine remote control, assisted and autonomous vehicles, and cloud robotics and process automation to name a few.

There is talk of health risks associated with 5G, are these valid?

For Nokia, product safety is a key consideration. All Nokia products, including 5G, comply with established international exposure standards and regulations. Those exposure limits are based on extensive reviews of research publications covering the radio spectrum used for 5G.

What benefits will we see from a 5G rollout? What challenges will there be?

5G technology has enormous potential to transform the way people live and work as well as transform multiple sectors. 5G will provide ultra-high bandwidth and low-latency services, as well as new applications in areas such as virtual reality, augmented reality and artificial intelligence. Energy, healthcare, education, transport, and entertainment sectors will benefit from various IoT use cases enabled by 5G. These use cases will enhance operational efficiencies and user experiences.

Africa is as capable of embracing the huge potential of this technology as the rest of the world, even within the limitations of existing infrastructure and complex connectivity challenges. Industries have adopted 2G, 3G and 4G in incremental steps as these technologies have evolved within the constraints of legacy technologies and capabilities. Now, 5G is introducing an opportunity for the industry to embrace growth and innovation. But only if it is done with a clear focus on what 5G can realistically deliver and a clear eye on the future.

As far as challenges are concerned, to capitalise on 5G, the industry has to re-architecture the networks because new services will not only be about high bandwidth but also about low latency. The future is about ensuring that systems and solutions are ‘always on’ and intelligent, providing industry verticals with the ability to fully recognise the capabilities of automation.

It has become clear that great 5G runs on top of great 4G. In non-standalone architectures, the 5G control information goes through the LTE eNodeBs and the throughput can tap the resources of 5G and 4G through dual connectivity. This means that if you have the best performing 4G network, you are already ahead of the game in 5G.

What about the security of 5G?

The challenging nature of 5G networks to support unique and diverse business requirements of various sectors has rendered current network security less than adequate. In 5G networks, reliability does not only refer to the network infrastructure but also to ensuring high connectivity, infinite capacity and coverage (and other promised 5G features) anytime and anywhere. This implies a security makeover of how confidentiality, integrity, and availability will be maintained and managed in 5G networks. Furthermore, the complexity of securing a network has increased due to the introduction of SDN and NFV in 5G networks.

Nokia’s end-to-end security solutions help mitigate these security risks in a three-step process. We collaborate with 3GPP and other specification bodies to influence the security requirements, which are then implemented into all our products by our DFSEC (Design For Security Process).

Lastly, we have a wide range of network security solutions and services that help operators to automate and orchestrate the security requirements by consolidating network security requirements into a single operations view via our SOAR (security, orchestration, analytics, and response) approach. It leverages our best-in-class global threat intelligence repository and automated workflow management to help CISOs and CIOs develop end-to-end visibility and control of their security operations which will become far more critical as the adoption of 5G accelerates.

Will the security market (intrusion monitoring, surveillance, etc.) benefit from 5G communications?

Yes, it will. For example, wireless video surveillance is a cost-effective way to enhance safety and security in industrial sites, campuses and public spaces. It’s also increasingly popular.

Wireless broadband makes it possible to mount cameras on drones and land-based vehicles, or in places that are difficult to reach with fixed cables. These cameras can provide footage that enhances situational awareness and decision making for a variety of industries. For example, drone-mounted cameras can help first responders address fires or natural disasters more effectively. They can enable terminal operators to inspect container ships before they reach the port. Or allow wind farm operators to detect problems before they cause costly turbine outages.

The addition of video analytics creates more valuable applications. In factory environments, video analytics can enhance quality, security and efficiency by enabling automatic fault detection, intrusion detection and control of robots.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
The hidden cost of cheap networking gear
Duxbury Networking Infrastructure
When it comes to building a network, price is always a consideration, especially in the current economic climate, but there is a difference between smart spending and short-term savings with long-term losses.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
Fastest PCIe Gen 5.0 NVMe SSD
Products & Solutions Infrastructure
Sandisk has unveiled the WD_BLACK SN8100 NVMe SSD with PCIe Gen 5.0 technology, an internal SSD delivering speeds up to 14 900 MB/s and capacities up to 4 TB, with 8 TB solutions available soon.

Read more...
Unified storage solution
Products & Solutions Infrastructure
CASA Software has announced the local availability of Nexsan’s upgraded unified storage solution, Unity NV4000, which is ideal for mixed workloads, from virtualisation and video surveillance to secure backup and recovery.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
Power surges are killing our networks
Duxbury Networking Infrastructure
With power surges and lightning strikes becoming an all-too-familiar threat to South African infrastructure, Duxbury Networking is calling on local installers and network integrators to follow proper grounding protocols.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.