What is the Best, 5G or WiFi 6?

Wi-Fi 6 and 5G Convergence Wi-Fi 6 and 5G expand opportunities for digitization across all industries They offer complementary functionalities. The user experience is concerned, and 5G and Wi-Fi 6 can achieve gigabit speeds and low latency. They introduce the new era of wireless access. Their convergence enables organizations to do business anywhere while increasing […]

In Simple Words, What is 5G ?

I like this definition from the CTIA report: 5G is the Innovation Platform 5G is the next generation of wireless. It’s more than just an evolutionary step forward technologically. It’s a revolutionary leap. These wireless networks, rolling out in communities across the country, will be transformative—making our lives better, our communities safer, and our nation […]

What is Open RAN?

Open RAN is an open radio access network (RAN) architecture standardized by the O-RAN Alliance based on 3GPP and other standards. O-RAN Alliance’s RAN functional split is based on the three key tenets: Decoupling of hardware and software. Cloud infrastructure. Standardized and open interfaces between the network function.

What Is The Importance Of C-RAN?

In brief, C-RAN or Centralized RAN is to moving the BBU to a central office. This logical step is possible due to the fact that optical fibers are available between the antenna site and central office. Here when we’re talking about BBU or Baseband Processing Unit we mean the brain of the cell site. The […]

What are 5G NR Release 15 Technologies?

5G New Radio (NR) 3GPP is defining 5G NR in Release 15, with an initial release for a non-standalone operation scheduled for March 2018 and a full release for a standalone version scheduled for September 2018. 5G New Radio Release 15 Focus: 5G NR Release 15 features: Ability to operate in any frequency band, including […]

What Is The Latency Difference between 5G SA and 5G NSA?

The latency of the idle-to-active procedure in NSA is larger than in SA. The different latencies come from signaling differences in the architecture. In NSA, to transition from idle to an active state, the UE first performs an idle-to-active procedure in LTE, which serves as the MN. Once connected, the UE connects to the NR through […]

What is the difference between 4G & 5G Network Slicing?

🛢Network slicing in 4G networks has been provided in the limited form of isolating a service within a common infrastructure (e.g., Access Point Name (APN) Routing, Multi-Operator Core Network (MOCN), and Dedicated Core Network (DECOR)). 🛢In 5G Network, network slicing will allow carriers to create virtual data pipelines for each of its data type services, […]

What are Open RAN Interfaces?

Open RAN Interfaces 🛢High Layer Split (HLS) between Centralized Unit (CU) and Distributed Unit (DU) has been specified by #3GPP. 🛢Each individual functional entities DU, CU-UP, and CU-CP entities may be placed at different physical locations according to operator requirements. 🛢The definition of HLS has introduced two new interfaces. F1/ E1 interface for gNode B (gNB)/gNB-CU […]

What are Open vRAN deployment models?

There are different Open vRAN deployment models, bring clear flexibility and adaptability to networks, so that different use case requirements can be addressed dynamically and provide a more efficient and rapid response to business requirements. The 3GPP model for 5G architecture relying on Open interfaces together with RAN virtualization, allows an optimized deployment of DU/CU, […]

What is the role of GPS clock in a LTE system?

LTE Requires Synchronization And Standards Support In LTE deployments, network synchronization is key and solutions need to meet the rigorous timing and delivery requirements that ensure network quality and availability. Of course, synchronization technology and standards are necessary to support LTE deployments, and various synchronization options are available. “Synchronization” refers to the technique applied to […]

What is Bidding Down in 5G?

One of the threats that face any cellular technology is Bidding Down or Service Degradation. What is Bidding Down? Hackers can use IMSI-impersonating devices to execute DoS attacks, but that’s not all these devices can do. They can also use their status as trusted network nodes to carry out “man in the middle” attacks, where they […]