An Overview of 5G Wireless Cellular Technologies

G technology stands for fifth Generation Mobile technology. From generation 1G to 2G and from 3G to 5G this world has revolutionized by improvements of wireless network. This revolution brought up some drastic changes in our social life .This paper also focuses on all preceding generations of mobile communication along with fifth generation technology. Fifth generation network provide cost-effective broadband wireless connectivity (very high speed), which will be probably 1gigbit per second Speed. The paper throws light on network architecture of fifth generation technology. Currently 5G term is not officially used. Fifth generation negotiate on (Voice over IP) VOIP-enabled devices that user will get a high level of call volume and data transmission. Fifth generation technology will be done all the requirements of customers who always want advanced features in cellular phones. The main features in 5G mobile network is that user connect to the multiple wireless technologies at the same time and can switch between them. This forthcoming mobile technology will support IPv6 and flat IP. Fifth generation technology will offer the services like Documentation, supporting electronic transactions (e-Payments, e-transactions) etc. Index Terms— 5G, 5G Architecture, Evolution from 1G to 5G, Comparison of all Generations.

[1]  Shahzad Khan,et al.  Applications, limitations, and improvements in visible light communication systems , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).

[2]  Fazlullah Khan,et al.  An Innovative Approach to Investigate Various Software Testing Techniques and Strategies , 2016 .

[3]  Shahzad Khan,et al.  Performance improvement in wireless sensor and actor networks based on actor repositioning , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).

[4]  Xiangjian He,et al.  A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[5]  Farman Ullah,et al.  Survey: Dealing Non-Functional Requirements at Architecture Level , 2016 .

[6]  Kenji Nakagawa,et al.  Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[7]  Muhammad Safdar,et al.  Request-Response Interaction Model in Constrained Networks , 2016 .

[8]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[9]  Farman Ullah,et al.  A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.

[10]  Deepak Puthal,et al.  ADCS: An adaptive data collection scheme in vehicular networks using 3G/LTE , 2014, 2014 International Conference on Connected Vehicles and Expo (ICCVE).

[11]  Hashim Ali,et al.  Enhanced and Effective Learning through Mobile Learning an Insight into Students Perception of Mobile Learning at University Level , 2016 .

[12]  Nazia Azim,et al.  EEC : Evaluation of Energy Consumption in Wireless Sensor Networks , 2016 .

[13]  Hanafy M. Ali,et al.  COMPARATIVE STUDY OF ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS , 2018 .

[14]  B. P. S. Sahoo,et al.  Cloud Computing Features, Issues, and Challenges: A Big Picture , 2015, 2015 International Conference on Computational Intelligence and Networks.

[15]  Abdelkrim Haqiq,et al.  Secure Communication and Routing Architecture in Wireless Sensor Networks , 2014 .

[16]  Xiangjian He,et al.  PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.

[17]  Deepak Puthal,et al.  Cross-layer architecture for congestion control in Vehicular Ad-hoc Networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[18]  Fahim Arif,et al.  Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[19]  Nazia Azim,et al.  Offsite 2-Way Data Replication towards Improving Data Refresh Performance , 2016 .

[20]  F. Khan,et al.  Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.

[21]  Iftikhar Ahmad,et al.  A New Robust Video Watermarking Technique Using H.264/AAC Codec Luma Components Based On DCT , 2016 .

[22]  Sameerchand Pudaruth,et al.  PEOPLE FACTORS IN AGILE SOFTWARE DEVELOPMENT AND PROJECT MANAGEMENT , 2012 .

[23]  Fazlullah Khan Fairness and throughput improvement in multihop wireless ad hoc networks , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).

[24]  Kenji Nakagawa,et al.  B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks , 2012 .

[25]  Muhammad Babar,et al.  Applications and Challenges Faced by Internet of Things - A Survey , 2016 .

[26]  Sher Afzal Khan,et al.  Delay and throughput performance improvement in wireless sensor and actor networks , 2015, 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW).

[27]  Xiangjian He,et al.  PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..