6G Network

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

An Analysis of Future Generation

Technology: 6G Networks
N.Karthika M.C.A.,M.Phil., Dr.D.Kavitha M.C.A.,M.Phil.,Ph.D.
Asst.Professor, Asst.Professor,
Department of Computer Applications, Department of Computer Applications,
KG College of Arts and Science, KG College of Arts and Science,
Coimbatore. Coimbatore.
karthika.n@kgcas.com d.kavitha@kgisliim.ac.in

ABSTRACT

The world of mobile communications has experienced an evolution as a result of wireless communication. In recent
years, the sector of wireless and mobile communication has seen an increase in demand. Since the widespread development
of 4G networks, wireless and communication have played a critical role in the information exchange system. The entire
world is moving toward the 5G system right now, and a few nations are currently implementing it. Research has started on
the development of the 6G system, that won't be completed until 2027- 2030. The 5G network will be available in India by
the end of 2021 or in 2020.This study reviews how wireless communication will be used in the future with regard to 6G
technology.6G technology provide height safety, confidentiality, seclusion, in height frequency speediness, capability,
perfection, trust ability system rules, etc.

Key Words: Radio message, portable transmission, corporeal connections, three -dimensional routes, 5G and 6G.

INTRODUCTION bandwidth is supported. Major contributors were NMT,


TACS, and AMPS (Advanced Mobile Phone System),
In the area of portable transmission, wireless which stayed originally introduced through the US NMT
communication consumes ushered in innovative change. and TACS.
In recent years, the sector of wireless and mobile
communication has seen an increase in demand. Data is Tough conferrals, a deficiency of refuge and secrecy
transferred across a long distance using wireless declarations, and meagre broadcast effectiveness stand
technology without the requirement of an interface. only a few of the drawbacks of the 1G system. The lack
Mobile communication began with various 0G generator of encryption in phone services prevents data
to 4G generation until the advent of 5G technology. transmissions and phone conversations from being.

Every eight to ten years, it has been shown, mobile Since phone services are not encrypted, neither the
phone technology is enhanced. This essay will highlight security nor confidentiality of data transmission or
a few crucial improvements to the 5G technology. We telephone conversations can be guaranteed. As a result,
anticipate the introduction of 6G portable transmission there are substantial safety and privacy concerns that the
innovation everywhere 2030.The 6G expertise offers a entire network and its users need to cope with, such as
ton of opportunity for creative research and development cloning, eavesdropping, and unauthorized access.
because it will utilize rebel-elevated-tempo information
system with a large exposure zone. This study will 2) 2G Technology
explain how 6G technology will benefit various networks
in the future. cellular networks, which had several clear
advantages over analog networks. Digital modulation
1) 1G Technology methods like Time Division Multiple Access (TDMA)
and Code Division Multiple Access (CDMA), which may
In the 1G system introduced in the 1980s with a support both voice and short message services, are the
focus on voice services. It was analog system based. foundation of the 2G network. GSM (Global System for
Frequency Division Multiplexing was employed. Mobile Mobile Communications) is the furthermost important
phones (also known as mobile radios), cellular sites, and besides usually castoff portable transmission usual in 2G.
mobile switching centers (MSCs) are the three It goals to rise organization security to that of a PSTN
fundamental components of analog cellular systems. A (Public Switched Telephone Network). Anonymity,
radio system with ubiquity that can link to the Public authentication, signaling protection, and user data
Switched Telephone Network (PSTN) is created by protection are some of its security and privacy offerings.
combining these three components. Up to 2.4kbps of
Encryption is also used for signaling and user data with wireless interface attacks: 1) Unauthorized access to
protection, and the Subscriber Identity Module (SIM) has data; 2) Integrity threats 3) DOS 4) Illegal entree toward
a significant impact on the encryption keys. Radio route service area. The majority of secrecy concerns remain
encryption and Temporary Mobile Subscription Identity allied to certain sorts of assaults, like AKA error
(TMSI) are the two main strategies for protecting users' messages, which are intended to destroy user identities
privacy. and sensitive or secret data.

2G dais digital organizations to built for small 4) 4G Technology


supremacy ingesting, the cost of the telephone and other
tools is lower. Environmentally friendly digital 2010, the fourth generation of wireless technology,
transmissions Mobile network operators may implement or 4G, was created. LTE (Long Term Evolution), which
messages that are brief via cellular phones with the help offers data rates of up to the term "4G technology" refers
of digital data services. Data and voice communications to data rates of up to 500 Mbit/s uplink and up to 1 Gbit/s
are now private and secure thanks to digital encryption, downlink. In order to provide freedom of movement and
which also uses digital multiplexing to fit multiple calls continuous roaming from one technology to another, 4G
into the identical quantity of band. technology coordinates a number of existing and
emerging radio machineries, with "OFDM,MC-
The significant privacy and refuge advancements CDMA,LAS-CDMA and Network-LMDS". Considered
ended 1G&2G immobile consumes several flaws. Single 4G technologies include LET (“Long-Term evolution”)
significant refuge concern is that verification is one- and WI-MAX(“Wrieless Interoperability for Microwave
way, leaving security gaps because users cannot Access”).
authenticate networks but the network can only
authenticate people. Base stations and other illegal Applications for 4G technology are being created
devices can pose as legitimate network members in order to leverage a 4G network, These include radio wideband,
to trick users and steal their data. Multimedia Messaging Service(MMS),Video
Chat,Mobile Television,HDTV content and Digital
3) 3G Technology Video Broadcast (DVB). The next-generation wide-area
cellular radio, or 4G, is a research project with structures
The 2G networks serve as the foundation for the 3G similar
system's security. The incorporation of GSM and other
components into 2G proved to be vital, and stronger 1.4G is a theoretical basis besides argument opinion for
security measures also needed to be employed. In order the desires of a high-velocity radiocommunication
to enable "high-speed" data transmission and internet system in the future.
access, which is defined as at least 2 Mbps, the 3G
network first appeared in 2000. Although modern 2. It provides internet and cellphone multimedia services.
services like online browsing, TV streaming, and
streaming video might not be supported by 1G and 2G 3. According to principle, 4G would offer up to 1Gbps to
connections at this speed.The upgrade services such as fixed devices and 100Mbps to wandering mobile devices
portable transmission, GPS and audiovisual panel are worldwide.
enabled by 3G technologies. Third generation
4. Known as the "WWW: World Wide Wireless Web,"
smartphones offer fast data transfer at 144 kbps and
4G will deliver almost flawless real-world wifi.
more.
The Medium Access Control (MAC) layer location
The 3GPP, enables the provision of user network
monitoring, Denial of Service (DoS) occurrences,
authentication, which ensures the physical reliability of
information veracity occurrences, unauthorized usage of
users and both sides of the network, as well as an
handlers and mobile devices and other threats are
extensive security system that governs access. Air
additionally possible on the LTE networks. The
interface security is primarily used to protect users and
additional drawbacks of 4G are that it needs more battery
the signalling information transmitted by wireless
power and that implementing the next-generation
connections. For 3G users, the 3GPP includes subscriber
network requires costly technology and is difficult.
privacy criteria such confidentiality of user identification,
location, and traceability. 5) 5G Technology
The Internet Protocol (IP) circulation besides The newest cellular mobile communication
encoding secrets continue to pose a threat to the 3G generation, 1.5G, debuted in the late 2010s. High data
networks, though. Additionally, a variety of assaults can rates, low latency, energy efficiency, cost savings,
be launched via the wireless communication among the increased organization dimensions and widespread
service network and the terminal equipment. Which of expedient affinity are the goals of 5G concert. The
the following categories best describe threats associated
World Wide Web (WWW) will be the primary emphasis run, potentially causing more harm. Viruses, hardware
of 5G. It is an unrestricted, full wireless communication. dais interfering, operating system vulnerabilities, etc .are
typical instances.
In most technology sectors, 5GB communication
systems aim to boost their respective capabilities through 7) Applications of 6G Technology
the aspect of 10-100 over the preceding group of
message schemes. Massive machine type 1) Web of Everything
communications (mMTC), ultra-Reliable and Low
Latency Communications (uRLLC) and enhanced mobile The World Wide Web of Everything (WoE) is the
broadband (eMBB) are just a few of the features that 5G seamless integration and autonomous collaboration of a
networks will offer; The network design, specifically the large number of computing units and sensors, objects or
3 layers of the planning to entree systems, the backload devices, people, processes and data.With its
nets and the essential systems—can possibly best be used revolutionary goals for WoE, 5G is reshaping the current
to segment the security and privacy challenges in 5G mobile communication infrastructure. But 5G is seen as
networks. the start of the Internet of Everything and handles a
number of issues, from standards to
It is important for us to simultaneously anticipate commercialization.The 6G network resolve fully support
the communication needs of the future data society as WoE.The thing is essentially a subset of the Internet of
well as begin Concept and technological research for a Everything, an umbrella concept that unifies the four
new generation of mobile communication systems, even aspects of information, persons, procedures and physical
though 5G is still in the early stages of being deployed on objects in a single frame.
on a commercial scale, which means that the relevant
technical specifications need to be further refined and the While network intelligence is introduced to connect
IoT business model and vertical industrial application all people, data, process and physical things into single
scenarios need to be studied more thoroughly. In this organization, WoE is mainly round the real strategies or
paper, we attempt to evaluate the need for the idea and items talking with one another. WoE is utilized for smart
technological studies on the next generation of mobile societies, including smart industries, automobiles, and
communication systems, also known as 6G, from three health. One of the key requirements for extensive IoE
perspectives. connection in 6G is the deployment of energy-efficient
sensor nodes. Wide range exposure ( 20 km) interacting
A number of factors, including data, delay, through protracted mobile lifetime(>10 year)and
liveliness efficacy, distribution expenses, dependability inexpensive distribution expenses is something that Low-
and computer hardware density, are traded off in 5G Power extensive Area Networks (LPWAN) . The ability
technology. The next 5G communication technologies to provision. LPWAN hence takes part in the majority of
will offer considerable advancements over the current IoE use cases commercially. The 6G communication
systems, however after ten years they won't be intelligent characteristics of uMUB, uHLSLLC, and UHDD can
to meet the needs of newly emergent intellectual and support this applicatio
automated organizations.
2) Long-Term Reality
6) 6G Technology
The 6G communication systems must provide
The 6G radiocommunication organization will Extended Reality (XR) services, such as Augmented
need to be created through innovative alluring Reality (AR), Mixed Reality(MR) and Virutal Reeality
characteristics in order to get over the limitations of 5G (VR). These features all rely on AI and 3D objects as
for supporting new problems. The fusion of all previous their primary driving forces. In addition to meeting the
features, including system compaction, in height perceptual needs of computers, human perception,
quantity, in height dependability, small enegry ingesting, storage, senses and physiology, 6G will bring fully
and broad connection, will be the primary drivers of immersive AR/MR/VR experiences through integrated
6GTrends from previous generations, including new joint design. The ability to perform human-to-human and
services with the adoption of new technology,would also thing-to-thing communications is accelerated by
be carried over to the 6G system. wearable technology's cutting-edge features such as XR
facilities, high-definition imaging and holograms, and the
The new services come with artificial intelligence, five senses of communication.Without regard to time or
smart wearables, implants, self-driving cars, virtual location, cutting-edge entertainment and business
reality gadgets, sensors, and 3D mapping. The ability to services including gaming, watching, and sports are
handle extremely large volumes of data is an especially offered.
crucial requirement for 6G wireless networks to function
properly. As mobile terminal computer and memory Virtual reality (VR) is a 3D computer-simulated
capacities advance, more malicious programmes can be experience that uses reality headsets to provide lifelike
feelings and imitate genuine environments or conjure up place at scattered sites, this is more of a distributed
fantastical ones. All five senses are activated in a genuine implementation for centralized learning and requires
VR environment. communication between the distributed clouds and a
central network manager. Furthermore, federated
A live picture of the real world that is enhanced by learning for optimization performs much worse since
different computer-generated sensor inputs such as audio, user-level updates are averaged before being sent back to
video, graphics, and Global Positioning System (GPS) the central manager.
data is known as Augmented Reality (AR). By utilizing
some form of gadget, it makes use of the current reality The 6G Mitola radio, on the other hand, seeks to
and adds to it. implement complete AI in an integrated fashion,
beginning at the device level and progressing all the way
The actual and virtual worlds are combined with MR up to the network. The thorough resolving of the
to produce fresh environments and visualizations that particular needs and restrictions of the UEs is also
allow for real-time interaction. Hybrid reality is another crucial.Game theory is anticipated to be effective even
term for itThe ability for artificial and real content to though it is not always an optimization strategy since the
react to each other in real time is an important aspect of needed optimization has some similarities to players
MR. playing in a game.

All mixed real and virtual environments, as well as A fully distributed learning mechanism where
human-machine interactions enabled by wearable devices various AI agents may teach and learn from each other
and computing technology, are referred to as XR. All of by interactions is required for 6G to succeed. This
its descriptive forms including AR, VR, and MR. It mechanism will be made possible by the merging of AI
combines AR, VR, and MR into a single phrase. A true and game theory. According to our projections,
XR experience requires high data rate, low latency and communal AI that successfully combines AI and game
extremely dependable Wi-Fi network connection, all of theory would result in the true brain. According to our
which are given by the 6G system. The successful estimates, collective AI that successfully combines AI
deployment of XR apps in the future will be made and game theory would have a genuine brain power of
feasible by the 6G service, uHLSLLC. 6G.

8) 6G with Artificial intelligence (AI) 9) Project involving smart systems

AI has to be the enabling technology for 6G that is 1) Intelligent Homes: Due to the ease of integration
most certain. The use of AI in wireless network design and, in particular, the quick adoption of automated
and optimization has attracted a lot of attention in recent meters, smart energy grid has received the majority of
years, and it is generally acknowledged that AI will be a attention in the last ten years. Other utilities, though,
key component of 6G due to the development of AI have made far slower progress.IoT will soon advance and
techniques, notably deep learning and the availability of liberate all elements of homes, transforming them into
huge training data.. Although AI is only anticipated to intelligent devices. The supporting the large data rate at
operate in remote places where there are abundant home while offering safety safeguards for personal data
training data and fast computing facilities, recent will prove difficult. All of the networks needed for data-
progress has inspired AI to become a part of 5G. from intensive services will be provided by 6G. Additionally,
physical layer to network resource allocation methods 6G is anticipated to completely incorporate AI for
like traffic control and cache store management .The domestic autonomous decision-making.
channel estimation and preceding, security and
authentication, and dynamic cell To defect prediction and 2) Intelligent Networks: The enhanced capabilities of
detection, dynamic cell and topology construction, and 6G will speed the creation of smart societies that will
more. The list goes on. It is reasonable to assume that 5G enhance life quality, monitor the environment, and
will include some type of AI and that 6G will make AI a automate activities leveraging AI-based M2M
bigger element of the core technology. The most communication and energy harvesting. All of the uMUB,
effective AI methods today, deep learning, are based on uHLSLLC, mMTC, and uHDD services apply to this
deep neural networks (DNN), which require centralized application. Through the use of intelligent mobile
training. In order to manage millions and billions of end- devices, driverless cars, and other methods, 6G wireless
to-end connections globally. 6G is heading toward a connectivity will make our culture extremely intelligent.
more distributed architecture like fog-RAN. Additionally, numerous cities will deploy throughout the
world. utilizing 6G wireless technology, flying taxis.
The distributed cloud architecture limits deep Smart homes are already a reality thanks to the ability to
learning by requiring training to occur at network edges. operate any device from a distance with a command sent
Although the recently developed federated learning from a smart device.
partially resolves this issue by enabling training to take
Advantages of 6G their forerunners. By doing this, it will be easier to
guarantee that data is kept private and safe, and that
There are a number of benefits to 6G, as with any new consumers' personal information is not jeopardized.
technology. In comparison to the 5G networks, 6G
networks will offer higher speeds, lower latency, and Conclusion
more reliable connections. Users will be able to access
data more quickly and with fewer delays as a result. Every 7-8 years, wireless technology is changed, moving
Additionally, 6G will enable more users and connected from 1G to 4G technologies, and each time it does, a
devices, improving communication and data transfer. system with new features, functions, and technological
parameters is utilized. Few nations have accepted 5G,
The enhanced speed and dependability of 6G networks and they are prepared to start preparing for 6G because,
will also allow for a number of new applications that are after a number of years, possibly between 2030 and 33,
not achievable with existing networks. For instance, 6G 5G system support will be impossible for customers. It is
will make it possible to create brand-new augmented still too early to talk about the 6G's extra features and
reality and virtual reality applications as well as give functions, though there are already a number of
users direct access to robots and other machinery. companies working on some future wireless
communication initiatives.This essay provides an
Furthermore, 6G networks will employ cutting-edge overview of 6G technologies based on AI, network,
encryption technology and safety features based on applications, IoT, and benefits.
artificial intelligence, making them more secure than

REFERENCES

1. Shuping Dang, Osama Amin, Basem Shihada, Mohamed-Slim AlouinKing Abdullah University of Science and
Technology (KAUST), Thuwal 23955-6900, Saudi Arabiai,”What Should 6G Be?”, arXiv:1906.00741v3
[cs.NI] 29 Jul 2020.
2. T. Arunkumar, L. Kalaiselvi, “Latest Technology of Mobile Communication and Future Scope of 7.5
G” ,International Journal of Engineering & Technology Research Volume 2, Issue 4, July-August, 2014, pp.
23-31
3. Jasmeen Gill and Shaminder Singh, “Future Prospects of Wireless Generations in Mobile
Communication”,Asian Journal of Computer Science and Technology
ISSN: 2249-0701 Vol. 4 No. 2, 2015, pp.18-22 © The Research Publication, www.trp.org.in
4. B. Bhattacharyya and S. Bhattacharya, “Emerging Fields in 4G Technology, its Applications & Beyond-An
Overview”, International Journal of Information and Computation Technology, vol. 3, no 4, pp. 251-260, 2013.
5. S. Mondal, A. Sinha and J.Routh, “A Survey on Evolution of Wireless Generations 0G to 7G”, International
Journal of Advance Research in Science and Engineering- IJARSE, Vol. 1, Issue 2,pp. 5-10.
6. A.Gohil, H.Modi and S.K.Patel, “5G Technology of Mobil Communication: A Survey”, IEEE-International
Conference on Intelligent Systems and Signal Processing (ISSP), pp.288-292, 2013.
7. Ms. Anju Uttam Gawas, “An overview on Evolution of Mobile Wirelesss Communication Networks:
1G- 6G”,(IJRITCC),Volume 3, Issue 5, May 2015.
8. Arockia Panimalar.S, Monica.J, Amala.S, Chinmaya.V,”6G Technology”, (IRJET), Volume 04, Issue 09, Sep-
2017.
9. S.Ramkumar, “A Recent Review on growth of Mobile Generations-case study”,(ICICSS), 2018.
10. B.G.Gopal, P.G.Kuppuswamy ,” A Comparative Study on 4G and 5G Technology for Wireless
Applications”, (IOSR- JECE) ,Volume 10,Issue 6, Nov-Dec 2015.
11. Abdullah Al Mamun, Sultan Anwar, Hassan Ali, “4G to 5G Mobile Communication Networks: Features
Analysis, Comparison and Proposed Architecture”, IJCST Vol.7,Issue 2, April-June 2016
12. Ms.Lopa J. Vora, “Evolution of Mobile Generation technology: 1G to 5G and Review of Upcoming Wireless
Technology 5G”, (SJIF), Volume 02, Issue 10, 2015.
13. Swati Yadav, Sugandha Singh, “Review paper on Development of Mobile Wireless Technologies (1G to
5G)”, May- 2018.
14. V.Lakshitha, K.V.Rohith Reddy, G.Jayanth, C.JagadeeshRaju, Dr.Manikandan K, “3G, 4G, AND 5G: A
Comparative Study”, (IRJET), Volume 05, Issue 03,March-2018.
15. SagarKumar Patel, HarshadPurohit, ShivamShah,”Review On 5G Wireless Technology”, IJSRCSEIT, Volume
3,Issue 3, 2018.
16. Rahul Singh Karki, Vivek B.Garia (2016),”6G Network Mobility”,(ICAIM), 2016.
17. Harsh Shah, Sonal Fatangare,“Review on the Integration of Artificial Intelligence and 6G
Communications”,International Research Journal of Engineering and Technology (IRJET) Volume: 07 Issue:
06 | June 2020.
18. Ashish Kr. Gupta, Madan Pal Singh, “A Study of Wireless Network: 6G Technology”,©2018 IJCRT |
National Conference Proceeding NCRIETS April 6-7, 2018 , National Conference On Recent Innovation In
Emerging Technology & Science by JB Institute of Technology, Dehradun & IJCRT.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy