Showing posts with label 4G. Show all posts
Showing posts with label 4G. Show all posts

Monday, November 15, 2021

Should I Upgrade My Existing Security System?

Should I Upgrade My Existing Security System? 

A security system is designed to do one thing: keep you, your property, and those you care about safe. However, if you are using a security system that is ten or more years old, it may not be able to provide you with the level of security you want or need. Not only are older systems susceptible to malfunction, but since they are less sophisticated than systems available today, they put you at risk of malicious activities by tech-savvy thieves.

Unsure how to decide whether it is time for your upgrade? Below are three reasons that you should consider installing a new security system today!

Here are four signs it is time to upgrade your security system:

1. Dated technology
Security systems are not a once-in-a-lifetime investment. Like any piece of technology that you purchase, they have to be frequently updated and maintained to optimize their functionality. Your security system is like a phone — it requires periodic investment and replacement over time, not to mention that since technology changes so quickly, your device could soon become obsolete.

2. Alarm safety
Before the days of wireless data, security systems were operated via land lines with wires that could be easily manipulated by unwanted intruders. Luckily, since modern alarm systems operate using cellular transmitters to send and receive messages, they provide a safer alternative for homeowners.

At Video, Intrusion or Fire Monitoring in India, we have partnered with Netra Monitoring to provide customers with specialized Interactive Alarm Monitoring services, including home automation, remote arming and disarming, thermostat control, video surveillance and much more. Unlike an outdated security system, the Alarm Monitoring service feature can be managed centrally for one location or multiple locations through an app on your iPhone, iPad, or Android-powered device.

Your safety is of the upmost importance, but with Netra Monitoring, it doesn’t have to be an inconvenience.

3. Transmission
The biggest reason security systems become obsolete is that technology becomes outdated. Since most modern security devices use the same towers as cellphones to send and receive alerts, it is most likely that the reason your product will be unusable is that, much like a cell phone, the network it uses to operate is no longer available.

The good news is that there is often quite a bit of overlap in what networks are available. For instance, 2G technology is being phased out, but 3G, 4G, and 5G are still available and often work interchangeably.

What is great about a system that works on this kind of network is that while 2G will soon be unavailable, you don’t have to replace your entire system to still use it. Often, you will need to replace a small component to keep it running.

4. Protecting Your Investment
The best way to ensure that you are getting the most out of your investment is to purchase your new security system from a company that is dedicated to making your experience with their product the best one possible. At Fire Monitoring at India, we perform regular service and maintenance on your products and make sure you are informed of any upgrades that your system requires and technology changes or your system ages.

We think of keeping an alarm system up-to-date as being similar to maintaining a car. Just because your car gets old doesn’t mean it is useless — if something breaks, you fix it and keep on driving. By working with one of our technicians, you will get more life out of your equipment than you ever imagined and be able to enjoy the safety you deserve for years to come.

When your security system becomes an afterthought – and eventually an outdated afterthought – it leaves your building vulnerable.

Netra Monitoring installs custom-designed, scalable, user-friendly usable commercial intrusion alarm systems, and we feel that even the least experienced user will be able to use our systems with the proper training. Netra Monitoring also work for Central Alarm Monitoring with Video Verification services in India.



Wednesday, September 1, 2021

IoT is future of Video Technology

IoT is future of Video Technology 

The Internet of Things is about connecting network-enabled devices and exchanging data between them. This offers great potential for improving processes wherever information needs to be exchanged securely and quickly. It enable devices and add much more value than they have had so far. For this, there is no better example than security cameras. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose.

Acting alongside other sensors, such as motion or smoke detectors, security cameras have been in use for a long time, however without being connected to each other through data networks. Growing demands for smart video surveillance in public spaces, commercial buildings, public transport and other areas and the rise of IoT will drive for the further integration of these cameras systems. Let's see how video surveillance has evolved to this day and where the journey is heading.

The past: standard security surveillance systems

Closed-circuit television systems (CCTV) have demonstrated that they can do what they're supposed to: give humans a better eyesight on the security situation in order to reduce security incidents. CCTV cameras can only show and record video footage and not much more beyond that. As they do not understand what they are watching, they are also unable to do anything about it.

To fight theft, violence, vandalism or fire effectively, cameras must be able to detect and interpret such incidents by themselves. They must also have the capability to cooperate with other systems, such as alarm systems.

This is where the Internet of Things comes into play. It connects network-enabled cameras with other devices and systems that perform other tasks and turns security surveillance into smart safety and security management.

Video surveillance systems built the largest segment in our country. That’s why today modern camera systems are widely used in many areas of life, retail, commercial buildings, stadiums, transportation and public spaces in cities.

Security cameras frame the next technological step in the security surveillance evolution…

The future: smart security surveillance

The times when video surveillance systems only deliver video that must be continuously observed by humans are over. Machines able to record and analyse video data in one go are already available, and they can provide security managers with deep insights instead of single pieces of information.

This will significantly improve security and security-related processes in many areas and industries by enabling faster and more insightful response to any sort of incidents.

Future security surveillance essentially combines 3 technologies that will completely change the game: computer vision, automation and deep-learning, driven by powerful processors and apps on cameras in the IoT. Let's take a quick look at these technologies.

Data is the new digital oil

All these devices at their most basic, simply collect data. This information is used to streamline, manipulate and measure the way you interact with the world. From your online habits to your physical day-to-day routine – every single thing you do or don’t do is, or will very soon be, monitored.

In the case of connected ‘things’ – now known as ‘smart devices’ due to their ability to collect and transmit information – each one sends bytes of data over the internet to an application that interprets and collates that data into valuable insights. Your service provider and the product manufacturer can then use those insights to achieve a variety of objectives – from improving the device’s performance, and your experience of using it, to identifying how or when they should be selling you extra services or products.

What precisely is connecting all of these IoT things

2G, 3G and 4G are terms that we all know and understand well but how about radio, Wi-Fi, NB-IoT or LPWAN? There are various types of connectivity that can underpin the Internet of Things and these latter ones are arguably the most widely used outside of pure cellular connectivity.

When we talk about the ‘internet of things’ it’s not immediately clear which type of ‘internet’ connectivity we’re referring to because many devices are now being designed to intelligently select the connectivity that best suits its needs, based on the following three things:

Power consumption – How much power does the device or sensor need to operate?
Range – Does it need to connect and send data over great distances?
Bandwidth – Will it transmit small or large amounts of data e.g. low bandwidth and high bandwidth?

Two of the most commonly utilised connectivity networks are:

Cellular

Most of us are very familiar with cellular connectivity as it is used around the world to connect our mobile phones to the internet. IoT devices also use cell towers to connect to a cellular network. Cellular connectivity is prolific, has excellent range and the capacity to send high volumes of data over the network but uses a lot of power and, therefore, is not ideal for IoT devices which don’t have access to an immediate power supply and need a long battery life to operate over long periods of time, for instance in rural or agricultural areas.

LPWAN

‘LPWAN’ stands for Low-Power Wide-Area Network, which is a type of radio technology and is so far one of the most ideal connectivity networks available to IoT sensors that are deployed in areas where there is a lack of range. These devices are usually battery-powered and send very small packets of data over the network. This connectivity is ideal when it comes to monitoring utilities such as water, gas and electricity using smart meters and for farming and agriculture to check on water quality, sensing soil moisture and tracking livestock.

Computer Vision

Computer vision is becoming smarter because of more sophisticated algorithms, faster devices, larger networks and access to a wider range of data sets through IoT. This allows machines to “see” and analyze in real time.

“Deep Learning and general AI techniques within computer vision, makes possible what would be impossible to do by the naked eye.” - Matt Candy, Global leader for IBM’s iX creative solutions.

Example: Detect fire and smoke within seconds

Many threats, such as smoke, are difficult for the human eye to detect in videos, especially in poor lighting conditions. Seconds later, however, a fire may have broken out. Security cameras equipped with smoke and fire detection can alert at an early stage and activate the proper safety measures without any human assistance.

Source: Bosch Security Systems

Automation

Speed plays an important role in safety and security. The faster you react to security incidents, the greater the chance of preventing or at least reducing damage. In case of theft in a store, every second counts, because criminals may disappear before security personnel can intervene.

Standard security surveillance via CCTV wastes valuable time because reaction paths between machines and human operators are too long. Smart cameras take a shortcut by saving staff from interpreting videos. They immediately deliver notifications or initiate appropriate actions themselves.

Example: Detect and catch thieves in retail

The "AI Guardman" security camera helps shopkeepers identify potential thieves in time. Software installed on the camera scans live video streams and analyzes the poses of any person it can see. This data is automatically matched against predefined "suspicious" behavior. When it sees something remarkable, it alerts onsite personnel via app for double checking.

Deep learning

“Cameras capture the video, but video analytics captures the value.” (IBM)

Using computers for video analysis is not a new idea. However, there is a problem that slows the development of video analytics: mobile video made on drones or vehicles is full of dynamic variables that can confuse even the most intelligent computers. That's why many companies and startups are working on smart systems using self-learning algorithms.

Deep learning is a machine learning method based on artificial neural networks. Video analytics, which gives security cameras the ability to analyze video data on board, is one application of deep learning. Another application is automation, which embeds video analysis into processes.

The good thing about deep learning is that developers of video analytics apps for security cameras don't have to reinvent the wheel themselves. There are already sophisticated frameworks that simplify developing deep learning models, such as Google's Tensorflow, Microsoft’s Custom Vision and IBM’s PowerAI Vision.

Example: Training object recognition using IBM’s PowerAI Vision

To determine whether workers are complying with safety regulations such as wearing helmets, security cameras need to know what helmets look like. In case a person is not wearing a helmet, a camera could react and alert. This is what a simplified training process looks like…

Source: IBM

Flood Management Assistance

As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem.

Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure?

Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event.

Environmental Control Assistance

Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. 

But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary.

Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security.

Roadway Management & Parking Assistance

Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes.

They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database.

With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders.

Shopper Experience Assistance

In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings.

With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience.

For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked.

Capturing Business Intelligence

Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup.

They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns.

Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping.

A Natural Cross-Over Technology

This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond.

IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.


Saturday, July 9, 2016

Bandwidth Basics for IP CCTV Design

Bandwidth Basics for IP CCTV Design

When using IP cameras, Megapixel cameras, NVRs or even DVRs, understanding the basics about how much bandwidth is available and how much is needed is critical in planning, designing and deploying IP video surveillance systems. Copper Ethernet wiring (typically Cat-5, Cat-5e, Cat-6 or Cat-7) have a practical length limitation of 100 meters (or about 300 feet) between devices. To accommodate longer-length wired network connections, fiber can be used. 
This article is focused for a non-IT audience such as security managers, electronic technicians, sales and marketing folks.

How Much Bandwidth is Available?
To figure out how much bandwidth is available, you first need to determine what locations you are communicating between. Much like driving, you will have a starting point and destination. For example, from your branch office to your headquarters. However, unlike driving, the amount of bandwidth available can range dramatically depending on where you are going.

The most important factor in determining how much bandwidth is available is whether or not you need connectivity between two different buildings.

For instance:
In the Same Building: 70Mb/s to 700 Mb/s of bandwidth is generally available
In Different Buildings: .5 Mb/s to 5 Mb/s of bandwidth is generally available
The amount of bandwidth available going from your office to a co-worker's office in the same building can be 200 times more than the bandwidth from your office to a branch office down the block.
This is true in 90% or more cases. Note the following exceptions:
If these are different buildings but on the same campus, more bandwidth may be available.
If you are in a central business district of a major city, more bandwidth may be available.
If you are a telecommunications or research company, more bandwidth may be available.


Different Buildings
The key driver in bandwidth availability is the cost increase of deploying networks between buildings. Generally referred to as the Wide Area Network or WAN, this type of bandwidth is usually provided by telecommunications companies. One common example is cable modem or DSL, which can provide anywhere from 0.5 Mb/s to 5 Mb/s at Rs. 3000 to Rs. 5000 per month. Another example is a T1, which provides 1.5Mb/s for about Rs. 8000 to Rs. 16000 per month. Above this level, bandwidth generally becomes very expensive.

Many talk about fiber but fiber to the building is not and will not be widely available for years. Fiber to the home or to the business promises to reduce the cost of bandwidth significantly. It is very expensive to deploy and despite excited discussions for the last decade or more, progress remains slow.


Same Buildings
By contrast, bandwidth inside of buildings (or campuses) is quite high because the costs of deploying it are quite low. Non technical users can easily set up a 1000Mb/s networks inside a building (aka Local Area Networks or LANs) for low installation cost with no monthly costs. The cost of deploying networks in buildings are low because there are minimal to no construction expenses. When you are building a network across a city, you need to get rights of ways, trench, install on telephone poles, etc. These are massive projects that can easily demand millions or billions of dollars in up front expenses. By contrast, inside a building, the cables can often by quickly and simply fished through ceilings (not the professional way to do it but the way many people do it in deployments).


A lot of discussion about wireless (WiMax, WiFi, 3G, 4G etc) exists but wireless will not provide significantly greater bandwidth nor significantly better costs than DSL or cable modem. As such, wireless will not solve the expense and limitations of bandwidth between buildings. That being said, wireless absolutely has benefits for mobility purposes and connecting to remote locations that DSL or cable modem cannot cost effectively serve. The point here is simply that it will not solve the problem of bandwidth between buildings being much more expensive than bandwidth inside of buildings.


How Much Bandwidth Do IP Cameras Consume?
For the bandwidth consumption of an IP camera, use 1 Mb/s as a rough rule of thumb. Now, there are many factors that affect total bandwidth consumption. You can certainly stream an IP camera as low as 0.2 Mb/s (or 200 Kb/s) and others as high as 6 Mb/s. The more resolution and greater frame rate you want, the more bandwidth will be used. The more efficient the CODEC you use, the less bandwidth will be used.
For the bandwidth consumption of a Megapixel camera, use 5 Mb/s to 10 Mb/s as a rough rule of thumb. Again, there are a number of factors that affect total bandwidth consumption. A 1.3MP camera at 1FPS can consume as little as 0.8 Mb/s (or 800 Kb/s) yet a 5 megapixel camera can consume as much as 45 Mb/s.



What Does this Mean for my IP Video System?
Just like dealing with personal finance, we can now figure out what we can 'afford':
Between Buildings: We have 0.5 Mb/s to 5 Mb/s to 'spend'
Inside Buildings: We have 70 Mb/s to 700 Mb/s to 'spend'
IP cameras: Cost us 1 Mb/s each
Megapixel cameras: Cost us 5 Mb/s to 10 Mb/s each



Using these points, we can quickly see what combination of IP and megapixel cameras we can use between buildings or inside of buildings.
Inside of buildings, it is easy to stream numerous IP and megapixel cameras.
Between buildings, it is almost impossible to stream numerous IP and megapixel cameras.
Because of this situation, the standard configuration one sees in IP Video systems is:
A local recorder at each building/remote site. The local recorder receives the streams from the building and stores them.


The local recorder only forwards the streams (live or recorded) off-site when a user specifically wants to view video. Rather than overloading the WAN network with unrealistic bandwidth demands all day long, bandwidth is only consumed when a user wants to watch. Generally, remote viewing is sporadic and IP video coexists nicely with the expensive Wide Area Network.

The local recorder has built-in features to reduce the bandwidth needed to stream video to remote clients. Most systems have the ability to reduce the frame rate of the live video stream or to dynamically reduce the video quality to ensure that the video system does not overload the network and that remote viewers can actually see what is going on the other side. Generally, the live video stream is sufficient to identify the basic threat. In any event, bandwidth is generally so costly, especially the upstream bandwidth needed to send to a remote viewer, that this is the best financial decision.

Thursday, December 17, 2015

Differences H.265 and H.264

Differences between H.265 and H.264



A codec is an encoder and a decoder. An encoder compresses audio or video so it takes up less disk space. A decoder extracts audio or video information from the compressed file. Video and audio compression is a complex technical process, but the basic aim of a codec is quite straightforward:

(a) Reduce the size of the compressed media file as much as possible, but...(b) Keep the quality of the decoded audio and video as good as possible.

What is H.264?
H264 (aka MPEG-4 AVC) is currently a mainstream video compression format. It is widely used in Blu-ray discs, internet sources like videos in YouTube and iTunes Store, web software, and also HDTV broadcasts over terrestrial, cable and satellite.

What is H.265?
H.265 (also known as HEVC, short for High Efficiency Video Coding, developed by the Joint Collaborative Team on Video Coding (JCT-VC)) is a video compression standard whose predecessor is H.264/MPEG-4 AVC. H.265 HEVC ensures to deliver video quality identical to H.264 AVC at only half the bit rate, including better compression, delicate image and bandwidth saving. It Support up to 8K, Support up to 300 fps. It is likely to implement Ultra HD, 2K, 4K for Broadcast and Online (OTT).

H.265 vs H.264: Differences between H.265 and H.264

In general, H.265 has several big advantages over H.264, including better compression, delicate image and bandwidth saving. For more detailed differences, please read H.265 vs H.264 comparison table.

4 pcs 2MP IP cameras for 1 month, stream: 4096Kbps. 
H.264 IP camera need 42G×4×30=5T=1×3T+1×2T, so need 1 pc 3T and 1pc 2T HDD. 
H.265 IP camera need 21G×4×30=2.5T, so need 1 pc 3T HDD only, save at least 1 pc 2T HDD cost. 

Wednesday, April 30, 2014

What are the actual speeds of GPRS, EDGE, UMTS, HSPA, etc in Video Surveillance?

What are the actual speeds of GPRS, EDGE, UMTS, HSPA, etc in Video Surveillance?

Theoretical maximum speeds of 4G LTE reach 100Mbps so you’re Video is Real time and no buffering... However, actual performance of mobile data is much lower, considering signal strength, frequencies used, congestion, etc.


Here are the real-life speed ranges of the various mobile wireless standards commonly used in the India today:-


GSM (Global System for Mobile Communications) 2G -- 9Kbps
GPRS (General packet radio services) 2.5G -- 20Kbps to 100kbps
EDGE (Enhanced Data rates for GSM Evolution) 2.75G -- 100Kbps to 175Kbps
UMTS (Universal Mobile Telecommunications System) 3G -- 175Kbps to 1Mbps
HSPA (High Speed Packet Access / software upgrade to UMTS, theoretical 42Mbps) 3.5G -- 600Kbps to 10Mbps, averages 1-3Mbps
WiMAX/LTE "4G" (theoretical 100Mbps) -- 3Mbps to 10Mbps average, 20Mbps+ peak download speeds.
5G -- 250Mbps to 500Mbps in South Korea & Japan on 2014

So select your Mode for traveling path of Video Surveillance data.

3G/4G Video Surveillance Advantages
  • 3G/4G Performance = faster upload speeds = higher frame rates & better resolution
  • Connect multiple Wired and Wireless IP cameras to 1 LAN-Cell
  • Bandwidth Management features to prioritize video traffic
  • Port Mapping, Redirection & DMZ features to minimize changes to camera configuration
  • Dynamic DNS support to access cameras by name or IP address
  • Deploy a single platform on CDMA & GSM networks worldwide

Wednesday, January 23, 2013

Analysis and Comparison of 1G, 2G, 3G, 4G, 5G and 6G Telecom Services

Until the controversial spectrum scams were brought up in the lime light many were ignorant of what 1G, 2G or 3G stood for and all of a sudden a hike was found out amongst laymen so as to be knowledgeable about it. Still a number of people are unaware of 1G or 2G when the world has moved on to 4G.

The telecommunication service in World had a great leap within a last few year. . 6 billion people own a mobile phones so we are going to analyze the various generations of cellular systems as studied in the evolution of mobile communications from 1st generation to 5th generation .Now almost all the service providers as well as the customers seek for availing these 3G and 4G services.

We can analyze that this could be due to increase in the telecoms customers day by day. In the present time, there are four generations in the mobile industry. These are respectively 1G the first generation, 2G the second generation, 3G the third generation, and then the 4G the forth generation. Ericson a Swedish company is launching this high tech featured mobile into the market. It is being first introduced in the Swedish Capital city, Stockholm.

Present Status of Telecommunication Services in Asian Countries

Now we are in the midst of 4G. In China, the 3G service came into existence only by last February. Therefore, that it may take time for exposing to other states. But we should also realize many other countries such as the Asian countries were using these services since last decade. Due to these reasons, we can hope that the 4G may enter within a few years. The 3G (Third Generation) had also reached India recently. There is no doubt that within a few years India will be the first in telecom users also.

What is 2G ?

Second Generation (2G) wireless cellular mobile services was a step ahead of First Generation( 1G) services by providing the facility of short message service(SMS) unlike 1G that had its prime focus on verbal communication. A typical 2G G.S.M network service ranges from 800/900MHz or 1800/1900 spectrum. The bandwidth of 2G is 30-200 KHz.

Let us examine what these 3G & 4G have rather than that of 1G and 2G.

Analysis of 1G and 2G services

In 1G, Narrow band analogue wireless network is used, with this we can have the voice calls and can send text messages. These services are provided with circuit switching. Today’s the usual call starts from the beginning pulse to rate to the final rate. Then in case of 2G Narrow Band Wireless Digital Network is used. It brings more clarity to the conversation and both these circuit-switching model.

Both the 1G and 2G deals with voice calls and has to utilize the maximum bandwidth as well as a limited till sending messages i.e. SMS. The latest technologies such as GPRS, is not available in these generations. But the greatest disadvantage as concerned to 1G is that with this we could contact with in the premises of that particular nation, where as in case of 2G the roaming facility a semi-global facility is available.

2.5 Generation

In between 2G and 3G there is another generation called 2.5G. Firstly, this mid generation was introduced mainly for involving latest bandwidth technology with addition to the existing 2G generation. To be frank but this had not brought out any new evolution and so had not clicked to as much to that extend.

What is 3G Generation

But to overcome the limitations of 2G and 2.5G the 3G had been introduced. In this 3G Wide Brand Wireless Network is used with which the clarity increases and gives the perfection as like that of a real conversation. The data are sent through the technology called Packet Switching .Voice calls are interpreted through Circuit Switching. It is a highly sophisticated form of communication that has come up in the last decade.

In addition to verbal communication it includes data services, access to television/video, categorizing it into triple play service. 3G operates at a range of 2100MHz and has a bandwidth of 15-20MHz. High speed internet service, video chatting are the assets of 3G.

How is 2G different from 3G?


  • In comparison to 2G customers will have to pay a relatively high license fee for 3G.
  • The network construction and maintenance for 3G is much expensive than 2G.
  • From the point of view of customers, expenditure will be excessively high if they make access to various facets of 3G.

What is Packet Switching

This is actually done by supplying various addressed packets, which will be interconnected to have the conversation. It is not necessary to create a new dedicated path for sending the data. It had been modified in such a way that the data can be send through any path; hence, this data will be received at a less time as compared to that of voice calls.

Packet Switching in Computer networks

The data packs are also used in computer that is when we connected with internet this data pack helps to download the web pages that is being displayed in the monitor. For a Data Pack it does not need any separate path for downloading or displaying any objects in the computer or any other equipment. This is due to the reason that by networking, separate paths are being created and after analyzing each, the data are being transferred to the correct access point.

Main 3G Services

With the help of 3G, we can access many new services too. One such service is the GLOBAL ROAMING. Another thing to be noted in case of 3G is that Wide Band Voice Channel that is by this the world has been contracted to a little village because a person can contact with other person located in any part of the world and can even send messages too. Then the point to be noted is that 3G gives clarity of voice as well can talk with out any disturbance. Not only these but also have entertainments such as Fast Communication, Internet, Mobile T.V, Video Conferencing, Video Calls, Multi Media Messaging Service (MMS), 3D gaming, Multi-Gaming etc are also available with 3G phones.

Main 4G Features

When It is still to estimate as to how many number of people have moved on from 2G to 3G , technology has come up with the latest of its type namely 4G.A successor of 2G and 3G, 4G promises a downloading speed of 100Mbps and is yet to shower its wonders on. then with the case of Fourth Generation that is 4G in addition to that of the services of 3G some additional features such as Multi-Media Newspapers, also to watch T.V programs with the clarity as to that of an ordinary T.V. In addition, we can send Data much faster that that of the previous generations.

What is the reason for delay in implementing 3G and 4G Mobile services?

It is very sad to say that the 3G services had only reached with in some towns of china, so that it may take time to reach to Other countries. Another major defect of this is that Wide Band Frequency Spectrum, which is needed for 3G, is lacking. Another reason for this is that it a cost bearing item especially for sending data. So for us it is a higher one which could be used only by upper classes. If it should be accepted among all customers, firstly it should be availed at a lower rate, for which the rate of spectrum should be declined.

What is 5G Technology

5G Technology stands for 5th Generation Mobile technology. 5G mobile technology has changed the means to use cell phones within very high bandwidth. User never experienced ever before such a high value technology. Nowadays mobile users have much awareness of the cell phone (mobile) technology. The 5G technologies include all type of advanced features which makes 5G mobile technology most powerful and in huge demand in near future.

The gigantic array of innovative technology being built into new cell phones is stunning. 5G technology which is on hand held phone offering more power and features than at least 1000 lunar modules. A user can also hook their 5G technology cell phone with their Laptop to get broadband internet access. 5G technology including camera, MP3 recording, video player, large phone memory, dialing speed, audio player and much more you never imagine. For children rocking fun Bluetooth technology and Piconets has become in market.

What is 6G technology ?

1. Increase performance and maximize your data throughput and IOPS
2. Protect your system and secure your data
3. Ease your service and build efforts and expand your data center configuration options

The 6G technology haven't been fully revealed yet but the search phrases like what is 6g mobile technology, 6G technology, 6G mobile, 6G network, 6G wiki, 6G technology ppt are getting more familiar with new mobile technology getting evolved. The Google hot trends has rated the term 6g as the 17th most searched word in the search engines. iPod nano 6G is available in 8GB and 16GB versions and carries the price tag of $149 and $179 respectively.