Showing posts with label reliability. Show all posts
Showing posts with label reliability. Show all posts

Friday, November 16, 2018

New Connectivity (JR 80)













New Connectivity (JR 80)
Introduction
5G networks are the next generation of mobile internet connectivity, offering faster speeds and more reliable connections on smart phones and other devices than ever before. Combining cutting-edge network technology and the very latest research, 5G should offer connections that are multitudes faster than current connections, with average download speeds of around 1GBps expected to soon be the norm.
The networks will help power a huge rise in Internet of Things technology, providing the infrastructure needed to carry huge amounts of data, allowing for a smarter and more connected world. With development well underway, 5G networks are expected to launch across the world by 2020, working alongside existing 3G and 4G technology to provide speedier connections that stay online no matter where you are.
5G is the fifth generation of cellular mobile communications. It succeeds the 4G (LTE/WiMax), 3G (UMTS) and 2G (GSM) systems. 5G performance targets high data rate, reduced latency, energy saving, cost reduction, higher system capacity, and massive device connectivity. The first phase of 5G specifications in Release-15 will be completed by March 2019, to accommodate the early commercial deployment. The second phase in Release-16 is due completed by March 2020, for submission to the ITU as a candidate of IMT-2020 technology The ITU IMT-2020 standard provides speeds up to 20 gigabits per second with millimeter waves of 15 gigahertz and higher frequency. The more recent 3GPP standard includes networks using the NR (New Radio) software. 5G New Radio can include lower frequencies, from 600 MHz to 6 GHz. However, the speeds in these lower frequencies are only slightly higher than new 4G systems, estimated at 15% to 50% faster
The world has witnessed an astonishingly short space of time, our ability to communicate and access information has changed beyond all recognition, unlike previous connectivity developments, speed isn’t the whole story. It is all too easy to get caught up with the hype of ever-increasing download and upload speeds. In the future, just as necessary (or maybe even more so), are the developments in low-power networks for use with the Internet of Things, where speed does not count, but energy conservation does. 
What is clear is that connectivity is evolving, both in terms of how it is delivered and how it is used. There is hardly a day that passes without tales of some new data breach. As we develop and build new business models, we must not lose sight of the need to build in security.
What 5G will mean
Here are some of the key differentiators that 5G will provide to future wireless connectivity:10x decrease in latencyLatency will be as low as 1ms.
10x increase in connection density This will enable more efficient signaling for IoT connectivity.3x spectrum efficiency; More bits per Hz will be achieved with advanced antenna techniques; 100x traffic capacityThis will drive network hyper-densification with more small cells everywhere; 10x experienced throughput Multi-Gbps peak rates will be achieved with uniformity; 100x network efficiency Network energy consumption will be optimized through more efficient processing.
The switch to 5G will mean longer battery life for devices, lower costs, enhanced cellular footprints, higher throughput, enhanced capacity, low latency, and virtually no packets dropped.

Specifications
4G and LTE networks will continue to improve but they will eventually reach the limit of what they are capable of delivering in terms of data throughput. Recently, Qualcomm unveiled its Snapdragon X24 LTE modem, the announcement of a chip that can deliver up to 2Gbps. 5G is expected to cast its shadow over these speeds by bringing in three new perks to the table.
·         Higher maximum speeds (5G networks will be able to move a lot of data in a matter of seconds)
·         Lower latency (more responsiveness is always a good thing and we will talk about this in a while)
·         Connecting more devices in unison (for IoT and other smart devices)
5G is not just going to be important for smartphones and tablets, but for other real-world applications, which will get to in a second.    5G connectivity will be based on several new technologies that will serve as the foundation of the next-generation wireless networking standard
Technologies That Will Form the Backbone of 5G Connectivity
 Smart phones and other connected devices rely on high-powered cellular towers to remain functional and broadcast their signals over longer distances. Millimeter waves, which 5G connectivity will be working through to broadcast signals cannot travel long distances. The solution is to use Small cells are low-powered base stations that are going to be deployed in thousands of numbers and transmit millimeter waves. They can also be deployed on light poles and building rooftops. The more small-cell towers you have, the better the performance of the network.

Best of all, these do not require as much power as those massive radio towers, so power consumption will be significantly reduced. These small cell towers will also be able to form a web of broadcasting signals when placed in close proximity, so there is no signal degradation. This is going to play a pivotal role in developed cities, where the infrastructure thanks to adjacent buildings is massive. When a user moves around with his or her cell phone, the device will switch from one small cell base station to another so that there is no loss in performance or signals.
Millimeter waves: Most of the devices you see around you operate on very specific frequencies on the frequency operating spectrum. Smart phones and other electronics typically function below 6GHz but here is where the problem lies. These products are being used in a higher number and as more and more devices are being activated and coming line, they crowding the frequencies falling under the 6GHz spectrum. Carriers can only push through a certain amount of data on the same frequency spectrum. As more and more devices become online, you will definitely be seeing slower services and higher connection losses, which is why opening up more frequencies is very important.
As a result, researchers are figuring out ways to broadcast on shorter waves called millimeter waves. These waves fall in the 30-300GHz spectrum. Since this range has never been used for a variety of electronics including smart phones, it would make perfect sense to use these as more bandwidth will be available for users. Unfortunately, here is where the downside of millimeter waves begins to materialize. These waves cannot penetrate through solid structures such as buildings and will often be absorbed by plants, trees and also rain. To get around this technology, small cell base stations will be the answer (information given above) and will need to set up in lots of numbers to overcome this problem
Massive MIMO (Multiple-input Multiple-output): Your typical 4G radio tower features approximately 10-12 ports for antennas that are responsible for handling cellular traffic. Massive MIMO base stations will be able to support over a 100 of these ports, meaning that these stations will be able to handle a significant amount of cellular traffic. As always, a brand new form of technology has its drawbacks.

Incorporating a lot of these ports on Massive MIMO base states will mean that signals are going to be broadcast in all directions, and this can also lead to a loss of signal performance. In other words, these antennas are going to be broadcasting the signal in all directions, which is also known as omni-directional. This is how beam forming is going to change everything and result in smoother performance
Beamforming: Instead of throwing signals in all directions, which is also known as omni-directional, base stations will broadcast a signal in one single direction. This will help to maximize the distance for each user, prevent interference with other signals and it is far more efficient when it comes to wireless networking performance. This approach is called beam-forming and lots of high-end wireless router manufacturers employ this specific technology in their products to maximize wireless networking performance as well
Full duplex: Current cellular base stations can only receive and transmit signals at a time. They cannot commit to doing both things simultaneously. Think of this operation as a walkie-talkie scenario, where two people need to take turns in sending and receiving data. This is where full duplex is going to change things. It will be able to re-route data in such a manner where receiving and transmitting data will be done nearly at the same pace, making things a lot more efficient and faster.

5G Connectivity speeds

According to the latest specifications, 5G will have a maximum throughput of 20Gbps on the downlink side, and up to 10Gbps on the uplink side. This potentially means that you will be able to download a Full HD movie in a matter of seconds, but that is if we were living in a perfect world. The aforementioned speeds are theoretical, so we could realistically see 100Mbps per user, which is still faster than any LTE standard we’ve seen till now.
Latency
 Speed is not the only thing that is important here; latency is too. The latency role is going to be playing an important factor when it comes to IoT, autonomous vehicles, and more. 5G is reportedly going to be working at a latency of 1ms, and autonomous vehicles can take advantage of this. For example, if the vehicle needs to make an immediate decision while it is connected to 5G, the latency will allow it to make the decision much faster. A higher latency will mean that the car will take longer to receive data to perform a specific function and that could mean a potential accident.
The same thing can be applied to connected devices and appliances if and when they finally connect to the 5G network. There are other benefits of having 5G officially getting rolled out, and they have been listed below.
·         A 1000 times bandwidth per unit area
·         10-100 connected devices
·         Around 99 percent availability
·         100 percent coverage
·         90 percent reduction in network energy usage
·         Up to 10-year battery life for low power devices

  5G Connectivity advantages

  There are several advantages of having a 5G connectionare  th listed below.
·         Faster download and upload speeds
·         Smoother streaming of online content
·         Higher-quality voice and video calls
·         More reliable mobile connections


 Capability
Over the next five years, the next generation of wired and wireless connectivity, characterized, in particular, by (5G) fifth generation mobile networks, full-fiber broadband and satellite internet technology is widely touted by industry and observers for its potential to deliver a step change in connectivity and its capabilities. Enthusiasts for 5G—in truth a broad marketing label for several mobile technologies that will evolve, in time, into the next-generation telecommunication standard—promise a tenfold increase in wireless speeds that could, in some cases, make wired infrastructure redundant. But, critically, next-generation connectivity is characterized not just by speed but by its other attributes, such as greater capacity and low- latency, effectively instantaneous connections that promise to enable such applications as driverless car technology, remote surgery and sophisticated real-time drone management.

Aided, too, by large-scale satellite arrays, ubiquitous connections between devices anywhere in the world could deliver the infrastructure that a truly global Internet of Things requires. Such connectivity promises to enable sensor-laden buildings and cities, transform transport infrastructure, facilitate asset tracking across the globe and extend smart electricity grids to remote areas.
Impacts on Industries

Equipped with next-generation connectivity, business leaders have the opportunity to rethink the ways they do business, to reduce inefficiencies, reach new audiences, better serve existing ones and open up new revenue streams. They also face new competitive threats and risks.
The overall pace of change is blistering— but the anticipation and adoption of next-generation connectivity is affecting industries in different ways and at different rates.
Capital-intensive, “physical” sectors such as energy, real estate and transport have been historically slower to adopt digital connectivity to the same extent digital industries have, but expect significant advances from next-generation connectivity.  Connectivity will become more important to businesses in the next five years. Connectivity is also regarded as being “strategically important” to businesses over the next five years, with the energy and transport sectors being the most bullish in this respect. Next-generation connectivity is enabling new technologies, including autonomous vehicles.

Security, data protection and privacy concerns present notable barriers to the adoption of greater connectivity.   Security concerns are very or extremely likely to lead business to avoid or withdraw from greater connectivity in some cases, a sentiment particularly pronounced in the energy and utilities sector. 
Throughout history, connectivity and prosperity have been intrinsically linked. From early road systems and seaports, through to railroads and telephone lines, wherever infrastructure has existed to connect people, communities have thrived.
In recent decades, the internet has supercharged global connectivity—and the pace of its expansion has been extraordinary. The internet has not just transformed the  way that people connect to each other, but it has also quickly become vital to the way that businesses organise themselves and sell their products and services. It has presented new business model possibilities, and opened up new industries or upended existing ones, as demonstrated by the likes of companies from Spotify to Uber. Digital platforms are now the basis for seven of the world’s ten largest companies by market capitalization.
Internet traffic volumes will continue to grow. In part this is because connectivity has extended its reach to include a vast range of physical objects that up the fabric of our lives . In the age of internet of things (IoT) connected buildings , vehicles and infrastructure such as utilities networks bristle with sensors , actuators , meters and other devices that use connectivity to report on their status  and respond as data are collected .

Preparing for 5G

Harnessing the benefits of next-generation connectivity will require investment, strategic initiatives, new partnerships, and redesigned business processes and even business models.  . Consumers have come to expect that they can order a book online using their smart phone but pick it up at a bricks-and-mortar bookstore. The retailer can check the inventory and locate the item in their warehouse, track the truck that delivers it to the store and then alert the customer of its availability. In other words, connectivity makes a huge amount of digital information relating to the physical availability and location of an item available to both buyer and seller.
A New Norm
As the physical and digital worlds have converged, this combination has rapidly become the new normal in business. Businesses rely on the combination of physical and digital processes,  This reliance is only set to grow.  Businesses expect to see greater interconnectivity between the physical and digital worlds in five years’ time and a further third expect it to be significantly greater
The IoT is a huge driver of this convergence. Companies are already adding low-cost electronic devices to previously unconnected physical items to allow those items to connect to the internet and communicate, including products from domestic appliances to goods in transit. This enables insights to improving the wellbeing and productivity of occupants. IBM’s cloud-based Maximo platform is providing Sodexo with real-time data analysis across 2.5m assets in buildings that the company manages worldwide.
IoT-fuelled connectivity opens the doors to a number of other key trends that in turn present new opportunities. For a start, IoT devices create huge volumes of data that, once analyzed, can provide insights into business performance and customer behavior, and clues as to how efficiencies might be achieved. They can also help pinpoint likely sources of untapped demand. Four out of five respondents say they see data analytics as a source of new opportunity between now and 2023.
 Businesses see particular opportunities to be gained from augmented, virtual and mixed reality, as mobile devices and connected headsets are used to overlay views of the physical world with data. For example, prospective new tenants of an office or residential building that is under construction can use augmented reality (AR) to inspect the site and see their view of it overlaid with images of how its architect envisages the final result. There are ample opportunities in media, publishing and entertainment; too digital businesses regard augmented, virtual and mixed reality as a significant opportunity for their business. When this sector was asked which industry-specific applications they regarded as the most significant for their business, the enhanced ability to deliver virtual and augmented reality was the most selected response, ahead of even real-time data analytics   Business  report opportunities in artificial intelligence (AI), a term that is broadly used to define computer systems that replicate a function of human intelligence and today typically referring to machine learning systems that can self- improve their outputs by reference to inputted data. Connectivity has been a key driver in generating data from a wide range of sensors, machines and devices, and next- generation connectivity will ramp up the potential for AI tools to respond immediately to real-time data. AI will be key in transport and logistics, for example, as it will enable connected vehicles and robots to navigate their surroundings autonomously, avoid collisions and learn from errors in order to refine future responses or actions.

Connecting over a number of devices and processes requires infrastructure that can support it. Taking advantage of new technology trends, such as increasingly sophisticated data analytics, will require access to new levels of connectivity for businesses—and the demands they place on that connectivity will be more exacting Autonomous vehicles are a case in point. Leaps forward in AI and cheaper sensors have made self-driving cars a near-future reality. But such technology will critically depend on next-generation connectivity for their advancement on the open road.
Autonomous vehicles must communicate with cars, smart city infrastructure and remote data centers in order to navigate roads safely and avoid collisions. Much of the technology for this exists, according to researchers from a Chinese technology company, Huawei, or soon will. However, “the most prominent missing component is a high-reliability, low-latency communications system,” the researchers write.These high-speed, low-latency links will be essential if autonomous driving systems are to mimic or improve on the split-second response times that might be seen in a human driver.

Similarly, demand for AR and VR streaming is pushing demand for connectivity that can handle large amounts of data without lag, whether for an entertainment business serving consumers games or digital health care businedd investigating the viability of remote surgical operations . For some, 5G mobile networks could provide the answer. Standards for the fifth generation of wireless technology will not be finalised until the November 2019 World Radiocommunications Conference, but the claims being made for it are impressive: lightning fast speeds, incredibly low latency and the capacity to handle massive numbers of connections simultaneously.

There is still much work to be done. In particular, service providers will need to install new antennae, base stations and fiber-optic cables. This is costly work, so many may delay until there is evidence of clear demand, and that demand is likely to be led by consumer- focused mobile broadband services rather than business use cases. For that reason,and because of the time it takes to build the infrastructure, analysts at McKinsey, a consultancy, reckon market trials and small and larger scale will continue but large scale deployment of the technology “is unlikely to take place until the early 2020s”.  
  Cost is a big issue. “For industrial companies, at least initially, the costs associated with  that kind of high-performance, low-latency connectivity might mean it does not make sense simply to connect equipment on a factory floor, because previous-generation environmental conditions prevail, satellite connectivity is proving highly valuable.

Once prohibitively expensive for most everyday applications, this technology is now maturing and extending to new business cases. At satellite connectivity provider Inmarsat, the kind of service-level agreements (SLAs) that previously appealed principally to companies in the maritime transport sector are now finding favor elsewhere. SLAs, associated with satellite adoption, guarantee the level of quality of the service provided. Satellite connectivity services are typically offered at higher SLAs, whilst cellular operators offer lower SLAs to deliver connectivity to a mass market In other words, satellite ensures reliability while cellular delivers capacity. “In the age of IoT, many organizations are finding that a mixture of the two can provide the best trade-off between service level and cost.”

Inmarsat has partnered with mobile operators including Vodafone and Jersey Telecom to offer a mix of satellite and cellular services.  In transport, for example, many companies find that a satellite provider can give them a single point of service across multiple regions, instead of forcing them to switch between multiple operators when roaming,  . This can be particularly useful for achieving a joined-up view for companies running networks of ships and trucks. This oversight, and data gleaned from it, allows businesses to operate much more efficient logistics, and to spot and fix problems more quickly.

In its niche of agriculture tech, start-up CropX sees value in the combination of cellular and satellite technology. The company’s smart soil sensors are planted in fields to communicate information about soil quality–and what it needs for crops to thrive–via a platform that farmers can access from mobile devices. This mix of cellular and satellite connectivity enables soil sensors in even the most far-flung rural locations to relay information, explains CropX’s CEO, Tomer Tzach. Farmers are typically looking for higher yields while looking to curb any unnecessary costs around irrigation and fertilizer.In this way, they are spared from having to visit sometimes very distant areas of their farms to make an assessment


No time to wait

What’s clear is that while companies are alert to the potential of next-generation connectivity, they are not waiting for new standards to be ratified or for infrastructure to be built. Instead, they are exploring the uses of connectivity that are available today.  5G, in particular, is best regarded as an “evolution of existing network technology, rather than a significant step change in capabilities”.

It makes sense for companies to focus on what they can do today,   5G is  seen as an evolution, certainly, but it’s an important evolution that will enable a couple of things. First, it will enable an environment of hyper-connectivity, so that companies can connect, concurrently, a multitude of devices or a multitude of sensors. Second, it will support very high performance, so that this multitude of devices or sensors can transfer a lot more data, faster. As with all technologies, it’ll be a case of companies trying to work out what’s possible once it’s available, trying to figure out what makes sense. Only then can new use cases emerge
 Invest in skills: by hiring new talent, investing in skills and setting up digital divisions that focus on the kinds of experimentation discussed, companies will breathe new life into their business models and introduce fresh thinking that can take them beyond tried-and-tested   approaches.
Build new partnerships: since next- generation connectivity is expected to fuel reliance among businesses on third- party data, serious conversations need to be had between business leaders on how they can open up key data systems to each other, while preserving the integrity of commercially sensitive data and the confidentiality of customer information.
 The lesson is clear. Next-generation connectivity will be of little use to those companies that have failed to take advantage of today’s connectivity. Those who truly understand its potential, by contrast, have everything to gain.

Survey
Survey results confirm that the opportunities and challenges wrought by next-generation connectivity, and perspectives on them, vary country to country. More developed countries are more likely to see connectivity more currently important than less developed countries, though just as likely to anticipate future importance. In India, respondents are highly likely to feel that 5G will be strategically important, but they also rate all barriers to adoption more highly than other countries, with particular concerns around safety and managing more complex systems.

Dutch and German businesses stand out as leading enthusiasts for next-generation connectivity: respondents from these countries are the most likely to think that connectivity is important to business and most positive about a wide range of business applications  capabilities of next-generation connectivity prompt significant opportunities for businesses, as tried-and- tested business practices, and even business models, are fit for reimagining are needed for the successful adoption of next-generation connectivity, a third of respondents agree that technology innovation will be key, and this is closely followed by business model innovation



Rethinking business models
In many product companies, greater connectivity allows for promising new business models based less on selling a piece of equipment or hardware, but charging the customer based on how they use it, through information gleaned from monitoring . A good example is Rolls-Royce, which increasingly charges customers of its aircraft engines based on miles flown. Ericsson is currently working with a manufacturer of water pumps
But within this sector, there are great variations. Today’s cars are essentially travelling computers, boasting a wide range of connections that draw in data from onboard sensors, GPS units, “infotainment” systems and mobile devices that monitor  its performance and condition.

These features have become critical features for consumers, but also helped automakers introduce new services. In the EU, as of April 2018, connectivity has been made compulsory for new cars by the eCall automated emergency call requirements, whereby location and impact sensor information is automatically relayed to emergency services in the event of a serious accident.
Connectivity
Reliable and widespread connectivity is underpinning innovation around the idea  of “Mobility as a Service” (MaaS), the  move towards using transport as a service rather than owning the mode of transport yourself. In Helsinki, for example, residents navigate and pay for travel, whether public or private transport and including suburban trains, ride-sharing services and city-centre bike shares, through one app, Whim. Asked what they regarded as the most significant applications driven in whole or in part by next-generation connectivity in the next  five years, respondents in the transport and automotive sector ranked MaaS most highly only  connecting?

Businesses do see potential roadblocks ahead in the pursuit of greater connectivity. In fact, cost and privacy concerns as well as safety concerns around, for example, the malfunction of systems   could lead some to avoid or withdraw from the pursuit of greater connectivity in some cases.

Greater connectivity leads to greater complexity, too. A vital part of preparing for next-generation connectivity will lie in behind-the-scenes work to ensure compatibility between systems so that smart products and systems are able to interconnect to deliver the best outcomes for companies and their customers.

Security

  Security concerns are very or extremely likely to lead their business to avoid or withdraw from greater connectivity in some cases, a sentiment particularly pronounced in the energy and utilities sector. Here, businesses are bullish about the potential for next-generation connectivity to fuel applications including electric vehicle infrastructure and intelligent balancing of distributed networks. But a move away from large, centralized energy production to many small, flexible energy networks, including domestic installations, and the prevalence of web-connected devices such as smart meters, brings remarkable complexity and many points of vulnerability. Opportunity for the sector is not without risk

Tackle security concerns: connected machines and devices can quickly become targets for hackers. Yet some measures that might protect these connected things are routinely neglected, such as changing default passwords and keeping on top of software upgrades. Every company that runs on connected machines, or creates them for customers, needs a disciplined approach to IoT security.

Deployment
Development of 5G is being led by companies such as Huawei, Intel and Qualcomm for modem technology and Lenovo, Nokia,Ericsson, ZTE, Cisco, and Samsung for infrastructure. AT&T is supporting the current roll-out of the 5G mobile communications generation with high frequency (HF) optimized interconnect solutions by developing and producing hybrid-printed circuit board (PCB) structures
Worldwide commercial launch is expected in 2020. Numerous operators have demonstrated 5G as well, including Korea Telecom for the 2018 Winter Olympics and Telstra at the 2018 Commonwealth Games. In the United States, the four major carriers have all announced deployments: AT&T's millimeter wave commercial deployments in 2018, Verizon's 5G fixed wireless launches in four U.S. cities and millimeter-wave deployments, Sprint's launch in the 2.5 GHz band, and T-Mobile's 600 MHz 5G launch in 30 cities. Vodafone performed the first UK trials in April 2018 using mid-band spectrum, and China Telecom's initial 5G build out in 2018 will use mid-band spectrum as well.
Beyond mobile operator networks, 5G is also expected to be widely utilized for private networks with applications in industrial IoT, enterprise networking, and critical communications.


Smart Phones future
 New handsets with new features and improved performance are being introduced, Smartphone sales are being introduced have flattened with most major markets largely saturated. The next catalyst for smart phones could be the possibilities offered by the forthcoming 5G, or fifth generation wireless networks, new form factors or advances in virtual and augmented reality.
But some analysts contend that something entirely different may supplant the smart phones, . The transition from smart phones to smart wearables and invisible interfaces — earbuds that have biometric sensors and speakers; rings and bracelets that sense motion; smart glasses that record and display information — will forever change how we experience the physical world, others  believe that the market is only pausing and the smart phone will not disappear although it might   change its shape and form factor, the mobile industry is evolving to devices with more immersive touch-less experiences, fueled by artificial intelligence, mixed reality and gesture control. New devices may also see improved biometrics such as face recognition, and changes such as foldable screens. it remains unclear what kind of device consumers will want, but that “at the end of the day is it going to look a lot like a smart phone


Conclusions
In the coming years, the newest generation of mobile connectivity – 5G – will roll out and change what is possible again. With maximum speeds up to 1,000 xs faster than 4G, this new technology will again shift consumer behavior, as well as how we view smart phones, communications, IoT, gaming, and AR/VR



 5G cyber security concerns: Apr., 2019:
 Based on cyber security concerns, the United States, Australia and New Zealand have staked out policy positions that prevent or strongly discourage the acquisition of Huawei 5G technology for use in the national communications infrastructure of these nations. Other U.S. allies have announced or are considering policy positions that do not go so far and would indeed allow such acquisition at least to some extent.
 . The pro-Huawei side argues that Huawei equipment has never been shown to be compromised, and that inspections and testing of Huawei hardware and software will prevent the implantation of vulnerabilities that would compromise their products. The anti-Huawei side argues that because Huawei is ultimately subject to the control of the Chinese government, the security of a communications infrastructure based on Huawei 5G technology depends on choices made by the Chinese government, thus placing control of a critical national infrastructure in the hands of a foreign government that poses—or at least in their view, should pose—an unacceptable security risk.
The pro-Huawei argument isn’t persuasive.   various rumors say of Huawei equipment being released in a compromised state (e.g., USB drives that contain malware), but I have seen no evidence or credible reporting to substantiate any of them.At the same time, an old saying in the intelligence community holds that “we have never found anything that the adversary has successfully hidden”—or more colloquially, the absence of evidence is not evidence of absence. If we are unsuccessful in uncovering an implanted compromise, is it because no adversary planted one or because an adversary implanted it so cleverly that our techniques were unable to detect it? Those in the intelligence community are quite aware of this analytical problem, and a risk-management strategy driven primarily by intelligence community concerns would focus on adversary intent and capabilities, essentially dismissing the fact that “nothing bad has been found.”
Perhaps more to the point is that vulnerabilities have been found in Huawei equipment and the Huawei response has been deemed wanting. For example, the Register noted that in 2013 Huawei was notified of a firmware vulnerability in certain broadband gateways that could be exploited by adversaries to gain remote access. Though Huawei reportedly patched the vulnerabilities in the specific devices mentioned in the notification, other gateways in the same series using the same firmware were not patched. When the vulnerabilities were rediscovered in those other devices some years later, Huawei then patched them.
Information technology products and services contain vulnerabilities—with respect to that reality, Huawei is really no different from any other technology vendor. Whether the failure to patch a known vulnerability demonstrates a deliberate attempt by Huawei to render certain devices vulnerable is impossible to know, though I am inclined not to believe it. But the delay in patching the other devices does suggest a Huawei failure to address cybersecurity vulnerabilities aggressively, a point consistent with the Huawei Cyber Security Evaluation Center Oversight Board’s 2019 reportdiscussing “serious and systematic defects in Huawei’s software engineering and cyber security competence.”
As for inspections and testing of Huawei equipment to be deployed, such activities could raise confidence in the integrity of such equipment. Nonetheless, no reasonable amount of system testing can prove that the system is free of defects (e.g., security vulnerabilities, software bugs). Testing offers evidence that a system meets certain requirements (e.g., produces certain outputs when given certain inputs), but it is impossible to demonstrate that the system will not also do something undesirable.
A more important point is that with software and firmware updates, the functionality of any system running that software or firmware need not be identical to that which was in place before any given update. Indeed, if the system’s behavior were absolutely identical in all possible circumstances, the update would be entirely superfluous. So an inspection of “the system” at a moment before the update may not be particularly relevant to its behavior after the update.
In a world of unconstrained resources, it is possible to inspect and test every update that Huawei offers. But we don’t live in that world; moreover, whether such inspection would be adequate to provide well-founded assurances that nothing is amiss is a different and unresolved question. Also, even if such inspections did occur, they would take time, thus delaying the deployment of updates—and in the vast majority of cases, those updates would be benign and indeed necessary to fix bugs and patch security vulnerabilities. Thus, patch inspection and testing would have to be done after deployment. Assuming that a flawed (or vulnerable) patch had been installed, it would then have to be removed.
The anti-Huawei argument has some substance to it. Even stipulating that Huawei equipment has never been shown to be compromised and that Huawei installations would not be compromised in any way, the undeniable fact remains that Huawei is subject to Chinese law requiring Chinese organizations or citizens to “support, assist, and cooperate with state intelligence work.” On Feb. 20,  the CEO of Huawei asserted on CBS This Morning that “we absolutely never install backdoors. Even if we were required by Chinese law, we would firmly reject that.” Such a claim would more believable if Chinese law made provisions for the appeal of such requirements to an independent judiciary, but to the best of my knowledge, the Chinese judiciary has never ruled against the Chinese Communist Party. (Of course, the history of U.S. government influence, both attempted and actual, over other global suppliers of technology products could also give pause to those contemplating such acquisitions.)
But the anti-Huawei argument is also misleading because it does not acknowledge possible risk-mitigation measures that could be taken should Huawei technology be adopted. In practice, the cybersecurity risks posed by embedded Huawei technology fall into the traditional categories of confidentiality, integrity and availability. Concerns about the compromise of data confidentiality and integrity can be addressed using known technical measures, such as virtual private networks (VPNs) and end-to-end encryption. Indeed, such measures are widely used today in securing confidential communications that take place over insecure channels. Concerns about availability are harder to address, because nothing prevents the vendor from installing functionality that will disrupt or degrade the network at a time of its choosing; the only known solution to the loss of availability (i.e., turning off the network) is backup equipment from a different vendor that can be used in an emergency.
All of these measures would add initial and ongoing inconvenience, complexity and expense to a decision to acquire Huawei technology. Ensuring end nodes are properly configured to use secure encrypted channels even on internal networks is hard to do under the best of circumstances. (Note that in the internet-of-things world that 5G technology is expected to support, internet-of-things devices serving as end nodes would have to be configured in just such a way—and would thus be more expensive than the same devices without such configuration.) Network segmentation becomes even more important in such an environment, although it is something that should be done in any case. Maintaining user discipline to take the necessary measures to operate safely is challenging as well. Backup channels entail extra expenditures, but presumably one would need backup channels only for critical functions. Thus, backup channels would be deployed less extensively than the full-blown network. Functionality limitations of backup channels would be relevant only in times of crisis or conflict. Under normal “peacetime” circumstances, the Huawei 5G could be expected to provide all of the necessary functionality.
By omitting any mention of risk-mitigation measures and their incremental costs in currency, convenience and complexity, the canonical anti-Huawei argument is overly simplistic, as it reduces the question simply to whether Chinese technology can be “trusted” given the Chinese government’s power over Chinese companies. In practice, the incremental costs of risk mitigation may be high enough to render Huawei technology uncompetitive, though on economic grounds rather than policy grounds.
Cognizant of their willingness to accept risk, policymakers should be weighing these costs against other considerations such as price, speed of deployment and functionality where Huawei technology might have an advantage over other vendors—and that comparison could reasonably go either way. The calculation is more complex but more accurately reflects the dilemma faced by policymakers. Reframing the debate in terms of the costs of risk mitigation would also have the salutary benefit of highlighting possible defects in Huawei’s underlying engineering and quality-control processes for all potential customers and giving those potential customers courses of action to mitigate risk should they decide to acquire Huawei technology.
Health concerns related to 5G Technology:

As wireless companies prepare to launch the next generation of service, there are new questions about the possible health risks from radiation emitted by cell phones and the transmitters that carry the signals. Concerns about the potential harmful effects of radiofrequency radiation have dogged mobile technology since the first brick-sized cellphones hit the market in the 1980s.
Industry and federal officials have largely dismissed those fears, saying the radiation exposure is minimal and that the devices are safe. Incidences of and deaths from brain cancer have shown little change in recent years despite the explosion in cell phone usage
But the launch of super-fast 5G technology over the next several years will dramatically increase the number of transmitters sending signals to cell phones and a host of new Internet-enabled devices, including smart appliances and autonomous vehicles. And the move to the new technology comes after unsettling findings from a long-awaited federal government study of the cancer risk from cell phone use.
National Toxicology Program researchers released preliminary data in May that showed small increases in tumors in male rats exposed to cell phone radiation.The rats were exposed to nine hours of radiation daily, in 10-minutes-on, 10-minutes-off intervals, over their whole bodies for two years. The researchers found increased incidences of rare brain and heart tumors starting at about the federally allowable level of cellphone radiation for brain exposure, with greater incidences at about two and four times those levels.
The study, which the American Cancer Society said marked "a paradigm shift in our understanding of radiation and cancer risk," reignited debate about the potential harmful effects of cell phones on human health.The concerns are amplified by the explosive growth in the number of cell phone subscribers over the last three decades and the increasing amount of time people are using mobile devices amid the popularity of social networks and streaming video.
Now, some experts and wireless-safety advocates are calling for more research as the nation prepares to take the leap into a 5G world that promises to offer more and faster services. And they are reiterating advice — echoed by federal officials — about steps concerned consumers can easily take to reduce their exposure to radiofrequency radiation, such as using a headset to keep the phone away from their heads.
"I don't think it's clear that there are health risks, but it's also not clear that there are no health risks," said Leeka Kheifets, an epidemiology professor at UCLA's Fielding School of Public Health who has studied the health effects of cell phone use.
“EMFs act by activating channels in the membrane that surrounds each of our cells, called voltage-gated calcium channels (VGCCs). The EMFs put forces on the voltage sensor that controls the VGCCs of about 7.2 million times greater than the forces on other charged groups in our cells. This is why weak EMFs have such large biological effects on the cells of our bodies.
Pulsed EMFs are, in most cases, more biologically active and therefore more dangerous than are non-pulsed (continuous wave) EMFs. All cordless communication devices communicate via pulsations, because it is the pulsations that carry the information communicated.
5G will be much more active in activating the VGCCs and producing health impacts because of its rapid absorption by materials in the body, because of its very rapid pulsations and because of the huge number antennae they are planning to put up, at least 200 times the number of antennae from all current cell phone towers. What this means is that the impacts on the outer one to two inches of our bodies will be massive.”
Among the major ill-effects we will likely see some time after the introduction of 5G, according to Dr. Pall, include increases in blindness, hearing loss, male infertility, skin cancers, thyroid issues, and nervous system dysfunction.


5G Connectivity, security concerns and concerns related to Chinese involvement:  May, 16, 2019:   
Witnesses said the fifth generation of wireless technology, or 5G, will bring eye-popping data transmission capacity and spur a new age of digital device connectivity that will revolutionize many people's daily lives, as well as America's economic output."5G is going to be about machine-to-machine communication, the internet of things,"  
"Advances in 5G will support greater bandwidth, capacity for billions of sensors and smart devices, and ultra-low latency [minimal data delays] necessary for highly-reliable critical communications  "Autonomous vehicles, critical manufacturing, medical doctors performing remote surgery, and a smart electric grid represent a small fraction of the technologies and economic activity that 5G will support."  "The massive amounts of data transmitted by Internet of things devices on 5G networks will also advance artificial intelligence."
Lawmakers signaled they are coming to grips with the anticipated impact. "I'm told 5G is expected to provide not only 20 times faster network performance, but also generate 12.3 trillion [dollars] in global sales activity by 2035," Feinstein said. "I'm told it's going to create millions of new jobs and launch entirely new industries." With such an impact, including a new era of ultra-connectivity, will come a need to protect the network from foreign interference or manipulation and to guard against espionage and data theft, according to U.S. officials.
"With all the critical services relying on 5G networks, the stakes for safeguarding them could not be higher. A disruption to that underlying 5G network will disrupt all of those critical services. That's why this is so fundamentally different and so much more important that we get the security right," Strayer said.
"When we talk about [interruptions to] 5G, we're talking about autonomous vehicles not being able to operate," Krebs said, adding that such a scenario constitutes "a life-safety issue where things won't work as designed." Lawmakers focused on China, which has emerged as an early global leader in producing 5G infrastructure. "The Chinese government has invested more than $400 billion in development. It has supported Chinese industry efforts in international standard-setting bodies," Feinstein said. She added that Chinese law requires companies like telecommunications giant Huawei to assist and cooperate with state security entities. "Fundamentally, the private sector in China is an extension of the government, and so if our allies decide to trust Huawei, they are deciding to trust the Chinese government with their big data," Sasse said.
"We are concerned that China could compel actions by [5G] network vendors to act against the interests of our citizens or citizens of other countries around the world," Strayer said. "They [vendors] could be ordered to undermine network security, steal personal information or intellectual property, conduct espionage, disrupt critical services or conduct cyberattacks." The United States bans Chinese companies from critical telecommunications infrastructure and has warned allies against Huawei's participation in building their 5G networks. "We must protect our critical telecom infrastructure, and the United States is calling on all our security partners to be vigilant and to reject any enterprise that would compromise the integrity of our communications technology or national security systems," Vice President Mike Pence said earlier this year. "Our success will depend on engagement with international allies," Krebs said at the hearing. "Ultimately, our goal, our vision is to enable that broader collective defense against cybersecurity threats, where the government and industry understand the risks we face and are prepared to defend against them."
"The United States will be a leader in 5G deployment, and we will do so using trusted vendors to build our networks," Strayer said. "Through our engagements, many other countries are now acknowledging the supply-chain risks and beginning to strengthen their security alongside the United States." A few U.S. carriers have activated initial 5G systems in several U.S. cities. Coverage and carrier participation are expected to grow exponentially in coming years.
May , 15, 2019

The ban on United States companies selling parts to Huawei will take effect on Friday, the US commerce secretary has said. Wilbur Ross told Bloomberg news agency on Thursday that the new regulations will bar Huawei from acquiring components and technology from US firms without government approval. Huawei Technologies Co. Ltd. and 70 affiliates are being added to the US Commerce Department's "entity list". The move makes it difficult - if not impossible - for the firm to sell certain products, due to reliance on US suppliers. Ross said in a statement on Wednesday that President Donald Trump sought to "prevent American technology from being used by foreign-owned entities in ways that potentially undermine US national security or foreign policy interests".
The dramatic move comes as the Trump administration has aggressively lobbied other countries not to use Huawei equipment in next-generation 5G networks. And it comes just days after the Trump administration imposed new tariffs on Chinese goods amid an escalating trade war. US officials have long feared the Chinese government could use Huawei’s equipment to spy on Americans.
Blacklisting Huawei is likely to have ramifications beyond the company itself: Not only might it disrupt Huawei’s business, but it could also hurt its US suppliers. A broad US crackdown, announced on Wednesday in an executive order, was the latest shot fired in an escalating trade war that is rattling financial markets and threatens to derail a slowing global economy.
Officials in China said US aggressiveness could hurt trade talks, which appeared to have hit an impasse in the past week as Washington hiked tariffs on Chinese goods and Beijing retaliated with higher duties on US products. Chinese Commerce Ministry spokesman Gao Feng stressed that the US should avoid further damaging relations. "China will take all the necessary measures to resolutely safeguard the legitimate rights of Chinese firms," Gao told reporters.
Meanwhile, share prices for Huawei's US suppliers fell due to fears the massive buyer of US chips, software and other equipment would be forced to stop purchases after the ban takes hold. Huawei said in a statement that losing access to US suppliers "will do significant economic harm to the American companies" and affect "tens of thousands of American jobs". Out of $70bn that Huawei spent on component procurement in 2018, some $11bn went to US firms including Qualcomm, Intel and Micron Technology Inc. And they could see that revenue disappear.  
"The bigger concern would be [that] US allies that used to buy Huawei's components may not continue businesses with Huawei, because of fear of possibly upsetting the United States," said Doh Hyun-woo, an analyst at NH Investment & Securities in Seoul. Huawei has spearheaded China’s campaign to develop its own high-end technologies to reduce reliance on foreign imports, and such efforts have taken on urgency after US sanctions on ZTE.
In March 2016, the US Commerce Department added ZTE Corporation to the entity list over allegations it organised an elaborate scheme to hide its re-export of US items to sanctioned countries in violation of US law.
The restrictions prevented suppliers from providing ZTE with US equipment, potentially freezing the Huawei rival's supply chain, but they were short-lived. The US suspended the restrictions in a series of temporary reprieves, allowing the company to maintain ties to US suppliers until it agreed to a plea deal a year later. In August, Trump signed a bill that barred the US government itself from using equipment from Huawei and ZTE.


On Wednesday, President Donald Trump signed the following executive order, entitled “Securing the Information and Communications Technology and Services Supply Chain.”
By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), and section 301 of title 3, United States Code,
I, DONALD J. TRUMP, President of the United States of America, find that foreign adversaries are increasingly creating and exploiting vulnerabilities in information and communications technology and services, which store and communicate vast amounts of sensitive information, facilitate the digital economy, and support critical infrastructure and vital emergency services, in order to commit malicious cyber-enabled actions, including economic and industrial espionage against the United States and its people.  I further find that the unrestricted acquisition or use in the United States of information and communications technology or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of foreign adversaries augments the ability of foreign adversaries to create and exploit vulnerabilities in information and communications technology or services, with potentially catastrophic effects, and thereby constitutes an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States.  This threat exists both in the case of individual acquisitions or uses of such technology or services, and when acquisitions or uses of such technologies are considered as a class.  Although maintaining an open investment climate in information and communications technology, and in the United States economy more generally, is important for the overall growth and prosperity of the United States, such openness must be balanced by the need to protect our country against critical national security threats.  To deal with this threat, additional steps are required to protect the security, integrity, and reliability of information and communications technology and services provided and used in the United States.  In light of these findings, I hereby declare a national emergency with respect to this threat.
Accordingly, it is hereby ordered as follows:
Section 1.  Implementation.  (a)  The following actions are prohibited:  any acquisition, importation, transfer, installation, dealing in, or use of any information and communications technology or service (transaction) by any person, or with respect to any property, subject to the jurisdiction of the United States, where the transaction involves any property in which any foreign country or a national thereof has any interest (including through an interest in a contract for the provision of the technology or service), where the transaction was initiated, is pending, or will be completed after the date of this order, and where the Secretary of Commerce (Secretary), in consultation with the Secretary of the Treasury, the Secretary of State, the Secretary of Defense, the Attorney General, the Secretary of Homeland Security, the United States Trade Representative, the Director of National Intelligence, the Administrator of General Services, the Chairman of the Federal Communications Commission, and, as appropriate, the heads of other executive departments and agencies (agencies), has determined that:
(i)   the transaction involves information and communications technology or services designed, developed, manufactured, or supplied, by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary; and
(ii)  the transaction:
(A)  poses an undue risk of sabotage to or subversion of the design, integrity, manufacturing, production, distribution, installation, operation, or maintenance of information and communications technology or services in the United States;
(B)  poses an undue risk of catastrophic effects on the security or resiliency of United States critical infrastructure or the digital economy of the United States; or
(C)  otherwise poses an unacceptable risk to the national security of the United States or the security and safety of United States persons.
(b)  The Secretary, in consultation with the heads of other agencies as appropriate, may at the Secretary’s discretion design or negotiate measures to mitigate concerns identified under section 1(a) of this order.  Such measures may serve as a precondition to the approval of a transaction or of a class of transactions that would otherwise be prohibited pursuant to this order.
(c)  The prohibitions in subsection (a) of this section apply except to the extent provided by statutes, or in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted prior to the effective date of this order.
Sec2.  Authorities.  (a)  The Secretary, in consultation with, or upon referral of a particular transaction from, the heads of other agencies as appropriate, is hereby authorized to take such actions, including directing the timing and manner of the cessation of transactions prohibited pursuant to section 1 of this order, adopting appropriate rules and regulations, and employing all other powers granted to the President by IEEPA, as may be necessary to implement this order.  All agencies of the United States Government are directed to take all appropriate measures within their authority to carry out the provisions of this order.
(b)  Rules and regulations issued pursuant to this order may, among other things, determine that particular countries or persons are foreign adversaries for the purposes of this order; identify persons owned by, controlled by, or subject to the jurisdiction or direction of foreign adversaries for the purposes of this order; identify particular technologies or countries with respect to which transactions involving information and communications technology or services warrant particular scrutiny under the provisions of this order; establish procedures to license transactions otherwise prohibited pursuant to this order; establish criteria, consistent with section 1 of this order, by which particular technologies or particular participants in the market for information and communications technology or services may be recognized as categorically included in or as categorically excluded from the prohibitions established by this order; and identify a mechanism and relevant factors for the negotiation of agreements to mitigate concerns raised in connection with subsection 1(a) of this order.  Within 150 days of the date of this order, the Secretary, in consultation with the Secretary of the Treasury, Secretary of State, the Secretary of Defense, the Attorney General, the Secretary of Homeland Security, the United States Trade Representative, the Director of National Intelligence, the Administrator of General Services, the Chairman of the Federal Communications Commission and, as appropriate, the heads of other agencies, shall publish rules or regulations implementing the authorities delegated to the Secretary by this order.
(c)  The Secretary may, consistent with applicable law, redelegate any of the authorities conferred on the Secretary pursuant to this section within the Department of Commerce.
Sec3.  Definitions.  For purposes of this order:
(a)the term “entity” means a partnership, association, trust, joint venture, corporation, group, subgroup, or other organization;
(b)the term “foreign adversary” means any foreign government or foreign non-government person engaged in a long‑term pattern or serious instances of conduct significantly adverse to the national security of the United States or security and safety of United States persons;
(c)the term “information and communications technology or services” means any hardware, software, or other product or service primarily intended to fulfill or enable the function of information or data processing, storage, retrieval, or communication by electronic means, including transmission, storage, and display;
(d)the term “person” means an individual or entity; and
(e)the term “United States person” means any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States.
Sec4.  Recurring and Final Reports to the Congress.  The Secretary, in consultation with the Secretary of State, is hereby authorized to submit recurring and final reports to the Congress on the national emergency declared in this order, consistent with section 401(c) of the NEA (50 U.S.C. 1641(c)) and section 204(c) of IEEPA (50 U.S.C. 1703(c)).
Sec5.  Assessments and Reports.  (a)  The Director of National Intelligence shall continue to assess threats to the United States and its people from information and communications technology or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary.  The Director of National Intelligence shall produce periodic written assessments of these threats in consultation with the heads of relevant agencies, and shall provide these assessments to the President, the Secretary for the Secretary’s use in connection with his responsibilities pursuant to this order, and the heads of other agencies as appropriate.  An initial assessment shall be completed within 40 days of the date of this order, and further assessments shall be completed at least annually, and shall include analysis of:
(i)  threats enabled by information and communications technologies or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the jurisdiction or direction of a foreign adversary; and
(ii)  threats to the United States Government, United States critical infrastructure, and United States entities from information and communications technologies or services designed, developed, manufactured, or supplied by persons owned by, controlled by, or subject to the influence of a foreign adversary.
(b)The Secretary of Homeland Security shall continue to assess and identify entities, hardware, software, and services that present vulnerabilities in the United States and that pose the greatest potential consequences to the national security of the United States.The Secretary of Homeland Security, in coordination with sector-specific agencies and coordinating councils as appropriate, shall produce a written assessment within 80 days of the date of this order, and annually thereafter.This assessment shall include an evaluation of hardware, software, or services that are relied upon by multiple information and communications technology or service providers, including the communication services relied upon by critical infrastructure entities identified pursuant to section 9 of Executive Order 13636 of February 12, 2013 (Improving Critical Infrastructure Cybersecurity).
(c)  Within 1 year of the date of this order, and annually thereafter, the Secretary, in consultation as appropriate with the Secretary of the Treasury, the Secretary of Homeland Security, Secretary of State, the Secretary of Defense, the Attorney General, the United States Trade Representative, the Director of National Intelligence, and the Chairman of the Federal Communications Commission, shall assess and report to the President whether the actions taken by the Secretary pursuant to this order are sufficient and continue to be necessary to mitigate the risks identified in, and pursuant to, this order.
Sec6.  General Provisions.  (a)  Nothing in this order shall be construed to impair or otherwise affect:
(i)   the authority granted by law to an executive department or agency, or the head thereof; or
(ii)  the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b)  This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c)  This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
DONALD J. TRUMP
THE WHITE HOUSE,
May 15, 2019.