5G Mobile Technology

                                       5G Mobile Technology
5G technologies will change the way most high bandwidth users access their phones. With 5G pushed over a VOIP-enabled device, people will experience a level of call volume and data transmission never experienced before.5G technology is offering the services in Product Engineering, Documentation, supporting electronic transactions (e-Payments, e transactions) etc. As the customer becomes more and more aware of the mobile phone technology, he or she will look for a decent package all together, including all the advanced features a cellular phone can have. Hence the search for new technology is always the main motive of the leading cell phone giants to out innovate their competitors. The ultimate goal of 5G is to design a real wireless world that is free from obstacles of the earlier generations. This requires an integration of networks. 5G Technology stands for 5th Generation Mobile technology. 5G technology has changed the means to use cell phones within very high bandwidth. 5G is a packet switched wireless system with wide area coverage and high throughput. 5G wireless uses OFDM and millimeter wireless that enables data rate of 20 mbps and frequency band of 2-8 GHz. 5G is going to be a packed based network . The 5G communication system is envisioned as the real wireless network, capable of supporting wireless World Wide Web (wwww) applications in 2010 to 2015 time frame. There are two views of 5G systems: evolutionary and revolutionary. In the evolutionary view the 5G (or beyond 4G) systems will be capable of supporting wwww allowing a highly flexible network such as a Dynamic Adhoc Wireless Network (DAWN). In this view advanced technologies including intelligent antenna and flexible modulation are keys to optimize the adhoc wireless networks. In revolutionary view 5G systems should be an intelligent technology capable of interconnecting the entire world without limits. An example application could be a robot with built-in wireless communication with artificial intelligence. User never experienced ever before such a high value technology. The 5G technologies include all type of advanced features which makes 5G technology most powerful and in huge demand in near future. Amazing isn’t it such a huge collection of technology being integrated into a small device. The 5G technology provides the mobile phone users more features and efficiency than the 1000 lunar module. A user of mobile phone can easily hook their 5G technology gadget with laptops or tablets to acquire broadband internet connectivity. Up till now following features of the 5G technology have come to surface- High resolution is offered by 5G for extreme mobile users, it also offers bidirectional huge bandwidth.- 5G technology’s excellent quality service is based on Policy in order to evade errors.- It provides transporter class type gateway that has unequalled steadiness.- The 5G technology’s billing interface is highly advanced making it efficient and appealing.- It offers huge quantity of broadcasting data, which is in Giga Bytes, sustaining more than 60,000 connections.- This technology also provides remote diagnostic feature.- Provides up to 25 megabytes per second connectivity. Also it supports the private virtual networks.


KEY CONCEPTS OF 5G
The key concepts discussing 5G and beyond 4G wireless communications are:
1) Real wireless world with no more limitation with access and zone issues.
2) Wearable devices with AI capabilities.
3) Internet protocol version 6(IPv6), where a visiting care-of mobile IP address is assigned according to Location and connected network.
4) One unified global standard.
5) Pervasive networks providing ubiquitous computing: The user can simultaneously be connected to several wireless access technologies and seamlessly move between them These access technologies can be a 2.5G, 3G, 4G or 5G mobile networks, Wi-Fi, WPAN or any other future access technology. In 5G, the concept may be further developed into multiple concurrent data transfer paths.
6) Cognitive radio technology, also known as smart radio: allowing different radio technologies to share the same spectrum efficiently by adaptively finding unused spectrum and adapting the transmission scheme to the requirements of the technologies currently sharing the spectrum. This dynamic radio resource management is achieved in a distributed fashion, and relies on software defined radio.
7) High altitude stratospheric platform station (HAPS) systems. The radio interface of 5G communication systems is suggested in a Korean research and development program to be based on beam division multiple access (BDMA) and group cooperative relay techniques.
FEATURES OF 5G NETWORKS TECHNOLOGY

1) 5G technology offer high resolution for crazy cell phone user and bi- directional large bandwidth shaping.
2) The advanced billing interfaces of 5G technology makes it more attractive and effective.
3) 5G technology also providing subscriber supervision tools for fast action.
4) The high quality services of 5G technology based on Policy to avoid error.
5) 5G technology is providing large broadcasting of data in Gigabit which supporting almost 65,000 connections.
6) 5G technology offer transporter class gateway with unparalleled consistency.
7) The traffic statistics by 5G technology makes it more accurate.
8) Through remote management offered by 5G technology a user can get better and fast solution.
9) The remote diagnostics also a great feature of 5G technology.
10) The 5G technology is providing up to 25 Mbps connectivity speed.
11) The 5G technology also support virtual private network.
12) The new 5G technology will take all delivery service out of business prospect
13) The uploading and downloading speed of 5G technology touching the peak.
14) The 5G technology network offering enhanced and available connectivity just about the world
APPLICATIONS
How could be it?
1) If you can able to feel yours kid stroke when she/he is in her mother’s wombs.
2) If you can able to charge your mobile using your own heartbeat.
3) If you can able to perceive your grandmother sugar level with your mobile.
4) If you can able to know the exact time of your child birth that too In Nano seconds.
5) If your mobile rings according to your mood.
6) If you can Vote from your mobile.
7) If you can get an alert from your mobile when some once opens your intelligent car.
8) If you can able to view your residence in your mobile when someone enters.
9) If you can able to locate your child when she/he is unfortunately missed.
10) If you can able to pay all your bills in a single payment with your mobile.
11) If you can able to sense Tsunami/earthquake before it occurs.
12) If you can able to visualize lively all planets and Universe.
13) If you can able to navigate a Train for which you are waiting.
14) If you can get the share value lively.
15) If you can lock your Laptop, car, Bike using your mobile when you forgot to do so.
16) If you’re mobile can share your work load.
17) If you’re mobile can identify the best server.
18) If you’re mobile can perform Radio resource management.
19) If your mobile can intimate you before the call drops.
20) If your mobile phone get cleaned by its own.
21) If you can able to fold your mobile as per your desire.
22) If you can able to expand your coverage using your mobile phones.
23) If you can able identify your stolen mobile with nanoseconds.
24) If you can able to access your office desktop by being at your bedroom.
.
HARDWARE AND SOFTWARE
5G HARDWARE
1) UWB Networks: higher bandwidth at low energy levels. This short-range radio technology is ideal for
Wireless personal area networks (WPANs). UWB complements existing longer range radio technologies – such as Wi-Fi,* WiMAX, and cellular wide area communications – that bring in data and communications from the outside world. UWB provides the needed cost-effective, power-efficient, high bandwidth solution for relaying data from host devices to devices in the immediate area (up to 10 meters or 30 feet).
2) Bandwidth: 4000 megabits per second, which is 400 times faster than today’s wireless networks.
3) Smart antennasa. Switched Beam Antennas: Switched Beam Antennas support radio positioning via Angle of Arrival (AOA) information collected from nearby devices. b. Adaptive Array Antennas: The use of adaptive antenna arrays is one area that shows promise for improving capacity of wireless systems and providing improved safety through position location capabilities. These arrays can be used for interference rejection through spatial _altering, position location through direction _ending measurements, and developing improved channel models through angle of arrival channel sounding measurements.
4) Multiplexing: CDMA (Code Division Multiple Access) CDMA employs analog-to-digital conversion (ADC) in combination with spread spectrum technology. Audio input is first digitized into binary elements. The frequency of the transmitted signal is then made to vary according to a defined pattern (code), so it can be intercepted only by a receiver whose frequency response is programmed with the same code, so it follows exactly along with the transmitter frequency. There are trillions of possible frequency-sequencing codes, which enhance privacy and makes cloning difficult.
 5G SOFTWARE
1) 5G will be single unified standard of different wireless networks, including wireless technologies (e.g. IEEE 802.11), LAN/WAN/ PAN and WWWW, unified IP and seamless combination of broad band.
2) Software Defined Radio, Packet layer, implementation of packets, encryption, flexibility etc. ref: www.ijsret.org 

CONCEPTS FOR 5G MOBILE NETWORKS
The 5G terminals will have software defined radios and modulation schemes as well as new error-control schemes that can be downloaded from the Internet. The development is seen towards the user terminals as a focus of the 5G mobile networks. The terminals will have access to different wireless technologies at the same time and the terminal should be able to combine different flows from different technologies. The vertical handovers should be avoided, because they are not feasible in a case when there are many technologies and many operators and service providers. In 5G, each network will be responsible for handling user-mobility, while the terminal will make the final choice among different wireless/mobile access network providers for a given service. Such choice will be based on open intelligent middleware in the mobile phone.
5G MOBILE NETWORK ARCHITECTURE

Below figure shows the system model that proposes design of network architecture for 5G mobile systems, which is all-IP based model for wireless and mobile networks interoperability. The system consists of a user terminal (which has a crucial role in the new architecture) and a number of independent, autonomous radio access technologies. Within each of the terminals, each of the radio access technologies is seen as the IP link to the outside Internet world. However, there should be different radio interface for each Radio Access Technology (RAT) in the mobile terminal. For an example, if we want to have access to four different RATs, we need to have four different accesses – specific interfaces in the mobile terminal, and to have all of them active at the same time, with aim to have this architecture to be functional. Applications and servers somewhere on the Internet. Routing of packets should be carried out in accordance with established policies of the user.

Power line communication implementation for DC applications

     Power line communication implementation for DC applications

Power line communication (PLC) is a communication technology that sends data over existing power cables. This technology can send both power and data between PLC nodes in a half-duplex manner. Combining power and data over the same lines allows PLC technology to eliminate the need for additional wires to interconnect devices. PLC offers a cost-effective communication media for a wide range of applications in environments that otherwise might be too expensive to network. As a communications technology, PLC can be divided into two categories: Broadband PLC is appropriate for high-speed broadband network connections such as to the Internet. It generally operates at higher frequencies (1.8–250 MHz), high data rates (up to 100s of Mbps) and is used in shorter-range applications. Narrowband PLC is useful for applications requiring narrowband control or low-bandwidth data collection where low cost and high reliability are essential. It generally operates at lower frequencies (3–500 kHz), lower data rates (up to 100s of kbps), and has longer range (up to several kilometres), which can be extended using repeaters. Depending upon the underlying power line characteristic, PLC can be further classified as PLC over AC power lines and PLC over DC power lines. Many utilities around the world have chosen narrowband PLC over AC lines for their smart grid projects. By monitoring electricity usage based on time of day and even by device or application, utility companies can provide pricing structures that give consumers incentives to adjust their energy consumption, thus reducing peak-load and avoiding the need to construct new power plants. The popularity of PLC adoption in smart grid applications has led to significant focus on PLC over AC power lines. However, narrowband PLC over DC lines is also gaining ground in home networking, lighting and solar applications as well as in transportation vehicles (electronic controls in air planes, auto mobiles and trains). The use of PLC in these applications reduces wiring complexity, weight, and ultimately cost of communications. In this article we focus on the use of PLC over DC power lines and present a reference design that can help customers adopt PLC over DC power lines quickly and effectively. One common question asked by system integrators is how to compare PLC over DC versus low-power wireless technology. While both PLC over DC and low-power wireless do not require new wire installation, with PLC, the connection is maintained even underground, through walls, and around corners. The communication channel is owned by the operator or utility, so the risks of sharing bandwidth are eliminated. PLC has no line-of-sight limitation and is not affected by weather.


How to Make a Call using Keyboard, GSM Module and Arduino

The mobile phones have built –in GSM module which enables them to connect with any cellular network around the globe. The GSM stands for Global System for Mobile communications. In certain applications the microcontroller based systems has to be connected with the GSM network which will enable a user to control the system by sending messages or making a call. The systems can also send messages to the user to alert or inform about the status of the system running. In all such cases a separate GSM module is used rather than using the mobile phones.
There are GSM modules available which can do serial communication with microcontroller based systems. The communication is done by sending or receiving AT commands with the GSM module. This particular project demonstrates how to interface a GSM module and dial a call using the standard PS2 keyboard with the help of an Arduino board.
The PS2 keyboard can send the equivalent ASCII value of the key which has been pressed to a host device into which it is connected to. The PS2 Keyboard also uses a simple synchronous serial protocol called PS2 using only two wires for communication. Due to their simplicity in interfacing the PS2 keyboards and GSM modules are widely used with simple microcontroller based boards. 


How to Interface GPS with Arduino


Every single location in the entire globe can be specified in terms of geographical coordinates. The geographical coordinate is a system which specifies any given location on the earth surface as latitude and longitude. There are devices which can read the geographical coordinates of a place with the help of the signals received from a number of satellites orbiting the earth. The system of satellites which helps in the positioning of a place is called Global Positioning System (GPS). The devices which can read the geographical coordinates of a place with the help of at least four GPS satellites are called GPS Receiver or simply GPS module.

The GPS module continuously produces a set of data regarding the position of the earth surface where it is situated which includes the current position with respect to the equator of the earth in terms of Latitude and Longitude. This data can be decoded and printed into the readable format with the help of a microcontroller only. In this project the data regarding the geographical coordinate is extracted from the GPS output with the help of the Arduino. The Arduino can be used as a stand-alone board of which the output or inputs can be taken from the boards or given to the board. They can communicate using standard communication ports like USART, TWI, SPI etc. which enables them to be connected with various kinds of devices. The Arduino board is designed for easy prototyping and the IDE used for coding is very simple and provides so many libraries for interfacing with common external devices.

Railway tracking System

      Research on Rail Safety Security System
This paper analysis of  the integrated use of safety monitoring with the domestic and international latest research on rail safety protection system, and focus on the implementation of an organic whole system, with the monitoring and early warning, risk assessment, predictive control and emergency rescue system. The system framework, contents and system structure of Security system is proposed completely. It’s pointed out that the Security system is a negative feedback system composed of by safety monitoring and warning system, risk assessment and emergency rescue system. Safety monitoring and warning system focus on the monitoring target monitoring, early warning, tracking, integration of decision-making, for objective and subjective risks factors. Risk assessment system analysis the occurrence of a major Security risk mechanism, determines the standard of the future short, medium and long term safety conditions, and give prop for development of safety indicators, accident analysis and safety standards. Emergency rescue system is with the goal of rapid and effective rescue work for accident, to minimize casualties and property losses.
Along with the transportation develops towards high-speed, high-density, over loading, technique concentrated, complex of the technique systemic constitute, and the high linkage between business system, the safety Security work will face exceptional severe challenge. The objects related to safety Security consist of natural disasters, foundation devices and emergencies. Any local damage and un-control may evolve to a global damage and un-control during the subway is in motion and do business. However, now the question of safety Security system is that the apply and analysis on information of safety monitoring is on start-up period, the whole benefit of prediction control and emergency rescue by monitor data has not yet been fully developed, the primary cause of the problem is lack of systemic rail transportation Security and technology criterion which is adaptive to the system and possess the industry characteristic. Following the development of the system on safety monitoring and early warming, it will accumulate a mass of Security monitoring data. If the data is effectively fusion, storage, and synthetically applied, the Co-relational research on rail transportation safety Security system is becoming highly valued step by step in recent years. Research on the theory and technology of rail transportation safety Security has bear fruit according to the literatures. Literature [1] described the depart control of rail transportation operating system and presented the optimal strategy and realize of depart intelligent decision support system based on Petri net. Literature [2] formally modeled definition, design and realization of the self-check function in automatic driving control software. Literature [3] had researched the analysis and design of the train strategic decision supporting system by using the method facing objects. Literature [4] optimized the train’s initiative driving by using linear quadratic Gaussian (LQG) method and hereditary algorithm. Literature [5] presented and brought out the distributed strategy decision supporting system of the train station and train control along the line. Literature [6] researched the optimized operation of the train based on the neural networks. All of these achievements paved the path to build and improve the rail intelligent train control system and rail transportation scourges prevention facing the safety Security. It also invested abundant of labour power and financial resources to keep away and control the scourges, thereby the whole scourge early warning and monitor political system is formed. The system of scourge early warming used scientific early warming methods, gathered every kind of external data leading to scourge, advanced early warming to scourges such as flooded line and collapsed line, carried out responding scourge warming, formulated travelling regulation under scourges, which prevented the accidents of scourge and Security transportation safety. Scourge monitoring system directly monitored the scourges which are difficultly predicted, such as rolling stones, collapse, broken bridges, which ensured the running train can stop in time and transferred the information to any departments. The system frame of American rail traffic intelligent transportation system, which named IRS, contained system frame of proactive train controlling system, which can be used to control train safety, reliable, punctual, effective operating, and by avoiding train colliding, decreasing the negligence of rail road workers, reducing facilities broken and over speed accidents. The standard current situation of international standardization institution and each country safety Security system concerning is:
UTC (Union International des Chemise defers, International Union of railways), UTC is the biggest international standardization institution of the world rail transportation. This organization is a non-government international rail transportation institute, which is subject of European rail transportation, and China is one member country in it. A set of standardizations related to safety Security system quickly developed for it. (2) ISO, ISO related to the rail transportation standard is the 45 item-rail transportation projects. Although now the part of ISO rail transportation is emphasized on project material, but these standards are closely interrelated to transportation safety. (3) IEEE (Institute of Electrical and Electronics Engineers), IEEE standardization committee is responsible for the survey, impel, management of IEEE standard, pondering and proposing IEEE standard. For the past few years, IEEE standardization committee is very active in standardization research part of rail transportation information and control, closely follow after releasing many standards in this region, and some parts is related to transportation safety [7]. (4) ERRI (ERRI European Rail Research Institute)ERRI is under the lead of UIC and it is a rail technical research institute which gathers rail traffic engineers in every country. Meanwhile, along with the typical RITS system-ERTMS continually deepens, ERRI plays a decisive role in the forming of the world rail traffic standard. (5) JIS, section E in JIS standard object is directly related to rail transportation, including line general standard, locomotive signal, signal servicing installation, rail traffic vehicle general standard , high-speed train , passenger and freight vehicle, tight wire railway standard. JIS present standardization strategy of the same.
 Rail traffic safety system is composed of three parts: the safety monitoring and early warning system, risk assessment system and emergency rescue system. Emergency rescue system is centre, safety monitoring and early warning and risk assessment system is the means. In this system, safety monitoring warning system is controller and transportation safety factors is the object; the input is a closed-loop system of emergency rescue level. Among them, safety factors are generalized concepts, including not only individual subjective and objective factors which lead to the danger, but also the relationship between factors and combination Safety monitoring and early warning system Rail traffic safety monitoring and early warning system is aiming at subjective and hidden danger factors. Monitoring network is composed by monitoring stations, and observing monitoring target, tracking, early warning, recognizing, monitoring and reporting the development state. The monitoring content is composed of operation action of person in key position, the running condition of vehicle, the vehicle loading condition and infrastructure condition; transportation safety synthetically monitoring information base is formed by information fusion, providing timely information to prevention, predicting of hidden danger and emergency rescue. Safety monitoring and early warning system uses distributed network monitoring stations to monitor, track the safety station of targets. The key technology of rail traffic safety monitoring and early warning system is system interface. System interface contains not only integration technology of site safety monitoring system, but also information exchange technology of safety subsystems interconnection or integration. The contents include the classification of the interface, form of structure and realization. According to the technical content and layer of structure, system interface is divided into: system interface and monitoring level interface. System interface: system interface refers to the safety monitoring system and the interface of each safety subsystem. System interface integrates and plans subsystem information base on the aspects of system interconnection, part function, characteristic and structure, builds uniform standard information storage structure, organization structure, circulation mechanism, Monitoring level interface: monitoring level is that safety subsystem interface processes the data collection and forms standardized interface. Monitoring level interface is related to their own function features of safety device. ii. Early warning decision-making of monitoring network the same major safety monitoring system in monitoring network which deployed at the site is independence. Because of the monitoring results are influenced by many random factors, the single point estimation judgement may not be necessarily accurate in monitoring and warning, which means false alarm and leakage alarm(false alarm is that target under monitoring system is out of action, but it actual trouble-free. False alarm rate is in a period, the number of fault alarm displaying contrast to the total alarm displaying). Therefore, the result of judgement will objective, when the monitoring network stations increase a participant of fusion judgement node, judge monitoring system become integrated, the participants with the determination results objectively.
The monitoring network system containing several stations and a decision fusion monitoring network system can be divided into two kinds of structure ,a kind of monitoring and early warning decision-making model which composes by many stations and a fusion centre, called MDOF model.

CONCLUSION:

The paper based on analysing and summarizing co-relational research results of rail traffic safety Security, and it presents systematically the traffic safety Security system which should be served as a unity including safety monitoring and early warning system, risk evaluation system and emergency rescuing system. It realizes information fusion, information sharing and technical standardization. In the paper, rail traffic safety management system and Security management system is proposed and founded to adapt to the new features nowadays. After minutely stating the detailed technical frame design of safety monitoring and early warning system, risk evaluation system and emergency rescuing system, the paper integrally presents the system frame, research contents and system constitute of safety Security system. Synthetic safety Security system can develop synthetically monitoring, forecasting, early warning, disaster prevention and rescuing strategy service function, make that it can cohere with the work of some department, such as safety operating, infrastructure maintenance, quick emergency, and give full play to the function of Security safety devices and safety monitoring system.

CURRENT SENSOR

High-wattage appliances like electric irons, ovens and heaters result in unnecessary power loss if left ‘on’ for hours unnoticed. Here is a circuit that senses the flow of current through the appliances and gives audible beeps every fifteen minutes to remind you of power-’on’ status. This is a non-contact version of current monitor and can sense the flow of current in high-current appliances from a distance of up to 30 cm .It uses transistors in the input to provide very a standard step-down transformer (0- 9V, 500mA) as the current sensor. Its secondary winding is left open, while the primary winding ends are used to detect the current. The primary ends of the transformer are connected to a full-wave bridge rectifier comprising diodes D1 through D4. The rectified output is connected to the non-inverting input of IC CA3140 (IC1). IC CA3140 is a 4.5MHz BIMOS operational amplifier with MOSFET input and bipolar transistor output. It has gate-protected MOSFET (PMOS) transistors in the input to provide very high input impedance (1.5 T-ohms), very low input current (10 pA) and high-speed switching performance. The inverting input of IC1 is preset with VR1. In the standby mode, the primary of the transformer accepts e.m.f. from the instrument or surrounding atmosphere, which results in low-voltage input to IC1. This low voltage at the non-inverting input keeps the output of IC1 low. Thus transistor T1 doesn’t conduct and pin 12 of IC2 goes high to disable IC2. As a result, the remaining part of the cir gets inactivated. When a high-current appliance is switched on, there will be a current drain in the primary of the transformer to the negative rail due to an increase in the e.m.f. caused by the flow of current through the appliance. This results in voltage rise at the non-inverting input and the output of IC1 becomes high. This high output drives transistor T1 into conduction and the reset pin of IC2 becomes low, which enables IC2. IC CD4060 (IC2) is a 14-stage ripple counter. It is used as a 15-minute timer by feeding Q9 output to the piezo buzzer for aural alarm through the intermediate circuitry. Resistors R5 and R6 along with capacitor C1 maintain the oscillations in IC2 as indicated by blinking LED1. The high output from IC2 is used to activate a simple oscillator comprising transistors T2 and T3, resistors R8 and R10, and capacitor C2. When the Q9 output of IC2 becomes high, zener diode ZD1 provides 3.1 volts to the base of transitor T2. Since transistor T2 is biased by a high value resistor (R8), it will not conduct immediately. Capacitor C2 slowly charges and when the voltage at the base of T2 increases above 0.6 volt, it conducts. When T2 conducts, the base of T3 turns low and it also conducts. The piezo buzzer connected to the collector of T3 gives a short beep as capacitor C2 discharges. This sequence of IC2 output at Q9 becoming high and conduction of transistors T2 and T3 resulting in beep sound repeats at short intervals.

REMOTE OPERATED DOMESTIC APPLIANCES CONTROL BY ANDROID APPLICATION

The project is designed to operate electrical loads using an Android application device.  The system operates electrical loads depending on the data transmitted from the Android application device. Operating conventional wall switches is difficult for elderly or physically handicapped people. This proposed system solves the problem by integrating house hold appliances to a control unit that can be operated by an Android smart-phone/Tablet etc.
Remote operation is achieved by any smart-phone/Tablet etc., with Android OS, upon a GUI (Graphical User Interface) based touch screen operation, interfaced to the microcontroller of 8051 family. The program on the microcontroller serially communicates with Bluetooth device to generate respective output based on the input data (sent from Android application device) to operate a set of relays through a relay driver IC. The loads are interfaced to the control unit through the relays. The system can be used in existing domestic area for either operating the loads through conventional switches.
The power supply consists of a step down transformer 230/12V, which steps down the voltage to 12V AC. This is converted to DC using a Bridge rectifier. The ripples are removed using a capacitive filter and it is then regulated to +5V using a voltage regulator 7805 which is required for the operation of the microcontroller and other components.