Generation of Mobile Network and Challenges of Adoption in Nigeria
Chapter One
Aim of the Study
The specific purpose of the study is to carry out research on the generations of mobile networks and their challenges of adoption in Nigeria.
Objectives of the Study
The objective of this study is to explore the;
- History of mobile networks
- Advantages of mobile networks
- Limitations of mobile networks
- Challenges of mobile networks usage
The study attempts to analyze the underlying factors affecting the adoption of the various mobile networks in Nigeria and explore the existence of relationship among them.
CHAPTER TWO
Literature Review
Review of Literature on Mobile Networks in Nigeria
In this section we briefly present other research activities that investigate the generations of mobile network concept and discuss prototype implementations. None of the following approaches have considered the advantages, limitations and challenges of adoption.
A review of mobile networks shows that technology went from using pocket device that was used to make and receive calls from (almost) anywhere (1G), to being able to make up for that need by choosing to send a text message instead of calling (2G) while still having that possibility in the same device. Then came the need to be able to access the internet wherever we were, and that was also possible through our cell phones (3G). And this trend continued until today where our infinite need for information is reflected in what we now know as every day, the daily surfing the net through our smartphones (4G). This need continued and grew, giving way to the development of the next level in our consumption of information and our way of being connected and interconnected with each other and with the things around us, the 5G technology.
History of Mobile Networks
1G Mobile Network
The First-Generation or 1G mobile networks were introduced in the 1970s based on analogue transmission systems. These systems were referred to as cellular or “cell” for short. The Second-Generation or 2G phones using Global System for Mobile (GSM) communications based on narrowband digital signals were introduced in early 1990s. Digital signals could be encoded for security, compressed, and multiplexed much more effectively than analogue voice, and the Short Message Service (SMS) or texting and email over a mobile phone became possible for the first time. An intermediary phase, 2.5G was introduced in the late 1990s which brought packet-switched data capabilities to existing networks (A. Gokhale 2016)
2G Mobile Network
The second generation (2G) systems made their appearance as the first digital systems for mobile telecommunications. The most popular representative is the worldwide spread GSM (Global System for Mobile) which is the one that will be the subject of this analysis. It utilizes hybrid FDMA and TDMA technique with 124 channels of 200KHz bandwidth and 8 timeslots of 576.92ms each. Using GMSK as the modulation method, it manages to serve 9.6kbps throughput. The main applications are speech and short data messages and the connection type is circuit connection. Another interesting aspect is the realization of the infrastructure. As a rule of thumb, GSM cells can have a number of 1 up to 12 base station transceivers (BTS) that are fed to the antenna through a number of adders and combiners.
The era of third generation (3G) mobile communications has arrived and research is still carried on over the smooth installation of the several new systems. The primary objectives of 3G systems are interoperability, high throughput rates (up to 2Mbps), permanent connection support, transition to packet connection, QoS on demand and full coverage. The main applications will be streaming applications and the internet. Plans are held for multiple QoS standards and the potentiality for data load charge instead of time charge. A characteristic representative of 3G systems is the Universal Mobile Telecommunication System (UMTS).
According to 3GPP standardization, the several possible 3G applications are divided into categories with different QoS requirements. For example, the conversational class requires minimum delay time while the streaming class requires high throughput rates. In any case, the QoS of the system depends on several factors with the physical layer parameters as the most important. High levels of interference and extreme fading can damage the resulting QoS and thus restrict the user to applications with low QoS requirements.
Limitations
The evolution of mobile computing from 2G to 3G and now 4G has enabled the providers to build simple interfaces into mobile devices; once connected, the cloud service provider’s processing power, storage capacity and computing resources become available to the user. The technology will enable companies or organizations to host their services without worrying about IT infrastructure at the user-end. The apps enable interaction with FUTA Journal of Management and Technology Leveraging Mobile and Cloud Computing for Growth (A. Gokhale 2016).
CHAPTER THREE
Methodology
RESEARCH METHODOLOGY
Research Method
This chapter covers research design, geographical description of study area, target population, sampling procedure, sample size, data collection methods, validity and reliability, pilot study, data collection procedures, data analysis procedure and ethical consideration.
Research Design
Survey research design was adopted for this study. Nworgu (2006), defines a survey research as studying a group of items, things and people using few of the items or things taken to be typical of the group. The reason for adopting this method is because it promotes quick and easy presentation of facts and data. The design aims at casting light on the current problems through a process of data collection that enables one to describe the situation more completely and accurately (Ethridge, 2004). According to Orodho (2005), the design is used for preliminary and exploratory studies that permit the researchers to collect, summarize, present and interpret data for the purpose of clarification. The design enabled the researcher to collect sufficient data that provided an enhanced and thoughtful understanding of a research problem whereby both qualitative and quantitative research approach are utilized (Creswell & Plano, 2011). Owing to the fact that the population of the study is large, the researcher considered it necessary to use survey method so as to enhance the collection of accurate data on the topic. In addition, the design was relatively quick, easy and cheap to conduct (Grimes & Schulz, 2002).
Geographical Description of the Area of the Study
This research covers a smaller sample of government-owned institutions (Education, financial, health and IT) in Ovia North-East Local Government area of Edo State.
Ovia North-East is a Local Government area of Edo State, Nigeria. Its headquarters are in the town of Okada. It has an area 888 sq mi (2,803 km2) and a population of 153,849 at the 2006 census. The postal code of the area is 302. It has 13 wards, several places and cities, such as Ugbowo, Adolor Agho-ozomu. It geographical coordinates are within latitudes 6º38’41″N and longitudes 5º34’48″E -5º40″0″E of the equator (Vanguard News. 2020-08-28. Retrieved 2021-07-09)
Population of the Study
Mugenda and Mugenda (2003) defines target population as a set of actions, persons or objects to which the researcher desires to generalize the results of the research. In the study, the target population has 80 Education, financial, health and IT institutions spread in various wards in Ovia North-east Local Government area of Edo State. The total number of the population from 50 education, financial, health and IT institutions was 1,304,200 students (Ministry of Education, Edo State, 2010). The local government falls within a rich agricultural zone with good soils able to support a variety of crops. The main crops grown in this region are Plantain, maize, beans, bananas and cassava among others (Consultation Report, 2021). In spite of the fact that many families in the region depend on agriculture as the major source of income, the sector faces a wide range of limitations which, if not mitigated keep on working against poverty reduction efforts. Some of these challenges include high incidences of HIV/AIDS which has led to deaths in many families and the use of small family income to treat the sick, high population pressure, low agricultural outputs and too expensive input prices that discourage farmers from investing in agriculture (Kakamega County Development Report, 2015). For most people in the sub-county, educational expenditures are too high therefore the level of literacy is relatively low. This coupled with the reality that further educational trainings are hampered by inadequate number of middle level colleges.
CHAPTER FOUR
DATA PRESENTATION, ANALYSIS AND INTERPRETATION
Introduction
This chapter deals with the presentation and data analysis of relevant data gathered from the practical field survey. The presentation and analysis of data obtained was done scientifically, using descriptive analysis, frequency and simple percentages (%).
For the purpose of understanding, the data analysis was drawn from the administration of questionnaire on the research topic “The generations of mobile networks and their challenges of adoption in Nigeria.
The information or the social characteristics of the respondents are first presented before presenting responses on the research variables or questions on the subject matters.
CHAPTER FIVE
Summary
We have reviewed the 1st, 2nd, 3rd, 4th and 5th generation mobile communication technology and predicted the future generations of 6th and 7th generation. The first generation (1G) wireless mobile communication system is analog system which was used for public voice service with the speed up to 2.4kbps. It was introduced around the year1980. The second generation (2G) is based on digital technology and network infrastructure. As compared to the first generation, the second generation can support text messaging. It was introduced around the year 1990. The third generation wireless system (3G) was to provide wireless data service with data rates of 144kbps to 384kbps in wide coverage areas, and 2Mbps in local coverage areas, which can connect with internet. It was introduced around the year 2000.
In order to provide wireless mobile internet to users at the same quality as the fixed internet networks, 4G integrated the current existing cellular networks and Wireless LAN with fixed internet networks. Thus, the feature of 4G is one word – integration. It was introduced in the year 2010. This kind of integration may cause the handoff issue once the mobile users moving from one technology to another, which limit the movement of mobile users. The Mixband width data path is designed to solve this problem and make the 5G in real wireless world. It was introduced in the year 2020.
Conclusion
As it is today, it is the responsibility of the carrier and network consortium to provide customers with digital safety nets, except that customer complacency can be an issue as well. Data speeds are expected to be much faster than current levels, which also improves connectivity. This allows cloud-based data virtualization services to be as airtight as possible to protect user data and privacy. Similarly, users need to be more vigilant as data administrators.
Recommendations
- The government and network providers should be trained to understand the dynamics of mobile networks, its history, advantages, limitations and challenges of adoption. As trainings on this will strengthen and enable the government and network providers to render a more effective service to the public.
- Well trained individuals and social workers can inform communities through community development programs about the dynamics of mobile networks and it adoption, this can strengthen the tools of the social workers in the use of mobile networks.
- There should be an increased public awareness on the advantages and limitations on the adoption of mobile networks and solutions addressing these limitations should be proffered.
References
- Donepudi, P. (2016). Influence of Cloud Computing in Business: Are They Robust?
- Asian Journal of Applied Science and Engineering, 5(3), 193-196. https://doi.org/10.5281/zenodo.4110309
- Donepudi, P. (2017a). AI and Machine Learning in Banking: A Systematic Literature Review. Asian Journal of Applied Science and Engineering, 6(3), 157-162. https://doi.org/10.5281/zenodo.4109672
- Donepudi, P. K. (2017b). Machine Learning and Artificial Intelligence in Banking.
- Engineering International, 5(2), 83-86. https://doi.org/10.18034/ei.v5i2.490
- Donepudi, P. K. (2018a). AI and Machine Learning in Retail Pharmacy: Systematic Review of Related Literature. ABC Journal of Advanced Research, 7(2), 109-112. https://doi.org/10.18034/abcjar.v7i2.514
- Donepudi, P. K. (2018b). Application of Artificial Intelligence in Automation Industry.
- Asian Journal of Applied Science and Engineering, 7(1), 7-20. http://doi.org/10.5281/zenodo.4146232 www.ieeexplore.ieee.org/Xplore/guesthome.jsp
- Futa Journal Of Management And Technology Leveraging Mobile And Cloud Computing For Growth Vol.1, No. 2 December 2016
- Arai N, Enomoto H, Okabe S, Yuasa K, Kamimura Y, Ugawa Y. Thirty minutes mobile phone use has no short-term adverse effects on central auditory pathways. Clin Neurophysiol 2003;114:1390-4.