Name the four generations of cellular technology, and describe each.

What will be an ideal response?


The telecommunications industry divides cellular technologies into four generations that are
labeled 1G, 2G, 3G, and 4G, with intermediate versions labeled 2.5G and 3.5G. The generations can be
characterized as follows:
? 1G: The first generation began in the latter 1970s, and extended through the 1980s. The
systems, which were originally called cellular mobile radio telephones, used analog signals to
carry voice.
? 2G and 2.5G: The second generation began in the early 1990s and continues to be used. The
main distinction between 1G and 2G arises because 2G uses digital signals to carry voice. The
label 2.5G is used for systems that extend a 2G system to include some 3G features.
? 3G and 3.5G: The third generation began in the 2000s, and focuses on the addition of higher-
speed data services. A 3G system offers download rates of 400 Kbps to 2 Mbps, and is intended
to support applications such as web browsing and photo sharing. 3G allows a single telephone
to roam across North America, Japan, and Europe.
? 4G: The fourth generation began around 2008, and focuses on support for real-time
multimedia, such as a television program or high-speed video download. In addition, 4G phones include multiple connection technologies, such as Wi-Fi and satellite; at any time, the
phone automatically chooses the best connection technology available

Computer Science & Information Technology

You might also like to view...

If a thread calls __________, then every thread waiting for the object becomes eligible to acquire the lock.

a. signalEach b. signalAll c. signal d. signalMethods

Computer Science & Information Technology

Show the student roster (use the format: , in a single column) for each section that Todd Smythe teaches. Identify the section using course number AND section number.

What will be an ideal response?

Computer Science & Information Technology

The CSS ____________________ describes the imaginary boxes that are formed around elements in a Web page.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Many of the more secure personal finance apps have dual passwords that involve typing a string of characters and also validating a picture.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology