|By Marketwired .||
|March 28, 2014 06:00 AM EDT||
AUSTIN, TX -- (Marketwired) -- 03/28/14 -- The type of mobile backhaul deployed to support small cells not only impacts the performance of the solution but also the capital and operating expenses. Backhaul is critical to the overall success of the small cell architecture. Mobile operators are evolving their radio networks to use small cells, in addition to the macrocell network. Although small cell deployments are not as major as capital-intensive macrocell network deployments, everyone still wants to know: how does the type of backhaul used impact the cost of deploying small cells?
There are two basic types of last-mile backhaul options for any given small cell: wired or wireless. Within wired backhaul many options are possible. Fiber used for backhaul can be "lit", in which it has active electronics or "dark", without electronics. Additionally, fiber can be "aerial" -- strung on a pole, or "trenched" -- installed underground. Finally, mobile operators with significant fiber networks can use transfer pricing, which allows for backhaul throughput at a discounted price.
There are many types of wireless backhaul, including non-line-of-sight, near-line-of-sight, and line-of-sight, as well as point-to-point and point-to-multipoint. Several variations are also possible in terms of frequency -- sub-6 GHz spectrum, microwave frequencies and millimeter wave. Combining these many wired and wireless variables, iGR's small cell cost model has the following distinct backhaul cost scenarios: lit fiber aerial, lit fiber trenched, dark fiber aerial, dark fiber trenched, transfer pricing fiber aerial, transfer pricing fiber trenched, and wireless backhaul.
"Mobile operators are deploying small cells to provide necessary coverage to meet users' rising demand," said Iain Gillott, president and founder of iGR, a market research consultancy focused on the wireless and mobile industry. "iGR has found that the many mobile backhaul options used with small cells, as well as other variables, have created a very wide range of costs for their deployment."
iGR's new market study, U.S. Small Cell Costs: How much will they cost to deploy?, estimates the CapEx and OpEx of deploying small cells based on multiple variables, including location, type of small cell, type of backhaul, and scale. The report also provides a detailed discussion of het-nets, small cells, typical small cell installments, and different types of mobile backhaul.
The following key questions are addressed in the new research study:
- What is a het-net? What are small cells?
- What are network 'pain points'?
- What is driving the need for het-nets?
- How are pain points identified?
- What are different ways to address pain points?
- Where is it appropriate to deploy small cells (indoor and outdoor)?
- What are iGR's assumptions regarding small cell installations?
- What outdoor locations are best suited for small cell deployments?
- What are the average costs of these outdoor locations?
- What is an attachment? What is the average cost of an attachment?
- What are the different types of backhaul with regard to small cells?
- What types of backhaul are considered in the model?
- What is the average throughput needed for a small cell? What does that throughput cost?
- How much does it cost to deploy small cells?
The information in this report will be valuable for:
- Mobile operators
- Small cell equipment manufacturers
- Mobile backhaul suppliers
- Tower companies
- Antenna and tower equipment vendors
- Financial analysts and investors.
iGR is a market strategy consultancy focused on the wireless and mobile communications industry. Founded by Iain Gillott, one of the wireless industry's leading analysts, in late 2000 as iGillottResearch, iGR is now entering its fourteenth year of operation. iGR continuously researches emerging and existent technologies, technology industries, and consumer markets. We use our detailed research to offer a range of services to help companies improve their position in the marketplace, clearly define their future direction, and ultimately improve their bottom line.
iGR researches a range of wireless and mobile products and technologies, including: smartphones; tablets; mobile wearables; connected cars; mobile applications; bandwidth demand and use; small cell and het-net architectures; mobile EPC and RAN virtualization; DAS; LTE; VoLTE; IMS; NFC; GSM/GPRS/UMTS/HSPA; CDMA 1x/EV-DO; iDEN; SIP; macro-, pico- and femtocells; mobile backhaul; WiFi and WiFi offload; and SIM and UICC.
A more complete profile of the company can be found at www.igr-inc.com.
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Sep. 27, 2016 09:30 PM EDT Reads: 2,949
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 27, 2016 09:30 PM EDT Reads: 453
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Sep. 27, 2016 08:30 PM EDT Reads: 2,034
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Sep. 27, 2016 08:15 PM EDT Reads: 2,228
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Sep. 27, 2016 07:30 PM EDT Reads: 2,148
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Sep. 27, 2016 07:00 PM EDT Reads: 2,855
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Sep. 27, 2016 06:45 PM EDT Reads: 1,816
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Sep. 27, 2016 06:30 PM EDT Reads: 3,565
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Sep. 27, 2016 06:30 PM EDT Reads: 2,202
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Sep. 27, 2016 06:15 PM EDT Reads: 403
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
Sep. 27, 2016 06:00 PM EDT Reads: 1,700
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Sep. 27, 2016 05:45 PM EDT Reads: 1,662
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Sep. 27, 2016 05:30 PM EDT Reads: 2,028
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Sep. 27, 2016 05:15 PM EDT Reads: 316
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Sep. 27, 2016 05:15 PM EDT Reads: 2,771