Welcome!

News Feed Item

Carriers Going Gangbusters with WiFi and Hotspot 2.0, Infonetics Survey Shows

Market research firm Infonetics Research released excerpts from its 2014 Carrier WiFi Strategies and Vendor Leadership: Global Service Provider Survey, which explores the drivers, strategies, models, and technology choices that are shaping service provider WiFi deployments.

CARRIER WIFI ANALYST NOTE

“Carrier WiFi deployments are evolving to deliver the same quality of experience as mobile and fixed-line broadband service environments, and this is driving WiFi networks to become more closely integrated. Hotspot 2.0, a key tool developed by the industry to aid this drive, shows rapid adoption by carriers participating in our latest carrier WiFi survey,” notes Richard Webb, directing analyst for mobile backhaul and small cells at Infonetics Research.

Webb adds: “Operators are betting pretty big on carrier WiFi, but they’re also keen to develop ways of monetizing services so that WiFi starts to pay for itself over the coming years. WiFi roaming and location-based services are examples of customer plans that are growing fast.”

CARRIER WIFI SURVEY HIGHLIGHTS

  • Respondents have an average of around 32,000 access points currently, growing to just over 44,000 by 2015, representing 33% growth over the next year
  • 40% of Infonetics’ operator respondents expect to integrate Hotspot 2.0 into more than half their access points by the end of 2015
  • Among those surveyed, the top 3 monetization models for WiFi services are pre-pay, bundled with mobile broadband subscription, and tiered hotspots
  • WiFi as a separate overlay network currently leads the list of technologies and architectures for offloading data traffic; meanwhile, more sophisticated carrier WiFi architectures gain gradual traction as respondents look to bring WiFi into the mobile RAN via SIM-based service models or by deploying dual-mode WiFi/small cells
  • Respondents perceive Cisco and Ruckus Wireless as the top carrier WiFi manufacturers for second consecutive year

INDOOR WIRELESS SOLUTIONS WEBINAR AND FREE REPORT

Join analyst Richard Webb May 6 at 11:00 EDT for Indoor Wireless Solutions: Technologies, Challenges and Backhaul, which compares picocells, metrocells, WiFi, DAS, and repeaters. Registrants receives a special Small Cells Market Report. Attend live or access the replay: http://w.on24.com/r.htm?e=775881&s=1&k=4FBF544ACB6D1CB5462A6279E79E7A75

CARRIER WIFI SURVEY SYNOPSIS

For its 43-page WiFi strategies survey, Infonetics interviewed independent wireless, incumbent, competitive, and cable operators in Europe, Asia Pacific, the Middle East and Africa, North America, and Latin America that have deployed WiFi in the public domain (or will soon). The report provides insights into carrier WiFi deployment drivers and locations; access point standards, form factors, features, ranges, and backhaul connections; hotspots; mobile data offload; service delivery models and challenges; customer plans; and opinions of WiFi equipment manufacturers. Vendors named in the survey include Alcatel-Lucent, Aruba Networks, Cisco, Ericsson/BelAir, Guoren, HP, Huawei, Motorola, NSN, Ruckus Wireless, Zhidakang, Xirrus, ZTE, and others. To buy the report, contact Infonetics: http://www.infonetics.com/contact.asp.

RELATED REPORT EXCERPTS

RECENT AND UPCOMING CARRIER WIFI/SMALL CELL RESEARCH

Download Infonetics’ 2014 market research brochure, publication calendar, events brochure, report highlights, tables of contents, and more at http://www.infonetics.com/login.

INFONETICS WEBINARS

Visit https://www.infonetics.com/infonetics-events to register for upcoming webinars, view recent webinars on demand, or learn about sponsoring a webinar.

  • Indoor Wireless Solutions: Technologies, Challenges & Backhaul (May 6: Attend)
  • NFV: The Nitty Gritty (May 8: Attend)
  • The Role of Service Delivery Platforms in M2M and IoT (May 20: Attend)
  • How to Get the Best out of DAS, Small Cells, and WiFi (June 5: Attend)
  • Planning For, Deploying & Operating HetNets (Aug. 7: Sponsor)
  • Cashing in on Service Provider WiFi (View on-demand)
  • The Increasing Threat of Compromised Web Servers & How to Mitigate It (View on-demand)

TO BUY REPORTS, CONTACT:

N. America (West), Asia Pacific: Larry Howard, [email protected], +1 408-583-3335

N. America (East, Midwest), L. America: Scott Coyne, [email protected], +1 408-583-3395

EMEA, India, Singapore: George Stojsavljevic, [email protected], +44 755-488-1623

Japan, South Korea, China, Taiwan: http://www.infonetics.com/contact.asp

ABOUT INFONETICS

Infonetics Research (www.infonetics.com) is an international market research and consulting firm serving the communications industry since 1990. A leader in defining and tracking emerging and established technologies in all world regions, Infonetics helps clients plan, strategize, and compete effectively. View Infonetics’ About Us slides at http://bit.ly/QUrbrV.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
In their general session at 16th Cloud Expo, Michael Piccininni, Global Account Manager - Cloud SP at EMC Corporation, and Mike Dietze, Regional Director at Windstream Hosted Solutions, reviewed next generation cloud services, including the Windstream-EMC Tier Storage solutions, and discussed how to increase efficiencies, improve service delivery and enhance corporate cloud solution development. Michael Piccininni is Global Account Manager – Cloud SP at EMC Corporation. He has been engaged in t...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.