Welcome!

News Feed Item

The Inside-out wireless networks for fixed operators: the technical and commercial challenges of HetNets

LONDON, Sept. 2, 2014 /PRNewswire/ -- Reportbuyer.com has added a new market research report:

The Inside-out wireless networks for fixed operators: the technical and commercial challenges of HetNets

https://www.reportbuyer.com/product/2313391/The-Inside-out-wireless-networks-for-fixed-operators-thetechnical-and-commercial-challenges-of-HetNets.html

About this report
-This report analyses the technical and commercial challenges that operators adopting the so-called 'inside-out' approach to wireless network provision will face.
-It defines the approach and investigates the business drivers and opportunities.
-It assesses the technical challenges, including choice of spectrum, interference, cell identity management, the suitability of fixed broadband as backhaul and alternative fixed–mobile convergence (FMC) approaches.
-It assesses the commercial challenges around scale, distribution, wholesale contracts and pricing and offers a top-level total cost of ownership model.
-The report also provides recommendations for fixed, cable and mobile operators, as well as for network equipment providers (NEPs).

This report is based on the following sources:
-Analysys Mason's internal research on telecoms service competition, on mobile pricing, on Wi-Fi, small cells and self-organising networks, and interviews of industry stakeholders.

Table of contents

6.Executive summary

7.Executive summary

8.Recommendations

9.Recommendations

10.Inside-out and other approaches to FMC

11.Inside-out: crowd-sourced HetNets for fixed operators

12.Several high-profile operators are actively considering the femtocell-based inside-out approach

13.Other fixed–mobile convergence (FMC) approaches are available

14.Business drivers and opportunities for fixed and cable operators

15.The original consumer femtocell business case was driven by poor coverage, but new business models will have more robust demand

16.The inside-out strategy is an opportunity to for fixed network operators and MSOs to rejuvenate their telephony services

17.The inside-out model depends critically on a high relative volume of
at-home traffic and of traffic reachable by public small cells

18.Inside-out operators see an opportunity to undercut MNOs on the price of mobile voice and data

19.Unlimited mobile voice bundles are becoming more common, but this affects only the incremental, and not the actual, cost of voice services

20.Inside-out quadruple-play bundles make commercial sense only insofar as end users value the wired connection

21.Inside-out operators aim to capitalise on their fixed infrastructure assets to reduce the cost of mobile backhaul

22.Inside-out operators can capitalise on oversupply of mobile to force a good MVNO deal

23.Technical challenges

24.Little suitable spectrum is currently in the hands of potential inside-out operators

25.There is no shortage of suitable future spectrum, but most will be licence-exempt and the device ecosystems are immature

26.Using the installed base of fixed broadband connections for small-cell backhaul has several drawbacks

27.FMC options that are less costly than femtocells are available, but they have disadvantages

28.Radio interference management requirements increase as the number of cell sites and frequencies used increase

29.Self-organising networking (SON) reduces the operational difficulties and costs associated with small-cell networks, but it has risks

30.Interference between 2.4GHz Wi-Fi and 2.6GHz LTE can cause problems in the home router

31.Commercial challenges

32.Inside-out operators will have the scale for low customer-acquisition costs, but have credibility and brand challenges

33.Summary of additional costs and revenue

34.The cost of MVNO outfill is critical for the business case of an inside-out operator

35.An inside-out operator would have to balance the merits of per-unit or per-subscriber charges, but more-formal bitstream models may emerge

36.Inside-out models could prove both profitable and disruptive, but there are fixed start-up costs to overcome

37.Some broader implications of an inside-out approach

38.About the author and Analysys Mason

39.About the author

40.About Analysys Mason

41.Research from Analysys Mason

42.Consulting from Analysys Mason

List of figures

Figure 1: Companies covered in this report

Figure 2: The basic inside-out wireless network

Figure 3: Total and mobile consumer telecoms traffic by service type and location, 2013, Western Europe

Figure 4: Total and mobile consumer telecoms revenue by service type and location, 2013, Western Europe

Figure 5: Average retail revenue per mobile voice minute, selected markets, 2010–2013

Figure 6: Average retail revenue per minute by service type, selected markets, 2013

Figure 7: Voice minute allocations within mobile contract bundles, by country

Figure 8: Mass-market fixed and mobile revenue by network type, Western Europe, 2013

Figure 9: Average IP data traffic per month, by connection type, USA and Western Europe, and growth multiple 2013–2018

Figure 10: IP data traffic growth multiples by network type, USA and Western Europe, 2013–2018

Figure 11: Picocell roll-out costs for mobile operator, and potential savings for a fixed operator

Figure 12: MVNOs' market share of subscribers, 4Q 2013 compared with change in retail mobile revenue 2012–2013, Western Europe and Poland

Figure 13: Advantages and disadvantages of fixed–mobile convergence technologies

Figure 14: Illustrative example of cell distribution in mixed geotypes

Figure 15: 3GPP SON features grouped by functions

Figure 16: The 2.4GHz ISM band, contiguous bands, BT's spectrum holdings, and potential for interference

Figure 17: Details of selected fixed and cable operator MVNOs, Western Europe, 1Q 2014

Figure 18: Production cost of LTE networks by utilisation rate and average retail mobile broadband tariff per gigabyte, Western Europe, 4Q 2013

Figure 19: Main assumptions behind the inside-out mobile strategy model

Figure 20: Simplified model of the total cost of ownership of an inside-out mobile strategy, by cost centre, and mobile service revenue

Read the full report:
The Inside-out wireless networks for fixed operators: the technical and commercial challenges of HetNets

https://www.reportbuyer.com/product/2313391/The-Inside-out-wireless-networks-for-fixed-operators-thetechnical-and-commercial-challenges-of-HetNets.html

For more information:
Sarah Smith
Research Advisor at Reportbuyer.com
Email: [email protected]  
Tel: +44 208 816 85 48
Website: www.reportbuyer.com

SOURCE ReportBuyer

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will d...
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Le...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.
CI/CD is conceptually straightforward, yet often technically intricate to implement since it requires time and opportunities to develop intimate understanding on not only DevOps processes and operations, but likely product integrations with multiple platforms. This session intends to bridge the gap by offering an intense learning experience while witnessing the processes and operations to build from zero to a simple, yet functional CI/CD pipeline integrated with Jenkins, Github, Docker and Azure...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Dhiraj Sehgal works in Delphix's product and solution organization. His focus has been DevOps, DataOps, private cloud and datacenters customers, technologies and products. He has wealth of experience in cloud focused and virtualized technologies ranging from compute, networking to storage. He has spoken at Cloud Expo for last 3 years now in New York and Santa Clara.
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.