Feeds

Ofcom begins mobile broadband study

Compares networks

Internet Security Threat Report 2014

Ofcom wants to know just how broad mobile broadband is, and has commissioned a four-month study of the subject with a full report expected to go public next January.

The UK regulator has appointed Cardiff-based Epitiro to carry out a study of the UK's mobile operators, logging average connection speeds and latency on 3G networks, so we can see the kind of service customers are getting and compare it to what they were promised.

Epitiro will carry out the study using fixed and moving laptops running detailed analysis tools, supplemented by self-selected volunteers who download its software-based monitoring package (which is also used to compile fixed-broadband data).

That's the same methodology the company used to compile its first report on mobile broadband, published last year. That report (pdf) was a PR play, and a successful one given that the company has now landed the Ofcom contract. The new study will be larger, and will include analysis of using mobile broadband whilst in a moving vehicle, but most critically it should name the operators involved.

The last report was concerned with averages, establishing that mobile broadband users got around 24 per cent of the bandwidth advertised, but it also showed huge differences between the networks in packet loss and latency, without revealing which networks did worst. Epitiro won't promise to reveal the names this time around, but it will provide un-obfuscated data to Ofcom who is generally happy to share.

The last report covered six network operators, including Virgin who were advertising a different connection speed at the time despite being a virtual operator (Virgin owns no network infrastructure). Since then the landscape has changed rather, with Orange and T-Mobile in the process of merging to create a combined network for Everything Everywhere, which will also be shared with 3. That could leave the UK with only three national networks within a few years, and no doubt provide operators with explanations should their performance not be up to scratch when the report is published in January. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Broadband sellers in the UK are UP TO no good, says Which?
Speedy network claims only apply to 10% of customers
Virgin Media struck dumb by NATIONWIDE packet loss balls-up
Turning it off and on again fixes glitch 12 HOURS LATER
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.