Feeds

Ofcom begins mobile broadband study

Compares networks

High performance access to file storage

Ofcom wants to know just how broad mobile broadband is, and has commissioned a four-month study of the subject with a full report expected to go public next January.

The UK regulator has appointed Cardiff-based Epitiro to carry out a study of the UK's mobile operators, logging average connection speeds and latency on 3G networks, so we can see the kind of service customers are getting and compare it to what they were promised.

Epitiro will carry out the study using fixed and moving laptops running detailed analysis tools, supplemented by self-selected volunteers who download its software-based monitoring package (which is also used to compile fixed-broadband data).

That's the same methodology the company used to compile its first report on mobile broadband, published last year. That report (pdf) was a PR play, and a successful one given that the company has now landed the Ofcom contract. The new study will be larger, and will include analysis of using mobile broadband whilst in a moving vehicle, but most critically it should name the operators involved.

The last report was concerned with averages, establishing that mobile broadband users got around 24 per cent of the bandwidth advertised, but it also showed huge differences between the networks in packet loss and latency, without revealing which networks did worst. Epitiro won't promise to reveal the names this time around, but it will provide un-obfuscated data to Ofcom who is generally happy to share.

The last report covered six network operators, including Virgin who were advertising a different connection speed at the time despite being a virtual operator (Virgin owns no network infrastructure). Since then the landscape has changed rather, with Orange and T-Mobile in the process of merging to create a combined network for Everything Everywhere, which will also be shared with 3. That could leave the UK with only three national networks within a few years, and no doubt provide operators with explanations should their performance not be up to scratch when the report is published in January. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.