Feeds

O2, Vodafone allowed to hop onto each other's towers

Watchdog approves network-sharing love-in

High performance access to file storage

The UK Office of Fair Trading has formally approved O2 and Vodafone sharing infrastructure for their 2G and 3G networks, and probably upcoming 4G networks too.

The plan to share network infrastructure was announced back in June, but had to be assessed by the Office of Fair Trading, which has now announced that it can go ahead. The networks will remain separate, on different radio frequencies, but the base station infrastructure will be shared between the two to reduce running costs and speed up deployment of new technologies.

The operators already share power suppliers and air conditioning at a lot of cell sites, under their Cornerstone project, but this deal is a carbon copy of that which exists between EE (owner of the Orange and T-Mobile brands) and Three – although EE and Three's deal only covers 3G, as Three has no 2G network to share. Telefonica (owner of the O2 brand) and Voda, on the other hand, will share 2G as well, and are also planning to share 4G infrastructure – depending of course on how next year's mega-auction goes – and this should make deployment quicker.

Three and EE are to run separate 4G networks, with the hardware coming from Samsung and Huawei respectively. Both networks will operate in the 1800MHz band that EE was given in order to host 2G services. Way back when, when Orange and T-Mobile merged to become EE, the newly borged mobile network operator was required to sell off a chunk of that band, which will now go to Three, though EE won't be clearing out of it particularly quickly (it isn't required to hand over any of the spectrum until September next year).

Telefonica and Vodafone own decent bands at 900MHz, currently full of 2G but well suited to 3G. Fitting 4G into those bands would be hard as they're broken up into 5MHz stripes alternately owned by each company, and 4G excels at spreading into broader bands, so some sort of spectrum swap would be necessary to make it viable.

Next year's mega-auction will change the landscape significantly, and any 4G network sharing from Telefonica and Vodafone will be entirely dependent on what they end up holding when the dust settles afterwards. ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.