Feeds

Ofcom ploughs up UK spectrum fields, reseeds them with 4G

Used to be all 2G round here, far as the eye could see

High performance access to file storage

Ofcom has published plans to refarm mobile radio spectrum into 4G goodness, letting operators deploy whatever technology they like in their existing holdings as well as the bands on which they're currently bidding.

The proposals aren't surprising: Ofcom has made it clear that restricting bands to specific technologies is against its ethos and that refarming of the mobile bands was inevitable, so this is a welcome update delivered with surprising alacrity rather than anything earth-shattering.

So confident is Ofcom that refarming will prove uncontroversial it has bulked out the proposal (pdf, coma inducing apart from one line*) with requests from Telefonica and Vodafone to increase 3G transmission power a little, plus some contractual housekeeping, none of which should raise the public ire.

The increase in transmission power is 3dB, or effectively twice as much, but it's still well within safe margins and more about increasing coverage than microwaving locals.

The contractual stuff includes dropping the requirement to cover 80 per cent of the population with 3G, as that becomes redundant with the 90 per cent obligation which kicks in come June and specifies connectivity rather than technology - 758Kb/s, outdoors, 90 per cent of the time, frequency and technology irrelevant.

The refarming was assumed in the proposals outlining the 4G auction which is currently in progress. The auction takes place in secret, but right now there are telecoms executives deciding how much they can afford to spend on 4G bands at 800MHz and 2.6GHz, with bidding expected to last another week or two.

Those bidding will be doing so on the assumption that no-one raises any significant objections to the refaming proposals, though anyone wanting to do so will have until the end of March to file their response. ®

Bootnote

*The line relates to the clearing of the 4G bands, expected to wind up in June 2013, and it's only really funny if you're Scottish - "some restrictions may remain in the Highlands and Islands regions, although these are unlikely to affect the delivery of 4G services in Edinburgh and Glasgow".

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.