Nokia Siemens talks up QoS in mobile networks
- 14 June, 2011 01:00
Nokia Siemens Networks is hoping more operators will start using QoS to offer differentiated mobile broadband services. But the technology will be a hard sell, because proving users are getting their money's worth will be difficult, Richard Webb, directing analyst at Infonetics, said.
Today, operators are looking for new ways to charge for mobile data, and using QoS is one alternative. Nokia Siemens sees the technology mainly being used when mobile networks are congested, it said in a blog post on Monday.
In Finland, telecom operator Elisa is already using QoS to give subscribers who are willing to pay for more bandwidth when the radio path is congested, it said on Nokia Siemens' website.
QoS can also be used to provide a more fine grained bandwidth throttling when a user has surpassed the monthly data quota. When that happens the user's priority is dropped to a lower class, resulting in a slower connection when the network is overloaded, rather than throttling the traffic all the time, Nokia Siemens wrote.
At the same time, Nokia Siemens underlines that QoS does not replace the need for having good capacity and coverage.
More operators are now looking at using QoS to differentiate their offerings. Egyptian operator Etisalat Misr has successfully tested products from Huawei and Ericsson over HSDPA (High-Speed Download Packet Access), industry organization GSA (Global mobile Suppliers Association) said on Sunday. During the test users were divided into three types: gold, silver and bronze.
But, in general, operators seem to be moving forward with caution when it comes to packaging these features as services.
"I would think its because so few have really figured what their long-term data strategy is. It doesn't seem so clear when you speak to [operators] about it," said Webb.
If the operators go down the QoS route, the challenge will be to justify and explain premium price plans, and then deliver on what they have promised, according to Webb. It is difficult for operators to benchmark the differences, because the speed in a mobile network depends on so many factors, he said.
"You also run the risk of losing the casual subscriber that doesn't want to understand all that stuff," said Webb.
Getting it right is important, because as operators gradually move to 4G they have to be able to position those networks as an improvement over their 3G counterparts, according to Webb.
Send news tips and comments to email@example.com
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Customer Success - Slater & Gordon Lawyers
Lawyers work hard, and they work fast. Any activity that takes their focus away from the task at hand represents lost productivity and lost revenue. Slater & Gordon Lawyers needed to filter spam and email-borne malware and provide high availability for email. Results from the business solution they chose include 250 hours of IT staff time reclaimed annually for other tasks, long delays in email delivery alleviated, reduced email-related storage costs, and email failover to the cloud in minutes, avoiding hours-long outages. Find out how they got these results.
2013 Global Information Security Survey: Initial findings
The results of PwC’s annual Global Information Security Survey indicate that companies are confident in their efforts to secure systems, information, and privacy. Strategies and personnel are in place, they say, and processes and technology are humming along. The number of incidents reported seems manageable. Read more.
Advanced Targeted Attacks
The new threat landscape has changed. Cybercriminals are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpaced the defensive technologies used by most companies today. Find out more on how to protect against the next generation of cyber-attacks.