|Innovating The Next Big Thing||May 23, 2013|
• Analyst Insights
• Enterprise Insights
• Network & Information Security
• Enterprise Mobility
• Remembering 9/11
Next Innovator Group
Feedjit Live Web Stats
• Ghost City
iSuppli: Driven by LTE, China’s Wireless Infrastructure Investment will Peak in 2014
Apr 24, 2012 – Hailin Zhao
Increasing expenditures on equipment intended to support the rollout of 4G long term evolution (LTE) wireless services are expected to cause China’s total spending on mobile infrastructure gear to peak at $11.2 billion in 2014, according to the IHS iSuppli China Electronics Research Service at information and analytics provider IHS (NYSE: IHS).
“Time-division (TD) LTE is undergoing pre-commercial trials in China, which will continue through the second half of 2012,” said Hailin Zhao, analyst for China electronics research at IHS. “However, actual LTE services will start to launch in 2013, boosting infrastructure gear expenditures. The year 2014 will mark the peak of the current infrastructure gear spending cycle until the next generation of wireless investment begins.”
This year, China’s mobile infrastructure spending will decrease by 7 percent to $9.9 billion, down from $10.7 billion in 2011. In 2013, spending will inch up 1 percent to $10.0 billion before rising by an impressive 12 percent in 2014, as shown in the figure below.
Explosion of Subscribers
Out of this total, 2G subscribers increased 6.7 percent to 848.2 million. Meanwhile 3G subscribers grew explosively by 171.0 percent to 127.5 million.
At the end of 2011, China Unicom had deployed 240,000 wideband code division multiple access (WCDMA) base stations with more than 720,000 carrier sectors (CS). Meanwhile, China Telecom deployed about 400,000 base stations with over 1.4 million CS. Furthermore, the number of TD-SCDMA (time-dvision synchronous code division multiple access) base stations in operation reached 200,000 with 1.5 million CS.
In terms of the GSM network, there were 680,000 base stations with more than 7.5 million transceivers (TRXs) operated by China Mobile, compared to 380,000 base stations with over 2.0 million TRXs that were deployed by China Unicom. Moreover, China’s broadband network volume reached 230 million ports, up 25.7 percent from the end of 2010.
China Mobile Nearly Finished with TD-LTE Trials
More than 10,000 evolved UMTS (universal mobile telecommunications systems) terrestrial radio access network node Bs (eNodeBs) were planned to be built. Three cities—Beijing, Tianjin and Qingdao—will take part in the second round of the trial.
The second phase of the trial will focus mainly on testing TD/SCDMA and TD-LTE dual-mode equipment and devices. This will allow China Mobile to practice large-scale commercial deployments and to enhance its interconnection and interworking capability, such as roaming and handover, among different vendors’ TD-LTE equipment and devices.
IHS estimates that the total investment will reach as much as $500 million for the second round. Most of the eNodeBs deployed in the next trial can reuse the current TD-SCDMA network resources, including civil works and fiber optical, to greatly reduce total capital expenditures.
China Mobile also plans to launch its TD-LTE pre-commercial in Shenzhen and Hangzhou during the second half of 2012, with the total number of TD-LTE eNodeBs amounting to 20,000 units. If TDLTE licenses can be issued at the end of 2012 or at the beginning of 2013, the operator will complete its coverage in the densely populated areas at various municipalities, provincial capitals and cities specially designated in the state plan by the end of 2013, and then go on to seamlessly cover the urban areas at or above the county-level cities by the end of 2014.
IHS estimates that the number of TD-LTE eNodeBs will amount to 150,000 units by the end of 2015, with the next round of wireless infrastructure investment in China to peak in 2014.
» Send this article to a friend...
» Comments? Tell us what you think...
» More Analyst Insights articles...
Commentsblog comments powered by Disqus
Support This Site
• 5/12 Frontline Sentinel: Two-Factor Authentication for Social Media Sites
• 5/10 McAfee Blogs: RealTime for ePO – Optimized Endpoint Security
• 5/10 Ovum: Ovum comments: GB smart meter delay better late than never
• 5/10 Gartner Says India Has The Potential To Lead The World In The Nexus Of Social, Mobile, Cloud And Information But May Waste The Opportunity
• 5/9 Frontline Sentinel: NSA's Manual on Hacking the Internet
• 5/9 Frontline Sentinel: 8 charged in $45 million cybertheft bank heist
• 5/9 Gartner Highlights Three Key Foundational Elements for Demand-Driven Retail Success
• 5/9 iSuppli: Korean and American Versions of Galaxy S4 as Different as Kimchee and Coleslaw, IHS Teardown Reveals
• 5/9 eMarketer: eMarketer: Emerging Markets Drive Facebook User Growth
• 5/9 Wireless Watch: Microsoft/Nokia alliance at crossroads as both ponder OS futures
• 5/9 Wireless Watch: Apple must rethink far more than the iOS user interface
• 5/9 Faultline: Quantenna gets closer to ST Micro, expect it to get “ascloseasthis”
• 5/9 Faultline: Microsoft volunteers to take Nook, as Barnes and Noble start to breakup
• 5/9 Canalys: Smart mobile device shipments exceed 300 million in Q1 2013 - Android powers 59% of smart phones, tablets and notebooks
• 5/8 McAfee Blogs: Cybercriminals Celebrate – It’s Mothers Day!!
• 5/8 Ovum: Government policy-makers need to create a level playing field for cloud services procurement
• 5/8 Gartner Says Smart Organizations Will Embrace Fast and Frequent Project Failure in Their Quest for Agility
• 5/7 McAfee Blogs: How Secure Are Your Social Accounts?
• 5/7 McAfee Blogs: The Password Problem. Is it Your Problem?
• 5/7 McAfee Blogs: Have you met McAfee’s SIEM?
• 5/7 McAfee Blogs: NCCDC 2013 – Red Team Recap
• 5/7 HP Security Lab Blog: HP TippingPoint announces Security Management System 3.6
• 5/7 McAfee Blogs: Yes, There are “Mother’s Day” Scams
• 5/7 Ovum: Analyst View: TPG looks to become Australia’s fourth MNO
• 5/7 Ovum: Analyst view: UK G-Cloud to champion public cloud
• 5/7 Gartner Says CIOs Will Need to Manage Both Technology and Business Innovation to Gain Competitive Advantage with Big Data
• 5/6 Gartner Says Indian Public Cloud Services Market To Reach $443 Million In 2013
• 5/6 iSuppli: IHS Discusses How PCs Can Survive the Tablet Invasion, at the SID Touch Gesture Motion Event
• 5/6 McAfee Blogs: Emerging ‘Stack Pivoting’ Exploits Bypass Common Security
• 5/5 McAfee Blogs: Intel, McAfee Investing in Network Security; Strength through Acquisition
• 5/5 McAfee Blogs: Change Your Password Day – Get Onboard!
• 5/5 Frontline Sentinel: iFrame drive-by attack demo [Anatomy of Attack online]
• 5/3 Frontline Sentinel: Basic Use of Maltego for Network Intelligence Gathering
• 5/3 iSuppli: Russian, Eastern European Video Surveillance Market to Double from 2012 to 2017
• 5/3 McAfee Blogs: AP, Burger King, LivingSocial….Who’ll be Hacked Next?
• 5/2 iSuppli: SSDs to Account for One-Third of Worldwide PC Storage Shipments by 2017
• 5/2 iSuppli: PV Inverter Supplier Base Fragments in 2012 – Minimal Impact From Recent M&A Activity in 2013
• 5/2 McAfee Blogs: Healthcare Cloud Enabled Analytics is Growing
• 5/2 Ovum: Analyst view: Facebook’s Q1 2013 results
• 5/2 Australian Organizations to Spend A$70 Million on Business Process Management Suites in 2013: Gartner
• 5/2 Worldwide Semiconductor Assembly and Test Services Market Grew 2.1 Percent in 2012, According to Final Results by Gartner
• 5/2 Wireles Watch: ZigBee Alliance completes Smart Energy Profile 2:
• 5/2 Wireless Watch: AMD, AT&T and Ericsson – wireless value chain shifts to IoT
• 5/2 Faultline: Netflix Hastings predicts OTT world – should stick to profit predictions
• 5/2 Faultline: Ziggo to add 1m homespots by August, work with Liberty Global
• 5/2 Canalys: Canalys launches ‘Appcessory Analysis’ service - First analyst firm to launch a dedicated continuous information service in this space
• 5/1 McAfee Blogs: BadNews for Good People
• 5/1 Frontline Sentinel: The PR Implications Of Cyber Security
• 5/1 HP Security Lab Blog: So, you want to build a Security Operations Center...
• 5/1 HP Security Lab Blog: The new era of security intelligence, part 1