trends in telecommunication reform 2006
Transcription
trends in telecommunication reform 2006
Te l e c o m m u n i c a t i o n U n i o n 2 020060 6 I n t e r n a t i o n a l N I S D TRECONMMUNICATION *28388* Printed in Switzerland Geneva, 2006 ISBN 92-61-11431-8 T R E N D S I N T E L E C O M M U N I C AT I O N R E F O R M TELE m r o f re 6 0 20 G N I T A L REGU E H T I N ADBAND BRO D L R WO International Te l e c o m m u n i c a t i o n Union ALSO AVAILABLE FROM ITU PUBLICATIONS Trends in Telecommunication Reform: Licensing in an Era of Convergence, 2004/05 (6th Edition) ..............................95 CHF Trends in Telecommunication Reform: Promoting Universal Access to ICTs, 2003 (5th Edition) ..................................90 CHF Trends in Telecommunication Reform: Effective Regulation, 2002 (4th Edition) ...........................................................90 CHF Trends in Telecommunication Reform: Interconnection Regulation, 2000-2001 (3rd Edition) .......................................90 CHF Trends in Telecommunication Reform: Convergence and Regulation, 1999 (2nd Edition) .............................................75 CHF General Trends in Telecommunication Reform 1998: World Volume I...........................................................................75 CHF General Trends in Telecommunication Reform 1998: Africa Volume II ..........................................................................65 CHF General Trends in Telecommunication Reform 1998: Americas Volume III ...................................................................55 CHF General Trends in Telecommunication Reform 1998: Arab States Volume IV ...............................................................45 CHF General Trends in Telecommunication Reform 1998: Asia Pacific Volume V ................................................................60 CHF General Trends in Telecommunication Reform 1998: Europe Volume VI .......................................................................72 CHF Collection of five Regional reports (Volumes II-VI) ......................................................................................................297 CHF Collection of Regional and World reports (Volumes I-VI).............................................................................................372 CHF The Arab Book: Telecommunication Policies for the Arab Region, 2002 ......................................................................50 CHF The Blue Book: Telecommunication Policies for the Americas, 2000 (2nd Edition) ......................................................50 CHF Please contact the ITU Sales Service: Tel.: +41 22 730 5111 Fax: +41 22 730 5194 E-mail: [email protected] Website: www.itu.int © ITU 2006 International Telecommunication Union Place des Nations CH-1211 Geneva, Switzerland First printing 2006 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of the International Telecommunication Union. Denominations and classifications employed in this publication do not imply any opinion on the part of the International Telecommunication Union concerning the legal or other status of any territory or any endorsement or acceptance of any boundary. Where the designation “country” appears in this publication, it covers countries and territories. ISBN 92-61-11431-8 Note: Discounts are available for all ITU Member States, Sector Members and Least Developed Countries. I n t e r n a t i o n a l Te l e c o m m u n i c a t i o n U n i o n N I S D TRECONMMUNICATION TELE m r o f re 02 06 G N I T A L REGU E H T I N ADBAND BRO v1.01 D L R WO International Te l e c o m m u n i c a t i o n Union This report was prepared by a team led by Doreen Bogdan-Martin and Susan Schorr. The team included: John Alden, William Bratton, Tracy Cohen, Yang-Soon Lee, Olli Mattila, Michael Best, John Muleta, John Palfrey, Bjorn Pehrson, Audrey Selian, Wu Wei Shi, Russell Southwood and Nancy Sundberg. We specially thank Tania Bezago, our GREX Advisor, who provided additional research and Esperanza Magpantay, BDT, who contributed ICT statistics. The cover was designed by Stéphane Rollet. The report was edited by John Alden. The regulatory tables were prepared by Kevin Munn and Nancy Sundberg. The ITU Publications Composition Department was responsible for production of the report. The report has benefited from the comments and advice of ITU staff including: Tim Kelly, Colin Langtry, Fabio Leite, Ricardo Passerini and Robert Shaw. We would especially like to thank for their comments: Martin Cave (Warwick Business School, University of Warwick); Claudia Sarrocco (Organisation for Economic Co-operation and Development); Suresh Ramasubramanian (Outblaze); John Haydon (Australian Communications and Media Authority); Tom Dale (Australian Department of Communications, IT and the Arts); Ewan Sutherland (International Telecommunication Users Group); Derek Bambauer, David Abrams, Jonathan Zittrain (the Berkman Center); and César David Moliné (Indotel, Dominican Republic). These contributions, together with the support from ICT ministries and regulators, and others who have provided data and background material, are gratefully acknowledged. Without their support, a report of this nature would be impossible. ii FOREWORD We are proud to present the seventh edition of Trends in Telecommunication Reform, an integral part of our dialogue with the world’s information and communications technology (ICT) policy-makers and regulators. This 7th edition has been released at a time of remarkable transformation of the information and communication technology (ICT) sector, fuelled by a combination of technological, market, policy and regulatory developments. These changes include unparalleled numbers of voice telephone subscribers, the rise of IP-enabled networks and Voice over IP (VoIP) services, initial-yet promisingdeployment of fixed line broadband and broadband wireless access (BWA) services and intelligent radio devices. At the same time that developed countries are busy planning for the deployment of next generation networks and visualize a world of ubiquitous networks, most developing countries have expanded their continuing quest to provide universal access to basic voice services to include universal access to broadband internet services. Are developing countries making any progress in this quest? How can regulators harness the potential of new technologies and innovative business models to foster ICT sector development? In 1984, the Maitland Commission’s ‘Missing Link’ report identified the challenge of bringing basic telecommunication services within easy reach of all the world’s people by the early part of the 21st century. The Missing Link report has been the touchstone for the work of the Telecommunication Development Bureau (BDT) of the International Telecommunication Union (ITU) since its inception. In 2002, mobile cellular communications were heralded as the answer to the missing link. Second generation mobile services have been rolled out to more people in the developing world than the Maitland Commission could ever have imagined possible-although the challenge of universal access to basic services remains. The success of mobile communications is linked to policy and regulatory reforms as well as innovative business models and new technological applications, such as short message services (SMS). Twenty years later, the World Summit on the Information Society (WSIS) set even more ambitious targets, to extend the internet to all the world’s villages by 2015 as the foundation for building the In- formation Society. The WSIS also identified the vital role the regulatory framework plays in enabling the Information Society. The global community of national communications regulators met on the eve of the second phase of WSIS to develop a new vision of a regulatory framework to promote the deployment of broadband internet communication services worldwide, in developing and developed countries alike. At that same meeting, known as the ITU Global Symposium for Regulators (GSR), regulators recognized that full participation in the Information Society requires access to broadband internet services. Low cost technologies exist today that can promote broadband access and enable developing countries to “leapfrog” over older technologies to advance into the broadband future rapidly. Many businesses stand ready to start providing broadband services in developing countries-mirroring the keen interest second-generation mobile service providers demonstrated in developing countries throughout this decade. Although broadband technologies and business models hold great promise, the pace of broadband take-up hinges on the regulatory framework. In many countries, today’s broadband ‘missing link’ is the regulatory framework. Regulators have an unprecedented opportunity to speed the uptake of broadband to enable the Information Society. Today’s broadband challenge requires new thinking, and an end to business as usual. This publication is designed to enable regulators and policy-makers to meet this challenge. The report has been prepared by the ITU’s Telecommunication Development Bureau. The authors have benefited from comments and input from a range of people, inside and outside of ITU. The views expressed in the report, however, are those of the authors and do not necessarily reflect the opinions of ITU or its members. Hamadoun I. Touré Director Telecommunication Development Bureau 7 March 2006 iii CONTENTS 1 1.9 MARKET AND REGULATORY TRENDS IN THE ICT SECTOR ...............................................................................1 What will it take to bring broadband to the masses? ............... 1 ICT infrastructure deployment ................................................ 2 Market Trends in Privatizations, Investments and Services....... 6 Competition .......................................................................... 9 National Regulatory Authorities, Who Rules? ........................ 12 Regulatory Challenges of VoIP ............................................ 14 Spectrum Management ....................................................... 16 Dealing with Spam ............................................................. 16 Conclusion ......................................................................... 18 2 2.1 2.2 2.3 WHAT IS “BROADBAND”? ............................................ 21 What Do We Mean When We Say “Broadband”? ................... 21 A Short Broadband Taxonomy ............................................. 22 Conclusion ......................................................................... 26 3 3.1 3.2 3.3 3.4 3.5 3.6 UNDERSTANDING BROADBAND TECHNOLOGIES ..... 27 How Broadband Networks Are Designed ............................... 27 A Wire-line Broadband Roadmap ......................................... 29 Broadband Wireless Access (BWA) Networks ....................... 33 A Decision Framework for Broadband................................... 41 Power requirements for broadband ....................................... 44 Conclusion ......................................................................... 49 4 THE ROLE OF THE REGULATOR IN BROADBAND 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 4.9 iv P A G E P A G E DEVELOPMENT ............................................................... 51 Introduction ........................................................................ 51 The Importance of Broadband in Developing Countries ......... 54 Key Issues in Promoting Broadband in Developing Countries 54 Providing Incentives for Network Investment......................... 56 Broadband Licensing .......................................................... 58 Alternative Approaches to Broadband Deployment ............... 60 Competition and Industry Regulation.................................... 63 Increasing Broadband Awareness ......................................... 69 Conclusion ......................................................................... 71 5 5.1 5.2 5.3 5.4 5.5 5.6 5.7 BROADBAND SPECTRUM MANAGEMENT ................ 75 Introduction ........................................................................ 75 The Economics of Broadband Wireless Access..................... 76 The Technology Revolution ................................................. 78 Adapting Spectrum Regulatory Models for BWA ................... 78 Defining Best Practices ....................................................... 83 Case Study: BWA Spectrum Allocation in Mauritius.............. 87 Conclusion ......................................................................... 90 6 6.1 6.2 6.3 6.4 6.5 6.6 VOIP AND REGULATION ................................................ 91 VoIP: Regulatory Evolution or Revolution? ............................ 91 The Pace of VoIP Market Development ................................. 95 Grappling with Change: Regulators’ Responses to VoIP ....... 96 Crafting New Regulatory Approaches to VoIP ...................... 100 End User and Consumer Issues ......................................... 105 Conclusion ....................................................................... 108 7 7.1 7.2 7.3 7.4 7.5 STEMMING THE INTERNATIONAL TIDE OF SPAM.. 111 The Spam Problem ............................................................ 111 An Outline of a Model Law ................................................. 115 Codes of Conduct ............................................................. 119 Education and Awareness ................................................. 122 Conclusion ....................................................................... 123 8 8.1 8.2 8.3 8.4 MAKING BROADBAND WORK FOR ALL .................... 127 What Is Broadband?........................................................... 127 Why Should I Care about Broadband?................................. 127 How Can I Get Broadband? ................................................ 128 What Can Regulators Do? .................................................. 128 REGULATORY TABLES .......................................................... 131 Table 1 – Countries with a separate Regulatory Authority .............133 Table 3 – Status of the main fixed-line operators .........................169 Table 4 – Level of competition ....................................................203 P A G E P A G E GLOSSARY OF TERMS .......................................................... 215 LIST OF TABLES..................................................................... 229 LIST OF FIGURES .................................................................. 228 LIST OF BOXES ...................................................................... 230 v Trends in Telecommunication Reform 2006 1 MARKET AND REGULATORY TRENDS IN THE ICT SECTOR In many countries, today’s broadband ‘missing link’ is the regulatory framework. Regulators have before them an unprecedented opportunity to speed the uptake of broadband to enable the Information Society. 1.1 What will it take to bring broadband to the masses? Bringing broadband to the masses is one of the major challenges facing the global ICT community. Addressing this challenge requires new thinking, and an end to business as usual. The 7th edition of Trends in Telecommunication Reform is designed to enable regulators and policy-makers to meet this challenge. What does an end to business as usual mean? Service providers are now offering the triple play of voice, internet and broadcast as convergence moves from a dream to a part of every day life, starting in the developed world and spreading to the developing world. Music lovers download songs from the internet onto their MP3 players, working parents order their groceries online and come home at night to watch their favorite TV shows broadcast over the internet, while international travelers book their flights and reserve their hotel rooms on the web. Broadband is about more than travel and entertainment. International organizations like ITU use a broadband-enabled e-learning platform to provide capacity building services to its membership and work with governments to deploy broadband-enabled e-government services. Wireless broadband technologies offer the prospect of faster rollout of services, as well as portability and mobility. Many broadband technologies can also be deployed incrementally, as demand develops, rather than requiring expensive network-wide upgrades. This means that a full range of players, large and small, private and public, can harness the power of these technological developments to become ICT service providers and close the broadband divide that exists between developing and developed countries, and between rural and urban areas within countries. For example, already two developing countries, Mauritius and TFYR Macedonia, have announced plans to become entirely wireless broadband nations. All of these market and technological developments are exerting pressure on the current regulatory framework. How will regulation change? Broadband regulation means a new vision of reduced regulatory burdens, innovative incentives, and coordinated efforts by all links in the broadband value chain to unleash commercial deployment opportunities. Regulations can be carefully tailored to open the door to both large and small-scale broadband providers. Broadband-promoting C HAPTER 1 regulators can aim to make local communities and non-governmental organizations aware of the technologies and broadband provisioning opportunities they could seize, and also coordinate with other government and public institutions, such as universities, to drive demand for broadband-enabled health, education and government services. At the same time, regulators will strive to revise outdated regulatory frameworks designed for an earlier era. The new regulatory framework could be described as a ‘less means more, old meets new’ approach. Less regulatory intervention means more business opportunities. Timetested regulatory principles such as transparency and open competition will be applied to new technologies and the new regulatory issues they raise. And the promotion of wireless broadband technologies will require flexible and innovative spectrum management practices. Of course, broadband also poses new challenges. The rapid rise of voice over IP (VoIP) – hastened by the spread of broadband – is turning the old telecom business model on its head. VoIP service providers have introduced a new business model, providing voice services for free or bundled as a part of a triple play package. What effect will this have on the business plans of traditional telecom operators? And what do these developments mean for the current regulatory framework designed for the old business model? VoIP is not the only broadband-related challenge facing the ICT sector. There is also the scourge of spam, which clogs email inboxes and leads to internet fraud as well as poses network security problems such as the spread of internet viruses and worms. This year’s Trends in Telecommunication Reform contains eight chapters addressing each of the broadband-related challenges and opportunities to enable regulators to harness the potential of broadband to build a safe and secure Information Society for all: • This chapter provides an ICT market and regulatory overview to set the stage for the following chapters; • Chapter Two defines what policy-makers and technologists mean by the term “broadband;” • Chapter Three explores broadband technology at a more technical level and looks ahead, providing a roadmap for 1 Trends in Telecommunication Reform 2006 Figure 1.1: The Number of ICT Users Worldwide, 1994-2004 Fixed-line and mobile subscribers and internet users Source: ITU World Telecommunication Indicators Database. regulators to plot the rapid technological changes that are resulting in new opportunities and services; • Chapter Four examines the role of regulators in promoting broadband; • Chapter Five, recognizing the key role that wireless technologies are likely to play in the promotion of broadband in developing countries, examines spectrum management practices to promote broadband; • Chapter Six looks at current regulatory treatment of Voice over IP (VoIP) and the regulatory road that lies ahead for VoIP; • Chapter Seven addresses enforceable codes of conduct for ISPs as a new legal tool regulators could deploy in their fight against spam, and • Chapter Eight offers a conclusion and a look ahead. 1.2 ICT infrastructure deployment The state of current ICT infrastructure deployment is key to understanding the new technologies that can be used to promote broadband access in developing countries.1 Today, the majority of the world’s broadband subscribers are found in developed countries, which have upgraded existing fixed line telephone and cable TV infrastructure to provide broadband services. Access to basic communications in the developing world has largely been achieved through mobile communications. It is unlikely, therefore, that developing countries will follow the same migration path to broadband services as developed countries. While developing countries will no doubt also deploy some fixed line broadband services, broadband wireless access is expected to play a key role for developing countries seeking to foster the Information Society. 2 As shown in Figure 1.1, the growth of mobile lines continues to outpace the growth of fixed lines, and this is particularly evident in developing countries, a trend attributed to the introduction of prepaid mobile services, rapid and cheaper network deployment, a competitive environment as well as the fact that mobile services provide access to a range of new applications such as short and multimedia messaging services (SMS and MMS). By the end of 2004, the world counted some 1.8 billion mobile subscribers (including both second and third generation mobile subscribers), or 28 per cent of the world’s population. Some 58 per cent of these mobile subscribers were located in developing countries. Further information about 3G subscribers is provided in section 1.2.2. The number of fixed line subscribers worldwide, had reached 1.2 billion lines, and a penetration rate of 19 per cent. As shown in Figure 1.2, both fixed line and mobile penetration rates are lowest in Africa and Asia. Figures 1.2 also demonstrates that mobile teledensity rates outpace fixed teledensity in every single region. By year end 2004, there were an estimated 840 million internet users in the world, representing 13.2 percent of the total population. 1.2.1 Global Fixed Line Broadband Growth As previously noted, the total number of internet users (broadband and dial-up) around the world continues to increase, having reached about 840 million at the end of 2004. The total number of fixed-line broadband subscribers had reached nearly 160 million at the end of the 2004. Broadband internet subscribers represented approximately 2.5 percent of the world’s population, and 38 per cent of all internet subscribers worldwide in 2004. C HAPTER 1 Trends in Telecommunication Reform 2006 Figure 1.2: Fixed vs. Mobile Teledensity by Region (per 100 subscribers) Fixed telephone line penetration by region over the period of 1994-2004 Source: Mobile cellular penetration, by region, 1999-2004 ITU World Telecommunication Indicators Database. Figure 1.3: Broadband Distribution of broadband subscribers by region, 2004 Source: ITU World Telecommunication Indicators Database. The vast majority of today’s broadband users are in the developed world. Globally, Asia, Europe and the Americas represent no less than 99 percent of all broadband subscribers, the majority of which are in the wealthier countries of North America, Western Europe and Asia (Figure 1.3). By contrast, C HAPTER 1 Africa is home to only a fraction of broadband subscribers, and many African countries have not yet launched high-speed Internet services. Although Africa has the fewest numbers of broadband subscribers globally, the number of subscribers increased some thirty times in the two-year period from 2002 3 Trends in Telecommunication Reform 2006 Figure 1.4: Global Distribution of Internet and Broadband Subscribers, 2004 Source: ITU World Telecommunication Indicators Database, and OECD, the Organisation for Economic Cooperation and Development Figure 1.5: Top 25 Broadband Subscribers, Non-OECD Countries (2004) Source: 4 ITU World Telecommunication Indicators Database. C HAPTER 1 Trends in Telecommunication Reform 2006 Figure 1.6: Subscriber Growth in the Top 10 Broadband Countries (2000-2004) Source: ITU World Telecommunication Indicators Database. to 2004, signally a healthy trend. A host of other developing countries from other regions are also showing signs of vigorous broadband growth. These healthy trends are reflected in Figure 1.4, showing that approximately 25 per cent of all broadband subscribers are in non-OECD countries, fuelled largely by China, which has the second largest number of broadband subscribers in the world, after the United States. Figure1.5 shows the top 25 nonOECD countries measured by number of broadband subscribers. Indeed, attention should be focused on the considerable new broadband deployment activity in nations throughout the developing world, from the Arab States to Southeast Asia. For example, TE Data and ISP Nile Online have rolled out DSL internet lines. In Chile, carrier Telsur has initiated a broadband development project, which has garnered a total investment of USD 20 million in the last five years. Brazil has launched triple play services including broadband, as has the Indian operator MTNL. Still, developing countries need to continue to grow their broadband subscribers to compete with today’s top broadbandenabled economies. Figure 1.6 provides a snapshot of the top ten countries in terms of broadband subscribers, and their growth over the past four years. Of the total broadband subscriber base, 32 per cent of subscribers are using cable modems for access (51 million subscribers), 62 per cent are using DSL (98 million subscribers), and 6 per cent (9.1 million subscribers) are using another technology (for example, satellite, fibre-to-the-home and Ethernet LANs). Figure 1.7 depicts the breakout of broadband access platforms by region. It is fair to assume that while there may be other ways of achieving “broadband status” (for example, a VSAT connection), most broadband subscribers today C HAPTER 1 are connected via DSL or cable modems. It is clear from the data that DSL features most prominently in all regions of the world except North America where cable modem technology remains (at least for a now) more dominant. Meanwhile, the majority of people – more than 60 per cent of all internet subscribers – still use dial-up connections. 1.2.2 Global Wireless Broadband Growth IMT-2000 technologies, known popularly as 3G mobile, are also starting to sprout broadband subscribers. By January 2005, 56 of the world’s economies were offering commercial 3G services and the total number of reported subscribers accessing 3G technologies was 150 million, close to 60 per cent growth from the previous year,2 and just shy of the 160 million fixed-line broadband subscribers. Of these 150 million 3G subscribers, 100 million are located in just three countries, the United States (49.5 million), the Republic of Korea (27.5 million) and Japan (25.7 million). As described more fully in Chapters 2 and 3, the dominant 3G technologies deployed to date are W-CDMA and CDMA-1x. Figure 1.8 shows the top ten 3G mobile markets worldwide in 2005, broken down by these two standards. As operators determine their migration preferences toward the achievement of 3G networks, one open question is whether the dominance of the GSM standard in 2G telephony will continue to prevail in its more advanced 3G form, as some industry groups predict. The breakdown of 2G standards use by subscribers is highlighted in Figure 1.9. Many countries are also looking at other wireless broadband technologies. Some countries are already extending broadband connectivity through such BWA technologies, and a couple of these have begun to do so on a nationwide basis. (See Box 1.1). 5 Trends in Telecommunication Reform 2006 Figure 1.7: Broadband Platform Distribution (by Region) 2004 Source: ITU World Telecommunication Indicators Database. 1.2.3 The Poor Pay More for Less Broadband As previously shown, broadband penetration is higher in high-income countries. And yet, subscribers in low-income countries pay more for less capacity. Given the fewer broadband users per capita in low-income countries, how does the price and capacity of the service vary from country to country? The average fee paid by subscribers in low-income countries for broadband service is USD 291 per month, compared with a mean price of USD 18 a month in upper-income countries. While the poor pay more for their broadband service, on average, they also receive less bandwidth. The average high-speed downlink capacity in upper-income countries is 3.8 Mbit/s, compared with an average for low-income countries of 712 kbit/s. In summary, while penetration is very small in lowincome countries, broadband subscribers there pay considerably more money for inferior service. Perhaps further research and market studies could be undertaken to address whether there are objective factors – such as the need to recover higher network construction costs over a smaller initial subscriber base – to explain why customers in lower-income and middleincome countries are paying more for less. 1.3 Market Trends in Privatizations, Investments and Services Privatization of state-owned incumbent operators often affects the pace of regulatory reform, reducing or eliminating concerns regulators and policy-makers may have about protecting legacy operators from the pressure of new market entrants or new technologies that can provide lower cost and more innovative services. Where privatizations have not occurred, or where only partial privatizations have been implemented, there 6 is generally a greater tendency to balance the concerns of legacy operators (for revenues and market share) with those of endusers (for low cost services). This delicate balance often results in limitations on regulatory reforms. Privatization usually gives regulators and policy-makers greater freedom to focus on the interests of end users, and accelerate the reform process. Although many governments now recognize the value of privatizing their fixed line operators, privatization activity has stalled over the past two years, with no new privatization of state-owned fixed line operators either in 2004 or 2005, as shown in Figure 1.10. A number of initial and further privatizations, however, are on the horizon, including in Tunisia and Pakistan. Likewise, a number of companies are busy negotiating acquisitions or arranging financing to expand their network holdings in foreign markets. For example, one of China’s leading mobile operators has held discussions concerning its expansion into India; another mobile operator from Hong Kong, China is planning expansion into India, Indonesia, and Vietnam. The ICT sector has also witnessed significant investment in infrastructure equipment over the past year, signalling signs of recovery following the market collapse in the early years of the decade. According to some analysts, the total global market in 2004 for wireless infrastructure was more than USD 39 billion, a 12 per cent increase in operator spending from 2003 levels.3 Expenditures on W-CDMA equipment likely crossed the USD 10 billion threshold in 2005, largely based on spending generated by operators in China, Germany, Japan, Spain, the United Kingdom and the United States.4 In fact, analysts believe that China alone generated about 16 per cent of WCDMA-related spending in 2005. The world was also witnessing the awesome growth of companies benefiting directly from the growth of the internet. C HAPTER 1 Trends in Telecommunication Reform 2006 Box 1.1: Broadband Wireless Nations A small set of countries has announced plans to vie (unofficially, of course) to become the world’s “first broadband wireless nation.” Mauritius and TFYR Macedonia both are deploying fixed wireless broadband networks across the bulk of their countries, using technologies that track the emerging 802.16 WiMAX standards. In Mauritius, a small African island nation of 1.2 million people, the wireless broadband network reportedly already covers 60 per cent of the island and 70 per cent of the population. By the end of 2005, Mauritius intends coverage to reach a full 90 per cent of the country.1 In TFYR Macedonia, a country of 2 million people, local network provider On.NET is deploying a broadband wireless network across the country using Motorola’s Canopy radio system. The project is a unique partnership between the donor community, the Macedonian Government, and the private sector. The Government of China has donated thousands of personal computers to be used in primary and secondary schools. Complementing that donation, The U.S. Agency for International Development (USAID) is providing broadband internet connectivity to 460 primary and secondary schools and 71 other sites through 2007. In October 2005, the project partners announced an important milestone: 95 per cent of the country’s population was within reach of a broadband wireless signal. The project will guarantee a substantial countrywide customer base. This has created a business case for On.NET to make a significant investment in a pervasive national wireless network. On.NET is free to sell capacity to additional corporate or consumer subscribers throughout the country. Furthermore, in metropolitan areas, On.NET is deploying a mesh-based network to offer pervasive hotspot connectivity in the country’s population centres. 1 This is being done using wireless technologies developed by Texas based Navini Networks. Figure 1.8: Top 10 3G Mobile Markets Worldwide, 2005 Source: ITU, The Internet of Things. The 2005 December holiday season, for example, saw many retailers celebrating record online sales volumes. Traditional telecommunications and cable TV operators are also benefiting from the rise of the internet and convergence. The past year has seen considerable emphasis on the launch of triple play services combining video (television), voice (telephone) and broadband (internet access) offerings from the same provider. The triple play trend is most notable C HAPTER 1 in the Americas and the Asia-Pacific region, and also in some of the Arab States. Many telecommunication operators in Brazil, for example, are investing in triple play packages.5 The Uruguayan state-owned telecommunication company, Antel, planned to launch triple play trials in 2006,6 while Chilean provider VTR-Metropolis invested in a plan to achieve nationwide triple play coverage by 2010, serving 2 million homes.7 Service launches were also set for June 2006 in Colombia. 7 Trends in Telecommunication Reform 2006 Figure 1.9: 2G Standards Usage, by subscribers, world and by region (2004-5) Today’s mobile subscribers are served by cellular systems based on just a handful of major standards. The two dominant standards are GSM and CDMA, with GSM the most popular second-generation mobile standard in the world. The GSM Association estimated a global user base of more than 1.5 billion as of the first quarter of 2005--or three-quarters of the 2G subscriber base. Approximately 31 million users are signing on each month, with growth driven chiefly by developing markets such as those in Africa, Latin America, Eastern Europe and Asia. GSM is also gaining popularity in the United States, reaching 55 million subscribers in 2005. CDMA is the second most popular 2G standard, with the CDMA Development Group reporting more than 270 million users. TDMA has a far smaller subscriber base, and even this appears to be declining. Globally, reports varied between 75 and 100 million TDMA subscribers, with numbers in the United States declining some 23 per cent in 2004. The Personal Digital Communications (PDC) standard comprised the smallest segment of global mobile users (chiefly dominating the Japanese landscape). Many PDC users have been migrated over to 3G services (through NTT DoCoMo) or had their service terminated entirely, due to KDDI’s decision to inaugurate CDMA 1X service. Sources: GSM Association, CDMA Development Group, Mymobile.com News, NTT DoCoMo Corporate website, KDDI Corporate website, Vodafone Japan; Source: The Diffusion Group Report, “U.S. Mobile Markets: Analysis & Forecasts.” Notes: 8 TDMA subscriber numbers are included on the high end of analyst estimates. C HAPTER 1 Trends in Telecommunication Reform 2006 Figure 1.10: Privatizations, 1991-2005, World Source: ITU World Telecommunication Regulatory Database. In Asia, for example, Pakistan Telecommunications Company Limited (PTCL) announced plans to launch a triple play service, featuring telephony, cable TV and DSL services over the same line.8 Nearby, in India, state-owned telephone company Mahanagar Telephone Nigam Ltd. plans to launch that country’s first ‘triple play’ service, in Delhi and Mumbai; with the state-owned sister company BSNL covering the rest of the country.9 Bahrain was set to receive its first triple play voice, video and data service from incumbent telephone company Batelco, which struck a deal with an equipment supplier to deploy infrastructure nationwide.10 In Eastern Europe, Romanian competitor Astral Telecom completed a USD 1 million upgrade to its cable-based IP network to provide an enhanced triple play, with voice, video and broadband data services.11 Spain’s dominant fixed-line operator, Telefónica, launched a triple play package of voice telephony, broadband internet and multi-channel TV services over traditional copper lines, reaching at least 100,000 subscribers.12 Italian fixed-line telecommunication operator Unidata launched its new “ADSL2+” service, enabling users to download voice, video and data at speeds of up to 24 megabits per second (Mbit/ s).13 Expanded service upgrades were also under way in France and Germany.14 Mobile operators and equipment manufacturers are also benefiting from convergence. One mobile operator recently unveiled a personal digital assistant (PDA) that combines 3G mobile technology with a miniature laptop personal computer design and functionality, enabling mobile voice and internet through 3G, Wi-Fi, and a Windows mobile operating system.15 C HAPTER 1 1.4 Competition Over the past decade, the introduction of competition into the second-generation mobile sector has been one of the key factors linked to its success in increasing teledensity in developing countries (along with prepaid cards and cheaper network deployment costs). Many developing countries now seek to replicate this success with broadband services. The level of competition that is authorized by countries (based on the number of competitive players), as well as the kinds of services opened to competition, will remain key to these strategies. Competition in international services, in particular, the international gateway, and leased lines, for example, is vital to ensuring low cost internet access. Figure 1.11 illustrates that competition is authorized in basic telephone services (defined as local, long distance and international) as well as in leased lines in more than 60 per cent of countries worldwide. Competition is authorized in around 90 per cent of countries for services such as VSAT, Cable TV, internet access, and IMT2000 (3G) offerings, and by more than 80 per cent of countries for DSL and fixed wireless broadband services. The region with the lowest levels of competition is the Arab States, where less than 40 per cent of markets have been opened to competition. Europe is the most competitive region, while Africa is nearly evenly split between monopoly and competitive conditions. Competition prevails in the Americas, Asia and, indeed, around the world as a whole – by a ratio of 3 to 2. 1.4.1 Interconnection is Key to Competition It is one thing for countries to authorize competition in the provision of ICT services. It is another to ensure that new market entrants are actually licensed or otherwise authorized to provide services and are able to compete in the market on 9 Trends in Telecommunication Reform 2006 Figure 1.11: Status of Competition Worldwide, 2005 Level of competition in selected services and networks, World Level of competition in basic services, per region Source: ITU World Telecommunication Regulatory Database. a level playing field. One of the key issues in ensuring a level playing field is a fair and transparent interconnection regulatory framework. Figure 1.12 illustrates the extent to which interconnection agreements, or Reference Interconnection Offers (RIOs), are made public, recognized as one of the best practices in interconnection regulation today, ensuring that all competitors are aware of and can benefit from the same interconnection rates. Transparency in interconnection agreements is highest in the Americas, Asia-Pacific and Europe. In Europe, 10 pricing is public in approximately 72 per cent of countries, but this is not the case in other regions. Worldwide, nearly 60 per cent of countries do not make interconnection agreements public, although about 58 per cent make pricing information available. This is one area regulators could assist, for example, by publishing RIOs on their websites. ITU provides links to published RIOs as part of the Regulatory Profiles section of its TREG website (http://www.itu.int/ITU-D/treg/profiles/Interconn.asp). C HAPTER 1 Trends in Telecommunication Reform 2006 Figure 1.12: Status of Public Interconnection Agreements and Pricing Information, 2005 Source: ITU World Telecommunication Regulatory Database. 1.4.2 Regulating Local Loop Unbundling Opening up access to the local loop for competing operators is gaining ground as a means to foster full competition. At the end of 2005, 72 countries worldwide had required unbundling (See Figure 1.13). The debates about unbundling mirror discussions about competition in general. One argument is that mandating unbundling creates disincentives for future infrastructure investments. In the past, the local loop was considered a “natural monopoly,” so it is not surprising that many incumbents feel they should be able to retain the full benefits of their investments. This argument is often coupled C HAPTER 1 with the assertion that incumbents are in the best position to channel their profits into large-scale expansion of last-mile networks. Incumbents have not, however, always lived up to those promises. Local-loop unbundling, therefore, is increasingly recognized as being important not only for competition in traditional telephone services but also to prevent the incumbent’s monopoly from spilling over into the domain of broadband internet.16 Therefore, the goal of unbundling has often been to make network components available to new market entrants with greater commitment, expertise and incentives to improve services. 11 Trends in Telecommunication Reform 2006 Figure 1.13: Countries Requiring Local Loop Unbundling, 2005 Source: ITU World Telecommunication Regulatory Database. 1.4.3 Internet Exchange Points Internet Exchange Points (IXPs), also known as network access points (NAPs), are a way to maximize the existing infrastructural base for internet service provision in developing and transitioning countries and foster competitive provision of internet services. They allow Internet Service Providers (ISPs) to exchange traffic between their networks through mutual peering agreements at minimal cost, with better efficiency (in terms of bandwidth and latency) and increased speed. Networks can interconnect directly, via the exchange, rather than through third-party networks, and the cost of diverting traffic to upstream providers or to faraway places is minimized by keeping it within and between adjacent ISPs. For many developing countries, IXPs keep traffic local or regional, instead of routing internet traffic to hubs like New York or London – just to reach an email account on a different ISP in the same country or to exchange internet traffic with a neighbouring country. Figure 1.14 illustrates the number of countries, per region, that participate in national or subregional IXPs. A study prepared for the 2004 Global Symposium for Regulators presented several issues related to creating a conducive environment for IXPs, including the importance of clearing the regulatory obstacles that exist at subregional levels, ensuring competition at the level of the international gateway, opening up VSAT use, allowing for co-location of equipment in an incumbent operator’s facilities, and ensuring that licensing or other additional burdens are minimized or eliminated.17 1.5 National Regulatory Authorities, Who Rules? The establishment of a separate regulator is one of the most visible signs of sector reform. Separate regulatory agencies cannot compensate for boom and bust cycles in financial markets and the macro-economy, but they can certainly go a 12 long way in laying the grounds for a favourable investment climate and promoting market opportunities.18 It is well documented that the degree of actual and perceived autonomy from government control and industry influence is a key indicator of the effectiveness of a regulator. Regulatory procedures should be clear, transparent, and predictable. Regulators, in enforcing these procedures, should be accountable, and should have sufficient credibility and authority to enforce the relevant laws and regulations. Over the last five years, the number of regulatory authorities worldwide has increased by approximately 36 per cent, with new regulators on the verge in Samoa and Liberia. Regulatory activity is most notably on the rise in the Arab States, Africa and Asia. Figure 1.15 depicts the growth of these regulators worldwide. Meanwhile, figure 1.16 shows the regional variation in countries that have functional regulators in place, breaking out the percentage of countries in each region that have established regulatory authorities. It is evident that the presence of regulators in the Americas and in Africa (relative to the total number of countries in each region) is higher than in the Arab States or in Asia. In absolute numbers, the region with the highest number of regulatory authorities is Europe. Merely establishing a regulator – while a step in the right direction – does not ensure effectiveness or relevance. Priorities have to be established, the necessary statutory framework in which the regulator will operate must be created, procedures put in place, and relationships between stakeholders established. The way in which these processes work together and are respected within a general context of good governance will determine the effectiveness of the regulator and ultimately the success of the market.19 C HAPTER 1 Trends in Telecommunication Reform 2006 Figure 1.14: Number of Countries with National and SubRegional IXPs, by region, 2005 Source: ITU World Telecommunication Regulatory Database. Figure 1.15: Growth of Regulators Worldwide, 2005 Source: ITU World Telecommunication Regulatory Database. Some countries possess more collegial, cooperative and intertwined policy formulation climates than others. Some governments permit informal decision-making processes, while others mandate use of formal mechanisms. Retroactive applications of influence can reverse or undermine regulatory decisions. More fundamentally, some countries may consider their regulatory bodies independent and separate, even when in reality they may be subordinate to a ministry or subject to C HAPTER 1 oversight from a higher authority. In the end, the most important element is effectiveness.20 Another key question facing policy-makers and regulators is what kind of regulatory body to create. Worldwide, most countries have what can be termed a “single-sector” regulatory authority for telecommunications. However, with the convergence of different communication services and technologies “converged” regulatory agencies have started to emerge. Countries such as Austria, Finland, France, Italy, the Netherlands, 13 Trends in Telecommunication Reform 2006 Figure 1.16: Separate Regulators, by Region, 2005 Source: ITU World Telecommunication Regulatory Database. Saudi Arabia, Singapore, South Africa and the United Kingdom have taken this path.21 There is evidence that a unitary, converged regulatory structure may yield more efficient internal administration, institutional flexibility and lower regulatory costs. Interestingly, multi-sector regulatory authorities have also emerged in the last few years, giving oversight not only of the telecommunication sector, but also of other industry sectors with common economic and legal characteristics (for example, water, energy or transportation). Costa Rica, Gambia, Germany, Jamaica, Latvia, Luxembourg, Niger and Panama have chosen this model, which has long been standard for public utility commissions in individual states in the United States.22 One of the arguments for such a structure is centralizing and optimizing limited regulatory skills, as well as reducing costs through economies of scale. However, there are know disadvantages of this model including dilution of sector specific expertise, failures of a multi-sector authority cascading through multiple regulated sectors, increased risk of political capture, delays in reform, etc. The fourth approach is when countries have opted to have no national regulatory authority per se, and the functions of sector regulation rely on competition and antitrust rules. 1.6 Regulatory Challenges of VoIP Many of the world’s carriers have been persuaded to deploy IP-based networks that can carry both voice and data. In this way, operators are able to invest in a single network that can be used more efficiently for many different forms of traffic. Many of these operators have started to offer VoIP to their customers. Recognition of this shift in practice and service is widespread and international. In fact, international VoIP increased by 35 per cent from 2003 to 2004 (See figure 1.17). For example, 20-25 per cent of all historic operators in Africa were using VoIP to carry part of their international traffic in 2004.23 14 Telkom Kenya currently offers a VoIP-based international service. Five African carriers – in South Africa, Botswana, Angola, Namibia and Uganda – have announced that the introduction of IP-based networks is imminent, while Mexican incumbent Telmex (amongst various others carriers) has already implemented IP for the majority of its core network. Among the Arab States, Oman’s incumbent Omantel has committed itself to creating an end-to-end IP communication services network. VoIP is also being offered by new market players, which are often viewed as a threat to traditional PSTN operators. VoIP may be offered by ISPs, in internet cafés and, more recently, by companies from abroad that have no local presence, yet whose impact on local market conditions is felt quite strongly. The impact of VoIP is felt from the loss of outgoing international retail traffic (as customers search for the lowest cost international rates) to reductions of incoming international settlement traffic (as traffic from VoIP customers abroad skirts the international settlement rate system). Regulators participating in the 2005 ITU Global Symposium for Regulators (GSR) recognized that although VoIP poses increasing challenges to legacy operators, it also brings new opportunities to end users for more affordable services.24 In many ways, the rise of VoIP has crystallized the delicate balancing act that many regulators have been performing as regulatory reform has been implemented ever more widely. Weighing in on one side of the scale are the commitments of the World Summit on the Information Society (WSIS) to encourage low cost access to ICT services, while the other end of the scale balances the desire to protect incumbent operators-especially when incumbents remain at least partially government owned. It is not surprising, therefore, that the rise of VoIP has prompted an array of regulatory responses, from outright bans to full legalization. The question of whether to allow or to prohibit VoIP, however, is only one of many issues prompted by the rise of VoIP. Other issues include developing regulatory frameworks for the interconnection of circuit-switched and IPbased networks as well as transitioning to interconnection in C HAPTER 1 Trends in Telecommunication Reform 2006 Table 1.1: Newly Created Regulatory Authorities, 2005 Regulator Year created Structure Cape Verde Country Instituto das Comunicações e das Téconologias de Informação 2004 Collegial body of 3 members Functions Trinidad & Tobago Telecommunications Authority of Trinidad and Tobago 2004 Collegial body of 11 Interconnection, price regulation, Radio members frequency allocation, numbering, monitor service quality, quality of service standards, and licensing and universal service with the sector Ministry Thailand National Telecommunications Commission (NTC) 2004 Collegial body of 7 members reporting to House Senate Interconnection, price regulation, technical standards, radio frequency allocation, numbering, type approval, monitor service quality, quality of service Qatar Supreme Council for Communication & IT 2004 Headed by Secretary General Mandate to create a legal and regulatory environment that promotes development of ICTs United Arab Emirates Telecommunications Regulatory Authority 2004 Collegial body of 5 members reporting to UAE Telecom Supreme Committee Licensing, interconnection, price regulation, technical standards, radio frequency allocation, numbering, type approval, monitor service quality, universal service, quality of service standards Niger Autorité de Régulation Multisectorielle (ARM) 2004 Headed by a president with a sector director for each sector it regulates. Transport, energy, water, and telecommunication Iran Communications Regulatory Authority Law passed in 2003 and operational in 2005 Collegial body of 7 members reporting to Minister of ICT Licensing, interconnection, technical standards, radio frequency allocation, numbering, type approval, monitor service quality, universal service, quality of service standards Afghanistan Afghanistan Telecom Regulatory Authority (ATRA)* Law passed in December 2005. Operational mid-Jan 2006 TFYR Macedonia Agency for electronic communications 2005 Licensing, interconnection, price regulation, technical standards, radio frequency allocation, numbering, type approval, monitor service quality, universal service, quality of service All regulatory functions, including licensing & compliance, spectrum planning & assignment, numbering, ensuring network interconnection, promoting competition and consumer protection Collegial body of 5 members reporting to Parliament Licensing, interconnection, price regulation, technical standards, radio frequency allocation, numbering, type approval, monitor service quality, universal service, quality of service standards * The ATRA was established from the merger of the Telecom Regulatory Board, created in 2003, with the State Radio Inspection Department. See http://trb.gov.af/trb.htm Source: ITU World Telecommunication Regulatory Database. a fully IP-based world. There is also a range of issues arising from the fact that VoIP customers can use the same VoIP service nomadically, rather than from one fixed line location or one mobile terminal. The nomadic nature of VoIP is prompting challenges to traditional practices in numbering and emergency services. The variety and intricacies of the regulatory treatment of VoIP are explored in Chapter 6. C HAPTER 1 The rise of VoIP is emblematic of the crossroads at which the ICT sector now finds itself. Regulatory practices and wisdom built upon the experiences of the heavily regulated PSTN era are now meeting head on the largely unregulated internet world. Which model will apply as these two worlds converge? Or will hybrid or entirely new regulatory models be developed? Chapter 6 begins to identify the issues and prac- 15 Trends in Telecommunication Reform 2006 Figure 1.17: Growth of International Traffic Source: ITU World Telecommunication Indicators Database and TeleGeography Global Traffic Statistics 2006 report. Telegeography Research is now part of PriMetrica, Inc. (see www.primetrica.com) tices facing regulators today and in the years ahead as IP networks replace circuit switched infrastructure. structure), developing countries in Africa, the Americas and Asia appear less eager to regulate WLANs than their counterparts in Europe, where WLANs are just one potential solution to broadband connectivity. 1.7 Spectrum Management A pragmatic framework for managing spectrum resources effectively includes ways of facilitating deployment of innovative broadband technologies. Spectrum management to promote broadband access is discussed more fully in Chapter Five. Strategically balancing the use of unlicensed and licensed spectrum, for example, is becoming a key component of effective regulation. Across regions, a lack of consistency among national spectrum policies – particularly on unlicensed “commons” models – is becoming an issue. Lack of coherence from country to country in the fees and costs associated with spectrum access may be manageable in the short-term, but it is likely to be fundamentally problematic in the long term, as innovations sweep through the market in disregard of state borders. Gradual convergence of regional policies and fees has been encouraged, particularly through actions of the European Commission, for example. The disparity between massive fees paid for 3G licences (in Europe) and the unlicensed use of wireless local area networks (WLANs) looms as a potential regulatory issue. It will loom larger if both technologies converge into a single broadband wireless market. For now, it appears that licensing as a regulatory mechanism is being applied in limited ways to the realm of WLANs. Figure 1.18 shows that the majority of countries in all regions do not to require spectrum licences for WLANs. Perhaps in light of the numerous, uncontrolled and rather random deployments of WLANs as part of small-scale development projects (often launched in lieu of fixed-line infra- 16 1.8 Dealing with Spam Over the last decade, the unbridled growth of spam has gained increasing attention, not only due to its inconvenience and cost, but perhaps even more importantly, because spam often carries viruses and worms or poses other network security issues, or is used a vehicle for fraudulent behaviour. Today, there is general agreement about spam’s core characteristics, including that it consists of unsolicited electronic messages sent in bulk. “Spammers now employ a variety of advanced upload methods such as open mail relays, insecure Web proxies, malformed CGI scripts and zombied clueless-user machines.”25 This means that spam messages tend to be identical and are sent indiscriminately to selected recipients. Most experts involved in the fight against spam counsel in favour of a multi-pronged approach, including technical solutions, legal and regulatory actions, end-user education and international cooperation. According to some analysts, spam accounted for around 70 per cent of all e-mail traffic by mid-2005 (see Figure 1.19). The costs associated with spam are difficult to determine, although it is logical to assume that it puts pressure on ISPs in terms of reduced bandwidth and increased storage costs – not to mention the burden of dealing with customer complaints. The European Commission has estimated the cost of spam to internet users worldwide to be around EUR 10 billion a year, and a recent study has estimated the loss of productivity due to spam messages to be at USD 1,930 annually for each employee.26 In C HAPTER 1 Trends in Telecommunication Reform 2006 Figure 1.18: Are Licences Required for WLANS, 2005? Source: ITU World Telecommunication Regulatory Database. Figure 1.19: Spam as Percentage of Emails Worldwide, 2003-05 Source: Message labs. marked contrast, the costs of startup and operation for spammers are extremely low, and the architecture, based on Simple Mail Transfer Protocol (SMPT), allows them to work anonymously. The success of legislating and making policies effective in countering spam has been limited thus far. In 66 per cent of all countries, there is no single, identifiable entity responsible for combating spam (see Figure 1.20). Only thirty-two countries have passed anti-spam legislation. As a region, Europe has the greatest focus on anti-spam measures, although international C HAPTER 1 attempts at standardizing business practices – or at least harmonizing ISPs’ approaches in countering spam – are growing. To date, anti-spam laws have focused mainly on tracking down and prosecuting spammers. Such anti-spam laws require considerable investigative and enforcement resources, the very resources that often are in short supply in developing countries. While anti-spam laws targeted at spammers remain an essential tool in the anti-spam arsenal, their use by developing countries may more likely be as the foundation for international cooperation. Anti-spam authorities with more experience and 17 Trends in Telecommunication Reform 2006 Figure 1.20: Spam Regulation, 2005 Source: ITU World Telecommunication Regulatory Database. resources may seek to work with regulators in developing countries in tracking down and prosecuting spammers. Having an enforceable anti-spam law in place as part of a coordinated international effort will facilitate action against spammers acting (and hiding) across multiple jurisdictions. But the time may also be ripe for anti-spam authorities to expand their efforts to include working with ISPs, who can be instrumental in fighting spam. Chapter 7 therefore looks not only at the components of anti-spam laws targeted at spammers, but proposes the establishment of enforceable codes of conduct to be developed by ISPs, and then approved and enforced by regulators. Such a system of ‘managed self-regulation’ would require ISPs to prohibit their customers from using that ISP as a source for spamming and related bad acts, such as spoofing and phishing, and not to enter into peering arrangements with ISPs that do not uphold similar codes of conduct. Rather than continue to rely upon chasing individual spammers, regulators in the most resource-constrained countries in particular would be more likely to succeed by working with and through the ISPs that are closer to the source of the problem, to their customers, and to the technology in question. The regulator’s job would be to ensure that ISPs within their jurisdiction adopt adequate codes of conduct and then to enforce adherence to those codes. While some ISPs can be expected to resist even such lighthanded regulation, the advantage is that it places all ISPs on a level playing field. Under current practices, responsible ISPs find themselves bearing the brunt of the costs of spam. This explains why some ISPs have begun suing spammers for damages, an option that may not be available in all jurisdictions. The goal of managed self-regulation is to reduce spam in a way that protects responsible ISPs. ISPs that implement responsible, effective anti-spam measures should be rewarded for their 18 good behaviour. One means of rewarding those responsible ISPs is for regulators to hold their irresponsible competitors accountable. Regulators can also make consumers aware of the good works of the best ISPs, for example, by certifying ISPs that enforce their codes of conduct and allowing such ISPs to use the regulator certification in their advertising. As with many other telecommunication-related policy issue that is salient across national borders, the importance of consistency, shared strategic approaches and international cooperation is paramount. 1.9 Conclusion Since the release of the 2004 edition of Trends in Telecommunication Reform, the global ICT sector has retained its dynamism, although potential challenges to continued growth loom large ahead. The prevailing trend of liberalized markets, privatized operators, separate regulatory authorities and new regulations aimed at tackling the phenomena of convergence are very real. It is unlikely that countries today will attempt to shut down competition and bolster the formation of new monopolies, although some operators upgrading to next generation networks will have to be watched closely to counter such tendencies. Regulators will continue to play a key role in ensuring that the values of transparency, cooperation, and market competition now being championed in the ICT sector become more real and apparent over time. As institutions and frameworks are gradually being redesigned, a clear message is being disseminated: the role of regulators is a critical catalyst to the process of reform in the ICT sector. Broadband internet access (whether through fixed lines or wireless) is becoming increasingly relevant to the demands of subscribers in developed and developing countries alike. C HAPTER 1 Trends in Telecommunication Reform 2006 The essence of voice telephony is being transformed. Nextgeneration networks are being designed and developed, even as 3G services begin to gain widespread acceptance. Through all of these trends, one thing appears certain: the sector is tending toward a more open, competitive, and transparent model, in which governments, operators, development agencies, educational institutions, civil society groups, and end users all have equally important stakes. 1 A comprehensive picture of the state of current ICT infrastructure deployment may be found in the 2006 World Telecommunication Development Report, being released at the same time as this publication. 2 3G Today Newsletter. January 2005. Volume 2. Issue 1. See: http://www.3gtoday.com/wps/portal/!ut/p/kcxml/04_Sj9SPykssy0xPLMnMz0vM0Y_QjzKLN4r3DAbJmMUbxBub6keiijjCBXw98nNT9b31A_QLckMjyh0VFQEBN7t9/delta/base64xml/L3dJdyEvUUd3QndNQSEvNElVRS82XzJfSjI!?newsletterId=1180 3 Aytar, Ozgur, Pyramid Research cited in CommsDay Global, November 5, 2004, p.4. 4 “Pain or Gain: The Year Ahead for Mobile”, 3G Analyst Predictions Lucent Newsletter, Issue 18, February 2005. 5 “Brazil Telecom Launches Triple Play”, Telegeography Commsupdate, October 14, 2005. 6 “Antel Trials 3G and Triple play Services”, Telegeography Commsupdate, September 28, 2005. Link: http://www.telegeography.com/cu/article.php?article_id=9228. 7 “Chilean companies invest heavily in triple-play networks”, Telegeography Commsupdate, September 13, 2005. Link: http://www.telegeography.com/cu/article. php?article_id=9004. 8 “PTCL To Launch Triple Play Service”, Telegeography Commsupdate, May 3, 2005. Link: http://www.telegeography.com/cu/article.php?article_id=6995. 9 “MTNL Launches triple-play (India)”, Telecomfinance.com, September 2005. Link: http://www.telecomfinance.com/nodes/Main-Pages.html. 10 “Batelco to Launch Triple Play”, Telegeography Commsupdate, June 20, 2005. Link: http://www.telegeography.com/cu/article.php?article_id=7690. 11 “Astral Telecom carries out USD1 million voice-over-cable upgrade”, Telegeography Commsupdate, September 21, 2005. Link: http://www.telegeography.com/cu/ article.php?article_id=9116. 12 “Telefónica talks up triple play”, Telegeography Commsupdate, October 14, 2005. Link: http://www.telegeography.com/cu/article.php?article_id=9465. 13 “When in Rome… download at 24Mbit/s”, Telegeography Commsupdate, June 22, 2005. Link: http://www.telegeography.com/cu/article.php?article_id=7736. 14 “Swisscom runs into May triple play delay”, Telegeography Commsupdate, May 31, 2005. Link: http://www.telegeography.com/cu/article.php?article_id=7433. 15 “Orange Launches Laptop Style 3G Phone/PDA For Business”, Businessmobile.com, September 22, 2005, Link: http://www.businessmobile.com/index.php?name =News&file=article&sid=51. 16 Regulators from West Africa recognized the importance of local loop unbundling in a set of guidelines on interconnection agreed by the West African Telecommunications Regulators Assembly (WATRA) http://www.itu.int/newsarchive/press_releases/2005/12.html 17 Russell Southwood, “Via Africa: Creating local and regional IXPs to save money and bandwidth”, International Telecommunication Union, 2005, p. 23, Link: http:// www.itu.int/ITU-D/treg/publications/AfricaIXPRep.pdf. 18 Melody, W.H. “Stimulating Investment in Network Development: Roles for Telecom Regulation”, World Dialogue on Regulation of Network Economies, March 2003, p. 9. 19 Forthcoming ITU/infoDev ICT regulation toolkit, Module on legal and institutional aspects of regulation, 2006. Link: http://www.ictregulationtoolkit.org/ 20 For further reading on effectiveness, consult the ITU 2002 Trends in Telecommunication Reform: Licensing in an Era of Convergence. http://www.itu.int/ITU-D/ treg/publications/Trends02_ExecSummary.pdf 21 Forthcoming ITU InfoDev Toolkit, Organizational and Institutional Approaches to Regulation, Chapter 6, p. 9-10. 22 See http://www.itu.int/ITU-D/treg/index.html. See ARESEP (Costa Rica) http://www.aresep.go.cr/cgi-bin/menu.fwx; OUR (Jamaica) http://www.our.org.jm/; Ente Regulador de los Servicios Publicos (Panama) http://www.ersp.gob.pa/default.asp. inks to U.S. State PUC’s can be found at http://www.dps.state.ny.us/stateweb. htm. 23 Muleta, John. VoIP Chapter X, pp. 24 See http://www.itu.int/ITU-D/treg/Events/Seminars/2005/GSR05/Documents/chairmansreport.pdf 25 Race, Jeffrey, “You needn’t eat spam (or worms) The real reasons why spam still exists today – and what to do about it”. Free Software Magazine, Issue 6, August 2005. 26 Nucleus Research “Spam: The Serial ROI Killer”. Link: http://www.nucleusresearch.com/index.html C HAPTER 1 19 Trends in Telecommunication Reform 2006 2 WHAT IS “BROADBAND”? Authors: Michael Best, Georgia Tech; and Bjorn Pehrson, Swedish Royal Institute of Technology There is a lot of discussion around the world about the advent of broadband technologies and services – and justifiably so. The long-awaited broadband revolution now appears to be gaining momentum, in developing countries as well as developed ones. This chapter seeks to take the measurements of this broadband growth by defining what policy-makers and technologists mean when they say “broadband. This will set the stage for Chapter 3, which explores broadband technology at a more technical level. Chapter 3 also looks ahead, providing a roadmap for regulators to plot the rapid technological changes that are resulting in new opportunities and services, on a nearly daily basis. The range of broadband systems that are in the market and commonly employed today can be organized into three broad families of technologies: • Broadband wire-line networks, including DSL over twisted-pair copper cables, cable modem services over cable TV systems, and fibre networks; • Broadband wireless solutions, including 3G mobile services, wireless LANs (WLANS) and other fixed and mobile wireless access solutions; and • Non-terrestrial options, including satellite systems employing very-small aperture terminal (VSAT) dishes. This chapter will discuss the types of equipment, infrastructure and software that are needed to deploy each and their viability for rural and underserved areas of developing countries. The picture that emerges is that broadband development is no longer the exclusive preserve of developed countries and high-income communities. Increasingly, developing countries are employing low-cost technologies – many of them wireless – to strategically introduce broadband capabilities. Moreover, it is not just large, incumbent operators that have opportunities to deploy broadband facilities and services. There are opportunities for non-traditional operators – such as universities, local governments and community-based groups – to invest in broadband capabilities and link their systems to the broader internet. The combination of non-traditional entrepreneurs, local governments and major incumbents may provide the formula to drive broadband development in many countries. C HAPTER 2 2.1 What Do We Mean When We Say “Broadband”? Like many terms used in today’s fast-moving technology sector, the term broadband is not well defined. The word was originally used in the network engineering community to signify transmissions carrying multiple channels simultaneously. This was contrasted with baseband, which involved transmitting on only a single channel at any one time. Today, however, “broadband” is used much more frequently to indicate some form of high-speed internet access or data transmission. Deciding which networks provide sufficient capacity to be called broadband is open to debate. There have been many attempts to associate the term with a particular speed or set of services, but in reality, broadband is a moving target. Internet speeds are increasing constantly, and with each new advance, marketers eagerly emphasize just how blazingly fast the latest connection speeds are. The speed of a network is usually expressed in terms of its data transmission rate, which is measured in kilobits or megabits per second (this is also known as the bandwidth of the network). What is not up for debate is that today’s dial-up internet access speeds, topping out at about 56 kilobits per second (kbit/ s), are not broadband connections. But beyond that, defining broadband seems to be subjective. The U.S. Federal Communication Commission (FCC) has defined broadband as starting at 200 kbit/s. The OECD sets the bar at 256 kbit/s, and the ITU defines broadband as a combined capacity (upstream and downstream) totalling 256 kbit/s or more. A good example of the broad range of definitions can be found within a single country. The Swedish IT Commission (1994-2004) has defined broadband as supporting a formidable 5 megabits per second (Mbit/s) upstream and downstream. But the Swedish government has said that broadband starts at 2 Mbit/s, up and down, while Sweden’s incumbent operator, Telia, defines it as at least 500 kbit/s up and down. In Swedish metropolitan area networks (MANs), meanwhile, 10 Mbit/s up to 100 Mbit/s has become the standard. While there may be a diverse array of parameters in the marketplace, for the purposes of this report, the term broadband refers to data rates that correspond to the ITU’s definition in this section. 21 Trends in Telecommunication Reform 2006 Beyond precise data-rate thresholds, perhaps a more useful way to define broadband is by discussing what one can do with it. This certainly includes fast internet downloads from the Web. But it also should include compact disc-quality streaming audio, fully interactive voice services such as VoIP, some level of interactive video chat services (if not full-capability video conferencing), and at least reasonable-quality streaming video services (if not full, DVD-quality video on demand). Note that receiving this wish list of services and applications is not simply a matter of available bandwidth. Interactive applications such as VoIP also require little or no latency (delays), low error rates, and minimal jitter (the result of data arriving at its destination out of order). 2.2 A Short Broadband Taxonomy As noted in the introduction to this chapter, broadband networks can be divided into three major categories: broadband wire-line networks, broadband wireless networks, and non-terrestrial (that is, satellite) networks.1 These categories reflect the different development paths for broadband technologies that are now available in the marketplace. The following subsections trace those different paths and briefly describe the current state of development of standards and capabilities. 2.2.1 Broadband Wire-Line Networks In general, internet access obtained its first foothold as an outgrowth of wire-line networks. The earliest internet access was, of course, through the public switched telephone network (PSTN), via dial-up modems or leased telephone lines, to an internet service provider (ISP). Data communications using a dial-up telephone connection require an analogue modem at both ends of the telephone line. Traditional modems encode data in the same frequency band as a voice call (up to 4 kilohertz). The user can either speak or send data. Data rates vary between 2.4 kbit/s and 56 kbit/s, depending on the quality of the analogue copper telephone line, whether or not the network operator’s central office switch is digital, whether the switches are clock-synchronized, and whether the switches are connected using modern links, such as fibre or microwave. From an economic point of view, dial-up modems are cheap and typically integrated into personal computers. Carrierclass dial-up servers required at the ISP end are quite expensive, while lower-class equipment that can be used by rural entrepreneurs on a small scale is cheap (less than USD 500) and supported by open-source software. From the end user’s point of view, the cost typically includes the local telephone call tariff, plus the ISP’s internet access fee, which may be flat-rated or connection-time based (in many areas of the United States, the local calling rate is also flat). Dial-up service continues to be a standard form of internet access in many countries, but, as previously mentioned, it does not meet most definitions of broadband. Dial-up service has paved the way, however, for the broadband technologies discussed in the following subsections. 22 2.2.1.1 Digital Subscriber Line (DSL) DSL is actually a family of technologies that provide a digital connection in an unused part of the frequency spectrum of the telephone network’s copper-wire subscriber line.2 The circuit-switched voice and packet-switched data connections can thus be used independently of each other. DSL technology provides a significant enhancement to the already installed PSTN base, protecting the sunken investment value of the copper network. For that reason, DSL is one of the most popular broadband technologies. According to the ITU’s World Telecommunication Indicators database, DSL is used to provide over 60 per cent of worldwide home broadband connectivity. The bandwidth that DSL systems can provide has been increasing. There are now systems that can provide transmission speeds from 256 kbit/s up to 1.2 Mbit/s upstream and 512 kbit/s to 28 Mbit/s downstream. DSL bandwidth limitations are caused by the attenuation of signals at higher frequencies. The amount of attenuation on any network depends on the quality of the copper lines and their installation. Moreover, DSL’s viability in any given location depends on the distance between the subscriber and the exchange, which usually must be within 5 kilometres. To deploy DSL, equipment must be added at both ends of the subscriber line. At the user end, a DSL modem and a cheap passive splitter must be installed. The passive splitter plugs into the existing telephone socket and splits the incoming signal between the telephone and the DSL modem. On the other side of the modem, the user can directly connect a computer or set up a LAN via a customer premises gateway (often for less than USD 100). The DSL modem converts signals from the data format used in the local area network environment (mostly an Ethernet LAN or IEEE802.3 signal), into a digital audio stream. On the operator side, before the subscriber line is connected to the telephone exchange, the DSL circuits are separated and terminated in a digital subscriber line access multiplexer (DSLAM), which aggregates the digital connections from different users and feeds them to the ISP network. 2.2.1.2 Cable TV System Networks Cable TV (CATV) networks use coaxial cable to reach all users in a point-to-multipoint topology. Initially, of course, CATV was employed only for distribution of television channels in a tree-structured network, created by using passive splitters. Broadband communication over cable TV networks is accomplished by transferring data via unused bandwidth in the cable, in a way similar to what DSL does over the PSTN. The standard is Data over Cable Service Interface Specification (DOCSIS).3 The basic data rates are 54 Mbit/s downstream and 3 Mbit/s upstream. An ISP connects to the cable company’s central office (known as the head end by CATV operators) and uses the cable network to connect to users. As with DSL, equipment has to be installed at both the head end and at the customer premises. On the operator’s side, a cable modem termination system (CMTS) is installed at the head end. It separates the digital communication channel from the television circuits, aggregates connections from different users and feeds them into the ISP network. On the user’s side, C HAPTER 2 Trends in Telecommunication Reform 2006 a splitter and a cable modem must be installed at the home (most cable modem subscribers are residential). The splitter divides the incoming signal between the TV set and the cable modem. On the other side of the modem, the user can connect a computer or a residential gateway via an Ethernet port and a USB telephone, allowing VoIP service if provided by the ISP or other provider. environment (EDGE). GPRS offers maximum speeds of 171.2 kbit/s, while EDGE can triple those rates. A typical cell radius for these 2.5G networks is 500-1 000 meters, meaning that to achieve complete coverage, every point in the coverage area can be no more than 1 km away from an antenna. GPRS and EDGE technologies allow mobility at vehicular speeds and can handle seamless handoffs between cells. From an economic point of view, broadband over cable is favourable in areas where there is already an existing cable network. The tree-structured, point to multipoint technique has, however, several severe disadvantages compared to pointto-point solutions: • For the regulator, it is less attractive, since it may prevent local loop unbundling on some technical layers of the network; • For the operator, it is more complex to plan, manage and upgrade; and • For the user, the performance depends on how much traffic there is from other users connected to the local transmission lines. Meanwhile, upgrades from 2G to 2.5G networks can be expensive, since they generally require both software and hardware changes at the base station. They may also require improvements to backhaul networks, as well as increased connectivity at the core network. In addition, in many settings, high costs for spectrum licensing (for example, in the 2 GHz band) add to the upgrade costs. Subscriber handsets also need to be upgraded to support 2.5G, and handset replacement cycles have often been a central component of adopting new technologies. While estimating the cost is difficult, common implementations have experienced costs per base station above USD 100,000. In other words, upgrade costs can be on the order of USD 50 or more, per subscriber, in low-population density areas. Users in a neighbourhood (typically, 100 to 2000 homes) share the available bandwidth provided by a single coaxial cable line. Therefore, connection speeds can vary between 10 Mbit/s and a few kbit/s, depending on the volume of traffic from other users. While most networks share a fixed amount of bandwidth between users, cable networks are generally spread over larger areas and require more attention to performance issues. The broadcasting technique also raises concerns regarding security and privacy. To address these concerns, the DOCSIS standard includes encryption and other privacy features that are supported by most cable modems. 2.2.2 Broadband Wireless Access The ITU defines broadband wireless access (BWA) as encompassing either mobile or fixed access technologies that provide connections at speeds higher than the primary rate (for example, 2 Mbit/s). Up until now, wireless broadband has somewhat lagged behind the development curve of its wire-line cousins. Throughout the 1990s, mobile networks, for example, were primarily viewed as voice offerings, and broadband fixed wireless systems (many of which relied on line-of-sight technologies) did not enjoy the same take-up rates in developed countries that DSL and cable modem services did. Wireless broadband options are, however, becoming increasingly more available and more functional (see Chapter 3). The following subsections trace the development paths of mobile and fixed wireless terrestrial systems. 2.2.2.1 Mobile Services: GSM and CDMA Second generation (2G) GSM networks were initially implemented in Europe and then Asia. They have since been installed across much of the world. The original GSM systems support only very limited data capacity (well below that required to be labelled broadband). On the path toward broadband, the next step for GSM-based data services has been “2.5G” capability. This is provided using technologies known as general packet radio service (GPRS) and the enhanced data GSM C HAPTER 2 The second major category of 2G cellular technologies is the code-division multiple-access (CDMA) IS-95 family. These systems were developed by the U.S. company Qualcomm and are used primarily in the United States. They do not employ the time-division multiple-access (TDMA) modulation approach of 2G GSM. Instead, they carry multiple transmissions simultaneously by filling the channel with packets encoded for their specific destination devices. There is a family of upgrades for CDMA networks called CDMA2000. This includes the CDMA2000 1x system, which supports data rates up to 307 kbit/s. The CDMA Development Group (CDG) reports their CDMA2000 subscribers as “3G” users. Some operators and equipment manufacturers, however, believe that the real equivalent to 3G is CDMA2000 1xEV (for “evolution”), which is a higher-speed version of 1x. Within this set of technologies are CDMA2000 1xEV-DO (data only) and 1xEV-DV (data/voice). Recent versions of EV-DO and EV-DV support 3.1 Mbit/s downstream and 1.8 Mbit/s upstream theoretical data rates. Real-world rates are about half that speed. The upgrade path from a 2G CDMA IS-95 network to a 3G CDMA2000 network is perhaps like the path from GSM to GPRS or EDGE. Certainly, it can require similar attention to handset, backhaul, and core network upgrades. But some industry experts (and many CDMA advocates) have argued that the base station upgrade requirements CDMA IS-95 to CDMA2000 are easer and cheaper than those for GSM to GPRS/EDGE. It should be noted that, particularly in the case of GSM systems, the 2.5G systems are merely way stations on the migration path to full 3G systems (such as W-CDMA), which are discussed in detail in the next chapter. 2.2.2.2 Broadband WLAN Technologies To date, the most common broadband wireless WLAN standard is Wi-Fi (IEEE 802.11). The 802.11 family currently includes six over-the-air modulation techniques that all use the 23 Trends in Telecommunication Reform 2006 same protocol. The most popular (and prolific) techniques are those defined by the ‘a’, ‘b’, and ‘g’ variations to the original standard. Wi-Fi uses different bands of radio spectrum. Perhaps the most optimal use of Wi-Fi is to transform and extend the capacity of standard wired Ethernet networks in public areas like meeting rooms, training classrooms and large auditoriums. In many places, of course, it has been adapted to provide localarea “hotspot” internet access. Wi-Fi generally provides a maximum of 54 Mbit/s data transfer to a maximum range of about 50 meters. The extension of Wi-Fi signal strength has emerged as a niche development market in its own right, fostering the growth of companies like AirMagnet (used in Antarctica to extend Wi-Fi signals), among others. In many North American and European countries, one can find WLANs in public cafes, airports, university campuses, conference venues and other central, high-traffic locations. This is also slowly emerging in non-OECD countries. For example, China’s largest shopping centre, the Super Brand Mall in Shanghai, features the most extensive public WLAN system in Shanghai. There are 67 access points, covering six of the building’s 10 floors. WLANs not only draw crowds, they also bolster the progressive, technological image that organizations, businesses and institutes often seek to create. Moreover, WLANs contribute to a sense of community (particularly in academic settings) and provide new opportunities for generating access-related revenues from people who are simply “passing through.” For example, Switzerland offers a hot-spot service available in every major city, allowing people in transit to benefit (at a small fee, of course) from wireless broadband connectivity wherever available network signals are detectable. 2.2.2.3 The Advent of WiMAX Unlike Wi-Fi, which began life as a short-range networking technology, WiMAX is an infrastructure technology, on the order of DSL or cable modem technology. It can provide the same functionality as a router providing the backbone access to a location. Individuals may connect to a WiMAX modem via a wired Ethernet or Wi-Fi connection. Based on a technique called orthogonal frequency division multiplexing (OFDM), WiMAX is more bandwidth-efficient than 3G technology or Wi-Fi. It supports high-throughput broadband connections over long distances. WiMAX can be used for a number of applications, including “last mile” broadband connections, hotspots, cellular backhaul, and high-speed enterprise connectivity for businesses. The prospect that mobile users may connect to WiMAX “hot zones” directly is still in development, and mobile access to WiMAX networks is not yet deployed. Meanwhile, genuine, standards-compliant hardware has yet to appear, even for fixed WiMAX installations.4 Figure 2.1 illustrates the growth forecast for WiMAX equipment sales through 2009. There is currently very little in the way of a track record by which to gauge the cost-effectiveness of WiMAX as a technology. Even the potential of WiMAX, however, raises interesting regulatory questions. For example, how will the technology be received in countries that have already auctioned off expensive 24 3G licences? Governments might not have as strong an incentive to promote WiMAX, particularly if it could enable competition with 3G services.5 Leaving aside the issues stemming from unlicensed usage of spectrum for WiMAX (for example, potential interference), the growth of WiMax could depend on market forces. It is not yet clear how much supply there will be from equipment manufacturers, nor is there a full picture of the level of demand from consumers. If consumers want to use their PCs, and these PCs are unable to leverage 3G spectrum to achieve broadband connectivity in their neighbourhoods, WiMax might be able to fill in the gap for ubiquitous wireless internet access. On the other hand, the market model could simply be scattered, shorter-range Wi-Fi hotspots, in tandem with mobile data services. Some transitional economies are moving faster than others in providing wireless broadband connectivity. Considerable preliminary deployment activity is under way throughout Africa, Asia and the Arab World. For instance, the Malian telephone company Ikatel, a subsidiary of France Telecom, has contracted a vendor to supply and deploy a WiMAX network in the capital city of Bamako.6 Meanwhile, in Saudi Arabia, broadband wireless technology has been deployed to enhance data transfer rates in the kingdom’s urban areas. Asian markets have been particularly active; representatives from China, Japan and Korea (Rep.) have reached an agreement to jointly develop future 3G technologies. Large-scale international manufacturers are also doing their part. Intel, for instance, had announced its plans for WiMAX trials in Malaysia, the Philippines and Thailand before the end of 2005, and in Indonesia and Vietnam before the end of 2006.7 2.2.3 Non-Terrestrial Broadband Platforms Non-terrestrial systems (mostly satellite systems in the current marketplace) are generally regarded as complementary to terrestrial broadband networks – and particularly useful (or necessary) in remote areas where no terrestrial infrastructure exists. This view is reinforced by the high costs, limited bandwidth and longer delays generally associated with satellite systems. Still, the number of subscribers for internet services provided by satellite operators is increasing. Aside from TV distribution services and telephone connections, satellite capacity is primarily used to connect internet service providers (ISPs) to internet backbone facilities. It is less commonly used for connecting individual users to an ISP, although this is certainly a growing market in rural and underserved areas. Whether broadband internet access via satellite is the right choice depends on the costs and performance of the alternatives. The cost per megabyte of satellite access is decreasing, albeit slowly. While the cost of operating the large, low earth orbit (LEO) constellations limits their margins, regional geostationary systems should be able to reduce their costs significantly. Prices on the order of USD 0.10 (10 cents) per megabyte have been predicted. The open standard for digital video broadcasting, with a return channel via satellite (DVB-RCS) is increasing its market share and is expected to benefit both users and C HAPTER 2 Trends in Telecommunication Reform 2006 Box 2.1: Wi-Fi Beyond Hotspots The explosive growth of Wi-Fi hotspots that provide wireless local connections in business complexes, homes, and public spaces such as coffee shops and airport lounges has made Wi-Fi a household word. The IEEE 802.11 family of standards was designed by the data networking community for indoor, short-range, nomadic (can support walking speeds) uses. Wi-Fi has weak handoff capability between access points. But the vision of Wi-Fi networks simply as a replacement technology to the physical cables in the home or office LAN now seems constrained. The amazing growth of Wi-Fi has driven economies of scale, such that the price for access points and end-user systems can be as low as USD 50 or even less. And this attractive pricing, along with the spectrum licence exemptions that many countries offer for Wi-Fi use, has led researchers to explore ways that Wi-Fi chipsets could be used in other networking environments. A number of university research projects have been exploring modifications to 802.11 systems that would make them better suited to long distance, point-to-point backhaul networking. This includes work at the Indian Institute of Technology campuses in Kanpur and Chennai, as well as at the University of California, Berkeley in the United States. These projects have attempted long-range (tens of kilometres) point-to-point backhaul hops using 802.11 systems. The principle problem with the 802.11 standard, in this context, lies with the way multiple radios on the network contend for transmission capacity. In technical jargon, the MAC layer uses a Carrier Sense Multiple Access (CSMA) protocol, which is ill-suited for wide-area networks, although it is well-suited for local area networks. Research projects have developed new Wi-Fi protocols better suited for long-distance, point-to-point networking. What may be emerging is a “rural network” extension to the 802.11 family that could directly compete with WiMAX. More likely, however, is that Wi-Fi networks will complement WiMAX (and related networks). Wi-Fi hotspots can provide nomadic broadband for the “last mile” (or “last metre”) distribution networks, while WiMAX or other technologies can take over for backhaul and trunking. Figure 2.1: WiMAX Growth, Forecast Sales, 2004-5 Worldwide Forecasted Sales of WiMAX Equipment Source: 2005 $23 million 2006 $207 million 2007 $566 million 2008 $1.1 billion 2009 $1.5 billion Sky Light Research, Sept. 29, 2005. industry through lower costs, customer choice and equipment interoperability. The market is, however, still dominated by a few proprietary vendor solutions. 1 2 A satellite terminal consist of two parts: An outdoor unit consisting of a transceiver and an antenna that is placed in direct line of sight to the satellite, and An indoor unit that provides the interface between the transceiver and the end user’s communications system (a computer or a local area network). The aperture of the antenna decreases at higher frequencies, due to the reduction in parabolic antenna beam-width at higher frequencies. Due to this, terminals operating at higher frequencies are called Very Small Aperture Terminals or VSATs. Most satellite systems for television broadcast and broadband data communications in operation today use portions of the C-band and the Ku-band of spectrum. In the C-band, C HAPTER 2 antennas are typically 2-4 metres in diameter, while in the Ku-band they can be smaller than 1 metre, which also makes it easier to direct the antenna. The lower-frequency parts of the spectrum that the C-band and Ku-bands represent cannot accommodate the data rates and traffic volumes demanded. This has forced commercial satellite system operators to consider the Ka-band and V-band as well. But these higher frequencies present other challenges, including rain attenuation, fading and signal scattering. Independently of the system type, non-terrestrial wireless broadband network topologies fall into the following categories: – Bent pipe star topology – This is characterized by a large gateway earth station that transmits one or more high-data-rate, forward-link broadcasts to a large number of small user terminals. These broadcasts contain address information that allows each user terminal to select those 25 Trends in Telecommunication Reform 2006 transmissions intended for it. In the return direction, the remote user terminals transmit in bursts at low-tomedium data rates to the gateway. – Bent pipe point-to-point – This topology calls for a dedicated duplex connection, set up between a large gateway earth station and a single user terminal. – On-Board Processor (OBP) Switching – In this topology, the satellite rather than the gateway is the central node in a star network. The satellite is connected to the gateway by one or more high-data-rate trunks. The on-board processor de-multiplexes the uplink trunk into several downlinks for different geographical areas, usually determined by the footprint pattern. The forward downlinks contain messages for large numbers of user terminals, and the destinations are identified by message headers. In the return channel, the uplink transmissions from user terminals in one or more cells are multiplexed onto a downlink trunk to the gateway. The benefits of the “bent pipe” versus OBP are under discussion. In the bent-pipe system, the received signal is retransmitted without processing. While this scheme is less complex and has performed well in the first phase of internet development via satellite, OBP promises better bandwidth efficiency 1 2 3 4 5 6 7 8 and true mesh connectivity. Several companies are conducting OBP trials8. 2.3 Conclusion Broadband networks are no longer a dream for the future. Increasingly, they are at the centre of ICT development today. The growth of converged, “triple play” offerings is coming to dominate business and regulatory developments. This is particularly true in developed countries, but it is also a powerful factor in developing ones. A full range of broadband technologies can and are being deployed in rural and underserved areas of developing countries. Increasingly, regulatory conversations around the world are laced with the fundamental question of how can we ensure that all communities participate in, and benefit from, the deployment of broadband capabilities? The remainder of this edition of Trends seeks to answer that question, and others that face regulators around the world who are working to recalibrate their regulatory frameworks to address broadband issues. The next chapter aims to help regulators understand the technical dimensions of broadband technologies and begin to discern how they will progress and evolve, globally and in their own markets. Chapter 3 will discuss the potential for stratospheric broadband platforms, which rely on sub-space aircraft such as airships to relay transmissions to and from the ground. The DSL family is often denoted by the abbreviation xDSL, in which the x denotes that there are various forms of the technology. Those forms are explored in more detail in Chapter 3. See: //http://www.cablemodem.com/specifications/re information about DOCSIS. Gruman, Galen, Wireless Broadband’s long and winding road: Truly pervasive, high-speed mobile data services won’t happen overnight. Info World. Vol. 27, issue 39. September 26, 2005. Gruman, Galen, “Wireless Broadband: The Long and Winding Road”, Infoworld, September 29, 2005. Link: http://www.infoworld.com/pdf/special_report/2005/ 39SRwamobile.pdf. “Ikatel to launch Wi-MAX”, Telegeography’s Commsupdate, November 29, 2005. Link: http://www.telegeography.com/cu/article.php?article_id=10078. “Intel to Trial Wi-MAX in Indonesia, Malaysia, Philippines, Thailand, Vietnam”, PricewaterhouseCoopers Telecom Direct News, September 26, 2005. These include Astrolink, SpaceWay and EuroSkyWay. 26 C HAPTER 2 Trends in Telecommunication Reform 2006 3 UNDERSTANDING BROADBAND TECHNOLOGIES Authors: Michael Best, Georgia Tech; and Bjorn Pehrson, Swedish Royal Institute of Technology Each wave of technological development offers new promise in the battle to bridge the Digital Divide. Most new technologies are cheaper to deploy than legacy copper networks, and at the same time, they can deliver a full range of ICT services, from voice to broadband applications and services. Many new technologies can also be deployed incrementally, even locally, rather than on the large scale of traditional telecommunication networks. Not only does this make deployment more affordable, it opens the door to a whole new range of possible broadband providers that can drive demand for broadband services. The types of broadband providers enabled by new technological developments include regional or private network operators, small and micro entrepreneurs, as well as public institutions such as universities, schools, libraries, post offices, local government offices, health facilities, and non-governmental organizations active in developing countries. This chapter identifies and analyzes the promising new technologies that can help promote broadband access in developing countries, particularly in rural and underserved areas. 3.1 How Broadband Networks Are Designed First, it is useful to introduce two concepts that help explain different dimensions of networks: layered architecture and network topology. These terms are important because they help to understand the dynamics that determine incentives, viability and the potential for collaboration between entities that are engaged in broadband deployment. In order to help regulators make informed decisions about the array of technical options before them, the following sections break out the various aspects and layers of networks, providing definitions and technical specifications. There are also useful comparisons between different types of platforms, such as DSL, CATV, “broadband over power line” (BPL) solutions, and fibre optical networks. These form the basis of a “wire-line broadband roadmap,” outlined in Section 3.2, for regulators and policy-makers. That section also provides detailed explanations of the various link layers (point to point vs. point-to-multipoint access networks) and system types. Attention is also given to wireless broadband systems, as C HAPTER 3 well as options for non-terrestrial wireless broadband networks when wire-line solutions are not feasible or applicable. 3.1.1 Layered Network Architecture The concept of layered network architecture divides a network at any specific point into layers, each of which adds value to the physical medium of communication. A layered architecture based on open standards is useful for several purposes: – Technical: to define physical and logical interfaces required to connect different subsystems. – Commercial: to define the conditions under which a user or a provider of value-added services can get access to services provided by a specific provider at a specific level. – Regulatory: to identify the value chains and define the roles of actors providing services in different layers. It may be necessary to regulate in order to promote competition and to allow service providers to buy services they need in order to provide value added services at a higher level. Rights-of-way, spectrum licensing, access to essential resources and local loop unbundling, are all examples of areas in which such regulation may be needed. The following subsections explain the network layers in greater detail. 3.1.1.1 The Physical Layer The physical layer identifies the transmission medium – such as radio spectrum or copper or fibre wires – and specifies the mechanical and electrical interfaces that connect to the medium for communication purposes. The most important media include: • Wireless spectrum: Existing spectrum regulations are often too restrictive, from a public policy perspective, preventing new, innovative actors from entering the market. The attempt to loosen these restrictions is clearly reflected in the increasing reliance on licence-free spectrum in the dynamic development of Wi-Fi (unlicensed usage is explored more fully in Chapter 5 on broadband spectrum management). • Wire-line infrastructure: This includes fibre, copper cable and coaxial cable. Wire and cable are essentially unlimited in supply and can be deployed and made available at reasonable cost. In some countries, the provisioning of 27 Trends in Telecommunication Reform 2006 passive infrastructure is an independent business, while in others it is an integrated part of vertically integrated operations. Wire-line regulation, too, can be more restrictive than necessary to promote broadband access. Access to the physical medium is essential for entities that have particular choices of transmission system or that want to compete at the link level and above (for example, by introducing a new competitive transmission technology). Regulatory measures to promote access to both wire-line and wireless broadband infrastructure are explored more fully in the next chapter on regulators’ role in promoting broadband. 3.1.1.2 The Link Layer Access to link layer services is essential to service providers (or private network operators) that seek to build their own networks without having to operate their own transmission systems. With the physical layer as a foundation, the link layer adds procedures for digital data transmission over the physical medium, either point-to-point or point-to-multipoint. The link layer includes access both to wireless spectrum and wire lines, as well as to error control (such as automatic repeat requests when check sums do not match), forward error correction (based on the inclusion of redundant information coded in a way that transmission errors can be corrected directly rather than via retransmission requests), etc. Different link-level technologies also have different properties that are important for users, such as capacity, performance, security or privacy. The properties of link-level technologies are different and may be of different significance to operators, users and regulators wanting to strike a balance between producer and consumer interests. Links are implemented using transmission equipment, and the most important ones to be discussed here include: • The most commonly used Wide Area Network (WAN) technologies; • Technologies for data access over legacy networks such as digital subscriber lines (DSL) over the Public Switched Telephone Network (PSTN); • Cable modems over cable TV networks; • Broadband over power line (BPL) transmission; and • A range of both wired and wireless local and metropolitan area network (LAN/MAN) technologies, all of which use the Ethernet frame data format according to the IEEE 802.3 standard1. An Ethernet frame is the unit of data that is transmitted between network points on an Ethernet network. Examples of such wired networks include Ethernet with data rates from 10 Mbit/s to 100 gigabits per second (IEEE802.3). Examples of wireless link level equipment include Wi-Fi (IEEE 802.11) and WiMAX (802.16). 3.1.1.3 The Network Layer The network layer provides mechanisms for addressing and forwarding data. This chapter assumes that Internet Protocol (IP) is used for this purpose. The network layer is imple- 28 mented by network elements such as routers interfacing to different link level technologies, link level switches and multiplexers, etc, to connect network hosts (servers and terminals). This is the level at which all ISPs provide services. 3.1.1.4 The Transport Layer The transport layer provides end-to-end connections between user applications in network hosts. The central transport protocols include the connection-oriented Transport Control Protocol (TCP) and the User Datagram Protocol (UDP). 3.1.1.5 The Application Layer In the application layer, the communication parts of a user application, such as email or file transfer, Web access or database access, are implemented. 3.1.2 Network Topology The network topology concept divides networks into functional parts, including access, backbone and service networks and traffic exchange points where different service providers exchange traffic. Each of these functional parts is composed of the layers briefly described in Section 3.1.1. The following subsections describe the functional parts of network topologies. 3.1.2.1 Access Networks Access networks are the links between end users and the service providers’ networks, whether they are the first mile or last mile (or last metre). First mile refers to a topology in which the user or a local service provider – or perhaps even an apartment building company2 – owns the access network and connects to service providers using its own upstream links. A last mile access topology denotes the operator’s ownership of the access network. Different link-level technologies used in access networks have different properties, different sets of strengths and weaknesses and different value assessments by regulators, users, operators and network owners. Depending on the geographical context, the access network could be a LAN or a MAN. As will be discussed in a later section, the technical solutions might be different depending on who owns the access network. In open regulatory environments, it could be owned by anyone – a service provider, an organization, a municipality, or a user agent or a neutral agent, such as a real estate owner or independent operator. The physical layer infrastructure available for access networks includes the PSTN, cable TV networks, electrical power networks, radio spectrum, and increasingly, fibre to the neighbourhood, office or home (this is often known as FTTP, for “fibre to the premises”). On the user premises, the connections to the residential or office gateway might employ dedicated wiring, legacy copper telephone wiring, power-line or wireless facilities. The most common link level technology on user premises is a local area network (IEEE 802), wired Ethernet or wireless (Wi-Fi). In an environment with more than one operator, local loop unbundling is an important first step towards an open C HAPTER 3 Trends in Telecommunication Reform 2006 market. But this option is often frustrated in practical terms by the fact that a dominant operator owns the infrastructure and is being forced to lease it, essentially, to a competitor. A more developed market structure may involve independent ownership of the infrastructure, with mechanisms for service providers to obtain direct access to users without intermediary gatekeepers in the way. 3.1.2.2 Backbones Backbones consist mainly of long-haul links that ISPs can use to expand their service networks geographically, to get transit to the Internet and to connect to regional traffic exchange points. In some countries, an open backbone market has emerged from the existence of parallel or complementary fibre infrastructures deployed by different owners, including telecom operators, power utility companies, railways, pipeline companies and even municipal or regional governments. 3.1.2.3 Service Networks A service network contains the ISP’s servers, which offer Internet access to users via access networks, as well as transit to the next tier of ISPs and peering with neighbouring ISPs in the same tier. 3.1.2.4 Traffic Exchange Points Traffic exchange points are used by operators to exchange traffic through peering directly between service networks rather than indirectly, via transit through their upstream providers. An Internet exchange point (IXP) consists, in its simplest form, of a link layer switch over which ISPs peer to exchange IP traffic. The exchange point improves network performance by keeping local traffic local and minimizing transit costs for the connected ISP. This is particularly important in areas where the backbone consists mainly of satellite links with long delays, high bandwidth prices and the remote ends on different continents. This is a particular problem in Africa, which functions as a large number of VSAT “islands” on the shores of other Internet backbone “continents.” One solution to this isolation is to interconnect IXPs, even via satellite links if better alternatives are lacking. This would cut the number of satellite hops by making direct hops between IXPs rather than two transit hops (sometimes more), plus perhaps a few transcontinental and overseas passages depending on where the different transit links happen to terminate. The main drawback of distributing an IXP geographically by connecting local IXPs is the bundling of the switching function and the long-haul link, which could lead to unfair competition in situations where link capacity is expensive. In communities that only have VSATs available as gateways, it makes sense to have a local IXP keeping local traffic local before sending it upstream via the satellite channel. This is also valid for remote local communities that can take advantage of limited alternative fibre facilities – for example, links used for metre monitoring in pipelines (water, oil, gas) or power lines. IXPs can thus start appearing in the local access networks, not just between service networks. The importance C HAPTER 3 of IXPs is explored more fully in the joint ITU-IDRC Report Via Africa: Creating local and regional IXPs to save money and bandwidth3. 3.2 A Wire-line Broadband Roadmap To an increasing extent today, wherever possible, dedicated broadband networks are being deployed. Such networks are typically based on Ethernet over fibre – in backbones, to the curb, block or neighbourhood, and to the home or office. They can interface to any other link level technology to take advantage of existing infrastructure. At the same time, new technologies have been developed to provide broadband services over legacy networks, such as DSL over the PSTN, hybrid fibre/coaxial (HFC) for cable TV networks and broadband over power line (BPL). The different link level technologies involved are discussed and analyzed in this section, in order to provide: • A description of likely broadband upgrades based on existing infrastructures; • A discussion of differences in quality of service and transmission rates among the various solutions; • An indication of the kinds of infrastructure investments that are required to deploy each technology (as a proxy for cost); and • A means of assessing the suitability of different network options to various socio-economic and geographical contexts. 3.2.1 Upgrades to the PSTN 3.2.1.1 Dial-up and ISDN Upgrading from the PSTN to ISDN requires a digital network to the user premises. That, in turn, entails investment in equipment, both at the central office and at the user end. If already installed, ISDN is still an alternative for Internet access in areas where more advanced services such as DSL, cable modem or fibre networks cannot be used. But if ISDN is not already in place, DSL appears to be a better investment because it facilitates cheaper and higher-quality broadband service. Unfortunately, ISDN is incompatible with some DSL systems over the same infrastructure, so end users that have upgraded from PSTN to ISDN actually may have to downgrade again, before they can then upgrade to DSL. Compared to dial-up service on the PSTN, ISDN is an improvement – from both a bandwidth and reliability point of view. Operators offer ISDN services including two channels as a basic rate offering and 24 or 30 channels (depending on basic PSTN type), as a primary rate offering. Available user equipment consists of simple routers interfacing with the ISDN modem, including 2 or 24/30 channels and an Ethernet interface for a local area network on the customer premises. The equipment supports automatic opening of new channels as needed when the traffic increases, thereby providing from 64 kbit/s up to 1.5 to 2 Mbit/s connections. It is also possible to connect different channels to different destinations. 29 Trends in Telecommunication Reform 2006 On the operator side, the ISP typically leases a primary rate connection (PRI) from the telecom operator. From the end user’s point of view, the usage includes the call fee to the telecom operator for each channel while connected, and the ISP fee, which may be flat or connection-time based. Even in the best of circumstances, with 56-64 kbit/s maximum bandwidth per connection at voice tariffs, neither dial-up nor ISDN systems are able to offer competitive broadband services. 3.2.1.2 Digital Subscriber Line (xDSL) ADSL Asymmetric Digital Subscriber Line (ADSL) is the most widespread DSL technology. The data channels use one frequency band for a low-speed upstream channel (25 KHz to 138 KHz) and another for a high-speed downstream channel (139 KHz to 1.1 MHz). Data transmission speeds vary, based mainly on the distance between the subscriber and the central office. Some users cannot be reached at all by ADSL, because the distance to the central office is too great. In Denmark in 2004, for example, about 5 per cent of households could not be reached by any ADSL services, and only 70 per cent of the population could access a 2 Mbit/s connection. More recent ADSL standards, such as ADSL2 and ADSL2+, promise improved capacity and coverage. VDSL Very high-rate Digital Subscriber Line (VDSL)) is similar to ADSL, except that it is optimized for shorter distances (3001 500 metres). Existing systems offer bandwidth capacities of up to 52 Mbit/s by including more high-frequency bandwidth in the copper cables and by deploying more efficient modulation. To extend its range, VDSL requires deployment of a fibre optical backbone network to the curb, block or neighbourhood (street cabinet). It also needs a power supply at the street cabinet, which is not required for service over the PSTN. This increases deployment costs significantly. VDSL also has other limitations, including interference from ADSL and AM radio services. VDSL2, a standard under development, promises to achieve bit rates of up to 100 Mbit/s. Uni-DSL One DSL for Universal Service (UDSL or UniDSL) is a new variant of DSL, integrating all earlier DSL variants. It promises aggregated bit rates of up to 200 Mbit/s, including 100 Mbit/s symmetrical connections. While Uni-DSL gives operators the flexibility to offer a range of connections, the higher data rates cannot be offered on the existing PSTN infrastructure. UniDSL would require a fibre backbone infrastructure and would use only the part of the existing subscriber line closest to the user premises. 3.2.2 Upgrading CATV networks A Hybrid Fibre/Coaxial (HFC) network combines a conventional coaxial cable TV network with fibre optic cables installed between the head end and the curb, block or neighbourhood (interfaced by converters). An HFC network may carry a variety of signal types, including analogue TV, digital TV, telephone, and data. It increases the competitiveness of 30 cable operators in a manner similar to the way that Passive Optical Network (PON) upgrades reinforce the telephone industry (PON is discussed in greater detail in section 3.2.4.2). 3.2.3 Broadband over Power Line (BPL) Power line communication systems that use the existing electrical power grid as a local loop for delivery of broadband services are often referred to as Broadband over Power Line (BPL). The typical power grid comprises generators, high-voltage lines (155-765 kilovolt or kV), substations, medium-voltage lines (1-40 kV), transformers and low-voltage lines (up to 400 V). High-voltage lines are unsuitable for BPL since there are too many electromagnetic disturbances (noise). Several organizations are working on standards to ensure coexistence and interoperability between technologies, as well as compliance with electro-magnetic compatibility (EMC). The Institute of Electrical and Electronics Engineers, Inc. (IEEE) has started work towards a “Standard for Broadband over Power Line Hardware” (P1675),4 which is intended to provide electric utilities with a comprehensive standard for installing the required communication hardware on distribution lines. The standard is targeted for completion in mid-2006. There are also working groups within the Special International Committee for Radio-Electric Disturbances (CISPR),5 which has produced relevant directives including EN55022 (European) and CISPR22 (international). In Europe, standards include the low-power voltage 240volt usage and frequencies from 30 kHz to 150 kHz. In North America, corresponding standards include the 120-volt grid and set of frequencies above 150 kHz, as well. Power utility companies often use frequencies below 490 kHz for their own telemetry and equipment control purposes. BPL uses mediumvoltage power distribution lines (access BPL) and low-voltage in-house wiring (in-house BPL). Access BPL uses modems and couplers, which are inductive injectors wrapped around the power lines. Typically, a fibre optic network connection from an ISP is terminated in an optoelectric converter and connected to a BPL modem at the utility substation, where the high-voltage lines are transformed to medium-voltage distribution networks. The traffic is fed into, and extracted from, the distribution lines via couplers. The carrier supporting the communications signals can share the same line with the electrical signals because they operate at different frequencies. This is known as Frequency Division Multiplexing (FDM) of telecom and electrical power, with the BPL signal using frequencies between 2 MHz and 80 MHz. Repeaters amplifying the signal and regenerating data must be installed about every 300 metres between the power station and the customer’s premises. Signals are terminated in a device just before the transformation to low-voltage lines (110/220 V) used inside the premises. BPL internal wiring facilitates home networking by enabling devices plugged into wall outlets in a building to communicate with each other over the existing wiring. One formal industrial standard that serves as an industry reference point is HomePlug (www.homeplug.org), which C HAPTER 3 Trends in Telecommunication Reform 2006 offers specifications to operate in the frequency range of 4.521 MHz. Some systems in Europe operate at 10-30 MHz. Inhouse BPL and access BPL are not dependent on each other, so either system can be employed with other technologies. Examples of Access BPL system manufacturers include: • Ilevo [www.ilevo.com] – offers products providing 200 Mbit/s and 45 Mbit/s bandwidth. Each power outlet is an access point to the power line network. The Ilevo systems include a head end connecting the power grid to an upstream ISP through any standard link-level technology, different types of repeaters and a modem at the customer premises. The frequency band used is 1-30 MHz. • Amperion [www.amperion.com] – offers products that deliver Internet connectivity via a wireless link called PowerWi-Fi (IEEE 802.11b) to an Ethernet port, instead of via the in-house wiring. These systems operate over 3-35 kV medium-volt lines, and they provide up to 24 Mbit/s of throughput per injection point, depending on line quality and equipment spacing. 3.2.4 Fibre Networks So far, this chapter has discussed ways to extend existing networks or modify infrastructures to provide broadband Internet access. This section takes another course: using fibre technology to deploy broadband networks offering data as well as voice and video services. In addition to a technical overview, this section will discuss strategies for deployment of fibre in developing countries – particularly in rural and underserved areas, where penetration of wired telephone networks is low and, in many cases, decreasing due to the popularity of mobile telephony. The wireless networks in many developing countries are based on microwave backbones, which provide little support for broadband applications. Many rural and underserved areas lack any broadband communication infrastructure. Nevertheless, these regions do have users that demand broadband services. The lack of legacy infrastructure can clearly be turned into a strength by leapfrogging over the need to build expensive, older-technology communication networks. Instead, fibre deployment can be coordinated and even shared with other infrastructure-dependent sectors, namely power utilities (on which many ICTs rely to operate), railways, pipelines and roads. Many developing countries have developed such strengths in recent years, after building political awareness through national ICT policies and infrastructure plans. The most striking examples include Laos, Rwanda and Tanzania. The availability of infrastructure creates new opportunities – but only if the regulatory environment allows entrepreneurs to take advantage of them. 3.2.4.1 The Physical Layer of a Fibre Network An optical fibre is a hair-thin thread of glass that transports light waves with very low diminution over long distances. Fibre is deployed in cables. Standard cables contain 24, 40 or 96 fibres. Cables can be deployed underground in conduits, under water as submarine cables or strung between poles or pylons. The cost of deploying fibre stems mainly from civil C HAPTER 3 engineering work involved. The marginal cost of adding more fibre cores in a cable is generally very low compared with costs of other types of infrastructure. Power utilities deploy fibre primarily for supervision, control and data acquisition (SCADA) functions of managing the power grid. But they are increasingly adding more fibre (at a very low marginal cost) to lease to other parities. In new installations, utilities normally use a special ground wire with a fibre cable in the core (an optical power ground wire or “OPGW”). Or, where they already have power lines, they wrap fibre around the transmission lines, in a process known as “SkyWrap.” Theoretically, then, every power grid substation – including those in rural and underserved areas – can become a point of presence for access to fibre. Signalling over optical fibre is accomplished by lasers as transmitters and photo diodes as receivers. Standard data rates are 1 gigabit per second (gbit/s), 2.5 gbit/s, 10 gbit/s or 40 gbit/s in each stream. A 100 gbit/s prototype was presented at the 2005 European Conference on Optical Communication (ECOC). Wavelength division multiplexing makes it possible to have up to 96 parallel data streams in a single fibre. The maximum total capacity in a single fibre is currently in the 1-10 terabits per second (tbit/s) range. 3.2.4.2 Optical Networks The physical layer of optical fibre consists of two sublayers: (1) the passive fibre itself, without any signals; and (2) an active optical network. In the passive fibre network, passive optical splitters can be installed, creating a tree-structure infrastructure, similar to what is done with coaxial cable in cable TV networks. This infrastructure is called a passive optical network (PON). It is used to implement point-to-multipoint links, providing “broadcast” transmissions to end-users. The term “passive” in this context means that the transmission of signals from the central office to the customer premise equipment does not require an external power source. Instead, PONs use light waves for data transfer. The use of such trees to establish links is discussed further in subsection 3.2.4.3. below. Active optical networks are point-to-point infrastructures. They include active (powered) optical components that provide routing, grooming and restoration of signals at the wavelength level, as well as wavelength-based services, by using wavelength division multiplexing.6 This creates a purely optical network infrastructure, before involving the electrical or digital domains on the link level. Not all fibre networks are designed using an optical network sub-layer in the physical layer. The main arguments for introducing an optical sub-layer on top of the passive fibre, before adding the digital communication link, are: • Better utilization of the installed optical fibre base, including the possibility to resell capacity on a wavelength basis rather than reselling an entire fibre. This argument mainly concerns the already-installed fibre base, since the marginal 31 Trends in Telecommunication Reform 2006 • • cost of adding more fibre cores when deploying a new cable is low. Better network restoration capability after network failures, since optical networks can perform protection switching faster and more economically. Reduced costs for the entire communication system, since the distributed wavelength routing scheme decreases the cost for cross-connects and only wavelengths that inject or tap traffic at a node need an electrical network element at that node. 3.2.4.3 The Link Layer of Fibre Networks The dominant wire-line link level technology in fibre access networks is Ethernet (IEEE 802.3). The 10/100 Mbit/s Ethernet capability is standard in all new computers, including laptops. A 1 gbit/s Ethernet capability is the standard interface in most networking components used in access networks. Regarding backbones, 10 gbit/s Ethernet has been in operation for quite some time in high-end network components. A few 40 gbit/s backbones are in operation, and 100 gbit/s backbones soon will be deployed. In the backbone, the Synchronous Digital Hierarchy (SDH) and Synchronous Optical Network (SONET)7 standards still dominate, because of the availability of robust and reliable carrier-class equipment in those standards. The considerably cheaper and less complex Ethernet technology is, however, making its way into the backbone, reducing both capital and operating expenditures. Moreover, Internet Exchange Points are now Ethernet-based. So the now 30-year-old Ethernet technology is finally expanding into all parts of the network topology. Point-to-point access networks establish independent links between the user premises and service networks. They offer maximum flexibility to all stakeholders, regardless of who owns and operates the involved links. What can be termed the operator-neutral model has been developed in Sweden. It is neutral in the sense that the passive access network infrastructure is often owned by housing companies, condominiums or tenant organizations and, in some cases, by municipalities. In this model, access networks are connected to a shared access network backbone. Any service provider can then connect its network gateway and offer services using the access network. The access network backbone is designed so that individual users in a housing area can select service providers independently of each other. Low-cost, standard Ethernet multiplexers or switches are used to aggregate links from user premises to the access network gateway, while preserving the provider selection. The operator-neutral model suits rural and underserved areas well, since there are few traditional operators that are likely to see a profitable business there. Given an adequate regulatory environment and appropriate technologies, local entrepreneurs that know the local market opportunities can provide local services and connect users to the network points of presence (POPs) of the larger service providers. Turning to point-to-multipoint networks, the IEEE 802.3ah Ethernet in the First Mile standard and the ITU-T G.984 32 GPON standard have made Ethernet the preferred protocol also among the traditional, vertically integrated telecom operators. As discussed in Section 3.2.4.2, a passive optical network, or PON, is a point-to-multipoint technology similar to cable networks, but fibre-based. By introducing passive optical splitters and couplers, a tree structure is created from an optical line terminator at the central office to optical network terminals (ONTs) at a number of customer premises. Downstream data is broadcast to the terminals, each of which looks for a matching address at the protocol transmission unit header. Upstream traffic is coordinated using a TDMA protocol, in which dedicated transmission “time slots” are granted to each terminal. The main fibre can operate at 155 Mbit/s, 622 Mbit/s (Broadband PON or BPON managing up to 16 ONTs) and 1.25 gbit/s or 2.5 gbit/s (Gigabit PON or GPON managing up to 32 ONTs). Bandwidth allocated to each customer from this aggregate bandwidth can be static or dynamically assigned in order to support voice, data and video applications. The terminal can provide all the appropriate interfaces. A single fibre, meanwhile, can serve 16, 32, or more buildings through the use of passive devices to split the optical signal and PON protocols to control the transmission of signals across the shared access facility. From an economic point of view, PON saves on the cost of fibre and equipment at the central office/head end, compared to using point-to-point connections. Any savings should, however, be weighed against the weaknesses of point-to-multipoint technologies, which are similar to those of broadband cable networks. For a regulator pushing an open regulatory regime, the lock-in effect of PON is less attractive, since the topology of the physical medium makes it impossible to separate users and thus prevents local loop unbundling on the physical and link levels. There is no unique path between the central office and a single user, because passive splitters are used to build the physical infrastructure, as in a cable network. Active optical networks, on the other hand, use switches, so end users can be separated. For the operator, meanwhile, a PON is more complex to plan, manage and upgrade than point-to-point links. For the user, the performance depends on traffic from other users (because of bandwidth sharing) unless traffic control of individual connections is introduced. The broadcasting technique also raises concerns about security and privacy. Policy-makers and regulators seeking to promote new fibre backbone deployment should weigh carefully the costs and benefits of these two fibre network options in order to best meet the ICT development goals of their country. 3.2.4.4 Fibre Deployment in Developing Countries Fibre deployment is taking off in developing countries. The technologies exist and are not that expensive. In many of the developing countries deploying fibre, universities are at the forefront, establishing national research and education networks (NRENs). Bangladesh, India and Pakistan, for example, all have national fibre backbones. NREN examples include: C HAPTER 3 Trends in Telecommunication Reform 2006 Table 3.1: Relative Functionalities of Broadband Wireless Access Technologies Technology Used frequencies Supported data rates Cell radius Notes EDGE 850 / 900 / 1 800 / 1 900 MHz Up to 384 kbit/s 1 km Deployed globally; extensive availability of terminals WCDMA 1 900 / 2 100 MHz Up to 2 Mbit/s 0.4-2 km Large-scale deployment; widely-supported by vendors HSDPA 1 900 / 2 100 MHz Up to 14 Mbit/s 2 km 1xRTT 450 / 850 / 950 / 1 800 / 1 900 / 2 500 MHz Up to 144 kbit/s Up to app. 50 km 2.3 GHz Up to 2.4 Mbit/s Up to 15 km 1.9 / 2 / 3.4-3.5 GHz Up to 7 Mbit/s 29 km Deployed in a few countries, e.g. New Zealand, Australia, Portugal, etc. WiFi 2.4 GHz Up to 11 Mbit/s 100 m Widely deployed globally; backed by major vendors with range of terminals available WiMAX 3.5 GHz Up to 75 Mbit/s Up to 50 km with line of sight Believed to be optimal solution for fixed wireless access and for pushing broadband into rural areas 1xEV-DO UMTSTDD • • • • • • • The Pakistan Education and Research Network (PERN) connects all public universities in Pakistan. Laos has a national fibre infrastructure reaching all provincial and district capitals. There is an Internet exchange point (IXP), to which all ISPs, except the incumbent, are connected. The universities are in the process of setting up an NREN, and they participate in an European Union funded regional academic backbone programme, dubbed TEIN2, that connects NRENs in the ASEAN countries. For a reported cost of USD 50 million, a Kenyan network provider has commissioned the installation of a 1,140 km optical fibre network by the end of 2006. The optical fibre technology will give mobile operators, ISPs and fixed-line operators a core network extending from the coastal city of Mombasa in the southeast to the country’s western border. In Rwanda, Terracom is in the process of deploying a fibre network to all schools and other priority groups. Rwanda has connected all of its ISPs at an (IXP). Meanwhile, academic institutions are in the process of organizing an NREN. Both Tanzania and Mozambique have a mix of multiple fibre owners. Both have IXPs and are in the process of establishing NRENs. Malawi and Zambia rely on power utilities for fibre deployment. Both are in the process of deploying IXPs, and the universities are in the process of setting up NRENs in both countries. Bolivia has a national fibre backbone, an IXP and an expanding NREN. C HAPTER 3 Enhancement to WCDMA; limited deployment in Japan Widely used as fixed wireless solution Deployment mostly concentrated in North Asia; widely supported by vendors 3.3 Broadband Wireless Access (BWA) Networks Wire-line broadband deployments, of course, are not the only options. A range of terrestrial wireless solutions are on offer or on the horizon. The development of BWA solutions has been marked both by significant technological progress and substantial “weeding out” of some market players. BWA solutions can be divided into four primary sub-categories, two of which are also often labelled as 3G or IMT-2000 technologies (W-CDMA and CDMA2000). The other two major families, WiMAX and 802.20, are growing in use and maturity in parallel with the development of their standards. While the 3G systems have evolved out of the mobile telephony sector, the other two technologies have emerged from the data networking sectors and often offer fixed wireless solutions (although they, too, are moving towards mobility). This section explores the migration paths of the four families of broadband wireless access technologies, picking up from the 2G and 2.5 solutions explored in Chapter 2. The technologies in this chapter represent the immediate future of broadband development. 3.3.1 The GSM Migration Path The 3G migration path from GSM, known as wideband CDMA (W-CMDA), is an incremental upgrade from GSM’s 2.5G networks. W-CDMA networks, sometimes called UMTS, have been initially deployed in Europe and Japan. Standard WCDMA systems can support up to 2 Mbit/s, while an enhanced version, called HSDPA, allows downlink rates of up to 14 Mbit/s by using higher modulation rates and other advanced techniques. With 2.5G base stations and available backhaul networks in place – and with spectrum secured – the upgrade 33 Trends in Telecommunication Reform 2006 Box 3.1: A Radio Transmission Primer All wireless networks communicate via electromagnetic energy, which is described by wavelength or frequency. Since electromagnetic energy traces a sine wave, the frequency specifies the number of humps (or troughs) per second of time and this unit is called the Hertz (or just Hz). Radio waves between 30 MHz (million Hz or megahertz) and 20 GHz (thousand million Hz or gigahertz) are usually used for data. Lower frequencies are used mostly for broadcast services such as FM and AM radio (though in some cases these are also used for data). Energy much above 20 GHz is not very suitable for data over long distances, as it is easily absorbed by water vapour in the atmosphere. The frequency of electromagnetic energy tells a lot about its usefulness for communications. Relatively low frequency energy – AM radio broadcasting frequencies, for example – travels as ground waves, literally hugging the earth’s surface. This allows the radio waves to travel past the horizon dramatically, extending their distance. These waves are not easily absorbed or reflected by objects such as trees, buildings, and the like. Relatively low frequency energy also can be bounced off of the ionosphere, dramatically extending the distance travelled (see below). By contrast, higher frequencies, in the spectrum known as “microwave,” generally require line-of-sight (LOS) transmission and cannot travel much past the horizon. The LOS requirement can be mitigated, as seen in some emerging 802.16 technologies, through sophisticated multi-path approaches, in which the signal reaches the receiver not necessarily in a straight line from the transmitter but instead reflecting off one or more objects, creating multiple paths from the sender to the receiver. Given these transmission or “propagation” properties, it would seem that the lower the frequency, the easier and better the transmission. But in thinking about broadband digital data transmission, there is one major advantage of higher frequencies: the higher the frequency, the more data that can be transmitted. In fact, typically 1-4 bit/s of data can be encoded for each cycle-persecond of the radio wave. Note that this not the same as the data rate delivered to a user, because many of these bits are put to other purposes, such as signalling, error detection and correction. Broadband wireless networks are all situated in the microwave spectrum in order to take advantage of much higher signalling rates. But they all must do battle with the relative difficulties in signal loss and fading. Figure 3.1: Comparative Prices for Mobile Data Services Price per Mbit/s, for selected operators in selected countries, June 2004, in USD, at different monthly usage thresholds, compared with NTT DoCoMo’ s unlimited usage monthly price Operator (country) 1 Mbit/s 10 Mbit/s 100 Mbit/s 1 Gbit/s GPRS 1.46 1.22 1.22 1.22 T-Mobile (Germany) GPRS 10.68 2.62 2.09 0.23 TIM (Italy) GPRS 1.82 1.82 1.82 1.82 Telefonica (Spain) GPRS 7.29 7.29 1.46 1.46 Vodafone (UK) GPRS 13.71 3.86 2.15 2.15 NTT Do CoMo (Japan) (package) W-CDMA 9.14 3.92 1.35 0.07 NTT Do CoMo (flat-rate) W-CDMA 35.00 3.50 0.35 0.04 Orange (France) Source: 34 Technology 3G Mobile, ITU research C HAPTER 3 Trends in Telecommunication Reform 2006 Box 3.2: TD-SCDMA – A Chinese Standard Time-Division Synchronous Code-Division Multiple-Access (TD-SCDMA) is a 3G standard created by the Chinese Academy of Telecommunications Technology, working with equipment vendors such as Siemens. Similar to the WiBRO initiative described below, TD-SCDMA offers an interesting illustration of a way that the public sector can collaborate with the private sector to create a local network standard. In fact, the Chinese have explicitly positioned TD-SCDMA as a way for the country to avoid dependence on “Western technologies.” And with China having more mobile subscribers than any other nation in the world, the country has a sufficient market size to support its own standard. The TD-SCDMA standard is an evolution from the GSM standard in much the same way W-CDMA is. Field tests have shown the system to work at vehicular speeds and at a 21 Km distance from the base station. Data rates are published as ranging from 1.2 kbit/s up to 2 Mbit/s. The fact that the published data rates are so broad is more than a curiosity, as technical trials have shown a disappointing delivered capacity. The government has called for an “intensive industry-wide effort” to deliver on the technology and to make it competitive. Figure 3.2: Migration Paths from 2G to 3G Figure 2 — From 2G to 3G Evolution of mobile systems to 3G TDMA GSM EDGE GPRS WCDMA PDC cdmaOne CDMA2000 1X 2G First step into 3G 3G Phase 1 Evolved 3G Voice and up to 14.4 kbit/s data 64 – 144 kbit/s 384 kbit/s – 2 Mbit/s 384 kbit/s – 10 Mbit/s Actual user data rate 14 kbit/s 20 – 60 kbit/s 60 – 120 kbit/s Over 384 kbit/s Time 2000/2001 from 2.5 to 3G systems can be done incrementally and with relative ease. For instance, 3G services can be offered on a cellby-cell basis and only in those areas with sufficient subscriber demand. In practice, however, 3G upgrades are done across an entire region in order to provide consistency in service levels for mobile customers and to allow broad marketing and sales plans. 3.3.2 The CDMA Migration Path There is a family of 3G upgrades for CDMA networks that are called CDMA2000. This includes the CDMA2000 1x systems which support data rates up to 307 kbit/s. The CDMA Development Group (CDG) refers to all CDMA2000 subscriber numbers as “3G” users, but the real equivalent to 3G is in fact CDMA2000 1xEV (for Evolution), which is a C HAPTER 3 CDMA2000 1XEV 2001/2002 2003 higher-speed version of 1x. Within this set of technologies are CDMA2000 1xEV-DO (data only) and 1xEV-DV (data/voice). Recent versions of EV-DO and EV-DV support theoretical data rates of 3.1 Mbit/s downstream and 1.8 Mbit/s upstream. Real-world rates are about half that speed. The performance and market adoption of 3G networks (CDMA2000 and W-CDMA) has, to date, been disappointing. This is partly because of high prices associated with network upgrades and the extraordinary amounts paid for 3G spectrum in some areas (mostly Europe). There also is a relative lack of suitable applications to motivate subscriber adoption and handset upgrades. But the 3G vision remains compelling: ubiquitous Internet access enjoyed while moving at vehicular speeds, with broadband bandwidths and latencies that are comparable to DSL or cable modem services. 35 Trends in Telecommunication Reform 2006 Box 3.3: 802.16 Extensions in the Works 802.16a Works in 2-11 GHz range and supports mesh deployments. 802.16b Increases the amount of spectrum that can be used in 5-6 GHz range, and provides Quality of Service guarantees. 802.16c Works in a higher frequency range of 10 to 66 GHz. 802.16d Brings improvements to 802.16a; intended to supplant 802.16 and 802.16a. 802.16e Supports mobile devices. Box 3.4: The Evolution of a “Southern” Solution Broadband corDECT is an important, although incremental, improvement on the corDECT system designed at the Indian Institute of Technology, Madras. The initial DECT system, based on the European standard originally developed for cordless telephones, provided LOS connectivity at a maximum of 70 kbit/s. One significant strength of this system has been its relative low cost. While the benefits of non-line-of-sight (NLOS) systems are palpable, there is no immediately available technique to develop an NLOS DECT-based system. This is because of the power restrictions on the spectrum used by DECT radios. Broadband corDECT is able to turn this “bug” into a feature by taking advantage of the line-of-sight requirement to enhance capacity. Through spatial reuse of spectrum, enhanced modulation levels, and the use of radio wave polarization techniques, Broadband corDECT delivers 256 kbit/s – and, ultimately, as much as 512 kbit/s – of dedicated bandwidth to each user. Costs are considered affordable at around USD 150 per subscriber, including base station and customer equipment costs. Source: Midas Communications 3.3.3 The Evolution of WiMAX A range of technologies fall under the WiMAX moniker, including those that conform to the emerging set of IEEE 802.16 standards. WiMAX systems promise to: – Have very high capacities (up to 134.4 Mbit/s in a 28 MHz channel), – Travel long distances (50 km or more), – Not require line-of-sight, – Work at vehicular speeds (under the 802.16e extension), – Enjoy high spectral efficiency (under the 802.16a/d extension), and – Be inexpensive (with base stations in the $10,000 range). It sounds like a broadband wireless “dream come true,” except that not all of these extensions have worked yet in the real world. Moreover, not all of these desirable qualities can be enjoyed at the same time with the same network (for example, as of yet there is no cheap, efficient, high-capacity system that works at vehicular speeds). Still, WiMAX systems show great promise for the provision of broadband Internet access services, especially in remote areas or wherever fully ubiquitous access, at vehicular speeds with seamless handoff, is not a high priority. The 802.16 standard and its extensions were still being finalized at the time of publication, but a number of vendors already had begun offering broadband metropolitan area network (MAN) technologies that will comport with the 802.16 standard as soon as it is stable. One example is the Canopy system from Motorola. Canopy transmissions can travel 50 km in a single hop, providing 10 Mbit/s of shared bandwidth. 36 Outdoor access points can list for USD 1,000, with customer premises equipment costing USD 500. Samsung and LG Electronics of Korea (Rep.) have developed a WiMAX-styled technology called WiBro (for “wireless broadband”), which is designed for the 2.3 GHz band. It offers 512-1,024 kbit/s per user, and allows users to travel at nearvehicular speeds (around 60 km per hour). The system has emerged with assistance from the government of Korea (Rep.), which was eager to see a locally produced technology and had promoted WiBro as the basis for the 802.16e mobile WiMAX standard. Other important stakeholders, however, were not supportive of WiBro as a standard-setting technology for technical reasons. The 802.16e standardization process could have been weakened if two competing technologies were to emerge. But at this point, companies have agreed to converge on a shared single standard. The European Telecommunications Standards Institute (ETSI) has also developed broadband metropolitan area network standards under the name HiperMAN. Like WiBro and other related technologies, these systems allow for long-distance transmissions (over tens of kilometres) and high bandwidth (up to 280 Mbit/s at each base station). The WiMAX Forum has been working with the HiperMAN, WiBro, and IEEE 802.16 standards to try to ensure interoperability among all of these various systems. 3.3.4 The New Kid on the Block: 802.20 WiMAX started as a fixed wireless technology and has since been evolving to support mobility under the .16e extension. The IEEE’s 802.20 standard, however, originated explic- C HAPTER 3 Trends in Telecommunication Reform 2006 Box 3.5: Mesh Networks A mesh network interconnects communication nodes to pass messages directly between each node, without a dedicated intermediary (i.e., a server). The communication nodes used in a mesh network can be of any type – from handheld sensors to desktop computers to Wi-Fi routers. The difference between mesh networking between clients (also known as multipoint-to-multipoint or peer-to-peer networking) and traditional networking is that in the latter, a dedicated router is required to pass all messages from one client to another. Mesh networks still frequently make use of dedicated routers, but they also can be configured without them. The arrangement (topology) of client communication devices (nodes) is also very flexible. The key is that each node is capable of talking directly to its neighbours (within range), whether that node is a client (computers, sensors, kiosks) or infrastructure (routers, access points, gateways). There are several reasons to choose a mesh network over a traditional one, including greater scalability, extensibility, resiliency, and physical infrastructure advantages. Scalability refers to the flexibility of a mesh network to choose the path of a message being routed. When an additional node is added to a traditional network, it has to be able to communicate with a dedicated router, which either increases the load on an existing router or requires installation of a new one. On a mesh network, however, the additional node not only consumes routing capacity but also adds its own capacity to the network. This means that the routing capacity and aggregate throughput within the network grows as the network grows, rather than starting at some limit and decreasing, which is what happens in a traditional network. Extensibility is a very important advantage of mesh networks – particularly wireless ones. Extensibility stems from the fact that any node can have its message hop from one point to another via a peer node. In a traditional (point-to-multipoint) wireless network, being out of range of a dedicated access point means a loss of connectivity. But in a mesh network, connectivity can be maintained as long as there is another client node within range that can be used as a bridge to eventually reach the access point or destination. There is no fundamental limit to the number of hops a message can make before reaching its destination, but implementation details mean that, as the network extends farther and farther outward, it will eventually be beneficial to add a new dedicated access point. Another advantage of mesh networks is their tolerance of failures. Typically, in a mesh network there will be more than one path available for data to take. A traditional network only offers a single path. If, in a traditional network, a router suffers a failure, the nodes connected to it lose all connectivity. Another benefit of the multi-path character of mesh networks is that the “network diameter” – the minimum number of hops separating any two communicating nodes – can be smaller than in a traditional network. This can result in reduced latency on the network. There are drawbacks to mesh networking. First and foremost is that each communicating node needs to be willing and able to route traffic. This activity requires computational and electrical power and can slow down the appliance or unduly drain its battery. In addition, mesh networks require additional preparation and setup of each client and may be harder to maintain than a more centralized, traditional network. One market in which mesh networking could make significant inroads is rural access. A mesh network provider based in a metropolitan area could offer services in remote areas by “piggybacking” connectivity over a series of subscribers in the direction of the end-user. Data traffic on the outer edge of the network – in a remote village, perhaps – would only need a wireless connection strong enough to reach the next, closer subscriber to the metropolitan area. This second subscriber would then pass the traffic to another, closer subscriber and the process would continue until the traffic reached the backbone Internet connection. By using all subscribers as transit points, the mesh network can quickly reach distant areas with relative ease.1 1 ITU Internet Reports: The Portable Internet, 2004, see http://www.itu.int/publications/bookshop itly as a mobile broadband technology. The fact that its original design requirements included mobility should prove beneficial to the standard compared with others, which have had to add mobility on as an extension. Even so, the 802.16 family of WiMAX systems has a first-mover advantage and, at present, stronger industry support from major players. Through its recent acquisition of Flarion Technologies and their Flash-OFDM technology, Qualcomm has just demonstrated its support of the emerging 802.20 standard, which has not yet been finalized. C HAPTER 3 3.3.5 OFDM Technology Orthogonal frequency-division multiplexing (OFDM) is emerging as a leading technology for very-high-bandwidth wireless connectivity. As the speed of wireless services increases, it increases the need for more and more radio spectrum, which is expensive and hard to acquire. In turn, this increases the importance of spectral efficiency, which refers to the number of bits that can be encoded into a single radio cycle. OFDM-based technologies, including WiMAX, enjoy spectral efficiencies of around 4 bit/s per hertz. This compares favourably with the 37 Trends in Telecommunication Reform 2006 Figure 3.3: A mesh network topology versus a traditional network 802.11d standard, for instance, which has a spectral efficiency of less than 2 bit/s per hertz. OFDM works by segmenting available spectrum by frequency and then carrying a portion of the user’s data on each of these frequencies. Each frequency is unique and does not overlap, making it orthogonal to the next. This ensures that there is no interference between the various tones. This technique, along with other sophisticated improvements in digital signal processing, has produced an efficient and speedy network technology. Flash-OFDM can deliver capacity of about 1 Mbit/s downstream and 500 kbit/s upstream while stationary. Available bandwidth is diminished, however, when moving at vehicular speeds. One significant strength of the Flash-OFDM system is its spectral efficiency, which is about 4 bit/s per hertz (a similar efficiency is planned for the 802.16a OFDM extension). This is a great advantage when spectrum is scarce or expensive. In some rural and underserved areas, where microwave radio bands are relatively underutilized, this advantage is not as compelling. Another early system intended to track the emerging 802.20 standard is iBurst, which is based on radio technologies (and in particular smart antenna designs) produced by U.S.based ArrayComm. Early deployments of this mobile broadband system have gone up in Australia and South Africa.8 3.3.6 Integrating Heterogeneous BWA Networks What this BWA roadmap makes clear is that there are a number of complementary and often-competing standards, standard-setting institutions, proprietary offerings and vendors. Considerable effort is being put to interoperability and merging these various systems. But it still is likely that many enterprises will end up with a heterogeneous collection of wireless networks. Moreover, the functionality of many of these systems is converging (See Box 3.6). 38 Ongoing research is focusing on ways to integrate the various network technologies. For instance, the Third Generation Partnership Project (3GPP) has been studying systems to interconnect 3G systems with WiMAX or Wi-Fi networks. Issues have included hand-off as well as authentication, authorization and accounting (AAA) and other considerations. As the capabilities and purposes of fixed wireless and 3G wireless networks converge and approach the performance of wire-line networks, perhaps it will become easier to make a strategic choice between these families of technologies. 3.3.7 Civil Engineering Costs for Broadband Wireless As long as Moore’s law holds true, there will be a constant, exponential growth in the performance and affordability of computer technologies. Regrettably, however, Moore’s law has yet to apply to the performance or cost of steel, cement, or labour. As a result, the “civil engineering” costs for outdoor radio networks – the costs of radio towers, cement foundations, and related requirements – are beginning to outdistance the cost of the solid state radio equipment. Consider the cost of radio masts or towers, which are essential for fixed wireless and 3G radio networks. Without towers, it is impossible to position signals above foliage and buildings that might obstruct them, to extend the horizon, or to meet other transmission requirements. In most major cities, the skyline is littered with these towers. They range from masts on the order of a metre in height, positioned on the roof of a customer’s premises, to 10-metre cellular network towers and 100-metre (or higher) towers populated with high capacity point-to-point microwave antennas and, perhaps, broadcast TV or radio facilities. The cost and effort required to put up a radio tower can be influenced by several factors, including local climate (whether there are high winds or frequent icing) and the intended load- C HAPTER 3 Trends in Telecommunication Reform 2006 Box 3.6: Convergence of WLAN and 3G Networks There is today no single, optimal broadband technology. Each major family of technologies features strengths and weaknesses. Figure 3.4 provides a preliminary decision matrix that can help develop strategic choices among the technology types. Notwithstanding these technology differences, there is significant convergence among the various offerings towards a unified set of design characteristics for an ideal broadband wireless network. These characteristics would include: – High bit-rates in an all-IP environment, including IP Version 6 (IPv6) support – End-to-end QoS – Multimedia support – Mobility at automobile and train speeds – Seamless session management – Security, security, security – Support for flexible and dynamic spectrum and interference management (including software-defined radios) – Advanced authentication, authorization, and accounting protocols. These goals are more than a pipe-dream. The fixed wireless and 3G families of networks are converging on each other, and beginning to converge on this network design “wish list.” Figure 3.4: The Convergence of WLAN and 3G Technologies – A Matrix Current WLAN Strengths Emerging WLAN Strengths • Relatively inexpensive • Mobility (e.g. mobile WiMAX 802.16e) • Data ready and high-bit rates • QoS (e.g. WiFi 802.11e) • VoIP Emerging 3G Strengths Current 2G strengths • Ubiquitous • Multimedia support • Mobility • High data rates (e.g. W-CDMA) • QoS guarantees ing of the tower (for example, one small antenna or many large ones). Towers are designed with these factors in mind, and a choice must be made between three principal support strategies: • Free-standing, • Bracketed against an existing structure, or • Supported with guy wires. By far the most important factor in determining the cost and complexity of a tower design is its height. The height requirement largely dictates the type of tower that is needed, the foundation strength and the requirements for guy wires, among other things. Grounding is important, particularly in areas that experience seasonal electric storms. Lightening strikes can spell the death of antennas and radio electronics. In order to protect the equipment, lightening attractors can be affixed at the top of the tower. The principle of a lightening attractor is simple: it should be higher than the equipment being protected and it should offer less resistance to the flow C HAPTER 3 of electricity than “competing” local options (such as the radio equipment). Fixing an attractor above the radio and antenna is easy enough. But ensuring low electrical resistance requires careful attention to grounding. Especially in rural and underserved areas – where, for instance, a relay base station may be positioned – industrial grounds are not available and it is necessary to dig an earth pit to ground the arrestor. This activity can add substantial expenses to the costs. Figure 3.5 shows empirical data for the tower and labour costs in the United States and Ghana, as well as grounding costs in the United States. A simple regression performed on these data points yields the linear cost models that are depicted visually below. Results indicate that: • In Ghana a 3-metre tower with installation and grounding costs just under USD 220, and an additional USD 270 for each additional metre. 39 Trends in Telecommunication Reform 2006 Figure 3.5: Empirical Data for Tower, Installation, and Grounding Costs Figure 3.6: Linear Model of Tower, Installation, and Grounding costs (USA/Ghana) 40 C HAPTER 3 Trends in Telecommunication Reform 2006 Figure 3.7: Radio Tower Types and Heights A simple radio pole, perhaps just a few meters high (left); a free-standing radio tower used for a cellular phone network, perhaps 10 meters high (centre); a guyed radio tower holding various antenna, perhaps 100 meters high (right). • In the United States a 3-metre tower with installation and grounding costs nearly USD 1,360, and almost an additional USD 770 for each additional metre. Of course, these models are just estimates to help to clarify and guide thinking. As a point of comparison, for instance, Motorola Canopy outdoor access points can list for approximately USD 1,000, while their subscriber modules can be under USD 500. Clearly any cost analysis of wireless broadband equipment should consider such civil engineering costs, since these can dominate costs for radio equipment. 3.3.8 Stratospheric platforms Stratospheric platforms operate within the stratosphere portion of the atmosphere, under aerodynamic conditions. High- and low-altitude platform stations (HAPS or LAPS) offer the coverage benefits of satellites at costs close to fixed infrastructure.9 A HAPS platform may be an airship soaring in the stratosphere at an altitude about 20 km – well above normal aircraft but below orbiting satellites. There are no commercial HAPS services yet, but active research and development efforts are under way. LAPS services may employ an airship kept stationary at an altitude of about 3 km. Commercial LAPS services are available, especially targeting temporary needs such as emergency response situations or sports events. The key markets for LAPS and HAPS will likely be rural and developing areas that are underserved by traditional infrastructure. But they could also play a key role in conjunction with newer wireless technologies such as WiMAX. Since LAPS and HAPS are potential platforms for delivering connectivity for a range of wireless systems, their radio equipment could make use of the most current technologies to provide fast line- C HAPTER 3 of-sight connectivity. Since the line-of-sight requirement could be met for many applications, the frequencies and corresponding transmission speeds could be much higher.10 3.4 A Decision Framework for Broadband Facilities-based competition is a desirable element for any nation’s broadband market, but it simply may not exist in all (or any) parts of all countries. For instance, some high-income metropolitan areas may have multiple wire-line broadband providers (a cable TV system operator and a DSL operator) along with multiple mobile operators. Some areas may be served by smaller, local entrepreneurs or even municipalities offering WLAN hotspots. Each of these would compete to provide the most cutting-edge data solutions. But in some low-income areas – and especially in rural and sparsely populated areas – this level of competition may not be commercially viable. Initially, policy-makers and regulators may succeed in inducing only one broadband provider to enter rural or sparsely populated markets, while leaving the door open for other entrants once demand for broadband services has been established. In these environments, therefore, strategic choices may have to be made between various network families. In other words, some contexts may commercially support facilities-based competition (or, said another way, “complementary” networks), while other regions may face a choice of one network over the others. As mentioned in chapter 2, there are currently three dominant technology families for the deployment of broadband Internet connectivity: 41 Trends in Telecommunication Reform 2006 1 2 3 Broadband wireline networks – DSL, cable TV and fibre solutions, Broadband wireless access – 3G mobile and WiMAX, and Non-terrestrial wireless options – VSAT and other satellite and stratospheric platforms. Each of these solutions is in play today, and each has niches in which it is the most appropriate. In this section we will consider various contexts – geographic, economic, demographic, and public policy environments – and how they might determine the viability of each family of network solutions. The starting point of this analysis is that there is no significant environment on the planet today in which broadband Internet does not make commercial, social, and institutional sense. These families of technologies under discussion in this chapter mostly describe the edge network, that is, the “last mile” component of the overall network that connects the base station or central office to the subscriber’s premises. The backhaul network is the facility that connects the various base stations together. And finally, this traffic is aggregated by the backhaul network and passed on to the Internet “cloud” which we will refer to as the core network. This chapter has focused mostly on edge (or access) networks because, in particular, they are the most expensive and difficult to deploy. But this does not hide the fact that for broadband wire-line networks, the availability of core network facilities, and in particular, fibre networks, is vital to promoting broadband deployment. The following subsections explain the four main environments in which edge networks can be deployed: (1) converged environments, (2) complementary environments, (3) competing environments and (4) exclusive environments. Different policy and regulatory choices may apply to each environment, and new regulatory frameworks may have to be developed as broadband markets evolve and mature. 3.4.1 Converged Environments Converged environments are found in densely populated areas with high-value fixed and mobile service subscribers, such as in metropolitan areas in North America. In a converged environment, fixed wire-line networks compete with or complement BWA networks. And BWA networks are being integrated so that users of converged appliances (mobile handsets, personal digital assistants (PDAs) or laptops) can move seamlessly between 2.5G or 3G networks and WiFi or WiMAX networks. As these converged environments develop, two approaches to the integration of the wireless networks are being explored. Tightly coupled integration can be implemented at a relatively low level within the network. For example, a WiMAX network can be made to appear to a 3G mobile network facility as just another cellular access network. So there can be seamless handoffs between cellular and WiMAX networks. By comparison, another approach, loose coupling, integrates networks at the Internet Protocol layer. This form of integration will still support limited handoff between networks. Finally, and more immediately, hybrid appliances can support a 42 limited form of network convergence, for instance today’s WiFi and 2.5G-enabled handsets. Converged environments are the most capital- and technology-intensive, requiring significant vertical integration within network operators. They also place significant cost burdens on each user, because converged (or multi-mode) handsets and appliances are only now becoming available on the market and are consequently expensive. 3.4.2 Complementary Environments Converged environments are just now emerging. In today’s reality, most broadband operators either compete or complement each other (or both). In a complementary environment, broadband network providers offer their services to specific niche markets. Networks are often broadly pervasive but not wholly ubiquitous. For instance, a single user may subscribe to three different broadband network services provided by three separate operators: 1 A cable-based home broadband network, 2 A WLAN hotspot service available at coffee shop chains, airport terminals, and other public places, and 3 A 2.5G EDGE network provided by a major cell phone operator. None of these networks currently are integrated, as they would be in a converged environment. But they all respond to specific niche demands, often from the same end user. The same individual would use different services when working at home, enjoying a cup of coffee or tapping into email while on the go. 3.4.3 Competing Environments There are many areas where the number of high-value subscribers is substantial, but the organizational and capital environment has not yet been able to support much in the way of converged facilities. In these areas, multiple broadband networks will be deployed in competition. Indeed, this is the case for most metropolitan areas in Europe, North America and parts of Asia and Latin America. Even an area such as the complementary environment described in the previous subsection, with three complementary broadband networks, there will also be competing network facilities. For example, the dominant local cable TV provider will offer home broadband (cable modem) service. Competing with this service might be a DSL home broadband service provided by the incumbent local telephone operator. Similarly, multiple WLAN hotspot services might compete with each other, although not often at the same physical location (a single provider will often have exclusive rights in any given hotspot). Indeed, we expect that in areas that enjoy a large number and high density of broadband users, instances of converged, complementary and competing broadband networks may exist in a simultaneous and overlapping manner. 3.4.4 Exclusive Environments In marked contrast, much of the developing world has no broadband provider at all. While regulators seek to pro- C HAPTER 3 Trends in Telecommunication Reform 2006 mote competitive broadband provision, a more likely scenario, at least in the short term, may be broadband provision in an “exclusive” environment. It is not that regulators seek to create monopoly markets. The problem is that they may only succeed, at least in the short term, in attracting one broadband provider. Sparsely populated rural areas, low-income areas, and places with challenging physical environments are all candidates for such exclusive broadband providers. These environments are the most important and the most compelling for bridging the Digital Divide. Since only a single broadband network is likely to be commercially viable, at least initially, it is critical for potential broadband providers to pick the technology family and governments to put into place the institutional and policy environment to support the network. How can we best conceptualize and support broadband services in these exclusive environments, especially in those “green-field” areas where there currently is no broadband network access? It is useful to consider the three technological platform families separately. The following subsections discuss the two “extreme” cases: fixed wire-line access and non-terrestrial wireless access, followed by the still-challenging case for fixed and mobile terrestrial wireless networks. 3.4.4.2 Wire-line Broadband for Exclusive Environments Wire-line broadband platforms make good sense in areas with a large population of stationary users, and where operators have sufficient access to capital, public policy support, and organizational integration. Indeed, fixed-wire networks are the cheapest per bit, when the goal is to transmit a very large numbers of bits. Researchers have argued that fixed wire-line solutions are the most cost-effective, compared with available wireless solutions, in environments with more than 40 broadband subscribers per square kilometre. The choice between the three primary wire-line technologies (DSL, cable, and fibre) will probably be driven mostly by the predominant physical layer of the existing networks. If there is a high-quality copper network already in place, then broadband DSL service might be the easiest and most cost-effective to implement. Similarly, if cable TV systems pass most homes, then those systems’ coaxial and fibre networks might be able to support broadband data. It is important to note, however, that exclusive environments are usually in areas that have neither a large population of high-value users nor the necessary capital to support the financially intensive requirements of building broadband, wired networks. In other words, few if any exclusive environments would be best served by a fixed wire-line broadband network. 3.4.4.2 Non-Terrestrial Platforms for Exclusive Environments VSATs are the clear solution for extremely remote areas and areas with extreme geographic conditions (for example, mountainous regions). Today, every part of the planet is touched by multiple satellite signals providing, for a price, broadband Internet services. But high prices tend to make satellite connectivity suitable largely for the most remote and difficult settings (where there are no alternatives). It is not C HAPTER 3 uncommon to be confronted with a monthly fee of thousands of dollars for broadband satellite service. One possible approach that leverages economies of scale and creates opportunities for sharing expenses is to utilize VSAT technologies for backhaul networks. A local BWA network can then share this connectivity with multiple local subscribers. 3.4.4.3 Terrestrial Wireless Networks for Exclusive Environments It is likely that the majority of exclusive environments, especially in rural and semi-urban areas of low- and middleincome countries, will receive broadband Internet access using some form of terrestrial wireless technology. This subsection considers the case for WiMAX and related networks in these contexts, exploring the business and policy environments that are needed to support these networks, then contrasting these networks with their mobile 3G counterparts. WiMAX, Wi-Fi, 802.20 and related networks are an attractive solution in many environments, especially if there are likely to be five or fewer subscribers per square kilometre. Deployments can be bottom-up and potentially incremental. Wireless systems can work in environments with relatively weak institutional support and small capital markets. Exclusive BWA networks can be visualized as a series of circles connected by sticks. The circles represent areas of coverage by a point-to-multipoint radio transceiver, representing the edge (access) network. The sticks represent the backhaul network that ultimately aggregates the traffic at a head end and passes it on to a higher-tier ISP – the core network. The “circle” of edge connectivity need only have a radius of hundreds of metres, using popular Wi-Fi systems. The backhaul networks can have “sticks” that extend for many tens of kilometres, using WiMAX-related technologies. Alternatively, the edge-network circles could have a radius of 10-20 kilometres, employing WiMAX base stations and omni-directional antenna facilities. They, in turn, could be backhauled with long-distance, point-to-point microwave networks or fibre, wherever they exist. In an exclusive environment with a very small number of anticipated subscribers, the fixed-wireless approaches of WiMAX and related networks promise to be the most costeffective approaches. One reason is that they can connect only those specific areas requiring service, rather than spreading a ubiquitous signal over a wide area. This is a benefit in sparse and low-demand areas. Furthermore, most WiMAX technologies do not support vehicular speeds (though newer 802.20 and WiMAX technologies are emerging that do handle mobility), nor do they usually support seamless handoff between cells. As noted in Figure 3.4 above, however, distinctions in mobility, cost, ubiquity, and even capacity between WiMAX, 802.20, and the 3G family of networks, are eroding in favour of rapid convergence on a fairly similar feature set. For instance, mesh Wi-Fi and WiMAX systems are available that can provide nearly seamless and ubiquitous coverage. Similarly, WiMAX 43 Trends in Telecommunication Reform 2006 Figure 3.8: Mobility v. Data Rate for Popular BWA Systems standards (and 802.20) that support vehicular motion are in the works. 3.4.4.4 3G for Exclusive Environments Mobility and ubiquity are key elements of today’s 3G deployments. These may not, however, be critical for exclusive environments. In under-served and remote environments, a ubiquitous and mobile broadband connection, with seamless handoff at vehicular speeds, may be more than the market needs or can bear. In fact, there are many examples of deployed 2G networks that are used mostly as fixed-mobile voice networks. The Grameen Phone network is well known for providing rural voice services in Bangladesh via village “phone ladies.” Providing support for vehicular travel and seamless handoff to these “phone ladies” is, according to the project’s principal organizer, an engineering solution in search of a problem. And if vehicular mobility is generally not needed for voice traffic, it is questionable whether it is necessary for broadband data. In some areas, there may well be sufficient markets for ubiquitous and mobile 3G in exclusive environments, including relatively remote and sparsely populated areas. After all, mobile 2G networks enjoy very high penetration, even in some of the most remote and low-income areas in the world. One potentially viable approach may be to leverage existing 2G networks (or even build new, green-field mobile networks), upgrading them to 2.5G or 3G support. This may well depend on industry response and the regulatory environment. To consumers, 3G and fixed BWA networks may appear to be converging, as fixed wireless adds mobility and ubiquity and 3G increases capacity. The two technologies do, however, come from very different communities. Fixed wireless tech- 44 nologies have a data networking and information technology pedigree, while 3G services are primarily telecommunication industry products. This difference is reflected in management of the two different kinds of networks. 3G networks are usually deployed after top-down planning, by large, vertically integrated operators with access to substantial investment capital. Corporate headquarters announce new deployments, which commonly cover large areas. Fixed wireless networks, by contrast, have often been driven by communities, small entrepreneurs and retailers, who employ an incremental approach. There are many tradeoffs between the various types of BWA networks that can be deployed within an exclusive environment. In some cases, upgrading 2G networks to 3G capabilities will be the most promising solution. In other areas, the 2G base station infrastructure might be suitable for deploying WiMAX (or even 802.20) access points. Alternatively, in some green-field settings it may be desirable to abandon the mobile phone market and target specific areas for fixed wireless solutions. In other green-field environments, it may be most appropriate to leapfrog straight to a 3G mobile network that can provide broadband data to an entire region. 3.5 Power requirements for broadband A reliable electrical power source is crucial to achieving pervasive broadband connectivity. High-capacity wireless networks, and the multimedia appliances that broadband applications call for, can heighten electric power demand. So any effort to deploy broadband networks must also consider the availability of power solutions, both on and off the electrical C HAPTER 3 Trends in Telecommunication Reform 2006 Figure 3.9: Power Consumption of Some Wireless Radio Products grid. Today’s modern desktop personal computers (PCs) need electricity to power: – The central processor (now often consuming 80 watts), – The screen or monitor (consuming up to 100 watts), – The hard drive (which can consume 100 watts when spinning), – RAM memory, graphics cards and other on-board devices (up to 40 watts). Low-power versions of these technologies do exist today. For instance, power-efficient laptops can be engineered to require less than 40 watts under normal operation. Figure 3.9 shows the power consumption for a set of popular WLAN radio technologies. “BreezeMAX” WiMAX technologies can require 30-40 watts when in operation. A subscriber unit for Motorola Canopy, on the other hand, consumes less than 10 watts, while an indoor wireless router from Links consumes slightly more than 10 watts, on average. What these figures suggest is that a standard, broadbandenabled PC can consume a fairly considerable amount of power; even low-power laptops require a significant amount. Furthermore, the power load of a PC is non-linear; it fluctuates over time (unlike a light bulb, for example), and a PC requires high-quality power sources. This leads to the question of whether high-quality, reliable power sources are available in areas that have inadequate or unreliable access to the electrical grid. Major solutions for off-grid powering of ICT systems include solar cells, small wind systems, micro-hydro power technologies, and generator sets (powered by diesel, gasoline, or bio-fuels). Each of these solutions has its benefits, as well as drawbacks. The following sections provide two case studies that illustrate innovative C HAPTER 3 applications of off-grid power for ICTs in developing countries. 3.5.1 Tanzania: The Kasulu Teachers Training College At the Kasulu Teachers Training College (KTTC) in Tanzania, the “First Wave” of agrarian reform has mingle with the wave of new information technologies to create a broadband service that is changing the lives of some of the most impoverished people in Africa. An Internet centre at the KTTC equips the next generation of teachers in Tanzania with Information Society tools, despite the fact that Kasulu has no electricity supply and its 15 phone lines have no data capabilities. What is unique about the project is that it is run by an unusual source of power – cow manure.11 Kasulu, population 33,668,12 is located in northwestern Tanzania. Being close to the Burundi border, the region has seen a huge influx of refugees escaping from violence in that country. In 2000, the Global Catalyst Foundation (GCF), in collaboration with the United Nations High Commissioner for Refugees (UNHCR) and Schools Online, decided to explore the feasibility of setting up a Kasulu Internet Project13 to promote cooperation and understanding between refugee Burundians and their Tanzanian neighbours in the Kasulu area. Another objective was to promote economic development and entrepreneurship in the impoverished region. 3.5.1.1 The Kasulu Programme GCF is a private foundation established by Kamran Elahian, an IT entrepreneur and founder of Global Catalyst Partners, a Silicon Valley venture capital firm. GCF’s mission is “empowering people through technology,” and it supports 45 Trends in Telecommunication Reform 2006 Figure 3.10: UNHCR Refugee Camps in Tanzania Source: Food and Agriculture Organisation. projects that “improve education, alleviate poverty, promote social tolerance and celebrate diversity” across the world.14 Schools Online, another non-profit started by Elahian, aims to help students use the Internet for learning and cross-cultural dialogue. Since 1996, the organization has assisted more than 5,700 schools in the United States and more than 400 schools in 35 other countries, helping to procure the equipment and support services to get online.15 Through the Kasulu Internet Project, GCF, Schools Online and UNHCR have collaborated in establishing Internet centres in three locations: – At a UNHCR administered refugee camp, dubbed “Meatball,” – At the Kasulu Folk Development College, and – At the Kasulu Teacher Training College. GCF contributed USD 120,000 in operational funds for the three centres for three years; it is responsible for the overall management of the project. The local communities have contributed their labour to build computer labs. UNHCR provides logistical and administrative support, and Schools Online provides the hardware and software infrastructure and funding for professional development and capacity building.16 At the KTTC facility, the 800 students enrolled in the teacher-training programme are the main users of the computer labs, which are open to community members from 7-10 pm during the week (they are also open on Saturdays and Sundays), on a fee-for-use basis. The price is about USD 1 per hour (1,000 Tanzanian Shillings). Local representatives of non- 46 governmental organizations and UNHCR are frequent users of the labs, as well. The teachers and students take CISCO Academy courses and study for the International Computer Driver’s License (ICDL), which has seven skill levels in word processing, file management, Internet services and other fields. The CISCO Academy has seven students at KTTC, who pay approximately USD 200 for a six-month course. Some 10 students from the town of Kasulu are also studying elements of the ICDL curriculum, paying approximately USD 200 per course. Another 30 students from the KTTC also attend these classes but pay lower fees. Revenues from these training programmes help KTTC pay for the cost of Internet access, maintenance and ongoing operations. The Tanzanian Ministry of Education is now planning to make IT training compulsory for teachers. This will increase the demand for computer classes at KTTC, because all of the area’s teacher candidates will require instruction. 3.5.1.2 Kasulu’s Internet Links The school is connected to the Internet through a VSAT service provided by I-way. The I-way connection offers 128 kbit/s downlink and 30–40 kbit/s uplink speeds. The Global Catalyst Foundation pays USD 500 per month for the connection. The Internet is reasonably reliable, although it does fail occasionally. As mentioned above, the GCF turned to an unusual source of power – cow manure – to power the KTTC compu- C HAPTER 3 Trends in Telecommunication Reform 2006 Figure 3.11: The KTTC Computer Laboratory Source: Michael L. Best Figure 3.12: KTTC’s Eco-Friendly Power Plant The biogas digester (top left), methane/diesel generator (bottom left), and cow corral (right). Source: Michael L. Best ter lab. The droppings of twelve cows are collected and fed into a 50-cubic-metre biogas plant that generates methane. This methane is then mixed with diesel in a 70-30 ratio and fed into a power generator producing 10 kilowatts of power – enough to run 15–16 computers for eight hours daily. Six shared UPS systems provide a 30-minute power backup. Nothing goes to waste in this system. After the methane is extracted, the remaining sludge is removed from the biogas plant to provide fertilizer for the crops the college raises to feed its staff and students. The biogas processor, the dairy cattle, cowshed and 10-kilowatt generator cost a total of about C HAPTER 3 USD 18,120. The biogas system was built in late 2001, and the computers arrived at KTTC 2002. Apart from powering computers, the college also wants to use methane for cooking. Currently, the college consumes several tons of timber every year to cook food for its students. Replacing timber with methane would be more ecologically friendly, and the cooks would also be spared the harmful effects of wood smoke. To do this, the college plans to increase the capacity of the biogas plant from 50 cubic metres to 200 cubic metres. To provide manure for the increased capacity, the college would have to maintain 40–50 cows. The additional meth- 47 Trends in Telecommunication Reform 2006 Figure 3.13: The Mtabila Camp VSAT and PV Systems Mtabila camp VSAT and PV systems (top); refugees waiting outside the computer lab (bottom left); and inside the computer lab (bottom right). Source: Michael L. Best ane generated would fuel a 30-kilowatt generator and allow for a 100-per cent methane-powered system. The Swedish International Development Agency (SIDA) is considering funding the expansion. It would like to replicate the biogas system at 30 teacher training schools in Tanzania and perhaps 3,000 secondary schools. The organization is also funding a micro-hydro power project in Kasulu where, along with a power micro-grid, fibre optic cables will also be strung. The fibre optic cables will be connected to the Internet through VSATs and used for networking NGOs, schools and clinics. 3.5.2 Tanzania: The Mtabila Refugee Camp More than 50,000 Burundian refugees stay at the Mtabila refugee camp, where conditions at the camp are bleak and there is very little work to occupy the residents. The refugees often live in simple houses and survive mostly on food provided by the World Food Programme (WFP). Most of the adults at the camp are women,17 although the camp also has a significant adolescent population that faces an uncertain future. With no telephone service in the camp, the 10 computers installed at the Mtabila Internet Centre are the refugees’ main connection to the outside world. When the centre is open to the general public there is often a long wait for Internet access. Every day, a clientele of about 30 refugees use the centre to send email, at a charge of approximately USD 0.20 (20 cents) per session.18 The Internet has reduced the refugees’ sense of isolation and enabled them to communicate with the outside world at a cost that is cheaper than the postal service. News and information downloaded from the web also help the refu- 48 gees stay abreast of world events. The refugees also learn to access websites, including those in the Kirundi and Kiswahili languages. The Internet Centre is equipping refugees with skills they can use to help reconstruct Burundi. The Kasulu Online19 website reports that some 2,000 refugees have received higher education, directly benefiting from Internet access. Other refugees benefit through intermediated access, as others pass on current events to them and help them establish contact with friends and relatives who have email. Ten teachers, selected by the refugee community, are undergoing training for the International Computer Driving License (ICDL) at the camp. These same individuals also supervise the centre. The big surprise for these teachers, as well as camp administrators, has been the demand for email. Many of the refugees have friends and family scattered throughout Africa, Europe and North America, and email is an affordable way to keep in touch with their community.20 Broadband Internet access is provided through a VSAT terminal, with the electrical power generated using photovoltaic cells. The system’s setup cost approximately USD 37,152. It consists of 48 solar panels, generating 75 watts each. Solar power was chosen over biogas in this case, because solar eliminated dependence on fuel supplies and spare parts that a generator-powered system would entail. Setting up the centres was a demanding task because of the poor quality of the telephone lines, which could barely support email transmissions. Also, there were delays in importing essential equipment and challenges in dealing with relations among various governmental, international and non-govern- C HAPTER 3 Trends in Telecommunication Reform 2006 mental agencies involved in the project. Despite these hurdles, the project was beginning to deliver the intended benefits, as can be seen from a refugee’s email from the Mtabila camp: “I’m not able to tell you how happy we are to get connection to the Internet! Before I was connected to the Internet I felt lost. But now that I am connected, I feel saved. The world will not forget us now, because we, the refugees, can speak to the outside.”21 3.6 Conclusion This chapter has surveyed the development paths of three important families of broadband access technologies: wire-line services, broadband wireless access, and non-terrestrial broadband wireless systems. All three of these families of systems can provide optimal choices in various circumstances. In densely populated, high-income areas, a variety of these systems will converge, compete, or complement each other. In other settings – those with limited numbers of potential broadband subscribers – single network systems are likely to prevail in isolation. And in cases where the density of potential subscribers is lowest, various wireless broadband solutions are likely to be the most cost-effective. These sets of technologies can be placed on a continuum, based on the density of high-value subscribers. With densities of 40 people per square kilometre and above, wire-line solutions are likely to be cost-effective. As density declines to just a few people per square kilometre, fixed wireless solutions, such as WiMAX, are more optimal. Broadband deployment does not depend solely on technological choices. Capacity building to develop local human C HAPTER 3 resources is vital. Education and training – including practical showcases and pilot programmes – are equally important in the quest to promote broadband access. Governments can further organize open regional, national and local forums dedicated to identifying and meeting the broadband needs of all key stakeholders, including: • End users (both current and potential); • National and local development programmes on healthcare, education and e-government; • Public sector institutions such as universities, libraries and local and national government offices; • Local entrepreneurs; • Traditional telecommunication operators; • System manufacturers; and • Owners of fibre infrastructure from other sectors, such as transport and utility companies. Together, these stakeholders can strive to meet their broadband requirements and achieve the UN Millennium Development goals. Once broadband needs are identified, they can be met through the development of open market-based networks, fostered through effective regulatory practices. Broadband deployment in rural areas of developing countries is likely to be fuelled both by civil society, including a range of public service actors, and the private sector, including local entrepreneurs that are building sustainable businesses. What is needed are regulatory frameworks designed to lower business risks and open markets to a full range of potential broadband providers. These key issues are addressed in the next chapter, which discusses the role of regulators in providing an environment that promotes broadband deployment. 49 Trends in Telecommunication Reform 2006 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 See http://standards.ieee.org/getieee802/portfolio.html for more information about the IEEE802 standard. In Sweden, apartment house companies own their own fibre networks to serve the tenants in their buildings. These networks connect to a point of presence of all operators at a metropolitan area hub. In a departure from the fibre to the home model, they outsource the link level of their fibre from the home networks to serviceproviders serving their tenants. See: http://www.itu.int/ITU-D/treg/publications/AfricaIXPRep.pdf See http://grouper.ieee.org/groups/bop/ for further information about P1675 from the IEEE). See http://www.iec.ch/tctools/dashbd-e.htm for further information about the working groups with the CISPR. For further information about this process, please see http://www.iec.org/online/tutorials/acrobat/opt_net.pdf. See http://www.iec.org/online/tutorials/sdh/ for more information about SONET. Commercial acceptance has been disappointing on these systems and it is thought that ArrayComm intends to abandon this technology in order to focus on WiMAX based systems. ITU Internet Reports: The Portable Internet, 2004, see http://www.itu.int/publications/bookshop Portable Internet. “Cow pats fuel computers” BBC Online. See http://news.bbc.co.uk/2/hi/technology/2957488.stm See http://www.tanzania.go.tz/census/districts/kasulu.htm See http://www.kasuluonline.or.tz/ See http://www.global-catalyst.org/ See http://www.schoolsonline.org/whoweare/index.htm See http://www.schoolsonline.org/whatwedo/update_sep_2002.htm “Rape at the end of the world.” See http://www.unfpa.org/focus/tanzania/rape.htm “Cow pats fuel computers” BBC Online. See http://news.bbc.co.uk/2/hi/technology/2957488.stm See http://www.kasuluonline.or.tz/ “Tanzanian refugee camp gets wired for Internet” See http://hrea.org/lists/huridocs-tech/markup/msg00932.html “Start. Succeed (or Not). Repeat.” Los Angeles Times. See http://www.latimes.com 50 C HAPTER 3 Trends in Telecommunication Reform 2006 4 THE ROLE OF THE REGULATOR IN BROADBAND DEVELOPMENT Authors: Yang-Soon Lee, Dr. William Bratton & Wu Wei Shi, Spectrum Strategy Consultants and Susan Schorr, ITU/BDT 4.1 Introduction Previous chapters have explored the promising landscape of new broadband opportunities that is emerging as waves of innovation reshape the ICT sector. These innovations are occurring across all aspects of the industry, from technological developments and business models to regulatory and policy frameworks, creating broadband opportunities for end users, large-scale network operators, small entrepreneurs, local communities and governments alike.1 New broadband opportunities require a new vision by potential broadband providers, and a new paradigm for policy-makers and regulators. Broadband is completely transforming the ICT sector. Put simply, broadband cannot be treated as “business as usual.” Network operators that fail to join the broadband world risk being left behind. The reality is, however, that deployment of broadband access technologies in developing countries is often constrained by a lack of telecommunication infrastructure – especially backbone networks – and by large-scale network operators’ concerns about potential revenue generation. Larger commercial operators are often discouraged from providing broadband access in marginal areas because of the high costs of deploying networks and the fear that retail charges may be too high, relative to disposable incomes, to result in large-scale take-up.2 Meanwhile, potential broadband market entrants are often kept out of the market by regulatory frameworks designed for another era. A new, pro-broadband regulatory paradigm will harness the power of all potential broadband providers, tailoring the regulatory framework as needed. This pro-broadband regulatory paradigm will expand on the existing regulatory practices developed after the revolutionary advent of the internet. Broadband technologies now allow discussions about the internet to be taken to a higher level, because they accelerate download speeds and provide extended mobility. In response, regulators will seek to spur competition at all levels of the broadband value chain, from the link and transport infrastructure layers to the content required to fuel demand and the computers needed to access broadband services and applications. This will require regulators to take a comprehensive and coordinated approach, as identified by the world community of regulators participating in the 2004 ITU Global Symposium for Regulators (See Box 4.1). C HAPTER 4 The new broadband regulatory paradigm will paradoxically require regulators to do both more and less than “regulation as usual.” Regulators will do more in making potential broadband providers – such as local communities and non-governmental organizations – aware of the technologies and applications they could provide. Regulators will also coordinate more actively with other government agencies and public institutions (such as universities) to drive the demand for health, education and government services that employ broadband technologies and applications. Meanwhile, regulators will do less by dismantling outdated regulatory frameworks that restrict market participation. A successful, comprehensive policy framework in a developing country with major challenges in rural connectivity can not only foster greater investment by large scale-operators, it can encourage public institutions and smaller market players to deploy broadband networks to suit their own operational or commercial objectives. As highlighted in Chapters 2 and 3, many broadband technologies can be deployed incrementally, without large-scale, nationwide deployment plans. The ability to deploy broadband on an incremental basis allows local communities and development project managers to include broadband capabilities in multiple projects. Similarly, small and micro entrepreneurs can launch new businesses based on broadband access. The key is for regulators to determine how to minimize any obstacles to incremental deployment, which may include: • Prohibitive pricing for interconnection with incumbent operators; • High costs to access existing infrastructure or resources from parallel utility sectors (i.e., energy or transport utilities); and • Extensive and onerous licensing processes. Once small-scale market entrants can establish demand for broadband services, larger operators are more likely to see the benefits of market entry, themselves. If need be, their interest can be further awakened through appropriate rewards schemes, such as tax exemptions or targeted subsidies from universal service funds. It is also important to highlight programmes and content that may drive initial broadband take-up in areas where it has 51 Trends in Telecommunication Reform 2006 Box 4.1: GSR 2004 Best Practice Guidelines Regulators meeting at the 2004 Global Symposium for Regulators, held 8-10 December, 2004 in Geneva, approved a set of “best practice” guidelines for regulators to promote the development of low-cost, easily accessible broadband networks and applications. The full text of the document is as follows: “We, the regulators participating in the 2004 Global Symposium for Regulators, have identified and proposed best practice guidelines to achieve low cost broadband and internet connectivity. Our goal is the creation of national regulatory frameworks that are flexible and enable competition between various service providers using multiple transport and technology options. We believe the best practices outlined below will help bring social and economic benefits to the world’s citizens. An enabling regulatory regime that encourages broadband deployment and internet connectivity 1) We encourage political support at the highest government levels with such support expressed in national or regional policy goals. These include an effective regulator separated from the operator and insulated from political interference, a transparent regulatory process, and adoption and enforcement of clear rules. 2) We believe that competition in as many areas of the value chain as possible provides the strongest basis for ensuring maximum innovation in products and prices and for driving efficiency. 3) We encourage regulators to set policies to stimulate competition among various technologies and industry segments that will lead to the development and deployment of broadband capacity. This includes addressing barriers or bottlenecks that may exist with regard to access to essential facilities on a non-discriminatory basis. 4) We believe that the primary objective of regulation should be to secure fair and reasonable access for competitive broadband services, including internet connectivity. 5) We encourage the maintenance of transparent, non-discriminatory market policies in order to attract investment. 6) We encourage regulators to adopt policies that are technology neutral and do not favor one technology over another. 7) We encourage regulators to take into consideration the convergence of platforms and services and that they regularly reassess regulatory regimes to ensure consistency and to eliminate unfair market advantages or unnecessary regulatory burdens. 8) We encourage regulators to allocate adequate spectrum to facilitate the use of modern, cost effective broadband radiocommunications technologies. We further encourage innovative approaches to managing the spectrum resource such as the ability to share spectrum or allocating on a license-exempt non-interference basis. 9) We urge regulators to conduct periodic public consultations with stakeholders to inform the regulatory decision-making process. 10) We recommend that regulators carefully consider how to minimize licensing hurdles. 11) We encourage the development of a regulatory framework that permits ISPs and broadband providers to set up their own last mile. 12) We encourage regulators to provide a clear regulatory strategy for the private sector in order to reduce uncertainty and risk, and remove any disincentives to investment. Innovative Regulatory Policies Must Be Developed To Promote Universal Access 1) We recommend that the promotion of access to low cost broadband interconnectivity should be integrated from “grassroots” efforts to identify local needs all the way through the “tree-tops” of international law. Governments, business and non-governmental organizations should be involved. 2) We recommend that regulators adopt regulatory frameworks that support applications such as e-education and e-government. 3) We encourage each country to adopt policies to increase access to the internet and broadband services based on their own market structure and that such policies reflect diversity in culture, language and social interests. 4) We encourage regulators to work with stakeholders to expand coverage and use of broadband through multi-stakeholder partnerships. In addition, complementary government initiatives that promote financially sustainable programmes may also be appropriate, especially in filling in the market gap that may exist in some countries. 5) We encourage regulators to adopt regulatory regimes that facilitate the use of all transport mechanisms, whether wireline, power line, cable, wireless, including wi-fi, or satellite. 6) We encourage regulators to explore programmes that encourage public access to broadband and internet services to schools, libraries and other community centres. 7) We encourage regulators to implement harmonized spectrum allocations consistent with the outcome of ITU Radiocommunication Conference process and each country’s national interest. Participation in this well-established framework will facilitate low-cost deployment of equipment internationally and promote low-cost broadband and internet connectivity through economies of scale and competition among broadband vendors and service providers. 52 C HAPTER 4 Trends in Telecommunication Reform 2006 Box 4.1: GSR 2004 Best Practice Guidelines Broadband is an Enabler 1) Regulation should be directed at improving the long term interests of citizens. Broadband can contribute to this by improving and enabling education, information, and increased efficiency. It can reduce costs, overcome distance, open up markets, enhance understanding and create employment. 2) We encourage regulators to educate and inform consumers about the services that are available to them and how to utilize them so that the entire population benefits. 3) We urge regulators to work with other government entities, industry, consumer groups, and other stakeholders to ensure consumers have access to the information they need about broadband and internet services.” See: http://www.itu.int/ITU-D/treg been absent. In developing countries, governments are often the largest ICT users. Governments can launch top-down egovernment initiatives to induce citizens to get online, where they can avoid bureaucratic appointments, queues and paperwork and save on travel costs. E-government services also help the government itself by developing ICT capacity to interface with the citizenry en masse. But e-government applications will only drive broadband take-up if the public accepts them as useful. Once demand is proven, commercial broadband providers will respond with entertainment content designed and priced for developing-country users. In short, promoting broadband access and services in urban and rural areas of developing countries requires a new vision characterized by reduced regulatory burdens and an environment of innovation, collaboration and creativity. 4.1.1 A Look Back Ten years ago, the predominant model for providing telecommunications involved a state-owned incumbent operator deploying a fixed-line public switched telephone network (PSTN). Since then, that model has given way to alternative competitive network platforms such as cable television, fibre optic, satellite, second generation (2G) mobile cellular, and more recently, 3G and broadband wireless – all enabled by new technologies. Most telecommunication networks have been provided on a nationwide, or at least regional, basis.3 Today, most large-scale networks are in private hands, meaning they must be profitable to operate. Even the majority of PSTNs today have been at least partially privatized.4 The business model adopted by large-scale network operators requires significant infrastructure investment and high subscriber revenues to remain financially viable. Most national regulatory frameworks were designed for such large-scale network operators and service providers. What has this first wave of sector reforms achieved? The short answer is: a lot. Telephone access has quadrupled since 1990, from 10 per cent to 40 per cent of the world’s population. By the end of 2004, there were an estimated 1.19 billion fixed telephone lines in operation around the world and 1.8 billion mobile subscribers. The rise in mobile subscribers is phenomenal, and more than 50 per cent of mobile subscribers today are in developing countries.5 Still, many of these users C HAPTER 4 are located in urban areas. The challenge for regulators today is to build on this urban mobile growth to provide an enabling environment to bring both voice and broadband internet services to rural areas. The stage is now set for such a rural renaissance. An entirely new player has appeared on the scene: the community broadband provider, largely enabled by low-cost broadband wireless technologies. Local community initiatives are starting to provide broadband services to users in remote areas not served by large-scale networks. These small-scale broadband providers range from public institutions such as libraries, educational institutions, health facilities and local governments, to non-governmental organizations and small and micro entrepreneurs that can be profitable at margins of only a few dollars a day. Whether private or public, all community broadband providers are concerned with costs. The lower the costs of providing broadband services and applications, the greater the opportunity for community initiatives to succeed in bringing ICTs to rural users. Keeping regulatory costs down will give these local initiatives a better chance of success. 4.1.2 A Look Ahead A new regulatory framework, tailored to the unique circumstances of local community initiatives, may be needed to help small-scale broadband providers foster growth in rural areas. This chapter explores options for such a new regulatory framework. Meanwhile, the regulatory framework designed for largescale network operators is also evolving to provide greater incentives to deploy broadband access networks in rural areas. This chapter takes a hard-nosed look at the commercial realities of major operators. Commercial operators are profit-driven and cannot be expected to provide services that do not yield profits. Where regulators are unable to induce large operators to build broadband networks in rural areas, either through financial incentives or build-out requirements, they can focus efforts on developing new pools of potential broadband users. This new source of demand will then give major operators incentives to extend their networks out to these new markets, offering internet backhaul and interconnection with urban networks. This chapter first identifies the importance of broadband and the potential positive impacts that access to broadband technologies can provide, before discussing the key issues 53 Trends in Telecommunication Reform 2006 associated with such deployment in developing countries. The chapter then highlights the role of competition in accelerating the deployment of supporting networks and reaches some conclusions about the appropriate regulatory framework to create a conducive environment for deploying broadband networks. The chapter will conclude by identifying other potential policy measures regulators can undertake to support the deployment and take-up of broadband access technologies. 4.2 The Importance of Broadband in Developing Countries The deployment of broadband access technologies delivers several positive impacts in developing countries. These include: • Eroding information differentials resulting from geographical constraints that prevent marginal communities from participating in regional, national or international processes. These processes may be social (for example, relating to education or health), political, economic or financial. Residents of rural areas, for example, need access to financial information and advice, as well as information about markets (both as buyers and sellers). Broadband technologies, therefore, can facilitate the integration of marginal communities into wider processes beyond the geographical limitations of their specific areas. • Access to regional, national and international resources through broadband access technologies can substantially improve the living standards of marginal communities. For example, improving accessibility to e-health systems that allow remote diagnoses and treatment is particularly useful in marginal areas, where access to medical equipment and expertise would otherwise be limited. Similarly, broadband access technologies can be used to provide remote education and training services (for example, the African Virtual University6 and, at a more advanced level, Universitas 21).7 The provision of such access can have a significant positive impact on living standards. • Broadband access technologies can enhance the sustainability of marginal communities by supporting the transfer of knowledge and expertise to marginal communities. Rural doctors can receive regular training via e-health systems, allowing them to stay in their communities rather than leaving, either temporarily (for training) or permanently (for professional growth and improved fortunes). Online training also brings to the community the latest medical techniques and treatment options. Similarly, broadband access technologies can enable the transfer of agricultural knowledge, improving productivity and limiting soil exhaustion and desiccation from unsustainable farming techniques. 54 • Improved information flows from broadband access technologies can increase the range of market opportunities available to marginal communities. Farmers need not be limited to local buyers. They can use broadband technologies to access geographically remote markets, including auctions. This benefit is particularly pronounced for perishable agricultural products where the use of online markets lets producers establish contacts with a wider range of potential buyers across larger geographies, boosting prices and maximizing rural incomes; • Broadband technologies can improve business productivity in developing countries. Access to greater information sources, e-mail and other supported services (VoIP, for example) allow businesses to lower their business costs and improve their revenue-generating potential. In India, for example, widespread broadband deployment is expected to increase labour productivity by 11 per cent, leading to direct employment of 1.8 million and total employment of 62 million by 2020.8 • The deployment of broadband access technologies may support the growth of regional and national IT industries. This growth can impact positively on GDP growth. For instance, in Korea (Rep.), broadband deployment has significantly underpinned the IT sector, which accounted for approximately 50 per cent of the GDP growth rate in 2002.9 The Confederation of Indian Industry’s National Broadband Economy Committee estimates that broadband will contribute USD 90 billion to the Indian economy between 2010 and 2020.10 Specific examples of how the deployment and take-up of broadband access technologies has benefited marginal communities and developing countries are illustrated in Box 4.2. There is no doubt that broadband access technologies can provide substantial benefits to end users in developing countries and marginal communities. But the services provided over the networks must be sufficiently targeted to offer end users real benefits. In addition to regulations that aim to create a competitive broadband market providing universal and equitable broadband access, governments are also focusing on developing policies to include local communities in the design and implementation of broadband initiatives. 4.3 Key Issues in Promoting Broadband in Developing Countries Given the potential economic and social benefits of broadband access technologies, there is a clear need to develop ways to boost the relatively low levels of broadband take-up in many developing countries. The fundamental problem is that there is an array of constraints to take-up in these countries, and they affect all the components of the value chain (See Figure 4.1). There are impediments in the supply of online content, as well as the supply of broadband services and products. There are also barriers to widespread connectivity. Finally, there currently is limited demand for broadband in many developing countries. C HAPTER 4 Trends in Telecommunication Reform 2006 Box 4.2: The Impact of Broadband Access – Examples in Developing Countries In the Reserva Ecologica do Xixuanú of Brazil’s Amazon region, a telemedicine project has been launched to transmit medical information from local communities, via satellite, to the United States for remote diagnosis. Rural villages in Bhutan that were previously not connected by traditional telephone service are now provided with inexpensive basic voice telephone access using wireless broadband technologies. In China, students in rural villages are able to participate in distance-learning courses set up by major Beijing universities, using VSAT broadband satellite access. In a small, remote town in the mountainous region of northeastern Ecuador, Wi-Fi technology has enabled the mayor to access online government databases. In addition, broadband access is used to promote ecotourism in the area and to help local businesses (SMEs or “small and medium enterprises”) become more competitive. In Laos, WLAN networks have been rolled out to villages, allowing people to make local and international VoIP calls, significantly improving their connectivity. Other activities made possible by the WLANs include accounting, letter writing and e-mails, as well as support of local business activities. In South Africa, institutions are connected to international institutions using broadband technologies, to advance cooperation in various research and development initiatives. In Uganda, rural schools can gain access to educational tools via broadband access. Recognizing the benefits of broadband for the agricultural sector, the government in India has announced plans to set up a network of computer kiosks in 25,000 villages. The goal is to help farmers sell their produce to the highest-paying customers. The national rollout is due to be completed in 2007. Figure 4.1: A Simplified Broadband Value Chain Limited consumer demand, however, is likely related to a lack of consumer awareness of the potential benefits of broadband. Once more broadband networks are deployed, it is quite possible that consumer demand (in terms of content and volume) in the developing world will not be so different from demand in the developed world. The main difference may remain in the rates that consumers are able to pay, and the portion of their disposable incomes they are willing to allocate to broadband services and content. In terms of supply, the key constraints to deployment of broadband services and products in developing countries are: • Insufficient compelling content, especially in local languages and with specific reference to local circumstances or issues; • Lack of understanding about the benefits of broadband; • Little or no incentive for fixed-line incumbents to offer broadband access technologies (particularly if they risk C HAPTER 4 cannibalizing PSTN and ISDN revenue streams) in the absence of market competition; • Competing demands for investment of operators’ capital (in developing countries operators often believe they can generate a better return on capital by deploying mobile networks than additional fixed-line or broadband networks); • Lack of market competition to encourage operators to develop and commercially deploy broadband services; and • Lack of a regulatory framework designed to encourage broadband deployment by large-scale incumbents, or to sponsor market entry by potential broadband competitors, which might include public institutions (e.g., universities) or local, community-based providers. 55 Trends in Telecommunication Reform 2006 In terms of connectivity, the key constraints to take-up are: • Lack of hosting/storage facilities within many developing countries, a situation that requires much content to be stored overseas, straining international connectivity; • Limited international connectivity, which impacts on the data rates available, the quality of the service and the cost of bandwidth; • Lack of backbone connectivity in many areas – and where backbone networks do exist, they are owned by incumbents that control the costs and quality of leased lines available to competitors; and • Concern on the part of large-scale network operators over the commercial viability of deploying broadband networks in rural or remote areas, where the costs of network operation and service provision may threaten to make services unaffordable for consumers. In terms of demand, the key constraints in developing countries are: • Lack of consumer demand, resulting from limited consumer purchasing power; • Lack of consumer awareness (which is linked to pricing and low purchasing power), coupled with a lack of coordination by key stakeholders (i.e., universities, public institutions and local communities) that could drive further awareness and demand; • Excessive pricing of broadband products and services, especially when compared with average incomes; • Greater priority placed on mobile voice communications than data services; and • Limited availability of affordable end-user terminals. Deploying broadband access networks only makes sense if potential users have the computers or handsets with which to access them. Many of these factors, of course, are not unique to developing countries. But they are more daunting than in developed countries, where consumers are more likely to be able to afford broadband services and products at price points that more accurately reflect the underlying costs of providing them. Similarly, the relatively low penetration rate of personal computers (PCs) in developing countries significantly weakens the demand for broadband access. PC penetration is an issue of affordability, but also a factor of electricity provision, since it is impractical to use a personal computer where there is no electricity to power it. Innovation and competition in developed countries, however, are pushing manufacturers and engineers to develop very low-cost, simple devices that can be tailored for applications and content in developing country contexts. This may reflect the development of a niche market for low-priced, narrowly functioning equipment, as manufacturers consider how to cater to untapped markets. Considering the supply, connectivity and demand factors that limit broadband take-up in many areas of developing countries, regulators have an important role in minimizing the impact of these factors or developing appropriate solutions. 56 4.4 Providing Incentives for Network Investment In developed countries, relatively high levels of teledensity allow for a greater focus on the promotion of service-based competition. The primary role of most regulators in developing countries, however, is to create an environment conducive for network investment where little or no telecommunication infrastructure exists. But before confidently committing themselves to network investment, operators look for government regulatory approaches that are consistent and not arbitrary. This is especially true for broadband access technologies, which are often capital-intensive and – in developing countries – considered a more risky investment. Therefore, any regulatory framework (and this includes the track record on enforcement) that creates uncertainty or the risk of financial loss will deter market entry and subsequent network investment. Regulatory agencies that fail to provide consistency risk deterring investment, thereby constraining the development of their telecommunication networks, including broadband ones. Within this context, there are several steps a regulator can take to promote the deployment and take-up of broadband networks. These are detailed in the following subsections. 4.4.1 New Entry and Market Liberalization Market liberalization remains the most effective mechanism to encourage greater investment in telecommunication networks. Experience shows that liberalization through the licensing or authorization of new operators will yield greater benefits than incentive- or obligation-driven approaches targeted at only a monopoly or duopoly. The absence of liberalization, meanwhile, removes a significant incentive for an incumbent to invest in networks, new services or quality of service (QoS). Historical precedent in countries such as Brazil, Hungary, and India demonstrates that both incumbents and new entrants invest more when faced with market competition. It is clear, however, that after market liberalization, the incumbents in many developing countries continue to be in a position to invest significantly more in network deployment than are new entrants, especially in marginal areas. So the incumbent can often be the most important (and often the largest) source of funds for telecommunications investment in the longer term. Given this, a number of commentators have argued that excessive market competition may reduce the incentive for incumbents to continue large-scale investment. This may be particularly the case where tariff re-balancing has not been fully undertaken and new entry results in rapid margin erosion for incumbents in the more lucrative long distance and international markets. This may result in a deterioration in the incumbent’s financial performance (and stock valuation), reducing its capability and willingness to undertake new network investment or diversify into new lines of business. Regulatory frameworks, then, should not unduly impact network investment and the diversity of new lines of potential business. C HAPTER 4 Trends in Telecommunication Reform 2006 Box 4.3: Regulatory Methods To Boost Deployment Regulatory frameworks, tailored to the unique circumstances of local community initiatives, can encourage small-scale broadband providers to provide broadband access in rural areas. An incentive-based regulatory framework using targeted grants or tax exemptions can encourage both large and small-scale network operators to deploy broadband networks in rural areas. Where financially viable, broadband deployment requirements can be made part of the licensing commitments required from new market entrants. Governments can also promote the development of sufficient supporting network infrastructure to enable the provision of broadband services (e.g. backbone connectivity). They can also drive initiatives (e.g., e-government programmes) that provide an important source of demand for broadband facilities and services. Because of the costs of network deployment – especially of broadband access technologies – there have been some suggestions that network “over-building” (duplication) could be avoided by creating a “super” network operator that would provide wholesale network access to retail service providers. In effect, this would amount to a transition to service-based competition rather than network-based competition. This idea often appeals to policy-makers in developing countries, because of their concerns about the availability of investment funds. But implementation raises significant competitive concerns. Incumbent operators tend to advance the argument for “super operator” status in an attempt to limit competition. “Super” network status allows incumbents to retain complete control over infrastructure and, by extension, over the development of competition. In both developing and developed countries, incumbents have proven remarkably effective at controlling access to their infrastructure even when the regulator is relatively strong. It is unlikely, therefore, that a “super” network scheme would be effective in the absence of a very strong regulator that could ensure that service providers have equitable access to the network. One alternative is for governments to fund the construction of such comprehensive networks directly, and to oversee access to them by both incumbents and new service providers. Such an approach has been used successfully in Singapore, where the government in 1997 funded the rollout of SINGAPORE ONE, a broadband backbone network accessible by the incumbent and new operators, including the cable TV operator. Of course, not all governments have the resources to build such broadband backbone networks – particularly nationwide. A more practical alternative, therefore, may be offered by infrastructure sharing. For example, allowing mobile operators to roam onto each other’s 2G and 3G networks in rural areas would save significant network costs while enabling greater network coverage. In fact, competitors have even started sharing the bulk of their wireless access network facilities in nonrural areas; one example is Telstra’s and Hutchison’s shared 3G network in Australia. Similarly, France has allowed infrastructure sharing among 2G operators in order to reach unserved rural areas known as zones blanches. Such roaming and infrastructure-sharing arrangements could also apply to new broadband wireless networks. C HAPTER 4 Fibre backbone networks are scarce in most developing countries, making broadband deployment more challenging. Fibre backbones can boost the capacity of DSL networks. Extending fibre closer to rural areas can also facilitate internet backhaul for wireless broadband technologies. Again, rather than resorting to a “super” fibre backbone operator, regulators can promote synergies between different kinds of utilities or projects that employ internal communications links. Energy and transport infrastructure projects, such as electrical plants, highways, railways and pipelines, could be encouraged to deploy fibre as part of their projects. Telecommunication operators could then access these fibre facilities to augment their networks. Regulators could also provide incentives, such as tax breaks, for 2G mobile operators to build their own backbones using fibre, instead of the more commonly used microwave links. The regulatory framework could allow owners of such communication resources to lease unused capacity to others for commercial deployment. In addition, countries are introducing new regulatory tools to encourage network investment by smaller market players. Ireland, for example, has found that rather than imposing national broadband rollout and coverage obligations on large-scale operators, it can achieve greater success by allowing wireless broadband providers to enter small local service areas. Ireland’s practice of licensing small local service areas--defined as a 15-kilometre radius around a base station—has led to a significant rise in new broadband subscribers in non-urban areas.11 Encouraging competitive market entry is part of a larger package to promote broadband deployment by a full range of potential broadband providers. Additional elements of this larger package are explored below. 4.4.2 The Role of Foreign Ownership New market entry and subsequent investment, including in broadband access networks, is likely to be supported if there are no restrictions on foreign ownership of licensees. This is particularly true in developing countries, where capital availability may be limited. Foreign ownership brings the possibility of incremental capital funding, as well as managerial expertise and international best practices. Increasingly, governments and 57 Trends in Telecommunication Reform 2006 regulators seek to attract foreign ownership, rather than restrict it on the premises of national security, cultural protection and domestic economic development (although these often remain concerns for policy-makers). • Have an efficient administrative process that is transparent and consistently applied, together with minimal administrative requirements; • Ensure that any terms and conditions included in licences are not financially punitive and allow operators to achieve sufficient financial return over the life cycle of their investments; • Ensure that licensing fees are commensurate with the required activities of the licensee – that is, if the licensee is expected to deploy substantial broadband access infrastructure, fees should be reduced to reflect this high level of investment, rather than treating operators as “cash cows” to be milked for government revenues; • Require regulators to establish and enforce appropriate monitoring mechanisms to ensure that licensees meet their commitments or specific conditions of license agreements; • Recognize that re-negotiating licence commitments increases the risk associated with network investment to promote broadband access deployment and take-up. There are persuasive reasons to facilitate and support partial and even full foreign ownership of new entrants in many circumstances. These reasons include: • There is an international trend to ease foreign-ownership restrictions, partially encouraged by World Trade Organization (“WTO”) agreements, but also driven by increasing recognition of the substantial benefits that foreign ownership provides; • It is possible to address investment requirements through licence commitments, ensuring that these are not so high as to lead to excess capacity; and • Foreign investors are more likely to see greater investment risks in situations where they lack managerial and operational control. Greater financial ownership is likely to be associated with greater managerial control and, by extension, enhanced company performance. In addition, there are increasing examples of foreign ownership of new entrants that result in substantially improved telecommunication infrastructure. Foreign ownership will not, per se, result in greater broadband access network deployment. But it may support such deployment through greater access to capital, more managerial experience and, potentially, lower unit costs. Besides allowing foreign ownership, governments can also tap into global capital markets themselves and tap international lending agencies for funds to improve and upgrade their telecommunication networks. This is much less difficult than ever before, because it has been proven decisively that operating telecommunication networks – when they are properly deployed and managed – is a commercially lucrative business. 4.5 Broadband Licensing Regulators can often affect the rate and prevalence of broadband network build-outs through their licensing provisions. In general, regulators are experimenting with new licensing frameworks, often eliminating operator-specific conditions in favour of generally applied regulatory codes. Licensing frameworks can also be employed to provide incentives or direct mandates for network deployment. 4.5.1 Consistent Licensing and Authorization Frameworks The deployment of broadband can be expedited through relaxing the licensing conditions for large-scale broadband access providers and by establishing a consistent licensing framework that is clearly targeted to achieve a set of defined policy objectives. In addition, regulators are increasingly using general authorizations in lieu of onerous licensing regulations to ease market entry.12 Where licences are distributed, it is important to: 58 While licences, or at least general authorizations, are usually required for large-scale broadband infrastructure operators, regulators are increasingly lightening such requirements for operators and service providers in small, rural areas. Facilitating broadband market entry in these areas allows broadband providers to test their broadband business cases on a small scale. Some small-scale broadband providers may later decide to commit to more large-scale deployment. Thus, regulators can replace licensing requirements for commercial community broadband providers by a general authorization or registration framework, just as some countries have already established “open entry” policies for internet service providers (ISPs). Where broadband access will be used exclusively for public services, such as in health facilities or libraries, regulators may question whether licensing should apply at all. It is also particularly important that licence fees for very small broadband providers be kept as low as possible, if not eliminated altogether. Licensing obligations that may apply to largescale operators, such as rollout and coverage obligations or contributions to universal access funds, can be minimized or eliminated in a regulatory framework targeted to community broadband providers. A case can also be made for allowing resale of broadband services without any licensing requirements in rural areas. For example, broadband subscribers in a rural area could be allowed to use their broadband connections to set up a public kiosk and resell the service. The customers of these kiosk services might not otherwise be able to afford service at all, at subscription or monthly rates. In this way, additional economic activity would be generated through increasing broadband access. It is important to note that reducing or eliminating licensing requirements is not synonymous with ceasing to regulate service providers. In some countries, for example, telecommunication licensing is not widely used as a regulatory instrument. Instead, regulatory rules are enacted through universally applicable regulatory codes, decisions or orders. Even with C HAPTER 4 Trends in Telecommunication Reform 2006 Box 4.4: Licensing Incentives for Network Deployment, selected examples Hungary In February 1994, Hungary was divided into 54 franchise areas for local telecommunication access. The incumbent and new entrants were invited to submit bids for each franchise area to act as the monopoly local access service provider until January 2002. The licence conditions required each operator to achieve annual growth in local access lines of 15.5 per cent, per year. By January 1997, licensees also had to fulfil 90 per cent of customer demand for new local access lines within six months. In 1993, teledensity was 14.5 per cent (14.5 per 100 inhabitants). This had increased to 26 per cent by year-end 1996 and to 36.1 per cent by year-end 2002. After 2002, all service providers with significant market power were required to provide local loop unbundling to other service providers, including new entrants (including a special Reference Interconnection Offer or RIO for unbundled local loops). Brazil Following the deregulation of the telecommunication sector in 1997, operators that met their universal service obligations were allowed to acquire additional licences, including mobile and long distance service authorizations. In early 2004, the regulator Anatel certified that Brasil Telecom had met its universal service targets. This allowed the operator to roll out mobile and long-distance services in addition to the local service it was already offering in the southeastern part of Brazil. Meanwhile, Brazil’s other two major landline operators, Tele Norte Leste and Spain’s Telefonica Internacional, had already met their targets and were offering wireless phone and long distance services in other regions by 2004. open-entry or simple notification policies, local commercial broadband providers could still be subject to government oversight in areas such as consumer protection and spam. Again, they could be treated like ISPs, which often come under general business regulation that applies to all commercial entities — or at least a certain group or “class” of companies. 4.5.2 Using Licensing To Encourage Broadband Deployment For example, the right to serve rural areas could be bundled with more lucrative locations in licence tenders.14 In addition, multiple services can be bundled under one licence or authorization. In 2005, for example, Brazil announced that it would issue licences enabling operators to offer the “triple play” of voice, internet and broadcast services. Such an incentive framework has been used to encourage network deployment in other countries, as well. For example, in Hungary, the incentive was possible extension of a licence period (See Box 4.4). Regulators can use licensing frameworks to provide incentives for network deployment by large-scale operators, especially in early stages of market liberalization. This often works particularly well with respect to the deployment of broadband access technologies.13 Along with incentives, regulators can also threaten to revoke licences if commitments are not met. There is, however, a natural tendency on the part of regulators not to revoke licences, especially if doing so would cause disruption to significant numbers of subscribers. The intent of this approach should be to encourage operators to deploy networks that may otherwise not be considered commercially viable or may create less value than other options. The incentives can either be rewards for meeting licence commitments or (where they can be enforced) financial penalties for failing to meet agreed commitments. Such licensing incentives could take several forms: • Extension of licence periods; • Access to other operators’ infrastructure; • Allowing the provision of other, more lucrative services under the same licence; • Access to universal access/service funds; • Reduced licence fees; • Tax incentives, including reduction of taxes and duties for both operators and end users; and • Financial penalties for failing to meet licence commitments. C HAPTER 4 Also, in addition to providing tax incentives such as tax “holidays” or tax concessions to operators, reducing the burden of taxes and duties on equipment can lower costs for end users, encouraging wider adoption and usage. A recent study commissioned by the GSM Association indicated that in many developing countries, up to 20 per cent of the total cost of mobile telephony stems from taxes and duties. Reducing or abolishing these would allow more people to afford services. To date, most incentive mechanisms have been applied only to traditional local telephony (PSTN) services, but there is no reason why they could not also be applied to encourage deployment of broadband access networks. For example, new entrants (or even existing operators) could be offered appropriate incentives to deploy all types of broadband access technologies, especially in rural areas. Given the relative success of such incentives for PSTN deployment, they could have a positive impact on broadband deployment, especially if they were available to all industry players. 59 Trends in Telecommunication Reform 2006 On the other hand, using exclusivity periods as an incentive mechanism poses the danger of “crowding out” potentially more efficient new entrants and new investment sources. As long as licensing frameworks are appropriate, market liberalization generally will yield greater benefits than the exclusivity approach (often coupled with build-out obligations) adopted in many markets – both developing and developed. 4.5.3 Technology Neutrality In principle, broadband regulation should be technologically neutral, and licensing and authorization regimes should reflect this. Increasingly, licensing focuses on generally encouraging the construction of – and investment in – broadband access networks, rather than defining the specific method of delivering broadband services. This principle is particularly relevant to spectrum licensing for broadband wireless services, but it also can apply to wire-line deployment, giving licensees the flexibility to use copper, fibre or hybrid networks. Technology- and service-neutral licences and authorizations also enable broadband providers to offer a full range of services (including the “triple play” of voice, internet and video) in rural areas, increasing revenue stream options. In Venezuela, for example, rural licences allow operators to offer mobile and multimedia services in addition to fixed access, long-distance and international services. India and Uganda have allowed operators to provide both fixed and mobile services under the same licence, leading to increased competition and subscribers as well as lower prices for consumers. Hong Kong, China is issuing unified licences for broadband wireless access providers, allowing them to adapt to technological developments. Today, the licences allow broadband wireless access providers to offer fixed services, but as BWA technology develops, the same licences can be used to offer mobile broadband wireless services, as well. Pure technology neutrality in licensing may be quite difficult to achieve. For example, some wireless technologies and services are specifically reliant on, and standardized for, certain radio frequencies. But regulators are increasingly providing licensees with the maximum flexibility possible to select which technologies they wish to adopt, within approved standards and international frameworks. Such flexibility may encourage broadband access deployment in marginal areas and developing countries by allowing licensees to select the delivery technology that most minimizes costs and accelerates financial return. Operators can customize the components of their network infrastructure to suit the particular service offerings and technical requirements of their business plans. This will allow them to leverage whatever existing economies of scale they have been able to achieve in other, possibly adjacent, markets. Such flexibility is a hallmark of India’s unified access service licensing framework, which gives operators a choice of using either GSM or CDMA within their assigned spectrum blocks (See Box 4.5). Some countries specify the use of particular technologies (often made by specific companies) as a tool for industry development or trade policy. But mandating use of a specific technology within a defined spectrum block – or for particular 60 kind of service – may not result in the most efficient allocation of spectrum or the most rapid deployment of that service. For example, if the required technology turns out not to be the optimal one, in terms of cost or supported functionality, market take-up is likely to be disappointing and spectrum usage will be limited. This does not imply, however, that technical standards or international radio frequency allocations are unimportant. Employing a common technical standard provides many advantages, including: • Economies of scale (both in terms of network and enduser equipment); • Commitments and support from large-scale vendors; • More consistent road maps for product evolution and development; • More inter-operability; • Reduced consumer switching costs; and • International roaming capabilities. Standards also provide agreed-upon best practices that can drive more efficient usage of spectrum and energy/power – two particularly important elements in resource-scarce areas. These advantages have often accelerated deployment of telecommunication services above and beyond what could have been expected if technologies had remained fragmented. Nevertheless, accepting the benefits of standards does not mean that regulators should specify which standards should be used in any specific spectrum allocation or service. Nor does it necessarily mean that regulators should limit operators’ technology selections to internationally standardized technologies. The regulatory framework could provide licensees with the flexibility to select the appropriate technology for their circumstances in order to encourage the deployment of broadband access infrastructure. There is, of course, the risk that licensees may choose to deploy non-standard, unique and proprietary technologies, but given the substantial benefits of internationally recognized technologies, this is unlikely in most cases. 4.6 Alternative Approaches to Broadband Deployment Regulators should not limit themselves to considering only current wire-line telephony and mobile network operators as potential broadband service providers. New market entrants can be allowed, and even encouraged, to enter the broadband sector, either by building or converting their existing infrastructures into broadband platforms, or by taking advantage of unbundling and infrastructure sharing. 4.6.1 Alternative Broadband Platforms Aside from broadband wireless and fixed-line networks of major telephony providers, there are other platforms that can be used to provide broadband voice and data transmission and internet access. As discussed in Chapters 2 and 3, cable TV systems, satellites and electrical power grids all offer current and potential alternatives. Cable modem technology has already demonstrated its role as a broadband access technology C HAPTER 4 Trends in Telecommunication Reform 2006 Box 4.5: Unified Licensing Frameworks, selected examples India In 2004, The Telecom Regulatory Authority of India (TRAI) established a unified licensing regime for local access networks, in response to an increasing overlap between GSM mobile services and CDMA “limited mobility” offerings. Now in its first phase, the Unified Access Service Licensing (UASL) framework covers all basic and cellular services. In the next phase, the government plans to implement a fully unified licensing regime covering all telecommunication services. This single-licence approach reduces the financial burden on operators, in terms of licence fees and registration charges, for offering multiple services. The UASL represents a significant lowering of entry barriers for new and smaller market players, potentially translating into lower prices for end-users.1 Nigeria In February 2005, the Nigerian Communications Commission proposed reviewing Nigeria’s telecommunications regulatory framework, with the goal of establishing a unified licensing regime. Under the new regime, new and existing fixed wireless and mobile licensees will be allowed to provide both fixed and mobile services, subject to geographical/regional limitations stated in their licences. With the removal of fixed-mobile differentiation, licensees will be free to offer voice, data or multimedia services as they deem fit, once spectrum is allocated.2 1 See ITU Trends 2004, Chapter 5. TRAI press release August 2004. http://www.trai.gov.in/Newpressrelease.pdf 2 The Nigerian Communications Commission, 2005. http://www.ncc.gov.ng/Headlines/REPORT%20ON%20POST%20EXCLUSIVITY.doc – in fact, it remains a major market leader in North America. Satellite broadband access remains limited, to date, but it nevertheless is considered a viable option for developing countries. Broadband over power line (BPL) is often discussed, although the extent of its viability has yet to be proven in developing countries, where electrical grid infrastructure may be as scarce as wire-line networks.. In more developed countries, a primary driver of broadband take-up is competition between telephony (PSTN) operators and cable system operators (for example, in Hong Kong, China; Korea (Rep.); the United Kingdom and the United States). In many of these countries, in fact, cable systems were the first movers in the broadband consumer market, prompting tardy incumbent telephone operators to respond with xDSL. Furthermore, in the absence of large-scale local loop unbundling access, the only substantial competitive threat to telephone operators still comes from operators of alternative access networks – primarily cable TV systems. Cable infrastructures are more limited in developing countries although they have been deployed in a number of upper middle-income economies (e.g. Hungary), some lower middle-income countries (e.g. Thailand) and even in some low-income economies (e.g. India). In these markets, however, cable is present mostly in urban areas and even there, mostly in higher-income neighbourhoods. Fundamentally, cable TV is perceived as a high-income market. It is also a relatively expensive technology to deploy, given the infrastructure requirements. Options for lowering costs (for example, using poles rather than burying lines) often expose systems to risks from theft or damage. In some countries, cable systems suffer from C HAPTER 4 poor QoS and are not robust enough to offer reliable broadband access. But this has not deterred some operators, where they have infrastructure in place, from offering cable modem services. Considering its lower cost structure, satellite broadband delivery has attracted attention, although market take-up remains limited. Satellite services are increasingly offered, however, in many developed countries, including Canada, Ireland, the United Kingdom and United States. Satellite operators such as Eutelsat, Hughes Network Systems and Shin Satellite have been aggressively promoting satellite broadband solutions. Box 4.6 provides examples of satellite broadband deployments in developing countries. The primary advantage of satellite service provision is that it avoids the high cost of terrestrial backbone infrastructure. Furthermore, the VSAT terminals required to access the satellite broadband service can use battery or solar power, eliminating the need for connection to the power grid. This allows rapid provision of broadband access to all areas of a country, assuming that the satellite footprint is sufficient and there is sufficient transponder capacity. The key drawback of satellite platforms, however, remains limited space-segment capacity. New satellites are expensive to design, build and launch, and transponder lease prices can be similarly expensive as a result. By contrast, small VSAT dishes have declined in cost substantially in recent years. Similarly, although power-line broadband technology promises to support the delivery of telecommunications services over electrical infrastructure (with only minor modifications), BPL remains largely in the trial stage. The use of 61 Trends in Telecommunication Reform 2006 Box 4.6: Satellite Broadband in Developing Countries, selected examples Algeria: Provision of satellite broadband to enterprises and public organizations in rural areas. Ethiopia: Schoolnet is a programme funded by the United Nations Development Programme (UNDP) to provide satellite broadband to 400 schools. Thailand: Commercial deployment of satellite broadband services and delivery to schools. Uganda: Trial provision of satellite broadband services to number of rural schools. existing electrical power infrastructure, however, could reduce the substantial investment requirements to build or upgrade telecommunication networks. This potential has attracted a lot of attention as a mechanism for providing an alternative fixed local loop with broadband capabilities. Of course, as already mentioned, BPL is intrinsically dependent on existing electrical infrastructure, which is notably absent in large areas of developing countries. 4.6.2 Wholesale Provision and Unbundling The deployment of broadband access service has, to a certain extent, been encouraged in more developed countries through various forms of local loop wholesale products, including full local loop unbundling and line resale. These products allow new entrants to access end-users without sinking the investments required to build local loop infrastructure. The various forms of local loop wholesale access are discussed in Box 4.7. Success in providing wholesale local loop products has varied in different countries, but in Hong Kong, China, the United States and Germany, unbundled local loops now account for a significant proportion of direct exchange (or access) lines. The establishment of appropriate unbundled loop access prices, at levels that permit incumbents to retain a moderate margin, has encouraged alternative operators to employ unbundling to provide broadband services to end-users. This has played a significant role in creating demand for broadband access. In developed countries, the local loop has commonly been constructed before market liberalization. Moreover, the incumbent usually has had a significant period of time as a monopolist to recover the upfront infrastructure costs. So in developed countries, unbundling has been less a tool to promote further network build-out or teledensity than a technique to encourage service competition. So developed countries have been able to price unbundled local loop access based on incremental costs of offering a wholesale service, rather than historical costs of building the loop infrastructure. The situation in developing countries is fundamentally different for the following reasons: 1 Many developing countries are liberalizing primarily to achieve network expansion and higher teledensity – not to increase service competition; 2 Liberalization is occurring much earlier in the development chain – without landline networks being fully constructed; 62 3 4 Many incumbent operators may not have had sufficient time to recover the costs of local loop network deployment that has incurred, and therefore, pricing based on incremental cost methodologies may not be appropriate; Use of fully allocated cost approaches may have greater justification and validity for loop access pricing in developing countries, but these will result in higher wholesale prices (not least because they may reflect the inefficiencies and historic network structures of the incumbent), reducing the attractiveness of local loop wholesale access to alternative operators. In addition, regulators in developing countries may lack administrative expertise and resources to implement and regulate a wholesale market structure. Even in developed countries, regulators have struggled to establish a local loop wholesale framework that encourages the development of market competition. Many incumbents have successfully impeded wholesale access by setting up technical or limitations to co-location, slowing down processes for provisioning wholesale loops or pricing loops at levels that make a mockery of alternative operators’ business cases. Not surprisingly, few regulatory authorities in developing countries have opted to build broadband deployment strategies around the provision of wholesale local loop products by incumbent operators. Those that have opted to implement local loop unbundling recognize that its success rests on the ability to enforce the associated requirements. Although the provision of wholesale local loop products remains very limited in developing countries, a few developing markets are planning and implementing local loop access mandates. In September 2005, the members of the West African Telecommunication Regulators Assembly (WATRA) agreed to a set of regulatory guidelines that includes support for bit stream access.15 The provision of wholesale local loop products, including local loop unbundling, will meet with greater success in promoting the deployment of broadband access networks where certain regulatory and commercial conditions are in place. These success factors include: • The existence of an extensive and well-developed incumbent network; • Clear and complete regulations that spell out all unbundling requirements to ensure that strong operators do not impede access to their exchanges; and C HAPTER 4 Trends in Telecommunication Reform 2006 Box 4.7: Local Loop Wholesale Options There are three main types of local loop wholesale access: Local loop unbundling allows access seekers to have management control over the copper pairs connecting a subscriber to the incumbent’s main distribution frame (MDF). The access seeker can provide both voice and data services on the incumbent’s network. Shared access refers to an arrangement where competitive service providers have access to either voice or data transmission over the incumbent’s network. The access seeker leases part of the copper pair spectrum while the incumbent maintains control of the copper pair. Bit stream (or wholesale) access involves the incumbent installing high-speed access links to its customers and opening these links to competitors. In this case, the access seeker has no management control over the physical line and is not allowed to add any equipment to the network. Total Service Resale allows an alternative provider to purchase the network operator’s service at a wholesale discount, rebrand the service, and resell it to the consumer, allowing the alternative provider to build a customer base and obtain a retail sales margin over the wholesale rate. Box 4.8: Local Loop Unbundling in Poland In February 2005, the Polish Office of Telecommunications and Post Regulation issued a directive requiring the incumbent telecommunication operator, Telekomunikacja Polska (TP), to give other operators access to its local loops. The move was part of a plan to further liberalize the Polish telecommunication market. In the first phase of local loop unbundling, TP will provide both full (voice and data) and shared (data) access to competing operators. There also are plans to extend the local loop unbundling offer to include bit stream access. The regulator is still reviewing the cost model submitted by TP, but local loop prices are expected to be based partly on benchmarking against other European providers operating in competitive markets.1 1 • See http://europa.eu.int/information_society/topics/telecoms/implementation/annual_report/7report/slides281101 Conditions that encourage continuing investment by both incumbents and new operators in new infrastructure rollouts. Regulators may decide to end wholesale local loop requirements once new operators achieve an appropriate level of commercial scale. Regulators can then place more emphasis on frameworks that encourage network deployment. entrants. These bottlenecks often stem from either a lack of needed infrastructure, or from monopoly ownership of all infrastructure by a single operator – typically, the incumbent. For example, in some markets, incumbents have used their ownership of backbone infrastructure to impose constraints on the ability of new entrants to compete by: • Imposing excessive access/leasing costs – In some markets, for example, incumbents levy higher leasing charges on competing telecommunication operators than on their corporate customers; • Imposing service limitations – Some network operations try to limit the amount of bandwidth or QoS they will support; and • Imposing restrictions on points of interconnection – Some incumbents set technical restrictions or limit access to international switches. 4.7 Competition and Industry Regulation This section explores how regulators can address the various issues that arise as broadband markets evolve and mature. As with telephony markets, broadband markets may undergo transitions from monopoly or near-monopoly structures to greater competition. Moreover, they evolve in the context of existing and allied telecommunication markets, such as voice telephony. 4.7.1 Backbone and International Connectivity Issues Multiple network bottlenecks can occur in the provision of broadband services, both by incumbents and new market C HAPTER 4 In a number of markets, control of backbone and international connectivity (whether by incumbents or other monopoly operators) has been used to manipulate and constrain the development of competition. This can lead to artificial shortages of bandwidth and inflated prices, thereby hampering the provision of robust global telecommunication services. Due 63 Trends in Telecommunication Reform 2006 to such concerns, the regulator in Singapore, for example, has moved to open up access to submarine cable landing stations. There are two main options available to regulators to head off the adverse consequences of monopoly control of backbone infrastructure: 1 Impose a tighter regulatory framework on owners of bottleneck facilities to ensure that other operators can access such backbone infrastructure at an appropriate pricing point; and/or 2 Encourage existing or new licensees to deploy alternative infrastructure. Regulatory intervention is often required where the costs and timelines associated with duplicating bottleneck facilities would be so excessive as to be commercially nonviable. Some countries now permit new entrants to install VSATs with international access. Some also allow local broadband providers to connect directly with international backbone networks, rather than terminating traffic through an incumbent’s international gateway. But in many developing countries the incumbent still controls access to international network infrastructure and is able to use this control to impose excessive prices on other operators, undercutting competition. So regulators are increasingly stepping in to ensure that new entrants gain fair and competitive access to existing backbone infrastructure. In addition, regulators are finding that reliance on international connectivity can be reduced by developing internet Exchange Points and local caching, which the government can actively encourage or establish.16 It is also necessary to encourage the construction of supporting backbone networks, especially if the intent is to deploy infrastructure into rural areas. However, such requirements are more likely to be effective if they are not so prohibitive as to deter market entry. With respect to encouraging licensees to deploy alternative infrastructure and, furthermore, to deploy infrastructure into areas previously not accessed by telecommunication networks, there are a number of options and approaches for regulators to consider: • Facilitating access to existing telecommunications infrastructure used for alternative activities—For example, railway signalling or pipeline monitoring activities involve communications links, which can be made available to licensed telecommunication operators. • Ensuring and facilitating access to government land, including railways, electrical grids and road networks – Governments can streamline and standardize the application process for access to rights of way and ensure just and reasonable fee structures. • Ensuring that telecommunication networks are incorporated into new infrastructure developments – Governments can include broadband network conduits in road projects or incorporate cable arrays in new electrical grids (for example, Chile’s ICT project side-stepped difficulties of geographical isolation and infrastructure shortage in rural areas by taking advantage of electrical plant). • Creating broadband alliances to pool financial and other resources and to enhance negotiating power with network vendors – The 64 Wireless Broadband Alliance gives operators in the United States, the United Kingdom and the Asia-Pacific region benefits of scale in areas such as testing of products and services, influencing development and adoption of technology standards and negotiating international roaming agreements. Experience from some more developed markets (for example, Australia and the United Kingdom) shows that backbone networks can be more quickly established by leveraging existing infrastructure. For example, cables can be strung across electrical pylons that can also act as the location of radio antennas for wireless technologies. Other alternative infrastructures include main roads, gas and oil pipelines, and water channels (especially maintained canals). The key remaining issue, however, is what to do where such supporting infrastructure does not exist. The lack of basic support infrastructure (electrical grids, railways and pipelines) in rural areas is often heightened by large distances or rugged terrain. In such circumstances, the regulatory framework can promote the use of wireless technologies – satellite trunking – especially where traffic is not expected to be substantial. This can be achieved through the expeditious allocation of unused or little-used spectrum and by lowering licence fees for trunking in remote areas. Developing countries may also explore the pooling of resources to collectively launch satellites that provide broader regional service, or to back a commercial satellite operator. Shin Satellite of Thailand, for example, has just launched its Ipstar satellite, which has a wide footprint across the AsiaPacific region. Although it is a commercial operator, Shin has extended broadband access to rural areas of Thailand, Laos, Cambodia and Myanmar. 4.7.2 Funding Broadband Deployment The need to deploy infrastructure into more marginal geographies is based on the recognition that without such access, the Digital Divide will continue and grow – both between developing and developed countries and between urban and rural areas. Given the benefits of broadband deployment, including cheap voice communication, regulators are playing a critical role in seeking to reduce this divide through the promotion of broadband access deployment. The first step regulators are taking is to develop regulatory regimes that are conducive to investment and supportive of commercially viable broadband access network deployment. In other words, they are specifically addressing the market efficiency gap in broadband provision. The need to first address the market efficiency gap in promoting ICT development was explored fully in the 2003 edition of this report. Efforts to close the market efficiency gap in basic telecommunications can also apply to the broadband service market. Regulators should remove unnecessary regulatory burdens and encourage market demand for broadband deployment, allowing market forces to promote broadband access wherever possible. It also can include facilitating market entry by small enterprises and micro-entrepreneurs, as well NGOs, libraries and local governments. In addition, regulators can encourage large-scale C HAPTER 4 Trends in Telecommunication Reform 2006 Box 4.9: Removing Network Bottlenecks in India The Indian telecommunication regulator, TRAI, is planning to introduce more competition into the market for international private leased circuits (IPLCs), which are currently “bottleneck” facilities. This will have implications for international telecom services like International long distance (ILD), as well as internet access and broadband data offerings. There is a significant lack of competition in the IPLC market at present, forcing smaller operators out of the market for several services relying on leased line capacity. The reasons for lack of competition include: • A limited number of landing stations, which are owned and controlled by a small number of operators; • The ability of IPLC providers – who are also Internet Service Providers (ISP) – to charge other ISPs prices that are significantly above costs, harming competition the ISP market; • The ability of IPLC providers also to charge substantial prices to ILD resale operators, with whom they also compete in the ILD market. In response to this, TRAI has undertaken, or is planning, the following initiatives: • Setting a tariff ceiling for various transmission capacities, based on each incumbent’s costs, and removing differences in IPLC prices based on usage volumes by ILD operators and ISPs. • Reviewing the need to permit IPLC resale, which had been banned because it was believed that resale would retard construction of ILD infrastructure in the country. • Recognizing the need to facilitate access to cable landing stations by new service providers, as well as by new international cable carriers. • Planning to facilitate mutual sharing of landing station infrastructure international cable capacities among the carriers.1 1 TRAI, 2004, Fixation of Ceiling Tariff for International Leased Line Circuit (Half Circuit). http://www.trai.gov.in/consultation%20paper-30th%20april%202004.pdf Box 4.10: Using the Indian Rail and Gas Facilities for Backbone Connectivity Railtel Corporation of India was set up in 2000 to exploit communication assets lying idle along India’s rail network. Since then, the company has laid 25,000 km of fibre optic cables along rail lines. Railtel provides leased lines to telecommunication service providers, along with other infrastructure like tower space and co-location services. In addition, it is also an ISP, operating a network of internet kiosks set up at railway stations. The company plans to open an additional 300 cybercafes at railway stations, providing services such as VoIP and video conferencing for local people with no other access to computer equipment or broadband service. Owing to India’s extensive railway network, this allows broadband access to be rapidly extended into many marginal areas.1 Similarly, Gailtel, the telecommunication services arm of the largest gas transmission company in India, operates as an integrated telecommunication infrastructure provider. The company started leasing bandwidth to telecommunication operators like Bharti and Tata in mid-2001. It also operates as an ISP, serving corporate and residential customers. The company has laid an optic fibre/co-axial (OFC) hybrid network along about 8,000 km of natural gas and LPG pipelines, and it plans to extend the network to 18,000 km around the country. The network currently serves 73 cities across eight states. Due to infrastructure cost savings derived from overlaying the OFC network on existing pipelines, Gailtel is able to offer broadband services to its customers at substantially lower costs, compared with its competitors.2 1 http://www.railtelindia.com/ 2 http://www.convergenceplus.com/apr03%20expert%20view%2002.html operators to deploy broadband networks in areas viewed as not commercially viable in return for access to potentially more value-creating business activities or other incentives. It may also be necessary, however, for regulators to establish mechanisms to fund network deployments, especially if there is evidence that regulatory incentives and lower-cost C HAPTER 4 network alternatives will not be enough in certain areas. This shortfall between market-based measures and universal access is termed the true access gap. In any given area, this true access gap (which represents, in effect, the failure of the market to deliver needed services) can only be determined after all attempts to address the market efficiency gap have fallen short. 65 Trends in Telecommunication Reform 2006 Box 4.11: GSR 2003 Universal Access Best Practice Guidelines During the 2203 Global Symposium for Regulators, delegates adopted a broad manifesto for enabling universal access to telecommunication networks and services, including broadband ones. The best practice guidelines are as follows: “We, the regulators participating in the 2003 Global Symposium for Regulators, have identified and propose the following best practice guidelines to achieving universal access to information and communication technology (ICT) services. A An enabling regulatory environment: the role of governments and regulators The success of any universal access/service policy is dependent upon political support at the highest level that recognizes the role of ICTs as a tool for development. 1) It is essential that Regulators exist or be established where they do not yet exist, and that their key role in implementing universal access policies and promoting competition be recognized and reinforced. 2) A series of policy and regulatory reform measures can be taken to achieve universal access to ICTs. These include: a) Formulating a national policy that identifies appropriate and realistic universal access/service objectives that take into account the differences between universal access-public access to ICTs-and universal service-household or private access to ICTs. b) Including all citizens, regardless of gender, ethnicity, socio-economic level or geographic location, in national universal access/service objectives. c) Reviewing universal access/service policies, regulations and practices periodically to adapt to the evolving nature of ICT services and the needs of end users. d) Conducting periodic public consultations to the extent possible with stakeholders to identify their needs and modify accordingly universal access policies, regulation and practices. e) Designing universal access policies, regulations and practices in order to create incentives for the private sector to extend universal access to communications services. f) Establishing a fair and transparent telecommunication regulatory framework that promotes universal access to ICTs. g) Adopting technologically neutral licensing practices enabling service providers to use the most cost-effective technology to provide services for end users. h) Adopting a framework of interconnection rates linked to costs. i) Reducing regulatory burdens to lower the costs of providing services to end users. j) Developing an effective regulatory body responsible for implementing policies directed towards assuring the best quality reliable services at the most affordable prices that meet the needs of consumers-existing and future. k) Promoting competition in the provision of a full range of ICT services to increase access, affordability, availability and use of ICTs. 3) Countries can use regulatory reform as the first step in achieving universal access, recognizing that further steps may be necessary to achieve ubiquitous access to ICTs, e.g., in rural areas or to users with special needs. 4) Appropriate licensing schemes for rural service providers could be granted to meet the needs of un-served and under-served areas. B Access to information and communication infrastructures 1) The lessons learned from the initial experiences developing countries have achieved with mobile cellular services can be applied to a broader range of ICT services to foster universal access. These lessons include providing services in a competitive framework, using new technologies that offer both innovative services and affordable pricing options (e.g., pay as you go options such as pre paid cards) to a wide range of end users. 2) Other measures to promote affordable ICT equipment could include national manufacturing of ICT equipment, reduced customs tariffs and duties, and end-user loans to foster affordability of ICT equipment. 3) A full range of public access options can be developed, including the creation of public telecentres. 4) Local input (including the content useful for local populations) into projects increases their long-term financial sustainability. 5) Educating local people on the benefits of ICTs and their use increases their long-term financial sustainability. 66 C HAPTER 4 Trends in Telecommunication Reform 2006 Box 4.11: GSR 2003 Universal Access Best Practice Guidelines C Guidelines in regard to finance and management of universal access policy 1) Universal service funds can be viewed as an option that complements regulatory reform and developed as a mechanism within a broader market-oriented approach to achieving universal access. 2) Universal service funds can be financed by a broad range of market players, managed by neutral bodies such as regulators, and be used to kick-start public access projects that meet the needs of the local community. 3) Governments may consider a full range of other financing mechanisms, including tax incentives for ICT providers and end users. 4) Competitive minimum subsidy auctions could be used, as an option, to reduce the amount of financing necessary for public access projects financed by a universal service fund. 5) Public access projects can be designed to achieve long-term financial self-sustainability, especially where consideration is given to innovative low-cost technologies See: http://www.itu.int/ITU-D/treg When all inefficiencies have been leached out of the market through sector reforms, and the true access gap remains – only then may government intervention be necessary. This intervention can take the form of targeted and limited “smart” subsidies to spur the deployment of broadband access networks to areas and populations that would otherwise not be reached. Regulators have several ways to address the true access gap, including: • Licensing special rural operators to deploy broadband access networks in defined geographies – Licensees can be selected based on bidding for the minimal subsidy required to achieve specified targets. By licensing such rural operators within specific areas, regulators can “leapfrog” the gradual diffusion of new technologies from urban to rural geographies; • Providing funding for local community initiatives to provide broadband access. Many universal access fund programmes take a top-down approach, directing fund administrators (often regulators) to identify the communities for which targeted subsidies will be made available. But a bottom-up approach could also be used, allowing communities themselves to apply for funds to deploy their own broadband access networks. This would help to ensure local community involvement in, and demand for, broadband access. • Giving Direct and indirect financial support in return for the deployment of broadband access networks. Governments could provide tax exemptions to operators that roll out telecommunication infrastructure in rural areas. Where this is insufficient to attract commercial operators, governments could offer full or partial subsidies. Alternatively, the government could provide preferential loans to operators for building broadband access networks. • Requiring operators to deploy broadband access networks. Again, broadband deployment mandates could be tied to funded mechanisms, drawn from government revenues or contributions made by all operators. Contributions could be either as a flat-rated or set as a percentage of revenues. The operator(s) responsible for the provision of universal broadband access in any given area would receive financial incentives or payments for each new broadband access C HAPTER 4 line installed. But it could also be given the freedom to determine in which specific locations it would deploy such infrastructure. Governments may prefer to provide funds only where the costs of providing broadband service would exceed revenues from that service. Any government involvement in financially supporting the deployment of broadband access networks has potential drawbacks. For one thing, regulators should ensure that the allocated funds are used for the expressed purpose of deploying infrastructure in marginal areas. This requires the regulator to have the institutional capability to manage and oversee the allocation process and to provide maximum transparency. There are examples of such regulatory frameworks, including Korea (Rep.) and a number of South American countries (See Box 4.12). Deployment of broadband access networks by large-scale network operators – even those employing wireless architectures – may only be commercially viable in many areas of developing countries (and even a number of areas in developed countries) if an incentive framework is incorporated into the licensing approach, coupled with government funding and initiatives that generate customer demand. One approach is to use regulatory incentives to support and promote broadband access network deployment by large-scale operators. Another approach is to encourage small-scale players to serve local communities by removing regulatory burdens that often apply to large-scale operators, and allowing small players to test their business cases for broadband access and build demand. The key issue is deciding which approach has the best fit with the underlying regulatory and institutional capabilities, and which approach minimizes the extent of government involvement while maximizing the commitments of private investors. 4.7.3 Enforcing Broadband Market Competition To ensure a reasonable level of competition in an emerging broadband market, it is necessary to establish a regulatory framework that prevents anti-competitive behaviour by operators. Regulators need to monitor dominant operators, which can be defined as those that are capable of acting unilaterally in 67 Trends in Telecommunication Reform 2006 Box 4.12: Korea’s KII Project The Korea Information Infrastructure (KII) Project was established in Korea (Rep.) in early 1995 as an avenue to promote nationwide broadband usage. The ultimate aim of the project was to provide broadband networks to 13.5 million subscribers with the average transmission rate of 20 Mbit/s by 2005. To achieve this, the government supplied public funding to facilities providers to partially ease the burden of investment in access networks. Greater funding was reserved for remote areas. In addition, some enterprises were offered a tax exemption on deployment of broadband infrastructure. The government provided loans, at preferential rates, worth USD 77 million to facilities service providers in 1999. It committed an additional USD 77 million in 2000 for the purpose of deploying infrastructure in less densely populated areas. Subsequently, public funding was extended to cover infrastructure build-outs in rural areas, with additional investments amounting to approximately USD 900 million.1 1 Ministry of Information and Communication, Korea http://www.mic.go.kr Box 4.13: Use of Universal Access Funds, selected examples In 1995, the Chilean government established a Universal Access Fund to promote installation of public telephone systems in isolated rural areas. The USF employed competitive bidding to determine which provider should receive the subsidy in any area. The fund managed to secure approximately USD 60 million in investments, of which about 85 per cent came from private companies. With support from the fund, public telephones were provided to about 6,000 rural localities, reaching 2.2 million inhabitants within seven years. Reliance on market forces and minimal regulation, among other things, has been credited for the success of the scheme. In Peru, universal access funds for the Fondo de Inversión en Telecommunicaciones (FITEL) are collected through a 1 per cent tax on the gross revenues of all public telecommunication companies. The funds are then allocated through public competitive bidding to operators deploying infrastructure in locations of priority social interest. the market (such as on pricing or provisioning terms), without regard to discipline from competitors, buyers or sellers. Such regulation need not be onerous or excessively restrictive, it just needs to be effective in prohibiting and punishing conduct that has the potential of preventing or constraining the development of market competition. Examples of potential business conduct by dominant operators that should be prohibited include: • Predatory pricing (providing services at less than cost); • Mandatory product bundling (requiring end users to take products in which the operator is not dominant in order to access products in which the operator is dominant); • Price discrimination (applying different prices and terms and conditions to favour or disadvantage particular customers); and • Cross-subsidization (using profits generated in one service market, in which an operator is dominant, to subsidize its operations in a competitive market). In response, obligations typically applied to dominant operators include: • 68 Requirements to provide interconnection to competing operators on appropriate terms and conditions; and • Obligations to ensure that tariff structures comply with regulatory requirements, including appropriate price controls. All of these issues are relevant to the broadband access market. A dominant operator – usually the incumbent telephone operator – can distort the development of the broadband access market by undertaking behaviour to stifle or disrupt competition. Common techniques are predatory pricing and cross-subsidization, both of which can undercut smaller broadband access providers’ revenues and drive them from the market. In general, developing broadband markets should be subject to ex-ante rather than ex-post regulation, given the potential for anti-competitive conduct by dominant operators. Ex-post regulation tends to be work better when there is no dominant carrier, and where there is sufficient evidence that competitive market forces will function properly without extensive ex-ante rules. Given the current structure of most telecommunication markets – including broadband access markets – such competitive circumstances do not commonly exist. Even within a regulatory framework that applies more rigorous scrutiny to dominant operators, it remains important to avoid excessive regulatory burdens. Regulations can be carefully tailored and minimized to address key concerns: C HAPTER 4 Trends in Telecommunication Reform 2006 (a) preventing anti-competitive business conduct, (b) ensuring compliance with licence commitments and (c) protecting end users. Strict price regulation practices, for example, can be replaced by a general price cap regime, with the goal of ending price regulation when the market is genuinely competitive. At the same time, market development of new services also may hasten the end of price regulation. The rise of new offerings for VoIP, which is usually not price-regulated, may force dominant operators to lower prices to retain market share. Section 4.6 of this chapter has already detailed the role of competition between cable TV and telecommunications companies in driving competition and take-up in the broadband access market. Therefore, cross-ownership of telecommunications and cable network companies can serve as an impediment to broadband development. Integrated providers that own both telephone and cable TV networks are unlikely to deploy both DSL and cable modem services, because the two would cannibalize each other. While good for the operator, deploying only one of the technologies would bring higher prices for consumers. 4.7.4 Other Regulatory Concerns This chapter has identified the need to regard broadband access as an information delivery platform. As broadband takeup and usage widens, regulation of broadband services and applications will become an increasing concern for regulators. In view of the potential and growing demand for IP telephony, regulators in several countries have begun developing a regulatory framework to address issues associated with VoIP. These key concerns are examined in detail in Chapter 6. In addition, regulators will also need to consider regulatory measures pertinent to any content delivery platform as broadband deployment takes off. Given the superior functionalities of broadband access, the need for regulating broadband may be even more pressing than for other telecommunication services. Content-related concerns include: • Having an appropriate framework to effectively guard against intellectual property infringement; • Setting content regulation guidelines to protect consumers, especially minors; and • Setting up appropriate and suitably non-invasive regulatory mechanisms to ensure that national security is not compromised. 4.8 Increasing Broadband Awareness So far, this chapter has focused on the role of regulators in stimulating the supply side of the broadband access market – that is, encouraging network build-out. There are, however, significant opportunities for regulators to promote demand for broadband through the expansion and improvement of applications and services available to end users. 4.8.1 The Government’s Role Given scarce capital resources in many developing countries, regulators (and appropriate ministries) often must demon- C HAPTER 4 strate the relevance and necessity of promoting the deployment of broadband access networks, especially if funding is required in some form. This requires a clear demonstration of the benefits of broadband access and the preparation of a holistic ICT strategy. Some countries have used e-government projects to initiate and support ICT projects, including broadband development. Such projects have several objectives, including: • To enhance the efficiency of government by converting paper and manual transactions to online ones, simplifying and speeding up government processes; • To improve government linkages with the population and give citizens more ready access to government services, officials, and information; • To expand the reach, awareness and understanding of broadband access among the population – including the government’s own employees (the public sector is often the largest employer in developing countries); and • To provide a framework to attract local and foreign investments. The ITU is working on a Global E-Government Project to enhance government services through the use of secure and trusted internet infrastructures and applications in selected developing countries.17 The Vietnamese government, meanwhile, is cooperating with the World Bank to implement an e-government plan, with the idea of promoting sustained takeup of broadband. Within such projects, the provision of broadband access networks is just one component of a broader strategy to improve ICT positioning and provide a positive impact across the economy. Telecommunication regulators are in a good position to initiate greater collaboration and cooperation with other government agencies to promote broadband take-up. In addition to e-government projects, which invite participation by multiple agencies, inter-governmental working groups can be established to facilitate the development of broadband infrastructure, particularly in commercially less viable areas where resources can be shared. For instance, the Singapore ONE initiative, which was officially launched in 1997, was designed to be a collaborative effort between government and industry to implement a nationwide broadband network. It was jointly supported and driven by multiple government agencies, including the telecommunications regulator, the Economic Development Board, the Media Development Authority and a research agency. Regulators and government agencies can take the lead by actually building a broadband backbone network. The success of the Singapore ONE initiative was largely driven by the government’s construction and operation of a core Asynchronous Transfer Mode (ATM) backbone network, which enabled broadband access to be provided extensively to public libraries, schools and training centres across the island nation. This served to raise awareness of broadband and drove broadband take-up across various communities. In order to really act as advocates for broadband access, however, regulators must be able to clearly and credibly dem- 69 Trends in Telecommunication Reform 2006 Box 4.14: Limiting Cross-Ownership in the EU In 1999, the European Union issued a directive requiring the separation of telecommunications and cable TV operations into distinct legal entities. It was believed that cross-ownership of telecommunications and cable operations would prevent cable companies from providing low-priced voice telephony services in competition with telephone companies. In addition, without cable competition in the internet access market, there would be little incentive for telephone companies to upgrade their existing networks to full-scale broadband capability via xDSL. Hence, under the directive, dominant public telecoms network operators were required to run their cable operations as separate legal entities. It was thought that this would prevent emergence of new, anti-competitive bottlenecks and would encourage competition and innovation in both the telephony and cable TV markets. Box 4.15: E-Government in Vietnam The Ministry of Posts and Telematics (MPT) in Vietnam has recently drafted a National ICT Master Plan for 2006-2010 and an E-Government Master Plan covering the same period. These initiatives will be implemented in cooperation with the World Bank. The ICT Master Plan aims to achieve: (1) A wide diffusion of ICTs throughout Vietnam’s economy and society, making it a larger contributor to GDP; (2) Establishment of a nationwide information and communications network; and (3) Comprehensive ICT skills development. As part of the process to improve e-readiness in Vietnam, the ICT project will address the following issues: • Strengthening the technical and managerial capacity of the MPT in implementing the ICT initiatives; • Facilitate increased access to telecommunications, in the context of a gradual move towards a more competitive market environment and private-sector participation; • Promote greater awareness of ICTs and e-applications in the business community, with the view to encourage businesses to adopt e-commerce; • Support enhanced government online presence and content at the national and municipal levels, through interactive and dynamic portals; • Roll out e-government services to businesses in areas such as e-procurement and business or land registration; and • Support extensive training and awareness-raising efforts to encourage diffusion of ICTs in the private sector. onstrate its advantages. Indeed, the regulator can even take the lead in coordinating the provision of broadband access to various government ministries and departments. This is the case in Singapore, where the regulator, the Info-Communications Development Authority (IDA) coordinates all ICT procurement for the government. As a further example, the Turkish Ministry of Health is partnering with ITU to develop “e-healthcare” systems. Specific initiatives include giving healthcare providers and citizens access to health-related information via broadband access, and development of a Primary Healthcare Information Systems and Electronic Health Records initiative. Fundamentally, in order to be able to increase awareness of broadband access networks and to successfully position broadband at the forefront of a country’s telecommunication strategy, regulators need to be able to articulate the potential benefits, both direct and indirect, within a cost-justified framework. Furthermore, the rationale for broadband is likely to be stronger when contained within a broader and holistic ICT strategy (including policies to improve the rate of PC penetration). This is the challenge for regulators, especially when there are so many other demands on a country’s telecommunication infrastructure and scarce resources. Providing content that is relevant to local communities, particularly in local languages, can also increase the relevance and potential impact of broadband access networks. Morocco, for example, is in the early stages of developing Arabic content for both mobile and internet services. In Laos, a Lao-language version of Linux-based graphical desktop, along with Lao-language office tools, has been developed and provided to villages as part of a plan to promote WLANs. Promoting broadband access requires more than just access to broadband networks. People in developing countries also require access to personal computers or other end-user terminals – and this inevitably raises cost and affordability issues. Put simply, the question is whether there are low-cost terminals that are affordable to users in developing countries. What role can regulators play in improving the penetration of PCs and portable devices in the developing world? Without a 70 4.8.2 Promoting Broadband Equipment Take-Up C HAPTER 4 Trends in Telecommunication Reform 2006 Box 4.16: The Rural-Enlaces Project in Chile The Rural-Enlaces project is part of an ICT policy to improve education in 3,600 rural schools around Chile, reaching an estimated 130,000 students. The project involves providing learning aids, such as computers, as well as access to broadband telecommunications. The proponents of Rural-Enlaces are convinced that technology should be seen as a means to support existing pedagogical approaches to rural education, rather than as a cultural invasion of the dominant group. Hence, the project aims to involve various segments of local communities in the implementation process. For instance, the project is positioned as a professional development opportunity for local teachers. Apart from technological knowledge transfer, teachers benefit from being directly involved in the selection of educational software and content. In addition, they are consulted on the design of learning practices that are most appropriate and relevant to everyday reality in their communities. Meanwhile, parents are also involved in helping out with various aspects of project implementation at the local schools. Box 4.17: Installing Internet Centres in Southern Brazil Sud Mennucci is a town with 7,500 inhabitants, located 700 km southeast of Sao Paulo. It will soon benefit from a plan to install two internet access centres, with 10 computers each, to provide internet access to low-income inhabitants. Three solutions have been proposed to realize this plan: (1) Have the federal government donate the computers for the centre; (2) Incorporate the plan into the state government’s Acessa Sao Paulo programme, which aims to provide free internet access to dozens of municipalities in Sao Paulo state, or (3) Engage private companies to set up the centre and provide training in the use of technology.1 1 LatinCom, 2005. solution to the problem of low PC penetration rates, the provision of broadband access networks will have little impact. In response to these challenges, regulators also have many options. They can: One relevant option for most developing countries is to concentrate PC usage at single locations – whether these are cybercafés, community centres, schools or government offices. Often, cybercafés are the primary mode of accessing the internet in many developing countries (See Box 4.17). • Seek to maximize investment flows by liberalizing markets and permitting foreign ownership. This includes allowing broadband providers to offer a full range of services and applications, such as the “triple play” of voice, internet access and video/multimedia programming. • Encourage the deployment of wireless broadband access networks by freeing up the requisite spectrum. This strategy can be augmented by a technology neutral approach to spectrum assignments. • Create a regulatory framework that encourages a full range of potential broadband providers. Moving beyond large-scale national network operators, regulators can empower universities and government offices, local communities and smaller entrepreneurs to deploy broadband access networks. This may include tailoring regulatory frameworks to each group of potential broadband providers. There are, however, many alternative options for encouraging private PC take-up, some of which are detailed in Box 4.18. 4.9 Conclusion Although basic telephone (PSTN) teledensity is extremely low in many countries, the rapid development of technologies – especially wireless technologies – means that policy-makers and regulators should not lose the opportunity to plan beyond increasing basic teledensity. They should plan for broadband access, as well. Regulators clearly face numerous challenges in the broadband context. In particular, they face a perceived lack of local demand and available revenue streams for broadband in many countries. This could prevent the commercial deployment of broadband access networks in many areas, especially rural areas – at least by large-scale network operators. Furthermore, continued low PC penetration rates in many developing countries could effectively negate any potential positive impacts that may arise from broadband network deployment. C HAPTER 4 – A regulatory framework tailored to small broadband providers will enable and encourage local community providers to harness the potential of broadband technologies and enable greater broadband access in rural areas; – Competitive large-scale operators can be encouraged to extend their networks to rural areas through 71 Trends in Telecommunication Reform 2006 Box 4.18: Encouraging PC penetration, selected examples In India, the government has launched the “Indian PC Programme,” which aims to improve PC penetration from the current 14 per 1,000 to 65 per 1,000 by 2008. Some of the initiatives include: (a) launching INR 9,999 (USD 230) “no compromise” PCs, subsidized by software vendors and chipmakers; (b) encouraging all incumbent operators to move towards a subscription model for offering broadband services and PCs as a package; (3) setting up loan schemes, employee provident funds and other saving funds to encourage PC adoption among government employees; and (4) amending the Income Tax Act to allow deduction of home PC purchases. Also, cybercafe kiosks have been set up along railway tracks around the country to provide computer access to rural villages. As a result, rural communities now have access to e-Government, tele-education and telemedicine services. In Mexico, public internet kiosks were set up in community plazas under the e-Mexico project, which benefited 3,200 municipalities around the country. Each community plaza has an average of 10 computers and has internet access via satellite technologies. In Sri Lanka, in cooperation with the World Bank, the Sri Lankan government is planning to set up tele-centres in rural areas around the country to improve community access to ICTs. The target groups include farmers, students and SMEs. In Thailand, a “Computer ICT Programme” was launched in 2003 to provide low-cost computers. In addition, there is plan to establish a nationwide network of 751 tele-centres, located at various post offices throughout the country. In Tunisia, the World Bank is working with the Tunisian government to subsidize 6,000 “Publinets” and 10,000 PCs under the “PC Familial” programme. There is also an investment plan to increase the number of PCs in schools. In Uganda, Uconnect, an NGO based in Uganda, imports used computers from Europe and the United States, revamps them and supplies them to schools and organizations. About 100 mostly rural-based schools have benefited from this project. • • • 72 infrastructure-sharing arrangements that guarantee open access to all competitive operators; – Competitive large-scale operators can be given incentives to deploy networks in return for appropriate rewards; – Regulators could seek to encourage the deployment of broadband access networks by providing direct, targeted subsidies from universal access funds or indirect financial benefits (such as tax exemptions) to a full range of broadband providers; Create an asymmetric regulatory regime to prevent the dominant operator (often the incumbent) from constraining the development of competition in the broadband access market; Work with other government agencies or ministries to develop initiatives, such as e-government programmes, that generate demand for broadband services; Encourage the build-out of fibre backbone networks to boost the capability of both wire-line and wireless broadband technologies. These steps include forging synergies with transport and energy infrastructure projects and providing incentives for 2G mobile operators to replace their microwave links with fibre networks. It also means making it possible for all owners of such communications resources to lease unused capacity to others for commercial deployment. • Link broadband access development strategies to efforts to support and promote PC take-up. Build government-sponsored PC kiosks and other access terminals, especially in areas where broadband networks are to be deployed. Promoting broadband access in developing countries requires a new vision of reduced regulatory burdens, innovative incentives, and coordinated efforts by all links in the broadband value chain. It also requires concerted political will to achieve. It is an end to the “business as usual” approach, and governments should treat ICTs and broadband networks as tools for development. There are many challenges in the road ahead. Strategic and creative thinking to overcome these challenges is required, but with concerted efforts on all fronts, regulators can enable developing countries to join the broadband world. C HAPTER 4 Trends in Telecommunication Reform 2006 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 Large-scale operators include main national operators, new entrants and mobile operators. Marginal areas include remote, rural and under served areas. While some private companies have also deployed private networks, these remain largely in urban areas. By year-end 2004, some 112 countries had at least partially privatized their State-owned incumbent operator. Source: ITU World Telecommunication Regulatory Database. ITU World Telecommunication Indicators Database. The African Virtual University was established in 1996 as part of a World Bank project. It was founded as a technology-based distance education network to bridge the digital divide in Africa. http://www.avu.org/ Universitas 21 is an international network of leading research-intensive universities, with the objective of facilitating collaboration and cooperation between member countries, as well as to create entrepreneurial opportunities for them. Established in 1997, it now has 17 member universities in 9 countries. http://www.universitas21. com/ TRAI, 2004, Recommendations on Internet and Broadband. http://www.trai.gov.in/Recommendations on Internet and Broadband 2004-04-29 FINAL.pdf Yun et al., 2002, The Growth of Broadband Internet Connections in South Korea: contributing factors. http://www.ciaonet.org/wps/yuk01/ TRAI, 2004, Recommendations on Internet and Broadband. http://www.trai.gov.in/Recommendations on Internet and Broadband 2004-04-29 FINAL.pdf Contribution of Ireland to GSR Consultation to identify best practice guidelines for spectrum management to promote broadband access (http://www.itu.int/ITU-D/ treg/Events/Seminars/2005/GSR05/consultation.html). The trend away from onerous licensing practices toward more flexible market-entry authorization approaches, including technology and service-neutral licensing and authorizations, was explored fully in the 2004/05 edition of Trends in Telecommunication Reform: Licensing in an Era of Convergence (http://www.itu.int/publications/). See ITU Trends in Telecommunication Reform 2004: Licensing in an era of convergence. For a detailed discussion on this issue, See ITU Trends in Telecommunication Reform 2003: promoting universal access to ICTs. The full set of regulatory guidelines agreed by WATRA are available at http://www.itu.int/ITU-D/treg/Events/Seminars/ITU-EC-Project/Ghana/modules/CompilGuidelines_final_E.pdf The role of regulators in promoting IXPs is explored in the ITU-IDRC report Via Africa: Creating local and regional IXPs to save money and bandwidth, available at http://www.itu.int/ITU-D/treg/ For more information on this project see: http://web.itu.int/ITU-D/e-strategy/projects/E-Government/Executive-summary11.pdf C HAPTER 4 73 Trends in Telecommunication Reform 2006 5 BROADBAND SPECTRUM MANAGEMENT Author: John Muleta, Venable LLP This chapter discusses the challenges spectrum regulators face in allocating and assigning spectrum for broadband wireless access (BWA) and other wireless services. The main challenge is to provide for flexible, market-oriented spectrum licence rights, which can create a positive investment climate for BWA services. At the same time, regulators want to discourage uneconomic hoarding and speculation in spectrum, which could delay the rollout of services to consumers. Flexible spectrum rights should be granted as long as the spectrum licensees meet two absolute preconditions critical to the development of communications markets. First, the licensee (or, in the case of unlicensed spectrum, the service provider) must increase competition, benefiting consumers. Second, licensees and service providers should experience the opportunity cost1 of using their spectrum allocations. This is the best way to ensure effective and efficient use of the spectrum. This chapter aims to explain these concepts and stimulate thinking about how to make effective and pragmatic spectrum management decisions, without falling into the kinds of dogmatic approaches that have often characterized spectrum management discussions.2 It is important to understand the primary goals of spectrum regulation, as well as the fundamental economics of wireless access systems. It will also be useful to review some of the technological advances that are making new spectrum resources available for BWA services and applications. The traditional regulatory spectrum management models can then be examined to determine whether they adequately address the challenges presented by these new technologies. Then, best practices can be identified to improve spectrum management in ways that encourage the rapid deployment of BWA systems. below 6 GHz, where the physical characteristics of the spectrum are more conducive to consumer applications. In this new era, the power of the Information Age to affect our lives will be exponentially multiplied by the freedom brought about by BWA networks. Wireless broadband technologies will fuel the engines of the global economy by enabling consumers to: • Freely access the internet from the farm, the city, kiosks, cybercafés, coffee shops, on moving trains, and in their own communities and backyards, in developed and developing countries alike; • Connect to the internet seamlessly, using a single device to make phone calls, access information and government services, vote, pay taxes and bills, and enjoy entertainment; and • Live in enlightened communities that are connected to broadband, spectrum-based services that offer access to resources and opportunities never before available. BWA networks may have even more impact on consumers when they are combined with other broadband platforms. Ultimately, the broadband world will feature BWA networks, with their mobility and portability, at the core of a variety of useful hybrid broadband architectures that will provide a rich, multimedia consumer experience at virtually any time or place. 5.1 Introduction Of course, the potential for BWA services to improve people’s lives ultimately depends on the amount of spectrum regulators make available. But for the first time, it appears that technological advances can increase spectrum capabilities and resources, allowing licensees to do more with the same spectrum and enabling entirely new spectrum uses. Regulators must now consider whether traditional approaches to spectrum management are sufficient to address the resulting challenges and opportunities. Broadband wireless services are poised to bring significant benefits to all parts of the world. These new services will provide access to the internet and to IP-enabled services. Use of the term Broadband Wireless Access or BWA really describes the arrival of an era in which it is possible to enjoy the “internet everywhere, all the time.” Because many BWA applications will be ideal for consumers, this chapter will focus on frequencies Spectrum regulators must also consider a growing number of spectrum management “best practices” that have become apparent over the last two or three decades. The best practices explored in this chapter have fostered the widespread deployment of wireless services, including cellular mobile radio, broadcast television, paging, and satellite services. Following these practices has led to significant reductions in the cost of C HAPTER 5 75 Trends in Telecommunication Reform 2006 Figure 5.1: From Silos to Layers The ultimate consumer broadband experience will be based on a multi- platform IP network with BWA as its core. providing services and has created opportunities for entrepreneurs to develop innovative applications for consumers. 5.2 The Economics of Broadband Wireless Access It is important for regulators to understand something about the economics of wireless access, which are now – after two decades of wireless mobility – becoming much clearer. The principal economic drivers of wireless systems are the availability and cost of spectrum, the cost of the end-user device, and the acquisition and maintenance of the subscriber (ranging from network management to billing and customer service operations). For a BWA system to be successful, it must be competitive across each of these categories. This demonstrates to operators and end users alike that it represents a viable value in the broadband marketplace, particularly when compared with wire-line or satellite alternatives that require significant capital expenditures to increase capacity or coverage area. 5.2.1 Spectrum as An Input Spectrum use is defined by four parameters, of which only two – power and bandwidth – are usually set by regulators. These parameters determine the capacity and coverage that a particular spectrum band can deliver to an operator for the provision of services to end users. System capacity and coverage essentially determine the number, the size and the cost of the transmitters (including the supporting backhaul network) that an operator needs to deploy in order to deliver the desired set of services. These factors, in turn, establish the financial return threshold of the operator wishing to deploy a competitive BWA network. Spectrum in the range below 3GHz has propagation characteristics that enable wide coverage areas and can more easily overcome interference from foliage, buildings and other obstructions using non-line-of-sight technologies such as beam forming. The ability to provide non-line-of-slight services reduces the number of base stations required to provide coverage in these bands. But experience drawn from mobile services indicates that an increasing customer density requires 76 more base stations to meet the growing demand for network capacity. Ultimately, any viable BWA service will need to enhance both coverage and capacity, but initially it is more important to have greater coverage. It is unlikely that new BWA services will be in such immediate demand that networks will have to be designed to maximize capacity over coverage. Over time, as consumer adoption increases, BWA systems will begin to emphasize throughput and capacity by reducing cell sizes and increasing the number of base stations. There are a number of spectrum bands operating between 0.4 GHz and 5.5 GHz that could help foster the growth of BWA, although each band represents necessary tradeoffs between capacity and coverage. In identifying these bands for new uses such as BWA, the general trend across the globe has been to reclaim the bands from incumbent licensees that have, or will have, the ability to deploy more spectrally efficient equipment that reduces their need for spectrum. One category of reclaimed spectrum comes from government and military operations (1.5-2.4 GHz as well as 5.1-5.8 GHz). In the commercial context, satellite systems (2.0-2.3 GHz) and fixed microwave systems (3.1-3.7 GHz and 2.12.2 GHz) provide an avenue for reclaiming spectrum. The increasing spectral efficiency of the latest technologies, plus the widespread availability of substitute technologies and services (for example, submarine cables and fiber-optic networks) has reduced the demand for spectrum needed to deploy these services. Similarly, broadcast television bands – including the UHF (400-700 MHz) band – and Multi-channel Multipoint Distribution Service (MMDS) bands (2.5 -2.7 GHz) have also been the source for new BWA spectrum in various markets, because newer, more spectrally efficient digital television broadcast standards have been developed. It is relatively easy to identify bands for new uses such as BWA, especially in the context of global harmonization trends that can provide clues to regulators about the most likely future use of a spectrum band. The difficulty lies in transferring these bands from an incumbent licensee to a new one. This paper seeks to help address these transitional issues in a pragmatic C HAPTER 5 Trends in Telecommunication Reform 2006 Box 5.1: Defining Broadband Wireless Access Internationally, the ITU considers broadband wireless access (BWA) to encompass mobile or fixed access technologies that provide connections at speeds higher than the primary rate (e.g. 2 Mbit/s). This encompasses technologies within the IMT-2000 family, as well as newer technologies such as WiMax and WiBro. Nonetheless, it is likely that each country will continue to make its own decision about the definition of BWA given its technological and economic development stage. Singapore’s regulatory authority describes wireless broadband as “an access technology that offers high-speed data access over the air. A wireless broadband network, typically operating at frequency bands less than 6 GHz, provides broadband speeds ranging from 256 kbit/s to tens of Mbit/s. Each base station generally serves an area of up to several square kilometres. Wireless broadband networks can deliver network connectivity to fixed locations using standards like IEEE 802.16d, and in the near future, to mobile users using standards like IEEE 802.16e and IEEE 802.20.” Kenya’s Communications Commission defines broadband fixed wireless access “as intentional radiators that use wideband digital modulation techniques and provide a wide array of high data-rate fixed communications for individuals, businesses, and institutions.” Mauritius uses a three-part definition for BWA, in accordance with ITU-R Recommendations: • Wireless Access systems are broadband radio systems that may be deployed either indoors or outdoors. These systems include: – Fixed wireless access which may be defined as “Wireless access application[s] in which the location of the end-user termination and the network access point to be connected to the end-user are fixed.” – Mobile Wireless Access which may be defined as “Wireless access application[s] in which the location of the end-user termination is mobile.” – Nomadic Wireless Access which may be defined as “Wireless access application[s] in which the location of the end-user termination may be in different places but it must be stationary while in use.” Box 5.2: Spectrum Bands for BWA 450 – 500 MHz (Regions 2 and 3) and 600-1000 MHz (Region 1) – These could be used for broadband mobile access services, given the significantly enhanced propagation characteristics of the band. These bands are under discussion as candidates to be included as IMT-2000 bands during the 2007 ITU World Radiocommunication Conference (WRC). 1.5-2.5 GHz – Many of the bands in this range are currently identified as IMT-2000 bands. They are also under discussion, across all regions, as part of the 2007 WRC process. They could be used for both fixed BWA and broadband mobile services sometimes referred to as “IMT-2000 and beyond” (that is, “3.5G” and “4G” technologies). These bands are also identified for hybrid satellite and terrestrial wireless systems that permit seamless continental roaming for BWA operators. 3.4-3.7 GHz – Allocated across all regions for licensed BWA services. 5.1-5.7 GHz – These are allocated across all regions for unlicensed BWA uses. fashion by creating marketplace incentives that encourage licensees to transfer spectrum to its best and highest use, while at the same time offering services that are competitive for the particular dynamics and context of each country (whether rural or urban, developed or developing markets). 5.2.2 End User Costs and Devices End-user take-up of wireless services is largely a function of the cost of the end-user device and of the applications that work on that device. Common sense says that the lower the costs of the handset, the more likely consumers are to adopt the underlying service. Over the last 20 years – but increasingly over the last five years – the mobile marketplace has demonstrated that consumer adoption in developed markets has accelerated when device costs have been below the USD 200 barrier. Although C HAPTER 5 this threshold amount might not be practical for developing markets, it is important to understand that mass adoption of end-user devices in developed countries has the positive scale effects that can easily translate to lower costs for end-user devices distributed in developing economies. Additionally, wireless equipment manufacturers have also learned from the mobile market and are now offering end-user devices with limited functionality to developing country markets in order to further accelerate the manufacturing scale effect that reduces the overall cost of making these devices. 5.2.3 Service Delivery and Management Reducing the cost and complexity of applications, and the associated service delivery mechanisms, that work on wireless devices has a significant effect on consumer adoption and leads to accelerating the scale economies of manufacturing the 77 Trends in Telecommunication Reform 2006 devices. In all geographic markets, the advent of flat-rated voice services and the use of prepaid pricing plans have increased the rate of adoption of wireless mobile devices and led to significant economies of scale. Additionally, the drive to add IP services to wireless devices will increase the rate of consumer adoption by making wireless access at the service layer indistinguishable from wired alternatives. The impact of the IP on BWA service delivery can be best understood by looking at the IEEE 802.16 WiMAX standards development process currently under way. The key innovation of the 802.16 process has been to simplify the communications protocol stack, so that economies of scale can take place in developing radios and the associated chipsets – the most expensive elements – while providing greater freedom for developing applications at the service layer. 5.3 The Technology Revolution In addition to understanding the economics of spectrumbased services, regulators should also have a working understanding of the revolutionary changes in technology – many of them driven by micro-electronics – that are permanently altering radio systems and spectrum engineering. 5.3.1 Applied Information Theory in Radio System Design Spectrum represents the temporal and spatial opportunities to transmit information using the electromagnetic spectrum. The range of frequencies in the electromagnetic spectrum is typically divided into eight bands, spanning from 3 Hertz to 300 GHz. The characteristics of signal propagation depend on the frequency band on which the signal is transmitted. These signals are typically transmitted by an antenna device that transmits energy in one or multiple directions. Shannon’s capacity theorem, the fundamental theorem of radio communications design, states that the rate of information transfer by a radio is limited by the available bandwidth and the ratio of signal to noise within the band. Within this physical limit, the spectrum resources available to a radio are determined by four factors: (1) specified bandwidth, (2) the allowable power or energy emission within the band, (3) the bit error rate acceptable to the end user and (4) the throughput desired by the consumer. Most regulators have, up until now, only defined the power limits and the bandwidth and left the other two factors to be determined by the marketplace. Traditional radio systems were designed using analogue equipment and had limited computational power available to them. The results were radios that operated using very narrow throughput and bit error rate (that is, quality-of-service demands) parameters and that were highly sensitive to the operating environment. Traditional radios were not flexible and could not be used to take on new tasks or operate in new environments. This made them unsuitable for broadband networks. 78 5.3.2 Advances in Microprocessor Technology The advent of miniaturized and powerful computing resources available through digital signal processors (DSPs), non-programmable hardware computing components and field programmable gate arrays (FPGAs) has made it possible to create radio systems that can dynamically change along all four vectors (bandwidth, power, throughput, and bit error rate) that define spectrum. By using powerful microprocessors to dynamically change the four variables, radio system designers can now create new spectrum capabilities where none had previously existed (see Figure 5.3). By incorporating digital and microprocessor technologies into the design fabric of radio systems, engineers are now creating radios that can dynamically operate outside the constraints of a particular intersection of bandwidth and power limits normally set by regulators. For example, a radio designed to optimally perform at design PB (in the middle of the circle in Figure 5.3) can now be redesigned, on the fly, to operate within any of the five possible regions surrounding the optimal point. Each of the five regions represents a trade-off between power, bandwidth, throughput and bit error rate. The light areas (those below the design line) represent increased performance in the form of either throughput or bit error rate, in exchange for reduced power and bandwidth. In contrast, the darker areas above the design line provide for increased power and bandwidth utilization but poorer performance in terms of throughput and bit error rate. Computing resources enable radios to make these impromptu tradeoffs, increasing the flexibility of these systems to handle different types of market environments without having to change radios. The net result is that consumer radios are becoming more flexible and highly adaptable. From a spectrum regulator’s perspective, the additional flexibility and adaptability of the technologies means that new spectrum resources must be accounted for and usage rights must be assigned. 5.4 Adapting Spectrum Regulatory Models for BWA Keeping in mind the issues of spectrum economics and technological advances, spectrum managers in the new broadband era face the challenge of achieving three separate but interrelated goals, simultaneously: (1) To provide the proper incentives for spectrum licensees, both existing and new, to invest in broadband services; (2) To expand consumer choices by enabling sustainable competition for similar services across multiple technological platforms; and (3) Implementing policies that discourage wasteful and anticompetitive behaviour resulting from uneconomic speculation and hoarding of spectrum. 5.4.1 Existing Regulatory Models There are essentially three conventional methods of managing spectrum to attempt to achieve these goals. First, there is the command and control model, in which strict operating parameters and service rules define licensees’ spectrum rights. C HAPTER 5 Trends in Telecommunication Reform 2006 Figure 5.2: From VLF to EHF The ultimate consumer broadband experience will be based on a multi- platform IP network with BWA as its core. Frequency Range Description 3 to 30 Khz Very low frequency band (VLF) 30-300 KHz Low frequency band (LF) 300 KHz-3 MHz Medium frequency band (MF) 3 MHz-30 MHz High frequency band (HF) 30 MHz-300 MHz Very high frequency band (VHF) 300 MHz-3 GHz Ultra high frequency band (UHF) 3 GHz-30 GHz Super high frequency band (SHF) > 30 GHz Extremely high frequency band (EHF) Figure 5.3: Changing the Technology Paradigm New technologies permit new spectrum uses to be created by trading off power or bandwidth with throughput and bit error rate dynamically on the same radio. An alternative licensing model is the exclusive rights model, in which a licensee is given rights – which may be (within limits) transferable and flexible – to use a specified spectrum band within a defined geographic area and during a fixed period of time. In the current understanding of the exclusive rights model, spectrum use rules are primarily technical (as opposed to service-based), because they are designed only to protect the spectrum licensee and adjacent spectrum users from generating or receiving harmful interference – not to mold or develop a certain service or market structure. The third regulatory model is the commons model, or unlicensed model, which allows unlimited numbers of users to share a block of frequencies without giving any one user or group of users priority or individualized rights of use. Uses are limited only by technical criteria that specify bandwidth and C HAPTER 5 emitted power but provide no enforceable rights to protect against interference. A well-known form of commons approach has been the deployment of WLANs using Wi-Fi technology. Having defined these models, it must be said that none of them is adequate by themselves to address today’s rapidly evolving world of broadband spectrum. The command and control approach grants spectrum rights on such narrow grounds that they are often of limited utility for broadband opportunities. Plus, the model requires constant government intervention, with attendant delays and hassles, to change the operating rules of the licences. The exclusive use model has compelling arguments for providing market incentives to new entrants. But it also creates perverse incentives for incumbent licensees to engage in speculative or anti-competitive hoarding of spectrum, as a way to thwart real or perceived competi- 79 Trends in Telecommunication Reform 2006 Box 5.3: Software Defined Radios, Adaptive Array Systems and Mesh Networks The availability of computing resources for radio signal processing has enabled three exciting advances in radio technology: software defined radios (SDRs), Adaptive Array Systems (AASs) and Mesh Networks. SDRs are essentially radios that can be re-configured and adapted at the point of use and for different applications. This results in a multi-band, multipurpose radio. In the ideal software radio scenario, the radio signal is directly converted to digital signals at the antenna. All other radio functions are performed in the digital domain by software on the host platform, which might be a flexible digital signal processing (DSP) chip, a computer or even a mobile telephone. Unlike conventional antennas, where the energy is diffuse, AASs use computational algorithms to direct energy to parallel and simultaneous channels within the same frequency bands. This exciting technology uses computing to combine an array of antennas and radio frequency energy in order to detect and calculate radio signals on a highly refined basis. This allows the system to suppress interfering signals and automatically track desired signals. The result is a significant increase in overall system capacity by enabling greater re-use of the same radio frequencies. Mesh networks were developed through military communications technology research. Also known as ad hoc or “infrastructure-free” networks, they are designed to maintain high quality-of-service in unstructured or harsh spectrum environments. Mesh networks eliminate the need for a spoke and hub radio network and allow one subscriber to communicate with another without requiring synchronization from the base station (See Box 3.5 in Chapter 3). Because mesh networks lack any common infrastructure, they represent new spectrum capabilities that are ungovernable from a central point, making them the latest challenge to regulators’ ability to manage and allocate spectrum use rights. tion. Finally, the commons approach – which today provides low entry barriers and can result in significant scaling in terms of consumer adoption – can become self-limiting through the lack of enforcement mechanisms to manage and prevent overcrowding and overuse. Rather than adopting any of these models in isolation, regulators can adapt and combine them in ways that are appropriate to the circumstances. Above all, regulators can condition the granting of new spectrum resources or rights upon demonstrations that they will be used to increase overall competition for broadband services across all platforms. Moreover, spectrum rights or access can be granted to entities that prove they are capable and willing to use them economically, because they are willing to experience the real and quantifiable opportunity costs of these spectrum rights. This pragmatic approach insures that market forces are harnessed to achieve the goal of deploying BWA systems as rapidly and as efficiently as possible. 5.4.2 Re-Examining the Models At this juncture, regulators may wish to review the existing models to see how they might be updated or adapted to address the newer technological and market realities of the BWA era. The following subsections consider each model in turn. 5.4.2.1 The Command-and-Control Model Some experts view the command-and-control model as simply a means to exercise tight government control over spectrum use. A more honest assessment, however, is that the approach grew out of the realities of conventional radio design during the last century. Essentially, those realities called for four steps, all of them bureaucratic: (1) allocation, (2) enactment of service rules, (3) assignment (licensing), and (4) enforcement of the rules and license requirements. 80 The regulator’s task is never done under a command-andcontrol regime. Regulators must continually revisit and referee the spectrum environment as new radios are introduced into the marketplace. In order for a new radio system to enter the market, the regulator must address everything from system configuration, co-channel and adjacent channel effects, power flux density, coding, out-of-band emissions, and innumerable other technical criteria. Of course, the cost of the regulator’s involvement is the time it takes to transfer spectrum rights to their best possible uses. Given the rapid rate of technological change, the time lags associated with government allocation processes amount to a significant drag on the ability of licensees to rapidly deploy new BWA systems. 5.4.2.2 The Exclusive Use Model In essence, this model gives licensees the right to use their spectrum however they see fit, as long as they follow technical rules that are designed to protect the licensee from causing or receiving interference. In its purest form, the model confers something like a fee-simple “ownership” of spectrum (with technical covenants) for a set period of time. Licensees face few or no restrictions on marketing their spectrum rights, including through secondary market trading of the usage rights. Proponents of the exclusive licensing approach tout the economic incentives it provides for licensees to seek the most productive and profitable use of spectrum. Detractors, however, fear that the model could lead to hoarding or under-investment by incumbent providers that seek to raise costs for competitors who need spectrum as an input to their own offerings. Without competition, there may be few incentives for incumbents to develop new services or more spectrum-efficient systems. Under the exclusive use model, incumbents left to their own devices can simply buy up spectrum rights, with no guarantee they will use those resources to advance innovative and C HAPTER 5 Trends in Telecommunication Reform 2006 competitive wireless systems (including BWA networks) in the marketplace. 5.4.2.3 The Spectrum Commons Model The benefit of the commons model is that it removes the input costs of obtaining spectrum from the economic equation of market entry. Service providers can begin service at lower costs, then scale up rapidly. End users face lower service prices and can more easily afford handsets and terminal devices. Regulators wanting to jumpstart BWA deployment might easily select the commons approach, especially in rural and underdeveloped areas where factors such as low population density and lack of backhaul infrastructure might otherwise limit broadband service deployment and take-up. Of course, the commons model has risks. Regulators must consider the potential long-term effects of reducing entry barriers and eliminating licensing. Commons models hold the keys to their own undoing, because the very success in rapidly deploying systems and proliferating users can lead to interference, crowding and an unstable spectrum environment. This overcrowding phenomenon is more commonly known as the “tragedy of the commons.” Regulators can mitigate the risk by implementing power limits, modulation requirements, backoff schemes, and other measures. Of course, imposing new technical rules by regulatory fiat might effectively convert the commons approach into something more closely resembling the classical command-and-control model, defeating the very basis for establishing a commons model in the first place. Some regulators are using a mix of licensed and unlicensed spectrum to address the need for low-cost broadband services in rural areas. Ireland, for example, allows small operators to launch services in rural areas using unlicensed spectrum. When the operators establish a successful business case, they can migrate to licensed spectrum (See Box 5.4). 5.4.3 A Flexible Approach for New Times In the broadband context, the fundamental future challenge for spectrum regulators is how to efficiently and effectively distribute new spectrum resources that technology is making available. A pragmatic model, unencumbered by any particular spectrum theology but able to draw from them all, seems the optimal way to meet this complex challenge. This pragmatic approach takes into account the fact that technology is creating new spectrum capabilities and resources faster than most regulators can redistribute spectrum rights using traditional means. The modern spectrum regulator needs a practical, outcome-oriented policy framework. The desired result, in this case, is rapid deployment of broadband services, not a grand theory about the rights involved in spectrum use. The problem with the traditional spectrum management models is that they focus on defining usage rights of spectrum licensees without articulating how to help achieve the underlying policy goals of the regulator. Today’s broadband markets feature both high levels of spectrum licence incumbency and low levels of inter-modal competition. A pragmatic approach that rewards economic risktaking by spectrum holders will reduce the likelihood that they C HAPTER 5 will “warehouse” spectrum simply for its perceived scarcity value. So what constitutes a pragmatic approach? Regulators can start by offering to grant spectrum holders maximum flexibility for their spectrum rights on the condition they meet two threshold obligations: (1) They must demonstrate, even before gaining any new spectrum rights, their commitment to increasing intermodal broadband competition; and (2) They must agree to license conditions that positively enforce the opportunity cost of their newly allocated spectrum rights. 5.4.3.1 Defining Flexible Spectrum Rights In this pragmatic model, flexibility is defined as giving licensees enough freedom to respond to market signals and demand, within technical parameters designed to avoid harmful interference with adjacent licensees. As the universe of wireless services expand, licensees must use these newfound capabilities to provide new capabilities that will be demanded from broadband networks. These capabilities include: • Providing either portable or mobile services to increase the personalization of communication services and enhance societal and individual productivity; • Achieving spectral efficiency and overall network efficiency to create economic returns on investments; • Reducing the cost of the customer equipment (handsets and terminals) in order to encourage rapid and widespread consumer acceptance; and • Enabling integration and convergence with other platforms to provide seamless connectivity. With the advent of new technologies, licensees can make tradeoffs between power, bandwidth, throughput and bit error rate, in order to provide viable offerings in the broadband marketplace. Furthermore, flexible spectrum rights will allow licensees to apportion and share spectrum access with others, facilitating the availability of BWA services and increasing competition. 5.4.3.2 Creating Competitive Broadband Markets A practical approach to BWA spectrum licensing calls for granting spectrum licensees not only technical flexibility to create more spectrum capabilities and resources, but also operational autonomy to enter new lines of business whenever technology allows them to. Regulators should grant autonomy to enter allied or new markets as long as doing so would enhance competition and would enable the licensee to make the fullest, most efficient economic use of the spectrum. If the spectrum regulator simply grants technical and operational flexibility, there is no guarantee that the licensee will choose to deploy services that will add to competition. But granting flexibility with a concomitant obligation to provide competitive inter-modal broadband services would encourage licensees to enter and aggressively compete in emerging markets, such as the BWA market. 81 Trends in Telecommunication Reform 2006 Box 5.4: Eire’s Response to BWA Ireland contributed several “principles” to the 2005 GSR Best Practice Guidelines on Spectrum Management to Promote Broadband Access. Here are excerpts, discussed as “Principle Two” and “Principle Three.” Principle Two: Balancing the Use of Licensed and Licence-Exempt Spectrum. A number of local initiatives have taken effect to provide broadband access using licence-exempt spectrum. In Ireland, from July 2002, wideband data transmission systems for the provision of fixed wireless access networks/metropolitan area networks (FWA/MAN) have been permitted in the 5.8 GHz (5725 – 5875 MHz) band on a licence-exempt basis, provided that the maximum radiated power does not exceed 2W eirp. This higher power level, over and above the current European harmonized standard, has increased the coverage achievable and hence the utility of the 5.8 GHz band. This initiative provided some impetus for small market players to enter the market at very low cost, to gain some experience of broadband provision and to test-market demand for various broadband services. A number of successful operations using the licence-exempt spectrum, having proved their business case, have now moved to licensed spectrum. [Irish regulator] ComReg has committed itself to continue to identify appropriate spectrum allocations, both licensed and licence-exempt, for Wireless Access Services that are supported by choice and availability of equipment. Principle Three: Access to Cost Effective Backhaul Infrastructure. Just as consumers in semi-rural or rural areas may not have access to ADSL, the providers of wireless broadband are hampered by the lack of cost-effective backhaul infrastructure, e.g., fibre. The alternatives such as satellite or point-to-point wireless fixed links are significantly more expensive compared to the costs of providing a wireless base station for broadband access. In Ireland, consideration is being given to permitting the use of point-to-point links within the broadband access spectrum to provide a cost effective backhaul operation. While this is difficult to accomplish from a spectrum management viewpoint, it is seen as a viable alternative to the traditional and more expensive alternatives. Ireland’s contribution to the 2005 GSR Best Practice Guidelines is available at http://www.itu.int/ITU-D/treg/Events/ Seminars/2005/GSR05/consultation.html. 5.4.3.3 In addition to promoting competition, flexibility should be harnessed to enforce on the licensees the opportunity cost of using spectrum. Generally, the goal here is to give licensees price signals about the value of their spectrum holdings that discourage them from engaging in uneconomic hoarding of spectrum. Although regulators can combat hoarding by simply recapturing spectrum, there are other, more productive mechanisms for enforcing the opportunity cost of spectrum. Singapore’s distribution of spectrum for BWA services was conducted in open and transparent fashion. IDA had earmarked the 2.3 and 2.5 GHz bands for wireless broadband services in February 2004. The following April, IDA launched a public consultation proceeding on spectrum allocation and the licensing framework for wireless broadband services. IDA released licensing details for broadband wireless services in February 2005, notifying interested parties that it would hold an auction if demand exceeded the supply of available spectrum. One of the more popular methods in the last decade has been the use of auctions. Unfortunately, the effectiveness of auctions has diminished as a result of the growth of the wireless industry and the availability of large amounts of capital. This has desensitized the industry to price signals coming from standard auctions. Furthermore, in some cases auctions have been used to increase national revenues rather than as a tool for enforcing market discipline. This has bred some unsustainable auction results, creating uncertainty in the markets. Nonetheless, adjusting for these two factors, transparent auction processes are a viable method of enforcing the opportunity cost of using spectrum. Enabling secondary markets for trading spectrum rights also has the effect of enforcing the opportunity cost of spectrum. Allowing the rapid transfer of spectrum rights between private parties that value these rights differently creates price signals that encourage licensees to use the spectrum to provide competitive BWA services, because these uses will be the most valued in the current marketplace. It is important to remember that BWA services are the core component of a general set of broadband services that consumers would utilize. Providing the marketplace the flexibility to combine BWA services with other platforms is more likely to increase consumer welfare than by restricting such combinations. In May 2005, for example, the Info-Communications Development Authority (IDA) of Singapore successfully auctioned spectrum in the 2.3 GHz and 2.5 GHz frequency bands for broadband wireless access services. The starting price for each of the spectrum blocks put up for auction was SGD 1,000, and the highest closing price bid was SGD 550,000. IDA decided to grant successful bidders a 10-year licence, in order to provide investment certainty. Additionally, with secondary markets for spectrum rights gaining greater acceptance among licensees and regulators, experts in the field are now considering how to combine auctions and secondary markets to create new mechanisms that rapidly drive spectrum to its highest and best use. Two-sided auctions, for example, let regulators and spectrum incumbents combine their spectrum resources into a simultaneous auction that transparently recalibrates both the geographic and tech- 82 Enforcing Opportunity Costs C HAPTER 5 Trends in Telecommunication Reform 2006 nical limits on spectrum rights. Two-sided auctions are being developed as a way of smoothly restructuring bands to allow new, innovative services like BWA. • Adopting harmonized frequency plans defined by ITU-R recommendation in order to facilitate the implementation of competition. Another more traditional, but equally efficient, method of enforcing opportunity cost is to impose build-out or construction obligations on licensees. Although these build-out obligations are effective in imposing costs, they tend to be blunt regulatory instruments because they are conditioned on prior assumptions about marketplace conditions. But combined with secondary spectrum markets, these obligations can serve a valuable role in dissuading licensees from hoarding spectrum. • Embracing the principle of minimum necessary regulation, where possible, to reduce or eliminate regulatory barriers to spectrum access, including simplified licence and authorization procedures for the use of spectrum resources. In shared license bands, the sharing rules developed by regulators are the best method of enforcing the opportunity cost of using the spectrum. These rules generally determine the level of barriers to entering the shared bands, the amount of interference permitted between and among users of the band, and the power levels permitted (and therefore the coverage range). These key parameters all help to define the opportunity cost of using the spectrum. In the case of unlicensed bands, low power limits combined with the lack of interference management circumscribe the use of the bands and encourage a high degree of efficiency. 5.5 Defining Best Practices Spectrum regulators need also to look at a number of spectrum management best practices developed over the last two or three decades as tools that can be used to encourage BWA deployment. This section explores several versions of best practices, beginning with those specifically endorsed by the world’s regulators, as members of the Global Symposium for Regulators (GSR). 5.5.1 The GSR Guidelines Recognizing that spectrum is a scarce resource that needs to be managed effectively and efficiently, the delegates to the 2005 GSR, held in Yasmine Hammamet, Tunisia, drafted a set of best practice guidelines for spectrum management to promote broadband access. The 2005 guidelines continue the tradition of best practices agreed to at the GSR conferences in 2003 and 2004 on promotion of universal access, and lowcost broadband services, respectively.2 The 2005 guidelines are reprinted here in full: “We, the regulators participating in the 2005 Global Symposium for Regulators, have identified the following: 1. Facilitate deployment of innovative broadband technologies: Regulators are encouraged to adopt policies to promote innovative services and technologies. Such polices may include: • Managing spectrum in the public interest. • Promoting innovation and the introduction of new radio applications and technologies. • Reducing or removing unnecessary restrictions on spectrum use. C HAPTER 5 • Allocating frequencies in a manner to facilitate entry into the market of new competitors. • Ensuring that broadband wireless operators have as wide a choice as possible of the spectrum they may access, and releasing spectrum to the market as soon as possible. 2. Promote transparency: Regulators are encouraged to adopt transparent and non-discriminatory spectrum management policies to ensure adequate availability of spectrum, provide regulatory certainty and to promote investment. These policies may include: • Carrying out public consultations on spectrum management policies and procedures to allow interested parties to participate in the decision-making process, such as: public consultations before changing national frequency allocation plans; and public consultations on spectrum management decisions likely to affect service providers. • Implementing a stable decision-making process that provides certainty that the grant of radio spectrum is done in accordance with principles of openness, transparency, objectivity – based on a clear and publicly available set of criterion which is published on the regulator’s website –and non-discrimination and that such grants will not be changed by the regulator without good cause. • Publication of forecasts of spectrum usage and allocation needs, in particular on the regulator’s website. • Publication of frequency allocation plans, including frequencies available for wireless broadband access, in particular on the regulator’s website. • Publication of a web-based register that gives an overview of assigned spectrum rights, vacant spectrum, and licence-free spectrum, balancing any concerns for confidential business information or public security. • Clearly defining and publishing radio frequency spectrum users’ rights and obligations, including on the regulator’s website. • Clearly defining and publishing licensing and authorization rules and procedures, including on the regulator’s website. • Publication of legal requirements for imported equipment and foreign investment, in particular on the relevant government agency website. 83 Trends in Telecommunication Reform 2006 3. 4. 84 Embrace technology neutrality. To maximize innovation, create conditions for the development of broadband services, reduce investment risks and stimulate competition among different technologies, regulators can give industry the freedom and flexibility to deploy their choice of technologies and decide on the most appropriate technology in their commercial interest rather than regulators specifying the types of technologies to be deployed, or making spectrum available for a preferred broadband application, taking into consideration the need for and cost of interoperable platforms. • Regulators can take into consideration technological convergence, facilitating spectrum use for both fixed and mobile services, ensuring that similar services are not subject to disparate regulatory treatment. • Regulators can provide technical guidelines on ways to mitigate inter-operator interference. • Regulators can ensure that bands are not allocated for the exclusive use of particular services and that spectrum allocations are free of technology and service constraints as far as possible. Adopt flexible use measures: Regulators are encouraged to adopt flexible measures for the use of spectrum for wireless broadband services. Such measures may include: • Minimizing barriers to entry and providing incentives for small market players by allowing broadband suppliers to begin operations on a small scale at very low cost, without imposing onerous rollout and coverage conditions, to enable small market players to gain experience in broadband provision and to test market demand for various broadband services. • Recognizing that wireless broadband services may be used for both commercial and non-commercial uses (e.g., for community initiatives or public and social purposes) and that broadband wireless spectrum can be allocated for non-commercial uses with lower regulatory burdens, such as reduced, minimal or no spectrum fees; regulators can also allocate and assign spectrum for community or non-commercial use of broadband wireless services. • Recognizing through flexible licensing mechanisms that wireless broadband technologies can provide a full range of converged services. • Adopting lighter regulatory approaches in rural and less congested areas, such as flexible regulation of power levels, the use of specialized antennas, the use of simple authorizations, the use of geographic licensing areas, lower spectrum fees and secondary markets in rural areas. • Recognizing that in markets where spectrum scarcity is an issue, the introduction of mechanisms such as secondary markets can in some cases foster innovation and free up spectrum for broadband use. • Recognizing the role that both non-licensed (or licenceexempt) and licensed spectrum can play in the promotion of broadband services, balancing the desire to 5. 6. 7. 8. 9. foster innovation with the need to control congestion and interference. One measure that could be envisaged is, for example, to allow small operators to start operations using licence-exempt spectrum, and then move to licensed spectrum when the business case is proved. • The promotion of shared-use bands, as long as interference is controlled. Spectrum sharing can be implemented on the basis of geography, time or frequency separation. • Developing strategies and implement mechanisms for clearing bands for new services as appropriate. • Recognizing the need for cost-effective backhaul infrastructure from rural and semi-rural areas, regulators can consider the use of point-to-point links within other bands, in line with national frequency plans, including any bands for broadband wireless access. Ensure affordability. Regulators can apply reasonable spectrum fees for wireless broadband technologies to foster the provision of innovative broadband services at affordable prices, and minimize unreasonable costs that are barriers to entry. Higher costs of access to spectrum further reduce the economic viability in rural and underserved areas. Auctions and tender processes can also be managed to meet these goals. Optimize spectrum availability on a timely basis. Regulators are encouraged to provide effective and timely spectrum use and equipment authorizations to facilitate the deployment and interoperability of infrastructure for wireless broadband networks. Regulators are also encouraged to make all available spectrum bands for offer, subject to overall national ICT master-plans, in order that prices are not pushed up due to restrictive supply and limited amount of spectrum made available and so that opportunities to use new and emerging technologies can be accommodated in a timely manner. In addition, special research or test authorizations could be issued to promote the development of innovative wireless technologies. Manage spectrum efficiently. Spectrum planning is necessary to achieve efficient and effective spectrum management on both a short-term and long-term basis. Spectrum can be allocated in an economic and efficient manner, and by relying on market forces, economic incentives and technical innovations. Regulators can promote advanced, spectrum-efficient technologies that allow coexistence with other radio communications services, using interference mitigation techniques (for example, dynamic frequency selection). Regulators can provide swift and effective enforcement of spectrum management policies and regulations. Ensure a level playing field. To prevent spectrum hoarding, especially by incumbents, regulators can set a limit on the maximum amount of spectrum that each operator can obtain. Harmonize international and regional practices and standards. Regulators can, as far as practicable, harmonize effective domestic and international spectrum practices and utilize regional and international standards whenever C HAPTER 5 Trends in Telecommunication Reform 2006 Figure 5.4: Globally Harmonized Spectrum: IMT-2000 possible, and where appropriate, reflect them in national standards, balancing harmonization goals with flexibility measures. This could include harmonization of spectrum for broadband wireless access that could generate economies of scale in the production and manufacture of equipment and network infrastructure. Likewise, global harmonization of standards to ensure interoperability between different vendor’s user terminals and network equipment can be promoted. The use of open, interoperable, nondiscriminatory and demand-driven standards meets the needs of users and consumers. Coordination agreements with neighbours, both on a bilateral or multilateral basis, can hasten licensing and facilitate network planning. 10. Adopt a broad approach to promote broadband access. Spectrum management alone is inadequate to promote wireless broadband access. A broad approach, including other regulatory instruments; such as effective competitive safeguards, open access to infrastructure, universal access/service measures, the promotion of supply and demand, licensing, roll-out and market entry measures; the introduction of data security and users’ rights, where appropriate; encouraging the lowering or removal of import duties on wireless broadband equipment; as well as development of backbone and distribution networks is necessary.” 5.5.2 Additional Best Practices In addition to the GSR guidelines, it is useful to more fully explore several best practices, to identify their benefits, as well as their potential limitations, in advancing the cause of consumer broadband services. This subsection will analyse the following best practices: • Harmonizing spectrum allocations on a global basis to increase economies of scale at product and the service layers and to reduce end-user costs. • Fostering the use of standards-based technologies to increase economies of scale. • Allocating spectrum and developing technical rules that encourage adjacent spectrum users to have compatible technical characteristics, as a way of limiting interference and maximizing use of spectrum (“good neighbour” policies). • In shared spectrum bands, encouraging or mandating technical standards that foster cooperative systems designed to reduce harmful interference. C HAPTER 5 • Develop efficient and transparent licensing rules and processes that allow for restructuring of incumbent spectrum bands in order to implement harmonization goals. 5.5.2.1 Global Harmonization of Allocations Broadband spectrum regulators can significantly drive down the costs of broadband wireless services and boost subscriber numbers by harmonizing spectrum allocations with global practices. Harmonization allows equipment manufacturers to benefit from economies of scale by manufacturing equipment for large pools of customers in multiple countries. Of course, the ideal of global harmonization, as depicted in Figure 5.4 (IMT-2000 bands) can lead to a significant amount of incumbent dislocation – with the regulator feeling the attendant political backlash. This is especially true in developed countries with a lot of entrenched incumbents, most of which feel they have rights under the exclusive spectrum use model. Harmonization can usually be achieved only through transparent licensing systems and significant political willpower. Needless to say, participation in the ITU and regional organizations can help provide the economic and political support to require relocation of incumbents from newly harmonized bands. For example, ITU-R Study Group 8 and its Working Party 8F are currently exploring potential allocations for BWA technologies, including WiMAX. Governments need to participate in these ITU groups, as well as in the industryled groups that pioneer standards. This will give spectrum managers advanced warning about the global direction of these technological developments, so they can establish appropriate spectrum regulations before the standards become widely deployed. 5.5.2.2 Fostering Standards-Based Technologies In order to maximize their spectrum allocation decisions, spectrum regulators must closely follow and support the norms and recommendations of multiple standards-setting organizations, including: (a) the Institute of Electrical and Electronics Engineers (IEEE); (b) the European Telecommunications Standards Institute (ETSI); (c) the Wi-Fi Alliance (for 802.11 products); and (d) the WiMAX Forum (for 802.16 products). Similar to global harmonization, the effect of embracing standards-based technology development is to significantly reduce the cost of the devices by reducing the number of pro- 85 Trends in Telecommunication Reform 2006 prietary components. This leads to faster adoption of the equipment and the associated services. There are many benefits to a standards-based approach, but it is also important to remember that it is a consensus-driven process. If not managed carefully, the standards process can essentially commoditize innovation and could even become a de facto form of economic regulation, especially if regulators embed the standards into their regulatory systems. Broadband regulators also must be mindful that a standards-based approach, with its natural tendency towards compromise, could potentially lead to suboptimal results. These unintended “costs” must be part of a broader policy tradeoff in embracing any particular standard. Generally, regulators should avoid embedding standards in their policies and rules without an extremely compelling policy rationale. 5.5.2.3 ‘Good Neighbour’ Allocations This best practice generally involves grouping spectrum allocations based on interference and other technical compatibility characteristics. This good neighbour “zoning” practice can enhance the compatibility of spectrum uses, based on power or bandwidth characteristics, maximizing overall capacity and reducing transaction costs. In a fashion similar to the global harmonization of spectrum allocations, this practice also raises the potential for significant relocation costs, which regulators have to consider in making any decision to realign spectrum allocations. 5.5.2.4 Voluntary Sharing Guidelines for Unlicensed Bands For users of shared spectrum – such as those in unlicensed bands – regulators can encourage voluntary coordination to better manage any interference or capacity issues. Users of these bands should understand that the alternative to self-regulation might be reverting to a command-and-control model that would deny them service and technology flexibility. 5.5.2.5 Infrastructure Sharing Regulators can also enhance wireless broadband adoption by inducing licensees to share infrastructure such as towers and backhaul facilities. Infrastructure sharing between wireless systems promotes efficiency, reduces deployment costs and reduces environmental impacts by avoiding the construction of duplicative facilities. 5.5.2.6 Setting Different Power Limits for Rural Areas Regulators should adopt different rules for spectrum used in different geographic markets. In lower-density environments, such as rural areas or under-served communities, there is less opportunity for interference. So it may make sense to allow transmitters to operate at higher power levels. Similarly, regulators can increase the size of the bandwidth allocated to broadband services in these areas in order to increase capacity. With limited competition for spectrum in these areas, granting flexibility might provide better economic incentives for the licensee to deploy a BWA network. Ireland’s efforts to grant rural BWA operators greater flexibility with regard to spectral power limits has enabled the country to meet the broad- 86 band demands of its rural population. In addition, Ireland has endeavoured to keep licensing obligations as low as possible to reduce barriers to entry (See Box 5.5). 5.5.2.7 Transparent Licensing Systems and Processes Another best practice is for regulators to establish transparent and automated licensing procedures and records in order to reduce transaction costs associated with facilitating the highest and best use of spectrum rights. As part of their licensing efforts, regulators should periodically test, analyse, and audit spectrum resources to measure how efficiently incumbents are using it and whether there are interference issues. Regulators can use this information to form improved sharing and interference rules and regulations, as well as to expand spectrum capabilities and permit new forms of uses within the band for either the incumbents or new licensees. 5.5.3 Technology Neutrality Technology neutrality is usually understood to be when regulators apply rules and regulations in a way that does not favour one type of technology over another. Clearly, this concept could be at odds with some of the other best practices, such as global harmonization, adopting standards-based technologies and applying good-neighbour allocation rules, which by their very nature tend to favour particular technological choices. From the perspective of the regulator as a resource manager, full technological neutrality is an impossible goal, because the desire to achieve efficiency and rapid utilization of the spectrum ultimately requires decisions that point to particular technology paths. Promoting a standard or a particular spectrum band or its configuration, directly or indirectly, obliterates the notion of neutrality. Similarly, creating a harmonized spectrum band and associated service rules will also tend to favour particular technologies. So there is an inherent contradiction between the goal of technological neutrality and the function of the spectrum regulator as a resource manager. Fortunately, pragmatism once again comes to the rescue. A spectrum regulator has to play different roles that lead to different conclusions about technological neutrality. On the one hand, the spectrum regulator is a resource manager concerned with optimizing the efficient use of a scarce resource. On the other hand, the spectrum regulator is a policy advocate trying to achieve social policy goals such as universal access/service and reducing the Digital Divide. A practical solution to the conundrum would apply technological neutrality only to the means used to achieve macro policy goals, rather than the means for managing the spectrum resource. Technological neutrality is paramount only for the means applied to achieve broad social policies such as attaining universal broadband access. To achieve that goal, any combination of available technologies and resources can be enlisted. One example of effective balancing between the goal of technology neutrality and pragmatism can be found in the public consultation process of the Office of the Telecommunications Authority (OFTA) in Hong Kong, China (See Box 5.6). C HAPTER 5 Trends in Telecommunication Reform 2006 Box 5.5: Eire’s Response to BWA, Part Two Ireland’s response in the process of compiling the 2005 GSR Best Practice Guidelines on Spectrum Management to Promote Broadband Access also addressed the issue of reducing licensing obligations as well to lower market-entry barriers. Principle One: Barriers to entry should be as low as possible Our [Ireland’s] experience indicates that regulators should minimize barriers to entry in this area by allowing broadband suppliers to begin operations on a small scale, and not imposing onerous rollout and coverage conditions. Ireland has awarded national licences in the past for broadband wireless access that incorporated rollout and coverage obligations. But none of the licensees were able to make a viable business case and, consequently, rollout of services was less than satisfactory. In 2004 ComReg announced a new scheme for the licensing of broadband fixed wireless access services in local areas. Each local service area was defined by a 15 km radius circle from a base station, with an interference zone extending to a 30 km radius, at the perimeter of which a certain field strength should not be exceeded in order to limit interference into adjacent areas. Since its inception, 110 licences have been granted on a first-come, first-served basis. The success of this approach, compared with the earlier attempt at national licences, is reflected in an increase of 43 per cent of customers in the last six months. One of the key reasons for the success is that operators only take out licences for areas in which they are able to develop a viable business case and, as there is no national network rollout obligation, all attention is focused on the local area. Initial concerns that rollout would only occur in urban areas (due to high population) have proved to be unfounded as small entrepreneurs and local community groups have taken up the challenge to supply broadband access to many rural areas where ADSL is not available. Current rollout is shown in Figure 5.5. Figure 5.5: BWA Coverage Areas (Circles) in Ireland 5.6 Case Study: BWA Spectrum Allocation in Mauritius In order to gather all of the threads together in a real-world example, this chapter concludes with a comprehensive review of a major BWA allocation decision by the Mauritius Information and Communication Technologies Authority (ICTA). During the first half of 2005, ICTA made a series of decisions to establish the future course of BWA services in this fast growing island economy. Although it is too early to know the results of ICTA’s allocation decisions, a brief review of the Authority’s processes and methodology reveals a regulator that has adopted key best practices and made pragmatic tradeoffs that should enable BWA to take root rapidly. C HAPTER 5 Unlike many regulatory bodies, ICTA has a broadly defined mandate that, pursuant to its 2001 charter, calls for it not just to “manage” spectrum but to increase the reach of information and communication services throughout the country. Turning its attention to BWA offerings, ICTA undertook a transparent public consultation process and arrived at its final decision within a commendable 180 days after its initial report. In starting the process, ICTA first identified the demand for BWA offerings, while also recognizing the need to harmonize its allocation decisions with global allocation trends, in order to take advantage of scale economies. ICTA also iden- 87 Trends in Telecommunication Reform 2006 Box 5.6: OFTA’s Consultation on Broadband Wireless Access Licensing In August 2005, the Office of the Telecommunications Authority (OFTA) in Hong Kong, China, issued its “analysis of comments received, preliminary conclusions and further consultation on a licensing framework for deployment of broadband wireless access.” Comments on the further consultation were invited through 31 October 2005. The August consultation followed an initial BWA consultation launched in December 2004 on whether BWA should be licensed in Hong Kong, and if so, when. In the August consultation, OFTA expressed its view that BWA spectrum should be assigned in 2006, on a technology-neutral basis. Consistent with the technology neutrality principle – and having considered the respondents’ views – OFTA said it was prepared to allow the deployment of any technology that conformed to recognized open standards for the delivery of BWA services. Because BWA devices and equipment will be supplied competitively, OFTA considered it unlikely that end users would have insufficient choices in the selection of BWA devices. OFTA also expressed the view that, although BWA is currently being deployed as a fixed service, it should also allow mobile services, once the technology is developed and cost-effective. OFTA therefore proposed that the scope of permitted services of the BWA licences be restricted to fixed telecommunication services initially, but expanded to include full mobility services after 1 January 2008. Fixed telecommunication service will include the conventional wireless local loop services, plus “limited mobility” offerings, which will not be able to hand off calls between cell sites until after 1 January 2008. OFTA also said it would issue unified carrier licences in order to accommodate the trend toward fixed-mobile convergence, since BWA can offer both. The new Unified Carrier Licence would be valid for 15 years – the same duration as for existing fixed/ mobile carrier licences. OFTA has made clear that BWA licensees will be expected to invest in, and roll out, infrastructure to provide public services. They will not be allowed to enter the market solely as services-based operators. The consultation document may be accessed at http://www.ofta.gov.hk/en/report-paper-guide/paper/consultation/20050831.pdf. tified key factors that have negatively affected past attempts in Mauritius to develop BWA services, such as congestion in the unlicensed 2.4 GHz band. ICTA found that operators in that band were exceeding designated power limits, using the licence-exempt systems for long-range transmissions – contrary to their design and purpose. It also noted the continuing and significant demand from ISPs for wireless spectrum to deploy their services. Additionally, ICTA took note of other countries’ decisions to define certain bands for BWA uses, including 2.5-2.7 GHz, 3.3-3.5 GHz, 5.1-5.3 GHz and higher-powered unlicensed use of 5.4-5.8 GHz. ICTA took into consideration the potential of new standards such as WiMAX for deploying BWA services integrated with computers and other ICT devices. The ICTA’s ultimate decisions demonstrated a practical approach to resolving the various tradeoffs needed to deploy BWA networks in the face of competing demands from operators and other incumbent spectrum users. The following subsections describe how ICTA resolved issues in each band. 5.6.1 The 5.4-5.8 GHz Band ICTA determined that the presence of radar incumbents in the 5.4-5.8 GHz band required postponing any BWA allocation decision in the band, even though this band had been globally harmonized for higher-powered unlicensed operations through the WRC 2003 negotiations. The complexity of the radar operations, coupled with their national defence purpose, will require a more deliberate transition for this band. This issue is similar to the difficulty that the United States has experienced in implementing the necessary dynamic frequency selection (DFS) systems needed to protect sensitive military operations in that band in the United States. 88 5.6.2 The 2.4 GHz BWA License-Exempt Band In reviewing the status of the 2.4 GHz unlicensed band, ICTA came to the conclusion that the previous “commons” model had led to overuse and overcrowding. It found that existing operators in the band tended to exceed the power limits, which were set at 23 dam EIRP, in order to extend their ranges and overpower interference. ICTA decided to set a distance limitation for this band to discourage operators from using it for longer distance applications than the WLAN networking it was originally intended for. In its decision, ICTA took some pragmatic steps to improve the functionality and longevity of the band: • Mandated use of the bands for applications not to exceed 500 meters; • Mandated limiting the emitted power to 20 dam while giving some transitory leeway for incumbent operators to stay at the 23 dam until 2010; and • Required new systems to register with ICTA, allowing it to track the level of usage in the band and identify potential interference problems. These provisions may well extend the useful life licenceexempt operations in the 2.4 GHz band. Moreover, the problems encountered in Mauritius underline the pitfalls associated with the commons approach. 5.6.3 The 2.5-2.7 GHz BWA Band This band previously had been allocated for MMDS. ICTA’s decision harmonized the band with the IMT-2000 allocation, enabling three distinct types of BWA systems to eventually operate in the band. Implicit in the decision was the determination that the existing MMDS use was not as relevant or promising as the potential BWA systems that could use the C HAPTER 5 Trends in Telecommunication Reform 2006 Figure 5.6: The 2.5-2.7 GHz BWA Allocation in Mauritius band. ICTA did not, however, make an explicit determination about the value of MMDS relative to BWA. Rather, ICTA took its cue from the public consultation process, in which only one respondent advocated the continued use of the band for MMDS. Other aspects of the ICTA’s decision about this band were significant. First, it determined that only licensed operators could provide BWA services in this band. Second, it made sure to create a channelization plan for the band that would group similar systems together, instead of using the interleaving employed with broadcast bands. As a result, both TDD and FDD wideband systems could be deployed to deliver BWA. The channel sizes were also changed to 5 MHz from 8 MHz segments, which are better suited for wideband systems such as those being developed by the IEEE WiMAX groups. ICTA also allocated 40 MHz (20 MHz for uplink operations and 20 for downlinks) for hybrid satellite and terrestrial services. Finally, ICTA created a transition period for incumbent operators, making the band available for BWA services only in January 2010. ICTA left the door open for voluntary relocation, but with language suggesting that the timeline for transition might be accelerated based on “market conditions.” 5.6.4 The 3.4-3.6 GHz BWA Band The ICTA reallocated this band from primarily a fixed satellite service band to a band in which those operations will be co-primary with terrestrial BWA operations. Fixed-link services were favoured in this band in order to provide protection for incumbent VSAT operators. Despite this limitation, BWA C HAPTER 5 advocates such as wireless internet service providers (WISPs) were able to obtain the benefit of higher-powered use, since ICTA allowed for 15 W EIRP systems to operate in the band. In assigning channels in these bands, ICTA also decided it would give priority to public operators (although not conclusively); that licenses were required and that the permitted point-topoint and point-to-multipoint links must be registered. Finally, ICTA allowed aggregation of multiple 25 kilohertz channels, while requiring a minimum of 100 MHz separation to avoid interference of duplex operations in the band. 5.6.5 The 5.150-5.350 GHz BWA Band Consistent with WRC 2003 agreements, ICTA opened up this band for mobile licence-exempt use of equipment consistent with IEEE 802.11 (Wi-Fi) standards. Given the challenges presented by incumbent radar operations in this band, ICTA determined that Wi-Fi in this band would be limited to indoor use only. Additionally, in order to prevent overcrowding and potential interference to incumbent operations, ICTA required the equipment in this band to use dynamic frequency selection (DFS). This is an automated mechanism that detects the presence of signals from other systems, notably radar systems, and avoids co-channel operation. Equipment must also have transmit power control (TPC), a mechanism that regulates a device’s transmit power in response to an input signal or a condition. These capabilities must be certified as part of the equipment registration and approval process that ICTA plans to establish for this band. 89 Trends in Telecommunication Reform 2006 The limitations imposed on the use of this band reflect the tradeoffs ICTA believed were necessary to advance BWA while accommodating the sensitive operations already existing in the band. Both DFC and TPC systems are at early stages in their development and have not yet fully demonstrated their ability to protect incumbent operations. Nonetheless, they are clearly part of the technological advances enabling the rapid deployment of BWA services. 5.7 Conclusion The ability of broadband wireless access networks to improve our lives ultimately relies on the amount of spectrum regulators make available for BWA. For the first time in the relatively short history of spectrum management, however, it appears that advances in technology – independent of the actions of regulators – can increase spectrum capabilities and resources. New technologies allow users to do more with the same amount of spectrum and enable new uses for spectrum not previously possible. As these advances become more widely adopted and new spectrum resources become available, regulators must consider whether traditional approaches to spectrum management are sufficient to address the resulting challenges and opportunities. A sensible approach for BWA spectrum licensing calls for granting spectrum licensees unlimited technical flexibility (so long as they avoid harmful interference to adjacent licensees) to create more spectrum capabilities and resources. Licensees 1 2 should have enough operational autonomy to enter new lines of business. The pragmatic regulator grants these additional rights to licensees as long as they meet two absolute preconditions important to the development of communications markets: to increase competition for broadband communication services and to experience the opportunity cost of using their spectrum assignments. While contemplating the appropriate regulatory model for the evolving state of spectrum technology, spectrum regulators must keep in mind key best practice concepts that have developed around spectrum management over the last three decades. These best practices fostered the widespread adoption and deployment of an earlier generation of wireless services. The same best practices will help deploy BWA networks today, increasing the welfare of consumers in the modern Information Society. In reviewing recent comprehensive BWA allocations in Mauritius, one can trace the outlines of the practical tradeoffs that are necessary to achieve the broader policy goals of the regulators. The lesson to be drawn from this type of complex allocation decision is not whether any particular outcome is better than any other. The lesson comes from better understanding the need to balance the demands of allocating new spectrum rights and resources for new technologies, while simultaneously advancing broader social and policy goals such as benefiting consumers and boosting economic productivity. This balancing act, after all, is the task entrusted to the modern spectrum regulator. Opportunity cost, as defined by WiKipedia, is a term used in economics, to mean the cost of something in terms of an opportunity foregone (and the benefits that could be received from that opportunity), or the most valuable foregone alternative. http://en.wikipedia.org/wiki/Main_Page See http://www.itu.int/ITU-D/treg/Events/Seminars/2003/GSR/WSIS-Statement.html and http://www.itu.int/ITU-D/treg/Events/Seminars/2004/GSR04/consultation.html 90 C HAPTER 5 Trends in Telecommunication Reform 2006 6 VOIP AND REGULATION Authors: Tracy Cohen, Independent Communications Authority of South Africa (ICASA); Olli Matila, Finnish Communications Regulatory Authority (FICORA) and Russell Southwood, Southwood Consultants Voice over Internet Protocol (VoIP) service is often viewed as a “disruptive technology,” meaning that it has the potential to drastically alter the status quo in the global telecommunication industry.1 In fact, all of the current market indications show that IP networks and VoIP services will replace traditional PSTN networks and services. ITU expects that by 2008, at least 50 per cent of international minutes will be carried on IP networks, and many carriers will have all-IP networks. Recent trends are certainly headed in this direction. For example, in the United States, residential VoIP subscriber numbers rose from 150,000 at the end of 2003 to more than 2 million in March 2005. U.S. subscribership is expected to exceed 4.1 million by the end of 2006, generating over USD 1 billion in gross revenues for the year.2 ITU believes that much of the mobile traffic in the world will become IP-based, as well, and that the introduction of mobile VoIP will influence the shape of the mobile business globally. Wireless-enabled VoIP offers the potential for cheaper voice calling. Users of 3G networks can already use mobile phones to make VoIP calls at cheaper data rates. The growth of mobile VoIP will particularly affect the high-priced international roaming business. Today, however, VoIP services have been implemented unevenly around the world. Some countries have legalized and allowed multiple providers, while others have completely blocked the provision of VoIP services. Some countries have only “grey market” VoIP providers. These varying approaches reflect very different perceptions of VoIP in various parts of the world. In some countries, VoIP is seen as an exciting technological development that offers cheaper calling for consumers. But in others, it is seen as an unauthorized threat to the existing order. At the international level, VoIP traffic is often described as “by-pass” or “lost” traffic, but it is driving the development of new service providers in both the developed and developing worlds. The advent of VoIP has brought new challenges for regulators. In developing countries, where the entrenched rights of fixed-line operators are most protected, the main question has been whether to legalize the introduction of VoIP. In more mature and competitive markets, meanwhile, VoIP has raised questions about what aspects of it should be regulated. The countries that have legalized VoIP as part of a broader liber- C HAPTER 6 alization of their markets have started to accumulate thinking, experience and precedent in this area. But even in these countries, VoIP is a relatively recent development, and there is often little consensus about how to regulate it. This chapter examines how VoIP services will affect future regulation. Because of the starkly contrasting global perceptions of VoIP, however, it is difficult to present a unified approach to regulating VoIP. Instead, this chapter aims to reflect regulatory experiences from a wide range of countries that are grappling with the transition to VoIP. The sections of this chapter are structured to answer both the broad and specific questions raised by VoIP services, including: • The overall approach to regulating VoIP as a mainstream service; • How VoIP has changed telephony business models and the various ways of classifying the services it has created; and • Other related issues frequently raised in connection with VoIP, such as quality of service; network integrity; communication security and lawful interception. 6.1 VoIP: Regulatory Evolution or Revolution? 6.1.1 How VoIP is Changing Voice Business Models In liberalized telecommunication environments, it is important to create regulatory frameworks that allow the market to produce sustainable business models. VoIP is a powerful service innovation that has the potential to change how existing voice markets operate. Since VoIP service is largely enabled by the existence of IP networks, there is inevitably an overlap throughout this chapter between these two key concepts, which remain inextricably linked. It is not yet clear how IP networks will be implemented – or at what speed – but it is important to try and identify key elements of the changing business model in order to understand the policy and regulatory dilemmas VoIP raises. Current regulatory practice for telephone service was devised at a time when circuit-switched technology was dominant. Historically, regulators treated different types of networks differently. Future regulation should, however, be based on a 91 Trends in Telecommunication Reform 2006 Box 6.1: A VoIP Primer “Voice over Internet Protocol” (VoIP) is a generic term referring to a technical standard that enables the transmission of voice traffic, in whole or in part, over one or more networks that use Internet Protocol (IP). Standards or “protocols” for VoIP are still evolving, but two main open protocols and proprietary vendor protocols enable VoIP: – “H. 323” – The most widely adopted protocol for the transmission of VoIP, this is an ITU legacy standard that builds on earlier protocols for the transmission of voice and video over analogue PSTN, ISDN and ATM networks; and – “Session Initiation Protocol” (SIP) – An application-layer control protocol, SIP is an end-to-end signalling protocol. SIP facilitates communications between two or more SIP-supported devices, but it is not the only protocol required to make VoIP calls, which take place via additional protocols.1 How VoIP technology works: Voice (or data) is compressed and converted into digital packets that travel over the internet (or a private network utilizing VoIP) and are then converted back at the other end, correcting for echoes from end-to-end delay, for jitter (variability) and for dropped packets. The data packets are non-isochronous and may take many different and independent paths to the intended destination, arriving out of sequence or with different end-to-end delays. VoIP technology makes much more efficient use of bandwidth. Plus, voice is transmitted on IP-based networks at considerably lower cost than calls on circuitswitched networks, which require dedicated connections for the entire duration of the call. VoIP Applications: The first generation of VoIP services, known as PC-to-PC or Class 3 services, allows individuals only to call other people using the same service (examples include Yahoo! Instant Messenger). Voice signals transmitted are not routed or switched through the PSTN at all. Second-generation VoIP services (PC-to-Phone or Class 2 services) allow calls from PCs to any PSTN telephone number, including local, long distance, mobile, and international numbers (examples include Dialpad, Net2Phone and Skype Out). A third generation of VoIP services (Phone-to-Phone, or Class 1 2 enables use of a traditional telephone to make VoIP calls, using an adaptor at the customer premises. The calls are then routed over an IP network rather than the circuit-switched PSTN.3 1 See Webopedia at http://www.webopedia.com/TERM/I/Internet_telephony.html 2 Class 0 is phone-to-phone over the PSTN. This is David Clarke’s classification system (MIT). 3 A VoIP network requires a terminal or communication end-point, which can be a phone, PC or even a software programme. Terminals are identified by at least one IP address (e.g. [email protected]) and are registered with a server, which stores IP addresses and can map an address to a terminal. The server might also store location, identification and traffic data. Finally, gateways act as bridges between the local PSTN and IP network to allow calls between different networks so that the signaling protocol can be understood between networks and so that IP addresses and regular PSTN numbers are recognizable between networks. Signaling data is exchanged between switched circuit telephone networks and VoIP networks. This information is used to set up, manage and release voice calls, and to support telephony services such as caller ID, toll-free calling, and mobile authentication and roaming services. fundamental recognition of the convergence of telecommunications, broadcasting, media and information technology sectors. This means that all transmission networks and services increasingly will be addressed by a single regulatory framework. For the remainder of this chapter, the term Information and Communication Technologies (ICTs) will be used to reflect this comprehensive, forward-looking approach. For operators, VoIP represents three broad types of commercial opportunities: price arbitrage, savings from new network topologies, and new products and services. Each of these is considered in the following subsections. 6.1.1.1 Price Arbitrage Arbitrage is a term used to describe a situation where one buys something at a cheaper price in one market in order to sell it at a higher price in another. The growth of VoIP for international calling has been built on the wide gap between retail and wholesale calling prices in many parts of both the developed and developing world. These differences are a function of the 92 uneven introduction of competition in voice markets around the globe. In Africa, for example, it may cost a caller (at the retail rate) between USD 0.50 (50 cents) and USD 1 a minute to call Washington, DC, but the international operator may buy the call (at the wholesale rate) for between USD 0.01-0.03 (13 cents). Where this circumstance exists, incumbent operators are able to maintain high margins because they either have monopolies or limited competition at the retail level. What is often described as “bypass traffic” or the “grey market” is a proxy for competition, particularly international voice calling. This has already forced incumbent telephone companies to cut their international rates. And because there is less regulatory protection of international voice markets, these rates will continue to decrease.3 Moreover, many incumbent operators are going through the process of “rebalancing” their tariffs in line with the costs of providing services. In the pre-competition days, high international rates were used to cross-subsidize rates on domestic networks. With competition in the largest voice markets driv- C HAPTER 6 Trends in Telecommunication Reform 2006 Figure 6.1: Shades of Grey Grey Market Revenues as a Percentage of Overall International Call Revenues in Selected Regions and Countries Africa Brazil Colombia Costa Rica * Source: ** Source: *** Source: **** Source: 20-30%* 36%** 50%*** 20%**** Balancing Act Abrafix V-P Technology, Orbitel Incumbent telco ICE ing down international rates, cross-subsidization is unlikely to be sustainable. Mandated tariff rebalancing will also end this business model in many countries.4 ing, and some IP network components can even be purchased in retail electronics outlets rather than as inflated “integrated solutions.” The VoIP service market has been fostered by the introduction of IP networks and the proliferation of Web-based transactions. Grey market operators can simply sign up on a website and gain access to international calling capacity that they can resell to end users. Because these are data services, the calls are not recorded as telephone minutes, and they need not pass through the international gateway of the incumbent operator. While quality-of-service issues do arise, many costconscious callers seem willing to make the trade-off between price and quality. Not surprisingly there is considerable debate about these cost advantages. Some of the debate centres on reliability and cost of the newer generation of network equipment – including Wi-Fi and Wi-MAX – as part of an IP network roll-out. These new wireless technologies can and are being deployed both to create local loop VoIP access and for backbone links. Again, it is argued that this is being done at prices that are much cheaper than possible with traditional copper or fibre networks. As with arguments about IP networks, the potential cost savings using wireless technologies can be debated. But incumbents worldwide are deploying these technologies, at the same time they are threatened by them. As a commercial opportunity, however, much of this market is entirely price-dependent. As international calling prices plunge, the arbitrage effect may disappear. The legalization of VoIP services in a wider range of countries is, in effect, the introduction of greater competition that will reduce this price-arbitrage gap. The future of telephony revenue, particularly in the international domain, appears to be “low-margin, high volume” rather than “high-margin, low-volume” for this type of calling. Where VoIP has been legalized, VoIP providers appear content to work with lower margins than established operators. 6.1.1.2 Savings from New Network Topologies Many of the world’s larger operators have been persuaded to consider VoIP because an IP-based network can carry both voice and data in one network rather than two. In this way, operators can invest in a single network that can be used more efficiently for different forms of traffic. Moreover, IP network deployment costs often come in smaller increments than those required for circuit-switched facilities and dedicated circuits. It is possible to add capacity incrementally, in a manner that will bring a return on investment more quickly than the traditional multi-million dollar telecommunication infrastructure investments, which require many years to produce the required return. For example, operators can replace large numbers of traditional switches with fewer “soft switches.” Smaller investments can often be financed from cash flow rather than major external borrow- C HAPTER 6 Similarly, mobile operators that have invested considerable sums in 3G licences and need to make a return on their investment over 5-10 years are also threatened by the potential of VoIP. They are particularly vulnerable to the effect substitution of mobile VoIP will have on operators’ high-priced international roaming services. This presents a recurring dilemma for regulators. Should they protect the mobile operators’ investments and delay cost-saving innovations for consumers? Or, should they allow wireless-enabled, mobile VoIP to flourish, potentially risking thwarting investment in 3G network deployment? These questions are particularly pertinent for regulators and policy-makers in developing countries. There, the choice is often between defending a government-owned incumbent (for financial and social reasons) and making cheaper communications available to a wider number of people, particularly in rural areas. 6.1.1.3 New Products and Services The convergence of voice, data and video on IP networks allows users to combine these different forms of traffic and significantly expand the range of product and service offerings. Many operators are now offering the so-called “triple-play” option that combines all three in a single service. Senegal’s Sonatel, for example, has rolled out a “triple-play” service offering voice, -internet access and television programming. 93 Trends in Telecommunication Reform 2006 This ability to package services together has implications for competition, as users increasingly seek a single provider and billing option. Triple play offerings have the potential to open up television as a delivery platform for a far wider range of rich, multimedia services. This could overcome, to some extent, the lack of installed, internet-connected computers in developing countries. This may be a solution for the urban poor, but it still will not address lack of internet access in rural areas without electricity or television coverage. Yet, even though the triple play may not be everywhere overnight, it is certainly going to be relevant in the medium-term. In addition, there are now several VoIP crossover technologies coming into use on mobile phones. For example, “push-to-talk” services are essentially what most people used to understand as “walkie-talkies.” That is, they enable instantaneous, direct two-way conversations between two individuals, using IP software that rides on a mobile phone platform. U.S.-based operator Nextel (based on its origins using a trunked radio network) pioneered the push-to-talk experience, and others started offering the service in 2003. The product debuted in Europe with Orange’s “Talk Now” offering. Although it requires users to subscribe to a data service from one of the major carriers – and there are some service quality issues – there has been significant take-up. Push-to-talk is sufficiently threatening the traditional “walkie-talkie” market that Motorola has produced specially designed, rugged “push-totalk” phones at the beginning of 2005. Two of India’s mobile providers – Hutchison Essar and Tata Indicom – also launched “push-to-talk” services in May 2004. Another area of development will be the current testing of products that integrate cellular and WLAN networks and provide voice from a WLAN device (See Chapter 3). Mobile carriers in the United States and Europe are already rolling out networks that offer 11 mbit/s 802.11 WLAN access. This could eat into their existing data services (and perhaps even undercut the rationale for 3G), but operators know they cannot ignore the technology if competitors deploy it. One European UMTS mobile operator has been sufficiently worried by the impact of VoIP that it has threatened to block Skype calls to its subscribers.5 6.1.2 Changes in the Voice Business Model These three categories of business categories – arbitrage, new network topologies and new services – have come about from a number of key changes in the underlying business model for voice service. 6.1.2.1 The Impact of IP Network Features With traditional telephony, “intelligence” in the network is located centrally (in the functionalities of the switch) and is usually controlled by one operator. Largely “dumb” devices (telephones) are attached to the network, and they have a limited set of functions. The traditional telephone network’s root-and-branch structure means that traffic flows to and from exchanges in ways that reinforce this pattern. For example, traffic for international destinations is commonly routed via a single international gateway. Telecommunication carriers main- 94 tain bilateral relationships with other carriers and exchange revenue through the international settlements system. By contrast, IP networks are not controlled by any single entity, other than for the most basic transport to other networks. The “intelligence” is deliberately designed out of the network architecture. Put simply, the network is “dumb” and the intelligence is at the edge of the network, in the terminal equipment. A computer accessing the network has a far more complex range of service functionality in its application programmes than the network to which it is attached.6 IP traffic is routed via the easiest route, not through central choke points. International traffic can just as easily flow from an ISP, a cybercafé or a telephone company. Each of these has only to open a network connection and have the required capacity available. In this way, VoIP traffic does not need to go through an international gateway. The network design originated from United States military requirements for redundancy and resilience, and that led to a decentralized network without a central focus or control point. And because of its use for research, the internet was designed to be open to users through publicly available standards, making it easy to access. Due to their open nature, IP networks pose particular security challenges. The PSTN and mobile networks are closed systems with controlled security and privacy. IP networks, however, have open architectures in which vulnerabilities, threats and communication security risks exist in various network elements. Special measures are required for ensuring communications security. 6.1.2.2 The Separation of Retail and Wholesale Historically, a vertically-integrated organization like the telephone company carried traffic and offered services, usually from a monopoly market position. In a more liberalized market, the same telephone company might be selling international transmission to both external ISP customers and to its own ISP. This can lead to accusations of conflicts of interest. For VoIP service providers, the terms under which they can access broadband networks become a key issue. With liberalization bringing new market entrants, there has been increasing discussion of separating the “retail” functions of the operator from the “wholesale” ones. In other words, there is more talk of service provision and network operation as separate roles. Alternative infrastructure providers such as utility companies have begun to reshape themselves into wholesale operators by adding bandwidth to their private networks. Meanwhile, ISPs, VoIP service providers and “mobile virtual network operators” or MVNOs (essentially, mobile service resellers) have begun to retail services to end users. The nature of IP networks has encouraged changes in thinking about these two functions. As a result, many telephone companies have internally separated out their wholesale and retail functions in order to better understand the underlying cost structures of different parts of their business. In some instances, this has been prompted by regulators seeking to assess the costs and clarify the terms for access to local loops or other network elements. C HAPTER 6 Trends in Telecommunication Reform 2006 In other cases, the companies themselves have wanted to analyse their costs more closely. 6.1.2.3 Changing Charging Structures Wholesale traffic rates are largely the same on routes between the more competitive markets in the world. So it is no surprise that several VoIP service operators offer the same or broadly similar retail rates for calls between these countries. For example, Skype sells “Skype Out” minutes to enable subscribers to call PSTN phones in other countries. At the time of publication, it cost less than USD 0.02 (2 cents) a minute on Skype to call Australia, Chile, Europe and North America. Most telephone calls have traditionally been billed according to where they originated and terminated. Pricing was distance-sensitive, even where the actual cost of terminating the calls was not. This model, however, has been turned on its head by VoIP services. Now, per-minute charges are based on what the market will bear in the terminating country, and those countries with less competition are more expensive to call. But even those countries can be called more cheaply using VoIP than routing through their circuit-switched incumbents’ services. As discussed in greater detail in Section 6.4.3, numbering has traditionally reflected geographic location, but with VoIP, this is no longer the case. Many VoIP service providers offer users “virtual” numbers, allowing them to be reached at a “local” number when they are actually thousands of miles away. For example, a VoIP customer may live in London, where her PSTN dialling code is “207.” Her mother may live in Florida, where she has a “561” PSTN dialling code. The VoIP service provider can give its customer a “561” dialling code that rings on her London line, allowing her mother to call her at the VoIP rate and avoid international long distance charges. Argentina’s PVTEL, for example, offers its customers the choice of a Buenos Aires or Miami dialling code. Because fixed-line and mobile phones (rather than SIP or “soft phones”) are still the dominant form of telephone terminal equipment, a hybrid service model is emerging in which operators offer consumers a combination of broadband access, plus an adaptor or VoIP-enabled phone. The package will also include free calling to the company’s other subscribers (as an incentive to recruit new subscribers by “word of mouth” sales) and cheaper domestic and international calls. 6.2 The Pace of VoIP Market Development All current market indications show that IP networks and services eventually will replace PSTN networks and services and will alter the mobile business, as well. Moreover, the introduction of IP networks will affect all countries, although the timeline of adoption will vary widely. Some major international carriers have committed themselves to making the transition to VoIP, including: C HAPTER 6 • • • • British Telecom (100 per cent conversion planned by 2009); MCI (100 per cent of all traffic by the end of 2005); AT&T (100 per cent by the end 2010); and Telecom Italia (80 percent of all traffic was VoIP by the end of 2003). In Europe, the number of market players offering VoIP increased with astonishing speed during late 2004 and early 2005. According to rough estimates, in March 2005 there were at least 10 VoIP service providers in most Western European countries, and in some the number exceeded 40. This kind of growth appeared to be taking place across the globe. For example, there were 11 companies in Pakistan offering VoIP by early 2006, and more than 80 VoIP providers were licensed in Malaysia.7 Since 1 February 2005, all “value-added network” service providers in South Africa were legally allowed to carry VoIP on their networks. While there were no specifically licensed VoIP providers, several companies began offering VoIP solutions there in 2005. In less liberalized markets, the impact of VoIP wholesale transmission indicated how the market was changing. In 2004, up to a quarter of all operators in Africa were using VoIP to carry at least part of their international traffic (these agreements were politically sensitive, so establishing exact numbers was difficult). In late 2005, Telkom Kenya was preparing to offer a VoIP-based international service. Four African carriers – BTC (Botswana), Mundo Startel (Angola), Telecom Namibia and UTL (Uganda) – announced plans to introduce IP-based networks, and the second national operator in South Africa was expected to, as well. Mexican incumbent Telmex had already implemented IP for the majority of its core network, and various Mexican carriers (Alestra, Avantel, Axtel and Protel) have been conducting initial trials pending legislative changes. Marcatel was already offering IP-based long distance services. Oman’s incumbent, Omantel, meanwhile, had committed to creating an end-toend IP communications services network. The transition to VoIP is so rapid and far-reaching that it is hard to make definitive statements about its progress. In some countries, legalized VoIP operators are already offering significant cost and service choices for both national and international calls. In others, the process of liberalization has not yet begun, and the only “choice” for consumers is to look to grey market operators. Irrespective of national regulation, there has been rapid growth in VoIP services over the internet. Carriers such as Delta Three, Skype and Vonage have increased their global subscriber bases rapidly over the last three years. Although there is little market data on the progress of this transition, it is useful to differentiate between the different types of VoIP service transitions that are occurring. At the wholesale level, there is a well-developed market for the carriage of international traffic over IP networks. The calls actually originate from a PSTN phone as circuit-switched traffic and are then converted to packet-switched data at gateway switches. They are routed internationally over IP networks to save money and increase efficiency, then converted back to 95 Trends in Telecommunication Reform 2006 circuit-switched calls at the destination. Domestic calls may be carried over an IP backbone, with the same conversions happening at either end of the call. Such calls may happen in parallel to traditional routing over circuit-switched (PSTN) networks. Packet-switched routing is essentially seamless to the consumer. At a local level, VoIP is a much more challenging undertaking. Few end users have IP-enabled phones or software yet on their PCs or mobile phones. Also, the implementation of enterprise-level, IP-enabled PABXs that can handle both timedivision multiplexing (TDM) and IP in corporate markets varies enormously from sector to sector and country to country. Investment in customer premises equipment, both at a consumer level (by the individual user) and by companies (at an enterprise level) will take time. An unpredictable mix of customer choice, service availability and regulatory policy in each country will drive market take-up of IP-based services and equipment. The cost of the equipment needed – particularly at a local level – will only begin to come down once there is a sufficient volume of buyers. The question posed by these developments is whether the transition to VoIP requires a revolution in regulatory thinking, or whether an incremental approach is wiser. The best way to consider this question is to differentiate between short-term changes, which are largely evolutionary, and long-term changes, which are more far-reaching. The transition from short-term to long-term changes is summarized in Box 6.2. The changes described as “long term” indicate that VoIP represents a major disruptive force for all telecommunication service providers. In other words, when VoIP becomes the primary transmission mode for voice calls, radical changes will need to be made in many regulatory models. Clearly, regulators will need new knowledge and expertise. Nearly all regulators and staff are steeped in circuit-switched technology and services. In the future, regulators will need to understand the new, layered IP networks, the service concepts based upon them and the influence these will have on the future shape of the market. And because IP networks and VoIP services change rapidly, regulators are under greater pressure to make swift decisions and decide now on a course of action. 6.3 Grappling with Change: Regulators’ Responses to VoIP Before looking at the detailed issues that VoIP raises for regulators, it is worth looking at the overall policy and regulatory responses of different countries so far. Those responses are extremely varied, so this section groups countries under a series of headings corresponding to their approach to VoIP. Some countries have adopted an incremental, evolutionary approach to VoIP regulatory issues, making modest adjustments to their regulatory frameworks. For others, VoIP represents a considerable threat to the established order (particularly the international arbitrage aspect) and remains illegal. Some countries simply have not dealt comprehensively with VoIP yet. In China for example, the basic service operators (China Unicom, China Telecom and China TieTong) have 96 driven deployment of IP technology. But there is currently no specific VoIP regulation, and VoIP has not been classified as either a value-added network service or as a basic service. Basic telecommunication licensees are allowed to offer VoIP services and use IP technology in their core networks. China’s government, however, is considering banning the provision of VoIP services by anyone other than licensed operators. Cybercafés that offer long distance calls are deemed to be operating illegally, and basic service licensees are seeking ways to shut them down.8 Currently, ISPs can only offer PC-to-PC VoIP services. 6.3.1 A Liberalized Policy Approach to VoIP Various countries have legalized VoIP services at different levels. For example, all forms of VoIP service are legal in Canada, the European Union, India and Korea (Rep.). The following paragraphs provide other specific examples: European Union: The European Regulators Group (representing regulators from 27 European countries) has agreed to a common statement on the regulatory approach to VoIP. According to the Group, VoIP should be used to enable (for the benefit of consumers) the greatest possible level of innovation and competitive entry in the market, while ensuring that consumers are adequately protected. VoIP rights and obligations should be interpreted in accordance with the European regulatory framework, including the policy goals and regulatory principles existing today. Consumers and service providers should have enough information to make informed choices about services and service providers. United States: The 1996 Telecommunications Act separated telecommunication services and information services and defined them differently. The FCC has formalized a policy of not imposing traditional telecommunication rules on internet applications, which are considered information services. At the beginning of 2006, the FCC was engaged in proceedings to examine issues raised by IP-enabled services, including VoIP. These proceedings were examining various social issues, such as how to adjust contributions to the Universal Service Fund, and the regulatory classification of services.9 Japan: VoIP is permitted and is subject to minimal regulation. The legal framework distinguishes three types of VoIP services based on the quality of the service. Providers that do not need numbers for their operation (that is, providers of PCto-PC communications) do not have to comply with quality of-service (QoS) requirements. If the provider can ensure a minimum QoS (in terms of end-to-end voice quality and endto-end voice delay), the provider can receive “050” – prefix numbers. Only if the quality is equal to traditional telephony can the provider use the same numbers as PSTN operators. Tariffs and access charges for VoIP services are not regulated in Japan. Interconnection is required only if the VoIP provider is a facility-based operator. VoIP providers have to pay access charges to terminate calls on the PSTN. It is also worth noting that Korea (Rep.) adopted a broadly similar approach to VoIP in September 2004. Canada: Following a public consultation process, the Canadian Radio-television and Telecommunications Commis- C HAPTER 6 Trends in Telecommunication Reform 2006 Box 6.2: The VoIP Transition Short to medium-term evolution (evolution from PSTN to IP networks) Technical developments – PSTN phone services and VoIP services exist in parallel. – PSTN – IP network gateways are needed in most cases. – Standard (E.164) numbers are (mainly) used; ENUM use of E.164 numbers increases. – Terminals: Adapter + regular phone, IP-phone or a software-enabled phone. Transition period for the market – New, inter-modal competition develops, featuring cost-structure advantages, innovative services (in particular, nomadic use of VoIP) and lower charging models. – Voice traffic is shifting to IP-based traffic and revenues from traditional phone services decline. Regulatory model – Changes are required to the current regulatory regimes to account for long-term influences. – Regulators should balance basic main objectives: • To enable the development of new services. • To ensure acceptable social and consumer protection. Long-term change (towards all-IP networks) Technical developments – IP networks and VoIP services are prevalent. – Subscribers and services are addressed mainly by different types of internet addresses. – E.164 numbers are likely to prevail at least in the global context. – New types of terminals (e.g. combined GSM/UMTS/WLAN phones) support VoIP at home and in WLAN coverage areas. – VoIP is normally one service inside a large service set. Market structure and competition developments – Integrated, innovative and personalized services dominate the market. – Nomadic use is important, increasing the amount of cross-border traffic and services. – Cost and revenue models of service providers have changed radically. – There is separation between the transport network and the services delivered on top of that network. Regulatory models – New legal frameworks and regulatory models are needed. sion (CRTC) published a decision in May 2005 that it would only regulate VoIP service when it is provided and used as a local telephone service.10 The CRTC reached its decision based on a principle of “service neutrality,” meaning that subscribers could use VoIP service interchangeably with standard local exchange services.11 VoIP providers were classified in the same category as competitive local carriers.12 The CRTC’s decision called for: • • • • • • • Registration of VoIP resellers, • • Access to numbers and local number portability, • Access to directory listings, • Equal access to interexchange carriers, • Rules governing “win-back” marketing, In line with its approach to retail internet services, the CRTC will not regulate computer-to-computer (peer-to-peer) VoIP services that reside solely on the internet. • Comprehensive assessment by VoIP operators of access for the disabled, Singapore: In June 2005, Singapore introduced a new policy framework for “IP telephony,” addressing the growing trend C HAPTER 6 Message relay service, Privacy safeguards, Tariff-filing requirements, Contribution to the national service fund, Non-dominant carrier regulation, The development of IP interconnection interface guidelines, and The regulation of VoIP in areas where local competition is not permitted (areas served by small ILECs and the Far North). 97 Trends in Telecommunication Reform 2006 of using the internet and other IP-based networks to make local and international voice calls. The Info-Communications Development Authority (IDA) planned to issue licences and numbers for IP telephony providers. IDA’s regulatory framework called for minimal regulatory obligations. For instance, operators providing PC-to-PC telephony services were not required to provide number portability, emergency service access, directory services, or to conform to QoS levels. But operators must provide clear information to their subscribers regarding whether their offerings allow access to emergency services or meet the minimum QoS levels. Also, facilitiesbased operators were allowed to provide certain numbers only to users with valid Singapore addresses, safeguarding the integrity of Singapore’s national numbering plan. South Africa: As of 1 February 2005, any holder of a “value-added network service” (VANS) or “enhanced service” licence was allowed to carry voice traffic on its network. Before that date, VANS providers were prohibited from carrying voice traffic. VANS providers can now apply for numbers, spectrum rights and interconnection with any operator. Various ISPs and VANS operators have begun to offer retail VoIP, with aggressive advertising. There is no rate regulation of VoIP services directly, but the regulator is considering QoS issues and access to emergency services. It is worth noting that the planned second network operator’s service will be entirely IP-based, because of its deployment of a fibre network. The Philippines: In August 2005, the National Telecommunications Commission (NTC) issued new regulations treating VoIP as a value-added service, for which only registration, not authorization, is required. Commercial VoIP providers with no network of their own are required to enter into interconnection agreements with network operators. Although such interconnection agreements are to be negotiated between the parties, the NTC will intervene where necessary to ensure interconnection is provided under fair terms. Carriers that have previously received authorizations were not required to register with the NTC when starting VoIP services.13 6.3.2 An Incremental Approach to VoIP Meanwhile, other countries have taken a more cautious approach, making incremental changes rather than introducing comprehensive new frameworks. India: VoIP has been legal since April 2002, under the designation of “Internet telephony,” which covers (1) PC-toPC voice (both within the country as well as abroad), (2) PCto-phone, and (3) “IP based H.323/SIP terminals.” Internet telephony through PCs or IP-based terminals is available also through India’s public “tele-info” centres and internet kiosks. Facility-based operators can provide internet telephony and use VoIP technology to manage their networks. Furthermore, the Telecom Regulatory Authority of India (TRAI) has issued regulations on quality for VoIP international long distance calls, differentiating between two quality levels: toll quality and below-toll quality. TRAI does not regulate tariffs of VoIP services offered by ISPs. Bolivia: VoIP is considered telephony. In January 2005, a Bolivian ISP, Unete, announced an investment of USD 5 mil- 98 lion to launch a national and international long distance voice service. Ecuador: VoIP providers are required either to have a licence for local or long distance public telephony or to establish resale agreements with licensed operators. In February 2005, the regulator CONATEL published regulations covering cybercafes and tele-centres. The regulations limit the number of PCs that can be used for VoIP services to no more than 25 per cent of the total – or one PC if the cybercafé has only two or three computers. Honduras: The regulator has allowed VoIP services, provided that operators contract with the monopoly incumbent, Hondutel. The organizations that do this are described as “suboperators” and they can use their own networks to sell other licensed services. 6.3.3 VoIP Consultations Many countries have not resolved how they will regulate VoIP and are engaged in public consultation proceedings. Chile: In July 2004 the Chilean regulator, SUBTEL, launched a public consultation, indicating that all services offered through some part of the PSTN network should be under PSTN regulations. But services provided entirely over the internet would not be subject to the same conditions. The regulator suggested creating a broadband voice licence that would cover VoIP. Some operators responded that the proposed classification was too rigid and potentially problematic in an increasingly converged environment. The Chilean incumbent argued that the introduction of VoIP would rob it of income while benefiting only a small group of the population. Colombia: In June 2004, the Ministry of Communications issued a consultation document on VoIP services. The consultation was completed, but no action had been taken by August 2005. Prior to any results of the consultation, rules required operators to obtain a basic PSTN-service licence, but the use of a PC to make calls over the internet was not restricted. The Ministry was seeking to include VoIP in the existing public telephony category, but several parties in the consultation suggested that VoIP merited a new service category. Jordan: In May 2005, the Telecommunications Regulatory Authority (TRA) of Jordan issued a consultation document on the delivery of IP voice services. This raised several issues for comment, including (1) whether or how to distinguish among different types of voice services that are identical to the consumer; (2) the provision of information to equipment purchasers and potential users; (3) the roles of network operators and service providers in maintaining network integrity; (4) geographic and non-geographic numbering; (5) emergency service requirements; (6) interconnection; (7) using class licensing for VoIP service providers; and (8) quality of service issues. Hong Kong, China: In June 2005, Hong Kong’s Office of the Telecommunications Authority (OFTA) published a statement on the “Regulation of Internet Protocol (IP) Telephony.”14 This statement outlined OFTA’s position following a consultation process begun in October 2004. OFTA said service-based providers should be allowed to compete with facility-based C HAPTER 6 Trends in Telecommunication Reform 2006 operators. Moreover, it upheld the principle of technological neutrality. Therefore, OFTA decided to introduce two different licenses for VoIP providers: • Class 1 services – IP telephony offered with service attributes similar to those of conventional telephone services; and • Class 2 services – Those that do not have the same attributes as conventional telephony. Class 2 services were subjected to minimal regulation, although service providers were required to inform customers about the limitations of their services. Class 1 service providers would have to fulfil basic telephone licensing conditions. Meanwhile, Algeria, Israel, Taiwan, China and Trinidad and Tobago have also begun consultation proceedings on VoIP. Kenya has issued guidelines legalizing various categories of VoIP, following public consultation. 6.3.4 Where VoIP is Illegal VoIP remains illegal in quite a few countries.15 Where it is, governments adopt a variety of strategies to eliminate grey market operators. Some regulators seek to ban websites that allow users to make international calls. Others periodically confiscate the equipment of grey market operators. Some jurisdictions back up these sanctions with jail sentences. Before the end of Panama’s telephone service monopoly in 2003, the Public Services Regulator required all ISPs to block IP ports identified with VoIP services. In addition, sometimes telephone companies filter (block) VoIP services on their own. For example, one ISP in Mexico filters out VoIP service providers including Skype. Operators in Kenya have also filtered VoIP traffic. In almost all of the countries where incumbents provide estimates of the grey market, the amount of “lost” traffic indicates that few of these blocking strategies work completely. Usually, enterprising consumers and companies are able to access some form of VoIP service. 6.3.5 Classifying VoIP Services for Regulation As can be seen from examining the current state of VoIP regulation, a key question for regulators is how to classify various forms of VoIP, IP telephony or “Internet telephony.” Any rigid classification set at this juncture is unlikely to be stable, given the pace of technological and market-driven change. Any classification used also depends on national policies and legislation. Box 6.3, however, offers three general categories. Below are various examples of how different countries have treated classification of VoIP services: The European Union: The regulatory framework addresses the question of how communication services should be classified in two ways. The Universal Service Directive classifies services for the purpose of consumer and social protection. For market and competition management, the need for regulation is assessed by analysing whether VoIP services have “significant market power” (known in some other countries as “dominance”) in one or more “relevant markets.” The services covered by the Universal Service Directive are divided into two categories: C HAPTER 6 • Electronic Communication Service (ECS) – includes services provided for remuneration and consisting wholly or mainly in the conveyance of signals on Electronic Communications Networks. ECS is treated with lighter regulation. • Publicly Available Telephone Service (PATS) – consists of a service that includes all the following functions: available to the public; used for originating and receiving national and international calls; and provides access to emergency services through a number or numbers in a national or international telephone numbering plan. PATS attracts more regulation and obligations. The main obligation compared with ECS is the provision of emergency calls. The EU regulatory framework seeks to be technologyneutral, although some of its rules are based on traditional telephone technologies. Debate on the classification of VoIP services is ongoing. Meanwhile, different European governments seem to be interpreting the regulatory framework for VoIP services in divergent ways. These vary from a flexible reading of the rules to a strict interpretation of the framework’s wording. The following approaches are evident: • One approach, apparent in the United Kingdom, is a flexible classification regime, in which service providers, not regulators, decide in which regulatory category they want to be classified; • Another approach distinguishes different types of services based on a strict interpretation of the PATS definition. That is, PATS obligations are imposed on a voice telephony service only if all four parts of the PATS definition are fulfilled; • A compromise approach is to classify a service as PATS if it is available to the public for originating and/or receiving national or international calls through a standard telephone number. Access to emergency services is not regarded as being an integral part of the PATS definition, and whether to mandate such access can be decided separately. For competition policy purposes, each EU national regulator assesses how different VoIP services fit into the EU’s “relevant markets” categories. At present, there is very limited practical experience and precedent for VoIP, and the EU is currently discussing market analyses that include VoIP services. Canada: The classification of VoIP services stems from discussion of emergency call services. From this perspective, there are currently three different types of VoIP service offered to customers: fixed, nomadic and foreign exchange. Users of fixed VoIP service can only place a telephone call from the location where the service is provided. Users of nomadic VoIP service can make calls from any location where users can access their service via the internet. Foreign exchange VoIP service allows users in one exchange to receive telephone calls dialled as local calls in another exchange that they have selected (for example, a customer can be reached in Ottawa by calling a Halifax local telephone number). These different types of VoIP services have different obligations regarding emergency calls. 99 Trends in Telecommunication Reform 2006 Box 6.3: Classification of VoIP Services Regulators around the world face the challenge of trying to differentiate between types of VoIP services and capabilities. One approach to classification of VoIP follows: Category I VoIP offerings that do not require regulation because there is no clear service provider. This would cover PC-based VoIP communications installed by end users via software downloads (Examples include GIZMO, Yahoo Instant Messenger and Skype). Category II VoIP offerings that are outside the scope of regulation because they are not directly offered to end users or do not impact the PSTN, including: – Corporate private networks, where VoIP is used to provide internal communications, – IP technologies used within a public operator’s core network, but which do not affect the retail services offered to end users. Category III This category would cover publicly available services provided to end users. There are many different kinds of publicly available VoIP service offerings, and the regulatory treatment depends on the nature of the service being offered and relevant national legislation. A large number of national regulatory agencies have carried out consultations on VoIP issues but have not reached any final classification decisions. Many are trying to adapt service classifications provided under existing telecommunications legislation for VoIP services. There appears to be a consensus, however, that VoIP services residing solely on the internet (PC-to-PC calling) should not be regulated. Global discussion of these issues focuses on approaches to VoIP services that are similar to those described in category III above. The basic regulatory question that hovers over the whole discussion is whether or not VoIP can be regarded as a substitute for PSTN telephony. United States: There has been substantial debate about how to classify (and therefore regulate) VoIP services. The country’s Communications Act (as amended by the 1996 Telecommunications Act) applies more stringent regulation on “telecommunications services” services than on “information services,” and there traditionally has been reticence to overly regulate internet-related services. From the FCC’s perspective, services that are only provided over the internet (like MSN Messenger and Skype) are classified as information services, and even where VoIP services have a gateway to exchange traffic with the PSTN, they should only be regulated in relation to emergency calls and lawful interception. 6.4 Crafting New Regulatory Approaches to VoIP 6.4.1 Balancing Different Policy Needs The transition to IP networks and VoIP services tends to produce conflicting policy approaches in different countries. This section defines some of these conflicts, which tend to reflect opposing policy goals and sector objectives. The main challenge is to balance short- and long-term policy and regulatory approaches. In some countries, VoIP is seen as a major threat to established operators because it undercuts their domestic and international long distance rates and radically reduces their revenues. But strict regulation of VoIP in the short-term to protect the incumbent’s revenues might harm the long-term development of the sector. Often, this drive to protect the incumbent stems from a particular social policy, such as extending universal access. But regulators need 100 to consider not just the established operator’s point of view, but also the welfare of end users and potential new market entrants. The impact of lower prices from competition brought about by VoIP will directly benefit consumers. Competition will also help to increase the number of overall subscribers and boost the volume of usage on all networks. In these circumstances, it is important that policy decisions be based on trend data and that the regulator analyse different market scenarios. Regulation should promote competition, but it also needs to protect consumers and take social concerns into account, including universal access objectives. Regulators may find themselves torn between the need to react quickly to new concerns and stepping back to see the shape and dynamics of the emerging market. Many regulators are guided by a principle of limiting regulatory obligations so as not to discourage market entry or the introduction of innovative new services. This leads to efforts to implement “light-touch” regulation in order to encourage market and technological experimentation. For example, some developing-country regulators have encouraged the use of free or low-cost spectrum, or reduced licence fees, in areas where there are little or no voice or data services. A vital task for regulators and policy-makers is to manage the transition to the new world of IP networks. The most basic questions to address include: • How long should a PSTN network be maintained and supported? • How much time is needed to make changes to existing legislation and regulations, and how can legal stability be maintained in a time of technological flux? C HAPTER 6 Trends in Telecommunication Reform 2006 • How quickly should competition policy change to reflect convergence on IP-based networks? not yet finalized a policy on numbering and spectrum access for VANS. Governments do not have the luxury of setting the pace at which they will resolve these questions. Market changes are already under way, and they are likely to proceed whether they are legally sanctioned or manifested in grey market activities. Unfortunately, there is no consensus on how to address regulatory change prompted by the emergence of VoIP, either at a global or a national level. The following subsections examine a number of potential responses in key issue areas. Other countries restrict market entry of new VoIP operators in various ways. In many countries, ease of market entry depends on whether VoIP is defined as a voice or information/data service. Where VoIP has not yet been categorized, the issue is often under extended debate. 6.4.2 Market Entry In countries where telecommunication competition is already legal, regulators will have to manage the range of issues associated with the transition of services to IP networks. In those countries where the PSTN remains an exclusive preserve of the incumbent, regulators face a more complex task. These regulators have to manage two simultaneous, parallel processes: (1) the transition from a monopoly to a liberalized market, and (2) the transition from a circuit-switched PSTN to an IP-based environment. In the past, regulators largely dictated market changes, and did so at a measured pace. In the future, however, regulators will face a rapidly changing market based on a new type of infrastructure. They will need to deal with a large number of new services entering the market that may never have existed before. The policy and regulatory framework may be influenced or changed by international market developments that regulators cannot control or even influence. So it is becoming increasingly difficult to plan or orchestrate market developments in advance. There are widely differing strategies for addressing market entry. The European Union: Here, the approach is to facilitate easy market entry by requiring individual licences only for scarce resources like spectrum. For other network or service developments, only a notification or registration is required. The EU also adopts a technology-neutral approach, leaving market players to decide themselves what technology to deploy. South Africa: The government has created conditions for easier market entry in Value-Added Network Service (VANS) or enhanced services, but it retains control over the market structure for fixed, mobile and satellite services. Under the current Telecommunications Act, only VANS and “Private Telecommunications Network Service” (PTNS) licences may be issued on a non-exclusive basis. Fixed-line service has been dominated by the incumbent, Telkom, with a second entrant set to commence operations in 2006. Mobile voice and data services are supplied by three operators. Until 1 February 2005, Telkom had a full monopoly on facilities provisioning, and the resale of spare capacity for VANS and PTNS was prohibited. Since then, VANS licensees may obtain alternative facilities from other operators. New regulations for VANS gave providers the right to access spectrum, apply for numbering allocations and interconnect with other operators. Numerous VoIP providers are emerging in the South African market as a result, although the regulator has C HAPTER 6 Brazil: The regulator, ANATEL, has not defined VoIP as a telecommunication service, a value-added-service or a technology. If VoIP is considered a data service, operators will need a licence for multimedia communication services. And in order to initiate and terminate calls outside of a private network, operators need a licence for public switched fixed telephony, which entails certain requirements for coverage and QoS. Moreover, the licence application process is more complex. Some countries, such as Colombia, Egypt and Nigeria, are pragmatic about certain types of VoIP such as like PC-to-PC telephony, which is regarded as a use of personal computing equipment that would be almost impossible to control. Other countries, such as Guinea, have legalized the use of VoIP over virtual private networks (VPNs), which, again, is hard to detect and control. In Nigeria, the regulator has stated that VoIP is legal, provided operators obtain the appropriate licences. As a result, one satellite operator with an international licence is offering a VoIP service to its customers. Yet, other countries completely restrict any form of VoIP market entry and seek to control grey market operators through a variety of strategies. 6.4.3 Numbering Resources Telephone numbers can be used for several different purposes. They can be used to differentiate between services and inform users of tariff categories like premium call services. Numbers can also be used as a tool to control markets by setting restrictions on the use of certain numbers. So access to numbers – or more correctly, withholding of access to them – can become a barrier to market entry. VoIP calls can be routed to end users in several different ways: IP addresses, SIP addresses, H.323 addresses or E.164 numbers. Traditionally, E.164 numbers have been needed to originate and receive voice calls, but they may lose their dominant position in the future and become just one of many options. E.164 numbering ranges are usually divided into several generic types, indicating the services that may be offered using them. Geographic numbers or special number series are regarded as most relevant for VoIP services. Also, mobile, personal and corporate numbers can be used to address VoIP subscribers. These are, however, seen as less attractive in many countries because users will associate them with high retail calling prices. The current position on the availability of geographic numbers for VoIP services varies among countries. The main argument in favour of allocating geographic numbers to VoIP services is that they offer the best support for competition, especially when combined with number portability. The main arguments against this approach have been the nomadic nature of VoIP and potential for exhausting geographic numbering 101 Trends in Telecommunication Reform 2006 resources. There are three ways to allocate geographic numbers in order to support VoIP services: • Allowing nomadic access in a limited area; • Allowing nomadic access countrywide but requiring some relationship with the geographic area of the number; or • Removing any requirement for a relationship to a geographic location. Regulators may also open new number ranges for nomadic VoIP services. Broadly speaking, there are three types of possible new number ranges: (1) a general-purpose number range; (2) a number range for nomadic services, and (3) a number range for Electronic Number Mapping (ENUM)-based or similar, software-based services. ENUM is a protocol developed by the Internet Engineering Taskforce (IETF) that defines a domain name system (DNS)- based architecture and protocol aimed at using a telephone number to look up a list of IP service addresses (e-mail, IP phone addresses, URL, SMS, etc). The idea of ENUM is to use an E.164 number as the key to identify the available communication services to contact a person. For VoIP, it is used to route a VoIP call to an IP network based on the receiver’s E.164 number. The idea of creating new number ranges to accommodate VoIP seems to have mainly been motivated by a number of factors, including avoiding the impression that these are hightariff numbers like those for mobile phones. Also, regulators may want to keep existing number ranges intact and avoid having them depleted. In Europe for example, the number ranges open for VoIP use vary due to different numbering policies and the regulations related to them. The geographic number ranges are open for VoIP services in most countries. But some countries list a number of requirements that have to be fulfilled in order for VoIP providers to obtain numbers. Meanwhile, the cost of numbers (national numbering fees) can be a significant barrier to market entry in some countries. Geographical numbers are typically allocated in blocks (normally blocks of 1000 or 10,000). Where geographic numbers are sold with limited nomadic capability, VoIP service providers may need to get number blocks that cover the whole country. The costs of doing so can be high enough to constitute an entry barrier for small providers. In Europe, numbering costs vary greatly. Number Portability is a key enabler of competition because it allows users to retain their telephone numbers when they change service providers. Regulators must decide whether VoIP providers are included in number portability systems, making them co-equal with all other competitors. 6.4.4 Emergency Calling The nomadic capability of VoIP services poses a problem for the provision of emergency calls because it breaks the link between the calling party and the location. In the PSTN environment, calls routed to the emergency response centre carry information on the location of the caller. With VoIP calls, however, there is – at least currently – no automatic way to convey 102 location information about the user calling an emergency service. Technical solutions, however, are expected to emerge from the current standardization work that is being undertaken.16 The problems of handling emergency calls from VoIP users can be divided into two categories: (a) emergency calls made within a country and (b) cross-border emergency calls. The first category is likely to be less problematic, due to the likelihood of increased cooperation between service providers covered by national regulation in a single country. Cross border VoIP emergency calls raise more difficult issues, because an emergency call needs to be identified as such. Globally, there are more than 60 national emergency call numbers (for example, “911” in the United States and “112” in the EU). For an emergency call to be routed to the right country and the correct emergency centre, intensive international agreement, cooperation and arrangements will be required. Cross-border emergency calling is mostly an issue, of course, in places such as Europe, which are interlaced with multiple national borders. In North America, by contrast, the vast majority of emergency calling is entirely domestic, and crossborder arrangements are less of an issue. From a consumer point of view, the best possible situation is to be able to reach emergency services from any handset, including a VoIP-enabled phone. Technical solutions will be required to overcome any limitations in routing of emergency calls in a VoIP environment. A key question is what will happen with VoIP connections during electricity outages, especially where VoIP is the only option for making a call in an emergency situation. Various principles may be considered to address this issue: • If VoIP handsets or terminals are likely to be used for making emergency calls, they should be equipped to do so; • An emergency call from a VoIP handset or terminal should reach an emergency centre in the country in which the call originates; • Where possible, an emergency call from a VoIP handset or terminal should reach the specific emergency call centre that is responsible for receiving emergency calls for the area in which the caller is located; • The VoIP call made to an emergency centre should carry Calling Line Identification (CLI), which can be used to call back the person reporting the emergency if the person is disconnected before full information has been provided; • Where possible, the number provided by CLI for an emergency call from a VoIP handset or terminal should not be linked to location information that is incorrect or misleading. The following examples of VoIP emergency calling suggest various approaches: European Union: The Universal Service Directive allows for technical feasibility when imposing obligations relating to the provision of location information. It states that location information must be “handled in a manner best suited to the national organization of emergency systems and within the C HAPTER 6 Trends in Telecommunication Reform 2006 Box 6.4: Emergency Services under the North American Numbering Plan Both Canada and the United States are among those countries that follow a regional numbering scheme, known as the North American Numbering Plan (NANP). Consequently, both countries have a standard emergency calling number: “911.” The existing local telephone networks currently provide two types of 911 services: Enhanced 911 and Basic 911. Enhanced 911 (sometimes known as “E911”) service automatically sends customer location information to an emergency centre, where an operator dispatches a response service. E911 allows dispatchers to send responders to the correct location even if the caller is incapacitated, agitated or otherwise unable to provide an accurate description of the location. The older Basic 911 service, meanwhile, connects the caller to a central call centre, which then connects the call to the correct emergency response centre. At that point, the caller must be able to identify or accurately describe the location in order for responders to be dispatched to the right place. Box 6.5: The FCC’s Enhanced 911 Service Order1 Provisions of the U.S. Federal Communications Commission’s May 2005 order on VoIP access to emergency services include: • Interconnected VoIP providers must deliver all 911 calls to the customer’s local emergency operator. This must be a standard, rather than an optional feature of the service. • Interconnected VoIP providers must provide emergency operators with Calling Line Identification and location information for their customers (an Enhanced 911 service) wherever the emergency operator is capable of receiving it. Although the customer must provide the location information, the VoIP provider must provide the customer a means of updating this information, whether he or she is at or away from home. • Interconnected VoIP providers must inform their customers, both new and existing, of the Enhanced 911 capabilities and limitations of their service. • The incumbent local exchange carriers are required to provide access to their Enhanced 911 networks to any requesting telecommunication carrier. They must continue to provide access to trunks, selective routers, and E911 databases to competing carriers. Interconnected VoIP providers must submit to the FCC a letter detailing their compliance no later than 120 days after the effective date of+ the order. 1 Federal Communications Commission, 911 Services, at http://www.fcc.gov/911/enhanced/ technological possibilities of the networks.” Authorities should “make caller location information available to authorities handling emergencies, to the extent technically feasible, for all calls to the single European emergency call number 112.” How the Directive is actually applied varies, depending on national emergency systems and the capabilities of the networks involved. Similarly, related legal requirements – such as providing caller location information, routing calls to an appropriate emergency centre and providing CLI – vary greatly between countries. Where VoIP services are regulated, some countries have set the same legal requirements for both VoIP and PSTN calls, although they provide a temporary technical reprieve from these requirements for VoIP calls. Currently, nomadic VoIP service providers can only meet national legal requirements for emergency services in a few countries. Canada: CRTC decided in April 2005 to require providers of fixed (non-nomadic) VoIP service to provide the same level of emergency service that incumbent telephone companies provide to their existing customers (either “Enhanced 911” or “Basic 911” service). Implementation was made mandatory within 90 days.17 CRTC required providers of nomadic and C HAPTER 6 foreign exchange VoIP services to provide an interim solution equivalent to basic 911 service. In addition, the Commission required all VoIP providers to inform their customers about any limitations of their offerings in providing access to 911 service. The VoIP service providers must secure the customer’s express acknowledgement that they are aware of these limitations before starting service. United States: The FCC issued an order in May 2005 requiring interconnected VoIP providers to provide Enhanced 911 Service (See Boxes 6.4 and 6.5). The order affects providers of services that are functionally equivalent to circuit-switched telephony. For example, the FCC included service provider Vonage in this category, because its service enables customers to send and receive calls from the PSTN. The order did not impose E911 obligations on providers of other IP-based services, such as instant messaging or internet gaming. Although these services may contain a voice component, the FCC said, customers of these services cannot use them to exchange calls with the PSTN. The FCC has also stated its intention to adopt, in a future order, an advanced E911 solution that automatically determines a customer’s location. 103 Trends in Telecommunication Reform 2006 6.4.5 Universal Access and Universal Service As customers switch to VoIP and disconnect from the PSTN, regulators in many countries fear that a decline in revenues from traditional carriers will undercut funding for universal service funds, which often rely on mandated carrier contributions. Of course, this begs the question of whether VoIP providers should be included in universal service funding arrangements. There are two issues at stake here: (1) potential contributions to universal service funds by VoIP providers, and (2) whether VoIP can be an effective tool to deliver cheaper calling to a wider number of consumers. United States: The FCC is confronting a multifaceted challenge to the financial health of the Universal Service Fund (USF), stemming from lower wire-line telephony revenues. The Commission is considering overhauling the contribution formula, which has been revenue-based. One suggestion is to require contributions for any service that requires use of a telephone number – which could take in some VoIP services. While the service providers would make the contributions, they could pass the costs along to customers (as carriers now commonly do) in retail fees or charges.18 Various other countries that allow VoIP, including the Czech Republic, Mauritius, the Slovak Republic and Venezuela, levy universal service/access contributions on operators. In Canada, the CRTC has ruled that if the VoIP service provided allows for access to and/or from the PSTN, the service is considered eligible for contribution requirements, even if the customer uses the service to make peer-to-peer (PC-to-PC) calls. Regulators have to consider the potential consequences of their decisions on funding of universal service programs. If they continue to levy contributions on a narrow base of incumbent or traditional telephony revenues, they risk overtaxing a declining base as subscribers flee to VoIP. But if they broaden the base to include VoIP providers, they may raise the bar for market entry by potential voice service competitors. Indeed, IP-based transmission is arguably less costly and more efficient than circuit-switched transmission. Using the same bandwidth, a VoIP network can carry many times the number of voice calls as a circuit-switched network, making the transport cost, per bit of information, lower on packetswitched networks. For that reason, VoIP can be embraced as a new tool in achieving universal service and universal access, at least from an affordability standpoint. The Association of Infocentres of El Salvador (Infotel), for example, is launching a VoIP service for international calls using pre-paid cards. The service will be available in 41 of the Association’s centres. The initiative is supported by the Salvadoran regulator as a means of reducing international calling costs. Similarly, the state-owned Telecommunications Office (Telof) in the Philippines plans to launch VoIP services in un-served rural areas.19 6.4.6 Competition Consideration of how to regulate the VoIP market raises the question of what kind of competition issues might arise specifically in relation to VoIP. There are several. For example, the development of VoIP service depends greatly on the avail- 104 ability of broadband access. Regulators have to ensure open, non-discriminatory and fair-priced access for ISPs wanting to resell broadband access. Another challenge is to prevent incumbent operators from blocking access to VoIP services by closing ports used by VoIP services or refusing to lease facilities. There is no consensus at this juncture about which regulatory tools should be used to ensure fair competition. But it is important for regulators to prevent anti-competitive behaviour against VoIP providers as they apply downward pressure on tariffs. European Union: Market regulation is based on the circumstance in each market. The telecommunication sector is divided into 18 “relevant markets,”20 which can be analysed by the national regulator in each member country. If robust competition is present, no regulation is applied, but if the regulator finds an operator with “significant market power,” it will implement regulatory remedies to prevent that operator from abusing its market power. Several European countries are in process of considering whether VoIP should be included in the relevant market covering fixed telephony. Again, results vary considerably, but in some countries, VoIP services with a gateway to the PSTN are considered part of the fixed telephony market for the purposes of competition analysis. The whole question of where VoIP services will be placed in terms of “relevant markets” will soon be considered by the European Commission. Canada: CRTC also has decided that VoIP should be seen as part of fixed telephony market. But it will only regulate VoIP services when they are provided and used as a local telephone service. This decision was aimed at building sustainable competition in the local telephone market. Incumbent local loop carriers (which are held to possess market power) are prohibited from pricing their local services below cost as a way to stifle competition. 6.4.7 Interconnection 6.4.7.1 VoIP’s Challenge to Current Models VoIP services challenge current interconnection models in several respects, both from an economic and structural perspective. Again, it is helpful to separate what may happen in the short-term, during the transition period to IP networks, and in the longer-term, when most networks have become IP-based. In the short-term, interconnection will be mainly between IP networks and the PSTN. But over the long term, interconnection will increasingly occur directly between IP networks. Short-term interconnection issues: Current interconnection models are increasingly based on cost-oriented charges. VoIP may disrupt this because of the difference in investment scale between IP-based networks and PSTN networks. Although views differ as to the exact scale of difference, the cost of IP networks is significantly lower. So there is a possibility of variations in call-termination rates based on cost differences. There are not likely to be any issues when the call comes from an IP-based network to the PSTN, because the receiving PSTN operators normally charge the same termination fee regardless of which network the call comes from. But when the call C HAPTER 6 Trends in Telecommunication Reform 2006 originates on the PSTN and terminates on an IP network, the termination cost is difficult to determine. The relevant elements to assess the actual costs are unclear. Thus PSTN-to-IP interconnection is likely to generate a difficult debate between the different players, requiring regulatory oversight and intervention. Long-term interconnection issues: In the long term, when IPto-IP interconnection is predominant, the application of current telephony interconnection models will create a number of problem areas. These are examined below, and it should be noted that these issues apply to all IP services and not just to voice calls. • Support of new IP-based services: IP-based networks are expected to support new services, including thirdparty services. The existing, usage-based format for interconnection would call for interconnection agreements and charging arrangements with each service provider, at each interconnection point. But there is a basic technical problem: there is no way (at least in the near future) to transmit the charging information between IP networks. These kinds of practical issues could constitute a barrier to the roll-out of new services if changes are not made in the interconnection model. • Changes to cost structures: Developments in technology and huge economies of scale have resulted in the substantial decline of core or backbone network costs. The existing regulatory and commercial models assume an expensive backbone network, which is why there is so much emphasis on competition and pre-selection for long distance and international calls. With less-expensive IP backbones, there is a need to consider adopting capacity-based charging instead of usage-based prices for basic connectivity. A simple approach would be to make one of two changes: either separate charges for services and connectivity, or adopt “bill and keep” interconnection. • Changes to the retail market: The existing retail market is changing. Call prices are dropping, and some operators are starting to offer flat-rated tariffs with unlimited call volumes for a fixed subscription. This sets up the risk of arbitrage. Operators would benefit from having interconnection arrangements that better match the structure of the retail charges. This change is causing many commentators to say that the days of time-based call charges are rapidly disappearing. But there are still a number of high-priced, time-based charging structures (for mobile calls and premium-rate services), and providers of these services will likely seek to continue these revenue streams or find substitutes, such as metered charges for video or music downloads. 6.4.7.2 New Approaches to Interconnection These developments suggest the need to look for new approaches to interconnection. A variety of ideas are under discussion, and there is a lively debate between the “telecom world” and the “internet world” on two basic approaches: a) An open, internet-type approach, in which the separation of service provision and connectivity occurs as it does on C HAPTER 6 the internet. This would require separate consideration of: • Interconnection (interoperability) at the service level, where services are charged on the “bill and keep” principle (peer to peer), and • Interconnection at the connectivity level, where charging between networks is based on capacity charging or another similar method; b) A next-generation network (NGN) architecture approach, in which network operators have more control over, for example, service quality (such as providing different categories of guaranteed bandwidth), security (such as customer ID, authentication and security tunnelling) and charging for services by third parties. NGN architecture includes additional software, which is not present on the basic internet network, such as IP Multimedia Subsystem (IPS), which controls the interconnection of services to networks. This means that in NGN architecture – since network and application services are separate – network operators can get a share of revenues from application services. In the future, there will likely be more than one interconnection model. Market players may be able to choose the one that best fits their needs and situations. During the transition period to IP networks, new interconnection models will perhaps exist in parallel with older arrangements, just as the internet’s current charging model works alongside the telephony charging structure. 6.5 End User and Consumer Issues Because VoIP services ride on an entirely new network and transport model, there are inevitably issues with regard to duplicating or recreating some of the salient features of the old environment. These issues relate to quality of service (QoS), network security, privacy and access for legitimate law enforcement purposes. This section examines how regulators and other government authorities are addressing these issues. 6.5.1 Quality of Service One of the requirements for the deployment of VoIP networks is the ability to offer toll-quality service equivalent to the existing PSTN. The QoS standard for VoIP can be defined in several ways, depending on whether it is considered from an end user or a technical perspective. The end users’ perceptions of service quality can be measured through subjective quality assessment. The most common consumer-based method to quantify QoS is the “Mean Opinion Score” (MOS) developed by ITU-T. 6.5.1.1 End-to-End Quality Discussions of VoIP QoS typically highlight the issue of increased end-to-end delay and discuss the effects of this delay in interfering with the normal cadence of voice conversations. People expect their conversations to be in real time. If delays occur, people begin to talk over each other and conversations begin to break down. 105 Trends in Telecommunication Reform 2006 This problem is actually a familiar one, however, because of satellite latency on international calls and strained reception on mobile phones. The delays and dropped calls in the mobile environment are, in fact, more marked than those stemming from VoIP use, and they are tolerated by users as the price for mobility and convenience. Moreover, mobile phones are the default level of QoS expectation in most developing countries, where mobile telephony is the dominant voice medium. This may be particularly true in Africa, for example. And although VoIP call quality is still inferior to analogue or circuit-switched systems, many PSTNs in developing countries offer call quality well below what is experienced in developed countries, anyway. Seen in this light, QoS is a relative concept. Delay is still a major issue for digital voice transmission, but other parameters need to be included in QoS for voice transmission evaluation. The combination of these parameters will therefore define the end-to-end quality: – Jitter, which is the variation in the time between packets arriving, caused by network congestion, timing drift, or route changes. A jitter buffer can be used to address this; – Packet loss, which introduces audio distortions; – Speech coding and decoding, which generate an approximation of the original signal. 6.5.1.2 QoS in Practice From the consumer’s perspective, QoS is really about a series of trade-offs involving lower costs and other advantages. Extending the comparison with mobile phones, consumers appear willing to pay more for the added value of mobility than for fixed-line service. Similarly, a consumer using VoIP is often willing to trade call quality for lower-cost (or free) calls. In developing countries, grey market users are making exactly the same trade-off. From this perspective, QoS for VoIP seems more like a function of market forces, and in fact, many operators make great efforts to maintain the QoS at the highest possible level, so as to attract subscribers. If consumers are unhappy with the quality of any particular service, they will cease to use it. Many VoIP applications may not normally meet the mission-critical voice-quality standards required by corporate clients – unless, of course, service-level agreements are in place to provide (for a price) higher-level quality performance and network integrity. If VoIP QoS appears to be a matter of choice, trade-offs and market demand, it begs the question of whether QoS is a major issue. Still, regulators are examining it, particularly in developing countries, where VoIP is emerging as a low-cost communication solution. 6.5.2 Regulating Network Integrity and Security 6.5.2.1 Network Integrity The term network integrity refers to the inherent reliability of a network and its resilience to external threats, such as natural disasters or malicious acts. The main regulatory issue arises from the fact that VoIP can be provided independently of the 106 underlying network access. This network/service independence has several implications: • VoIP can be provided over an access network without the operator of that network being aware, or having any control over, the voice service provided; • VoIP can be provided over an IP network using any access technology; • VoIP can be provided over an IP network at any location. This fundamental independence from network operations has the potential to raise complications for regulators, because existing network integrity requirements usually were developed when the network and the service were not independent. VoIP services have introduced the possibility that calls can be provided independently of the access network provider. The European Union’s network integrity requirements are set out in the Universal Service Directive, which calls upon member countries to take “all necessary steps” to ensure the integrity of the public telephone network at fixed locations. The member countries are supposed to ensure that providers of publicly available fixed telephony “take steps to ensure uninterrupted access to emergency services.” This raises questions about how VoIP services fit into these requirements: • Are “nomadic” VoIP services (ones that can be used over any IP access network) provided at a “fixed” location? • What are the implications of network/service independence? • What are “all necessary steps” to ensure the integrity of the public telephone network at fixed locations in a VoIP context? These issues are under discussion in European countries. Thus far, there is no common European regulatory approach covering VoIP and network integrity. 6.5.2.2 Electronic Communication Security Electronic communication security is a broad subject that can be used to address a large variety of issues. There are eight dimensions of network security: • Access control, • User authentication, • Non-repudiation, • Confidentiality, • Communication security, • Data integrity, • Availability, and • Privacy. On application layers of an IP network, the operation of each application (web browsing, e-mail, domain names) brings with it its own security questions. In each case, specific actions are taken to minimize risks, such as filtering software for email. The PSTN is, by nature, a closed network with controlled security and privacy. An IP network is based on open network architecture, with resulting communication security vulnerabilities that can affect VoIP as much as any other service. C HAPTER 6 Trends in Telecommunication Reform 2006 Box 6.6: SPIT: A Looming Issue An issue that has recently begun to emerge and may require further consideration is “Spam over Internet Telephony,” or “SPIT.” Related to the larger problems of Spam and “SPIM” (Spam over Instant Messenger), SPIT is essentially junk mail in voice form – unsolicited voice messages and unwanted advertising or marketing. This problem has a unique element, in that VoIP has a broadcast capability. Views differ on the future scope of the problem. Some network security software products are being developed to incorporate SPIT-blocking technology in future releases. But some operators and analysts are less concerned about SPIT, because messages have to be streamed to a network, as opposed to simply being mass emailed. At the same time, others have noted that standard content filters used for spam would be very difficult to apply to voice. The variability of phrases and pronunciation make algorithms difficult to write, and the technology lends itself to extremely cost-effective solutions for telemarketers. While SPIT is just barely emerging, it is not a new problem. It can be addressed as part of a general approach to voice security in the IP space that addresses multiple problems and vulnerabilities – including viruses and “denial of service” (DoS) attacks – that have been identified with Session Internet Protocol (SIP). Box 6.7: Threats to VoIP Networks and Publicly Available Services • Distributed Denial of Service (DDoS) attacks threaten the availability of the VoIP network by flooding it with unnecessary data or attacking the key network elements. DDoS attacks are typically launched from a large number of compromised client machines and are difficult to defend against in the light of VoIP QoS requirements; • Thefts of call information can occur by breaching vulnerable VoIP signalling servers. The call information can be as valuable as the content, so it is likely to be a target for attackers; • Conversation eavesdropping or recording can occur by breaching VoIP network gateways or other key network points. Software plug-ins required to sniff out VoIP traffic are available on many open-source websites for free; • “Call hijacking” or “man-in-the-middle” attacks can occur. These scenarios involve rerouting the connection or modifying call parameters; • Identity “spoofing” can occur through manipulating Caller ID; • Attacks can be made against the terminal equipment software, devices or network servers themselves. The software on these devices can be vulnerable to the same types of vulnerabilities that affect all operating systems software. Box 6.8: Defense Mechanisms against Security Attacks Communication security depends on both the actions of the end user and the security practices of the VoIP service provider. Security is always a compromise between the utility and cost of the service and the protection mechanisms that are available. In order to mitigate security risks, the VoIP service provider should consider at least the following measures: • VoIP networks should be logically separated from other IP services and applications; • VoIP servers should be hardened and treated using the same security precautions as any other servers that contain confidential information and offer network services; • VoIP networks should be redundant, in order to ensure the availability of the service. The VoIP network has to be resistant to denial-of-service attacks. This is especially essential for emergency services; • Encryption of VoIP traffic can be used whenever reasonable. Encryption can be implemented on the application, transport or network levels; • Network devices should be configured properly to restrict unnecessary traffic toward VoIP systems and to ensure the operation of VoIP services. Box 6.8 discusses some mechanisms that can be used to guard against attacks. 6.5.3 Lawful Interception There are times when every nation’s law enforcement authorities may have justifiable and legal cause to intercept C HAPTER 6 telecommunication traffic. The regulatory aspects of lawful interception of VoIP services are complex. In the future it will be vital for law enforcement agencies to be able to monitor and intercept internet-based voice traffic, but the VoIP services sector is much more fragmented than the large telephony operators and involves multiple types of network platforms. 107 Trends in Telecommunication Reform 2006 The issue of how to manage lawful interception is likely to become more urgent, as operators move to “next-generation network” architectures. Several countries are considering measures to give their security services powers to intercept e-mails and monitor internet traffic. Increasing pressure is being placed on national regulatory bodies to make sure that operators enable surveillance and retain call and traffic information. As more voice traffic moves to IP-based networks, the same pressures will be brought to bear on VoIP providers. For example, in August 2005, the United States FCC ruled that providers of certain broadband and interconnected VoIP services must be prepared within 18 months to accommodate law enforcement wiretaps. Under the Communications Assistance for Law Enforcement Act, or CALEA, the FCC has determined that VoIP services can essentially replace the telecommunication services currently subject to wiretap rules, including circuit-switched voice service and dial-up internet access. As a result, any VoIP provider interconnected with the PSTN must be wiretap-ready by early 2007.21 CALEA requires the Commission to preserve the ability of law enforcement agencies to conduct court-ordered wiretaps in the face of technological change. Wiretapping, however, raises serious concerns regarding individual privacy rights. In terms of lawful interception, regulators might play a useful role in helping to determine the balance between the rights of the individual citizen and the requirements of government to monitor traffic. At a practical level, regulators can also help find a balance between the obligations and requirements of law enforcement agencies and the needs of service providers. Below are some of the issues that are raised by lawful interception obligations: • Costs: The cost of complying with wiretap obligations can be significant. In some countries, the government shares the costs of lawful interception with smaller operators or service providers, but where these arrangements are absent, regulators need to be sensitive to the fact that for smaller ISPs or VoIP service providers, the cost of purchasing the 108 • • necessary equipment to be able to provide access to law enforcement agencies can be prohibitive. Area of Responsibility: Another potential problem area is delineating responsibilities for implementation and compliance between the regulators and law enforcement agencies. This can lead to difficulties in establishing technical specifications, determining service provider responsibilities and applying remedies for non-compliance. Standards: Lawful interception, especially of cross-border services, is highly dependent on standardization bodies such as the European Telecommunications Standards Institute. Unfortunately, although standards for lawful interception in traditional circuit-switched networks are well defined, there is still a long way to go before interception standards for VoIP are standardized. 6.6 Conclusion The implementation of regulatory approaches to VoIP will remain highly uneven for many years to come. In fact, they may never be uniform. But there is at least a consensus that regulators should address IP-based networks and services. The countries that have begun to do so are generating precedents and providing guidance for others to follow. It appears that at least minimal additional regulation of VoIP may be required to ensure quality, security, network integrity, interconnection, access to emergency services and further competition in global telecoms markets. VoIP services offer a truly exciting technological development that may yet unlock affordable communication solutions for much of the developing world. Regulators can act to ensure that they assist in this common goal. VoIP is a particularly important opportunity for developing countries to provide voice and other services more cheaply than with traditional PSTN networks. The increased availability of cheaper services will broaden access to a larger number of citizens, providing another avenue for closing the Digital Divide. C HAPTER 6 Trends in Telecommunication Reform 2006 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Clayton Christensen, The Innovator’s Dilemma: When New Technologies Cause Great Firms to Fail (New York: Harper Business, 1997). Christensen coined the term “disruptive technologies,” which are said to satisfy existing customer needs at a drastically lower cost and are simpler and easier to use than previous ones. Disruptive technologies cannot at the point they are introduced into the market, compete against the traditional products such that they can acquire a large market share. See http://www.telegeography.com/press/releases/2005-05-31.php For example, from May 2005, Senegal’s incumbent operator, Sonatel, cut its international call rates to USD 0.19 a minute at weekends and USD 0.31 cents during office hours. Sonatel was one of early adopters of VoIP for international calling. In South Africa, as part of its tariff rebalancing, the monopoly operator Telkom reduced international calls overall by approximately 36 per cent over 2004-2005. Telkom’s licence required it to ensure tariff rebalancing was completed by the end of its five-year monopoly. See http://www.20min.ch/tools/suchen/story/27383201. It is also noteworthy that the establishment of the World Trade Organization (WTO) and the GATS Framework Agreement has facilitated a much wider and more complex exchange process, and facilitated a regime change from one typified by an exchange of traffic, to one characterized by (multilateral) trade in services, and a consequent shift away from individual, bilateral country negotiations for market access and network interconnection. The Pakistan carriers use VoIP as licensed long-distance or local loop carriers. Chinatechnews, “MII: No Plans Soon To Lift Ban Over VoIP”, July 22, 2005, online at http://www.chinatechnews.com/index.php?action=show&type=news&id=2813; Chinatechnews, “China Netcom Prepares To Crackdown On Illegal Phone Kiosks”, June 20, 2005, online at http://www.chinatechnews.com/index.php?action=s how&type=news&id=2716 IP-Enabled Services, WC Docket No. 04-36, Notice of Proposed Rulemaking, 19 FCC Rcd 4863 (2004) “Regulatory framework for voice communication services using Internet Protocol”, Telecom Decision CRTC 2005-28, 12 May 2005. Local VoIP services are defined as those which use telephone numbers that conform to the North American Numbering Plan and provide universal access to and/or from the Public Switched Telephone Network (PSTN), along with the ability to make or receive calls that originate and terminate within an exchange or local calling area. “Local Competition”, Telecom Decision CRTC 97-8, 1 May 1997. Memorandum Circular, No. 05-08-2005, Subject: VOICE OVER INTERNET PROTOCOL (VOIP), National Telecommunications Commission of the Philippines (last visited at http://www.ntc.gov.ph/whatsnew-frame.html) REGULATION OF INTERNET PROTOCOL (IP) TELEPHONY, Statement of the Telecommunications Authority, 20 June 2005, OFTA http://www.ofta.gov. hk/en/tas/ftn/tas20050620.pdf China’s government is considering banning the use of unregulated VoIP services. Report in Fierce VoIP, 13 September 2005. Intrado has introduced a new service that will enable VoIP providers to offer 911 services in compliance with the recent FCC mandate. The company claims that its V911 Mobility Service will let wireless VoIP providers nationwide position their services as primary line replacements. The solution is designed to accommodate each jurisdiction’s 911 regulations while supporting static, mobile and out-of-area phone numbers. Intrado supplies 911 integration by transmitting routing instructions for the local 911 service through the wireless VoIP provider’s modem. The service redirects VoIP 911 calls over the existing wireline service and offers live call-center support 24 hours a day. See http://lists.fiercemarkets.com/c.html?rtr=on&s=69l,f8zf,lcs,bhks,bxd0,jti9,1419 “Decision on 9-1-1 Emergency Services for VoIP Service Providers”, Telecom Decision CRTC 2005-21. Federal Communications Commission, Federal-State Joint Board on Universal Service Seeks Comment on Proposals to modify the Commission’s Rules relating to High Cost Universal Service Support”, FCC 05J-1, CC Docket No. 96-45, 17 August 2005. Telegeography, “Telof to launch VoIP in unserved areas”, May 16, 2005. Available at http://www.telegeography.com/cu/article.php?article_id=7203 The list is provided in the European Commission’s recommendations. Federal Communications Commission, First Report and Order and Further Notice of Proposed Rulemaking, FCC 05-153, ET Docket No. 04-295 RM-10865, 23 September 2005. Available at http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-05-153A1.pdf C HAPTER 6 109 Trends in Telecommunication Reform 2006 7 STEMMING THE INTERNATIONAL TIDE OF SPAM Author: John G. Palfrey, Jr., Executive Director, Berkman Center for Internet & Society and Clinical Professor of Law, Harvard Law School The anti-spam laws enacted around the world so far have been largely unsuccessful in stopping spam.1 In almost every instance, anti-spam statutes have been directed at sanctioning spammers for their bad acts. An increasing number of countries and other jurisdictions have created such laws or applied to spam their existing, generally applicable laws concerning data protection, consumer protection, and protection against fraud. Yet, in many cases, these laws have missed their target entirely, with no perceptible impact on actual spammers. Even worse, the laws have often had negative side effects, in the form of transaction costs, administrative costs, and a chilling effect on legitimate senders of e-mail. No matter what kind of law is enacted or applied, antispam measures require well-conceived, targeted, and coordinated enforcement mechanisms in order to be effective. Without a doubt, anti-spam investigations are invariably complicated and expensive, presenting challenges for any country seeking to enforce anti-spam laws. Even the U.S. Federal Trade Commission, with its substantial resources, has brought only approximately 70 cases against spammers. For developing countries that have limited human and financial resources for such work, anti-spam laws can be rendered nearly meaningless because of the enforcement challenge. Cross-border cooperation and enforcement is not only desirable, but also essential to spam fighting. But the variety of anti-spam laws and underlying legal systems on the books of various countries makes collaboration extremely difficult. The challenge of fighting spam through law – to be sure, only one of the potential modes of regulation – calls for new thinking and increased emphasis on international harmonization and collaboration. The only effective means of combating spam is likely to be a combination of approaches. As noted in the Chairman’s report of the ITU 2004 Global Symposium for Regulators (GSR),2 a multi-pronged approach to dealing with spam is an appropriate measure. This chapter primarily takes up the question of what – beyond coordinating with technologists and other countries’ enforcement teams and educating consumers – legislators and regulators might consider by way of legal mechanisms. First, the chapter takes up the elements that might be included in an anti-spam law. Second, it explores one alternative legal mechanism which might be built into an anti-spam strategy, C HAPTER 7 the establishment of enforceable codes of conduct for Internet Service Providers (ISPs). Third, the chapter also examines a variant of the legal approach where ISPs are formally encouraged by regulators to develop their own code of conduct. ISPs should be encouraged to establish and enforce narrowly-drawn codes of conduct that prohibit their users from using that ISP as a source for spamming and related bad acts, such as spoofing and phishing, and not to enter into peering arrangements with ISPs that do not uphold similar codes of conduct. Rather than continue to rely upon chasing individual spammers, regulators in the most resource-constrained countries in particular would be more likely to succeed by working with and through the ISPs that are closer to the source of the problem, to their customers, and to the technology in question. The regulator’s job would be to ensure that ISPs within their jurisdiction adopt adequate codes of conduct as a condition of their operating license and then to enforce adherence to those codes of conduct. The regulator can also play a role in sharing best practices among ISPs and making consumers aware of the good works of the best ISPs. While effectively just shifting the burden of some of the anti-spam enforcement to ISPs is not without clear drawbacks, and cannot alone succeed in stemming the tide of spam, such a policy has a far higher likelihood of success in the developing countries context than the anti-spam enforcement tactics employed to date. 7.1 The Spam Problem The problem of spam is well established. The extent of the problem is plain to anyone who relies upon electronic mail (email) for communications. Email and related forms of messaging such as “blogs” (short for “Web logs”) and short messaging service (SMS), have become an important and popular means of communication in cultures around the world. These services are cheap, they have global reach, and they are playing a key role in the development of e-commerce. The proof of their value is found in their extraordinary global adoption rate, whether in the form of an e-mail client (such as Microsoft’s Outlook, Eudora, Thunderbird, or others) or hosted services (such as Microsoft’s Hotmail, Outblaze, Yahoo! Mail, Google’s Gmail, Wanadoo or Noos in France, among others). 111 Trends in Telecommunication Reform 2006 But the openness that has made e-mail and its close cousins such tremendously easy ways to connect is also emerging as their greatest vulnerability. A combination of economics, technologies, and online behaviour norms has made the incremental cost of sending a spam message nearly zero, while promising senders a profitable potential return. At first glance, the economics seem baffling. How can it possibly be worthwhile to send out grammatically challenged messages about low-cost pharmaceuticals or pirated software – offers that the vast majority of recipients ignore and quickly transfer to their “junk mail” folders? Part of the answer is the tiny marginal cost of sending spam messages. Because they cost nearly nothing to send, the response rate does not need to be very high. And it turns out that enough people do respond to make the endeavour worthwhile to the spammer. Astonishingly, the Business Software Alliance (BSA) has found that 22 per cent of British consumers they surveyed purchased software through spam.3 Rates for the other five countries BSA surveyed were similarly high. The bottom line is that spam persists because it is profitable. Unless enough consumers become educated to avoid or reject spam, the best way to reduce spam may be to raise the risks and costs to the spammer. Right now, the costs seem to be landing on consumers. Every major, credible report on this topic suggests that more than half of the e-mails sent today are spam, and some suggest that spam comprises between 70 and 90 per cent of all e-mails sent.4 The costs of this scourge are borne not by the spammers, but by those who run networks, employers and the individuals who receive the messages. Spammers – and those who use spam to perpetrate related frauds – take advantage of the open design of IP networks to render e-mail costly and nearly unusable for some businesses and consumers. 7.1.1 Legislative Responses The “extremely rapid growth” of spam5 has led to the enactment of more than 75 specific laws,6 such as the wellregarded Australian law, the United States’ CAN-SPAM Act of 2003 and comparable legislation in several dozen countries around the world.7 These laws have, to date, been unable to stop spam. Accounts vary somewhat in terms of rates of growth, but there is no persuasive evidence that the growth of spam has abated in the wake of anti-spam legislation.8 In fact, most indicators point in the other direction.9 Spam is best viewed not as a nuisance, but in the context of cybersecurity. Spam is bad enough as a drain on productivity and a daily annoyance. But few people consider that spam is enormously costly to ISPs and others who maintain the network at various levels. Meanwhile, its negative impact is growing by virtue of the bad things it brings with it. Spam is the preferred delivery mechanism for a range of Internet security threats: viruses, “phishing” and “pharming,”10 scams with endless permutations, and advance fee frauds, to name a few.11 Spam is also undercutting the efforts of developing countries to persuade new users to rely on digital communications. Bill Gates, who is arguably the world’s most powerful technologist, promised to lead the charge against spam and to end it within two years of the January 2004 World Economic 112 Forum meeting in Davos, Switzerland.12 He is not alone in having fallen short in this goal. In fact, most major, well-intentioned ISPs and e-mail service providers, along with many technology start-ups, have devoted many millions of dollars to spam-fighting measures. Standards bodies have sought to improve protocols to snag more spam. User education campaigns have been launched. And governments around the world have come together to enforce their spam laws and to cooperate more effectively with one another. The problem continues despite these many efforts, suggesting that new solutions must emerge and that existing efforts must be better pursued and coordinated. Some of the most effective recent efforts have been those lawsuits undertaken by ISPs under a private right of action in spam legislation. In the United States, the CAN-SPAM Act of 2003 enables ISPs to sue spammers directly. AOL, Microsoft, and Earthlink – very large-scale providers of electronic messaging services – have each brought actions under this statute, as well as under state-level computer crime and common law statutes. This has resulted in multi-million-dollar judgments and settlements against “spam king-pins” who abuse their networks.13 Microsoft won a USD 7 million judgment that may well have put an end to one spamming operation that allegedly distributed more than 38 billion unsolicited messages per year.14 These lawsuits – although few and far between, and limited to certain jurisdictions – represent a ray of hope that enforcement by ISPs, with help from customers, might get the job done against spam. Indeed, the success of these efforts suggests that ISPs could become the most valuable players in the effort to end spam. The challenge for lawmakers is how to create a fair, effective regulatory regime that takes advantage of ISPs’ ability to help end spam without placing an undue burden on law-abiding companies.15 7.1.2 A Model Law: One of Several Ways To End Spam 7.1.2.1 A Combination of Approaches Is Needed The persistence of spam problem has led policy-makers, technologists, academics, and many others to come up with a wide range of possible strategies to end it. The least intrusive approach, most consistent with the end-to-end principle of network design, is to leave the job to end users, through simple technologies such as spam filters on e-mail clients. The improvement of authentication, accreditation, and identity management technologies ought to help make user-level controls more effective over time.16 At Davos in 2004, Mr. Gates described Microsoft’s pursuit of solutions to complement these user controls.17 One approach calls for a combination of law, code, markets, and norms.18 Meanwhile, the chairman’s report of the ITU Thematic Workshop on Countering Spam in 2004 contains a range of proposals, suggesting an intersection of many methods of spam-fighting.19 This comprehensive, five-part approach calls for a combination of: C HAPTER 7 Trends in Telecommunication Reform 2006 • • • • • Strong, enforceable legislation; The continued development of technical measures; The establishment of meaningful industry partnerships, especially among ISPs, mobile carriers and direct marketing associations; The education of consumers and industry players about anti-spam measures and Internet security practices; and, International cooperation among government, industry, consumer, business and anti-spam groups, for a global and coordinated approach to the problem. In fact, virtually every major report on spam calls for a combination of approaches to combat the problem, rather than a single, “silver-bullet” solution. This chapter does not take up in detail each of these anti-spam tools, but rather focuses on legal strategies, emphasizing those that are relevant to developing countries. Anti-spam laws are perceived today to be a necessary tool for all countries, if for no other reason than that they help facilitate international cooperation in combating spam. Even the most ardent supporters of user controls and market solutions agree that governments have a role to play in tracking down and punishing the worst offenders, such as those who use spam to commit fraud. The existence of interoperable anti-spam laws creates a common baseline for international enforcement. A developing country may not be able, by itself, to enforce its anti-spam law, but that law can provide the basis for regional and multinational enforcement actions. A country with experience enforcing anti-spam legislation may wish to provide human resources to conduct an anti-spam investigation and enforcement action that leads to another country. In the absence of anti-spam legislation, however, such international cooperation is not possible on a systemic basis. Anti-spam laws are increasingly viewed as one of several necessary tools for most countries. 7.1.2.2 The Effect on Developing Countries Spam is arguably a bigger problem in developing countries than in wealthier countries, where anti-spam mechanisms are more robust. Many developing countries do not yet have antispam laws,20 and those that do often do not have resources to enforce them.21 Meanwhile, the effects of spam are often relatively more costly in developing countries. ISPs are frequently deluged by spikes in spam, which lead to network slowdowns and breakdowns.22 Moreover, many people in developing countries send emails from shared Internet connections and equipment, such as at cybercafés or other public access centres. These services ordinarily rely on hosted email services with limits on inbox sizes. Accessing email becomes too expensive if per-minute charges paid to cybercafé owners are consumed by cleaning spam from their inboxes. Even worse, legitimate emails are bounced because the limited space of their inboxes is consumed by spam. Officials from developing countries often point to the fact that most spam still comes from the United States and other wealthy countries, which have done little to help developing C HAPTER 7 countries cope with the problem. In addition, they note that the resources of regional bodies such as the OECD are not consistently available to developing countries. This leaves them at a comparative disadvantage in fighting spam. The answer for developing countries is not simply to copy anti-spam laws enacted in developed countries. That approach is unlikely to be effective. Anti-spam laws aimed at sanctioning spammers may be of little use in developing countries if the spammers are outside their jurisdiction. The challenge is to tailor legislation to patterns of usage in developing countries and to consider all avenues to combat spam, such as implementing enforceable codes of conduct for ISPs. 7.1.3 An Alternative Mechanism: Enforceable Codes of Conduct In addition to enacting anti-spam legislation, developing countries could require ISPs to establish an industry code of conduct on spam. The enabling legislation for such a code could stipulate that the nation’s regulatory agency would enforce the code against any ISP that materially violated it.23 Such a proposal cuts jarringly across the grain of most internet regulation to date. As essential players in developing ICTpowered economies, ISPs have generally been left alone by legislatures, administrative agencies, and judges. They may be licensed and overseen by regulators in some contexts, but ISPs have largely been immune from prosecution for bad acts committed by people through their services. 7.1.3.1 Elevating the Role of the ISP Ideally, it is not an ISP’s job to be a gatekeeper. The ISP should pass all packets from sender to receiver, with end users deciding what to send and what to receive. Any departure from this model should be undertaken only when serious circumstances warrant it. In addition, regulation should be handled with a light touch, and any burdens placed on ISPs should not be starting points for more intrusive regulation. It is essential to acknowledge how the internet has changed since its inception. We use the network far differently than any of its early architects could possibly have imagined. The “community” of users is now more far-flung than it ever was, and they no longer expect to know one another, as the earliest academics and military users did. The internet’s architecture is a victim of its own success. The conventional wisdom that no intelligence should be built into the heart of the network – the so-called end-to-end principle – is still held dear by many technologists, but it is no longer fully reflected in reality. A large number of control points have been built into the network – often to deal with massive problems like spam.24 ISPs still enjoy broad immunities in many jurisdictions from claims based on what others do on their networks. For example, they rarely face copyright violation or defamation claims. But they are increasingly called upon to play a role in protecting and policing the internet. There are substantial risks associated with placing such jobs in the hands of ISPs – particularly to civil liberties – so any legislation that mandates a greater supervisory role must be carefully drafted so as to mitigate these risks. 113 Trends in Telecommunication Reform 2006 7.1.3.2 Establishing an Industry-Led Approach Countries should work to establish an industry-led regulatory approach that provides a mechanism for regulators to step in against the worst spam abusers. This proposal is not meant to presage a wholesale shift in the role of ISPs. Nor is it meant to indicate a rejection of the end-to-end principle as a preferred design matter. ISPs already bear the brunt of the costs of spam. The role of the law and the regulator should not be to burden ISPs further, especially given the constraints they already face.25 Rather, the goal is to reduce spam in a way that protects responsible ISPs. As the internet has developed into a complex network of networks, ISPs are positioned, for good or ill, as key gatekeepers. ISPs that implement responsible, effective anti-spam measures, while preserving the civil liberties of their users in a manner that is consistent with local law, should be rewarded for their good behaviour. One means of rewarding those responsible ISPs is for regulators to hold their irresponsible competitors accountable. This would create a level playing field for responsible ISPs. ISPs are no strangers to fighting spam. ISPs around the world have taken an active role in attacking spam at the source, before it clogs their customers’ inboxes. Anti-spam measures implemented by ISPs cover a wide range. Many ISPs participate in industry-wide working groups, such as the Messaging Anti-Abuse Working Group.26 Many also work with standardsetting organizations developing technical solutions.27 ISPs’ initiatives are often geared toward improving security and decreasing the vulnerability of users and of their networks. When they succeed, it can often be a strong selling point for them. For example, Google’s Gmail, a free Web-based e-mail service, removes hyperlinks from messages that the service believes to be phishing attempts.28 The large U.S.-based ISP Earthlink requires all e-mail messages to be routed through its mail servers, in order to reduce the impact of “zombie” networks. Earthlink also mandates that users’ e-mail programs submit passwords to transmit messages.29 While these methods can reduce the burden of spam, their effect is minimal if consumers do not also take steps at the “client” level of the network. End users may not update their own virus software automatically or regularly. Or, they may download programs that contain “malware” and “spyware” that compromise their computers, posing a risk not only to themselves but to other users worldwide, since their PCs may be hijacked to relay spam to other unsuspecting consumers. Governments and ISPs both have incentives to end spam.30 ISPs bear a large amount of the cost of spam and get nothing in return – unless they are charging a premium to spammers in exchange for sending spam out on their behalf. ISPs also are relatively close to the problem. After all, spammers need ISPs to get access to the internet to dump their messages. While spammers are increasingly sophisticated in evading tracking, a concerted effort among cooperating ISPs (and possibly law enforcement officials and end users) can find the worst offenders. The routing of spam can be traced and mapped at a network level.31 While ISPs are often short on cash flow, many do 114 have the financial and human resources to play a key role in the anti-spam fight. National laws can mandate the development of codes of conduct by and for ISPs. Adherence to the code could be a licence condition, or it could be implemented through a rulemaking proceeding, via a common set of regulations that applies to ISPs whether licensed or authorized, much as operators are required to provide interconnection, the rules for which are spelled out in interconnection regulations with industry participation. The law would give ISPs the first opportunity to craft the code, outlining acceptable behaviour for ISPs and their customers. Preferably, the code would prohibit spam, phishing, spoofing on the ISPs network, and similar practices. It could also suggest or endorse the best use of spam filters and other technological tools for customers and ISPs to fight spam. The regulatory agency would approve and, in many cases, enforce the code. Under such codes, ISPs would commit themselves to denying service of any kind to spammers, phishers, spoofers and other bad actors who violate these policies. Such codes of conduct would be led by industry and made functionally consistent among all players across the industry, but as part of a process that is grounded in law and provides a role for regulators. The regulator would be empowered to approve the code and to enforce the code if the ISP deviates from its terms in material fashion. Regulators are better able to do their job under this scenario, as compared to the straight enforcement role against spammers, since the regulators would primarily interact with ISPs. The ISPs are largely running legitimate businesses, are incentivized to help solve the problem (so long as they are not cheating), and are easy to find relative to the spammers, who are often not in the same country and are constantly hiding behind technological smoke and mirrors. The ISPs, in turn, would be responsible to keep tabs on those customers who are engaged in illegal activity and to spurn offers for premium payments to provide spammers with an onramp to the internet. This mechanism would empower the regulator to apply a default code of conduct where ISPs fail to develop one or until an acceptable policy is set forth by the ISP. Such a mechanism would also include the regulator’s certification of the code which ISPs could use in their advertisements, to ensure customers that the ISP is taking all available steps to protect its customers, and the network at large, from spam. The system would also involve a reporting mechanism so that victims of spam, phishing, spoofing and the like can report such activity either to the ISP or the regulator for follow-up investigation and action. An enforceable code of conduct is not without drawbacks. The code must be narrowly tailored to curb spam and related bad acts. It should not be used as a back-door measure to overburden ISPs, such as by: • Imposing anti-spam obligations where no technical solution yet exists (as with many anti-spoofing requirements); • By using anti-spam measures as a means to limit legitimate political discourse or other protected speech; or • By infringing on the privacy interests of citizens. C HAPTER 7 Trends in Telecommunication Reform 2006 It is essential that the industry develops and approves the code of conduct – or, at a minimum, collaborates with regulators in this task. Industry “buy in” is important, because the code will require frequent updating to reflect new developments in spamming practices and anti-spam technologies. 7.1.3.3 Voluntary Codes of Conduct As an alternative to a mandated code, enforced by regulators, governments might encourage ISPs to develop their own, industry-enforced codes of conduct. In fact, many ISPs are taking this step without any encouragement. Terms and norms are often built into “acceptable use” policies for customers and peering arrangements.32 Under this voluntary model, regulators could advise the industry in developing the codes. It could then help consumers find the ISPs that have developed or signed on to those codes. If a vibrant ISP market emerges, consumers could then choose ISPs that have proactively tried to fight and reduce spam. Finally, regardless of whether ISPs are compelled to establish codes of conduct or do so voluntarily, regulators have an important role to play in educating and raising awareness. Consumers, businesses, ISPs and cybercafé operators need information on technical solutions such as spam filters, as well as warnings about viruses and fraudulent activities that have been detected. There is much to be gained from governmentindustry collaboration in protecting consumers from spam. 7.2 An Outline of a Model Law 7.2.1 The Context for a Model Anti-Spam Law Representatives of many countries, particularly in developing regions of the world, have sought a model law for combating spam. The topic was discussed intensively at two international gatherings hosted by ITU. The first, held in the summer of 2004, was devoted to the issue of spam, while the other, a year later, focused on cybersecurity. This chapter draws upon the many resources developed to date, in an attempt to create a model anti-spam law. There are multiple potential benefits of such a document: • Clear guidelines – Email senders that want to comply with legal requirements could more easily learn what rules apply to them and could then follow them more consistently. • Jurisdictional Consistency – Enacting a similar, model law in many jurisdictions would free ISPs and email senders from having to attempt the near-impossible task of tailoring messages for recipients in different jurisdictions. • Easy adoption – Legal systems that do not yet have laws governing spam would have a ready-made model to implement, reducing the burdens of drafting, implementation, and coordination. • Enhanced enforcement – Regulators could enforce laws more effectively and easily since their systems would share harmonized definitions of offences, burdens of proof, and C HAPTER 7 • • • exceptions. Greater harmonization would make broadbased cooperative arrangements more likely to arise. Stronger norms – Broad international consensus on the meaning of spam, and what constitutes unlawful abuse of electronic communication, would strengthen norms that deplore such conduct. Fewer havens for spammers – As more governments adopted the model law, spammers would have fewer friendly locations to establish operations. This would increase their costs and reduce the financial incentives to engage in massive spamming. Increased sharing of best practices – Since legal systems would share harmonized provisions, regulators and enforcers could more easily collaborate to develop and share best practices for implementing spam laws.33 Even well-crafted anti-spam laws, implemented in every jurisdiction, will never get the job done alone. But anti-spam legislation can be a useful element of a coordinated anti-spam strategy. A good anti-spam law should distinguish between good actors and bad actors and mete out punishment accordingly. Moreover, if spammers were liable for each spam message they send, the level of fines would increase exponentially, according to the scale of the spam operation.34 Enforcement is the key – and the most difficult element – particularly in developing countries.35 The development of a model anti-spam law should be collaborative and inclusive. As with any model law (or any official document with the force of law) an anti-spam law must be flexible enough to dovetail with existing laws, including antifraud, consumer-protection, telecommunication and internet-specific laws and regulations. One relevant example is the process that the United Nations Commission on International Trade Law (UNCITRAL) undertook in establishing its Model Law on Electronic Commerce (1996).36 UNCITRAL’s e-commerce model law does not specifically address spam, which did not exist as in 1996 as the huge issue that it is today. Anyone designing an anti-spam model law should also consider the broad range of laws on the books today in many countries, containing variations that are worth considering but that are too numerous to be included in this chapter.37 Most of the existing anti-spam laws are directed at controlling spammers’ behaviour. This seems appropriate, since spammers directly cause the problem. But the current slate of laws has failed even to curb the growth of spam, much less to reduce the problem.38 Why have they failed? Some observers argue that the countries generating the largest proportion of the world’s spam have done too little at home to stop the problem.39 Those making this argument especially criticize reliance upon “opt-out” rules that allow spam unless consumers specifically ask not to receive it. Even then, opt-out rules are not enforced aggressively enough. It is not enough to blame the greatest spam-producing nations, though. No country in the world – including those lauded as the most effective in combating spam – has made significant inroads using classic enforcement mechanisms. Of course, it would help if governments updated their laws in 115 Trends in Telecommunication Reform 2006 light of their apparent inadequacy, but that takes time. Other observers suggest that anti-spam laws should be focused not on the spammers themselves, but rather on the (often dodgy) companies for whom the spam is sent. 40 In addition, since anti-spam statutes can affect civil liberties such as free speech and personal privacy, definitions may play a pivotal role in determining whether the statute is permissible under a country’s constitutional framework or sufficiently protective of citizens’ rights. The primary issue is that little emphasis is placed on investigation, enforcement powers, or resources. It is not that hard to build and win a case. Most spammers and their clients eventually can be found, with enough hard work and cooperation. The problem is that each investigation is so time-intensive and costly that police and prosecutors often decide that the costs outweigh the benefits. One of the core tenets of the model law described below is that it emphasizes creating a framework for national enforcement, international coordination, and distributed monitoring through the ISP code of conduct.41 The following are some of the key terms to be included in the definitions section of the model law, (although this is not a complete list): • Annotation: An important question for any anti-spam law is whether or not to include a prohibition on the use of, or trafficking in, technologies that support spamming, such as address-harvesting software. If such as ban is included in the law, the term must be carefully defined so as to avoid banning useful technologies of general applicability that may be used for address-harvesting. Another approach is not to ban any technology, but rather to bar its use for gathering e-mail addresses for spamming. 7.2.2 Elements of a Model Spam Law The draft model law presented in this section as an annotated outline roughly follows the structure of the Australian anti-spam law, which is widely regarded as one of the most well-conceived statutes of its kind in the world.42 This section describes the key elements of a model law, offering suggestions for options at each stage of the drafting process. One threshold issue is whether the law will be an “optin” or an “opt-out” statute. An opt-in statute makes it illegal to send spam unless a recipient has affirmatively agreed to receive it. Often, only tacit acceptance is required, such as the existence of an ongoing business relationship of some kind. An opt-out statute, on the other hand, permits spam unless the recipient has specifically informed the spammer that he or she does not want to receive it. The decision to choose an opt-in or opt-out approach will reverberate throughout the law from that point onward. For instance, in an opt-out system, the provision to establish an “unsubscribe” function will be more essential and take on a different character than in an opt-in law, which presumes that the receiver already gave a green light before receiving any spam messages. One deficiency of many spam laws is a lack of clear definitions. The draft model law, below, seeks to head off variations among definitions adopted in different jurisdictions, because these variations could undermine international cooperation on enforcement. • • Authorization. The law should clarify what it means for an individual to authorize sending a message that could be defined as spam. Annotation: This definition may take on greater or lesser significance depending on whether the law is designed as opt-in rather than opt-out. Depending upon the nature of the law adopted and the use and definition of the term “consent,” this definition might not be necessary. • Commercial. The law must specify with precision what constitutes a message sent for commercial purposes. Commercial messages sent to recipients with whom they do not have a previous commercial relationship are likely to serve as the core, prohibited type of content.. Annotation: One key issue facing development of a useful model law is variation in the treatment of speech rights in different countries. In Australia and the United States, for instance, legislators and regulators have stayed clear of regulating unsolicited political messages in light of constitutional protections for political speech. Most anti-spam laws focus not on the content of the message, but rather on the intent of the sender. Spam legislation varies as to whether or not it applies only to commercial messages, but it is important to define what constitutes “commercial” in any event. Section 1: Introduction and Definitions The law should clarify that it establishes a scheme for regulating commercial e-mail and other types of commercial electronic messages. 116 Authority, or Regulator. The law should specify the entity or individual that has jurisdiction over the antispam law. Countries vary as to the precise placement of this authority, which might be vested in the telecommunication regulator, the consumer protection authority, the trade regulator, or another authority. Annotation: If multiple regulators are tasked with enforcing anti-spam rules, a precise division of responsibilities should be established, either in the definitions section or, more likely, in the enforcement-related provisions. Draft Model Law Annotation: The introduction section of the law ought to set forth the definitions, which take on special significance in the antispam context. On the one hand, the terms must be broad enough to encompass emerging types of spam as they develop. On the other hand, the provisions must be precise enough to be clearly understood. Address-harvesting software. The law should define what types of computer applications used to harvest email addresses are banned under the statute. • Consent (or, Affirmative Consent). The law should clearly state what the recipient must do to signal willingness to receive e-mail from a particular sender. The law could use the term affirmative consent, which means that (A) C HAPTER 7 Trends in Telecommunication Reform 2006 the recipient expressly consented to receive the message, either in response to a clear and conspicuous request for such consent or at the recipient’s own initiative; and (B) if the message is from a party other than the party to which the recipient communicated such consent, the recipient was given clear and conspicuous notice at the time the consent was communicated that the recipient’s electronic mail address could be transferred to another party for the purpose of initiating commercial electronic mail messages. Annotation: This definition should be coordinated with the definition of the term “authorization,” as needed. • Electronic message. The law should specify what constitutes an electronic message. In the Australian statute, an electronic message is a message sent using (a) an Internet carriage service or (b) any other listed carriage service. Also, an email message is sent to an electronic address in connection with (1) an e-mail account; (2) an instant messaging account; (3) a telephone account; or (4) a similar account. Annotation: An important area to consider is what applications the anti-spam statute covers. The best anti-spam laws will be general enough to cover ICT-based unsolicited messaging in formats that have yet to be devised, as well as those that exist today. Short Messaging Service (SMS) text messages on cellular phones, spam over the instant messaging protocol (“spim”), web blogs (especially in the comments fields), spam over Internet telephony (SPIT), voice messaging over Internet telephony and Really Simple Syndication (RSS) are important current variants of traditional e-mail spam that drafters may wish to keep in mind. • Evidential (or evidentiary) burden (or, burden of proof). The law should define carefully which party bears the burden of producing evidence. Annotation: One of the key problems that enforcement authorities face is a high burden of proof placed upon the prosecution in instances where they must show conclusively that a user did not opt-in to receiving spam. Virtually no individual can prove the negative – that they never entered into a commercial relationship, or never once hit “OK” in a click-through contract. To place the burden on the regulator to prove this negative is to hamstring her or him in the enforcement process. • Internet service provider (or Internet carriage service; Internet content provider; E-mail service provider; Telecommunications service; or the like depending upon jurisdiction). The law should define what type of service the statute covers. The essential part of the definition is that the covered party provides a connection between an end-user and the internet, for a fee. Annotation: In many jurisdictions, a wide range of definitions for ISPs are established by various internet-related laws, so special care should be taken to harmonize definitions across statutes, for clarity’s sake. U.S. law, for instance, has more than 40 potential definitions for terms that resemble “Internet service provider.” 43 The elimination of ambiguity is particularly important for this model law, which contemplates setting an affirmative requirement for ISPs to develop an enforceable code of conduct. C HAPTER 7 • Send. The law should clarify that the definition of “send” includes attempts to send. Section 2: It is unlawful to send unsolicited commercial electronic messages Annotation: The scope of what type of message is unlawful to send, combined with the definition of the terms of what is banned, is a crucial element of any spam law. Countries vary widely in terms of whether messages beyond “unsolicited commercial e-mail” are included under the law. For instance, non-commercial bulk e-mail is included in the definition of “spam” in some anti-spam legislation and not in others. This is also the juncture at which each country must decide whether to join the opt-in or opt-out camp. Virtually all anti-spam laws focus upon the act of sending (or attempting to send) as the core, operative offence. An additional prohibition for this section might be to hone in on the act of paying someone to send unsolicited commercial electronic messages on one’s behalf. Some states also bar the sending of unsolicited charitable and issue-oriented (political) messages, but that step is dangerous and not advocated here, given the importance of political speech to wellfunctioning government systems. Section 3: Commercial electronic messages must include accurate sender information Commercial electronic messages must include information about the individual (or organization) who (or that) authorized sending the message. Annotation: The law might also require that commercial email be identified as an advertisement, by requiring that “ADV” or the like be included in the header. The law could also require commercial email to include the sender’s valid postal address. Some activists have also called for the requirement that senders label sexually explicit messages in the subject line. The labeling requirement is hotly contested by e-mail marketers, who fear that ISPs or individuals will filter out all such messages, even if they are legitimate commercial offers. Section 4: It is unlawful to include false information in any commercial electronic messages Commercial electronic messages must not include false information. That includes an email’s “from,” “to,” and routing information, which should include the originating domain name and email address. The subject line cannot mislead the recipient about the contents or subject matter of the message. Annotation: Most experts contend that an anti-spam law ought to contain such a ban on inclusion of false information as a supplement to other provisions, such as the outright bar against sending an unsolicited message. Without the general ban on unsolicited emails, this accuracy requirement can be criticized as effectively permitting spam that is unwanted but accurate. Much of the criticism leveled against the U.S. CAN-SPAM Act of 2003 has followed this argument. 117 Trends in Telecommunication Reform 2006 Section 5: It is unlawful to send a commercial electronic message without a simple means for recipients to indicate that the recipients do not wish to receive any further commercial electronic messages from the sender Commercial electronic messages must contain a functional “unsubscribe” or opt-out facility. If a recipient exercises the right to request no further emails, the sender must be bound to honour that request. In an opt-in regime, an unsubscribe provision would basically ensure that any recipient who had previously opted in could reverse that decision and opt out at any time. Annotation: In the United States, a sender must provide a return email address or another internet-based response mechanism that allows a recipient to ask the sender not to send future email messages to that email address. The sender must honour that request. Any opt-out mechanism a sender includes must be able to process opt-out requests for at least 30 days after commercial email is sent. When a sender receives an opt-out request, the law allows 10 business days to stop sending email to the requestor’s email address. A sender may not help another entity send email to that address, or have another entity send email on its behalf. Also, it is illegal for a sender to sell or transfer the email addresses of people who choose not to receive that sender’s email, even in the form of a mailing list, unless a sender transfers the addresses so another entity can comply with the law. These provisions, while sensible, are believed to have a very low rate of compliance. Most critics also believe that unsubscribe responses by recipients are frequently used to bolster spamming lists, since the spammers then know that the email has reached a real recipient. Section 6: The use of, and trafficking in, address-harvesting software and the resulting lists of electronic mail addresses are prohibited. Address-harvesting software must not be supplied, acquired, trafficked in, or used. An electronic address list produced using address-harvesting software must not be supplied, acquired, trafficked in, or used. Annotation: There is a wise presumption generally against banning general-purpose technologies. Any provision of this sort ought to exempt the makers of general-purpose technologies (for instance, a spreadsheet or software enabling a user to write a simple program that could scrape information from the Web) that might be used by spammers to harvest e-mail addresses. The law might also include a prohibition against hacking into databases of e-mail addresses, although in many jurisdictions such acts would be covered under statutes related to computer crimes, larceny, trespassing or other offences. Section 7: Remedies include civil penalties, injunctions, and criminal penalties The main remedies for violation of the law would be civil penalties and injunctions. Criminal penalties, including imprisonment, are also sometimes sought when false representation, 118 use of another’s computer to perpetrate a fraud, or similar acts are involved.44 Annotation: The law might also include a provision making it a criminal offence for an ISP knowingly to accept premium payments from spammers who use the ISP’s network to send their spam. Similarly, the law might include a provision that makes the knowing hiring of a spammer to send out unsolicited commercial e-mail a criminal offence. Section 8: Causes of Action This section would establish a cause of action for regulators against anyone hiring a spammer to distribute bulk email for them (i.e., the owner of a website to whom a spammer is paid to direct traffic, or the party seeking to drive up the value of a certain equity offering, etc.)45. The law might also include additional causes of action, enabling ISPs, enforcement officers in lower jurisdictions, and harmed individuals to initiate cases. Section 9: International Cooperation The law should create a mechanism for international information sharing and, possibly, formal cross-border enforcement support. These rules would simplify the process for exchanging information and encourage exploration of memoranda of understanding (MOUs) and similar means of cross-border cooperation. Annotation: Much of the emphasis of far-sighted regulators in recent years has been on improving cross-border enforcement efforts. The U.S. Federal Trade Commission has been encouraging the U.S. Congress to pass legislation to make such cooperation more likely to succeed. Consider also the work of the International Consumer Protection and Enforcement Network, which involves dozens of countries in “sweep days” to rid the internet of scams.46 Section 10: Jurisdiction An effective anti-spam law might include provisions designed to assist enforcers by resolving jurisdictional ambiguities. Annotation: Such a provision could simply clarify what it means for a message to originate or be received within that country and how the regulator will treat such situations. On a more elaborate level, in the United States, the state of Washington’s anti-spam law established a database that includes many of the e-mail addresses in that jurisdiction. The purpose is to protect the state’s residents.47 A list of that nature, held in one place, however, could be an attractive target for hackers. This concern is mitigated by the fact that spammers apparently do not have much of a problem coming across large swaths of e-mail addresses through other means. Section 11: Enforceable Codes of Conduct by ISPs. An effective anti-spam law might include sections related to the development and enforcement by regulatory authorities C HAPTER 7 Trends in Telecommunication Reform 2006 of industry-derived and implemented Codes of Conduct for ISPs.48 Such provisions might include: a) An introduction, explaining the intention to establish such codes of conduct. b) A provision granting regulators authority to require all ISPs to develop a code of conduct for that jurisdiction. c) A description of the multi-stakeholder process involved in developing codes of conduct, including what groups will represent the interests of consumers and industry. d) A provision establishing a registration process for codes of conduct. e) A provision enabling consumers to access registered codes of conduct. f) A provision enabling the regulator to draft a code of conduct in the event that industry cannot agree or otherwise fails to develop one. g) A provision enabling the regulator to reject a proposed code of conduct in the event that it lacks appropriate community safeguards. h) A description of the process for the regulator to issue a warning to an ISP for apparent breach of the code prior to taking an enforcement action. i) A provision granting power to the regulator to enforce the code in the event of breach by the ISP. Annotation: A similar structure is set forth in Part 6 of Australia’s Telecommunications Act of 1997 covering industry codes of conduct (see Box 7.1). There are several issues to be considered, many of which are set forth in the section that follows. The law would need to establish a deadline for compliance and provide for periodic updating of the code. One option would be to task an industry association (if one exists in that jurisdiction) to develop the code. The next decision would be whether all ISPs have to comply with a code developed by the association. The enabling provisions for the code might allow ISPs to opt out of a code developed by the association and register a separate code with the regulator, provided the ISP’s self-developed code sufficiently protects the public interest. 7.3 Codes of Conduct The primary goal of a code of conduct is to ensure that ISPs that provide a route to the internet – the source ISPs – are taking adequate steps to keep spammers off the network. The effect of the code should be to level the playing field for ISPs that are actively seeking to rid the network of spam instead of profiting from sourcing it. While there are many risks in regulating ISPs more extensively than they have been in the past, a carefully balanced set of provisions will benefit not just customers, but all well-intentioned ISPs, too.49 In virtually all instances, industry knows better than most regulators what technical solutions to spam exist and can be implemented.50 Regulators have a role to play in ensuring that industry does all that it can to put technical and policy solutions in place and to share best practices. The use of industry codes of conduct is a promising mechanism that has been under-utilized in the anti-spam fight. C HAPTER 7 A similar strategy has been used for a variety of other issues, such as interconnection, number portability, and other technical coordination issues. If combating spam is not in the remit of the telecommunication regulator, a similar mechanism could be established for consumer protection authorities, data protection authorities or other similar bodies. For the purposes of this chapter, the code of conduct has been included in a model anti-spam law, but such a set of provisions could easily fit within other sections of a country’s legal codes, such as the telecommunication laws and regulations. The code of conduct does rely, however, upon core elements of an anti-spam statute. 7.3.1 Procedural Steps Toward an Enforceable Code of Conduct Industry codes of conduct should be developed in a spirit of minimal regulation of the internet and as a measure of private and public sector cooperation to address the growing problem of spam. The process of drafting a code likely would include several key steps: • The relevant industry member or members are granted the first chance to develop their own code of conduct, based upon the stated goals of the enabling law or regulations. The process by which a code is drafted should be set forth in the law or regulations so as to ensure broad and open participation by key stakeholders. • Where appropriate, the regulator can help by sharing best practices. This can be done, for example, through the use of ITU’s Global Regulators Exchange (G-REX)51 or face to face meetings such as ITU’s annual Global Symposium for Regulators (GSR). Regulators may also be able to tap into international resources such as the OECD’s Spam Toolkit, which is under development. A draft is accessible at http://www.oecd-antispam.org • The relevant industry members present the draft code to the regulator for its approval. • A new body, or an existing regulator with relevant expertise, takes responsibility for the administration and registration of the code. • If the industry fails to develop a code, or if the code is not deemed acceptable, the regulator has the power to step in to draft or revise it, ensuring that sufficient anti-spam measures are being taken by ISPs, network operators and other potential spam carriers. • The industry members are expected to enforce the code against their customers and those with whom they peer. The enforcement is meant to prohibit the worst acts of spamming, not to encourage an ISP to monitor messages any more than they already do. The expectation is that ISPs would only need to take reasonable measures, such as investigating when they receive an unusually large 119 Trends in Telecommunication Reform 2006 • • numbers of complaints against a single customer or when the regulator passes along such complaints. The regulator or administrator provides a mechanism for handling end users’ complaints against ISPs for failure to live up the code. If industry members fail to enforce the code, the regulator is empowered to take action against non-compliant ISPs. Possible sanctions include fines, harsher licensing requirements, or lawsuits. Annotation: One issue to consider is which parties would have a right of action to sue a non-responsive ISP. For instance, consumers who have experienced damage by spam or phishing could be given the right to go to court to sue ISPs directly for violating the code of conduct. Also, regulators could require ISPs to include in their customer contracts binding agreements to honour the code. This would allow consumers and companies to sue not only under an anti-spam law, but also pursuant to laws governing breach of contract. • • The code could also create a “certification” or “accreditation” system, allowing ISPs to publicly advertise their compliance with the code. The accredited ISPs would be able to display a “trust mark” signifying their status, helping consumers to make reasonable decisions about which service to choose.52 The code should also include a mandatory review or “sunset” provision to ensure that the rules remain effective and appropriate in a fast-changing technological and legal environment. 7.3.2 Elements of a Model Industry Code of Conduct Like a model law, an industry code of conduct should be developed in an inclusive, collaborative atmosphere, designed to elicit the best thinking from a range of experts and concerned stakeholders.53 The code should set forth the responsibilities of ISPs and other actors with sensitivity to local concerns. But it should also take into account the cross-border nature of the problem. Key elements of a model industry code of conduct might include: • A series of common definitions that correspond to the definitions in the enabling law. • Procedures ISPs should follow in dealing with obvious spam that comes into the ISP’s sub-network (including procedures relating to the provision or use of filtering software). • A commitment not to serve individuals or companies that send unsolicited commercial email in bulk, and to terminate those clients when complaints and subsequent investigations reveal that they have been spamming through the ISP’s network. This should also include a commitment to refuse payment, or any enticement of a premium payment, offered by a known spammer for any service. • A commitment to give ISP subscribers information about the availability and use of software for filtering spam at the client level. ISPs should also commit to helping subscribers prevent their computers from being infected by 120 • • worms, “Trojans” and other malware that turns computers into spam “zombies.” A commitment to assist in developing and evaluating filtering software that gives end users a maximum level of control over what to accept and to reject. Suggested best practices that ISPs can implement, as appropriate, in order to minimize or prevent spam. At present, such suggested best practices might include some of those set forth in the London Action Plan.54 The London Action Plan stemmed from a July 2004 meeting of “government and public agencies from 27 countries responsible for enforcing laws concerning spam.” They generated several recommendations affecting: • The optimal configuration of servers and other network devices to minimize or prevent spam; • A commitment to taking meaningful zombie-prevention measures;55 and, • A statement of principles for entering into peering arrangements only with ISPs that adhere to the full code of conduct. The provisions of codes will no doubt change rapidly as the nature of the problem changes. Today, up to half of all spam is sent through “zombie” computers, suggesting that it is vital to help end users prevent the hijacking of their computers. Once this loophole is closed, spammers are sure to look for other mechanisms, and codes will have to be updated accordingly. The enabling law should be flexible enough to accommodate changes in the technological landscape. 7.3.3 Hazards of Enforceable Codes of Conduct Adopting a regime of enforceable codes of conduct for ISPs is not without hazards. A well-designed policy, however, should be able to mitigate these risks, which are worth exploring here. The purpose of industry codes of conduct should be to give ISPs incentives to exclude spammers from their networks, not to over-regulate ISPs. Nor should regulators use codes to deputize ISPs to overzealously block email or monitor conversations. Codes should be strictly limited to requiring ISPs to shut down spammers. They should not be employed for other objectives, such as shutting down email with what the government considers unpalatable political messages or for surveillance of a country’s citizens. The risk is that empowering ISPs as gatekeepers will lead them to avidly look into the nature of messages sent across their networks. This potential pitfall points back to the importance of defining spam in the anti-spam law. A properly crafted law should rule out abuses of authority in the name of preventing spam. Regulators should clearly focus on the goal of weeding out the worst, most obvious cases of spamming, rather than on pressuring ISPs to shut down legitimate e-mailers. Another risk in establishing an enforceable code of conduct stems from political realities. In many countries, ISPs have enjoyed broad immunity from regulation and may oppose any spam-related responsibilities. More often, the ISP may be a monopoly, state-owned provider that generates important rev- C HAPTER 7 Trends in Telecommunication Reform 2006 Box 7.1: Australia Telecommunications Act 1997 – SECT 117 Registration of industry codes 1) This section applies if: a) the ACMA is satisfied that a body or association represents a particular section of the telecommunications industry or the e-marketing industry; and b) that body or association develops an industry code that applies to participants in that section of the industry and deals with one or more matters relating to the telecommunications activities or e-marketing activities, as the case may be, of those participants; and c) the body or association gives a copy of the code to the ACMA; and d) the ACMA is satisfied that: i) in a case where the code deals with matters of substantial relevance to the community-the code provides appropriate community safeguards for the matters covered by the code; or ii) in a case where the code does not deal with matters of substantial relevance to the community-the code deals with the matters covered by the code in an appropriate manner; and e) the ACMA is satisfied that, before giving the copy of the code to the ACMA: i) the body or association published a draft of the code and invited participants in that section of the industry to make submissions to the body or association about the draft within a specified period; and ii) the body or association gave consideration to any submissions that were received from participants in that section of the industry within that period; and f) the ACMA is satisfied that, before giving the copy of the code to the ACMA: i) the body or association published a draft of the code and invited members of the public to make submissions to the body or association about the draft within a specified period; and ii) the body or association gave consideration to any submissions that were received from members of the public within that period; and g) the ACMA is satisfied that the ACCC has been consulted about the development of the code; and h) the ACMA is satisfied that the Telecommunications Industry Ombudsman has been consulted about the development of the code; and i) the ACMA is satisfied that at least one body or association that represents the interests of consumers has been consulted about the development of the code; and j) in a case where the code deals with a matter set out in paragraph 113(3)(f)-the ACMA is satisfied that the Privacy Commissioner has been consulted by the body or association about the development of the code before the body or association gave the copy of the code to the ACMA; and k) the ACMA has consulted the Privacy Commissioner about the code and consequently believes that he or she is satisfied with the code, if the code deals directly or indirectly with a matter dealt with by: i) the National Privacy Principles (as defined in the Privacy Act 1988 ); or ii) other provisions of that Act that relate to those Principles; or iii) an approved privacy code (as defined in that Act) that binds a participant in that section of the telecommunications industry or the e-marketing industry; or iv) provisions of that Act that relate to the approved privacy code. 2) The ACMA must register the code by including it in the Register of industry codes kept under section 136. 3) A period specified under subparagraph 1) e) i) or 1) f) i) must run for at least 30 days. 4) If: a) an industry code (the new code ) is registered under this Part; and b) the new code is expressed to replace another industry code; the other code ceases to be registered under this Part when the new code is registered. Note: An industry code also ceases to be registered when it is removed from the Register of industry codes under section 122A. http://www.austlii.edu.au/au/ legis/cth/consol_act/ta1997214/s117.html C HAPTER 7 121 Trends in Telecommunication Reform 2006 enues for the government, giving it substantial clout in policy councils. Again, it may resist any attempts to further regulate it. Meanwhile, there are costs associated with any new administrative mechanism, even one as simple as the development, registration, and updating of a code of conduct. Potential costs should be factored into the cost-benefit analysis when considering adopting such a regime. Additionally, adding intelligence to the middle of the network, and encouraging gatekeepers to use this intelligence, is sub-optimal from a network design perspective. Like regulators in developing countries, ISPs may themselves face resource constraints to enforce their code. ISPs may or may not see sufficient incentives to do so. ISPs often have to balance multiple interest and desires regarding spam, including: • A desire to attract and retain bad-acting but paying customers, • A desire to avoid the cost of transmitting spam through their networks, and • A desire to avoid the regulatory risks and costs of transmitting spam. ISPs may over-enforce the provisions of their own code, resulting in messages not getting delivered to recipients. This would be a far worse outcome, many argue, than dealing with the current deluge of spam. ISPs may also not be as sensitive to the rights of free expression, and most speech protections do not extend to non-state actions, often allowing private actors to block otherwise protected speech. Meanwhile, ISPs would likely pass anti-spam costs along to end users, perpetuating the already-vicious cycle of spammers making the rest of the internet’s users pay for their bad acts. In a developing country context, high internet access costs are already a major barrier to widespread ICT adoption. Cost concerns, however, should be seen in the context of the spam problem itself, which is adding to the cost of internet access and helping criminals to perpetrate fraud and disseminate destructive viruses. These network ills are bad not only for consumers, but for ISPs themselves. Any legal and regulatory approach should seek to mitigate these drawbacks. On balance, however, many jurisdictions will likely find enforceable codes of conduct to be a sound policy choice, because they distribute part of the enforcement burden to stakeholders closest to the source of the spam problem – the ISPs and the end users. 7.4 Education and Awareness The ideal solution to spam would involve no new law whatsoever. If consumers and businesses could take spam fighting into their own hands, the problem would be solved at the lowest cost and at the quickest rate. The brunt of anti-spam enforcement would be borne at the furthest edges of the network and in the most distributed manner possible. Those who pay the true costs of spamming – the end users – would ideally take the lead in combating spam, while regulators focused their enforcement resources on the largest, most complex cases. 122 Regulators would still have an important role to play, however, in educating consumers, businesses and ISPs about the dangers of spam and the steps they can take to protect themselves against it.56 The London Action Plan includes some suggestions: • Regulators should develop a plan for consumer and ISP education, posting information on their websites and developing print materials for distribution to cybercafé owners, consumers, businesses and ISPs. • Regulators should provide a simple method for consumers to make complaints about spam. • Regulators should create a special “combating spam” page on their websites, providing information about anti-spam practices and products. The web page should host practical advice on spam filters, warnings about phishing attempts, viruses and scams carried out using e-mail and other important tips for consumers. Examples of websites in use today include: – Industry Canada’s page on “Recommended Best Practices for Internet Service Providers and Other Network Operators”: http://e-com.ic.gc.ca/epic/ internet/inecic-ceac.nsf/en/gv00329e.html – Recommendations of the Commission Nationale de l’Informatique et des Libertés in France (CNIL République Française): http://www.cnil.fr/index. php?id=1539 – Guidance provided by the Korea Spam Response Centre of the Korea Information Security Agency, an affiliated agency of the Ministry of Information and Communication: http://www.spamcop.or.kr/eng/m_3_ 2.html – The United States’ Federal Trade Commission’s spam education pages: http://www.ftc.gov/bcp/ c o n l i n e / p u b s / b u s p u b s / s e c u r e y o u r s e r v e r. h t m http://www.ftc.gov/bcp/conline/edcams/spam/ secureyourserver/index.htm • Regulators should also consider their ability to play a central role in coordinating the sharing of best practices among ISPs, especially in contexts where political will or resources do not exist for the regulator to take an enforcement role. The regulator can also help educate ISPs about some relatively simple technical measures. Specific measures include the latest information related to the blocking of open relays,57 focus on “botnets,”58 and slowdowns of traffic on port 25 that might make an enormous difference, particularly in developing countries. Consumer and ISP education is a necessary component of spam-fighting strategies, but efforts in this field have had little effectiveness to date. This is not due to any fault in the outreach techniques themselves, but rather due to the limited vigour with which they have been pursued. It is challenging to communicate technical information to a lay audience. Moreover, education efforts cannot succeed in isolation, without other effective technological and regulatory measures. Substantially greater efforts in this area are warranted and would pay large dividends. C HAPTER 7 Trends in Telecommunication Reform 2006 7.5 Conclusion Despite the challenges that are bound to lie ahead, regulators should encourage the adoption of an anti-spam law that is harmonized, as much as possible, with those of other countries. Such an anti-spam law might involve creating an enforceable code of conduct for ISPs, placing the responsibility for mitigating spam closer to where the technical expertise lies. The problem with anti-spam laws enacted to date is that they have failed to create an enforceable regime or to bridge the divide between governments and the technologists who have the real expertise to solve the problem. While it is an imperfect remedy, 1 2 3 4 5 6 7 8 9 10 11 12 an enforceable code of conduct could help to erase the shortcomings of earlier anti-spam laws. The effort to fight spam is not going to succeed through pursuit of any one, single strategy. Success will be based on international cooperation and a range of shared strategies, including legal and regulatory mechanisms, technical improvements, market forces, and consumer-oriented solutions. The development of ISP codes of conduct, and their enforcement by regulators, can help stem the tide of spam and materially reduce spam’s costs to ISPs and consumers. Despite passage of many dozens of anti-spam statutes in jurisdictions across the globe, the problem has continued to worsen. See, e.g., David E. Sorkin, “Spam Legislation in the United States,” The John Marshall Journal of Computer and Information Law, Volume XXII, Number 1, at 4 (2003) (“…it is generally agreed that legislation has failed to solve the spam problem.”) See also, Matthew Prince, “How to Craft an Effective Anti-Spam Law,” WSIS Thematic Meeting on Countering Spam, July 2004, ITU Discussion Paper, at 10, at http://www.itu.int/osg/spu/spam/contributions/Background%20Paper_How%20to%20craft%20and%20effective%20anti-spam%20law. pdf (“Few people would dispute that around the world the first generation of anti-spam laws has been an unqualified failure.”). http://www.itu.int/ITU-D/treg/Events/Seminars/2004/GSR04/index.html Business Software Alliance, 1 in 5 British Consumers Buy Software from Spam, Dec. 9, 2004, at http://www.bsa.org/uk/press/newsreleases/online-shopping-tips.cfm. For instance, e-mail security provider IronPort Systems asserts that 72 per cent of e-mail sent is spam. See http://www.ironport.com/company/pp_sci-tech_today_0810-2005.html. http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=108_cong_public_laws&docid=f:publ187.108.pdf See Matthew Prince, “How to Craft an Effective Anti-Spam Law,” supra note 1, at 3. For the most comprehensive resource on the world s anti-spam laws, see Christina Bueti, “ITU s Survey on Anti-Spam Legislation Worldwide,” July, 2005, at http:// www.itu.int/osg/spu/cybersecurity/docs/Background_Paper_ITU_Bueti_Survey.pdf. AOL claims that spam is down 85 per cent from two years ago, based upon consumer complaint information. However, such a claim does not account for the effectiveness that their filters may have achieved on behalf of customers, nor the changing perceptions of consumer about how much spam is acceptable. The same article that reported AOL s claim of less spam concludes, “But statistics show that the amount of spam is still huge – even worse than it was when the federal act [the CAN-SPAM Act of 2003] was introduced two years ago.” See http://www.crmbuyer.com. See also http://www.washingtonpost.com/ (27 December 2004). There is a dearth of reliable industry-wide data, which is not surprising in light of the distributed nature of the problem and the competition between ISPs to provide the best anti-spam services to consumers. For a review of some of the many recent spam statistics, see Bueti, “ITU s Survey on Anti-Spam Legislation Worldwide,” supra note 5; see Michael Geist, “Untouchable: A Canadian Perspective on the Anti-Spam Battle,” June, 2004, at 2, at http://www.michaelgeist.ca/geistspam.pdf; see also, Derek Bambauer, John Palfrey, and David Abrams, “A Comparative Analysis of Spam Laws: the Quest for Model Law,” June 2005, at 7 – 8, at http://www.itu.int/osg/spu/cybersecurity/docs/Background_Paper_Comparative_Analysis_of_Spam_Laws.pdf. “Phishing” refers to a scam in which perpetrators send an email purporting to be from a legitimate business (such as a bank) and ask recipients to provide personal (often financial) information. Victims believe they are complying with a bona fide request, when they are being tricked into providing information to thieves. “Pharming” refers to a scheme in which victims clicking on a website are unknowingly diverted to a duplicate or fake website, where they can be fleeced. See Chairman s Report, ITU WSIS Thematic Meeting on Cybersecurity, June – July, 2005, p. 2, point 12, at http://www.itu.int/osg/spu/cybersecurity/chairmansreport. pdf (citing a speech by Spamhaus CEO Steve Linford). http://news.bbc.co.uk/2/hi/business/3426367.stm. C HAPTER 7 123 Trends in Telecommunication Reform 2006 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 The AOL legal department posts decisions and litigation to their website at http://legal.web.aol.com/decisions/dljunk/. See also http://www.theregister.co.uk/2005/08/10/ aol_spam_sweepstake/ (regarding the AOL gold bars raffle, in which they planned to give away the assets seized from a major spammer). See http://abcnews.go.com/Technology/PCWorld/story?id=1029922&ad=true. This discussion paper uses the term “regulators” in the broad sense to include any governmental entity that has been given the mandate to combat spam. Thus, the term “regulators” for this chapter may mean national telecommunications or ICT regulatory authorities, consumer protection authorities or data protection administrations. See David R. Johnson, Susan P. Crawford, and John G. Palfrey, Jr., The Accountable Net: Peer Production of Internet Governance, 9 VA. J. L. & TECH. 9 (2004). BBC, supra note 10. The four modes of Internet regulation were popularized in Lawrence Lessig s ground-breaking book, Code and Other Laws of Cyberspace, in 1999 (New York: Basic Books). See http://www.itu.int/osg/spu/spam/background.html and, in particular, the Chairman s Report, at http://www.itu.int/osg/spu/spam/chairman-report.pdf. Ibid., point 24 at 4. It should be noted that even the United States Federal Trade Commission, which is a relatively well-funded regulatory body, had only brought “over 70 cases” as of July, 2005. In light of the billions of spam messages per day, the notion that such an enforcement effort is unlikely to have much effect undoubtedly is apparent to many governments choosing whether or not to devote resources to fighting spam locally. Ibid., point 19, at 3. See Suresh Ramasubramanian, “OECD Task Force on Spam Report: Spam Issues in Developing Countries,” May, 2005, at http://www.oecd.org/dataoecd/5/47/34935342. pdf. See http://www.itu.int/ITU-D/treg/related-links/links-docs/Spam.html for a list of voluntary and enforceable ISP codes of conduct. See generally Jonathan Zittrain, “Internet Points of Control,” 43 Boston College Law Review 653 (2003). See also, J.H. Saltzer, D.P. Reed, and D.D. Clark, “The End-to-End Argument in Systems Design,” at http://www.reed.com/Papers/EndtoEnd.html and “The End of the End-to-End Argument” at http://www.reed.com/ dprframeweb/dprframe.asp?section=paper&fn=endofendtoend.html (“But in many areas of the Internet, new chokepoints are being deployed so that anything new not explicitly permitted in advance is systematically blocked.”) See John Spence, “Pennsylvania and Pornography: CDT v. Pappert Offers a New Approach to Criminal Liability Online,” 23 J. Marshall J. Computer & Info. L. 411 (Winter, 2005) (a good general discussion of the role of ISPs in the network and the difficulties they face). http://www.maawg.org/about/roster/ Many technical working groups have focused on anti-spam-related standards, technologies, and best practices. The IETF, ISOC, and other groups have supported efforts that have involved representatives of ISPs, including the now-scuttled MARID Project (see http://www.internetnews.com/bus-news/article.php/3407431), which was preceded by the Anti-Spam Research Group (at http://asrg.sp.am/). See Renai LeMay, Gmail Tries Out Antiphishing Tools, CNET NEWS.COM, Apr. 4, 2005, at http://news.com.com/Gmail+tries+out+antiphishing+tools/2100-1029_35653794.html. See Anick Jesdanun, Battle Against Spam Shifts to Containment, ASSOCIATED PRESS, Apr. 15, 2005, at http://finance.lycos.com/qc/news/story.aspx?story=48398343. Consider the remarks of Randall Boe, executive vice president of AOL, when he said that “Spam has become the single largest customer problem on the Internet.” (Quoted in Thomas Claburn, “Four Big ISPs Sue Hundreds of Spammers,” 10 March 2004, Information Week, at http://www.informationweek.com/). As one illustration of the fact that spam can be traced, see http://www.channelregister.co.uk/2005/09/20/spam_map/. Consider, for instance, that MAAWG is already promoting industry-wide codes of conduct. See http://www.maawg.org/about/. Bambauer, Palfrey, and Abrams, “A Comparative Analysis of Spam Laws: the Quest for Model Law,” supra note 9, at 11. Prince, “How to Craft an Effective Anti-Spam Law,” supra note 1, at 4. Ibid., at 6. Mr. Prince argues: “The most effective anti-spam laws are action laws that focus on the problems prosecutors face and work to resolve them. If we want anti-spam laws to be effective, our job must be to identify the costs faced by prosecutors and craft laws to reduce those costs.” Accessible online at http://www.uncitral.org/pdf/english/texts/electcom/05-89450_Ebook.pdf. See http://www.itu.int/osg/spu/spam/ for a catalogue of existing anti-spam laws on the books in jurisdictions around the world. Many analysts predicted the failure of these laws at the time they were passed. For one example of a United States-based consultancy, consider Gartner s report, Maurene Caplan Grey, Lydia Leong, Arabella Hallawell, Ant Allan, and Adam Sarner, “Spam Will Likely Worsen Despite US Law,” 3 December 2003, at http://www. gartner.com/resources/118700/118762/118762.pdf. See BBC News, “US Still Leads Global Spam List,” 7 April 2005, at http://news.bbc.co.uk/1/hi/technology/4420161.stm (citing a study by security firm Sophos that the US is responsible for sourcing 35 per cent of the world s spam). See the FAQ page for the Coalition Against Unsolicited Commercial Email, at http://www.cauce.org/about/faq.shtml#offshore. One interesting, as-yet-theoretical variant to the state-focused enforcement mechanism is the “bounty hunter” system proposed by Prof. Lawrence Lessig of Stanford Law School. Prof. Lessig has “bet [his] job” on the notion that such a distributed system, established by law but pushing out enforcement authority to netizens, would work if enacted. See http://www.lessig.org/blog/archives/000787.shtml. The Australian law, which took effect in 2003, can be found online (in an unofficial version) at http://scaleplus.law.gov.au/html/pasteact/3/3628/0/PA000260.htm For example, the text of the Communications Decency Act Section 230 in the United States provides immunity to the providers of “interactive computer services” for the content published on their network. These providers are defined as follows: “The term `interactive computer service means any information service, system, or access software provider that provides or enables computer access by multiple users to a computer server, including specifically a service or system that provides access to the Internet and such systems operated or services offered by libraries or educational institutions.” http://www.fcc.gov/Reports/tcom1996.txt. By contrast, the term “Internet access service” in the CAN-SPAM Act of 2003, as stated in the Telecommunications Act of 1934, as amended, reads: “The term Internet access service means a service that enables users to access content, information, electronic mail, or other services offered over the Internet, and may also include access to proprietary content, information, and other services as part of a package of services offered to consumers. Such term does not include telecommunications services.” http://www4.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000231----000-.html. Geist, “Untouchable,” supra note 8, at 17 (for a discussion of civil and criminal sanctions common in anti-spam legislation). For discussion of the effectiveness of such a measure, see Prince, “How to Craft an Effective Anti-Spam Law,” supra note 1, at 9. http://www.icpen.org/. For discussion of the effectiveness of the state of Washington s use of such a measure in the United States, see Prince, “How to Craft an Effective Anti-Spam Law,” supra note 1, at 6 and 10. 124 C HAPTER 7 Trends in Telecommunication Reform 2006 48 49 50 51 52 53 54 55 56 57 57 For the full text of the Australian Telecommunications Act of 1997 that contains such provisions, see http://www.austlii.edu.au/au/legis/cth/consol_act/ta1997214/s117. html et seq. The Australian Direct Marketing Association (ADMA) has also established a Code of Conduct. Where such an organization exists, such a code is another logical, parallel step. Many countries will not have such an entity in place, in which event a legal provision mandating a parallel process of this sort would not make sense. Consider the findings of the New Zealand regulators with respect to the most effective mode of enforcement: “A civil penalty regime where the emphasis is on ISPs/carriers taking action in response to customer complaints is considered to be the best approach. This is because most spam in New Zealand originates from overseas and the ISP/carrier will often best be placed to put in place the appropriate technical measures to deal with it. In addition, if spam is originating from an address/number hosted by another ISP/carrier in New Zealand, then the user s ISP/carrier can approach the sender s ISP/carrier and seek action by that ISP/carrier against the sender. If complaints cannot be satisfactorily resolved in this way then the user s ISP/carrier can forward the matter on to the enforcement agency to consider whether an investigation or further action is appropriate.” Ministry of Economic Development (NZ), “Legislating against Unsolicited Electronic Messages Sent for Marketing or Promotional Purposes (Spam) – Enforcement Issues – Cabinet Paper,” at http://www.med.govt.nz/pbt/infotech/spam/cabinet/paper-two/papertwo-03.html#P31_3192. G-REX is an online discussion platform reserved for policy-makers and regulators> For more information, see: http://www.itu.int/ITU-D/grex/index.html. See http://www.truste.org/. The process under way at the Messaging Anti-Abuse Working Group may well provide extremely useful guidance on this front, both as a matter of process and of substance. See http://www.maawg.org/news/maawg050711. See http://www.ftc.gov/os/2004/10/041012londonactionplan.pdf. See also, for particular suggestions, http://www.ftc.gov/bcp/conline/edcams/spam/zombie/index.htm. For a letter sent to 3,000 ISPs, as part of this initiative, see http://www.ftc.gov/bcp/conline/edcams/spam/zombie/letter_english.htm. The specific suggestions for such zombie-prevention measures will vary over time. Some initial recommendations, derived as part of the London Action Plan meeting and related efforts, include: 1) blocking port 25 except for the outbound SMTP requirements of users authenticated by the ISP to run mail servers designed for client traffic and other carefully accredited purposes; 2) exploring implementation of Authenticated SMTP on port 587 for clients who must operate outgoing mail servers; 3) applying rate-limiting controls for email relays; 4) identifying computers that are sending atypical amounts of email, and take steps to determine if the computer is acting as a spam zombie. When necessary, quarantining the affected computer until the source of the problem is removed; 5) providing, or pointing customers to, easy-to-use tools to remove zombie code if their computers have been infected, and provide the appropriate assistance; and, 6) the shutdown of open relay servers after appropriate notice and inquiry. Regarding the first of these suggestions, related to port 25, Industry Canada (in a separate context), recommends, “ISPs and other network operators should limit, by default, the use of port 25 by end-users. If necessary, the ability to send or receive mail over port 25 should be restricted to hosts on the provider s network. Use of port 25 by end-users should be permitted on an as-needed basis, or as set out in the provider s end-user agreement / terms of service.” http://e-com.ic.gc.ca/epic/internet/inecic-ceac.nsf/en/gv00329e.html. The New Zealand regulators note: “The enforcement agency would be seen as also having a role in educating users/consumers on how to deal with spam in conjunction with the industry as well as a role in educating business and other organisations on how to comply with the legislation along with the Ministry of Economic Development, which will be responsible for administering the legislation, and organisations such as the Direct Marketing Association.” Ministry of Economic Development (NZ), “Legislating against Unsolicited Electronic Messages Sent for Marketing or Promotional Purposes (Spam) – Enforcement Issues – Cabinet Paper,” supra note 47, at http://www.med.govt.nz/pbt/infotech/spam/cabinet/paper-two/paper-two-03.html#P31_3192. For a description of open mail relays and their importance to the spam issue, see http://en.wikipedia.org/wiki/Open_mail_relay. For a definition of botnet, see http://en.wiktionary.org/wiki/botnet. C HAPTER 7 125 Trends in Telecommunication Reform 2006 8 MAKING BROADBAND WORK FOR ALL Regulators and policy-makers view the advent of broadband networks and services as both a challenge and an opportunity. What, really, is “broadband”? To the layman, it often translates as “fast internet access.” But as the edition of Trends has illustrated, the broadband revolution is a multi-layered phenomenon, with technological, economic and social aspects that will become more apparent as this decade wears on. One thing is clear: broadband is not a passing phase or a high-end niche market. It is literally the future of telecommunications. Policy-makers and regulators around the world will have to come to grips with it and learn to exploit its opportunities – in other words, learn how to make broadband work for all. 8.1 What Is Broadband? In the most basic definition, broadband refers to an array of digital, packet-switched network technologies that allow the transport of digital bits at high speeds. These technologies are both wireless and wire-line, and they include both upgrades to existing networks (for example, xDSL or 2.5G networks) and entirely new infrastructure (such as all-fibre networks, WLANs and 3G systems). Generally, networks with bandwidth capacities of 256 kbit/s or more can be termed “broadband,” although that threshold may well shift higher as new technologies push the envelope on throughput. What may be more important than network capacity is what one can do with broadband networks. Instead of the old, single-purpose networks, broadband networks can carry any combination of voice, data and multimedia (graphics, video and audio), in any format. Indeed, broadband networks are already generating new permutations on old media: audio “podcasts” downloaded to portable players from websites, chat functions incorporated into online video games. The list goes on. The evolution of new applications is suddenly without boundaries, and human ingenuity is now free to pursue services and applications that will improve lives and bolster economies. The obvious conclusion is that the term “broadband” does not just mean an interesting set of network technologies. It is an entirely new paradigm, potentially as different from standard voice telephony as telephony is from the telegraph services of 150 years ago. Never before has there been such power to combine images and information in ways that can actually aug- C HAPTER 8 ment the user’s experience into something more enriched than actually being there. 8.2 Why Should I Care about Broadband? Broadband networks amplify the internet, certainly, but they go much further than that. A doctor 10,000 kilometres away can check the progress of a patient’s care using a remote live-camera feed, with an in-screen box showing the patient’s records to facilitate diagnosis and treatment. A master of traditional dance in one country can teach students the intricacies of an ancient dance step to émigrés in a hundred other countries at the same time, ensuring its survival for generations to come. Such moments are as ephemeral as the flap of a butterfly’s wing – and just as priceless. Now imagine such moments taking place literally millions of times each day across disciplines ranging from dance to dentistry to demographics. The single most important thing to absorb about broadband technologies is that they drive intelligence and ingenuity to the edge of networks. More than ever before in the history of telecommunications, it will be not so much the network but rather the people connected to it that count. ICT technology may never catch up to human creativity and diversity, but broadband networks will allow it to remain closely linked. The power of computing to generate and organize knowledge – or to germinate and nurture art – will suffocate without the media to convey it from one person to another. Broadband networks empower individuals and groups to create and collate, innovate and inspire, without restrictions of time and distance. As they empower individuals, broadband capabilities will increase the potential for generating content that will be relevant, meaningful and understandable to communities. The key to sustainable network services is demand. And the key to demand is providing useful, culturally sustaining content, in local languages, about local circumstances as well as global realities. Although it certainly will not happen overnight, there is no reason why individuals in the remotest areas cannot eventually become broadcasters in their own communities, educators in their own homes, and performing artists for worldwide audiences. 127 Trends in Telecommunication Reform 2006 8.3 How Can I Get Broadband? For increasing numbers of consumers, the answer is that they already have it – and are likely to get more of it. In many countries, broadband is now available in several different user niches: at home on a desktop PC or with a Wi-Fi-equipped laptop in the airport. For these lucky users, the future will be about convergence onto multiple platforms – interactive digital televisions, broadband mobile phones and streaming video on computers, just to name a few – and inter-modal competition. For developing countries, the key to the broadband future is the flexibility of the technologies coupled with the declining costs of the network topologies. Broadband technologies can increasingly be either fixed or mobile, and they can convey any mélange of voice, data and multimedia content – all at a lower marginal cost than earlier-generation, circuit-switched telecommunications networks. Moreover, advances in infrastructure – particularly with wireless networking standards in the Wi-Fi and WiMAX families – will allow more and more broadband capabilities at lower cost. In the context of developing markets, broadband will clearly have to dovetail with the prevalent mobile flavour of the telecommunication sectors there. For one thing, the age of the ubiquitous wire-line network may never arrive in many countries. And certainly, the broadband revolution will not be obliged to wait around for it. Access networks are likely to continue to be mobile and wireless – including broadband wireless access (BWA) technologies. Mobile and fixed wireless will likely converge, bringing a broadband capability to markets that are essentially mobile, and will continue to be. For transport and backhaul, a combination of network types will have to be employed. This will undoubtedly include terrestrial wireless links, some satellite hops and lit fibre. Non-traditional suppliers will have to be part of the mix in developing countries. For backhaul, this may mean infrastructure sharing between the fibre networks of universities and the transport and energy sectors as well as leased fibre from the private sector. In the access network sector, the decentralized nature of broadband networks will enlist smaller-scale, local and regional operators – community groups, universities, municipalities and entrepreneurs – to set up “hotspots” or wide-area networks that can be linked back to larger operators’ networks. The network can be built from the periphery inwards, by local operations providing local content and services, generating demand from the ground up. 8.4 What Can Regulators Do? Regulators and policy-makers around the world are reviewing their laws and regulations to judge whether they provide a proper environment to help speed the opportunities and benefits of broadband networks and the new services and applications that ride on them. At this juncture, responses have been varied – everything from initiating an overhaul of licensing and market-entry policies to doggedly restricting access to VoIP services. As with other aspects of sector liberalization, many governments feel the instinct to protect incumbents and ensure that they take the lead in broadband investment. 128 It may do little good, however, to liberalize traditional telephony markets, or even mobile service markets, while protecting incumbents from inter-modal or broadband competition. Growing numbers of countries are adopting regulations that allow for open market entry at all levels and layers, including applications and services such as VoIP and internet access. Of course, in markets undergoing a transition to competition, it is important for regulators to work towards a level playing field for providers of IP-based services. This will often mean taking steps to ensure that network operators interconnect and provide open access to support infrastructure and some network capabilities. In many areas of regulation, it may be possible to “regulate down” rather than “regulate up” to achieve competition. That is, as competition becomes viable, and market forces begin to discipline operators’ behaviour, it may be wiser to reduce the regulatory burden on all operators – incumbents and new entrants alike – rather than imposing the same regulatory structure on competitors that has always been applied to the monopoly incumbent. Regulators must strike a balance between giving incumbents too much latitude to obstruct competition, on the one hand, and so many restrictions that it stifles broadband investment, on the other. One key area of regulatory practice, of course, is spectrum management, and the role of spectrum management takes on greater importance with the rise of broadband wireless access (BWA) technologies. At the same time that spectrum-hungry BWA equipment is being developed and deployed, other advances, such as in the computing power of processors in radio equipment, are causing more ferment in the spectrum community than perhaps at any time in its history. The traditional paradigm of spectrum planning, allocation, assignment and monitoring reflect largely the technological limits of an earlier era. New radio technologies may free regulators from some legacy spectrum management practices that may become obsolete, or worse, too rigid for a wireless broadband world. Technological developments such as spectrum-hopping, adaptive and directional antennae use and other techniques promise to shift interference management from governments to operators and even to end-user terminals to allow greater sharing and reuse of existing spectrum. Spectrum regulators have begun to respond by granting licensees with more flexibile use of technologies so that operators can deliver the services the market demands. This technology and service “neutrality” reinforces the overall trends of decentralizing control over networks. This will allow the application of BWA technologies, for example, to be more agile in responding to local market realities. Indeed, in developing countries generally, and in remote areas within developing countries, in particular, where spectrum scarcity is far less an issue than in developed countries, there is no reason why spectrum management policies could not be tailored to local realities, which may include a less dense environment of spectrum use, allowing greater power and range for wireless systems that do operate there. In the end, perhaps the best analogy of the future broadband wireless environment is the highway analogy. Anyone C HAPTER 8 Trends in Telecommunication Reform 2006 can get on the highway, as long as they obey the rules of the road. That is, as long as operators obey rules designed to limit harmful interference, entry barriers can be lowered to allow as many operators as demand warrants. In congested areas, of course, those rules may need to be more stringent – as speed limits are on urban highways. In the end, however, it makes little sense to restrict market entry when technical demands do not require it. That would be akin to establishing a nationwide limit of cars allowed on any highway anywhere in the country, based solely on the potential for congestion at the single busiest spot, at rush hour, in the country’s capital city. C HAPTER 8 In the final analysis, policy-makers and regulators need to address the broadband revolution in three ways. First, they need to accept the reality of its coming and embrace its potential. Second, they need to radically revise the way they understand telecommunications, to understand all the options they might pursue in accommodating the new networks, services and applications. Finally, and most importantly, they need to plan, with the advice and input of their industries, academic institutions and civil societies, how to make broadband work for all. 129 Trends in Telecommunication Reform 2006 REGULATORY TABLES * Table 1 Countries with a separate Regulatory Authority ................................................................ 133 Table 2 Status of the main fixed-line operators ............................................................................ 169 Table 3 Level of competition ....................................................................................................... 203 * Regulatory profiles as well as contact details for policy-makers and regulators are available on the TREG website at: http://www.itu.int/ITU-D/treg. This data is extracted from the ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 131 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Financed by Reports to Is it a collegial body? Afghanistan Afghanistan Telecom Regulatory Authority (ATRA) 2003 Presidental Decree Website: http://www.trb.gov.af Sector Ministry (annual report) Regulatory fees: 100% Yes: 5 Members Albania Telecommunication Regulatory Entity 1998 Law 8288,18.2.1998 on Telecommunication Regulatory Entity Website: http://www.ert.gov.al Legislature Other: Council of Ministers Licence fees: 17.1% Spectrum fees: 38.3% Numbering fees: 0.1% Yes: 5 Members Financial income: 44.4% Other: 0.1% Algeria Autorité de régulation de la poste et des télécommunications (ARPT) 2000 Loi n° 2000-03 Legislature Website: http://www.arpt.dz Award/auction of other licence: 17.7% Spectrum fees: 60.1% Numbering fees: 1.5% Yes: 7 Members Other: 20.6% Various products, research fees, ICT training and standardization 1 Angola Institut Angolais des Communications (INACOM) 1999 Décret nº 12/99 du 25 juin Website: http://www.inacom.og.ao Sector Ministry (annual report) Award/auction of mobile licence: 30% Award/auction of other licence: 2.0% Spectrum fees: 65% Yes: 5 Members Other: 3% 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 133 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority 2 Financed by Reports to Is it a collegial body? Argentina Comisión Nacional de Comunicaciones (CNC) Website: http://www.cnc.gov.ar 1990 Decreto 1185 de fecha 22 de junio de 1990 Spectrum fees: 55% Yes: 8 Members Contributions from operator turnover: 42% Financial income: 0.5% Other: 2.5% Australia Australian Communications and Media Authority (ACMA) 1997 Austel - Telecommunications Act 1989. ACCC - Trade Practices Act 1974. ACA ACA Act 1997. Australian Communications and Media Authority Act 2004 1 Legislature Sector Ministry (annual report) Website: http://www.acma.gov.au Licence fees Government appropriation Spectrum fees Numbering fees Yes: 7 Members Contributions from operator turnover Other: ACMA and ACCC telco regulatory costs are recovered from carriers via carrier licence fees, based on each carrier's % of total carrier eligible revenue. Costs of administering numbering arrangments are recovered through numbering charges. 'Once off' fees (eg. spectrum auction) are paid directly to general goverment consolidated revenue. At the time of auction, a recurrent annual tax is set for each band in the spectrum. Bidders who use the particular band are taxed pro-rata for the megahertz population in the band that they use, i.e. their share of the total band tax. Austria Telecom-Control-Commission (Telekom-Control-Kommission, TKK) 1997 Telecommunications Act 1997 Sector Ministry (annual report) Website: http://www.rtr.at Contributions from operator turnover: 70,5 % Other: 29,5% Broadcasting activities are financed by broadcasting companies (Data for 2003) Yes: 3 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 134 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Financed by Reports to Is it a collegial body? Bahamas The Public Utilities Commission Website: http://www.pucbahamas.gov.bs 1999 Public Utilities Commission Act, 1993 Other: The PUC is required 3 months after the end of the financial year to transmit an Annual Report to the Governor General and Prime Minister Yes: 3 Members Licence fees Government appropriation: 19.9% Spectrum fees: 34.2% Contributions from operator turnover: 45.9% Bahrain Telecommunications Regulatory Authority Website: http://www.tra.org.bh 2002 The Telecommunications Law No reporting requirements Licence fees: 100% Yes: 5 Members Bangladesh Bangladesh Telecommunication Regulatory Commission (BTRC) 2002 Bangladesh Legislature Telecommunication Act, 2001 Sector Ministry (annual report) Website: www.btrc.org.bd Other: 100% Govt. of Bangladesh Yes: 5 Members Barbados Fair Trading Commission Website: http://www.ftc.gov.bb 2001 Fair Trading Commission Act 2000-31 Sector Ministry (annual report) Other Ministry Government appropriation Yes: 11 Members Contributions from operator turnover 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 135 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority 2 Reports to Financed by Belgium Belgian Institute for Postal Services and Telecommunications 1993 Act of 21 March 1991 on the reform of some economic public companies. Act of 17 January 2003 concerning the statute of the Belgium Post and Telecommunication regulator 2 Is it a collegial body? Legislature Sector Ministry (annual report) Other Ministry Website: http://www.bipt.be Award/auction of mobile licence: 2% Licence fees: 7% Spectrum fees: 81% Numbering fees: 6% Yes: 4 Members Other: 4% Office of the ombudsperson Belize Public Utilities Commission (PUC) 1988 2 Benin Direction de la Politique des Postes et Télécommunications (interim) 2002 Ordonnance n° 2002- 003 du Sector Ministry 31 janvier 2002 (annual report) Other: The Authority is not yet operational. Yes: 5 Members Bhutan Bhutan Communications Authority 2000 Bhutan Telecommuncations Act 1999 2 Website: http://www.bca.gov.bt Sector Ministry (annual report) Government appropriation: 100% No: Director Bolivia Superintendencia de Telecomunicaciones Website: http://www.sittel.gov.bo 1995 Ley 1600 (Ley SIRESE) Spectrum fees: 100% No: Telecommunicaction Superintendent 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 136 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority 2 Financed by Reports to Is it a collegial body? Bosnia and Herzegovina Communications Regulatory Agency (CRA) Website: http://www.cra.ba 1999 Decision combining the Other: The Council competencies of the of Ministers Independent Media Commission and the Telecommunications Regulatory Agency issued by Office of the High Representative (OHR) in 2001 Licence fees: 70% Spectrum fees: 7% Numbering fees: 23% No: Chief Executive Officer (CEO) Botswana Botswana Telecommunications Authority (BTA) 1996 Telecommunication Act 1996 (No 15 of 1996) 2 Website: http://www.bta.org.bw Sector Ministry (annual report) Licence fees: 91% Spectrum fees: 9% Yes: 5 Members Brazil Agência Nacional de Telecomunicações do Brasil (Anatel) 1997 Law Nº 9.9.472 of July 16, 1997 No reporting requirements Website: http://www.anatel.gov.br Award/auction of mobile licence: 48% Award/auction of other licence: 8.6% Spectrum fees: 0.9% Regulatory fees: 25.2% Fines/penalties: 0.62% Yes: 5 Members Financial income: 17.1% Other: 0.1% Management services, homologation 1 Brunei Darussalam Authority for Info-communications Technology Industry of Brunei Darussalam (AiTi) Website: http://www.aiti.gov.bn 2003 Authority for infocommunications technology industry of Brunei Darussalam Order, 2001 Other: Report to Minister of Communications Confidential Yes: 5 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 137 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Financed by Reports to Is it a collegial body? Bulgaria Communications Regulation Commission 2002 Telecommunications Law 1 Website: http://www.crc.bg Other: To the National Assembly, the President of the Republic, the Council of Ministers, the Council for Electronic Media. Award/auction of mobile licence: 57,6% Licence fees: 1,6% Spectrum fees: 22,7% Numbering fees: 2,6% Fines/penalties: 0,2% Yes: 5 Members Contributions from operator turnover: 15,3% Burkina Faso Autorité Nationale de Régulation des Télécommunications 1998 Loi n° 051/98/AN du 04 décembre 1998 Sector Ministry (annual report) Website: http://www.artel.bf Award/auction of other licence Licence fees Spectrum fees: 45% Numbering fees: 15% Regulatory fees: 35% Fines/penalties: 1% No: Director General Contributions from operator turnover: 1% Other: 4% Approval and authorization fees 2 Burundi Agence de Régulation et de Contrôle des Télécommunications 1997 Décret Présidentiel n° 100/182 Sector Ministry (annual report) No: Administrator/DirectorGeneral 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 138 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority 1 Reports to Financed by Is it a collegial body? Cameroon Agence de Régulation des Télécommunications 1998 Loi n° 98/014 du 14 juillet 1998 Other: Submits an Licence fees annual public report Spectrum fees on activities Numbering fees Regulatory fees Fines/penalties No: Director General Contributions from operator turnover Canada Canadian Radio-television and Telecommunications Commission (CRTC) 1976 Telecommunications Act and CRTC Act Sector Ministry (annual report) Website: http://www.crtc.gc.ca Regulatory fees: 100% Yes: 7 Members Other: Telecom activities are funded by fees. Cable activities are funded by entities regulated under the Broadcasting act. Cape Verde Instituto das Comunicações e das Técnologias de Informação (ICTI) 2004 Résolution nº 1/2004 du 19 janvier 2004 1 Website: http//www.icti.cv Sector Ministry (annual report) Yes: 3 Members Central African Rep. Agence chargée de la Régulation des Télécommunications (ART) 1 Chad Office Tchadien de Régulation des Télécoms (OTRT) 1998 Loi 009/PR/98 du 17 août 1998 Website: http://www.otrt.td Sector Ministry Spectrum fees: 51,6% (annual report) Regulatory fees: 34,5% Other: Chairman of Contributions from operator the Board of turnover: 13,7% Directors Other: 0,5% Transfers, fixed assets 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 139 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Financed by Reports to Is it a collegial body? Chile Subsecretaría de Telecomunicaciones 1977 Decreto Ley Nº 1.762 Website: http://www.subtel.cl Legislature Sector Ministry (annual report) Other Ministry Award/auction of mobile licence: 0.5% Spectrum fees: 45% Fines/penalties: 0.5% No: Subsecretariat of telecommunications Other: 54% Public Treasury Colombia Comisión de Regulación de Telecomunicaciones (CRT) 1994 Ley 142 de 1994, Decreto 1130 de 1999 1 Legislature Sector Ministry (annual report) Other Ministry Website: http://www.crt.gov.co Contributions from operator turnover: 100% Financial income Yes: 3 Members Congo (Dem. Rep.) Autorité de Régulation de la Poste et des Télécommunications du Congo ( A.R.P.T.C.) Website: http://www.arptc.cd/ 2002 Loi n° 014/2002 du 16 octobre 2002 Other: President of Numbering fees the Republic Other: Regulatory fee Yes: 7 Members Costa Rica Autoridad Reguladora de los Servicios Públicos (ARESEP) 1963 Ley 258 de 1941; Ley 3226 Legislature de 1963: facultades Other: Annual regulatorias; Ley 7593 del activities report año 1996 se transformó en la ARESEP Website: http://www.aresep.go.cr Other: 100% Regulatory fees covered directly by the operator Yes: 5 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 140 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority 1 Reports to Financed by Is it a collegial body? Côte d'Ivoire Agence des télécommunications de Côte d’Ivoire (ATCI) 1995 Loi n° 95-526 du 07 juillet 1995 portant Code des Télécommunications Sector Ministry (annual report) Other: Ministry of the Economy and Finance Website: http://www.atci.ci Award/auction of mobile licence: 8.74% Spectrum fees: 69.7% Numbering fees: 4.85% Fines/penalties: 0.08% Yes: 10 Members Contributions from operator turnover: 11.96% Other: 4.61% Various 1 Croatia Croatian Institute of Telecommunications 2000 Law on Telecommunications Website: http://www.telekom.hr Other: Annual report to the Government Spectrum fees: 50% Numbering fees: 24% Yes: 7 Members Contributions from operator turnover: 25% Other: 1% technical examinations and additional incomes Cyprus Office of the Commissioner of Elecronic Communications & Postal Regulation Website: http://www.ocecpr.org.cy 2002 The Telecommunications and Postal Services Regulation Law of 2002 Other: Annual Report to the Head of State Licence fees: 75.2% Government appropriation: 8.3% Numbering fees: 8.5% Fines/penalties: 0.5 % No: Commissioner of Electronic Communications and Postal Regulation Financial income: 3.4 % Other: 0.02% Postal licence fees Czech Republic Czech Telecommunication Office 2000 Act on Electronic Communications and on Amendments to Other Acts No. 127/2005 Coll., Website: http://www.ctu.cz Other: Annual Government appropriation: 100% Report is presented to the Government and the Parliament Yes: 5 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 141 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? Denmark National IT and Telecom Agency (NITA) 1991 Finance Act 2002 1 Website: http://www.itst.dk/ Sector Ministry Government appropriation: 65% (annual report) Other: 35% Various services Other: Annual Status Report. Annual activity account on financial circumstances and performance. No: Director-General Dominican Rep. INDOTEL Website: http://www.indotel.org.do 1998 Ley General de Telecomunicationces No. 153-98 Other: Annual report to the Executive for presentation to the National Congress of the Dominican Republic Yes: 5 Members Contributions from operator turnover Other: In addition, revenues are received corresponding to the use of the radio spectrum public domain; the fees established, as appropriate, under the procedures for the issue of concessions and licences, in accordance with the regulations; from the returns generated by its own capital resources; from budgetary appropriations assigned to it, as appropriate, by the central Government; and from any other possible sources. 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 142 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? Ecuador Consejo Nacional de Telecomunicaciones (CONATEL) 1995 Ley Reformatoria a la Ley No reporting Especial de requirements Telecomunicaciones. R.O. 770 del 30 de agosto de 1995 Website: http://www.conatel.gov.ec Award/auction of mobile licence: 10% Award/auction of other licence: 10% Licence fees: 10% Spectrum fees: 70% Yes: 7 Members Egypt National Telecommunication Regulatory Authority (NTRA) 1998 Presidential Decree Sector Ministry (annual report) Other: NTRA Board of Directors Website: http://www.tra.gov.eg/ Licence fees Spectrum fees Regulatory fees Fines/penalties No: Executive President Financial income El Salvador SIGET Website: http://www.siget.gob.sv 1996 Ley de creación de la SIGET Legislature Award/auction of other licence: 1.54% Licence fees: 5.54% Spectrum fees: 66.03% Numbering fees: 0.54% Yes: 3 Members Financial income: 3.6% Other: 22.75% Accumulated surpluses, electricity charges and miscellaneous charges Eritrea Communications Department Website: http://www.cd.gov.er 1998 The Communications Proclamation No. 102/1998 Government appropriation: 100% No: Director General 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 143 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Financed by Reports to Is it a collegial body? Estonia Estonian National Communications Board 1998 Government of the Republic Act 1 Other: 100% State Budget No: Director General Ethiopia Ethiopian Telecommunications Agency 1996 Telecommunication proclamation No. 49/1996 1 Website: http://www.sa.ee Sector Ministry (annual report) Website: http://www.telecom.net.et/~eta/ Legislature Sector Ministry (annual report) Government appropriation: 100% No: General Manager Finland Finnish Communications Regulatory Authority 1988 Act on Telecommunications Administration Website: http://www.ficora.fi Other: Half-yearly financial report to the sector Ministry with evaluation of achievement of targets Licence fees: 18% Spectrum fees: 22% Numbering fees: 13% No: Director-General Other: 47% refund for collection of television fees 34%, domain name fees 9%, other fees 4 % France Autorité de Régulation des Communications Electroniques et des Postes (ARCEP) Website: http://www.art-telecom.fr/ 1997 Loi de réglementation des télécommunications n° 96659 du 26 juillet 1996 Legislature Sector Ministry (annual report) Other: Annual report to president of France Government appropriation: 100% Yes: 7 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 144 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Financed by Reports to Is it a collegial body? Gabon Agence de Régulation des Télécommunications (ARTEL) 2001 Loi N°005/2001 Sector Ministry (annual report) Other Ministry Other: ARTEL also reports to finance ministry. It may also report to audit office for financial matters Website: http://www.artel.ga Licence fees: 70% Government appropriation: 17% Spectrum fees: 12% Yes: 6 Members Contributions from operator turnover: 4% The Administrative and Financial Directorate of ARTEL. Gambia Public Utility Regulatory Authority (PURA) 2004 PURA Act 2001 Website: http://www.pura.gm/ Legislature Government appropriation: 100% Other: Secretary of State for Finance and Economic Affairs, who is responsible for the Administration of the Act. He in turn will submit it to the National Assembly Yes: 6 Members Georgia Georgian National Communications Commission 2000 Georgian Law on Other: Annual Telecommunications and Post Report to the President of Georgia Website: http://www.gncc.ge Yes: 3 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 145 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? Germany Federal Network Agency for Electricity, Gas, Telecommunication, Post and Railway (Section 115) Website: http://www.bundesnetzagentur.de 1998 Telecommunications Act of 25 July 1996 1 Legislature Other: Annual Report [to the interested public; the reporting to Legislature is made by the bi-annual Activity Report (cf. Sections 121 and 122 of the Telecommunications Act)]. Government appropriation: 47% Spectrum fees: 32% Numbering fees: 13% Fines/penalties: 0.7% No: President Other: 9.3% amateur radio, digital signature, radio equipment and telecommunications terminal equipment, operator's certificate in the aeronautical mobile service, measurements for third parties (i.e. environmental impact measurements, Leeheim Satellite Monitoring station, etc.) and post (postal licenses) Ghana National Communications Authority 1997 National Communications Authority Act 524 of 1996 Website: www.nca.org.gh (this is under construction) Sector Ministry (annual report) Licence fees: 16% Spectrum fees: 46% Regulatory fees: 31% Fines/penalties: 5% Yes: 7 Members Financial income: 2% Greece National Telecommunications and Post Commission, Greece (EETT) 1992 Law 2075/1992 Sector Ministry (annual report) Website: http://www.eett.gr Licence fees: 0.48% Spectrum fees: 8.55% Numbering fees: 4.71% Fines/penalties: 0.41% Yes: 9 Members Contributions from operator turnover: 12.34% Financial income: 0.64% Other: 72.87% EETT's reserves from previous years 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 146 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority 2 Reports to Financed by Grenada National Telecommunications Regulatory Commission Website: http://www.ectel.int/grd/ 2001 2 Yes: 5 Members Guatemala Superintendencia de Telecomunicaciones Website: http://www.sit.gob.gt/ 1996 Ley General de Telecomunicaciones (Decreto 94-96 del Congreso de la República) 2 Is it a collegial body? Award/auction of mobile licence: 10% No: Superintendent Other: 90% Fines, 3%; bank interest, 81%; administrative charges, 6% Guinea Direction nationale des postes et télécommunications 1992 1 Sector Ministry (annual report) No: National Director of Posts and Telecommunications Guinea-Bissau Institut des Communications de la Guinée-Bissau (ICGB) 1999 Décret-loi nº 3/99, 20 août 2 Other: The Regulatory Authority (DNPT) is financed out of the Public Treasury. Sector Ministry (annual report) Other Ministry Website: http://www.icgb.org Licence fees: 3% Government appropriation: 14% Spectrum fees: 62% Regulatory fees: 21% Yes: 3 Members Guyana Public Utilities Commission 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 147 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? Haiti Conseil National des Telecommunications (CONATEL) 1969 Décret-loi de création du Sector Ministry CONATEL 27 Septembre 1969 (annual report) Website: N/A Licence fees Spectrum fees No: Director-General Contributions from operator turnover Other: Type approval 2 Honduras Comisión Nacional de Telecomunicaciones Website: http://www.conatel.hn 1996 Ley Marco del Sector de Telecomunicaciones Government appropriation: 100% Yes: 5 Members 3 principals, 2 substitutes Hungary National Communications Authority Website: http://www.nhh.hu 1999 The present structure is created by Act C of 2003 on Electronic Communications 2 Legislature Other: Annual Report to the Government Licence fees: 1% Spectrum fees: 56% Numbering fees: 12% Yes: 7 Members Contributions from operator turnover: 13% Other: 18% V.A.T. reimbursed Iceland Post and Telecom Administration Website: http://www.pta.is 1997 Law on the Post and Telecom Administration, no. 147/1996 Award/auction of mobile licence: 2% Licence fees: 19% Spectrum fees: 44% No: Managing Director Other: 35% Operating fees India Telecom Regulatory Authority of India Website: http://www.trai.gov.in 1997 Telecom Regulatory Authority Legislature of India Act-1997 Other: Annual Report to the Parliament Government appropriation: 100% No: Chairperson 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 148 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority 1 Reports to Financed by Is it a collegial body? Indonesia Directorate General of Posts and Telecommunications 2003 Minister of Communications' Decree No.31 regarding Establishment Indonesian Telecommunication Regulatory Body Sector Ministry (annual report) Website: http://www.postel.go.id Government appropriation: 100% Yes: 5 Members Iran (I.R.) Communications Regulatory Authorithy Website: http://www.cra.ir 2003 The law of duties and Sector Ministry powers of the Ministry of ICT, (annual report) 2003 Other: 100% At present from the Government Fund. The following possible revenues are transferred to the Government account: License fees, Spectrum fees, Numbering fees, Yes: 7 Members Ireland Commission for Communications Regulation (ComReg) 2002 Communications (Regulation) Act 2002 2 Sector Ministry (annual report) Website: http://www.comreg.ie Licence fees: 61% Yes: 3 Members Contributions from operator turnover: 30% Financial income: 3% Other: Cable and MMDS, Wireless Telegraphy Fees etc 2%, Postal Levy 4% Italy Autorità per le Garanzie nelle Comunicazioni (AGCOM) 1998 L. 31 luglio 1997, n. 249 Legislature Website: http://www.agcom.it Government appropriation: 60% Yes: 9 Members Contributions from operator turnover: 39% Financial income: 1% 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 149 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Financed by Reports to Is it a collegial body? Jamaica Office of Utilities Regulation Website: http://www.our.org.jm 1995 Office of Utilities Regulation Act Other: Annual report is submitted to Legislative Branch through the Minister of Development Regulatory fees: 91.01% Yes: 3 Members Financial income: 2.36% Other: 6.63% License application processing fees (6.43%) and grants (0.2%) Jordan Telecommunications Regulatory Commission (TRC) 1995 Telecommunication Law No. 13 of 1995 and its amendments of 2002 1 Website: http://www.trc.gov.jo Other: Report to the Licence fees: 82.377% prime minister Spectrum fees: 16.234% Fines/penalties: 1.389% Yes: 5 Members Kenya Communications Commission of Kenya 1999 Kenya Communications Act, 1998 Website: http://www.cck.go.ke Sector Ministry (annual report) Spectrum fees: 80.7% Regulatory fees: 0.6% Yes: 11 Members Contributions from operator turnover: 17.7% Korea (Rep.) Korea Communications Commission 1997 Article 37~44 of the Telecommunications Basic Act Website: http://www.kcc.go.kr Legislature Government appropriation: 100% Yes: 7 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 150 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? Kyrgyzstan State Communications Agency Website: http://www.gas.gov.kg 1997 Decree of the President of the Kyrgyz Republic 280, 7 October 1997 Other: Annual report to the Government Spectrum fees: 35.7% No: Director Contributions from operator turnover: 61.6% Financial income: 2.7% Latvia Public Utilities Commission Website: http://www.sprk.gov.lv 2001 Law on Regulators of Public Services 1 Legislature Yes: 5 Members Lesotho Lesotho Telecommunications Authority 2000 Lesotho Telecommunications Authority Act 2000 2 Contributions from operator turnover: 100% Website: http://www.lta.org.ls Sector Ministry (annual report) Other Ministry No: Chief Executive Officer Liechtenstein Office for Communications Website: http://www.ak.li 1999 Telekommunikationsgesetz (TelG) vom 20. Juni 1996, LGBl. 1996 Nr. 132, Art. 42a (Telecommunications Law of 20 June 1996, Liechtenstein Legal Gazette 1996 No. 132, Art. 42a) Sector Ministry (annual report) Government appropriation Spectrum fees Numbering fees Regulatory fees No: Director 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 151 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? Lithuania Communications Regulatory Authority of the Republic of Lithuania 2000 Governmental Resolution No. 617 on setting up NRA Legislature Other: Annual report to the Parliament and the Government Website: http://www.rrt.lt Other: 100% Income for services Yes: 5 Members provided and work performed (administrative charges). The mechanism of financing CRA is through the State budget, whereby all income from administrative charges collected for supervision of use of radio frequencies, numbers, etc. is deposited in the State budget and then reallocated as needed to the CRA Luxembourg Institut Luxembourgeois de Régulation Website: www.ilr.lu 1997 Loi modifiée du 21 mars 1997 Other: Annual sur les télécommunications financial report to minister, who supervises institute Spectrum fees Numbering fees Regulatory fees Yes: 3 Members Contributions from operator turnover Financial income Madagascar Office Malagasy d'Etudes et de Régulation des Télécommuniations (OMERT) 1997 Décret n° 97-1077 du 28 août Sector Ministry 1997 (annual report) Website: http://www.omert.mg Licence fees Spectrum fees: 67.58% No: Director-General Contributions from operator turnover: 31.41% Other: 1% Testing and verification : 0,21%; Laboratory fees : 0.02%, Other financial products : 0.78%. 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 152 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority 2 Reports to Financed by Is it a collegial body? Malawi Malawi Communications Regulatory Authority (MACRA) 1998 Communications Act 1998 Sector Ministry (annual report) Website: http://www.macra.org.mw Licence fees: 23% Spectrum fees: 24.5% Yes: 8 Members Contributions from operator turnover: 38.5% Financial income: 4.5% Malaysia Malaysian Communications and Multimedia Commission 1998 Malaysian Communications and Multimedia Commission Act 1998 1 Website: http://www.mcmc.gov.my Other: Report to Licence fees: 40% Sector Minister, Spectrum fees: 54% Financial Report to Financial income: 6% Sector Minister, Annual Report and Industry Performance Report Yes: 9 Members Maldives Telecommunications Authority of Maldives 2003 Website: www.tam.gov.mv Sector Ministry (annual report) Licence fees: 5% Yes: 5 Members Mali Comité de Régulation des Télécommunications (CRT) 1999 Ordonnance 99-043 du 30/9/99 (art.43). Décret 00-227 PRM du10 mai 2000 fixant les modalités de fonctionnement du CRT Sector Ministry (annual report) Website: http://mali-reforme-telecom.mcmtl.com Spectrum fees: 51% Regulatory fees: 49% Yes: 3 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 153 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? Malta Malta Communications Authority Website: http://www.mca.org.mt 1997 The Telecommunications (Regulation) Act as amended by the Malta Communications Authority Act. 1 Sector Ministry (annual report) Licence fees: 14% Government appropriation: 86% Yes: 5 Members Mauritania Autorité de Régulation Website: http://www.are.mr 1999 Loi 99 -019 du 11 juillet 1999 et Loi 2000 - 018 du 25 janvier 2001 Legislature Spectrum fees: 26% Other: The report is Numbering fees: 5% annual and is Contributions from operator addressed to the turnover: 68% Government and Financial income: 1% Parliament Provisional budget for financial year 2004 Yes: 5 Members Mauritius Information and Communication Technologies Authority 2002 Information and Communication Technologies Act Website: http://www.icta.mu Sector Ministry (annual report) Yes: 7 Members Mexico Comisión Federal de Telecomunicaciones (COFETEL) 1996 Decreto de creación de la Comisión Federal de Telecomunicaciones. Ley Federal de Telecomunicaciones. Other: Annual report Website: http://www.cofetel.gob.mx Government appropriation: 100% Yes: 4 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 154 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? Moldova National Regulatory Agency in Telecommunications and Informatics 2000 Government decision No. 843 Other: Report to of 17.08.2000 Government Website: http://www.anrti.md Licence fees: 1.2% Numbering fees: 32.2% Regulatory fees: 66.4% Yes: 3 Members Mongolia Communications Regulatory Commission 2002 Communications law of 1995 amended in 2001 Website: http://www.crc.gov.mn Other: Government Spectrum fees: 22.4% of Mongolia Numbering fees: 10.9% Regulatory fees: 61.9% Yes: 7 Members Other: 4.8% bank interest rate etc. Morocco Agence Nationale de Réglementation des Télécommunications (ANRT) 1997 Dahir n°1-97-162 du 7 août 1997 portant promulgation de la loi 24-96 relative à la poste et aux télécommunications Other: Director general produces annual report, submitted to prime minister and published in the "Bulletin Officiel" Website: http://www.anrt.net.ma Spectrum fees: 45% Contributions from operator turnover: 53% Other: 2% Various administrative fees related to the declaration of value-added services and equipment approval. No: Ag. DirectorGeneral Mozambique Instituto Nacional das Comunicações de Moçambique (INCM) 1992 Decree 22/92 Sector Ministry (annual report) Website: http://www.incm.gov.mz Licence fees: 45% Government appropriation: 55% Yes: 5 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 155 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? Namibia Namibian Communications Commission 1992 Namibian Communications Commission Act, 1992 Website: http://www.ncc.org.na Sector Ministry (annual report) Government appropriation: 100% No: Chairman Nepal Nepal Telecommunications Authority Website: http://www.nta.gov.np 1998 Telecommunication Act, 1997 Sector Ministry (annual report) Licence fees: 100% Yes: 5 Members Netherlands OPTA Website: http://www.opta.nl 1997 Wet OPTA Sector Ministry (annual report) Yes: 3 Members New Zealand Commerce Commission Website: http://www.comcom.govt.nz 2001 Commerce Act 1986, Legislature Telecommunications Act 2001 Sector Ministry (annual report) Government appropriation: 64% Yes: 3 Members Other: 36% recovered from applicants and parties Nicaragua TELCOR Website: http://www.telcor.gob.ni 1995 Ley General de Telecomunicaciones y Servicios Postales (Ley 200) Legislature Other: To the Executive Award/auction of other licence: 2.61% Licence fees: 65.62% Spectrum fees: 28.35% No: Chief Executive Director Financial income: 2.26% Other: 1.16% Examination fee, various services 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 156 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority 1 Reports to Financed by Is it a collegial body? Niger Autorité de Régulation Multisectorielle (ARM) Website: http://niger.arm-niger.org/ 2004 2 Nigeria Nigerian Communications Commission 1992 NCC ACT No 75 of 1992 Website: http://ncc.gov.ng Legislature Sector Ministry (annual report) Licence fees: 68% Yes: 9 Members Contributions from operator turnover: 12% Financial income: 13% Other: 4.5% Type Approval (3.5%), administrative fees (1%). Norway Norwegian Post and Telecommunications Authority 1987 Sector Ministry (annual report) Website: http://www.npt.no Licence fees: 5% Government appropriation: 8% Spectrum fees: 40% Numbering fees: 4% Regulatory fees: 40% No: Director Other: 3% Postal regulatory fees Oman Telecommunication Regulatory Authority 2002 Telecommunications Regulatory Act 2002 Website: http://www.tra.gov.om Other: Annual Award/auction of mobile licence: reporting to the 6.6% Council of Ministers Award/auction of other licence: 2.6% Licence fees: 13.2% Spectrum fees: 65.8% Regulatory fees: 0.6% Fines/penalties: 3.8% Yes: 4 Members Contributions from operator turnover: 13.2% Financial income: 0.8% Other: 0.003% 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 157 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? Pakistan Pakistan Teleccommunication Authority (PTA) 1996 Pakistan Telecommunication Re-Organization Act 1996 Website: http://www.pta.gov.pk No reporting requirements Award/auction of mobile licence: 92.5% Spectrum fees: 0.35% Regulatory fees: 3.99% Fines/penalties: 3.07% Yes: 3 Members Financial income: 0.09% 1 Panama Ente Regulador de los Servicios Públicos 1996 Ley N° 26 (29 de enero de 1996) por la cual se crea el Ente Regulador de los Servicios Públicos 2 Website: http://www.ersp.gob.pa Other: Assembly of Contributions from operator legislators turnover: 1% Other: 1% The fee charged, in the case of the telecommunication sector, to service-providing companies for control, monitoring and audit services: 1% of annual gross revenues for type B licensees and 0.25% of annual gross revenues for mobile cellular telephone companies. Papua New Guinea PANGTEL Website: http://www.pangtel.gov.pg/ 1997 1 Yes: 3 Members Licence fees No: Director-General Paraguay Comisión Nacional de Telecomunicaciones (CONATEL) 1995 Ley 642/1995 de Telecomunicaciones Legislature Sector Ministry (annual report) Other: The Executive Website: http://www.conatel.gov.py Yes: 5 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 158 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Financed by Reports to Is it a collegial body? Peru Organismo Supervisor de Inversión Privada en Telecomunicaciones (OSIPTEL) Website: http://www.osiptel.gob.pe 1994 Decreto Legislativo 702 2 Legislature Other Ministry Other: Chair of the Council of Ministers, Inspectorate General of the Republic, Ministry of Economics and Finance Contributions from operator turnover: 100% Yes: 5 Members Philippines National Telecommunications Commission 1979 EO546 Website: http://www.ntc.gov.ph Sector Ministry (annual report) Government appropriation: 100% Yes: 3 Members Poland Office of Telecommunications and Post Regulation (URTIP) 2000 Law of July 2000 Sector Ministry (annual report) Website: http://www.urtip.gov.pl Other: 100% State budget in the amount fixed each year in the Annual Budget Act. No: President 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 159 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority 1 Financed by Reports to Is it a collegial body? Portugal National Communications Authority (ANACOM) 1989 Decree-Law No. 188/81 of 2 July. Decree-law No. 283/89 of 23 August, now revoked by Decree-law 309/2001 of 7 December Website: http://www.anacom.pt Legislature No reporting requirements Other: Annual report to both Government and Parliament. The chairman of the board of administration will respond to requests for hearing addressed by the appropriate committee of the Parliament, to provide information or clarification on its activities. Licence fees: 0.0014% Spectrum fees: 97% Fines/penalties: 0.0004% Yes: 3 Members Financial income: 0.0007% Other: 2.9% Laboratory tests, postal services, EU subsidies, extraordinary income Qatar Supreme Council for Communication and Information Technology Website: http://www.ict.gov.qa/en/Default.aspx 2004 Ameri Decree 36, year 2004 Other: Report to an Other: Not determined yet independent board chair by His Highness the Heir Apparent of the State of Qatar No: Secretary General Romania National Regulatory Authority of Romania (ANRC) 2002 Government Emergency Other: The Ordinance No. 79/ 2002 on Government of the general regulatory Romania framework for communications, approved, with amendments and completions, by Law No. 591/2002, with subsequent amendments and completions Website: http://www.anrc.ro Contributions from operator turnover: 79% Other: 21% contributions from regulated postal services No: President 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 160 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority 1 Financed by Reports to Is it a collegial body? Rwanda Agence Rwandaise de Régulation des Services d'Utilité Publique 2001 Loi n° 39/2001 du 13/09/2001 Sector Ministry portant Création de l'Agence (annual report) Rwandaise de Régulation des Services d'Utilité Publique Website: http://www.rura.gov.rw/ Licence fees: 6,3% Yes: 7 Members Contributions from operator turnover: 50,7% Other: 43% World Bank project and State subsidies Samoa Minstry of Communications and Information Technology (MCIT) (ad interim) 2005 Telecommunications Act 2005 Legislature Other: Minister Award/auction of mobile licence Licence fees Spectrum fees Numbering fees Regulatory fees Fines/penalties No: Regulator Financial income Saudi Arabia Communication and Information Technology Commission 2002 The Council of ministers decision No. (74) Dated 2001 1 Sector Ministry (annual report) Website: http://www.citc.gov.sa Government appropriation: 100% Yes: 8 Members Senegal Agence de Régulation des Télécommunications 2001 Website: http://www.art.sn Other: President of Spectrum fees: 100% the Republic No: Director General 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 161 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Financed by Reports to Is it a collegial body? Singapore Infocomm Development Authority of Singapore 1992 Telecommunication Authority of Singapore Act 1992 and subsequently superseded by the Info-communications Development Authority of Singapore Act 1999 Website: http://www.ida.gov.sg Other: Annual Report to the Minister for Information, Communications and the Arts. Other: financed from a combination of licence fees, numbering fees and spectrum fees No: CEO Slovak Republic Telecommunication Office Website: http://www.teleoff.gov.sk 2000 Act. No. 195 / 2000 C.l. on Telecommunications Other: Annual report to the National Council of the Slovak republic Government appropriation: 100% No: President Slovenia Post and Electronic Communications Agency (APEK) 2001 Government's Decision on establishment of Telecommunication and Broadcasting Agency 1 Website: http://www.apek.si Other: Annual Report to the Government and the National Assembly of the Republic of Slovenia Licence fees: 6% Spectrum fees: 37% Numbering fees: 46% Fines/penalties: 1% No: M. Sc., Acting Director Other: 10% Postal fees South Africa ICASA Website: http://www.icasa.org.za 2000 ICASA Act 13 of 2000 Legislature Sector Ministry (annual report) Government appropriation: 100% Yes: 7 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 162 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Financed by Reports to Is it a collegial body? Spain Comisión del Mercado de las Telecomunicaciones (CMT) 1996 Real Decreto-Ley 6/1996, de 7 de junio, de liberalización de las Telecomunicaciones. Actualmente se regula en la Ley 32/2003, General de Telecomunicaciones 1 Legislature Other: To the Government, for submission to Parliament Website: http://www.cmt.es Yes: 9 Members Contributions from operator turnover: 0.15% Other: Various telecommunication fees, from the issue of registration certificates, technical opinions and inspection or monitoring activities. Sri Lanka Telecommunications Regulatory Commission of Sri Lanka 1991 Sri Lanka Tel. Act No. 25 of Sector Ministry 1992 & Tel. (Amendment Act) (annual report) No. 27 of 1996 Website: http://www.trc.gov.lk Licence fees: 30% Spectrum fees: 51% Regulatory fees: 19% Yes: 5 Members St. Lucia National Telecommunications Regulatory Commission 2000 Telecommunications Act 2000 Sector Ministry (annual report) Website: http://www.ntrc.org.lc Spectrum fees: 100% Yes: 5 Members St. Vincent and the Grenadines National Telecommunications Regulatory Commission (NTRC) 2001 Telecommunications Act No.1 Sector Ministry 2001 (annual report) Website: http://www.ntrc.vc Spectrum fees: 97.0% Yes: 5 Members Financial income: 1.0% Other: 2.0% Application fees and rental of conference room Sudan National Telecommunication Corporation (NTC) 1994 Telecommunication Act 2001 (including establishment of Regulatory Authority) Website: http://www.ntc.org.sd Sector Ministry (annual report) Licence fees: 33.3% Spectrum fees: 50% Yes: 10 Members Contributions from operator turnover: 16.7% 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 163 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Financed by Reports to Is it a collegial body? Suriname Telecommunications Authority Suriname (TAS) 1998 Decree 1998 Establishment of the Telecommunications Authority Suriname Website: http://www.tas.sr Sector Ministry (annual report) Other: Board of Directors Government appropriation: 100% No: Managing Director Sweden National Post and Telecom Agency 1992 Förordning med instruktion för telestyrelsen (Decree) Website: http://www.pts.se/ Sector Ministry (annual report) Licence fees: 41% Government appropriation: 41% No: Director General Other: 18% Switzerland Office Fédéral de la Communication (OFCOM) 1992 Loi du 30 avril 1997 sur les télécommunications (LTC) 1 Website: http://www.ofcom.ch Legislature Sector Ministry (annual report) Government appropriation: 100% No: Director Tanzania Tanzania Communications Regulatory Authority Website: http://www.tcc.go.tz Sector Ministry 1994 Tanzania Communications Act No. 18 of 1993, Tanzania (annual report) Communications Regulatory Authority Act No. 12 of 2003 (merger of TCC and TBC in 2003) Licence fees: 2.37% Spectrum fees: 36.54% Numbering fees: 4.25% Fines/penalties: 0.05% Yes: 7 Members Contributions from operator turnover: 52.39% Other: 2.08% Applications forms and Type approval fee 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 164 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Financed by Reports to Is it a collegial body? TFYR Macedonia Agency for electronic communications 2005 Law on electronic communications 1 Website: http://www.aec.mk Other: Annual report to the Parliament Licence fees: 8,5% Spectrum fees: 58,5% Numbering fees: 11,6% Regulatory fees: 21.4% Yes: 5 Members Thailand National Telecommunications Commission (NTC) 2004 The Act on Organizations to Assign Radio Frequency Sprectrum and to Regulate the Sound Broadcasting, Television Broadcasting and Telecommunication Services, B.E.2543 Website: http://www.ntc.or.th Other: Report to the Cabinet Yes: 7 Members Togo Autorité de Réglementation des Secteurs de Postes et Télécommunications (ART&P) Website: http://www.artp.tg 1998 Loi n° 98-005 du 11 février 1998 en son article 57 Sector Ministry (annual report) Yes: 5 Members Trinidad and Tobago Telecommunications Authority of Trinidad and Tobago 2004 Telecommunications Act 2001 (as amended by Telecommunications (Amendment) Act 2004 Sector Ministry (annual report) Website: http://www.tatt.org.tt Licence fees: 40% Government appropriation: 60% Yes: 11 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 165 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? Tunisia Instance Nationale des Télécommunications Website: http://www.intt.tn/ 2001 Loi n° 2001-1 du 15 janvier Legislature 2001, portant promulgation du Sector Ministry code des télécommunications (annual report) Numbering fees: 100% Yes: 7 Members Turkey Telecommunications Authority Website: http://www.tk.gov.tr 2000 Amending Law No. 4502 Other: Turkish National Assembly Spectrum fees: 88% Yes: 7 Members Contributions from operator turnover: 9% Other: 3% caution returns; form, book, publication, hologram sales returns, etc. Uganda Uganda Communications Commission Website: http://www.ucc.co.ug 1997 The Communications Act 1997 Legislature Sector Ministry (annual report) Licence fees: 4% Spectrum fees: 47% Yes: 7 Members Contributions from operator turnover: 33% Financial income: 1.1% Other: 14% Rent United Arab Emirates Telecommunications Regulatory Authority 2004 Federal Law by decree No. (3) of 2003 Website: http://www.tra.ae Other: UAE Telecom Supreme Committee Other: 100% UAE Federal Governmet Yes: 5 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 166 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? United Kingdom Office of Communications (OFCOM) 1984 Telecommunications Act 1984; 2003 Communications Act 1 Licence fees: 16% Government appropriation: 64% No: Chief Executive Contributions from operator turnover: 15% Other: 5% Government department (DCMS and DTI), commercial property sub-lets and broadcasting application fees and commercial interference income United States Federal Communications Commission 1934 The Communications Act of 1934 2 Website: http://www.ofcom.org.uk Legislature Sector Ministry (annual report) Other: Select Committees of Legislature (Public Accounts Committee, Trade & Industry Select Committee). The annual reports to the sector Ministry is also required to be provided to the Legislature by the Minister. Website: http://www.fcc.gov/ Legislature Other: It is independent with Congressional oversight and budget control Government appropriation: 3.6% Regulatory fees: 96.4% Yes: 5 Members Other: Auctions receipts are deposited with Treasury. Funds are allocated from receipts as needed to cover the cost of running the Auctions Program. Uruguay Unidad Reguladora de Servicios de Comunicaciones (URSEC) 2001 Ley N° 17.296 del 21 de febrero de 2001 Website: http://www.ursec.gub.uy Other: The reports Spectrum fees: 78% are sent to Regulatory fees: 21% whoever asks for Fines/penalties: 1% them. The Executive Authority must receive reports on matters falling within its competence. Yes: 3 Members 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 167 Trends in Telecommunication Reform 2006 1. Countries with a separate Regulatory Authority WORLD Country Name of Authority Year Legal document that created created the authority Reports to Financed by Is it a collegial body? Venezuela Comisión Nacional de Telecomunicaciones (CONATEL) 1991 Decreto n° 1826 del 5 de septiembre de 1991 Sector Ministry (annual report) Website: http://www.conatel.gov.ve Spectrum fees: 17.8% Yes: 8 Members Other: 82.2% Special contribution Zambia Communications Authority Website: http://www.caz.gov.zm 1994 Telecommunications Act of 1994 Cap 469 Legislature Sector Ministry (annual report) Licence fees: 6% Spectrum fees: 13.9% Yes: 8 Members Contributions from operator turnover: 77.4% Financial income: 1.9% Other: 0.8% Rentals Zimbabwe Postal and Telecommunications Regulatory Authority of Zimbabwe (POTRAZ) Website: http://www.potraz.gov.zw/ 2000 Postal and Telecommunications Act 2000, Chapter 12:05 Legislature Sector Ministry (annual report) Licence fees: 17% Spectrum fees: 5% Regulatory fees: 15% Yes: 7 Members Contributions from operator turnover: 47% Financial income: 13% Other: 3% Postal 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 168 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator WORLD Status Afghanistan Afghan Telecom State-owned - Corporatized The government intends to privatize the operator (Year: 2006) Albania Albtelecom sh.a State-owned - Corporatized In the process of privatizing Algeria Algérie Telecom State-owned - Corporatized The government intends to privatize the operator (Year: 2006) 2 Andorra Servei de Telecomunicacions d’Andorra (STA) State-owned - Corporatized 1 Angola Angola Telecom State-owned Mercury Partially privatized Mundo Startel Fully privatized Nexus Fully privatized Wezacom Fully privatized In the process of privatizing 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 169 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Antigua and Barbuda 2 Argentina Armenia Australia 1 Austria WORLD Status Antigua Public Utilities Authority Telephones State-owned Telecom Fully privatized Date of privatization (first phase): 1990 Telefónica Fully privatized Date of privatization (first phase): 1990 ArmenTel JV Partially privatized: 90% Date of privatization (first phase): 1998: 90% sold Telstra Partially privatized: 51.8% Date of privatization (first phase): 1997: 33.3% sold Telekom Austria Partially privatized Date of privatization (first phase): 1998: 25% sold 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 170 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Azerbaijan Bahamas Bahrain Bangladesh Barbados WORLD Status AzTelekom State-owned The government intends to privatize the operator (Year: 2008) Baktelekom State-owned The government intends to privatize the operator (Year: 2008) Bahamas Telecommunications Company Ltd State-owned - Corporatized In the process of privatizing Batelco Partially privatized: 64% Bangladesh Telegraph and Telephone Board (DTTB) State-owned The government intends to privatize the operator Cable & Wireless (Barbados) Ltd Partially privatized Date of privatization (first phase): 1991: 51% sold 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 171 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Belarus 2 2 2 2 WORLD Status Republican Unitary Enterprise State-owned - Corporatized No intention to privatize at present Belgacom Partially privatized: 49,9% Date of privatization (first phase): 1996: 49,9% sold Belize Telecommunications Ltd Partially privatized: 96.5% Date of privatization (first phase): 1996: 95% sold Benin Office des postes et télécommunications (OPT) State-owned The government intends to privatize the operator (Year: 2002/2003) Bhutan Bhutan Telecom State-owned - Corporatized No intention to privatize at present ENTEL S.A. Fully privatized Date of privatization (first phase): 1995: 100% sold Belgium Belize Bolivia 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 172 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator 2 Bosnia and Herzegovina Botswana 2 1 Brazil Brunei Darussalam Bulgaria WORLD Status BH Telecom State-owned - Corporatized The government intends to privatize the operator (Year: 2004) HT Mostar Partially privatized: 40% Telekom Srpske Partially privatized: 20% Botswana Telecommunications Corporation State-owned - Corporatized The government intends to privatize the operator Empresa Brasileira de Telecomunicações S.A. (Embratel) Fully privatized Date of privatization (first phase): 1998 Brasil Telecom Fully privatized Date of privatization (first phase): 1998 CTBC - Companhia Telefônica Brasil Central Fully privatized Date of privatization (first phase): 1998 Telemar Fully privatized Date of privatization (first phase): 1998 JTB State-owned Bulgarian Telecomunication Company BTC Partially privatized: 65% Date of privatization (first phase): 2004: 65% sold 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 173 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator WORLD Status 1 Burkina Faso ONATEL State-owned - Corporatized In the process of privatizing 2 Burundi Office National des Télécommunications State-owned - Corporatized In the process of privatizing 2 Cambodia Ministry of Posts and Telecommunications State-owned The government intends to privatize the operator 1 Cameroon CAMTEL State-owned - Corporatized In the process of privatizing Canada SaskTel State-owned No intention to privatize at present Bell Canada Fully privatized TELUS Fully privatized Date of privatization (first phase): 1990: 100% sold MTS Fully privatized Date of privatization (first phase): 1994: 100% sold Aliant Fully privatized 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 174 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Cape Verde 2 1 Central African Rep. Chad Chile China WORLD Status CVTelecom Partially privatized: 96.6% Date of privatization (first phase): 1995: 53.7% sold Socatel Partially privatized: 40% SOTEL TCHAD State-owned - Corporatized CTC Fully privatized VTR Fully privatized EntelPhone Fully privatized Telefónica del Sur Fully privatized China Telecom Partially privatized Date of privatization (first phase): 2002 China Unicom Partially privatized Date of privatization (first phase): 2000 China Netcom Partially privatized Date of privatization (first phase): 2004 China Mobile Partially privatized Date of privatization (first phase): 1997 In the process of privatizing 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 175 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Colombia WORLD Status Colombia Telecomunicaciones State-owned - Corporatized ETB Partially privatized: 60% EPM Partially privatized: 95% UNITEL Fully privatized ETELL Partially privatized: 93% No intention to privatize at present 2 Comoros SNPT State-owned - Corporatized No intention to privatize at present 2 Congo ONPT State-owned - Corporatized (Year: 1965) The government intends to privatize the operator 1 Congo (Dem. Rep. of) OCPT State-owned - Corporatized In the process of privatizing RENATELSAT State-owned - Corporatized In the process of privatizing Instituto Costarricense de Electricidad State-owned No intention to privatize at present Costa Rica 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 176 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator 1 1 Côte d'Ivoire Croatia Cuba Cyprus Czech Republic 2 D. P. R. Korea WORLD Status Côte d'Ivoire Télécom Partially privatized: 51% Date of privatization (first phase): 1997: 51% sold Croatian Telecom Inc. (HT) Partially privatized: 51% Date of privatization (first phase): 1999: 35% sold ETECSA Fully privatized Cyprus Telecommunications Authority (CYTA) State-owned - Corporatized No intention to privatize at present CESKÝ TELECOM, a.s. Fully privatized Date of privatization (first phase): 1995: 49% sold Ministry of Posts and Telecommunications State-owned 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 177 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Denmark 2 Djibouti 2 Dominica 1 Dominican Rep. Ecuador Egypt WORLD Status TDC Fully privatized Date of privatization (first phase): 1994: 49% sold OPT State-owned - Corporatized (Year: 1957) The government intends to privatize the operator Telecommunications of Dominica Partially privatized: 80% VERIZON Dominicana Fully privatized TRICOM, S.A. Fully privatized ALL America Cables & Radio, Inc. (AAC&R- Centennial Dominicana) Fully privatized Andinatel S.A. State-owned - Corporatized No intention to privatize at present Pacifictel S.A. State-owned - Corporatized No intention to privatize at present Telecom Egypt State-owned - Corporatized In the process of privatizing 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 178 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator El Salvador 2 Equatorial Guinea Eritrea Estonia 1 Ethiopia 2 Fiji WORLD Status CTE Partially privatized: 95.2% Date of privatization (first phase): 1998: 51% sold TELEFONICA Partially privatized: 51% Date of privatization (first phase): 1998: 51% sold TELEMOVIL Fully privatized GCA Fully privatized Sociedad Anónima de Telecomunicaciones de la República de Guinea Ecuatorial (Getesa) Partially privatized: 40% Date of privatization (first phase): 1987: 40% sold ERITEL State-owned - Corporatized The government intends to privatize the operator Elion Enterprises Partially privatized: 72,83% Date of privatization (first phase): 1999: 49% sold Ethiopian Telecommunication Corporation State-owned - Corporatized Telecom Fiji Limited Partially privatized 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 179 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator 1 Finland WORLD Status TeliaSonera AB Partially privatized: 19,07% ElisaCom Oy Fully privatized France Télécom Partially privatized: 67% Date of privatization (first phase): 1996: 45% sold Gabon GABON TELECOM State-owned In the process of privatizing Gambia GAMTEL State-owned - Corporatized Georgia GEC State-owned - Corporatized New Nets Fully privatized 01051 Telecom GmbH Fully privatized Arcor AG & Co. Partially privatized: ~82% Colt Telecom GmbH Fully privatized Deutsche Telekom AG Partially privatized: ~62.5% France Germany Date of privatization (first phase): 1998 The government intends to privatize the operator (Year: 2004) Date of privatization (first phase): 1996: ~26% sold 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 180 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator 1 Ghana Greece 2 2 2 1 Grenada Guatemala Guinea Guinea-Bissau WORLD Status Ghana Telecom Partially privatized: 30% Date of privatization (first phase): 1997: 30% sold WESTEL Fully privatized OTE (Hellenic Telecommunications Organisation S.A ) Partially privatized: 62% Tellas Partially privatized: 51% Forthnet Partially privatized: 78.94% Grenada Telecommunications (GRENTEL) Partially privatized: 70% Empresa Telecomunicaciones de Guatemala S.A. Fully privatized Date of privatization (first phase): 1997: 100% sold Sotelgui Partially privatized: 60% Date of privatization (first phase): 1995: 60% sold Guiné Telecom Partially privatized: 51% Date of privatization (first phase): 1989: 51% sold Date of privatization (first phase): 1997: 7.5% sold 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 181 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator 2 Guyana Haiti 2 Honduras Hungary 2 Iceland India WORLD Status Guyana Telephone and Telegraph Ltd (GT & T) Partially privatized: 80% Date of privatization (first phase): 1991 Téléco Partially privatized: 3% Haitel Fully privatized Empresa Hondureña de Telecomunicaciones (HONDUTEL) State-owned - Corporatized In the process of privatizing T-Com Fully privatized Date of privatization (first phase): 1993: 33.2% sold Invitel Fully privatized Hungarotel Fully privatized Emitel Fully privatized Iceland Telecom Ltd Partially privatized: 5.2% BSNL Partially privatized MTNL Partially privatized Reliance Fully privatized Bharti (Airtel) Fully privatized Date of privatization (first phase): 2001: 6% sold 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 182 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator 1 2 Indonesia 2 Status PT. Telkom Partially privatized: 48.8% PT. Indosat Partially privatized: 85% Iran (I.R.) TCI State-owned - Corporatized Iraq Iraqi Telecommunications and Posts State-owned Eircom Fully privatized BT Ireland Fully privatized Bezeq Partially privatized: 46% Date of privatization (first phase): 1990: 9% sold Telecom Italia Partially privatized: 96.5% Date of privatization (first phase): 1998: 55% sold Ireland 2 WORLD Israel Italy In the process of privatizing Date of privatization (first phase): 1999: 96% sold 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 183 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Jamaica Japan Jordan 2 Kazakhstan 1 Kenya 2 Kiribati WORLD Status Cable and Wireless Partially privatized: 82% NTT EAST Fully privatized Date of privatization (first phase): 1999: 100% sold NTT WEST Fully privatized Date of privatization (first phase): 1999: 100% sold Jordan Telecom (JT) Partially privatized: 40% Date of privatization (first phase): 2000: 40% sold Kazakhtelecom Partially privatized: 50% Date of privatization (first phase): 1994 Telkom Kenya Limited State-owned - Corporatized The government intends to privatize the operator (Year: 2006) Telecom Services Kiribati Limited Partially privatized: 49% 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 184 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Korea (Rep.) Kuwait Kyrgyzstan Lao P.D.R. Latvia WORLD Status Korea Telecom Fully privatized Ministry of Communications (MOC) State-owned Kyrgyztelecom Partially privatized: 11% Saima Telecom Fully privatized Winline Fully privatized Instrumentaalshik Fully privatized Enterprise of Telecom Lao State-owned Lao Telecom Co. Ltd Partially privatized: 49% Latvian Railway (LDz) State-owned No intention to privatize at present Latvenergo State-owned No intention to privatize at present Lattelekom Partially privatized: 49% Date of privatization (first phase): 1994: 49% sold No intention to privatize at present 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 185 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator 2 Lebanon 1 Lesotho WORLD Status Ministry of Telecommunications State-owned The government intends to privatize the operator Telecom Lesotho Partially privatized: 70% Date of privatization (first phase): 2000 State-owned - Corporatized 2 Liberia Liberia Telecommunications Corporation 2 Libya General Post and State-owned Telecommunication Company (GPTC) 2 Liechtenstein LTN Lie. TeleNet State-owned No intention to privatize at present Telecom FL State-owned No intention to privatize at present AB Lietuvos Telekomas Partially privatized: 60% Date of privatization (first phase): 1998: 60% sold Lithuania 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 186 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Luxembourg Enterprises of the P&T (EPT) WORLD Status State-owned - Corporatized No intention to privatize at present TELECOM MALAGASY Partially privatized: 34% Date of privatization (first phase): 1994: 34% sold Malawi Telecommunications Ltd State-owned - Corporatized In the process of privatizing Telekom Malaysia Partially privatized Date of privatization (first phase): 1990 Dhiraagu Partially privatized: 45% Date of privatization (first phase): 1988 SOTELMA State-owned - Corporatized The government intends to privatize the operator (Year: 2006) IKATEL Fully privatized See www.ilr.lu Madagascar 2 Malawi Malaysia 2 Maldives Mali 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 187 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Malta 2 1 Marshall Islands Mauritania Mauritius Mexico 2 Micronesia WORLD Status Maltacom plc Partially privatized: 40% Date of privatization (first phase): 1998: 40% sold National Telecommunications Authority Partially privatized Mauritel S.A Partially privatized: 54% Date of privatization (first phase): 1999: 54% sold Mauritius Telecom Ltd Partially privatized: 40% Date of privatization (first phase): 2001: 40% sold Teléfonos de México Fully privatized Date of privatization (first phase): 1991: 100% sold FSM Telecommunications Corporation State-owned - Corporatized (Year: 1981) 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 188 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Moldova 2 Monaco Mongolia Morocco Mozambique Myanmar WORLD Status Moldtelecom S.A. State-owned - Corporatized No intention to privatize at present MONACO TELECOM Fully privatized Date of privatization (first phase): 1999: 51% sold Mongolian Telecommunications Company Partially privatized: 40% Date of privatization (first phase): 1995: 40% sold Ittisalat Al-Maghrib Partially privatized: 51% Date of privatization (first phase): 2000: 35% sold TDM Partially privatized: 20% Date of privatization (first phase): 2003: 20% sold Myanma Posts and Telecommunications State-owned Bagan Cybertech State-owned - Corporatized 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 189 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator 2 WORLD Status Namibia Telecom Namibia State-owned Nauru Directorate of Telecommunications State-owned Nepal Nepal Telecom State-owned The government intends to privatize the operator (Year: After 2006) KPN Partially privatized Date of privatization (first phase): 1994: 20% sold Telecom Corporation of New Zealand Fully privatized Date of privatization (first phase): 1990: 100% sold ENITEL Fully privatized Date of privatization (first phase): 2001: 40% sold Netherlands New Zealand Nicaragua No intention to privatize at present 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 190 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator 2 2 Niger Nigeria Norway Oman Pakistan 1 Panama WORLD Status SONITEL Partially privatized: 51% Date of privatization (first phase): 2001: 51% sold NITEL State-owned - Corporatized In the process of privatizing Telenor Partially privatized: 46% Omantel State-owned - Corporatized In the process of privatizing Pakistan Telecom Company Limited (PTCL) Partially privatized: 38% Date of privatization (first phase): 1996: 12% sold Cable & Wireless Panama Partially privatized: 49% Date of privatization (first phase): 1996: 49% sold 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 191 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Status 2 Papua New Guinea Telikom PNG Limited State-owned 1 Paraguay COPACO State-owned - Corporatized Telefónica del Perú S.A. Fully privatized Telmex Fully privatized BellSouth Perú S.A. Fully privatized Americatel Perú S.A. Fully privatized All fixed-line operators Fully privatized Telekomunikacja Poska Partially privatized: 96.13% PT Comunicações, S.A. Partially privatized: 95.3% Peru 2 Philippines Poland 1 Portugal WORLD The government intends to privatize the operator (Year: 2003) Date of privatization (first phase): May-1994: 35% sold Date of privatization (first phase): 1995: 27.26% sold 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 192 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Qatar 1 2 Status Q-Tel Partially privatized Date of privatization (first phase): 1998: 25% sold S.C. Romtelecom S.A. Partially privatized: 54% Date of privatization (first phase): 1998: 35% sold Svyazinvest is the government controlled telecommunications holding company (an umbrella organization). Partially privatized: 25% Date of privatization (first phase): 1997: 25% sold Rwandatel Partially privatized: 1% Principe Companhia Santomense de Telecomunicações, SARL Partially privatized: 51% Samoa SamoaTel State-owned - Corporatized Romania 2 WORLD Russia Rwanda S. Tomé and The government intends to privatize the operator (Year: 2006) 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 193 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator 2 San Marino Saudi Arabia 1 2 Senegal Serbia and Montenegro Seychelles 2 Sierra Leone WORLD Status Telecom Italia Partially privatized Saudi Telecom Partially privatized Date of privatization (first phase): 2003: 30% sold SONATEL Partially privatized: 72,33% Date of privatization (first phase): 1996: 63,33% sold Telecom Serbia Partially privatized: 49% Date of privatization (first phase): 1997 Cable and Wireless (Seychelles) Ltd Fully privatized Telecom (Seychelles) Ltd Fully privatized Sierratel State-owned - Corporatized The government intends to privatize the operator (Year: 2004) 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 194 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Singapore Slovak Republic Slovenia 2 2 1 Solomon Islands Somalia South Africa WORLD Status Singapore Telecommunications Ltd Partially privatized: 32.44% Date of privatization (first phase): 1993: 22.2% sold Slovak Telecom a.s. Partially privatized: 51% Date of privatization (first phase): 2000: 51% sold Telekom Slovenije Partially privatized: 37.47% Date of privatization (first phase): 1996 Solomon Telekom Company Ltd. Partially privatized: 42% Somtel Fully privatized Telkom Partially privatized: 61.7% Date of privatization (first phase): 1997: 30% sold 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 195 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Spain 1 Sri Lanka WORLD Status Telefónica Fully privatized Date of privatization (first phase): 1997 Auna Fully privatized Date of privatization (first phase): 1997 Grupo Ono Fully privatized Euskaltel Partially privatized Sri Lanka Telecom Ltd Partially privatized: 50.5% Suntel Ltd Fully privatized Lanka Bell (Pvt) Ltd Fully privatized Cable & Wireless (West Indies) Limited Fully privatized Cable and Wireless (WI) Limited Fully privatized SUDATEL Partially privatized Date of privatization (first phase): 1993: 40% sold KANARTEL Fully privatized Date of privatization (first phase): 2005: 100% sold Date of privatization (first phase): 1997: 35% sold St. Lucia St. Vincent and the Grenadines Sudan 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 196 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator 2 Status Suriname Telesur State-owned - Corporatized Swaziland Swaziland Posts & Telecommunications Corporation State-owned - Corporatized TeliaSonera AB Partially privatized: 45.3% Date of privatization (first phase): 2000: 29.4% sold Swisscom AG Partially privatized: 34% Date of privatization (first phase): 1998: 30% sold S.T.E. State-owned No intention to privatize at present Tajiktelecom Partially privatized: 5% Sweden Switzerland Syria 2 WORLD Tajikistan No intention to privatize at present 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 197 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator 1 Tanzania TFYR Macedonia 1 Thailand WORLD Status Tanzania Telecommunications Company Ltd (TTCL) Partially privatized: 35% Date of privatization (first phase): 2001: 35% sold A.D. Makedonski telekomunikacii Partially privatized: 53% Date of privatization (first phase): 2000: 53% sold TOT Corporation Plc., Ltd State-owned - Corporatized TRUE Corporation Plc., Ltd TT&T Plc. Ltd 2 Togo Togo Télécom State-owned - Corporatized In the process of privatizing Tonga Tonga Telecommunications Corporation Limited (TCC) State-owned - Corporatized In the process of privatizing Cable & Wireless Partially privatized: 49% Date of privatization (first phase): 1991: 49% sold Trinidad and Tobago 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 198 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator WORLD Status Tunisia Tunisie Télécom State-owned - Corporatized The government intends to privatize the operator Turkey Turk Telekom State-owned - Corporatized In the process of privatizing 2 Turkmenistan Turkmentelecom State-owned - Corporatized (Year: 1992) 2 Tuvalu Tuvalu Telecom Corporation State-owned - Corporatized (Year: 1994) No intention to privatize at present Uganda Telecom Partially privatized: 51% Date of privatization (first phase): 2000: 51% sold MTN Fully privatized Date of privatization (first phase): 1998: 100% sold Ukrainian Telecom Corporation State-owned - Corporatized Uganda 2 Ukraine 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 199 Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator United Arab Emirates United Kingdom 1 United States WORLD Status Etisalat Partially privatized: 40% British Telecommunications Plc Fully privatized Kingston Plc Fully privatized All fixed-line operators Fully privatized 2 Uruguay ANTEL State-owned 2 Uzbekistan Halkapo and Machalit State-owned - Corporatized 2 Vanuatu Telecom Vanuatu Ltd Partially privatized: 67% Date of privatization (first phase): 1984: 25% sold No intention to privatize at present 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. 200 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 2. Status of the main fixed-line operators Name of the operator Venezuela Status CANTV Partially privatized: 93.41% MOVISTAR Fully privatized DIGITEL Fully privatized INFONET Fully privatized VNPT State-owned VIETTEL, ETC, VISHIPEL State-owned SPT Partially privatized HANOI TELECOM Partially privatized Yemen Public Telecom Corporation State-owned - Corporatized No intention to privatize at present Zambia Zamtel State-owned No intention to privatize at present Zimbabwe Tel One State-owned - Corporatized TELEACCESS Fully privatized Viet Nam 1 WORLD Date of privatization (first phase): 1991: 40% sold In the process of privatizing 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. R EGULATORY T ABLES 201 Trends in Telecommunication Reform 2006 3. Level of competition Local Long Int'l WLL services distance WORLD Data DSL Cable VSAT Leased FWB Mo- Pagmodem lines bile ing Cable TV FSS MSS GMPCS IMT- IS IG 2000 Afghanistan C P P P ... ... ... P P ... P ... P P ... P ... P P Albania C P P P C C ... C C P P C C C ... C ... C P Algeria P P P P C C ... P C P P ... ... ... ... P ... C P 2 Andorra M M M ... M ... ... ... M ... M M D ... M ... ... ... ... 1 Angola C C C C C ... C ... C C P C P ... C C ... C C Antigua and Barbuda M ... M C C M C C M C C C C ... ... ... ... C M Argentina C C C C C C ... C C ... C C C C C C ... C ... Armenia M M M ... C C ... ... M C P M C C C C ... C ... Australia C C C C C C C C C C C C C C C C C C C Austria C C C C C C C C C C C C C C C C C C C Azerbaijan P M P P C C C C P C P P C C ... P ... C M Bahamas P P P ... P C M C P ... M C M ... ... ... ... C M Bahrain C ... C ... C C ... C C ... P C ... ... ... ... P C C Bangladesh C C M P C C ... C ... ... C M ... M ... ... ... C M Barbados M ... P P ... ... ... C M ... C C C ... ... ... ... C P Belarus C M M ... C C C ... M ... P C C M M M ... C M 2 1 Key: WLL = Wireless local loop; DSL = Digital subscriber line; VSAT = Very small aperture terminal; FWB = Fixed wireless broadband; FSS = Fixed-satellite service; MSS = Mobile-satellite service; GMPCS = Global Mobile Personal Communications System; IS = Internet services; IG = International gateways; M = Monopoly; D = Duopoly; P = Partial competition; C = Full competition; ... = Not available 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. Note: This table reflects what is legally permissible; therefore it may not reflect the actual number of operators in the market. R EGULATORY T ABLES 203 Trends in Telecommunication Reform 2006 3. Level of competition Local Long Int'l WLL services distance WORLD Data DSL Cable VSAT Leased FWB Mo- Pagmodem lines bile ing Cable TV FSS MSS GMPCS IMT- IS IG 2000 2 Belgium C C C P C C C C C ... P P ... C C C P C ... 2 Belize M M M M M ... ... ... M ... ... M C ... ... P ... M ... 2 Benin M M M ... ... M ... ... M ... C C ... ... ... ... ... ... ... Bhutan M M M M P ... ... P M M M M C ... M M ... P M 2 Bolivia M M M ... C ... ... ... M ... C ... C M M ... ... C ... 2 Bosnia and Herzegovina M M M ... ... ... ... ... ... ... P ... C ... ... ... ... C ... Botswana M C M M C C ... C C C C C ... ... ... ... ... C M 2 Brazil C C C C C C C C C ... C C C C C C C C ... 1 Brunei Darussalam P P P ... P ... ... ... P ... M M ... ... ... ... ... P P Bulgaria P P P C C C ... C C P P C C C ... ... P C ... 1 Burkina Faso M M M C C C C P P C C C C P P P P C M 2 Burundi C C C C C C ... C C ... C C C ... C C C C ... 2 Cambodia P P P P P ... ... P P ... P P P ... ... ... ... P ... 1 Cameroon M M M C C ... ... P ... ... C C C ... ... C ... C ... Canada C C C C C C C C C C C C ... C C C C C C Cape Verde M M M M C C C P ... C C C C C P C C C M Key: WLL = Wireless local loop; DSL = Digital subscriber line; VSAT = Very small aperture terminal; FWB = Fixed wireless broadband; FSS = Fixed-satellite service; MSS = Mobile-satellite service; GMPCS = Global Mobile Personal Communications System; IS = Internet services; IG = International gateways; M = Monopoly; D = Duopoly; P = Partial competition; C = Full competition; ... = Not available 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. Note: This table reflects what is legally permissible; therefore it may not reflect the actual number of operators in the market. 204 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 3. Level of competition Local Long Int'l WLL services distance WORLD Data DSL Cable VSAT Leased FWB Mo- Pagmodem lines bile ing Cable TV FSS MSS GMPCS IMT- IS IG 2000 2 Central African Rep. M M M ... C ... ... ... C ... C ... C ... ... C ... ... ... 1 Chad M C M ... C ... ... C ... ... ... ... ... C C ... ... C ... Chile P C C M C P M C P M C ... M C M M ... C C China P P P P P P ... C P ... P C ... M M ... ... C ... Colombia P C C ... C ... ... ... ... ... P C C ... ... ... ... C ... 2 Comoros M M M M M ... ... ... M ... ... ... ... M ... ... ... M ... 2 Congo C C C ... ... ... ... ... ... ... C C ... ... C ... ... ... ... 1 Congo (Dem. Rep. of) C C P P C C P C P ... C P C C C C C C ... Costa Rica M M M M M M P M M M M C P M M M M M ... 1 Côte d'Ivoire P P P C C M ... C P P P C ... C ... C ... C ... 1 Croatia C C C C C C C C C C C C C C C C C C C Cuba M M M M M M M M M ... M M P M M M ... P ... Cyprus C C C ... C M ... ... C ... P M P C C ... ... C ... Czech Republic C C C C C C C C C C C C C C C C C C C D.P.R. Korea M M M ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... 2 Key: WLL = Wireless local loop; DSL = Digital subscriber line; VSAT = Very small aperture terminal; FWB = Fixed wireless broadband; FSS = Fixed-satellite service; MSS = Mobile-satellite service; GMPCS = Global Mobile Personal Communications System; IS = Internet services; IG = International gateways; M = Monopoly; D = Duopoly; P = Partial competition; C = Full competition; ... = Not available 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. Note: This table reflects what is legally permissible; therefore it may not reflect the actual number of operators in the market. R EGULATORY T ABLES 205 Trends in Telecommunication Reform 2006 3. Level of competition Local Long Int'l WLL services distance WORLD Data DSL Cable VSAT Leased FWB Mo- Pagmodem lines bile ing Cable TV FSS MSS GMPCS IMT- IS IG 2000 Denmark C C C C C C C C C P P ... C C C C P C C 2 Djibouti M M M ... M ... ... ... M ... ... M ... M M ... ... M ... 2 Dominica M M M ... M ... ... ... M ... M M C M M ... ... ... ... 1 Dominican Rep. C C C C C C C C C C C C C C C C C C C Ecuador P P P P C C C C C C P C C C C ... P C ... Egypt M M M M C C ... C M ... P ... ... ... ... C ... C M El Salvador C C C C C C C C C ... C C C C C C ... C ... Equatorial Guinea M M M ... M ... ... ... ... ... ... ... C M M ... ... M ... Eritrea M M M M P ... ... P M M P ... M M P ... ... P M Estonia C C C C C C C C C C C C C C C C C C C 1 Ethiopia M M M M M ... ... M M M M ... ... M M M ... M M 2 Fiji M M M ... M ... ... ... M ... M C M M C ... ... ... ... 1 Finland C C C C C C C C C ... P ... C C C C P C C France C C C C C C C C C C C C C C C C C C C Gabon M C C C C C M C C ... C ... ... M C C M C ... Gambia M M M M C M ... M M ... P ... ... ... ... ... ... C M 2 Key: WLL = Wireless local loop; DSL = Digital subscriber line; VSAT = Very small aperture terminal; FWB = Fixed wireless broadband; FSS = Fixed-satellite service; MSS = Mobile-satellite service; GMPCS = Global Mobile Personal Communications System; IS = Internet services; IG = International gateways; M = Monopoly; D = Duopoly; P = Partial competition; C = Full competition; ... = Not available 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. Note: This table reflects what is legally permissible; therefore it may not reflect the actual number of operators in the market. 206 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 3. Level of competition Local Long Int'l WLL services distance WORLD Data DSL Cable VSAT Leased FWB Mo- Pagmodem lines bile ing Cable TV FSS MSS GMPCS IMT- IS IG 2000 Georgia P P C P C P C C M ... C ... C P P C ... C ... Germany C C C C C C C C C C C C C C C C C C C Ghana P P P P C P C P P ... P C C C C C P C ... Greece C C C C C C C C C ... P P C C P P P C C 2 Grenada M M M ... M ... ... ... M ... M M ... M M ... ... ... ... 2 Guatemala C M C C C ... ... C C ... C C C C C ... ... C ... 2 Guinea P P P ... ... ... ... ... ... ... P C C C C C ... C ... 1 Guinea-Bissau M M M C C C C C M C P C C C C C P C P 2 Guyana M M M ... D ... ... ... M ... C C ... ... ... ... ... ... ... Haiti P P P ... C ... ... C ... ... P ... C ... ... ... ... C ... Honduras M M M ... C ... ... C P ... M C C C C C ... ... ... Hungary C C C P C ... C C C C P ... C C C C P ... C Iceland C C C C C C ... C C ... C M ... ... ... ... ... C ... India C C C C C ... C C ... ... C C C ... ... ... ... C C Indonesia P P P P C C C C C C C C C C C C C C C Iran (I.R.) P M M C P C ... M M P P C ... M M M ... P M Iraq M M M ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... 1 2 2 1 2 Key: WLL = Wireless local loop; DSL = Digital subscriber line; VSAT = Very small aperture terminal; FWB = Fixed wireless broadband; FSS = Fixed-satellite service; MSS = Mobile-satellite service; GMPCS = Global Mobile Personal Communications System; IS = Internet services; IG = International gateways; M = Monopoly; D = Duopoly; P = Partial competition; C = Full competition; ... = Not available 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. Note: This table reflects what is legally permissible; therefore it may not reflect the actual number of operators in the market. R EGULATORY T ABLES 207 Trends in Telecommunication Reform 2006 3. Level of competition Local Long Int'l WLL services distance WORLD Data DSL Cable VSAT Leased FWB Mo- Pagmodem lines bile ing Cable TV FSS MSS GMPCS IMT- IS IG 2000 Ireland C C C C C C C C C C C C C C C C C C C 2 Israel M M C C ... ... ... C M ... C C M C C ... ... ... ... 2 Italy C C C C C C ... C C ... C C C C C C C C ... Jamaica C C C C C C C C C C C ... P ... ... ... ... C C Japan C C C C ... C C C C C C C C C C C C C C Jordan P P P C C C C C C C P C C C ... C ... C C 2 Kazakhstan C C C ... C ... ... ... C ... D C C C ... ... ... ... ... 1 Kenya P P P C C C ... P ... C P C ... ... ... P ... C P 2 Kiribati M M M ... M ... ... ... M ... ... ... ... ... ... ... ... ... ... Korea (Rep.) C C C C C C C ... C ... C C ... ... ... P C C ... Kuwait M ... M ... P ... ... P M M ... P P M ... M ... P M Kyrgyzstan C C C C C C C C C C C C C C C C ... C C Lao P.D.R. P P P P P P ... ... ... P P ... ... ... ... ... P P M Latvia C C C ... C C C C C ... C C C ... ... ... ... C ... 2 Lebanon M M M ... C ... ... ... ... ... ... ... ... M ... ... ... ... ... 1 Lesotho P P P P P ... ... P M ... C ... ... ... ... ... ... C M 2 Liberia P P C M P ... ... P ... ... C ... ... ... ... ... ... ... ... Key: WLL = Wireless local loop; DSL = Digital subscriber line; VSAT = Very small aperture terminal; FWB = Fixed wireless broadband; FSS = Fixed-satellite service; MSS = Mobile-satellite service; GMPCS = Global Mobile Personal Communications System; IS = Internet services; IG = International gateways; M = Monopoly; D = Duopoly; P = Partial competition; C = Full competition; ... = Not available 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. Note: This table reflects what is legally permissible; therefore it may not reflect the actual number of operators in the market. 208 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 3. Level of competition Local Long Int'l WLL services distance WORLD Data DSL Cable VSAT Leased FWB Mo- Pagmodem lines bile ing Cable TV FSS MSS GMPCS IMT- IS IG 2000 2 Libya M M M ... ... ... ... ... M ... M ... ... M M ... ... ... ... 2 Liechtenstein C ... C ... C C P ... C ... P M C ... ... ... P C ... Lithuania C C C C C C C C C C C ... C C C C ... C C Luxembourg C C C C C C C C C C C C C C C C C C C Madagascar M M C C C C C C C C C C C C C C C C C Malawi M M P ... ... ... ... P ... ... P ... ... ... ... ... ... P ... Malaysia C C C C C C C C C C C C C C C C C C C Maldives ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... Mali P P P C P ... P P P C P ... ... P P ... ... C ... Malta C ... C C C C C C C C C C C C C C C C C 2 Marshall Islands M M M ... M ... ... ... M ... ... ... C M M ... ... ... ... 1 Mauritania M C C C C C C C C C C C C C C C C C C Mauritius C ... C C C C ... C C C C C ... C C C C C C Mexico C C C C C P C C C C C C C C C C ... C ... Micronesia M M M ... M ... ... ... M ... C C C C C ... ... ... ... Moldova C C C C C C C C C C C C C C C C ... C C 2 1 2 Key: WLL = Wireless local loop; DSL = Digital subscriber line; VSAT = Very small aperture terminal; FWB = Fixed wireless broadband; FSS = Fixed-satellite service; MSS = Mobile-satellite service; GMPCS = Global Mobile Personal Communications System; IS = Internet services; IG = International gateways; M = Monopoly; D = Duopoly; P = Partial competition; C = Full competition; ... = Not available 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. Note: This table reflects what is legally permissible; therefore it may not reflect the actual number of operators in the market. R EGULATORY T ABLES 209 Trends in Telecommunication Reform 2006 3. Level of competition Local Long Int'l WLL services distance 2 WORLD Data DSL Cable VSAT Leased FWB Mo- Pagmodem lines bile ing Cable TV FSS MSS GMPCS IMT- IS IG 2000 Monaco M M M M M M ... M M ... M C M M M ... ... C ... Mongolia P P C C C M ... C C ... P ... C C C ... ... C C Morocco M M M M C M ... C C ... C C ... C C C ... C P Mozambique M M M ... C M ... C C M C C C ... ... C ... C C Myanmar M M M P P P ... P P P M ... ... M ... ... ... P M Namibia M M M M M M M C ... M M C C M C C ... C M Nauru M M M ... M ... ... ... M ... ... ... ... M M ... ... ... ... Nepal P P P P C C C C C C P C C ... ... C ... C P Netherlands C C C P P C P P C ... P ... P ... ... ... ... P ... New Zealand C C C C C C C C C C C C C C C C C C C Nicaragua C C C ... C C C C C C C C C ... ... C ... C ... 2 Niger M M M ... M ... ... P M ... C ... P ... ... C ... M ... 2 Nigeria C P P C ... ... ... C P ... P C ... ... C C ... C ... Norway C C C C C C C C C P P ... C C C ... P C ... Oman M M M M M M ... M M M P M ... M M M ... M M Pakistan C C C C C C ... C C C P C ... C C C ... C C Panama C C C M C P C P M P P P P P ... ... ... C ... 2 1 Key: WLL = Wireless local loop; DSL = Digital subscriber line; VSAT = Very small aperture terminal; FWB = Fixed wireless broadband; FSS = Fixed-satellite service; MSS = Mobile-satellite service; GMPCS = Global Mobile Personal Communications System; IS = Internet services; IG = International gateways; M = Monopoly; D = Duopoly; P = Partial competition; C = Full competition; ... = Not available 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. Note: This table reflects what is legally permissible; therefore it may not reflect the actual number of operators in the market. 210 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 3. Level of competition Local Long Int'l WLL services distance WORLD Data DSL Cable VSAT Leased FWB Mo- Pagmodem lines bile ing Cable TV FSS MSS GMPCS IMT- IS IG 2000 2 Papua New Guinea M M M M M ... ... M M ... M M M C M M M P ... 1 Paraguay M M M C C ... C C ... ... C C C C C C C C ... Peru C C C ... C ... ... ... ... ... C C C ... C ... ... ... ... Philippines C C C C C C ... C C ... C C C C C C C C ... Poland C C C C C C C C C C C C C C C C C C C Portugal C C C C C C C C C C C ... C C C C C C C Qatar M M M M M M M M M M M M M M M M M M M Romania C C C C C C C C C C C C C C C C C C C 2 Russia D D D ... C ... ... ... M ... C C C D D ... ... ... ... 1 Rwanda C C ... ... C ... ... C C ... C ... ... ... ... C ... C ... 2 S. Tomé and Principe M ... M M M ... ... M M ... ... ... ... M ... ... ... ... ... Samoa M M M P P P C M M M M C C M M M M C M San Marino M M M ... D ... ... ... D ... C D ... D ... ... ... ... ... Saudi Arabia M P P P P P ... P P M P M ... M P C P C P Senegal C C C C C C C C C C C ... ... ... ... ... ... C C 2 1 2 1 Key: WLL = Wireless local loop; DSL = Digital subscriber line; VSAT = Very small aperture terminal; FWB = Fixed wireless broadband; FSS = Fixed-satellite service; MSS = Mobile-satellite service; GMPCS = Global Mobile Personal Communications System; IS = Internet services; IG = International gateways; M = Monopoly; D = Duopoly; P = Partial competition; C = Full competition; ... = Not available 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. Note: This table reflects what is legally permissible; therefore it may not reflect the actual number of operators in the market. R EGULATORY T ABLES 211 Trends in Telecommunication Reform 2006 3. Level of competition Local Long Int'l WLL services distance 2 WORLD Data DSL Cable VSAT Leased FWB Mo- Pagmodem lines bile ing Cable TV FSS MSS GMPCS IMT- IS IG 2000 Serbia and Montenegro C C ... ... C ... ... ... C ... C C C M ... ... ... ... ... Seychelles P P P ... P ... ... ... P P P ... M ... ... ... ... P ... Sierra Leone M M P ... P ... ... P P ... C P ... M ... ... ... P ... Singapore C ... C C C C C C C C C C M C C C C C C Slovak Republic C C C C C C C C C C C C C C C C C C C Slovenia C C C C C C C C C C C C C C C C C C C 2 Solomon Islands M M M ... M ... ... ... ... ... ... ... ... ... ... ... ... ... ... 2 Somalia C C C ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... 1 South Africa C C C M C M M P M P P C ... P P ... ... C P Spain C C C C C C C C C C C C C C C C C C C Sri Lanka P C P P C M ... C P ... C C ... ... ... ... ... C ... St. Lucia ... ... ... C ... ... C C ... C C ... C C C C C ... C St. Vincent and the Grenadines C C C C C C C C C C C C C C C C C C C Sudan P P P P P P ... P P P P P P P P M P P M Suriname M M M M M M M M M M M M P M M M M P M 2 1 Key: WLL = Wireless local loop; DSL = Digital subscriber line; VSAT = Very small aperture terminal; FWB = Fixed wireless broadband; FSS = Fixed-satellite service; MSS = Mobile-satellite service; GMPCS = Global Mobile Personal Communications System; IS = Internet services; IG = International gateways; M = Monopoly; D = Duopoly; P = Partial competition; C = Full competition; ... = Not available 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. Note: This table reflects what is legally permissible; therefore it may not reflect the actual number of operators in the market. 212 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 3. Level of competition Local Long Int'l WLL services distance 2 WORLD Data DSL Cable VSAT Leased FWB Mo- Pagmodem lines bile ing Cable TV FSS MSS GMPCS IMT- IS IG 2000 Swaziland M M M M M ... ... C M ... M ... ... M C C ... ... ... Sweden C C C C C C C C C C C C C C C C C C C Switzerland C C C P C C C ... P P P P C C C ... P C C Syria M M M M M M M M M ... P M M M M M P P ... 2 Tajikistan M M M ... D ... ... ... M ... ... D D D D ... ... ... ... 1 Tanzania M M M M C C ... C M ... C C ... ... ... ... ... C M TFYR Macedonia M M M M C C M ... M ... C C C ... ... ... ... C ... Thailand P ... M ... ... P ... C C ... P C ... M M P ... C M Togo P M P C C ... ... C M C P C ... P P ... ... C P Tonga P P P ... M M ... ... M ... ... M ... ... ... ... ... P ... Trinidad and Tobago M ... P M C P M C P P M C M P ... ... ... C M Tunisia M M M M C P C C M ... C C ... ... C C C C ... Turkey P C C C C C C C C P P P C C C C P C C 2 Turkmenistan C M M ... M ... ... ... D ... C D ... D D ... ... ... ... 2 Tuvalu M M M ... M ... ... M ... ... ... ... ... ... M ... ... M ... Uganda P P P P C P C P P P P C C P P ... ... ... P 1 2 Key: WLL = Wireless local loop; DSL = Digital subscriber line; VSAT = Very small aperture terminal; FWB = Fixed wireless broadband; FSS = Fixed-satellite service; MSS = Mobile-satellite service; GMPCS = Global Mobile Personal Communications System; IS = Internet services; IG = International gateways; M = Monopoly; D = Duopoly; P = Partial competition; C = Full competition; ... = Not available 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. Note: This table reflects what is legally permissible; therefore it may not reflect the actual number of operators in the market. R EGULATORY T ABLES 213 Trends in Telecommunication Reform 2006 3. Level of competition Local Long Int'l WLL services distance 2 WORLD Data DSL Cable VSAT Leased FWB Mo- Pagmodem lines bile ing Cable TV FSS MSS GMPCS IMT- IS IG 2000 Ukraine D M C ... C ... ... ... M ... C C C C C ... ... ... ... United Arab Emirates P P P P P P P P P P P M M ... M M P P P United Kingdom C C C P C C C C P ... C P C C C C C C ... 1 United States C C C C C C C C C ... C C C C C C C C ... 2 Uruguay M M P M C M ... C M ... C C P C C C C C ... 2 Uzbekistan D D D ... D ... ... ... D ... C C C D D ... ... ... ... 2 Vanuatu M M M ... M ... ... ... ... ... ... ... ... ... ... ... ... ... ... 2 Vatican ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... ... Venezuela C C C C C C ... C ... ... C C C ... ... ... ... C C Viet Nam C C C C C C C C C ... C C C ... ... ... ... C C Yemen M M M ... M M ... M M ... C M ... M ... C ... C M Zambia M M M M P P ... P M C P P ... P P P ... P C Zimbabwe C P P ... C C ... C C ... C ... ... ... ... ... ... C M 1 Key: WLL = Wireless local loop; DSL = Digital subscriber line; VSAT = Very small aperture terminal; FWB = Fixed wireless broadband; FSS = Fixed-satellite service; MSS = Mobile-satellite service; GMPCS = Global Mobile Personal Communications System; IS = Internet services; IG = International gateways; M = Monopoly; D = Duopoly; P = Partial competition; C = Full competition; ... = Not available 1 2 2004 data pre-2004 data Source: ITU World Telecommunication Regulatory Database. Note: This table reflects what is legally permissible; therefore it may not reflect the actual number of operators in the market. 214 R EGULATORY T ABLES Trends in Telecommunication Reform 2006 GLOSSARY OF TERMS * The following definitions are included to assist the readers of this report. They are adapted from non-definitive reference sources and are not intended to replace or contradict the terms and meanings used by each ITU Member State in its national laws and regulations or in international agreements. 3G: Third-generation mobile network or service. Generic name for mobile network/service based on the IMT-2000 family of global standards. 802.20: Refers to IEEE 802.20, a new standard that is being developed for mobile broad band wireless access. AAS: Adaptive Array System. A system that is designed to enhance the detection and reception of certain desired radio signals. Access BPL: A system that uses electrical distribution lines, overhead or underground, to provide broadband Internet access to homes and businesses. Active optical network: A network in which the passive splitting point is replaced with Optical Line Distribution unit which is a powered unit making it possible to have higher bit rate on individual routes over longer distances than passive optical network. ADSL: Asymmetric digital subscriber line. A technology that enables high-speed data services to be delivered over twisted pair copper cable, typically with a download speed in excess of 256 kbit/s, but with a lower upload speed. Corresponds to ITU Recommendation (standard) ITU-T G.992.1. ADSL2: Asymmetric Digital Subscriber Line 2 (ITU-T G.992.3 and ITU-T G.992.4). A sequel to the original ITU Recommendation. It allows increased line speeds, new powersaving elements, and extends the reach of the original ADSL specification. ADSL2+: G LOSSARY Asymmetric digital subscriber line 2 plus (ITU-T G.992.5). This revised version of ADSL2 enables increased speeds by increasing the frequencies used on the copper line. OF T ERMS Analogue: Transmission of voice and images using electrical signals. Analogue mobile cellular systems include AMPS, NMT and TACS. Analogue network: A telecommunication network in which information is conveyed as a continuously varying electronic signal (see also Digital network). ASP: Application service provider. Provider of a service that allows users to run applications remotely from a server rather than having the actual programs installed on their computers. This allows for higher power applications to run on small or basic terminals. ATM: Asynchronous transfer mode. A transmission mode in which the information is organized into cells; it is asynchronous in the sense that the recurrence of cells from an individual user is not necessarily periodic. Bandwidth: The range of frequencies available to be occupied by signals. In analogue systems it is measured in terms of Hertz (Hz) and in digital systems in bits per second (bit/s). The higher the bandwidth, the greater the amount of information that can be transmitted in a given time. High bandwidth channels are referred to as “broadband” which typically means 1.5-2.0 Mbit/s or higher. Baseband: Refers to transmitting on only a single channel at any one time. Base station: A radio transmitter/receiver and antenna used in the mobile cellular network. It maintains communications with cellular telephones within a given cell and transfers mobile traffic to other base stations and the fixed telephone network. 215 Trends in Telecommunication Reform 2006 Bent pipe star A satellite system topology characterized by topology: a large gateway earth station that transmits one or more high-data-rate, forward-link broadcasts to a large number of small user terminals. These broadcasts contain address information that allows each user terminal to select those transmissions intended for it. In the return direction, the remote user terminals transmit in bursts at low-to-medium data rates to the gateway. Broadband Encompasses either mobile or fixed access Wireless technologies that provide connections at Access (BWA): speeds higher than the primary rate (for example, 2 Mbit/s). Browser: Application that retrieves WWW documents specified by URLs from an HTTP server on the Internet. Displays the retrieved documents according to the Hyptertext Markup Language (HTML). Bent pipe point-topoint: This topology calls for a dedicated duplex connection, set up between a large gateway earth station and a single user terminal. Burstiness: Bit (binary digit): A bit is the primary unit of electronic, digital data. Written in base-2, binary language as a “1” or a “0”. Technical jargon used to describe a high peak-to-average rate of packets as they are received over the network. There is no unique mathematical definition of “burstiness”, but a traffic stream is considered to be more “bursty” than another if its packets are more clumped together. Byte: (1) A set of bits that represent a single character. A byte is composed of 8 bits. (2) A bit string that is operated upon as a unit and the site of which is independent of redundancy or framing techniques. Bit/s: Bits per second. Measurement of the transmission speed of units of data (bits) over a network. Also kbit/s: kilobits (1 000) per second; Mbit/s: megabits (1 000 000) per second, and Gbit/s: Gigabits (1 000 000 000) per second. Blog: Blog is short for weblog. A weblog is a journal (or newsletter) that is frequently updated and intended for general public consumption. Bluetooth: Botnets: Broadband: A radio technology that enables the transmission of signals over short distances between mobile phones, computers and other devices. It is typically used to replace cable. A jargon term for a collection of software robots, or bots, which run autonomously. A botnet’s originator can control the group remotely, usually through a means such as IRC, and usually for nefarious purposes. Although there exist various definitions of broadband that have assigned a minimum data rate to the term, it may be defined as transmission capacity with sufficient bandwidth to permit combined provision of voice, data and video, with no lower limit. Effectively, broadband is implemented mainly through ADSL, cable modem or wireless LAN (WLAN) services. Broadband corDECT: A broadband wireless local loop standard developed in India by Indian Institute of Technology. Broadband Over Power Line (BPL): A wireline technology that is able to use the current electricity networks for data and voice transmission. 216 Cable modem: A technology that allows high-speed interactive services, including Internet access, to be delivered over a cable TV network. Cable Television (CATV): A system for delivery of television video and audio content via a wired network, employing either co-axial cable or fibre. Calling Party Pays (CPP): Billing option whereby the person making the call is charged. By contrast, in a “receiving party pays” (RPP) system, the individual that receives the call pays all charges for that call. Cellular: A mobile telephone service provided by a network of base stations, each of which covers one geographic cell within the total cellular system service area. CAGR: Compound annual growth rate. See the Technical Notes. CDMA: Code division multiple access. A technology for digital transmission of radio signals based on spread spectrum techniques where each voice or data call uses the whole radio band and is assigned a unique code. CDMA2000: Code division multiple access 2000. A thirdgeneration digital cellular standard based on Qualcomm technology. Includes CDMA2000 1x, 1xEV-DO (Evolution, Data Optimized) and 1xEV-DV (Evolution, Data and Voice). One of the IMT-2000 “family” of standards. G LOSSARY OF T ERMS Trends in Telecommunication Reform 2006 Cellular: A mobile telephone service provided by a network of base stations, each of which covers one geographic cell within the total cellular system service area. Corporatization: Corporatization involves legal changes to grant the telecommunication operator administrative and financial autonomy from central government. Channel: One of a number of discrete frequency ranges utilized by a base station to transmit and receive information from cellular terminals (such as mobile handsets). Coverage: Circuitswitched connection: A temporary connection that is established on request between two or more stations in order to allow the exclusive use of that connection until it is released. At present, most voice networks are based on circuit-switching, whereas the Internet is packet-based. See also Packet-based. Refers to the range of a mobile cellular network, measured in terms of geographic coverage (the percentage of the territorial area covered by mobile cellular) or population coverage (the percentage of the population within range of a mobile cellular network). CSMA: Carrier Sense Multiple Access. A network protocol in which a node verifies the absence of other traffic before transmitting on a shared physical medium, such as an electrical bus, or a band of electromagnetic spectrum. CMTS: Cable Modem Termination System. Equipment typically found in a cable company’s headend and is used to provide high speed data services, such as Cable Internet or Voice over IP, to cable subscribers. Distributed Denial of Service (DDoS): Collocation: Facility-sharing in which the incumbent operator houses communications equipment of competitive operators to facilitate connectivity to end users. An attack on a computer system or network that causes a loss of service to users, typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational resources of the victim system through a system of computers, which are usually zombie computers compromised by viruses or Trojan horse programs. Competition: Refers to introducing competition among national service suppliers and/or foreign suppliers without any limitations. In the case of mobile cellular, the number of licensees is dependent on spectrum availability. Therefore, all countries allowing more than one operator have been listed in this report as “competitive”. Digital: Representation of voice or other information using digits 0 and 1. The digits are transmitted as a series of pulses. Digital networks allow for higher capacity, greater functionality and improved quality. Digital network: A telecommunication network in which information is converted into a series of distinct electronic pulses and then transmitted as a digital bit stream (see also Analogue network). DOCSIS: Data over cable systems interface specifications (ITU-T J.112). An ITU Recommendation for cable modems. It specifies modulation schemes and the protocol for exchanging bi-directional signals over cable. DOCSIS2: Data over cable systems interface specifications 2 (ITU-T J.122). The newest, revised version of DOCSIS, approved at the end of 2002. Competitive Local Exchange Carrier (CLEC): A network operator or carrier–often a new market entrant--that provides local telephony in competition with the incumbent carrier. Condominium A network model where a group of endFibre Build: users band together to install strands of fibre optic cable to an ISP at the same time. At completion, the end-users are each given separate strands of fibre for their own usage. Connectivity: The capability to provide, to end-users, connections to the Internet or other communication networks. Convergence: A term used to describe a variety of technological and market trends involving the blurring of previously distinct lines between market segments such as cable television, telephony and Internet access, all of which can now be provided through a variety of different network platforms. G LOSSARY OF T ERMS Domain name: The registered name of an individual or organization eligible to use the Internet. Domain names have at least two parts and each part is separated by a dot (point). The name to the left of the dot is unique for each top-level domain name, which is the name that appears to the right of the dot. For instance, The International Telecommunication Union’s domain name is itu.int. “ITU” is a unique name within the gTLD “int”. 217 Trends in Telecommunication Reform 2006 DSL: Digital subscriber line. See also ADSL, ADSL2, ADSL2+, SHDSL, SDSL, VDSL and xDSL. E-mail: Electronic mail. The exchange of electronic messages between geographically dispersed locations. DSLAM: Digital subscriber line access multiplexer. A device, located at the central office of a DSL provider, that separates and routes the voicefrequency signals and data traffic on a DSL line. End-user: The individual or organization that originates or is the final recipient of information carried over a network (i.e. the consumer). Endrun: A fibre optic infrastructure that provides a dedicated fibre optic cable directly to each user’s premise rather than several premises optically splitting off one line. See PON. ENUM: Standard adopted by Internet Engineering Task Force (IETF), which uses the domain name system (DNS) to map telephone numbers to Web addresses or uniform resource locators (URL). The long-term goal of the ENUM standard is to provide a single number to replace the multiple numbers and addresses for users’ fixed lines, mobile lines, and e-mail addresses. EPOP: Expanding point of profitability. A network topography where the network expands incrementally to unserved areas as they become profitable to operators. Newly connected areas can then be used as backbones to more remote areas as they eventually become profitable to providers. Ethernet: A protocol for interconnecting computers and peripheral devices at high speed. Recently Gigabit Ethernet has become available which enables speeds up to 1 Gbit/s. Ethernet can run on several types of wiring including: twisted pair, coaxial, and even fibre optic cable. Ex-ante and ex-post regulation: Ex-ante regulation involves setting specific rules and restrictions to prevent anti-competitive or otherwise undesirable market activity by carriers before it occurs; ex-post regulation, by contrast, calls for setting few or no specific rules in advance, but applying corrective measures and punishments if and when transgressions do occur. FDMA: Frequency division multiple access. A cellular technology that has been used in the firstgeneration analogue systems (i.e. NMT, AMPS, and TACS). Fixed line: A physical line connecting the subscriber to the telephone exchange. Typically, fixed-line network is used to refer to the PSTN (see below) to distinguish it from mobile networks. DSP: Digital signal processing. The study of signals in a digital representation and the processing methods of these signals DVB-RCS: Digital Video Broadcasting, with a Return Channel via Satellite. An open standard for digital television maintained by the DVB Project, an industry consortium with more than 270 members, and published by a Joint Technical Committee (JTC) of European Telecommunications Standards Institute (ETSI), European Committee for Electrotechnical Standardization (CENELEC) and European Broadcasting Union (EBU). Dynamic frequency selection (DFS): It detects the presence of a primary service and switches the WLAN to a clear frequency. E.164: An ITU-T recommendation which defines the international public telecommunication numbering plan used in the PSTN and some other data networks. E-commerce: Electronic commerce. Term used to describe transactions that take place online where the buyer and seller are remote from each other. ECS: Electronic Communication Service. Services provided for remuneration and consisting wholly or mainly in the conveyance of signals on Electronic Communications Networks EDGE: Enhanced Data rates for GSM Evolution. It acts as an enhancement to 2G and 2.5G General Packet Radio Service (GPRS) networks. This technology works in TDMA and GSM networks. EDGE (also known as EGPRS) is a superset to GPRS and can function on any network with GPRS deployed on it, provided the carrier implements the necessary upgrades. EDGE provides Enhanced GPRS (EGPRS), which can be used for any packet switched applications such as an Internet connection. High-speed data applications such as video services and other multimedia benefit from EGPRS’ increased data capacity. 218 G LOSSARY OF T ERMS Trends in Telecommunication Reform 2006 FPGA: Field programmable gate array. A semiconductor device containing programmable logic components and programmable interconnects. The programmable logic components can be programmed to duplicate the functionality of basic logic gates (such as AND, OR, XOR, NOT) or more complex combinatorial functions such as decoders or simple math functions. FTTH: Fibre to the home. A high-speed fibre optic, Internet connection that terminates at a residence. See FTTx. FTTx: Fibre to the x, where x is a home (FTTH), building (FTTB), curb (FTTC), or neighbourhood (FTTN). These terms are used to describe the reach of an optical fibre network. Firewall: Software or hardware that controls access in and out of a network. Firewalls can be dedicated computers that act as the intermediary between a business network and the Internet, or can be software tools that help individual computers control which programs are allowed access to the Internet. First Mile: A topology in which the user or a local service provider – or perhaps even an apartment building company – owns the access network and connects to service providers using its own upstream links. Fixed line: A physical line connecting the subscriber to the telephone exchange. Typically, fixed-line network is used to refer to the PSTN (see below) to distinguish it from mobile networks. Frequency: The rate at which an electrical current alternates, usually measured in Hertz (see Hz). It is also used to refer to a location on the radio frequency spectrum, such as 800, 900 or 1 800 MHz. FrequencyDivision Duplexing (FDD): A transmission mode that requires the allocation of two frequency bands, one for the uplink and another for the downlink. It enables one to transmit and receive at the same time. FrequencyDivision Multiplexing (FDM): A form of signal multiplexing where multiple baseband signals are modulated on different frequency carrier waves and added together to create a composite signal. FSO: Free space optics. A system of lasers used to transmit data optically through the atmosphere at very high speeds. Similar to optical fibre without the physical cable. G LOSSARY OF T ERMS Gateway: Any mechanism for providing access to another network. This function may or may not include protocol conversion. GATS: General Agreement on Trade In Services. GDP: Gross domestic product. The market value of all final goods and services produced within a nation in a given time period. GEO: Geostationary earth orbit. A satellite in orbit 35 650 km above the Earth in a rotation that mimics that of the Earth, thus appearing stationary in the sky. GMPCS: Global mobile personal communications by satellite. Non-geostationary satellite systems that are intended to provide global communication coverage to small handheld devices. Global System for Mobile communications (GSM): European-developed digital mobile cellular standard. For more information, see the GSM Association website at: http://www.gsmworld.com/index.html. GNP: Gross national product. The market value of all final goods and services produced in a nation’s economy, including goods and services produced abroad. GNI: Gross national income. The market value of all final goods and services produced in a nation’s economy, including goods and services produced abroad. GNI in constant prices, differs from GNP in that it also includes a terms of trade adjustment; and gross capital formation which includes a third category of capital formation: net acquisition of valuables. GPRS: General Packet Radio Service. It is a mobile data service available to users of GSM mobile phones. It is often described as “2.5G”, that is, a technology between the second (2G) and third (3G) generations of mobile telephony. It provides moderate speed data transfer, by using unused TDMA channels in the GSM network. GPS: Global positioning system. Refers to a “constellation” of 24 “Navstar” satellites launched initially by the United States Department of Defense, that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location. The location accuracy ranges from 10 to 100 metres for most equipment. A Russian system, GLONASS, is also available, and a European system, Galileo, is under development. H.323: An umbrella recommendation from the ITU-T, that defines the protocols to provide audio-visual communication sessions on any packet network. 219 Trends in Telecommunication Reform 2006 Half duplex: Half duplex refers to a communication channel that can only handle one-way traffic at a time. In essence, each side of the communication must wait until the other is finished transmitting to start sending information. By contrast, full duplex communication allows for both parties to broadcast and receive at the same time. Hotspot: An access point to a wireless local area network (WLAN). Hotspots are areas where wireless data can be sent and received, and Internet access is provided to wireless devices. For example, a laptop computer can be used to access the Internet in a hotspot provided in an airport or hotel. HAPS: High altitude platform station. A term referring to balloons and high altitude aircraft that can be used to provide communication services. See LAPS. HDTV: High-definition television. A new format for television that offers far superior quality to current NTSC, PAL, or SECAM systems. The resolution of the picture is roughly double previous television signals and the pictures are displayed with a screen ratio of 16:9 as compared with most of today’s TV screens, which have a screen ratio of 4:3. Hertz (Hz): The frequency measurement unit equal to one cycle per second. HFC: Hybrid fibre copper. A broadband network that utilizes fibre optic cabling to the vicinity and then copper lines to individual users. HiperLAN: High-performance radio local area network. An ETSI standard that operates at up to 54 Mbit/s in the 5 GHz RF band. HiperLAN2: High-performance radio LAN Type 2. Wireless LAN (specified by ETSI/BRAN) in the 5 GHz IMS Band with a bandwidth up to 50 Mbit/s. HiperLAN2 is compatible with 3G WLAN systems for sending and receiving data, images, and voice communications. HIPERMAN: High performance radio metropolitan area network. This is a European standard aimed at providing a broadband wireless solution for Metropolitan Area Networks. Hotspot: An access point to a wireless local area network (WLAN). Hotspots are areas where wireless data can be sent and received, and Internet access is provided to wireless devices. For example, a laptop computer can be used to access the Internet in a hotspot provided in an airport or hotel. 220 HSDPA: High-Speed Downlink Packet Access. This is a new mobile telephony protocol. Also called 3.5G (or “3½G”). High Speed Downlink Packet Access is a packet-based data service with data transmission up to 8-10 Mbit/s (and 20 Mbit/s for MIMO systems) over a 5 MHz bandwidth in W-CDMA downlink. HSDPA implementation includes Adaptive Modulation and Coding (AMC), MultipleInput Multiple-Output (MIMO), Hybrid Automatic Repeat Request (HARQ), fast scheduling, fast cell search, and advanced receiver design. Hybrid Fibre/Coaxial (HFC): A telecommunications industry term for a network that incorporates both optical fibre along with coaxial cable to create a broadband network. Hz: Hertz. The frequency measurement unit equal to one cycle per second. IMS: IP Multimedia Subsystem. A standardized Next Generation Networking (NGN) architecture for telecom operators that want to provide mobile and fixed multimedia services. It uses a Voice-over-IP (VoIP) implementation based on a 3GPP standardized implementation of SIP, and runs over the standard Internet Protocol (IP). Existing phone systems (both packet-switched and circuit-switched) are supported. IMT-2000: International Mobile Telecommunications-2000. Third-generation (3G) “family” of mobile cellular standards approved by ITU. For more information see the website at: http://www.itu.int/imt. Incumbent: The major network provider in a particular country, often a former State-owned monopoly. In-house BPL: A home networking technology that uses the transmission standards developed by the HomePlug Alliance. Products for in-home networking use the electric outlets in your home (or office). Instant messaging (IM): Refers to programs such as AOL Instant Messenger and ICQ that allow users to exchange messages with other users over the Internet with a maximum delay of one or two seconds at peak times. G LOSSARY OF T ERMS Trends in Telecommunication Reform 2006 Interconnection: The physical connection of separate telephone networks to allow users of those networks to communicate with each other. Interconnection ensures interoperability of services and increases end users’ choice of network operators and service providers. ITU: International Telecommunication Union. The United Nations specialized agency for telecommunications. See http://www.itu.int/. Internet Exchange Point (IXP): A central location where multiple Internet Service Providers can interconnect their networks and exchange IP traffic. Interconnection Charge: The charge–typically including a per-minute fee–that network operators levy on one another to provide interconnection. JPEG: Joint photographic expert group compression standard. Standard for the compression and coding of still images. Internet: Interconnected global networks that use the Internet protocol (see IP). LAN: Internet backbone: The high-speed, high capacity lines or series of connections that form a major pathway and carry aggregated traffic within the Internet. Internet content provider: A person or organization that provides information via the Internet, either with a price or free of charge. Local area network. A computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected to other LANs over any distance via telephone lines and radio waves. A system of LANs connected in this way is called a widearea network (WAN). See also WLAN. LAPS: IP: Internet protocol. The dominant network layer protocol used with the TCP/IP protocol suite. Low altitude platform station. A system usually consisting of balloons that provides wireless communication services over a wide area. Similar to HAPS but the altitudes are lower. Last Mile: IP telephony: Internet protocol telephony. IP telephony is used as a generic term for the conveyance of voice, fax and related services, partially or wholly over packet-based, IP-based networks. See also VoIP and Voice over broadband. The topology denotes the operator’s ownership of the access network. Layered Architecture: The concept of layered network architecture divides a network at any specific point into layers, each of which adds value to the physical medium of communication. LBS: Location-based services. LBS make use of information on the location of a mobile device and user, and can exploit a number of technologies for the geographic location of a user. Some of these technologies are embedded in the networks and others in the handsets themselves. Location capability is already available to some level of accuracy (approx. 150 m) for most users of cellular networks. Increased accuracy can become available through location technologies such as GPS. See GPS. Leased line: A point-to-point communication channel or circuit that is committed by the network operator to the exclusive use of an individual subscriber. Under national law, leased lines may or may not be permitted to interconnect with the public switched network. LEO: Low Earth orbit. A term that refers to satellite orbits between 650 km and 2 600 km above the Earth. A LEO satellite is only in view for a few minutes and rotates the Earth every few hours. See GEO. Licensing: An administrative procedure for selecting operators and awarding franchises for the operation of particular telecommunication services, for instance cellular radio. IPR: Intellectual property rights. Copyrights, patents and trademarks giving creators the right to prevent others from using their inventions, designs or other creations. The ultimate aim is to act as an incentive to encourage the development of new technology and creations which will eventually be available to all. The main international agreements are the World Intellectual Property Organization’s (WIPO) Paris Convention for the Protection of Industrial Property (patents, industrial designs, etc.), the Berne Convention for the Protection of Literary and Artistic Works (copyright), and the World Trade Organization’s (WTO) Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). ISDN: Integrated services digital network. A digital switched network, supporting transmission of voice, data and images over conventional telephone lines. ISP: G LOSSARY Internet service provider. ISPs provide endusers access to the Internet. Internet Access Providers (IAPs) may also provide access to other ISPs. ISPs may offer their own proprietary content and access to online services such as e-mail. OF T ERMS 221 Trends in Telecommunication Reform 2006 Line Sharing: A form of network unbundling that allows a competitive service provider to offer ADSL using the high-frequency portion of a local loop at the same time that an ILEC continues to offer standard switched voice service over the low-frequency portion of the same loop. MP3: MPEG-1 Audio Layer-3 (MPEG stands for Moving Pictures Experts Group). A standard technology and format for compression of a sound sequence into a very small file (about one-twelfth the size of the original file) while preserving the original level of sound quality when it is played. LLU: Local loop unbundling. The process of requiring incumbent operators to open the last mile of their legacy networks to competitors. Similar reference to ULL (unbundled local loop). Multimedia: The presentation of more than one medium, typically images (moving or still), sound and text in an interactive environment. Multimedia requires a significant amount of data transfer and bandwidth, and it invariably requires computational facilities. Local loop: The system used to connect the subscriber to the nearest switch. It generally consists of a pair of copper wires, but may also employ fibre-optic or wireless technologies. National Regulatory Authority (NRA): The regulatory agency or official at the central or federal government level that is charged with implementing and enforcing telecommunication rules and regulations. Network Unbundling: Providing access to, or making available, some or all of the disaggregated elements and/or functions of a telephone network– usually the local portion of the network–for interconnecting carriers to use in serving their own customers. Network Topology: The pattern of links connecting pairs of nodes of a network. Next generation network (NGN): These are packet-based networks in which service-related functions are independent from underlying transport-related technologies. They are able to provide telecommunication services and make use of multiple broadband transport technologies. For a more detailed definition, see http://www.itu. int/ITU-T/ngn Node: A point of connection to a network. A switching node is a point at which switching occurs. Number portability: The ability of a customer to transfer an account from one service provider to another without requiring a change in number. Other forms of portability allow end users to change residence or subscribe to a new form of service (e.g., ISDN) while retaining the same telephone number for their main telephone line. OFDM: Orthogonal frequency division multiplexing. A method of digital modulation in which a signal is split into several narrowband channels at different frequencies in order to minimize interference among channels that are close in frequency. OFDM is used in European digital audio broadcast services, and also in wireless LANs. Long Run The added or extra cost entailed in providIncremental ing a service, over the long term. Costs (LRIC): Long Run Average Incremental Costs (LRAIC): A costing model based on LRIC analysis, in which the total traffic costs for both interconnecting carriers are divided by the total demand, rather than assigning unique costs to each operator. Main Telephone line connecting a subscriber to telephone line: the telephone exchange equipment. This term is synonymous with the term fixed line used in this report. Market The shortfall between commercially availefficiency gap: able access and universal access. Mesh network: A way to route data, voice and instructions between nodes. It allows for continuous connections and reconfiguration around blocked paths by “hopping” from node to node until a connection can be established. Mobile: As used in this report, the term refers to mobile cellular systems and to mobile phones. Mobile virtual network operator (MVNO): A company that does not own a licensed frequency spectrum, but resells wireless services under their own brand name, using the network of another mobile phone operator. Multimedia: The presentation of more than one medium, typically images (moving or still), sound and text in an interactive environment. Multimedia requires a significant amount of data transfer and bandwidth, and it invariably requires computational facilities. 222 G LOSSARY OF T ERMS Trends in Telecommunication Reform 2006 On-Board Processor (OBP) Switching: In this topology, the satellite rather than the gateway is the central node in a star network. The satellite is connected to the gateway by one or more high-data-rate trunks. The onboard processor de-multiplexes the uplink trunk into several downlinks for different geographical areas, usually determined by the footprint pattern. The forward downlinks contain messages for large numbers of user terminals, and the destinations are identified by message headers. In the return channel, the uplink transmissions from user terminals in one or more cells are multiplexed onto a downlink trunk to the gateway. One DSL for Universal Service (See UDSL/UniDSL) OperatorA network access model in which the passive neutral model: access network infrastructure is often owned by housing companies, condominiums or tenant organizations and, in some cases, by municipalities. In this model, access networks are connected to a shared access network backbone. Any service provider can then connect its network gateway and offer services using the access network. OPGW: Optical power ground wire. A special ground wire with a fibre cable in the core. Optical network terminal (ONT): The equipment used to terminate the fiber. P2P: Peer to peer. P2P refers to networks that facilitate direct connections among individual nodes rather than through a centralized server. However, many famous P2P networks, such as “Napster”, actually relied on a central server to connect users. Other networks (such as “Gnutella”) offer true peer-to-peer, decentralized connections. PABX: Private Automatic Branch eXchange. A telephone exchange that is owned by a private business, as opposed to one owned by a common carrier or by a telephone company. Packet: Block or grouping of data that is treated as a single unit within a communication network. Packet-based: Message-delivery technique in which packets are relayed through stations in a network. See also Circuit-switched connection. G LOSSARY OF T ERMS PAN: Personal area network. For the purposes of this report, a PAN is referred to as the interconnection of information technology devices within the range of an individual person, typically within a radius of 10 metres. For example, a person travelling with a laptop, a personal digital assistant (PDA), and a portable printer could interconnect these devices through a wireless connection, without the need for physical wiring. Conceptually, the difference between a PAN and a wireless LAN is that the former tends to be centered around one person while the latter has a greater range of wireless connectivity, typically serving multiple users. PDA: Personal digital assistant. A generic term for handheld devices that combine computing and possibly communication functions. Peering: The exchange of routing announcements between two Internet Service Providers for the purpose of ensuring that traffic from the first can reach customers of the second, and vice-versa. Peering takes place predominantly at IXPs and usually is offered either without charge or subject to mutually agreed commercial arrangements. Penetration: A measurement of access to telecommunications, normally calculated by dividing the number of subscribers to a particular service by the population and multiplying by 100. Also referred to as teledensity (for fixed-line networks) or mobile density (for cellular ones), or total teledensity (fixed and mobile combined). Personal Communication Services (PCS): In the United States, this refers to digital mobile networks using the 1 900 MHz frequency. In other countries, it refers to digital mobile networks using the 1 800 MHz frequency (See DCS-1800). The term Personal Communications Network (PCN) is also used. Pervasive computing: A concept which describes a situation in which computing capability is embedded into numerous different devices around the home or office (e.g. fridges, washing machines, cars, etc.). Also referred to as ubiquitous computing. Pervasive communications implies that the microchips in these devices are also able to communicate, for instance their location and status. Phishing: The fraudulent practice of disguising spam as legitimate email in an attempt to coax recipients into revealing private financial data. 223 Trends in Telecommunication Reform 2006 PLC: PON: Power line communications. A communication network that uses existing power lines to send a receive data by using electrical signals as the carrier. Power flows on the line at 50-60 Hz while data is sent in the 1 MHz range. PTO: Public telecommunication operator. A provider of telecommunications infrastructure and services to the general public (“public” refers to the customer base). Also referred to as an operator, service provider, carrier or “telco”. QoS: Passive optical network. A type of full passive wave division multiplexing (WDM) network that allows multiple locations to connect to one optical fibre strand (or wavelength) by using optical splitters to break up the wavelength of light into allocated time slots for each user. See Endrun and WDM. Quality of service. A measure of network performance that reflects the quality and reliability of a connection. QoS can indicate a data traffic policy that guarantees certain amounts of bandwidth at any given time, or can involve traffic shaping that assigns varying bandwidth to different applications. RLAN: Radio local area network. See WLAN. RFID: Radio-frequency identification. A system of radio tagging that provides identification data for goods in order to make them traceable. Typically used by manufacturers to make goods such as clothing items traceable without having to read bar code data for individual items. SCADA: Supervision, control and data acquisition. The term refers to a large-scale, distributed measurement (and control) system. SDR: Software defined radio. A radio communication system which uses software for the modulation and demodulation of radio signals. SDSL: Symmetrical DSL. A proprietary North American DSL standard. However, the term SDSL is often also used to describe SHDSL. Secondgeneration mobile (2G): A general term for second generation mobile networks, for example GSM. Server: (1) A host computer on a network that sends stored information in response to requests or queries. (2) The term server is also used to refer to the software that makes the process of serving information possible. Session Initiation Protocol (SIP): A protocol developed by the IETF MMUSIC Working Group and proposed standard for initiating, modifying, and terminating an interactive user session that involves multimedia elements such as video, voice, instant messaging, online games, and virtual reality. In November 2000, SIP was accepted as a 3GPP signalling protocol and permanent element of the IMS architecture. It is one of the leading signalling protocols for Voice over IP, along with H.323. SHDSL: Single pair high-speed DSL. The informal name for ITU-T Recommendation G.991.2 that offers high-speed, symmetrical connectivity over a twisted copper pair. Port 25: The traditional TCP port used by the Simple Mail Transfer Protocol. Portal: Although an evolving concept, the term portal commonly refers to the starting point, or a gateway through which users navigate the World Wide Web, gaining access to a wide range of resources and services, such as e-mail, forums, search engines, and shopping malls. PPP: Protocol: Purchasing power parity. An exchange rate that reflects how many goods and services can be purchased within a country taking into account different price levels and cost of living across countries. A set of formal rules and specifications describing how to transmit data, especially across a network. Primary rate connection (PRI): One kind of service for ISDN. It consists of 23 B-channels and one 64 kbit/s D-channel in the United States or 30 B-channels and 1 D-channel in Europe. Private network: A network based on leased lines or other facilities, which are used to provide telecommunication services within an organization or within a closed user group as a complement or a substitute to the public network. Private ownership/ Privatization: The transfer of control of ownership of a state enterprise to private parties, generally by organizing the enterprise as a share company and selling shares to investors. More generally, the term is sometimes used to refer to a wide range of modalities whereby business is opened to private enterprise and investment. PSTN: Public switched telephone network. The public telephone network that delivers fixed telephone service. 224 G LOSSARY OF T ERMS Trends in Telecommunication Reform 2006 Short Message A service available on digital mobile cellular Service (SMS): networks and even landline telephones, typically enabling end users to send and receive messages with up to 160 characters. SkyWrap: A process, where there already are power lines, that wraps fibre around the transmission lines. SMTP: Simple Mail Transfer Protocol. The de facto standard for email transmission across the Internet. Softswitch: A type of telephone switch that uses software running on a computer system to carry out the work that used to be carried out by hardware. Spam: Synchronous Optical Network (SONET): A standard for communicating digital information using lasers or light emitting diodes (LEDs) over optical fiber as defined by GR-253-CORE from Telcordia. It was developed to replace the PDH system for transporting large amounts of telephone and data traffic and to allow for interoperability between equipment from different vendors. TCP: Transmission control protocol. A transport layer protocol that offers connection-oriented, reliable stream services between two hosts. This is the primary transport protocol used by TCP/IP applications. TDMA: Time Division Multiple Access. It is a technology for shared medium (usually radio) networks. It allows several users to share the same frequency by dividing it into different time slots. The users transmit in rapid succession, one after the other, each using their own timeslot. This allows multiple users to share the same transmission medium (e.g. radio frequency) whilst using only the part of its bandwidth they require. TD-SCDMA: Time Division Synchronous Code-Division Multiple Access. A 3G mobile telecommunications standard, being pursued in China by the Chinese Academy of Telecommunications Technology (CATT), Datang and Siemens AG, in an attempt to develop home-grown technology and not be “dependent on Western technology.” TD-SCDMA uses TDD, in contrast to the FDD scheme used by W-CDMA. Unsolicited commercial email, some of which may contain computer viruses or worms, fraudulent consumer scams or offensive content. Spam Zombie: (see Zombie) Spectral Efficiency: A measure of the performance of encoding methods that code information as variations in an analogue signal. Spectrum: The radio frequency spectrum of hertzian waves used as a transmission medium for cellular radio, radiopaging, satellite communication, over-the air broadcasting and other services. Spreadspectrum technology: A radio technique that continuously alters its transmission pattern either by constantly changing carrier frequencies or by constantly changing the data pattern. SPIM: Spam over Instant Messenger. An unsolicited message made using instant messenger over the internet. SPIT: Spam over Internet Telephony. An unsolicited telephone call made using IP telephony over the internet. Switch: Part of a mobile or fixed telephone system that routes telephone calls or data to their destination. Synchronous Digital Hierarchy (SDH): A standard developed by ITU (G.707 and its extension G.708) that is built on experience in the development of SONET. Both SDH and SONET are widely used today; SONET in the U.S. and Canada, SDH in the rest of the world. SDH is growing in popularity and is currently the main concern with SONET now being considered as the variation. G LOSSARY OF T ERMS Time-Division Enables use of the same frequency for Duplexing uplink and downlink of a transmission by (TDD): allocating discrete, short-duration time slots to the two links. Teledensity: Number of main telephone lines per 100 inhabitants. See Penetration. ThirdA general term for the next generation of Generation broadband digital mobile cellular systems, Mobile (3G): which will have expanded broadband capabilities for mobile data applications. See IMT-2000. Total Sum of the number of fixed lines and teledensity: mobile phone subscribers per 100 inhabitants. See Penetration. TPC: Transmit power control. A technical mechanism used within some networking devices in order to prevent too much unwanted interference between different wireless networks. Traffic Traffic exchange points are used by operators Exchange to exchange traffic through peering directly Point: between service networks rather than indirectly, via transit through their upstream providers. 225 Trends in Telecommunication Reform 2006 Triple Play: A term refers to the bundling of voice, video and data services. True access gap: The shortfall between market-based regulatory measures and universal access. UASL: Unified Access Services Licensing. A licensing framework in India that gives the licensee freedom to offer both fixed and mobile services using any technology. Ubiquitous computing: UDSL/ UniDSL: A term that reflects the view that future communication networks will allow seamless access to data, regardless of where the user is. See Pervasive computing. A new variant of DSL, integrating all earlier DSL variants. It promises aggregated bit rates of up to 200 Mbit/s, including 100 Mbit/s symmetrical connections. UniDSL would require a fibre backbone infrastructure and would use only the part of the existing subscriber line closest to the user premises. VDSL: Very-high-data-rate digital subscriber line. (ITU-T G.993.1). The fastest version of DSL that can handle speeds up to 52 Mbit/s over very short distances. Often used to branch out from fibre connections inside apartment buildings. Voice over broadband: A method of making voice calls over a broadband connection. The calls can be either made via a computer or through traditional phones connected to voice over broadband equipment. See also IP telephony and VoIP. VoIP: Voice over IP. A generic term used to describe the techniques used to carry voice traffic over IP (see also IP telephony and Voice over broadband). VPN: Virtual private network. A method of encrypting a connection over the Internet. VPNs are used extensively in business to allow employees to access private networks at the office from remote locations. VPNs are especially useful for sending sensitive data. VSAT: Very Small Aperture Terminal. A 2-way satellite ground station with a dish antenna that is smaller than 3 meters, as compared to around 10 meters for other types of satellite dishes. WAN: Wide area network. WAN refers to a network that connects computers over long distances. Wavelength division multiplexing: A technology which multiplexes multiple optical carrier signals on a single optical fibre by using different wavelengths (colours) of laser light to carry different signals. ULL: Unbundled local loop. See LLU. UMTS: Universal mobile telecommunications system. The European term for third-generation mobile cellular systems or IMT-2000 based on the W-CDMA standard. For more information see the UMTS Forum website at: http://www.umts-forum.org/. Universal access: Refers to reasonable telecommunication access for all. Includes universal service for those that can afford individual telephone service and widespread provision of public telephones within a reasonable distance of others. USO: Universal service obligations. Requirements that governments place on operators to offer service in all areas, regardless of economic feasibility. W-CDMA: Wideband code division multiple access. A thirdgeneration mobile standard under the IMT2000 banner, first deployed in Japan. Known as UMTS in Europe. See also CDMA. UTP: Unshielded twisted pair. A cable with one or more twisted copper wires bound in a plastic sheath. It is used extensively for highspeed connections because it allows the release of radiation that would interfere if kept in the line with a shielded cable. WDM: Wave division multiplexing. Technology that allows multiple data streams to travel simultaneously over the same fibre optic cable by separating each stream into its own wavelength of light. Value-added network services (VANS): Telecommunication services provided over public or private networks which, in some way, add value to the basic carriage, usually through the application of computerized intelligence. Examples of VANs include reservation systems, bulletin boards, and information services. Also known as enhanced services. Website/ Webpage: A website (also known as an Internet site) generally refers to the entire collection of HTML files that are accessible through a domain name. Within a website, a webpage refers to a single HTML file, which when viewed by a browser on the World Wide Web could be several screen dimensions long. A “home page” is the webpage located at the root of an organization’s URL. 226 G LOSSARY OF T ERMS Trends in Telecommunication Reform 2006 Wi-Bro: A wireless networking technology (IEE 802.16x) that will enable portable Internet access. The Republic of Korea has announced plans to commercialize it in 2005-2006. Wi-Fi: Wireless fidelity. A mark of interoperability among devices adhering to the 802.11b specification for Wireless LANs from the Institute of Electrical and Electronics Engineers (IEEE). However, the term Wi-Fi is sometimes mistakenly used as a generic term for wireless LAN. Wi-Fi5: Wireless fidelity 5. A mark of interoperability among devices adhering to the 802.11a standard at 5 MHz. WiMAX: Fixed wireless standard IEEE 802.16 that allows for long-range wireless communication at 70 Mbit/s over 50 kilometres. It can be used as a backbone Internet connection to rural areas. Wireless: Generic term for mobile communication services which do not use fixed-line networks for direct access to the subscriber. WISP: An ISP that employs a wireless access platform, or “wireless ISP”. WLAN: Wireless local area network. Also known as Wireless LAN. A wireless network whereby a user can connect to a local area network (LAN) through a wireless (radio) connection, as an alternative to a wired local area network. The most popular standard for wireless LANs is the IEEE 802.11 series. * Source: WLL: Wireless local loop. Typically a phone network that relies on wireless technologies to provide the last kilometre connection between the telecommunication central office and the end-user. Worm: A self-contained program (usually malicious) that can automatically propagate throughout a network. In addition to damage caused by the program on a user’s machine, the programs can slow down network traffic as all infected machines scan simultaneously to find new hosts. WSIS: The United Nations World Summit on the Information Society. The first phase of WSIS took place in Geneva (hosted by the Government of Switzerland) from 10 to 12 December 2003, and the second phase in Tunis (hosted by the Government of Tunisia), from 16 to 18 November 2005. For more information see: http://www.itu.int/wsis. WTO Agreement: Informal terminology for the Fourth Protocol to the General Agreement on Trade in Services (GATS). The agreement, concluded in early 1997, included commitments by more than 70 countries to open their markets for basic telecommunication services. The accompanying Reference Paper, spelled out principles for regulatory treatment of basic telecommunication service providers, including “major suppliers.” xDSL: While DSL stands for digital subscriber line, xDSL is the general representation for various types of digital subscriber line technology, such as ADSL, SHDSL, and VDSL. See ADSL, SHDSL, VDSL. Zombie: A computer attached to the Internet that has been compromised by a cracker, a computer virus, or a Trojan horse program. ITU, World Telecommunication Development Report, 1999. ITU, Challenges to the Network, Internet Development, 1999. G LOSSARY OF T ERMS 227 Trends in Telecommunication Reform 2006 LIST OF FIGURES Figure 1.1: Figure 1.2: Figure 1.3: Figure 1.4: Figure 1.5: Figure 1.6: Figure 1.7: Figure 1.8: Figure 1.9: Figure 1.10: Figure 1.11: Figure 1.12: Figure 1.13: Figure 1.14: Figure 1.15: Figure 1.16: Figure 1.17: Figure 1.18: Figure 1.19: Figure 1.20: Figure 2.1: Figure 3.1: Figure 3.2: Figure 3.3: Figure 3.4: Figure 3.5: Figure 3.6: Figure 3.7: Figure 3.8: Figure 3.9: Figure 3.10: Figure 3.11: Figure 3.12: Figure 3.13: Figure 4.1: Figure 5.1: Figure 5.2: Figure 5.3: Figure 5.4: Figure 5.5: Figure 5.6: Figure 6.1: 228 The Number of ICT Users Worldwide, 1994-2004 .........................................................2 Fixed vs. Mobile Teledensity by Region (per 100 subscribers) ......................................3 Broadband ..................................................................................................................3 Global Distribution of Internet and Broadband Subscribers, 2004 ..................................4 Top 25 Broadband Subscribers, Non-OECD Countries (2004) .......................................4 Subscriber Growth in the Top 10 Broadband Countries (2000-2004) .............................5 Broadband Platform Distribution (by Region) 2004 .......................................................6 Top 10 3G Mobile Markets Worldwide, 2005 ................................................................7 2G Standards Usage, by subscribers, world and by region (2004-5) .............................8 Privatizations, 1991-2005, World.................................................................................9 Status of Competition Worldwide, 2005 .....................................................................10 Status of Public Interconnection Agreements and Pricing Information, 2005 ................11 Countries Requiring Local Loop Unbundling, 2005 .....................................................12 Number of Countries with National and SubRegional IXPs, by region, 2005 .................13 Growth of Regulators Worldwide, 2005.......................................................................13 Separate Regulators, by Region, 2005........................................................................14 Growth of International Traffic .....................................................................................16 Are Licences Required for WLANS, 2005? ..................................................................17 Spam as Percentage of Emails Worldwide, 2003-05 ...................................................17 Spam Regulation, 2005 .............................................................................................18 WiMAX Growth, Forecast Sales, 2004-5 .....................................................................25 Comparative Prices for Mobile Data Services .............................................................34 Migration Paths from 2G to 3G ...................................................................................35 A mesh network topology versus a traditional network.................................................38 The Convergence of WLAN and 3G Technologies – A Matrix........................................39 Empirical Data for Tower, Installation, and Grounding Costs ........................................40 Linear Model of Tower, Installation, and Grounding costs (USA/Ghana) .......................40 Radio Tower Types and Heights ..................................................................................41 Mobility v. Data Rate for Popular BWA Systems ..........................................................44 Power Consumption of Some Wireless Radio Products ...............................................45 UNHCR Refugee Camps in Tanzania ...........................................................................46 The KTTC Computer Laboratory..................................................................................47 KTTC’s Eco-Friendly Power Plant ...............................................................................47 The Mtabila Camp VSAT and PV Systems ..................................................................48 A Simplified Broadband Value Chain ..........................................................................55 From Silos to Layers ..................................................................................................76 From VLF to EHF .......................................................................................................79 Changing the Technology Paradigm ...........................................................................79 Globally Harmonized Spectrum: IMT-2000 ................................................................85 BWA Coverage Areas (Circles) in Ireland .................................................................... 87 The 2.5-2.7 GHz BWA Allocation in Mauritius ............................................................89 Shades of Grey ..........................................................................................................93 L IST OF F IGURES Trends in Telecommunication Reform 2006 LIST OF TABLES Table 1.1: Newly Created Regulatory Authorities, 2005 .................................................................... 15 Table 3.1: Relative Functionalities of Broadband Wireless Access Technologies ............................... 33 L IST OF T ABLES 229 Trends in Telecommunication Reform 2006 LIST OF BOXES Box 1.1: Box 2.1: Box 3.1: Box 3.2: Box 3.3: Box 3.4: Box 3.5: Box 3.6 Box 4.1: Box 4.2: Box 4.3: Box 4.4: Box 4.5: Box 4.6: Box 4.7: Box 4.8: Box 4.9: Box 4.10: Box 4.11: Box 4.12: Box 4.13: Box 4.14: Box 4.15: Box 4.16: Box 4.17: Box 4.18: Box 5.1: Box 5.2: Box 5.3: Box 5.4: Box 5.5: Box 5.6: Box 6.1: Box 6.2: Box 6.3: Box 6.4: Box 6.5: Box 6.6: Box 6.7: Box 6.8: Box 7.1: 230 Broadband Wireless Nations ...............................................................................................7 Wi-Fi Beyond Hotspots ................................................................................................... 25 A Radio Transmission Primer ........................................................................................... 34 TD-SCDMA – A Chinese Standard ................................................................................... 35 802.16 Extensions in the Works ....................................................................................... 36 The Evolution of a “Southern” Solution ............................................................................ 36 Mesh Networks ...............................................................................................................37 Convergence of WLAN and 3G Networks .......................................................................... 39 GSR 2004 Best Practice Guidelines ............................................................................52-53 The Impact of Broadband Access – Examples in Developing Countries ............................. 55 Regulatory Methods To Boost Deployment ........................................................................57 Licensing Incentives for Network Deployment, selected examples .................................... 59 Unified Licensing Frameworks, selected examples ............................................................61 Satellite Broadband in Developing Countries, selected examples ...................................... 62 Local Loop Wholesale Options ......................................................................................... 63 Local Loop Unbundling in Poland ..................................................................................... 63 Removing Network Bottlenecks in India ............................................................................ 65 Using the Indian Rail and Gas Facilities for Backbone Connectivity .................................. 65 GSR 2003 Universal Access Best Practice Guidelines ................................................. 66-67 Korea’s KII Project ........................................................................................................... 68 Use of Universal Access Funds, selected examples .......................................................... 68 Limiting Cross-Ownership in the EU ................................................................................ 70 E-Government in Vietnam ................................................................................................ 70 The Rural-Enlaces Project in Chile ....................................................................................71 Installing Internet Centres in Southern Brazil ....................................................................71 Encouraging PC penetration, selected examples .............................................................. 72 Defining Broadband Wireless Access ...............................................................................77 Spectrum Bands for BWA ................................................................................................77 Software Defined Radios, Adaptive Array Systems and Mesh Networks ............................. 80 Eire’s Response to BWA .................................................................................................. 82 Eire’s Response to BWA, Part Two .....................................................................................87 OFTA’s Consultation on Broadband Wireless Access Licensing ........................................ 88 A VoIP Primer ................................................................................................................. 92 The VoIP Transition ...........................................................................................................97 Classification of VoIP Services....................................................................................... 100 Emergency Services under the North American Numbering Plan..................................... 103 The FCC’s Enhanced 911 Service Order1 ....................................................................... 103 SPIT: A Looming Issue ....................................................................................................107 Threats to VoIP Networks and Publicly Available Services ................................................107 Defense Mechanisms against Security Attacks ................................................................107 Australia Telecommunications Act 1997 – SECT 117 ......................................................121 L IST OF B OXES ALSO AVAILABLE FROM ITU PUBLICATIONS Trends in Telecommunication Reform: Licensing in an Era of Convergence, 2004/05 (6th Edition) ..............................95 CHF Trends in Telecommunication Reform: Promoting Universal Access to ICTs, 2003 (5th Edition) ..................................90 CHF Trends in Telecommunication Reform: Effective Regulation, 2002 (4th Edition) ...........................................................90 CHF Trends in Telecommunication Reform: Interconnection Regulation, 2000-2001 (3rd Edition) .......................................90 CHF Trends in Telecommunication Reform: Convergence and Regulation, 1999 (2nd Edition) .............................................75 CHF General Trends in Telecommunication Reform 1998: World Volume I...........................................................................75 CHF General Trends in Telecommunication Reform 1998: Africa Volume II ..........................................................................65 CHF General Trends in Telecommunication Reform 1998: Americas Volume III ...................................................................55 CHF General Trends in Telecommunication Reform 1998: Arab States Volume IV ...............................................................45 CHF General Trends in Telecommunication Reform 1998: Asia Pacific Volume V ................................................................60 CHF General Trends in Telecommunication Reform 1998: Europe Volume VI .......................................................................72 CHF Collection of five Regional reports (Volumes II-VI) ......................................................................................................297 CHF Collection of Regional and World reports (Volumes I-VI).............................................................................................372 CHF The Arab Book: Telecommunication Policies for the Arab Region, 2002 ......................................................................50 CHF The Blue Book: Telecommunication Policies for the Americas, 2000 (2nd Edition) ......................................................50 CHF Please contact the ITU Sales Service: Tel.: +41 22 730 5111 Fax: +41 22 730 5194 E-mail: [email protected] Website: www.itu.int © ITU 2006 International Telecommunication Union Place des Nations CH-1211 Geneva, Switzerland First printing 2006 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of the International Telecommunication Union. Denominations and classifications employed in this publication do not imply any opinion on the part of the International Telecommunication Union concerning the legal or other status of any territory or any endorsement or acceptance of any boundary. Where the designation “country” appears in this publication, it covers countries and territories. ISBN 92-61-11431-8 Note: Discounts are available for all ITU Member States, Sector Members and Least Developed Countries. Te l e c o m m u n i c a t i o n U n i o n 2 020060 6 I n t e r n a t i o n a l N I S D TRECONMMUNICATION *28388* Printed in Switzerland Geneva, 2006 ISBN 92-61-11431-8 T R E N D S I N T E L E C O M M U N I C AT I O N R E F O R M TELE m r o f re 6 0 20 G N I T A L REGU E H T I N ADBAND BRO D L R WO International Te l e c o m m u n i c a t i o n Union