Geddes - Stupid Network

download Geddes - Stupid Network

of 52

Transcript of Geddes - Stupid Network

  • 7/31/2019 Geddes - Stupid Network

    1/52

    The Stupid Network: A User Guide

    Prepared for CinderellaSomewhere, Somecountry

    Prepared by: Martin Geddes, Director

    Document version: 0.1

    Date: 10 December 2004

  • 7/31/2019 Geddes - Stupid Network

    2/52

    Abstract

    Carriers keep control of the wireless value web by controlling pinch points on the flowof value through handsets, networks and retail supply chains. This gives them powerover their suppliers. They can also perform fine-grained price discrimination againstusers for the value that flows over the network. A move to open all-IP networksundermines this business model, and enables massive disintermediation of carrier tollsystems. This paper describes the mechanics of this change, what the important valuecreators will be in an all-IP world, and suggests strategies and tactics for the varyingmarket conditions along the way.

    Change History

    Date Who Version Changes

    7 Nov 04 Martin Geddes 0.1 Document outline created.22 Nov 04 Martin Geddes 0.2 First draft.

    3 Dec 04 Martin Geddes 0.3 Cinderella v0.2 comments addressed.10 Dec 04 Martin Geddes 0.4 Added context diagram for the strategies; details

    on trust, billing, abuse; executive summary.18 Dec 04 Martin Geddes 0.5 14 Dec conference call comments addressed

    Contacts

    For Telepocalypse Ltd.:

    Martin Geddes, DirectorTelepocalypse Ltd,

    26/5 Annandale St., Edinburgh,

    EH7 4AN, UK.Skype: mgeddes Yahoo: mgeddes_uk

    [email protected]

    For Cinderella:

    About the Author

    Martin Geddes is thinker, writer, coder, inventor, agitator, irritant and consultant. Hewrites the popular telecom strategy weblogwww.telepocalypse.net, cited by BusinessWeek and Forbes among others. Before becoming an independent consultant he was atechnology specialist and product strategy manager at Sprint in Kansas City, USA.

    During his time at Sprint he filed 17 patents on various mobile handset and edge servicetechnologies. Martin also has extensive hands-on experience in the IT industry buildinglarge transactional systems at Oracle Corporation. He holds a bachelor's degree inMathematics and Computation from Oxford University.

    Telepocalyptic Quote

    Who will be the biggest losers [from VOIP]? Not the fixed-line telcos, even thoughtheir revenues may fall by 25% by 2010 due to VOIP, according to Mr Mewawalla. Themobile operators are likely to be the big losers, with their revenues plunging by 80%.

    Together, VOIP and wireless broadband could fatally undermine their costly third-

    generation (3G) networks. - The Economist, 2 December 2004

  • 7/31/2019 Geddes - Stupid Network

    3/52

    10 December 2004 Page 3 of 52 Telepocalypse Ltd. 2004

    Executive summary

    Cinderella is finding it harder to maintain margins and volumes in the face ofconsolidating and powerful wireless network operators. At the same time, wireline

    operators are facing significant voice service revenue loss from VoIP, and are failing tocreate new billable events from other newer IP applications. Technology improvementssuch as Wi-Fi and FLASH-OFDM suggest similar dynamics will soon apply to wirelessnetworks.

    The end goal for Cinderella is to create the greatest possible appeal to consumersbuying devices for open all-IP networks, regardless of the interests of the networkoperator. In the transition, Cinderella needs to make the most attractive handsets fortodays network operators to distribute.

    How network operators gain and lose control

    Network operators maintain command over the value web by controlling manyindividual value pinch points. These may be embedded in the handset, in the network,or external to both. Examples include the selection and positioning of menu entries, thehome page URL, the ability to locate a handset and route inbound connections, and theestablishment of carrier-specific retail outlets. The report provides a detailed breakdownof their nature, importance and future.

    These control points enable carriers to divide the profit pool in their favour compared toCinderella, and engage in fine-grained price discrimination against users. In return, usersexpend considerable effort in bypassing these toll systems, and frequently meet withsuccess. Avoidance of international voice toll fees, messaging charges and premiumcontent costs are a way of life for many users.

    As the industry restructures from vertical integration to horizontal layers (separating datatransport from service), the individual components that make up a communicationsservice are exposed and potentially become separate businesses. The report uses SMS asan example of a dozen or so value elements hidden inside.

    Come on down, the price is wrong

    The prognosis for carrier control and ability to price discriminate is that such powers willsteadily weaken over the rest of this decade. Other networked industries, primarilyinvolving physical transport of goods and people, have experienced intensifying pricediscrimination over time. Yet the technical and economic structure of the Internet, as a

    transport for information goods, is fundamentally different. These precedents only serveto illuminate those differences.

    Keys to the operators power base

    Two critical elements are billing and digital identity. Even in a world where datatransport is virtually free, there is likely to be an asymmetry in the end-user value of manycommunications resulting in a desire for creating a billable event. Digital identitytraceable to real people, places and things provides vital glue to the system, preventingabuse. The carriers retain a critical advantage in these two areas.

    New ideas, not lower prices or arbitrage

    Other parts of the value network, however, are ripe for transfer outside of carriercontrol. By creating smart core networks that attempt to meter and add value to data

  • 7/31/2019 Geddes - Stupid Network

    4/52

    10 December 2004 Page 4 of 52 Telepocalypse Ltd. 2004

    flows, carriers have locked themselves in to often immediately obsolete technology.(There are cases where vertical integration of features into the network makes sense, andthese are noted in the main text.) Their weakness is inability to deploy new services andchange at the speed that the network edge demands. The purpose of IP networks is notlow price or efficiency: it is absolute flexibility, with the network assuming the absolute

    minimum about the purpose and value of the connections made over it.

    Speak clearly after the tone

    This paints a potentially bright future for Cinderella, where constant innovation inapplications drives an incessant demand for new handsets. A consequence is that muchof the current approach to VoIP, which recreates the PSTNs approach on an IPinfrastructure, is fundamentally flawed. IP enables completely new modes ofcommunication, richer in sensuous forms of presence, group forming and collaboration.

    Voice remains at the heart of this, something frequently lost in the 3G content labyrinth.

    Wi-Fi networks are a key starting point, because they are the dominant form of fast,

    open wireless IP networks deployed today. However, Cinderella is compromising itsposition here by its preference for dual-mode handsets, which have to defer to theinterests of incumbent cellular carriers. Cinderella is potentially conceding a key strategicmarket to non-traditional device competitors because it over-values mobility comparedto price and new functionality.

    Playing your cards in the game of telecom

    To address the market changes Cinderella needs a multi-faceted approach that recognisesthat different markets enjoy varying levels of incumbent power and availability of IPnetworks to deliver value to users.

    The most important change Cinderella can make is to view its handsets as sales outlets

    for carrier services. Simple changes can make Cinderella handsets more appealing to thecore metrics of carriers (ARPU, CPGA, CCPU, churn, free cash flow). The best possiblesales message to a carrier is not a sexy new form factor, nor a juicy discount. Itsevidence of better core financial performance, for example by

    On-screen reminders for pre-paid users to top up.

    Impulse buying of MMS messages with one-click send to the 2-3 most likelyrecipients (a-la Amazon one click).

    Highlighting on-net calls to reduce churn Calling Bob at Home (free on-netcall!)

    Many more examples are given in the text. This is a pretty dramatic shift from thetraditional hunt for new features for a consumer electronics company.

    Additional strategies include: focusing on features that have little or no networkdependence; subversive features; creating more compelling applications; helping usersdodge the carriers net; and leveraging existing market power. The main text includes adiscussion of when these strategies are appropriate.

    To be successful, Cinderella needs to align everything it does to a move to stupid IPnetworks, from lobbying to venture financing, customer service to M&A.

    The report finishes off by recapping some of the landmark ideas that have shaped the

    communications revolution. In particular, all readers should become familiar with theRise of the Stupid Network and its associated follow-ons.

  • 7/31/2019 Geddes - Stupid Network

    5/52

    10 December 2004 Page 5 of 52 Telepocalypse Ltd. 2004

    Contents

    Executive summary ........................................................................................................................ 3Disclaimer ....................................................................................................................................... 6Introduction .................................................................................................................................... 6Part 1: Where we are ...................................................................................................................... 8

    State of the Nation .................................................................................................................... 8Case study:Elvis has left the building.......................................................................................... 9How the carrier controls the value chain ............................................................................... 9

    Travelling without a ticket ..................................................................................................... 12Part 2: Where were going.......................................................................................................... 14

    Case Study: Dissecting SMS from an IP viewpoint.................................................................... 14The disintermediation forecast ............................................................................................. 17The only way is down ............................................................................................................ 19Should you care about carrier disintermediation? .............................................................. 20Identity and trust: linking the layers ..................................................................................... 21Billing and value asymmetry .................................................................................................. 23Understanding mediation ...................................................................................................... 24

    Winners and losers ................................................................................................................. 28Timeline ................................................................................................................................... 29

    Part 3: How to get there ............................................................................................................. 31Support to the winning side .................................................................................................. 31Dont play with their network ball ....................................................................................... 33Be the best footballer ............................................................................................................. 34Have more players on the pitch ........................................................................................... 35Bribe the public to support you ........................................................................................... 36Cheat (but dont get caught) ................................................................................................. 36Foul the other side .................................................................................................................. 37Plan for the next match ......................................................................................................... 38Change the rules ..................................................................................................................... 39Picking your players ............................................................................................................... 39Case study:A marriage of inconvenience.................................................................................... 40

    Summary and Conclusions ........................................................................................................ 43Appendix ARecommendations ............................................................................................ 44Appendix BCarrier points of control of value web ........................................................... 46Appendix CAn economists viewpoint................................................................................ 49

    Not everything that counts can be counted ....................................................................... 49Option value ............................................................................................................................ 50Lies, damned lies, operator revenue breakdowns .............................................................. 50

    Appendix DHistory & further reading ................................................................................ 51

  • 7/31/2019 Geddes - Stupid Network

    6/52

    10 December 2004 Page 6 of 52 Telepocalypse Ltd. 2004

    Disclaimer

    According to psychology research by the Harvard Business School1, people pay toomuch attention to outside advice that theyve paid for. They consistently underestimate

    the freely available insight and knowledge of their colleagues. So once youve donereading this consultants paper, throw it away. Shred it, burn it, or bin it. Then Skype afriend and ask what they think.

    Introduction

    This paper isnt about the Internet. Or peer-to-peer networks. Or Wi-Fi. Or VoIP. Oreven about mobile phones.

    Its about all of these, and the underlying forces that unite them. There are common

    economic, sociological and technical drivers to the changes we see today. My goal is tohelp you look at familiar business problems in a new light, and challenge yourassumptions about whats possible. The most important of those problems today is:

    How can Cinderella compete as carriers assert increased controlover content, handsets, networks and distribution?

    My thesis is that the current dominance of network operators over the handsetmakers is a transient period between two very different worlds. The tide will flow outas well as in. Cinderella wants to dominate this future world (I hope!), thus

    Objective #1:Be the users vendor of choice for personal communicationsdevices operating on open IP-based wireless networks.

    This should be Cinderellas long-term goal. Whilst it is fine having a vision of afuture that hasnt fully arrived yet, we also need to deal with the current reality ofascendant operators. Some simple and inexpensive changes to current productsCinderella could have a great deal more success in getting handsets distributed by todayspowerful operators.

    Objective #2: Be the network operators supplier of choice for handsets not onopen IP-based wireless networks.

    So thats the nutshell description of there and here. But what about the journey?What you need is a unifying framework. What specific criteria make it easier to sell ahandset today? And tomorrow? Product development and project investments must be

    aligned to these trends.

    Without this, projects and products are launched based on projected ROIs. To be blunt,the ROI competition is won by the department that can think of the biggest number andhas the positional power or political capital to force it through. If youre lucky you havea hit, like interchangeable handset faceplates or ring tones. If your numbers turn out tobe a fantasy you have a flop instead (and I wont humiliate anyone by providingexamples!).

    1The Hidden Cost of Buying Information, Harvard Business School Working Knowledge,8 November 2004, http://hbswk.hbs.edu/item.jhtml?id=4465&t=innovation&nl=y

  • 7/31/2019 Geddes - Stupid Network

    7/52

    10 December 2004 Page 7 of 52 Telepocalypse Ltd. 2004

    But like a Vegas casino, wouldnt it be easier playing the market with the house odds onyour side? How? You align your bets with the macro trends of the industry. The rest ofthis paper describes the rules of the Internet game.

  • 7/31/2019 Geddes - Stupid Network

    8/52

    10 December 2004 Page 8 of 52 Telepocalypse Ltd. 2004

    Part 1: Where we arePowerWhy the carriers have it and you dont

    State of the Nation

    So there is a war between operators and device manufacturers to capture the value of theusers communications. What does the battlefield look like today?

    Application functionality is increasingly moving from the centre of networks(switches, video servers, session border controllers and home agents) to the edge(PCs, PVRs, PDAs, phones and other connected devices). Peer-to-peer is theultimate expression of this trend.

    The computing and communications power available at the edge are increasing atan exponential rate. CPU speeds, storage capacity, wireline and wirelesstransmission speeds all have doubling periods between 9 months and 2 years2.

    Wireless spectral capacity increases fastest of all!3

    The dissolution of carrier control over wireline networks has been slowlyunfolding over a period of 30 years. None of the major new applicationsenabled by the Internet has resulted in new billable events for telecom carriers: e-mail, IM, chat, web, multi-user gaming or peer-to-peer file sharing.

    Change for wireless networks will be faster and nastier than for wireline ones.

    Rights of wayspectrumare about to become plentiful4

    . Network equipmentis cheap, and much of the infrastructure is paid for by end users. Furthermore,the cost of wireless network deployment is more closely linked to actualsubscribers than potential subscribers passedyou can start small.

    The next generation of wireless networks from Flarion, IP Wireless, Kaon, etc.are low latency, cope with bursty traffic, have built-in QoS if needed, and highthroughput and spectral efficiency. Perfect for moving IP packets around.

    WiMAX if it ever rolls out is just a bonus on top of these. Thesetechnologies are as transformational to telecom as the arrival of the machine gunon the military battlefield.

    As well see, these in turn also have a common thread:The best networkfor the users is one that just shuffles bytes from place to place. Thenetwork doesnt assume anything about the traffic, or try to add value to those bytes.

    Thus new applications can arise and old ones can change without asking the carrier for

    2Uncommon Sense, Peter Cochrane, p200.3 Measured at the user, coming from: spectrum re-allocation and de-regulation, moves to smaller cells (e.g.

    WiFi), cognitive radios, meshing and general transmission improvements (e.g. new OFDM variants).Claude Shannon showed there was a theoretical transmission limit to a hypothetical channel, but the real

    world is not a single channel.4MuniWireless.com, 11 October 2004. According to Dailywireless.org, work begins next month onone of the IEEE's most important, and most politically charged, projects, to devise an "intelligent" air

    interface (cognitive radio), that can tap into unused television frequencies. This will be the standard(802.22) for fixed wireless systems that use cognitive radio techniques to switch automatically to a cleararea of the band, and to avoid interfering with other occupying devices.

  • 7/31/2019 Geddes - Stupid Network

    9/52

    10 December 2004 Page 9 of 52 Telepocalypse Ltd. 2004

    permission. Advances in technology at the edge are readily captured by the end user.The user doesnt need to wait for the carrier to deploy any new features or invent a newpricing plan.

    Theworst networkfor the operators is one that just shuffles bytes from place to place.Such a network offers fewer, if any, opportunities for value-add, differentiation and price

    discrimination of network traffic.

    Case study: Elvis has left the building

    Before we look at the deeper issues brought by end-to-end IP networks, lets set thescene with a recap of what is happening to voice on the Internet.

    Perhaps the most important aspect of VoIP isnt the rise of alternative service providerslike Vonage or AT&T CallVantage. Its the creation of totally new voice products andthe complete loss of service revenue for traditional voice providers.

    By my own measurements5, Skype is currently supplying around 7.5bn minutes of use ayear. This is 15% more than the annual outgoing international call volume from theUnited Kingdom6. Monthly growth rates are in the tens of percent range7. They areadding 100,000 registered user accounts every day8.

    Anecdotal evidence is that much Skype use is for international calling, and thus doesachieve some form of toll displacement. There is no public available data on how muchSkype usage is incremental to PSTN calling vs. displacement of PSTN calls. However,taking an average (and conservative) $0.02/minute displacement rate this would suggestSkype is responsible for $150m loss of profit to the global telecom industry. It isnt hardto imagine a figure of ten times that for the global private VoIP applications industry,once Xbox Live and comparable services are added in. Whilst this seems small comparedto a $1300bn industry turnover, it all comes from the bottom line. A recent and credibleanalyst estimate is of a total EUR6.4bn loss just within Western Europe by 20089.

    Consumer acceptance of VoIP and massive growth once given a broadbandconnection are now a proven fact. The presence, IM and conferencing features ofSkype coupled with excellent usability are all icing on the free calling cake. But thecrucial lesson is IP telephony is about innovative features and new modes of use. It isnot about interconnect arbitrage, regulatory bypass or cheaper replicas of the past.

    How the carrier controls the value chain

    At a high level, carriers control the cellular industry in three ways: the messages theyallow to flow over the network, the features and configuration of their handsets, and theretail distribution and branding of handsets. A detailed breakdown is shown in

    Appendix B Carrier points of control of value web. These are the capabilities thatenable carriers to price discriminate against users and restrict competition from outsidethe carrier industry.

    5 Skype.com 12 noon 13 Nov 2004: 2,470,915,990 minutes served; 10.38am 20 Nov 2004: 2,616,605,453minutes served.6 http://eurotelcoblog.blogspot.com/2004/10/skype-billions-and-billions-served-few.html

    7 http://www.henshall.com/blog/archives/000525.html8 E-mail from Skype PR representative, 22 November 2004.9 http://research.analysys.com/default.asp?Mode=article&iLeftArticle=1777&m=&n=

  • 7/31/2019 Geddes - Stupid Network

    10/52

    10 December 2004 Page 10 of 52 Telepocalypse Ltd. 2004

    The chart below shows these control factors. Each factor is rated on two axes. Thehorizontal axis shows the degree of control the operator exerts over the pinch pointcompared to the handset vendor.

    The vertical axis determines the amount to which the factor is exploited to supportmarket and pricing power. At one extreme the user (or public) has no choice and the

    factor is exploited to the greatest possible extent to achieve price discrimination. At theother extreme, the vendor has no power over the user whatsoever.

    The shape of the factor shows the type of control handset, network, or other. Thesize of each factor indicates how important the factor is to enabling disintermediation.

    The shaded areas show the two key extremes, one where the network operator is incharge of everything (operator tyranny), and the other where the user has absolutefreedom (user utopia). Since there are many more device makers than networkoperators, users have a strong bias towards handset vendor control of features.

    Operator

    DominatesCinderella

    Cinderella

    DominatesOperator

    No user freedomOperator Tyranny

    User Utopia

    Handsetsoftwareplatform

    Handset UIconfiguration

    Layer 1-3

    Absolute user freedom

    Networkpacket flow

    Home pageURL

    Contacthandset

    Proxies &gateways

    DRMApplication

    environmentintegration

    Numbering

    Home deck

    Regulatory

    Customerdata

    Branding

    Certification

    Distribution

    Userincontrol

    Vendorincontrol

    Which vendor is more in control?

    Provisioning& Roaming

    Cinderella Tyranny

    Figure 1 - Market power map of wireless today

    It looks complex, but it isnt:

    Stuff near the bottom edge is causing the user to bleed money because of a lackof choice, control or competition.

    Stuff on the left makes the operator richer at the expense of Cinderella.

    Stuff on the right makes Cinderella richer at the expense of the operator.

    Some quick usage notes. The values are my own estimates, and reasonable people coulddisagree over the size and position of any factor. Cinderella is welcome to perform itsown analysis. The chart also aggregates positions of the two industries: Cinderella is

    taken to represent the whole handset and middleware space, and all carriers are treated as

  • 7/31/2019 Geddes - Stupid Network

    11/52

    10 December 2004 Page 11 of 52 Telepocalypse Ltd. 2004

    one. Obviously the degree of control, say, Vodafone has over its suppliers is likely todiverge greatly from that of the carriers as a whole.

    Not surprisingly, power is currently concentrated with the operators. The bottom leftquadrant is where the user has little power and the carrier is in command operatortyranny. Not shown on the chart, because they offer no control to either party, are

    functions well inside the user utopia of choice and low prices: applications, accessories,consumer magazines, etc.

    With a more detailed map of the battlefield theres less excuse for shrugging ourshoulders and accepting carriers as the king makers. We can instead start to analyse

    which carriers are in charge, how powerful they are, and where there weaknesses mightbe.

    Lets take a look at the same picture, but overlay it with the dynamics of the industry.

    Operator

    D

    ominatesCinderella

    Cindere

    lla

    DominatesOperat

    or

    No user freedomOperator Tyranny

    User Utopia

    Handsetsoftwareplatform

    Handset UIconfiguration

    Layer 1-3

    Absolute user freedom

    Networkpacket flow

    Home page

    URL

    Contacthandset

    Proxies &gateways

    DRM

    Applicationenvironmentintegration

    Numbering

    Home deck

    Regulatory

    Customerdata

    Branding

    Certification

    Distribution

    Userincontrol

    Vendorincontro

    l

    Which vendor is more in control?Provisioning& Roaming

    Cinderella Tyranny

    Figure 2 -- Dynamics of market control in wireless

    With the possible exception of DRM, pretty much everything is headed in the directionof openness. More smartphones, more Wi-Fi networks, more operating systems, morechoice of vendors, more carriers and MVNOs competing, tougher regulation, morespectrum, faster network technology.

    Now lets compare it with the wireline world. Add together the PCs, DVDs, VCRs,PVRs, phones, set-top boxes, gaming devices, Microsoft operating systems, and so on,and declare them to be the edge vendors fighting against the network operator core.

    The positions and sizes of the market control factors all move substantially. Its quite acontrast:

  • 7/31/2019 Geddes - Stupid Network

    12/52

    10 December 2004 Page 12 of 52 Telepocalypse Ltd. 2004

    Operator

    DominatesEdge E

    dge

    DominatesOperator

    No user freedomOperator Tyranny

    User Utopia

    Device

    softwareplatform

    Device UIconfiguration

    Layer 1-3

    Absolute user freedom

    Networkpacket flow

    Home pageURL

    Contactdevice

    Proxies &

    gateways

    DRM

    Applicationenvironmentintegration

    Numbering

    Regulatory

    Customerdata

    Branding

    Certification

    Distribution

    Userinc

    ontrol

    Vendorincontrol

    Which vendor is more in control?

    Figure 3 -- Market control map of wireline world

    Probably the only thing thats worse on wireline from the users perspective is regulation.

    Wireline carriers have had longer to perfect the art of regulatory capture.

    Travelling without a ticket

    The economic goal of a carrier is to extract value from communications over its networkthrough the generation of billable events. Nothing else counts. To do this, you have toprice discriminate between the messages that flow over the network. But the customersare increasing finding ways around those toll barriers. The trend has been running fordecades, but is now accelerating.

    The table below illustrates just some of the ways in which telecom customers bypasscarrier tolls. This list is by no means exhaustive. The methods highlighted in bold rely onan IP network for by-pass. Those in italics use circuit-switched telephony as thetransport.

    Service Toll gate Means of bypass Examples

    Circuitvoice

    International callinterconnect

    Calling cards IDT

    Circuitvoice

    Premium rates forcross-network calls(e.g. mobile to

    mobile)

    Prefix dialling of landlinenumbers to preserve bucket for x-net calls

    www.80550.co.uk

  • 7/31/2019 Geddes - Stupid Network

    13/52

    10 December 2004 Page 13 of 52 Telepocalypse Ltd. 2004

    Circuitvoice

    Roaming charges +handset lock-down

    Unlocked handsets and third-party prepaid SIM

    Expansys (handsets);

    www.oneroam.co.uk(SIM cards)

    Circuit

    voice

    PSTN switch VoIP + Wi-Fi Skype for Pocket PC

    Telex andtelegram

    Gateway/separatenetwork

    Fax machine N/A

    Fax PSTN switch Fax-email gateway eFax

    Fax PSTN switch Fax-IP gateway Mediatrix

    MMS forphotos

    MMS gateway Email + IP network; Filetransfer in IM applications(e.g. MSN, Skype) + IPnetwork; SMS for

    notification (check youremail); Bluetooth filetransfer; face-to-face

    viewing; sneakernet via flashmemory cards

    N/A

    SMS Mobile originatedmessage charges

    Java/Symbian application+ IP Network

    SMSSend [defunct],Agilemobile

    Ringtones Download vendingmachine

    User-created ring tones;flash memory cards orBluetooth

    Xingtone

    Push-to-talk

    Gateway/proxy Java application + IPNetwork

    FastMobile

    Disintermediation of carrier tolls is clearly more than a few isolated examples: it is apattern that practically forms a way of life for users. To complement these toll-bypassmethods, customers can also engage in lock-in bypass by getting their handsetsunlocked. There are many website that can be used to procure unlock codes for just afew euros.

    Q: How might the product and sales approach differ for a closed vs. open carrier?

    Q: How does the role of third party retailers (e.g. Carphone Warehouse) and alternativedistribution channels change with the openness of the carrier?

    Q: How do Cinderellas handset designs help or inhibit users to bypass carrier tolls?

  • 7/31/2019 Geddes - Stupid Network

    14/52

    10 December 2004 Page 14 of 52 Telepocalypse Ltd. 2004

    Part 2: Where were goingWealth Where it comes from, where it goes to

    Case Study: Dissecting SMS from an IP viewpoint

    How do IP networks enable disintermediation of carrier services and tolls? To find out,lets take apart the familiar SMS service. The goal is to understand what value the carriermight be adding. We can then start to discuss how and when the carrier might bebypassed.

    Many articles on price discrimination of IP data transport include a table along thefollowing lines10:

    Service kBconsumption

    ExamplePricing

    Revenueper MB

    SMS ringtone/logo 0.2 kB $2 (UK) $13,981

    SMS message 0.1 kB $0.15 (UK) $1,573

    Complex ringtone/logo 2.0 kB $3 (UK) $1,536

    Java download (game) 15 kB $3 (Japan) $204

    1 min voice call 144 kB $0.10 (US) $0.71

    These are very misleading because they attribute the value that comes from these servicesto the transport element alone. I could post you a box of gold and a box of manure, butthe relative transport costs tell me nothing about the postal system or the goods! Youonly learn about the value of the gold by being told about wedding social customs,mining costs, secure storage costs, central banking institutions, currency issuance andinflationary effects of competing stores of value. You dont learn anything about thoseby looking at the value of the stamp on the box. All that tells you is gold is heavy, not

    why the user paid $10,000 for it.

    IP networks help move us from a vertically integrated to a horizontally layered industry.Most of those horizontal functions have been hidden inside telcos, but are emerging asseparate industries in their own right. You can assign the value of a service to thecomponent parts of that service. (You need both an architect and a plumber to build a

    house, but you expect to pay more to the architect.)Before assigning value to functional elements of SMS, we need to know what thoseelements are. In the diagram below, Aino is sending an SMS to Bo. The key componentsof the transaction are shown: handsets, radio networks, SMS messaging centres, long-haul interconnect, home agents/HLRs, customer database, billing and policing.Remember, the customer sees no value any of these thingsper se.

    10Forget Bandwidth-Hungry Applications: Focus On Non-Voice Mobile Services That GenerateHigher Profit Margins than Voice Telephony,http://www.soundpartners.ltd.uk/article_serv_prof_article.htm. This is a truly terrible piece of analysis,and I take great pleasure in picking it apart! Until you run out of spectrum or network capacity there is

    zero marginal cost of transmission, and capacity is a sunk cost that should be ignored. $/Mb is the worstpossible metric to run a network by.

    http://www.soundpartners.ltd.uk/article_serv_prof_article.htmhttp://www.soundpartners.ltd.uk/article_serv_prof_article.htm
  • 7/31/2019 Geddes - Stupid Network

    15/52

    10 December 2004 Page 15 of 52 Telepocalypse Ltd. 2004

    SMSC SMSC

    CustomerDatabase

    Home

    Agent

    Alice Bob

    Invoice

    Figure 4Functional decomposition of SMS transmission

    Now lets take the same picture, but look at it through our polarized value glasses:

    SMSC SMSC

    CustomerDatabase

    Home

    Agent

    Alice Bob

    Invoice

    Mobility

    Transmission

    Storage

    Ubiquity Urgency

    Governance

    Relevance

    Accountability

    Universality

    Availability Delivery

    Usability

    Figure 5Value decomposition of SMS transmission

  • 7/31/2019 Geddes - Stupid Network

    16/52

    10 December 2004 Page 16 of 52 Telepocalypse Ltd. 2004

    So what does your 10 to send an SMS buy you? Where does the value come from?

    Is it the basic postage and packing charge? The ability to enter the informationinto the handset, tuned for usability? To have it transmitted and delivered?(Think of the difference between these as being between having the packagedelivered to your home address and having to collect it from the depot.)

    How much is attributable to the availability of coverage: the service comes toyou, rather than you to it? The universality of the service via interconnectagreements? The ubiquity of the receiving apparatus?

    The storage of the data sent to sometimes disconnected recipients? Theresolution ofmobility, delivering to the user wherever they may roam? (Thinkof this as the difference between a package delivered to your home address andone delivered personally to you.)

    What value is attached to the ability to cause the recipients handset to ring andvibrate, indicating urgency to the message? (Do Blackberry users have their

    devices vibrate with every email? Rarely. Why not?) Every message is billed (orsubtracts from a bucket), and thus has cost which would only be incurred if themessage has relevance. Without this, how do you know the recipient will botherreading messages?

    What if the system is abused? Somehow there has to be governance, which inturn relies on some means of tracing malicious users and accountability.

    You can almost imagine getting an itemised bill for each SMS, with sub-totals from3GPP, Verisign, NeuStar, Level 3, the FCC, Cinderella and so on.

    Decoupling the connectivity from the service as IP networks do makes it easier for

    these elements to exist as separate businesses. For some, the carrier retains a naturaladvantage. For example, every customer has a network identity, and this naturally leadsto the carrier as the supplier of digital identities. Every customer gets a bill, which makesthe carrier the natural conduit for 3 rd party charges. But others are under attack: witnessthe gradual increase in dynamic DNS services11, open ENUM registries and evencompeting name/address resolution systems like DUNDi. A better understanding of thesources of value helps Cinderella build products that compete or collaborate with carrierson the right parts of the value network.

    Cheap, open IP networks make disintermediation ofcarrier services possible, but not inevitable.

    People will continue to use SMS even when offered a free e-mail alternative. This isbecause e-mail does not have all the value attributes of SMS the customer desires (e.g.governance, ubiquity). It also lacks the economic structure that content and serviceproviders need, such as premium charges to vote in TV reality shows like Big Brother orPop Idol.

    11 A long list of providers is found athttp://dmoz.org/Computers/Software/Internet/Servers/Address_Management/Dynamic_DNS_Services/. Unlike traditional DNS, the cross-reference from domain name to IP address is not cached for

    significant periods. If I move around I can change my IP address immediately, without waiting two daysfor DNS servers all over the world to propagate my record. This comes at a cost of performance andresilience. Its less functional than mobile IP, but more than adequate for 80% of user needs.

  • 7/31/2019 Geddes - Stupid Network

    17/52

    10 December 2004 Page 17 of 52 Telepocalypse Ltd. 2004

    The disintermediation forecast

    So in this fight to extract the value from the network, who will win? Can carriers set upeffective toll booths on the wireless Internet?

    The carrier doesnt know the value of the traffic

    Telecom isnt the first network-based industry involved in the transport or transmissionof goods and services. The physical distribution networks such as canals, railroads,turnpikes, airlines or lighthouses have served the routing needs of commerce forcenturies. These have formed exquisitely complex price discrimination regimes andcounter-regulatory structures. Wont telecom go the same way?

    No. The Internet is genuinely unique, and its structure suggests these parallels will notresult in the same price discrimination architecture12. The complexity is at the edge, andis changing rapidly. That makes it hard to build pricing mechanisms into the network

    when the network has little knowledge of the application and its worth. Informationgoods lack the predictable uniformity of physical goods: a canal boat has a very narrowrange of practical uses compared to a fast Internet connection.

    The carrier cant see the traffic even when it knows the value

    Companies like pCube pride themselves on being able to identify and traffic shapeSkype packets etc. In principle, the carriers can try to identify toll-avoiding traffic ontheir packet network, and block or charge for it. But users are not passively going to paythe tolls. Applications will use non-standard ports, change the IP address of servers,encrypt or split their messages, tunnel via other protocols, and mix messages with uselesssalt data. Encryption via VPNs and Opportunistic IPsec (a feature of IPv6 replicable

    in IPv4) make the carrier even less able to enforce their pricing regimes.Do operators want to get into an arms race with their customers? Bearing in mind thelack of success of the copyright cartels13 in trimming illegal peer-to-peer networks, howlikely is it that carriers can prevent the transmission of entirely legal user-generated (anduser-copyrighted) content? Multi-region DVD players and unlocked handsets are hardlya rarity, so hardware control has a poor precedent at preventing revenue leakage.

    The carrier doesnt have anything left to charge for

    Technology is rapidly increasing available bandwidth. Lack of scarcity means lack ofeconomic rent. The biggest priority for carriers should be increasing usage, not capping

    it via high charges. Scarcity can only be artificially imposed via oligopolistic marketstructures or lobbying to exclude competition14.

    12Pricing and Architecture of the Internet: Historical Perspectives from Telecommunicationsand Transportation, August 2004. Much of this section paraphrases that report.http://www.dtc.umn.edu/~odlyzko/doc/pricing.architecture.pdf with commentary athttp://slashdot.org/articles/04/01/03/1839206.shtml?tid=126&tid=95&tid=98&tid=9913 CartelA combination of independent business organizations formed to regulate production, pricing,and marketing of goods by the members. Examples: RIAA, MPAA, Business Software Alliance.14Philly, Verizon strike WiFi agreement , MSNBC, 30 November 2004, The city of Philadelphia

    and Verizon Communications Inc. struck an agreement Tuesday that would allow the city to providewireless Internet access as a municipal service even if Gov. Ed Rendell signs legislation to give Verizon thepower to scuttle the project., http://www.msnbc.msn.com/id/6622765/

  • 7/31/2019 Geddes - Stupid Network

    18/52

    10 December 2004 Page 18 of 52 Telepocalypse Ltd. 2004

    One hole in the operators spectrum cartel is Wi-Fi; it would be no surprise to see the2.4Ghz band expand, and cognitive radios make inroads into TV UHF bands. Its just aquestion of time.

    Users wont play the game

    The users pay directly for Internet connectivity. However, most physical transportcharges are for cargo or business use that is subsequently incorporated into other goods.

    The user doesnt see the price discrimination that charges extra for a truckto cross a tollbridge compared to a car.

    Behavioural economics tells us that people react extremely negatively to pricediscrimination, and are willing to pay extra for simple prices, especially flat-rate ones.

    Most of the costs of physical transport systems were associated with the core of thenetwork. The Internet reverses this. Since the edges are paying most of theinfrastructure costs (e.g. PCs, game consoles, phone handsets), they control the system.

    Efforts to price discriminate via handset and network control can backfire, as thisreview15(and many similar ones) pans Verizons lock-down efforts:

    Verizon customers have been waiting for a phone with a feature list like thaton the Motorola V710. Unfortunately, the phone doesn't live up toexpectations. To transfer photos out to your PC, you'll have to purchase amemory card or pay to e-mail them to yourself. We think it's unfair of

    Verizon to limit the phone in that way.

    Other carriers undermine efforts to charge

    Consider a market like Denmarks with many incumbents and MVNOs. Whats thequickest and cheapest way to differentiate yourself from your competition? Make your

    network and handsets more open. Hence theres an openness ratchet effect thataccompanies increasing competition.

    It hasnt worked yet

    Efforts at price discrimination and rationing scarcity within the data transport networkhave so far met with limited success. Think of ATM, QoS, RSVP, MPLS, multicasting,congestion pricing and active networks. Not one has achieved its economic goals. Thebig growth continues to be in best-effort IP networks. The money spent on networkprice discrimination and rationing is better allocated to simply increasing capacity.

    15 PC Magazine, undated, http://www.pcmag.com/article2/0,1759,1639784,00.asp

  • 7/31/2019 Geddes - Stupid Network

    19/52

    10 December 2004 Page 19 of 52 Telepocalypse Ltd. 2004

    The only way is down

    The Vodafone Live! 3G launch explicitly says they are trying to move towards valuepricing on their network16:

    Figure 6 - Vodafone steers customers away from open Internet

    The free browsing only refers to that within the walled garden: all other packet data ischarged at premium GPRS rates. Effectively this slide states that none of the profit pool

    will be shared with the edge (i.e. customer or Cinderella).

    But it also exhibits a weakness of the carriers. The services they offer themselves areconstrained by their own general packet data pricing. They cant charge more for aservice than the equivalent packet data rate plus a mark-up for the value attributesdiscussed in the earlier dissection of SMS. If they try, and the handset and networkarent locked down, then someone will bypass them. This will drive carriers towardsmetered services that are low value/high data need, like mobile video.

    Unfortunately for the carriers, the limited nature of the handset form factor makes theseamong the less compelling applications. You can only consume so many bits per secondthrough a two inch screen. However, they could encourage massive use of bandwidthfor video and file sharing, squeezing the capacity for general packet data and creating an

    artificial scarcity into which they can sell quality-of-service guarantees for a hefty price.Cellular voice is coming close to being disintermediated17: a Vodafone UK 3G cardoffers 75Mb for 23.50, which at 5Kb/s is the equivalent of 250 minutes of talk time. A200 minute talk plan is 30/month. To make up the difference you would have to use a

    VoIP service provider, which at a blended mobile and landline rate of 5p/minute addsabout an extra 10 to the 3G cost. Clearly, their pricing structure is no accident.

    16 Taken from http://www.russellbeattie.com/notebook/1008160.html

    17 This is not to dismiss issues of quality of service and congestion; but given the marginal reputation ofwireless for signal quality customers are likely to accept richer audio codecs at the expense of momentaryglitches from packet loss.

  • 7/31/2019 Geddes - Stupid Network

    20/52

    10 December 2004 Page 20 of 52 Telepocalypse Ltd. 2004

    Should you care about carrier disintermediation?

    Yes. In monopolistic markets price discrimination reduces consumer welfare. Itdecreases usage, lowers perceived service value, and diverts the customer

    communications budgets away from the network edge. However, in competitive marketsprice discrimination works to achieve a more efficient allocation of resources18.Furthermore, it extends the market downwards: people who could not previously haveafforded the service now can, cross-subsidised by others who are paying more for thesame service. This points us to a critical lesson:

    Go downmarket where the carriers are in control.Go upmarket where the edge is in command.

    What does this mean? If the carrier has great market power and uses it to lock-downtheir devices and network, they will exercise strong price discrimination. High-endhandsets will not realise their full potential to the user: the price discrimination will erode

    perceived value. Cinderella will not achieve the anticipated premium prices. What is thepoint of Cinderella investing billions in new service-enabling features of smartphones(e.g. Symbian OS) if Vodafone, DoCoMo and friends control the profit pool?

    However, low-end users may be sucked into the market by price discrimination. Thesemight be underserved by a more traditional Cinderella handset strategy. Dont try tooffer a shrunk-down laptop computer. Instead build a vertical VoIP application into asimple handset, add smart presence features and a wideband audio codec, and make iteasy for the carrier to charge for it.

    Indeed, it may pay off to reinforce carrier control at the lower end of the market,particularly when trying to extend service into otherwise underserved or unreachable

    markets.At the low end of the handset market the carriers offer lower subsidies (theres only somuch you can knock off a $50 wholesale price.) Many phones are even sold at a profit.

    The lack of a subsidy lever weakens the carriers ability to exert control over handsetfeatures. That means whatever threatening features you do want to sneak in against thecarriers wishes are more easily done at the lower end of the market.

    Summary: Carrier in control? Forget the smartphones, keep it simple.

    The converse is where the carrier is weak and creates an open network environment.Here you do want miniaturised open computing platforms that make the most of IP. Atthe high end youll get higher margins, because the users get the full value of the product

    without artificial limitations. (People pay extra to buy unlocked phones today.)The end result might see carriers stratifying into ones centred on lower-end handsetswith fierce price discrimination, and ones supporting faster IP networks with higher-endpremium handsets.

    18Price Discrimination,http://www.tutor2u.net/economics/revision_focus_2004/A2_Price_Discrimination.pdf

  • 7/31/2019 Geddes - Stupid Network

    21/52

    10 December 2004 Page 21 of 52 Telepocalypse Ltd. 2004

    Identity and trust: linking the layers

    Identity in a nutshell

    Lets try to understand how critical identity is in the future of telecom. Thecommunications industry is slowly and painfully transforming from vertical integration tohorizontal layers. Those horizontal players then gain economies of scale within theirlayer and niche.

    The glue between these layers is identity. Cinderella must have a digital identitybusiness strategy to be successful in managing this change. Every interactionbetween the layers involves some explicit or implicit exchange of identity data about thething being exchanged. Without it, no value can flow between the layers. This is not atechnology problem.

    Economic value in identities

    We can create many types of identities: phone numbers, IP addresses, handset IMEI, e-mail address, personal domain name, account number, etc. Two key things differentiatethese identities. The first is the existence of links from the digital identity to real people,places and things. The second is the extent to which they are either explicitly revealed tothe target of the communication, or can be traced back via a third party. Does it point tosomething real? Can I find out what it points to? When an identity is offered intransaction in a way that can be traced back to someone who would suffer a loss as aresult then this identity possesses identity collateral.

    Landline connections are associated with a place. Post-paid cellular is associated with aperson through a credit check. And pre-paid cellular is associated with a device. Abuse

    could respectively result in arrest, exclusion or device deprovisioning.The value of identity collateral comes from preventing abuse rather enabling services.Telecom isnt alone in finding theres a significant profit to be made from mitigating theundesirable effects from some underlying technology. For example compare theabundance of food of modern agriculture and the diet and pharmaceutical industries thatmanage the resulting obesity. Or motor vehicles and the insurance industry19.

    The money isnt in making VoIP calls. Its in stopping unwanted ones frommaking your phone ring!

    Again this is not a technology problem. Identity creates value in specific situations.Understanding how they are related is key to making money from the disaggregated

    components of a voice call.

    Good identities cost money to make

    Whilst a carrier might spend $25bn building a network, it can also cost $5-10bn toacquire the customers and their identity data. Just because the balance sheet onlydepreciates the network doesnt mean the identity data isnt core to the operation of thatprovider. Consider the difference in fortunes of retail telecom operators (who haveidentity collateral for sale) and their wholesale dumb pipe competitors who dont.Identity is big business, just a hidden one. What about directory businesses with 50% (ormore) marginssurely theyre just sorted lists of identities?

    19 Largest US automobile insurer 2003 profit: $3.1bn (State Farm). Largest US automobile manufacturer:$3.8bn (General Motors).

  • 7/31/2019 Geddes - Stupid Network

    22/52

    10 December 2004 Page 22 of 52 Telepocalypse Ltd. 2004

    To illustrate the critical importance of identity collateral, note that Japan has recentlyflirted with an outright ban on pre-paid cellular phones20 to curb fraud and abuse.Instead they are settling for more rigorous identity checks. This administrative work willcost the carriers a lot of money. What advantage can they and the handset vendors makeout of the enhanced identity collateral?

    The carriers have a natural advantage in providing digital identity. Everyone who buys aconnection must reveal something about themselves, even if only the identity of thedevice to be provisioned to the network. Their natural advantage must be kept in mind

    when formulating competitive strategy in deploying new applications.

    Repeatthis is not a technology problem. Choosing the right identifiers is a businessissue, because they are business assets with tangible value.

    Trust the other side of identity

    Telcos are trusted by their customers in a big way: your calls arent wiretapped withoutdue authority, your call details are kept private, calls are routed correctly, caller ID

    works21

    , your voicemails are secure, you rely on the system for emergency service, and soon. With a smart network, much of that exchange of value occurs within the telcoscastle walls. This reduces the amount of trust required in the system, because noboundaries are crossed. It also reduces the cost. For example, the phone doesnt needto authenticate to the voicemail system as well as the network.

    But when you distribute these functions to the edge of the network, they start crossingtrust boundaries. If the telco just supplies connectivity, someone or something else isdoing all the above functions. Its much harder to build a trusted distributed system.

    For instance, the more recent peer-to-peer file-sharing networks have become poisonedwith deliberately mislabelled and incomplete files spread by irate rights holders.

    Napsters centralized directory architecture made it less resilient to legal attack but easierto build trust. Skype maintains a centralised authentication architecture22, despite everyother aspect of the system being distributed to the network edges.

    Some bad news: nobody I know of has really cracked the measurement and classificationof trust for public networks, or related it to the economics of communications andplaced a value on it23. Yet without trust the system collapses: it is worth hundreds ofbillions of dollars. A possible research area for Cinderella?

    One last timethis is not a technology problem. Trust is tied to branding. Brand is abusiness issue. Whose logo lights up and says trust me?

    20Japan rejects ban on prepaid mobiles, Telecom Asia, 16 November 2004,http://www.telecomasia.net/telecomasia/article/articleDetail.jsp?id=13352621 A misplaced confidence: see the tale of star38.com and the history of phone phreaking.22An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol, Salman A. Baset and

    Henning Schulzrinne, Columbia University, September 15, 2004,http://www.cs.columbia.edu/~library/TR-repository/reports/reports-2004/cucs-039-04.pdf23 Although a good starting point is at http://www.strategy-business.com/press/article/20964?pg=0

  • 7/31/2019 Geddes - Stupid Network

    23/52

    10 December 2004 Page 23 of 52 Telepocalypse Ltd. 2004

    Billing and value asymmetry

    If VoIP calls are free, why do we need billing? And without billing, what does a telcohave to offer? Here lies an unexpected source of operator power.

    The costs of network technology are decreasing, while the costs of complex billingsystems remain somewhere between amazing and extraordinary. At some point thebilling part of telecom may become a major or dominant cost compared to the network.

    A common misconception is that this is somehow ridiculous and unsustainable, and willcause a collapse of the telcos.

    This is a superficially a very attractive argument. Surely the transaction costs of anefficiently run service should always be low? Definitely. However, a communicationsservice is often partly a brokerage fee. That means some of your money is beingpassed on to a third party. Even with zero transaction costs, youll still have to pay.

    One case is where there are termination fees of some sort. This is the exception rather

    than the rule on the Internet, so until VoIP calls to Mars become a common reality, wellnot discuss it further.

    The other case where charges persist is when the caller is drawing on the resources orattention of the callee. There is some exchange of value going on, and the direction andmagnitude of the exchange are clear. Such charges are made via explicit or hiddenpremium rate tolls. Standard premium rate numbers are well known and merit nofurther discussion. The hidden ones are of greater interest, however, since they mayact as a precedent for a wide range of services in future.

    The United Kingdom has a fascinating system whereby calls to the 0870 area code24 aretied to an obsolete BT national calling rate. This rate is vastly more expensive than the

    cheap rates national calling rates available in the competitive marketoften by an orderof magnitude or more. Revenue sharing is allowed with the callee, typically at a rate ofaround 3-4p (US$0.07) per minute. In other words, this is a premium rate calling system,but with a lower price than on standard premium rate services (typically 20p-100p/minute). The low unit price is made up for with massive volume.

    This numbering scheme exists despite the 09xxx number range in theory having beenassigned as the sole means of offering premium services, and 08xxx being for non-geographic numbers (like 0800 freephone). Thousands of companies, large and small,have flocked to using these 0870 numbers for inbound calls. An airline or utilitycompany might run up hundreds of millions of minutes of use, and the revenue starts tobecome a lot of money. Indeed, according to the UK regulator between a quarter anda third of BTs metered call revenues come from 0870 (and similar) numbers25.Most companies block outgoing calls to 09xxx numbers, but not 08xxx numbers, sothere have been few barriers to adoption.

    What companies are doing is using their temporary market power over customers toextract revenue. Want to change your airline ticket? Ask some questions of the shopstaff? Complain about the goods you bought? Get ready to pay. Oh, and since there isno limit on the use of queuing systems on 0870 numbers (unlike 09xxx premium ratenumbers), the longer you wait the more you pay. Devious.

    24Other codes, such as 0871 and 0845 are also used. For simplicitys sake, we shall only refer to 0870.25 OFCOM, NTS (Number Translation Services) focus group meeting notes and action, 3 June 2004,http://www.ofcom.org.uk/ind_groups/ind_groups/telecommunications/nts_focus/notes/nts20040603

  • 7/31/2019 Geddes - Stupid Network

    24/52

    10 December 2004 Page 24 of 52 Telepocalypse Ltd. 2004

    You can expect this to spread from being an isolated example to being the norm. Forconsumer-to-consumer and business-to-business the exchange of value is not clear, andindeed minute-metered telephony is likely to disappear on both wired and wirelessnetworks. (Small businesses also look and act more like consumers than businessaccounts.) But for business-to-consumer or consumer-to-business communications this

    need not be the case. Who cares if the telemarketer calls at dinner time on yourpremium 5/minute public number?

    The lesson?

    The existence of free transport and carrier service disintermediationvia IP doesnt mean the end of billable events.

    Other variants are also possible on the charge for value exchange equation. Forexample, carriers who get user to call freephone numbers might get a finders fee on anysalethe 21st century replacement for the yellow pages, mixed in with Googles businessmodel.

    Clearly the billing capability of carriers will continue to be a source of power, and againstmuch of the punditry that just sees the Skype phenomenon and free calling for everyone.

    Understanding mediation

    Smart vs. dumb pipes

    The opposite of a dumb pipe is a smart pipe. Any smartness built into the networkbeyond simple connectivity is mediating the flow of messages, ideas and innovationbetween users and service providers and device makers. When and how do smart pipesmake sense? How is value added by mediation of data flows?

    There is no shortage of Cinderella networking products that are smart pipe elements.Think of messaging gateways, web proxies, SIP proxies, and session controllers. Thesearent merely services on a dump pipe network that handsets can choose to draw on;rather they are the only way of connecting points of the network. Their use iscompulsory.

    These indeed perform essential functions such as recording billable events, authorisation,non-repudiation of transactions, firewalling, media translations, and so on. Yet thesefunctions can be performed by an autonomous edge using alternative technologies suchas token-based micropayments, trusted computing, and P2P voice using newer codecs.

    The smart network model only makes sense in four cases, which may overlap. Getting the old and the new to work together. When there is a gap in

    technology generations, its sometimes easier to address the tyranny of theinstalled base with a smart network. For example, an analogue telephone adapterdoes this for a tone-dial phone and an IP network. Old handsets know nothingof new protocols, even if they have the CPU power and memory to speak them.

    Bleeding edge. The second scenario where smart networks win out is wherethere is technological deficiency, and the efficiency of a dumb pipe is not enoughto sustain the application. These requirements are often non-functional in nature(e.g. availability, performance, manageability, security). In this case vertical

    integration of the application with the network is justified.

  • 7/31/2019 Geddes - Stupid Network

    25/52

    10 December 2004 Page 25 of 52 Telepocalypse Ltd. 2004

    Stable applications. Where no further change is expected the application canbe vertically integrated with the network to optimise cost or performance. A

    wireless home automation system (heating, lighting, ventilation, thermostat,controls) might arguably fit this category26. The system requirements are verypredictable and stable. No need for IPv6, just a low price. This scenario is not

    typical of mobile handsets, where the user interface is soft (a screen andalphanumeric keypad).

    Where the edge is blurred. Finally, you might have a smart network where theintercept and smarts occurs on the users home turf. If the user has completecontrol over the installation and removal of the smart networking feature, there isno economic incentive to bypass it and no restriction on innovation at thenetwork edge. For example, consider a system that transparently intercepts e-mail and checks for viruses, or one that scans downloads for overbearing end-user licenses27. An interesting dilemma with this case is in the corporateenvironment where the demand for innovation by employees (e.g. using IM

    systems, Skype, etc.) may exceed the appetite for change of the infrastructureowner.

    An example of bad design and inappropriate tying of application functionality to thenetwork is Bluetooth. When the technology was conceived vertical integration mighthave been necessary. But by the time it came to market, it was an obsolete28 technologycul-de-sac29. Now its an inflexible and restricted set of capabilities where all innovationand change needs the blessing of the carriers. This is the exact opposite of the Internetphilosophy of making the connectivity as dumb as a bag of rocks.

    Recent attempts to put smart networking features into the network edge have flopped.Technologies like OPES [Open Pluggable Edge Servers] have largely disappeared fromthe map. Qualcomms EV-DV network technology is under a cloud: why include specialchannels for circuit voice alongside a packet network, when you can run everything overIP? The trend is clear: stupid networks are pushing out smart ones.

    Stages of application evolution

    Most computer applications have a rich heritage stretching back into a pre-computerisedworld: despite what Silicon Valley would have you believe, social networking didnt beginin 2003. The base capability normally goes through six stages of evolution. Theapplications core function stays constant, although the form mutates and the reach,speed and convenience increase over time. For example, the act of sending a body oftext for later delivery has been achieved through hand-delivered scrolls, the postal

    service, telegram, telex, fax, email, and SMS.The diagram below illustrates a simplified view of the stages of evolution of every classof communications application. Voice calling is used to illustrate the stages. In realitythere is overlap of the stages, jumping of stages, grey areas between stages, concurrenttransition of several stages, and even occasional regression (e.g. Napsters closure).

    26 Proponents of ZigBee and related wireless networking standards might disagree with this example.

    27 http://www.freedom-to-tinker.com/archives/000478.html28 http://www.hyperorg.com/blogger/archive/2002_07_01_archive.html#8521508029 http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2913885,00.html

  • 7/31/2019 Geddes - Stupid Network

    26/52

    10 December 2004 Page 26 of 52 Telepocalypse Ltd. 2004

    Works onIP, meetsuser needs

    Needs adedicatednetwork

    Works on IP,some loss offunctionality

    Nobody canbuild it yet

    5

    2

    3

    P2P IPapplication

    1

    4

    ?

    Vonage,Cisco SIP phone

    Net2Phone,Yahoo! IM voice chat

    AT&TMa Bellera,Cellular voice

    1876

    1996

    2000

    2003

    6

    Integratedplatform

    Skype,Peerio

    2005

    Service

    ProductFeatu

    re

    Figure 7Evolution of communications applications

    The descent down the chain is a result of economics, not technology. A smart vertically-integrated network lets you meter value and discourages innovation, and thus encouragesusers by-pass it using IP. The operator of centralised IP infrastructure will seekeconomic rent, again driving traffic towards peer-to-peer. A sole supplier of anapplications user interface gains market power, and the user interface gets stripped offleaving the bare underlying platform. Finally that becomes an open source platform, andnobody makes any money from the basic application service any more.

    The last stage hasnt happened yet on voice calling. In this sixth stage, instead of acommon application (e.g. POTS, Yahoo! Messenger, Skype) and user interface, anapplication platform with many services built on top comes to dominate. It hashappened with stored media distribution already: more than 50% of P2P traffic is fromBitTorrent, eclipsing the previous generation of vertically integrated IP applications,KaZaA and eDonkey. The recently released APIs from Skype are a first step30.

    The first ever Motorola cellular call in 1973 was a transition from stage 1 to stage 2.Internet Protocol wasnt standardised until 1981, so that was as far as it was going to go.

    Current 2G and 3G handsets rely on a portal and/or web proxy infrastructure to gateaccess to premium content centralised stage 4 technology. Future DRM technology

    would move that functionality into the handset, at a cost of extra memory and

    30 For the observant, note that SIP is a protocol, not a platform. Skype APIs provide you access to a

    specific operational infrastructure. SIP might be used as plumbing between the components of theplatform, which perform specific functions for particular owners. But SIP isnt a platform, and the futureplatform(s) for VoIP are still in play.

  • 7/31/2019 Geddes - Stupid Network

    27/52

    10 December 2004 Page 27 of 52 Telepocalypse Ltd. 2004

    management. Super-distribution of encrypted content is then possible via multiplesystems including P2P.

    Peerios technology allows peer-based storage of files including fragmented andencrypted voicemails. Your desk phone, and all your colleagues desk phones, togetherstore multiple copies of your voicemail. You no longer need a central voicemail server.

    This is also an example of a transition from stage 4 to stage 5. Their APIs are acontender for being the stage 6 platform.

    Services, products and features

    Voice calling is turning from a service into a product, and then from a product into afeature of a larger communication and collaboration system:

    You pay for a service on a recurring basis. This is either metered (depending onhow much you used) or flat-fee (usually with a slight price premium againstaverage usage to reflect the user value of predictable charges).

    A product is a one-off buy, like a SIP adapter box and a telephone. If it works asadvertised, you buy two Peerio phones, plug them in, and get voicemail andcalling without any service provider needed.

    The feature of speak to someone not physically present is being subsumed intolarger systems like Xbox Live, Skype, or Yahoo! Messenger in conjunction withpresence, collaboration, workflow, group forming and vertical applicationfeatures. These have very diverse business models.

    This is both a threat and an opportunity to Cinderella. Handsets are products, anddiverting service revenues into handsets is clearly desirable. Being just a feature of abigger picture is a mixed blessinggood if youre successful at doing alliances, bad if

    someone else takes control of the profit pool (the bogeyman usually being Microsoft).At the same time, as we saw in the SMS example, components of the voice callingapplications may become spun out. These in turn can become services, products orfeatures. Digital identity will remain as a service. Ubiquity might be associated with theproduct (e.g. leveraging Cinderellas x% market share to create a faceplate market).Storage of messages becomes a feature of a device, not a network service.

    No magic in Internet Protocol

    A quick but vitally important lesson. When someone says theyve got a strategy to moveto an all-IP architecture, keep probing. What you want to know is whether theirarchitecture still has application processing embedded in the network itself, and if so

    what their justification is. Its still possible to build a smart network using dumb pipes,thus recreating all the inflexibility of the circuit-switched world.

    Just because its on Internet Protocol doesnt mean its done right.

    Do you really need a SIP proxy? A session border controller? A media gateway? Atraffic shaper? Whats the price in terms of flexibility of the solution? Is the solution fullof mediation, but just shifted to an IP platform?

    Skype has equivalents to all these functions, but not implemented as $500,000 boxes soldto telcos. Given Skype works and scales, how much value are these products adding?

  • 7/31/2019 Geddes - Stupid Network

    28/52

    10 December 2004 Page 28 of 52 Telepocalypse Ltd. 2004

    Winners and losers

    The billion-dollar question: who gets the prizes from the transition to open IP networkswith open devices? The following table assumes such a transition occurs, and makes

    some educated guesses as to who the winners and losers might be31

    . Note that winnerand loser are the relativechanges as a result of such a shift. Some of these sectors maybe excellent or poor business prospects regardless of the direction of change.

    Who Examples Winneror Loser

    Why?

    Handset OEMs& ODMs

    Flextronics,Compal

    Winner More change and innovation at the edge shortensreplacement period. Dont carry marketing costs,inventory risk, etc. in times of rapid change.

    Componentmanufacturers

    SkyCross, TexasInstruments

    Winner Fortunes tied to that of handset OEMs.

    MNVOs Virgin Mobile Winner Innovation in sales and distribution likely to bemore critical than product innovation for retail ofaccess services.

    Applicationdevelopers

    Jamdat Winner Massive amount of unrealised innovation potential;sticky applications with increasing returns to scalefrom community use and group forming

    Software vendors Microsoft Winner Dominance of platform over pipe; localisation andapplication testing/certification.

    Media contentcreators

    Disney Losers? No news that peer-to-peer is a problem. Possibilityof big wins later with service-oriented businessmodels (e.g. selection of music of likely interest)

    Aggregators andpublishers

    Handango Winners Increased choice requires middleman to help filterand perform QA.

    Access networkoperators

    DoCoMo,Vodafone

    Losers Unable to retain consumer surplus, facilitiescompetition, regulation.

    Long-haul datanetworkoperators

    Level 3, GlobalCrossing

    Winner Open IP access networks will spur additionaldemand. Low margin, high volume, predictableprofit; exclusive rights-of-way (road, railway,pipeline, pylons) form barriers to entry.

    Networkequipment

    vendors

    Lucent, Nortel Mixed Continued destruction of traditional switch andPBX business, but increased layer 1 and 2 sales

    IndependentRetailers

    Carphonewarehouse

    Winner Likely to offer better deals than retailers tied to onenetwork

    31 Cinderella is deliberately not in this list; whilst it is part OEM/ODM, it also performs value chainorchestration that cant be summarised so simplistically. Overall, Cinderellas a winner.

  • 7/31/2019 Geddes - Stupid Network

    29/52

    10 December 2004 Page 29 of 52 Telepocalypse Ltd. 2004

    Timeline

    As you can see from the evolution of voice calling, change is rapid through the last fewstages. How soon can Cinderella expect to wait before the floodgates of wireless IP

    connectivity are opened?Lets take a look at the key ingredients:

    Technology. Fast low-latency symmetric IP networks are coming on stream32.Flarion, IP Wireless, and Wi-Fi are here now. WiMAX, as long as I stays thecourse, will arrive in 2005 for large-scale deployment in 2006/7. Its close cousin,802.20, is on a similar timescale. The 802.22 standard will allow re-use of TVspectrum for IP networks. The team has just started work and might deliveruseable hardware in 2-3 years. Scaling of mobile mesh networks is still a basicresearch problem.

    Regulation. The FCCs Spectrum Policy Task Force issued its initial report onreform in 2002, and continues to modernise US spectrum policy. The UKsOFCOM has expanded unlicensed wireless spectrum by 50% in its Q4 2004review. The Norwegians have just auctioned off 3.5GHz for IP wireless.

    Operators. Nextel are flirting with a Flarion roll-out in the US, and even thesecond-rate alternatives (EV-DO, HDSPA, EDGE) are good enough for VoIP,even if the scaling characteristics and latency are lousy. Some are waking up tothe reality that they really are just going to be a bit pipe33.

    Customers. VoIP is transitioning from early adopters to early majority. Thechasm is being crossed. Theyre used to IP applications on the wired Internet.

    Theyre ready.UMTS may be a dead-end: its stuck in a world of distributing stale packaged mediacontent over asymmetiric links that dont cope well with bursty two-way IP traffic. In abid to maximize bits per hertz and peak throughput its lost sight of the users needs: lowlatency, low jitter, low channel access times, predictable throughput, symmetric. Morebandwidth comes last after all of those.

    Metro Wi-Fi is a big deal, with a real addressable market by 2006-7. Wi-Fi in the homeand enterprise is a reality already. The time to act is now.

    However, to do a rigorous analysis of the changes in operator control and IP networkdeployment would require a data collection effort beyond the scope of this paper.

    Q: As new applications are embedded in handsets, which of the value components from theSMS example might be overlooked? How can Cinderella gain advantage by fixing these?

    Q: How easily can users track their data use on Cinderella devices? Does this matter?

    Q: What are the circumstances where people coulduse their mobile phone but choose to usean alternative service (e.g. landline phone, e-mail)? What features might be added to ahandset to enable greater price discrimination in such situations in favour of the handset?

    Q: What would the effect on Cinderella be if SPIT (Spam over Internet Telephony) becomescommon? How could Cinderella phones be made more attractive to users, or less likely to be

    32 The Qualcomm EV-DO roadmap fails to make the grade: too much latency, poor reverse link scaling,highly asymmetric.33 http://eurotelcoblog.blogspot.com/2004/12/japan-gets-it-one-of-my-japanese.html

  • 7/31/2019 Geddes - Stupid Network

    30/52

    10 December 2004 Page 30 of 52 Telepocalypse Ltd. 2004

    associated with outgoing nuisance messaging? How might that affect Cinderellas brandpositioning?

    Q: Open Wi-Fi access points are common in the USA and Europe. What are the implicationsfor identity collateral? What is the likely future of this situation?

    Q: What current Cinderella features are being used in a B2C or C2B context where there

    might be a mismatch between the value received and the payment made? Whatopportunities exist to create such services?

    Q: Which Cinderella products (network as well as handset) are associated with which stagesof application development? What technologies might threaten them? How mightCinderellas product portfolio look in 5 years from now measured on this scale?

    Q: What happens to operator handset subsidies on all-IP networks? Do operators subsidizehandsets more in order to retain control over them? Or do they find it impossible as marginsare squeezed, and users buy open/unlocked handsets to avoid carrier tolls? Who stands togain from an open environment and might become an alternative source of subsidy?

    Q: If the current circuit-switched cellular voice network didnt exist, and we suddenlyinvented fast IP-based networks, what would the services look like when freed from pastdesign constraints? Would British callers always send you their current weather along withthe caller ID? Would we start or end calls, or just fade in and out multiple audio streams,some of which would be like a baby monitor or TV in the background?

  • 7/31/2019 Geddes - Stupid Network

    31/52

    10 December 2004 Page 31 of 52 Telepocalypse Ltd. 2004

    Part 3: How to get thereSex Survival of the fittest

    Now for the meat: what Cinderella needs to do to appeal to todays operators andtomorrows users. How does Cinderella avoid losing at football when playing against thebigger kids?

    Support to the winning side

    The natural reaction to a threat from the Vodafones of the world is either to fight (e.g.by trying to appeal directly to the end user) or flee (do Vodafones bidding). But arethere other options worth considering? Yes, definitely. There are some compelling, ifunglamorous, opportunities to differentiate Cinderella from other handset manufacturersand increase appeal to the carrier distribution channel.

    Core tooperators

    business

    Network service customeracquisition & retention

    Billing

    Customer care

    Logistics

    Partnerships & alliances

    Default applications andsettings

    Branding

    Look & feel

    Retail distribution

    Peripheral tooperators

    business

    Personalised settingsselected by user

    Third party accessories

    Management of user-generated content (e.g.photos)

    Media content (e.g. newsclips)

    Non-billable services (e.g.built-in games, addressbook sync)

    Operating system

    Handset form factor

    Development platform

    Developer program

    UI framework

    Handset customer acquisitionand retention

    Peripheral to Cinderellasbusiness

    Core to Cinderellasbusiness

    Cinderellas product handset innovation is currently focused on quadrant C. Incombating the threat from carriers attention normally gets focused on quadrant B. Butthis fight over control is a win/lose proposition, and Cinderella might be the loser. Abetter approach in the short term is quadrant A, the win/win space. Cinderella can makethe carrier happier in ways that dont hurt Cinderella. Lets look at how by examininghow carriers make and lose money.

    A B

    C

  • 7/31/2019 Geddes - Stupid Network

    32/52

    10 December 2004 Page 32 of 52 Telepocalypse Ltd. 2004

    Service

    revenues

    Hardware:Network, spectrum,handsets

    Customeracquisition &retention

    Customercare

    Figure 8 -- Abstract financial view of a carrier

    Theres not a lot Cinderella can do about the hardware platform costs of carriers, bargiving its own products away for free. But there is a lot that can be done elsewhere.

    To stimulate your thinking here are some examples of innovations Cinderella couldengage in.

    To increase service revenues:

    Increase impulse buying of MMS messages by adding one-click send of photosto most common/likely recipients.

    Increase SMS to voice call up-sell by adding message at bottom of SMS displayPress TALK to call Jukka Tolonen.

    Likewise from voice to video call, or voice call to 800 number to an m-commercetransaction.

    Birthday marked in the calendar? An anniversary? Remind them to call!

    Dont make users remember top-up call numbers, directory enquiries, etc. Etchthem on the back of the phone.

    Add features that actively enable carriers to perform price discrimination. Thiscould be as simple as handsets flagging discounts at certain periods to particularindividuals for named services (e.g. MMS). (Discounting a high standard price iseconomically the same as raising a low standard price at other times, but theframing makes a world of difference in customer acceptance.)

    Create handset environments and content vending services that serve toobfuscate real prices through mechanisms such as loyalty points.

    Increase pre-paid top-up frequency and amount. Remind the user to top-up.

    Pitch offers. Increase carrier free cash flow.

  • 7/31/2019 Geddes - Stupid Network

    33/52

    10 December 2004 Page 33 of 52 Telepocalypse Ltd. 2004

    To decrease customer acquisition & retention costs:

    Enable viral customer acquisition (e.g. SIM cards that can support multiplecarriers and encourage on-the-spot switching, customers can message coupons toeach other).

    Make handsets that encourage on-net calls by highlighting callers with on-net callrates. Make customer fear cost of off-net call rates if switching.

    Build RFID tags into handsets for stock tracking.

    To decrease customer care costs:

    Turn the home screen into a trouble ticket tracking facility; avoid customerscalling in for status updates.

    Make the phone and network elements more aware of network congestion,decrease support calls about service quality.

    Distribute a how to DVD with each new phone introducing the key features.Im sure the collective intellect of Cinderella can come up with much better examplesthan the few I have thought up. The key thread is that these all treat the carrier as thereal customer, with (on average) no loss of welfare to the end user in theirimplementation. This has the additional benefit of sweetening some bitter pills thatCinderella might try to feed to operators.

    Dont play with their network ball

    So weve rejected a head-on assault on carriers, and looked at ways of putting some

    lipstick on the operator-controlled pig. What other alternatives are there in dealing withoverbearing carriers and a lack of open IP networks? Well, you cant lose at football ifyou play tennis insteadjust play a different game to the carriers.

    Theres a world of communications over short distances that is unappealing to carriersbecause it doesnt fit their business model of building networks and creating billableevents. This would include gaming over IR or RF links, Toothing, picture exchange,contact swapping and comparison, m-payments, proximity adverts, and security IDsystems. What are the untapped social and commercial opportunities of RFID, andother near-field RF34? How much priority do these receive in Cinderella today comparedto more traditional network-centric investments?

    Cinderella is already experimenting with adding non-network features such as haptic(touch) interfaces to devices to help differentiate them35. Weve seen hand-waving LEDmessage boards36. The ultimate in new features is to import the whole functionality ofother devices into converged handsets. Weve already seen MP3 players, satellite37 andFM radio, and games consoles take this route. They only avoid the carrier bottleneck tothe extent that the content is delivered by means other than the carrier network.

    34 For more examples see http://www.cioupdate.com/trends/article.php/3442591

    35 http://www.thefeature.com/article?articleid=101249&ref=11558418e2a754cab1315d2193ddc3b9::342736 http://www.smartmobs.com/archive/2004/05/31/wave_messaging.html37 http://www.engadget.com/entry/1234000660022392/

  • 7/31/2019 Geddes - Stupid Network

    34/52

    10 December 2004 Page 34 of 52 Telepocalypse Ltd. 2004

    Be the best footballer

    I could flatter myself by suggesting Cinderellas already got a better team physiotherapistby hiring me. But then how to play superior football against a strong opposition?

    Assume theres a growing world of open networks on which to deploy innovative IPapplications. What are the likely criteria for success? No doubt Cinderella has receivedendless excellent external and internal advice on this matter, and it is with somereservation I submit my own thoughts. Based on my reading, winners are more likely toemerge if they align with the following interlinked trends. But that doesnt excludesuccess coming from other directions.

    Trend #1: Communication over content. If you havent read the seminal paperContent is Not King38 then I suggest you make it your