This article may require copy editing for grammar, style, cohesion, tone, or spelling.(November 2024) |
In the United States, the Federal Communications Commission Computer Inquiries were a trio of interrelated FCC Inquiries focused on problems posed by the convergence of regulated telephony with unregulated computing services. These Computer Inquiries created rules and requirements designed to prevent cross subsidization, discrimination, and anti-competitive behavior from companies such as Bell Operating Companies (BOCs) to enter the enhanced services market. [1]
In the 1960s, the Federal Communications Commission (FCC) awoke to the reality of powerful computers running communications networks, and communications networks over which humans interacted with really powerful computers. [2] In 1966, the FCC was interested in the difference between computers that facilitate communications and computers with which people communicate. The FCC had to make a decision on whether both of these types of computers should be regulated as a basic phone service. [2] "The task before the FCC was the nature and extent of the regulatory jurisdiction to be applied to data processing services; and whether, under what circumstances, and subject to what conditions or safeguards, common carriers should be permitted to engage in data processing." [3] To answer these questions, the FCC launched the first Computer Inquiry. [4]
In the 1960s the FCC faced a problem with existing regulated communication networks, such as AT&T who offered basic communication service. [5] Companies such as AT&T found a way to add computers to the ends of these existing networks by layering protocols on top of the network to achieve data processing. [2] These enhancements, if left unregulated, threatened the growth of these services. [2] In 1970, the FCC made its first attempt at dividing the computer world into two categories: computers that ran communication networks and computers at the end of telephone lines that people interacted. [2] "The division was technological, focused on computer processing, attempting to divide the difference between circuit or message switching and data processing." [6] This division by the Commission were either called "pure communications" or "pure data processing." [7]
If a message is sent from one location to another and it does not change, the FCC defined it as pure communication. [2] On the other hand, if changes or processing happens at the end of phone line, the FCC defined it as pure data processing. [2] In pure data processing, the computer processes the information and determines if it is a circuit or message-switching. [3] Also, in pure data processing the computer processes the information by using storing, retrieving, sorting, merging or calculating data functions based on how the computer is programmed. [3] Some computer processing, however, uses both pure communication and pure data processing. The FCC was not too sure how to handle these situations and created a third category known as hybrids. [3] Hybrid cases were considered a gray area, and the FCC planned to resolve these gray services on case-by-case basis. [8] The FCC determined if there is more communications, then it was communications; if it was more data processing, then it was data processing. [4] Hybrid cases became Computer Inquires I's undoing as it did not clearly define pure and data communications. [2]
Pure communications and pure data processing have very different characteristics that led to different policy results. [2] The markets that the technology existed on assisted the FCC make its policy decisions. "The pure data processing market was viewed as an innovative, competitive market with low barriers to entry and little chance of monopolization." [2] The FCC established that no additional regulation or safeguards where required for the pure data processing market. [9] The pure communications market on the other hand was being managed by an incumbent monopoly. [2] The FCC had four concerns about the incumbent telephone companies which were: "the sale of data processing services by carriers should not hurt the provision of common carrier services, the costs of such data processing services should not be passed on to telephone rate payers, revenues derived from common carrier services should not be used to cross subsidize data processing services, and the furnishing of such data processing services by carriers should not hurt the competitive computer market." [8]
With concerns relating to communication facility, the FCC developed its "Maximum Separation" safeguards. [2] The FCC made it so that if carrier wanted to enter the unregulated data processing market they could only do so by going through a fully separate subsidiary. [3] The separate subsidiary needed to have a separate data processing corporation, accounting books, offices, personnel, equipment, and facilities. [3] The carrier also could not use the separate subsidiary to promote their data processing services, use network computers for non-network purposes, or use network computers during peak hours to provision data processing services. [8]
In 1976, the FCC was astounded by the number of hybrid cases that used both "pure communication" and "pure data processing" thus leading to the launch of the Second Computer Inquiry. [10] After Computer I took effect, new technological developments in the telecommunications and computer industries exposed flaws in its definitional structure approach to evaluating the "hybrid category". [11] Dumb terminals had become smart, the cost of computer processing units (CPU's) dropped, logical networks overlaying physical networks, and microcomputers made their appearance that set the stage for the scrapping of Computer Inquiry I. [6] The Commission's situation was "more complicated" and eventually led to the birth of the basic versus enhanced services dichotomy. [6] This established a division between “common carrier transmission services from those computer services which depend on common carrier services in the transmission of information.” [6]
If a carrier offers a pure transmission over a path that is transparent in terms of its interaction with customer supplied information, the FCC considered this to fall into the basic service category. [6] [12] Basic service includes processing the movement of information and computer processing, which includes protocol conversion, security, and memory storage. [11] The category of basic service is everything from "voice telephone calls" to a phone company's lease of private lines. [13]
If a carrier offers services over common carrier transmission facilities that employ computer processing applications that act on the format, content, code, protocol or similar aspects of the subscriber's transmitted information; provide the subscriber additional, different, or restructured information; or involve subscriber interaction with stored information, the FCC consider this to fall into the enhanced services category. [13] The Commission found that e-mail, voice mail, the World Wide Web, newsgroups, fax store-and-forward, interactive voice response, gateway, audiotext information services, and protocol processing are enhanced services. [14]
The FCC did not want to fall into the same trap as they did with Computer Inquiry I and having a hybrid category. They wanted to make sure that every application fell into either the basic or enhanced service. "The Commission made the classification dependent upon the nature of the activity involved." [6] The nature of the activity involved would determine if it fell into the communications or data processing service. [10] This changed the process from an examination of the technology to an examination of the service provisioned. [10]
To eliminate the hybrid cases in the basic versus enhanced dichotomy the FCC designed a "bright-line test" [6] The FCC bright-line test defined enhanced services as anything more than the transmission capacity of basic service." [15] A three prong test was also established to test enhanced services. [15] The three prong test "employs computer processing applications that: act on the format, content, code, protocol or similar aspects of a subscriber's transmitted information; provide the subscriber additional, different, or restructured information; or involve subscriber interaction with stored information." [15] "The enhanced service is layered on top, creating a new service for the edge user." [10] "The image the Commission has at this time is of enhanced service providers (“ESPs”) acquiring basic services, adding enhanced services, and then selling the bundled service to consumers on a resale basis." [10]
If a regulated service uses a traditional telephone service and it does not change the fundamental character of the telephone service, the FCC considered it as an Adjunct service. [16] An example of this would be directory assistance. Directory assistance provides a phone number that uses a telephone network. Directory service is characterized as a basic service, which does not transform into an enhanced service. [15]
In 1985, the FCC launched the last phase of regulations, Computer Inquiries III prior to the deployment of the Internet to the consumer. [2] Computer Inquiries II established the basic and enhanced service dichotomy, but Computer Inquiries III kept the policy objectives the same while changing how these services were implemented. [2] The Computer Inquiries III wanted to make sure that the separate subsidiary requirements of Computer Inquiry II did not have additional costs to the public with decreased service and innovation by Bell Operating Companies (BOCS) from using existing regulated operations to benefit from the unregulated enhanced services. [11] The FCC found that the cost of structural separation was more important than not having nonstructural safeguards in place for the Enhanced Service Providers (ESPs) by the BOCs. " [17] These separate structural subsidiaries were not required to be set up by the BOCs if they were moving from a structural safeguard to non-structural safeguard. [17] To set up these safeguards the FCC created two non-structural safeguards called the Comparatively Efficient Interconnection ("CEI") and Open Network Architecture ("ONA"). [2]
The BOCs to solve the non-structural separation for entering into enhanced services created a temporary solution called the Comparatively Efficient Interconnection (CEI). [2] The CEI allowed BOCs to enter the enhanced service market on a non-structural basis. This allowed the ESP to integrate with the BOC and the separate subsidiary was no longer needed. [17] Under current rules, the FCC permitted the company to post their CEI plans on the company website. [18] The following information must be included in the CEI plan: information on interface functionality, unbundling of basic services, resale, technical characteristics, installation, maintenance and repair, end-user access, CEI availability, minimization of transport costs, and recipients of CEI." [19] The CEI plans were used to make sure that if a BOC had terms and conditions with an affiliated ESP’s they would provide the same provisions to non-affiliated ESP’s. [2] This was intended to provide ESPs equal access to basic services that the BOCs use to provide their own enhanced service. [2]
The second safeguard that the FCC introduced required BOCs to break their networks into “basic building blocks” and make those available to ESPs to build new services, which became known as the Open network architecture (ONA) [17] The basic service offering by the BOCs were to be broken apart to help the ESP market. [2] The building blocks would be divided by the BOCs as follows: Basic Service Elements, Basic Serving Arrangements, Complimentary Network Services, and Ancillary Network Services. [20] Even if a BOC did not want to enter the ESP market they were required to file with the FCC their ONA plans. [21] If the BOCs successfully filed an ONA plan with the Commission, it would then be permitted to provide integrated ESP services without filing a CEI plan. [22]
The Computer Inquiries III provided safeguards that fell upon different entities into the following categories: annual ONA reporting, network information disclosure, cross-subsidization prohibitions, accounting safeguards, and customer proprietary network information. [9]
In 1989, the FCC created a reporting structure that the BOCs are required to file quarterly, semi-annual, and annual reports for their ONA that include the following information: "annual projected deployment schedules for ONA service, by type of service (BSA, BSE, CNS), in terms of percentage of access lines served system-wide and by market area; disposition of new ONA service requests from ISPs; disposition of ONA service requests that have previously been designated for further evaluation; disposition of ONA service requests that were previously deemed technically infeasible; information on Signaling System 7 (SS7), Integrated Services Digital Network (ISDN), and Intelligent Network (IN) projected development in terms of percentage of access lines served system-wide and on a market area basis; new ONA services available through SS7, ISDN, and IN; progress in the IILC (now NIIF) on continuing activities implementing service-specific and long-term uniformity issues; progress in providing billing information including Billing Name and Address (BNA), line-side Calling Number Identification (CNI), or possible CNI alternatives, and call detail services to ISPs; progress in developing and implementing Operation Support Systems (OSS) services and ESP access to those services; progress on the uniform provision of OSS services; and a list of BSEs used in the provision of BOC/GTE's own enhanced services." [9] "In addition, the BOCs are required to report annually on the unbundling of new technologies arising from their own initiative, in response to requests by ISPs, or resulting from requirements imposed by the Commission." [9] As of February 2011, the FCC to better serve the public interest have temporarily waived the reporting of these ONA reports to eliminate added expenses to the BOCs in preparing these reports. [23] [24]
Carriers are required by the FCC to disclosure to the public all information relating to network design and technical standards and information affecting changes to the telecommunications network which would affect either inter-carrier interconnection or the manner in which customer-premises equipment is attached to the interstate network prior to implementation and with reasonable advance notification. [25] This information is called Network Information Disclosure and is set in 47 CFR 51.325 through 51.335. [25] These procedures require public notice by the carrier if changes are made to the network that would cause it to be unavailable with another service provider or affect a provider's performance. [26] If network changes are made the carrier must provide references to technical specifications, protocols, and standards regarding the transmission, signal, routing, and facility assignment as well any new technology or equipment that may affect the connection to the consumer. [26]
A carrier may not use services not subject to competition to subsidize a service that is subject to competition, if they do the FCC consider it as cross-subsidization prohibitions. [25] An example of this would be a carrier could not fund their Internet services from a noncompetitive local telephone revenue. [25]
The FCC created a series of accounting safeguards that can be found in Subpart I of Part 64 of Title 47, Code of Federal Regulations. [27] Annual independent audits are performed to ensure certain carriers are not improperly cross subsidizing their services. [27] The final reports of these independent audits are publicly available and can be obtained by contacting the Accounting Safeguards Division of the FCC’s Common Carrier Bureau. [27] The FCC provides information about Common Carrier account on their ARMIS database on their website. [28]
The FCC needed to create restrictions on BOCs to gather sensitive information from their subscribers. This safeguard to protect subscriber's information has become known as the Customer Proprietary Network Information (CPNI). [29] The FCC require carriers to provide any customer proprietary network information available to the public on the same terms and conditions of the affiliated ESP if requested. [30]
In 1996, Congress passed the new Privacy of Customer Information provision, codified as Section 222 of the Communications Act. [31] Under this section 222 Customer Proprietary Network Information (CPNI) is defined as "information that relates to the quantity, technical configuration, type, destination, location, and amount of use of a telecommunications service subscribed to by any customer of a telecommunications carrier, and that is made available to the carrier by the customer solely by virtue of the carrier-customer relationship; and information contained in the bills pertaining to telephone exchange service or telephone toll service received by a customer of a carrier, except that such term does not include subscriber list information.
Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the digitalised circuits of the public switched telephone network. Work on the standard began in 1980 at Bell Labs and was formally standardized in 1988 in the CCITT "Red Book". By the time the standard was released, newer networking systems with much greater speeds were available, and ISDN saw relatively little uptake in the wider market. One estimate suggests ISDN use peaked at a worldwide total of 25 million subscribers at a time when 1.3 billion analog lines were in use. ISDN has largely been replaced with digital subscriber line (DSL) systems of much higher performance.
In telecommunications, a customer-premises equipment or customer-provided equipment (CPE) is any terminal and associated equipment located at a subscriber's premises and connected with a carrier's telecommunication circuit at the demarcation point ("demarc"). The demarc is a point established in a building or complex to separate customer equipment from the equipment located in either the distribution infrastructure or central office of the communications service provider.
Digital subscriber line is a family of technologies that are used to transmit digital data over telephone lines. In telecommunications marketing, the term DSL is widely understood to mean asymmetric digital subscriber line (ADSL), the most commonly installed DSL technology, for Internet access.
In telecommunications, and in the context of Federal Communications Commission's (FCC) Computer Inquiry III, Open network architecture (ONA) is the overall design of a communication carrier's basic network facilities and services to permit all users of the basic network to interconnect to specific basic network functions and interfaces on an unbundled, equal-access basis.
Telephony is the field of technology involving the development, application, and deployment of telecommunications services for the purpose of electronic transmission of voice, fax, or data, between distant parties. The history of telephony is intimately linked to the invention and development of the telephone.
Voice over Internet Protocol (VoIP), also known as IP telephony, refers to a set of technologies used for voice communication sessions over Internet Protocol (IP) networks, such as the Internet. VoIP enables voice calls to be transmitted as data packets, facilitating various methods of voice communication, including traditional applications like Skype, Microsoft Teams, Google Voice, and VoIP phones. Regular telephones can also be used for VoIP by connecting them to the Internet via analog telephone adapters (ATAs), which convert traditional telephone signals into digital data packets that can be transmitted over IP networks.
Enhanced 911 is a system used in North America to automatically provide the caller's location to 911 dispatchers. 911 is the universal emergency telephone number in the region. In the European Union, a similar system exists known as E112 and known as eCall when called by a vehicle.
In telecommunications, broadband or high speed is the wide-bandwidth data transmission that exploits signals at a wide spread of frequencies or several different simultaneous frequencies, and is used in fast Internet access. The transmission medium can be coaxial cable, optical fiber, wireless Internet (radio), twisted pair cable, or satellite.
In telephony, the demarcation point is the point at which the public switched telephone network ends and connects with the customer's on-premises wiring. It is the dividing line which determines who is responsible for installation and maintenance of wiring and equipment—customer/subscriber, or telephone company/provider. The demarcation point varies between countries and has changed over time.
A voicemail system is a computer-based system that allows callers to leave a recorded message when the recipient has been unable or unwilling to answer the phone. Calls may be diverted to voicemail manually or automatically. The caller is prompted to leave a message and the recipient can retrieve the message at a later time.
Telephone slamming is an illegal telecommunications practice, in which a subscriber's telephone service is changed without their consent. Slamming became a more visible issue after the deregulation of the telecommunications industry in the mid-1980s, especially after several price wars between the major telecommunications companies. The term slamming was coined by Mick Ahearn, who was a consumer marketing manager at AT&T in September 1987. The inspiration for the term came from the ease at which a competitor could switch a customer's service away from AT&T by falsely notifying a telephone company that an AT&T customer had elected to switch to their service. This process gave AT&T's competitors a "slam dunk" method for the unauthorized switching of a customer's long-distance service. The term slamming became an industry standard term for this practice.
Local number portability (LNP) for fixed lines, and full mobile number portability (FMNP) for mobile phone lines, refers to the ability of a "customer of record" of an existing fixed-line or mobile telephone number assigned by a local exchange carrier (LEC) to reassign the number to another carrier, move it to another location, or change the type of service. In most cases, there are limitations to transferability with regards to geography, service area coverage, and technology. Location Portability and Service Portability are not consistently defined or deployed in the telecommunication industry.
A mobile virtual network operator (MVNO) is a wireless communications services provider that does not own the wireless network infrastructure over which it provides services to its customers. An MVNO enters into a business agreement with a mobile network operator to obtain bulk access to network services at wholesale rates, then sets retail prices independently. An MVNO may use its own customer service, billing support systems, marketing, and sales personnel, or it could employ the services of a mobile virtual network enabler (MVNE).
Customer proprietary network information (CPNI) is the data collected by telecommunications companies about a consumer's telephone service. It includes the time, date, duration and destination number of each call, the type of network a consumer subscribes to, and certain other information that appears on the consumer's telephone bill. CPNI may also include account/subscriber information such as the number of lines.
A naked DSL, also known as standalone or dry loop DSL, is a digital subscriber line (DSL) without a PSTN service — or the associated dial tone. In other words, only a standalone DSL Internet service is provided on the local loop.
In telecommunication, triple play is the provision of broadband internet, television, and telephony over a single connection. This approach emphasizes the supplier convergence of multiple services, aiming to enhance user convenience and streamline service delivery.
The Second Computer Inquiry is the second proceeding in the FCC trilogy The Computer Inquiries, which created the FCC's policy of regulating the way in which telecommunications carriers' networks are opened up and made available to enhanced services. The proceeding reformed the First Computer Inquiry which established the policy objectives that telecommunications carriers which have market power and the ability to discriminate be regulated, and computer services which were competitive, innovative, and had low barriers to entry, would not be regulated. The FCC saw great promise in the computer services industry and sought to ensure that the telecommunications network was adequately meeting the needs of the computer market. In the Second Computer Inquiry, the FCC created the basic service versus enhanced service dichotomy. Broadly speaking, the FCC concluded that basic telecommunications carriers networks must be open, and, if a telecommunications carrier offers enhanced services, it must do so through a separate corporate subsidiary. Everything that the telecommunications carrier sold to its own enhanced service, must be sold to all other enhanced services on the same terms and conditions. The FCC also restricted the ability of telecommunications carriers to bundle telecommunications services with customer premises equipment (CPE), creating a new competitive market for telephones and modems. These rules were generally codified in Section 64.702 of the Federal Communications Commission's Rules and Regulation.
Network convergence refers to the provision of telephone, video and data communication services within a single network. In other words, one company provides services for all forms of communication. Network convergence is primarily driven by development of technology and demand. Users are able to access a wider range of services, choose among more service providers. On the other hand, convergence allows service providers to adopt new business models, offer innovative services, and enter new markets.
Net bias is the counter-principle to net neutrality, which indicates differentiation or discrimination of price and the quality of content or applications on the Internet by ISPs. Similar terms include data discrimination, digital redlining, and network management.
Somos, Inc., is a company that manages registry databases for the telecommunications industry. Additionally, since January 1, 2019, the company has been the North American Numbering Plan Administrator, under a contract granted by the Federal Communications Commission.
{{cite web}}
: Missing or empty |url=
(help)