[Modern] Use cases that people may care about

Eric Burger <eburger@standardstrack.com> Thu, 30 April 2015 20:37 UTC

Return-Path: <eburger@standardstrack.com>
X-Original-To: modern@ietfa.amsl.com
Delivered-To: modern@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17C5A1A0077 for <modern@ietfa.amsl.com>; Thu, 30 Apr 2015 13:37:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.688
X-Spam-Level: *
X-Spam-Status: No, score=1.688 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, SPF_HELO_PASS=-0.001, SPF_NEUTRAL=0.779, T_DKIM_INVALID=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 18latxx3ibwy for <modern@ietfa.amsl.com>; Thu, 30 Apr 2015 13:37:51 -0700 (PDT)
Received: from biz104.inmotionhosting.com (biz104.inmotionhosting.com [74.124.215.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55DA61A0033 for <modern@ietf.org>; Thu, 30 Apr 2015 13:37:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=standardstrack.com; s=default; h=To:References:Message-Id:Date:In-Reply-To:From:Subject:Mime-Version:Content-Type; bh=cwm+2EAGDyjGkh9sZ0jvnXxATuLYOdTDt5FOvFhsrN4=; b=agIck+LgO81yH0tsoRcFLsKogKBg5kYpiHLpfpijuMVYO1l7K0+vUO7V0wG0XIGY+HDO17fNiwdDdon1OqX4PQoofC76cN1yyJA9/Ksd4xOUHSqcAT549aY7/5nst88B/zjNOqo/XNW02k59zJb2cEjI5UPqNyvoVXgwDVWY2Fc=;
Received: from ip68-100-196-239.dc.dc.cox.net ([68.100.196.239]:59658 helo=[192.168.15.122]) by biz104.inmotionhosting.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.82) (envelope-from <eburger@standardstrack.com>) id 1YnvDO-0002JD-1A for modern@ietf.org; Thu, 30 Apr 2015 13:37:50 -0700
Content-Type: multipart/signed; boundary="Apple-Mail=_F049A37C-4D62-43FF-90A5-3061C9C35516"; protocol="application/pgp-signature"; micalg="pgp-sha256"
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2098\))
X-Pgp-Agent: GPGMail 2.5b6
From: Eric Burger <eburger@standardstrack.com>
In-Reply-To: <55424844.9040700@usdonovans.com>
Date: Thu, 30 Apr 2015 16:37:44 -0400
Message-Id: <1D5B0A8A-A41B-41C2-8BB2-A5102506E947@standardstrack.com>
References: <55424844.9040700@usdonovans.com>
To: "modern@ietf.org" <modern@ietf.org>
X-Mailer: Apple Mail (2.2098)
X-OutGoing-Spam-Status: No, score=-2.9
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz104.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - standardstrack.com
X-Get-Message-Sender-Via: biz104.inmotionhosting.com: authenticated_id: eburger+standardstrack.com/only user confirmed/virtual account not confirmed
Archived-At: <http://mailarchive.ietf.org/arch/msg/modern/NtC5VHiJIUTvLP14LlhewESdz08>
Subject: [Modern] Use cases that people may care about
X-BeenThere: modern@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Managing, Ordering, Distributing, Exposing, & Registering telephone Numbers non-WG discussion list" <modern.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/modern>, <mailto:modern-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/modern/>
List-Post: <mailto:modern@ietf.org>
List-Help: <mailto:modern-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/modern>, <mailto:modern-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Apr 2015 20:37:53 -0000

Are we boiling the ocean?

> On Apr 30, 2015, at 11:20 AM, Steve Donovan <srdonovan@usdonovans.com> wrote:
> 
> The working group will define a framework for the roles and functions involved in managing and resolving TNs in an IP environment.

Does this mean we are replacing not only the NPAC, LERG, NANPA, et al., but ENUM, DNS, et al. too?

Let us put aside whether it is worth working on replacing something that works in order for the incumbents to spend a lot of money to get the features and functionality they get today. I.e., they have strong negative incentives to not use any results we develop in the IETF. Putting it bluntly, I did not see a lot of people saying the problems discussed by https://tools.ietf.org/html/draft-peterson-modern-problems-00 were problems that needed to be solved, or solved any time soon.

So, let’s put aside the Charter discussion for a few minutes, and see if we can come up with some problems that *do* need to be solved, and if we can rally behind a charter to solve them. If it happens that the solution to these problems can address the issues raised by Jon’s draft, then I think in the long term *everyone* can be happy.


OVERARCHING PROBLEM: E.164 numbers are being used for more than terminating phone calls by service providers.
[Why is this the overarching problem? Because if the problem is simply that the PSTN is transitioning to an all-IP telecommunications network, then until the industry really needs it, the industry will use the NPAC, LERG, etc. as is. The code to run the databases is already written, the code to interface with the databases is already written, and the policies, governance, procedures and regulations are already known and debugged.]

So, who would benefit from access to E.164 allocations that cannot get them right now?

I see two use cases; I would love it if people could pour in more.

USE CASE #1: Enterprise DID assignment
Cullen gave the compelling example of a multi-campus enterprise. Why do they need to buy their DIDs from a registered carrier, and then pay carriers for the privilege of moving them to other carriers for termination to their own campus?

USE CASE #2: DID-based applications
Another use case would be for enhanced services, such as a single number service. Today an enhanced services company needs to be a service bureau and buy their DIDs from a registered carrier, who will provide them with termination services. I.e., technically the service bureau is buying termination service and getting DIDs as a part of that termination service. Again, if the service bureau wants to change termination service providers, they have to pay for the privilege.



Let me examine Use Case #2. I would offer this is a compelling opportunity. Why? Because there are extant IP-based protocols for entities to get numbers from carriers today. Moreover, that are a bunch of incompatible IP-based protocols for entities to get numbers from carriers. I.e., we have existence proof of a solution, we have existence proof of market need, and we have an opportunity to create standards to expand markets and solve problems (like Cullen’s). For example (and thanks to Cullen for finding the URL’s so I do not need to go hunting), see:

> AT&T is doing this - see https://developer.att.com/apis/enhanced-webrtc/docs
> 
> Tropo is doing this - see phone number pricing at https://www.tropo.com/pricing/
> 
> Twillio is doing this - their pricing at https://www.twilio.com/voice/pricing#volume-pricing - and it is used by Uber, AIrBNB, PayPal, Opentable, Home Depot and so on
Twillio is also the back end for BT and others.

Note that where there are APIs, they are all different. That is an opportunity, I would think.

Now there is a subtlety going on here. All of these services are bundled with termination services. In the AT&T case mentioned above, it has a nice integration with their wireless offering and enterprise offering. For virtual numbers (DIDs), calls get handled by AT&T for termination to their customer, the app developer. For Tropo and Twillio, they ofter termination services at their platform, presumably through contracts with various global carriers, who have access to the pool of regional E.164 numbers.

Are we interested in making it easy for carriers to rent their inventory of DIDs? Are we interested in making it easy for application developers to have access to an inventory of DIDs? I know I am. Are you?

Note that solving this problem does not require the clean-sheet reinvention of the all-IP telecommunications network. I.e., not only how numbers are managed (which we have near zero consensus there is a need) but also how they are resolved (also near zero consensus there is a need).

Building on Use Case #1, if we can do retail rental of DIDs, any reason not to do bulk assignment of DIDs? This begins to come on to Cullen’s use case he brought up at the BOF. Namely, I am an enterprise and I somehow get a bucket full of DIDs. I want to assign them as I wish to my various campuses. That means that in addition to needing to be able to grab an allocation of DIDs (Use Case #2), I will need to tell my service provider how to terminate calls to a particular DID. That is a somewhat more challenging problem. However, I would offer it would have a big payout. The big payout is my expectation is a protocol that lets an enterprise grab a DID *and* lets an enterprise specify how to route that DID would look almost the same as a protocol that enables a carrier to manage E.164 allocation and use.

So, you might ask, “Has Eric lost his mind? Eric has been saying no one wants to build a protocol to enable a carrier to manage E.164 numbers, and yet in the paragraph above he says we can enable carriers to manage E.164 numbers!” Well, here is the answer: approaching the problem from the national numbering authority perspective is doomed. It is rather clear that no one wants to tackle it, and even if we did, as Pierce rather eloquently stated, we are walking right into other folks’ SDO patch. I would offer his ARIN analogy is 100% spot on.

Let us not look at this problem as “How do we do work to remove the last reason for carriers to exist?” That is, if carriers do not vouch for subscriber identity and manager their numbers, what is left for them to do? Instead, let us look at a parallel and really valid problem: how can we automate and standardize the interaction between _some_entity_with_numbers_ (carriers in the base case) and _some_entity_that_uses_numbers_ (app service bureaux and enterprises). If it happens the solution to that could be used for the cases mentioned in Jon’s draft, that is gravy.