What rules for next generation networks?
In anticipation of the huge investments planned for the next generation networks (NGM), requires a new analysis of the Access Directive (2002/19/EC), to see if this directive will ensure that these investments are really for the benefit of European citizens , or if specific rules are needed for operators that will receive funding. In particular, I have two questions: the first refers to the risk posed by the different national rules for the regulation of a pan-European network, the second is the risk that the funds go to private networks, or with a weak interconnection and interoperability , then the birth - or strengthening - operators with dominant positions. A situation similar to the first period of expansion of the Internet in Europe, when there were few Internet Exchange Point , considering the transmission capacity of the new networks will be necessary to adequately strengthen the existing interchange points. The risk is that instead of healthy competition will unleash a power struggle. If Europe will fund the first two layers of the OSI model , should also check the competition on other levels.
“To better analyze the issue of power we must refer to the OSI layers. The Internet community has its boundaries placed between the third and seventh OSI layer and can exert its power only where there is the availability of the first two. This is why the Internet is powerful but has no power. The availability of the first two levels depends on the degree of democracy and civilization, and qualifies the national states that were able to implement a policy capable of avoiding concentrations of positions or dominant operators. The availability of the other five levels allows us to judge the different suppliers, as vendors that do not ensure the full and free disposal of the other five levels, or are strongly influenced by the hegemonic power, or - more simply - they are incompetent. The model is easy comparisons, the states where politics tends to hegemony, tend to hinder the access to the first two OSI layers, the dominant operators tend to reduce the services of the other five levels to restrict interoperability possible with competitors.” (Myself,2003 )