Border gateway function performance requirements for the lawful intercept of voice at IMS architecture

Abstract Lawful intercept is a mandatory regulatory service that must be available when delivering voice services over packet-based networks. The carrier should be capable of providing the law-enforcement authorities with logged information about calls originated and terminated by a particular subscriber. Moreover, the carrier should also be able to intercept subscribers’ call-content (e.g., voice conversations). In both cases, the interception should be undetectable by the intercepted subscriber or other callers. Despite the importance of the topic, little effort has been made so far to analyze the performance aspects of lawful intercept in a packet-based network. This paper presents an overall analysis of the performance requirements of the border gateway function at the IMS architecture for lawful call-content interception on an end-to-end packet-based network with only voice packets. In particular, various performance characteristics of the VoIP transmission, like VoIP traffic and VoIP signaling traffic, with an emphasis on the SIP, were investigated in order to determine the margins of the border gateway function's performance requirements where an efficient and undetectable transfer of lawful call-content interception over packet-based networks can be expected.

[1]  S. Srbljic,et al.  Distributed system for lawful interception in VoIP networks , 2003, The IEEE Region 8 EUROCON 2003. Computer as a Tool..

[2]  N. Maloku,et al.  Legal call interception in next generation networks , 2003, Proceedings of the 7th International Conference on Telecommunications, 2003. ConTEL 2003..

[3]  Mark Handley,et al.  SDP: Session Description Protocol , 1998, RFC.

[4]  Fred Baker,et al.  Cisco Architecture for Lawful Intercept in IP Networks , 2004, RFC.

[5]  Athina Markopoulou,et al.  Assessing the quality of voice communications over internet backbones , 2003, TNET.

[6]  Miikka Poikselkä,et al.  The IMS: IP Multimedia Concepts and Services in the Mobile Domain , 2004 .

[7]  Petros Mouchtaris,et al.  Voice over IP signaling: H.323 and beyond , 2000 .

[8]  S. Srbljic,et al.  Methods for lawful interception in IP telephony networks based on H.323 , 2003, The IEEE Region 8 EUROCON 2003. Computer as a Tool..