SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
        INTERNATIONAL JOURNAL OF ELECTRONICS AND
 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME
COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 4, Issue 2, March – April, 2013, pp. 129-136
                                                                               IJECET
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2013): 5.8896 (Calculated by GISI)                    ©IAEME
www.jifactor.com




      LAWFUL INTERCEPTION MONITORING USING DISTRIBUTED
                   ARCHITECTURE FOR NGN

                                   Munir B. Sayyad1, S.L. Nalbalwar2,
     1, 2
            Department of E & TC, Dr. Babasaheb Ambedkar Technological University, Lonere, Raighad,
                                                  India


   ABSTRACT

           With major developments in the telecommunication industry recently we have seen a
   migration towards an all IP network. This leads to the emergence of what is popularly known
   as the Next Generation Networks (NGN). The migration from the present legacy network to a
   converged all IP network would require a new approach towards security and lawful
   interception (LI). LI is the legally sanctioned official access to private communications, such
   as telephone calls or e-mail messages. LI for NGN has been a great concern to the Law
   Enforcement Agency (LEA). In this paper we propose a distributed architecture for LI in
   NGN. The proposed architecture suits today’s multi service provider network. We also
   discuss implementation of LI in heterogeneous network using an example of call flow for a
   SIP to H323 call.

   Keywords: Lawful Interception, NGN, Distributed Architecture, SIP, H323

   I. INTRODUCTION

           It has been a long time since the days when telecommunications was dependent on
   fixed PSTN networks, the only kind of communication payload transported was a 64kbps
   voice, where interception was possible at any point between the ends, and a simple solution
   was sufficient to monitor a circuit-switched networks.
           Today where ever you go the network follows in other words we have a ubiquitous
   packet switched network. The packet switched network is far more complex and deliver a
   wide range of services other than just voice. Data services multimedia services and other
   value added services form a greater part of the pay load. Monitoring these vast ranges of
   media has been a mammoth task for service providers. The multi vendor network scenario
   creates a highly complex network topology.

                                                    129
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

        With increased exploitation of advanced communication techniques for unlawful,
 malignant and malicious has proved a serious concern for LI of the communication. The
 challenges faced by service provider to comply by the different LI standards are numerous.
 Some of them are listed below

       • Wide variety of IP network link types
       • Large growing bandwidth and traffic load to monitor
       • Many application protocols used by different media types.
       • Multi vendor complex network topology.

    These were just few from the long list of challenges.

         The evolution in telecommunication to fixed-mobile convergence will be through the
 NGN path. NGN would be p multiservice, multiprotocol, multi-access, IP-based networks.
 Which is secure, reliable and trusted. The NGN framework is set by the International
 Telecommunication Union–Telecommunication Standardization Sector (ITU-T), especially
 the NGN Focus Group and European Telecommunications Standards Institute (ETSI)
         With NGN being a fully converged telecom network it would require a special
 architecture for deployment of LI system. Unlike the conventional telephone system the all IP
 network uses an end to end call flow model Moreover the NGN network takes mobility to
 new levels. The user profile in NGN would be mobile. This would allow the user to use his IP
 phone number through an host which is connected to internet. These days IP’s are allocated
 dynamically by the service providers which add to the complexity for LI. The architecture we
 propose in this paper is a distributed architecture. Distributed architecture has an advantage of
 reducing the load of processing from a single system, increase system reliability, efficiency
 and scalability. All this advantages while being able to centrally control administer and
 monitor from a central identity.
         Section II of the paper describes the requirement of NGN and its structure. Section III
 presents the proposed distributed architecture and its diagram. With an example of LI in
 SIP-H323 call flow we discuss the implementation of the proposed architecture in section IV.
 Section V summarizes the advantages and limitations of the proposed architecture and
 concludes the paper.

 II. NEXT GENERATION NETWORK

         As per the definition provided by ITU-T[1] “ A next generation network (NGN) is a
 packet based network able to provide services including Telecommunication Services and
 able to make use of multiple broadband, Quality of Service enabled transport technologies
 and in which service related functions are independent from underlying transport related
 technologies. It offers unrestricted access by users to different service providers. It supports
 generalized mobility which will allow consistent and ubiquitous provision of services to
 users.”
         In other words NGN implies to a convergence of all the networks built to provide
 different services into a network with a single core built over IP . It implies to an all IP
 network.




                                               130
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

        The NGN is built over a horizontally integrated layered model unlike the old vertical
 layer network model. It is modelled to provide point to point, point to multipoint, multipoint
 to multipoint connection. It can be broadly described by two horizontal layers NGN service
 and NGN transport layer.




                              Figure 1: NGN layered structure[2]

         NGN would interconnect with the existing networks and keep existing investment
 safely through devices such as the gateway. At the same time, it would also support the IP
 intelligence network terminals, including simulated telephone, electrograph, ISDN terminal,
 mobile phone, GPRS terminal, SIP terminal, H248 terminal, MGCP terminal, Ethernet
 telephone through the PC, video phone, the cable modem and so on.
         NGN would be a holistic converged network that would support all the services of
 yesterday and add number of new services. NGN ecosystem [2] can be stated briefly as

     •   Next Generation Services – Converged (quad-play-voice, data, video, mobile)
     •   Next Generation Access – High speed (Broadband) IP based connectivity (ADSL,
         VDSL, Wi-Max, Cable TV, FTTH, PLC)
     •   Next Generation Transport – Carrier Ethernet, IP-MPLS
     •   Next Generation Architecture – Service oriented (SOA), layered (transport, control,
         application)
     •   Next Generation Mobile – 3G+ (B3G)
     •   Next Generation Internet – IPv6
     •   Next Generation Interconnect – Capacity and Quality based
     •   Next Generation Licensing – Unified
     •   Next Generation Regulation – Converged, light handed

   It can be seen very clearly from the NGN ecosystem that it would require a new security
 mechanisms and architectures for lawful interception. In the next section we propose a
 distributed architecture.



                                              131
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

 III. DISTRIBUTED ARCHITECTURE FOR LI

         There have always been two types of basic architecture, centralized and distributed
 both of them having there unique advantages. Distributed architecture is preferred when a
 system is to be deployed for a heterogeneous network with huge data and signalling load. A
 distributed architecture distributes the labour of computation from a single device while
 providing a administrative control from the central entity.
   The proposed architecture is hierarchical architecture. We have a central LI entity (CLIE)
 that would connect to the LEA and perform administrative functions. Intermediate level
 entities (ILIE) would connect to different ISP’s. Intermediate level would also have a
 collection and storage function.All the ILIE functions would have a direct link connection
 with the CLIE. ILIE are supported by the base LI entities (BLIE). BLIE are employed at
 each of the gateways of existing network of the service provider the BLIE would monitor the
 payload as per the request from its superior entity.




                            Figure 2: Distributed architecture diagram

   The distributed architecture would also distribute the responsibilities and functions to
 different entities. The functions of each entity in this architecture would be

       • Central LI entity:
               1. It connects to the LEA. It is the only point for human interface.
               2. It has a central data storage server
               3. It resolves the target based on location and ISP
               4. It issues warrants to ILIEs for interception.
               5. Filters the information that has to be provided to LEA
               6. Monitoring of the subordinate entities.
       • Intermediate LI entity:
               1. It resolves the target into the type of network used.
               2. Issues warrants for LI to BLIE
               3. Has a storage intermediate storage function
               4. Provides a direct secure link to the CLIE


                                               132
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

       • Base LI entity:
              1. Monitors the target.
              2. Copies the RTP packets
              3. Decrypts the encrypted packets
              4. Provides deep packet investigation
              5. Provides a secure link to ILIE

         Each entity would be connected to other through a secure link and monitored by its
 superior entity. The structure would completely remove the scope of breech by human
 interface as it is completely secure with no involvement of any human being at all levels.
 The system is administered by strict system policies and firewalls. The intercept related
 information (IRI) is kept at two places one at the ILIE and CLIE. Location information is also
 stored with the other IRI. As per the requirements multiple public identities on different
 network can be intercepted together using this system. In the next section the working of this
 system is explained using a internetwork call flow.

 IV. WHAT HAPPENS DURING LI OF SIP TO H323 CALL

        In this section we would discuss step by step processes taking place when SIP user
 agent (UA) – target for LI calls a H323 endpoint.

                                Figure 3: SIP to H323 call Setup




         During an internetwork call the call passes through a internetworking function (IWF)
 also referred as call management system (CMS) in general. In any type of internetworking
 call IWF is the most important element for successful call setup. IWF translates the requests
 in the form that is acceptable by the other end point. During a call from SIP UA to H323 end
 point INVITE of SIP is translated to SETUP, 180 RINGING to ALERTING, 200 OK to
 ACK, SDP to H345 for negotiation of parameters.




                                              133
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

                        Figure 4: Call flow for LI during SIP to H323 call




 Step1: LEA gets the court orders for LI of the SIP target and provides it to the CLIE. There
        must be proper legislation for what kind of IRI is to be provided. Who is authorized to
        issue warrants for LI etc. to prevent the misuse of the system and ensure privacy of
        the citizens.
 Step2: Depending upon the target information received and the IRI requested CLIE resolves
        the target address to find the service provider and its location. It issues warrant to
        ILIE to monitor the target.
 Step3: ILIE further resolves the target address into its network types and issues a warrant to
        BLIE. BLIE keeps on monitoring the target – here a SIP UA.

                                              134
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

 Step4: SIP UA attempts to make a call it sends an INVITE message to the IWF .
 Step5: IWF sends the information of the address that the target is attempting to call to the
        BLIE
 Step6: BLIE forwards the information to ILIE.
 Step7: ILIE forwards the information to CLIE.
 Step8: CLIE resolves the address that the target is attempting to communicate with and
        issues warrants to the ILIE in the regeion of called part. In our case an H323 End
        Point.
 Step9: ILIE issues warrants to the BLLI.
 Step10: BLIE sends ACK to ILIE.
 Step11: ILIE sends ACK to CLIE.
 Step12: IWF sends SETUP request to H323 EP.
 Step13: H323 EP sends ACK to IWF.
 Step14: IWF sends 200 OK to the SIP UA.
 Step15: SIP UA sends SDP request for negotiation of resources.
 Step16: IWF sends H245 to H323 EP.
 Step17: Accepts the requirements and sends a media.
 Step18: The BLIE copies the media packets and forwards them to ILIE
 Step19: ILIE forwards the RTP packets to CLIE.
 Step20: H323 EP sends RTP packets to SIP UA.
 Step21: SIP UA attempts sends RTP packets.
 Step22: The packets are copied by BLIE and forwarded to ILIE
 Step23: ILIE stores forwards the RTP Packets to CLIE
 Step24: SIP UA sends the RTP packets to H323 EP.
 Step25: CLIE sends the IRI requested using a secure link.

     The call termination is not shown in the figure but takes place in the same manner as the
 call setup.
     In the proposed process the RTP packets are copied at both the end terminals. This would
 prevent any tempering of data and ensures authentic and accurate data delivery for LI. It even
 makes decryption process fast and accurate. The collection function at BLIE also filters the
 data packets for deep packet investigation. It can be noticed that all functions or entities can
 communicate only to their superior or subordinate entity. The policies for communication
 between the entities can be set as per the legal requirements through CLIE.

 V. CONCLUSION

    This paper proposes distributed architecture for LI in NGN. The proposed architectures
 have many unparallel advantages like it has no human interface except at the CLIE so there is
 chances of breech due to human factors are minimized to zero. The architecture is best suited
 for a heterogeneous inter network call. It is also general model which caters the service for
 LEA having targets in multiple Service Providers. In the process proposed for a call we have
 suggested coping storing of RTP packets at two places making it system data protected at two
 separate places. Each entity connects with other over direct secure lines which are not part of
 the network. This also provides high speed secure connectivity between the entities reducing
 the delay. This model can be scaled up to support more data without any basic change in
 architecture. Finally the hierarchical architecture simplifies the system management and
 collection.
                                               135
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME

         Like any other model this architecture also has some limitations and drawbacks. The
 biggest drawback is it increases the time required for call setup. Devices at different network
 gateways with have to be installed in the network. This would be a capital burden on the
 service providers. The model can work efficiently only with strict government legislation and
 cooperation between the service providers. If these things have been taken care off then the
 model would provide a accurate and authentic LI in future networks.

 REFERENCES

 [1]   ITU-T Recommendation General overviewof NGN Y.2001 (12/2004)
 [2]   Satya N GuptaEmergence of next generation networks (NGN) – Regulatory and Security
       Challenges, BT global services
 [3]   F Baker, B Foster, C Sharp RFC- 3924 Cisco Architecture for Lawful Interception in IP
       networks, Cisco Systems, October 2004
 [4]   AndroMilanoviC, SiniSaSrbljid, Ivo RainjeviC, Darryl Sladden, Daniel Skrobo, and Ivan
       MatoSeviC.Distributed Architecture for lawful interception in VoIP networks, Ljubljana
       solvania,Eurocon 2003
 [5]   The Cisco Service Independent Intercept Architecture Version 3.0, Cisco System Inc,
       2007
 [6]   Tatiana Kovacikova, PavolSegec, NGN Standards Activities in ETSI,Slovakia
 [7]   ZohrehAyatollahi - SaeedeSarukhani - FatemehFayazi - Zahra AskaryRoknabady -
       AfsaneMadaniInteroperablity problems in Next Generation Network Protocols, Iran
       Telecommunication Research Center
 [8]   H. SchulzrinneColumbia University, C. Agboh, RFC4123 - Session Initiation Protocol
       (SIP)-H.323 Interworking,July 2005




                                              136

More Related Content

What's hot

Ngn presentation
Ngn presentationNgn presentation
Ngn presentationFrikha Nour
 
Next Generation Network Architecture
Next Generation Network ArchitectureNext Generation Network Architecture
Next Generation Network ArchitectureAPNIC
 
Ngn and application in bangladesh
Ngn and application in bangladeshNgn and application in bangladesh
Ngn and application in bangladeshshahriar19
 
ngn overview , next generation network
ngn overview , next generation networkngn overview , next generation network
ngn overview , next generation networkTushar Kumar
 
All-IP Telecom Networks
All-IP Telecom NetworksAll-IP Telecom Networks
All-IP Telecom Networksalrohily
 
The future of mobile network
The future of mobile networkThe future of mobile network
The future of mobile networkmanhdat270192
 
Paper review on 5 g mobile technology
Paper review on 5 g mobile technology Paper review on 5 g mobile technology
Paper review on 5 g mobile technology Madhunath Yadav
 
5 g mobile technology
5 g mobile technology5 g mobile technology
5 g mobile technologyKiran Kumar
 
Introduction to Wireless cellular technologie and NGN,IMS
Introduction to Wireless cellular technologie  and NGN,IMS Introduction to Wireless cellular technologie  and NGN,IMS
Introduction to Wireless cellular technologie and NGN,IMS ganeshmaali
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
 
Mobility management in heterogeneous wireless networks
Mobility management in heterogeneous wireless networksMobility management in heterogeneous wireless networks
Mobility management in heterogeneous wireless networkseSAT Publishing House
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless laniaemedu
 

What's hot (20)

Singapore's Next Generation Broadband Network
Singapore's Next Generation Broadband NetworkSingapore's Next Generation Broadband Network
Singapore's Next Generation Broadband Network
 
Ngn presentation
Ngn presentationNgn presentation
Ngn presentation
 
The NTT Next Generation Network Deployment in Japan
The NTT Next Generation Network Deployment in JapanThe NTT Next Generation Network Deployment in Japan
The NTT Next Generation Network Deployment in Japan
 
Next Generation Network Architecture
Next Generation Network ArchitectureNext Generation Network Architecture
Next Generation Network Architecture
 
Ngn
NgnNgn
Ngn
 
Ngn and application in bangladesh
Ngn and application in bangladeshNgn and application in bangladesh
Ngn and application in bangladesh
 
ngn overview , next generation network
ngn overview , next generation networkngn overview , next generation network
ngn overview , next generation network
 
I05225564
I05225564I05225564
I05225564
 
All-IP Telecom Networks
All-IP Telecom NetworksAll-IP Telecom Networks
All-IP Telecom Networks
 
The future of mobile network
The future of mobile networkThe future of mobile network
The future of mobile network
 
50120140505003
5012014050500350120140505003
50120140505003
 
Paper review on 5 g mobile technology
Paper review on 5 g mobile technology Paper review on 5 g mobile technology
Paper review on 5 g mobile technology
 
NGN BASICS
NGN BASICSNGN BASICS
NGN BASICS
 
5 g mobile technology
5 g mobile technology5 g mobile technology
5 g mobile technology
 
Introduction to Wireless cellular technologie and NGN,IMS
Introduction to Wireless cellular technologie  and NGN,IMS Introduction to Wireless cellular technologie  and NGN,IMS
Introduction to Wireless cellular technologie and NGN,IMS
 
Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...Low-cost wireless mesh communications based on openWRT and voice over interne...
Low-cost wireless mesh communications based on openWRT and voice over interne...
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
Mobility management in heterogeneous wireless networks
Mobility management in heterogeneous wireless networksMobility management in heterogeneous wireless networks
Mobility management in heterogeneous wireless networks
 
G0314043
G0314043G0314043
G0314043
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lan
 

Similar to Lawful interception monitoring using distributed architecture for ngn 2

PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSPLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSIJCNCJournal
 
Lecture-1 NGN Overview.pptx
Lecture-1 NGN Overview.pptxLecture-1 NGN Overview.pptx
Lecture-1 NGN Overview.pptxWaqas Ahmad
 
presentation on NGMN and FMC
presentation on NGMN and FMCpresentation on NGMN and FMC
presentation on NGMN and FMCvinitabhandiwad
 
Conference Paper: Distributed cloud and de-centralized control plane A propos...
Conference Paper: Distributed cloud and de-centralized control plane A propos...Conference Paper: Distributed cloud and de-centralized control plane A propos...
Conference Paper: Distributed cloud and de-centralized control plane A propos...Ericsson
 
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network ArchitectureImprovements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
 
Speed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessSpeed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessiaemedu
 
Vertical handover in umts and wlan networks
Vertical handover in umts and wlan networksVertical handover in umts and wlan networks
Vertical handover in umts and wlan networksIAEME Publication
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformationSANDEEP MITTAPALLY
 
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D CommunicationCorrelation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communicationijtsrd
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...TELKOMNIKA JOURNAL
 
Cisco Network Convergence System: Building the Foundation for the Internet of...
Cisco Network Convergence System: Building the Foundation for the Internet of...Cisco Network Convergence System: Building the Foundation for the Internet of...
Cisco Network Convergence System: Building the Foundation for the Internet of...Cisco Service Provider
 
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
 
Performance comparison of umts and lte on the basis of data rates
Performance comparison of umts and lte on the basis of data ratesPerformance comparison of umts and lte on the basis of data rates
Performance comparison of umts and lte on the basis of data ratesIAEME Publication
 
Comparative analysis of LTE backbone transport techniques for efficient broad...
Comparative analysis of LTE backbone transport techniques for efficient broad...Comparative analysis of LTE backbone transport techniques for efficient broad...
Comparative analysis of LTE backbone transport techniques for efficient broad...TELKOMNIKA JOURNAL
 
Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementPerformance Evaluation of VEnodeb Using Virtualized Radio Resource Management
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementJIEMS Akkalkuwa
 
Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paperPrashant Sengar
 

Similar to Lawful interception monitoring using distributed architecture for ngn 2 (20)

PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSPLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
 
Lecture-1 NGN Overview.pptx
Lecture-1 NGN Overview.pptxLecture-1 NGN Overview.pptx
Lecture-1 NGN Overview.pptx
 
27 32
27 3227 32
27 32
 
presentation on NGMN and FMC
presentation on NGMN and FMCpresentation on NGMN and FMC
presentation on NGMN and FMC
 
Conference Paper: Distributed cloud and de-centralized control plane A propos...
Conference Paper: Distributed cloud and de-centralized control plane A propos...Conference Paper: Distributed cloud and de-centralized control plane A propos...
Conference Paper: Distributed cloud and de-centralized control plane A propos...
 
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network ArchitectureImprovements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
Speed adaptive mobile ip over wireless
Speed adaptive mobile ip over wirelessSpeed adaptive mobile ip over wireless
Speed adaptive mobile ip over wireless
 
Vertical handover in umts and wlan networks
Vertical handover in umts and wlan networksVertical handover in umts and wlan networks
Vertical handover in umts and wlan networks
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 
Correlation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D CommunicationCorrelation between Terms of 5G Networks, IoT and D2D Communication
Correlation between Terms of 5G Networks, IoT and D2D Communication
 
03
0303
03
 
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...Data Communication in Internet of Things: Vision, Challenges and Future Direc...
Data Communication in Internet of Things: Vision, Challenges and Future Direc...
 
Cisco Network Convergence System: Building the Foundation for the Internet of...
Cisco Network Convergence System: Building the Foundation for the Internet of...Cisco Network Convergence System: Building the Foundation for the Internet of...
Cisco Network Convergence System: Building the Foundation for the Internet of...
 
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...
 
Performance comparison of umts and lte on the basis of data rates
Performance comparison of umts and lte on the basis of data ratesPerformance comparison of umts and lte on the basis of data rates
Performance comparison of umts and lte on the basis of data rates
 
Comparative analysis of LTE backbone transport techniques for efficient broad...
Comparative analysis of LTE backbone transport techniques for efficient broad...Comparative analysis of LTE backbone transport techniques for efficient broad...
Comparative analysis of LTE backbone transport techniques for efficient broad...
 
Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management
Performance Evaluation of VEnodeb Using Virtualized Radio Resource ManagementPerformance Evaluation of VEnodeb Using Virtualized Radio Resource Management
Performance Evaluation of VEnodeb Using Virtualized Radio Resource Management
 
Ims architecture white_paper
Ims architecture white_paperIms architecture white_paper
Ims architecture white_paper
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Lawful interception monitoring using distributed architecture for ngn 2

  • 1. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN INTERNATIONAL JOURNAL OF ELECTRONICS AND 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April, 2013, pp. 129-136 IJECET © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2013): 5.8896 (Calculated by GISI) ©IAEME www.jifactor.com LAWFUL INTERCEPTION MONITORING USING DISTRIBUTED ARCHITECTURE FOR NGN Munir B. Sayyad1, S.L. Nalbalwar2, 1, 2 Department of E & TC, Dr. Babasaheb Ambedkar Technological University, Lonere, Raighad, India ABSTRACT With major developments in the telecommunication industry recently we have seen a migration towards an all IP network. This leads to the emergence of what is popularly known as the Next Generation Networks (NGN). The migration from the present legacy network to a converged all IP network would require a new approach towards security and lawful interception (LI). LI is the legally sanctioned official access to private communications, such as telephone calls or e-mail messages. LI for NGN has been a great concern to the Law Enforcement Agency (LEA). In this paper we propose a distributed architecture for LI in NGN. The proposed architecture suits today’s multi service provider network. We also discuss implementation of LI in heterogeneous network using an example of call flow for a SIP to H323 call. Keywords: Lawful Interception, NGN, Distributed Architecture, SIP, H323 I. INTRODUCTION It has been a long time since the days when telecommunications was dependent on fixed PSTN networks, the only kind of communication payload transported was a 64kbps voice, where interception was possible at any point between the ends, and a simple solution was sufficient to monitor a circuit-switched networks. Today where ever you go the network follows in other words we have a ubiquitous packet switched network. The packet switched network is far more complex and deliver a wide range of services other than just voice. Data services multimedia services and other value added services form a greater part of the pay load. Monitoring these vast ranges of media has been a mammoth task for service providers. The multi vendor network scenario creates a highly complex network topology. 129
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME With increased exploitation of advanced communication techniques for unlawful, malignant and malicious has proved a serious concern for LI of the communication. The challenges faced by service provider to comply by the different LI standards are numerous. Some of them are listed below • Wide variety of IP network link types • Large growing bandwidth and traffic load to monitor • Many application protocols used by different media types. • Multi vendor complex network topology. These were just few from the long list of challenges. The evolution in telecommunication to fixed-mobile convergence will be through the NGN path. NGN would be p multiservice, multiprotocol, multi-access, IP-based networks. Which is secure, reliable and trusted. The NGN framework is set by the International Telecommunication Union–Telecommunication Standardization Sector (ITU-T), especially the NGN Focus Group and European Telecommunications Standards Institute (ETSI) With NGN being a fully converged telecom network it would require a special architecture for deployment of LI system. Unlike the conventional telephone system the all IP network uses an end to end call flow model Moreover the NGN network takes mobility to new levels. The user profile in NGN would be mobile. This would allow the user to use his IP phone number through an host which is connected to internet. These days IP’s are allocated dynamically by the service providers which add to the complexity for LI. The architecture we propose in this paper is a distributed architecture. Distributed architecture has an advantage of reducing the load of processing from a single system, increase system reliability, efficiency and scalability. All this advantages while being able to centrally control administer and monitor from a central identity. Section II of the paper describes the requirement of NGN and its structure. Section III presents the proposed distributed architecture and its diagram. With an example of LI in SIP-H323 call flow we discuss the implementation of the proposed architecture in section IV. Section V summarizes the advantages and limitations of the proposed architecture and concludes the paper. II. NEXT GENERATION NETWORK As per the definition provided by ITU-T[1] “ A next generation network (NGN) is a packet based network able to provide services including Telecommunication Services and able to make use of multiple broadband, Quality of Service enabled transport technologies and in which service related functions are independent from underlying transport related technologies. It offers unrestricted access by users to different service providers. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users.” In other words NGN implies to a convergence of all the networks built to provide different services into a network with a single core built over IP . It implies to an all IP network. 130
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME The NGN is built over a horizontally integrated layered model unlike the old vertical layer network model. It is modelled to provide point to point, point to multipoint, multipoint to multipoint connection. It can be broadly described by two horizontal layers NGN service and NGN transport layer. Figure 1: NGN layered structure[2] NGN would interconnect with the existing networks and keep existing investment safely through devices such as the gateway. At the same time, it would also support the IP intelligence network terminals, including simulated telephone, electrograph, ISDN terminal, mobile phone, GPRS terminal, SIP terminal, H248 terminal, MGCP terminal, Ethernet telephone through the PC, video phone, the cable modem and so on. NGN would be a holistic converged network that would support all the services of yesterday and add number of new services. NGN ecosystem [2] can be stated briefly as • Next Generation Services – Converged (quad-play-voice, data, video, mobile) • Next Generation Access – High speed (Broadband) IP based connectivity (ADSL, VDSL, Wi-Max, Cable TV, FTTH, PLC) • Next Generation Transport – Carrier Ethernet, IP-MPLS • Next Generation Architecture – Service oriented (SOA), layered (transport, control, application) • Next Generation Mobile – 3G+ (B3G) • Next Generation Internet – IPv6 • Next Generation Interconnect – Capacity and Quality based • Next Generation Licensing – Unified • Next Generation Regulation – Converged, light handed It can be seen very clearly from the NGN ecosystem that it would require a new security mechanisms and architectures for lawful interception. In the next section we propose a distributed architecture. 131
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME III. DISTRIBUTED ARCHITECTURE FOR LI There have always been two types of basic architecture, centralized and distributed both of them having there unique advantages. Distributed architecture is preferred when a system is to be deployed for a heterogeneous network with huge data and signalling load. A distributed architecture distributes the labour of computation from a single device while providing a administrative control from the central entity. The proposed architecture is hierarchical architecture. We have a central LI entity (CLIE) that would connect to the LEA and perform administrative functions. Intermediate level entities (ILIE) would connect to different ISP’s. Intermediate level would also have a collection and storage function.All the ILIE functions would have a direct link connection with the CLIE. ILIE are supported by the base LI entities (BLIE). BLIE are employed at each of the gateways of existing network of the service provider the BLIE would monitor the payload as per the request from its superior entity. Figure 2: Distributed architecture diagram The distributed architecture would also distribute the responsibilities and functions to different entities. The functions of each entity in this architecture would be • Central LI entity: 1. It connects to the LEA. It is the only point for human interface. 2. It has a central data storage server 3. It resolves the target based on location and ISP 4. It issues warrants to ILIEs for interception. 5. Filters the information that has to be provided to LEA 6. Monitoring of the subordinate entities. • Intermediate LI entity: 1. It resolves the target into the type of network used. 2. Issues warrants for LI to BLIE 3. Has a storage intermediate storage function 4. Provides a direct secure link to the CLIE 132
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME • Base LI entity: 1. Monitors the target. 2. Copies the RTP packets 3. Decrypts the encrypted packets 4. Provides deep packet investigation 5. Provides a secure link to ILIE Each entity would be connected to other through a secure link and monitored by its superior entity. The structure would completely remove the scope of breech by human interface as it is completely secure with no involvement of any human being at all levels. The system is administered by strict system policies and firewalls. The intercept related information (IRI) is kept at two places one at the ILIE and CLIE. Location information is also stored with the other IRI. As per the requirements multiple public identities on different network can be intercepted together using this system. In the next section the working of this system is explained using a internetwork call flow. IV. WHAT HAPPENS DURING LI OF SIP TO H323 CALL In this section we would discuss step by step processes taking place when SIP user agent (UA) – target for LI calls a H323 endpoint. Figure 3: SIP to H323 call Setup During an internetwork call the call passes through a internetworking function (IWF) also referred as call management system (CMS) in general. In any type of internetworking call IWF is the most important element for successful call setup. IWF translates the requests in the form that is acceptable by the other end point. During a call from SIP UA to H323 end point INVITE of SIP is translated to SETUP, 180 RINGING to ALERTING, 200 OK to ACK, SDP to H345 for negotiation of parameters. 133
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME Figure 4: Call flow for LI during SIP to H323 call Step1: LEA gets the court orders for LI of the SIP target and provides it to the CLIE. There must be proper legislation for what kind of IRI is to be provided. Who is authorized to issue warrants for LI etc. to prevent the misuse of the system and ensure privacy of the citizens. Step2: Depending upon the target information received and the IRI requested CLIE resolves the target address to find the service provider and its location. It issues warrant to ILIE to monitor the target. Step3: ILIE further resolves the target address into its network types and issues a warrant to BLIE. BLIE keeps on monitoring the target – here a SIP UA. 134
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME Step4: SIP UA attempts to make a call it sends an INVITE message to the IWF . Step5: IWF sends the information of the address that the target is attempting to call to the BLIE Step6: BLIE forwards the information to ILIE. Step7: ILIE forwards the information to CLIE. Step8: CLIE resolves the address that the target is attempting to communicate with and issues warrants to the ILIE in the regeion of called part. In our case an H323 End Point. Step9: ILIE issues warrants to the BLLI. Step10: BLIE sends ACK to ILIE. Step11: ILIE sends ACK to CLIE. Step12: IWF sends SETUP request to H323 EP. Step13: H323 EP sends ACK to IWF. Step14: IWF sends 200 OK to the SIP UA. Step15: SIP UA sends SDP request for negotiation of resources. Step16: IWF sends H245 to H323 EP. Step17: Accepts the requirements and sends a media. Step18: The BLIE copies the media packets and forwards them to ILIE Step19: ILIE forwards the RTP packets to CLIE. Step20: H323 EP sends RTP packets to SIP UA. Step21: SIP UA attempts sends RTP packets. Step22: The packets are copied by BLIE and forwarded to ILIE Step23: ILIE stores forwards the RTP Packets to CLIE Step24: SIP UA sends the RTP packets to H323 EP. Step25: CLIE sends the IRI requested using a secure link. The call termination is not shown in the figure but takes place in the same manner as the call setup. In the proposed process the RTP packets are copied at both the end terminals. This would prevent any tempering of data and ensures authentic and accurate data delivery for LI. It even makes decryption process fast and accurate. The collection function at BLIE also filters the data packets for deep packet investigation. It can be noticed that all functions or entities can communicate only to their superior or subordinate entity. The policies for communication between the entities can be set as per the legal requirements through CLIE. V. CONCLUSION This paper proposes distributed architecture for LI in NGN. The proposed architectures have many unparallel advantages like it has no human interface except at the CLIE so there is chances of breech due to human factors are minimized to zero. The architecture is best suited for a heterogeneous inter network call. It is also general model which caters the service for LEA having targets in multiple Service Providers. In the process proposed for a call we have suggested coping storing of RTP packets at two places making it system data protected at two separate places. Each entity connects with other over direct secure lines which are not part of the network. This also provides high speed secure connectivity between the entities reducing the delay. This model can be scaled up to support more data without any basic change in architecture. Finally the hierarchical architecture simplifies the system management and collection. 135
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 2, March – April (2013), © IAEME Like any other model this architecture also has some limitations and drawbacks. The biggest drawback is it increases the time required for call setup. Devices at different network gateways with have to be installed in the network. This would be a capital burden on the service providers. The model can work efficiently only with strict government legislation and cooperation between the service providers. If these things have been taken care off then the model would provide a accurate and authentic LI in future networks. REFERENCES [1] ITU-T Recommendation General overviewof NGN Y.2001 (12/2004) [2] Satya N GuptaEmergence of next generation networks (NGN) – Regulatory and Security Challenges, BT global services [3] F Baker, B Foster, C Sharp RFC- 3924 Cisco Architecture for Lawful Interception in IP networks, Cisco Systems, October 2004 [4] AndroMilanoviC, SiniSaSrbljid, Ivo RainjeviC, Darryl Sladden, Daniel Skrobo, and Ivan MatoSeviC.Distributed Architecture for lawful interception in VoIP networks, Ljubljana solvania,Eurocon 2003 [5] The Cisco Service Independent Intercept Architecture Version 3.0, Cisco System Inc, 2007 [6] Tatiana Kovacikova, PavolSegec, NGN Standards Activities in ETSI,Slovakia [7] ZohrehAyatollahi - SaeedeSarukhani - FatemehFayazi - Zahra AskaryRoknabady - AfsaneMadaniInteroperablity problems in Next Generation Network Protocols, Iran Telecommunication Research Center [8] H. SchulzrinneColumbia University, C. Agboh, RFC4123 - Session Initiation Protocol (SIP)-H.323 Interworking,July 2005 136