Method, arrangement, node and article for enhancing delivery capacity in a telecommunications network by transcoding traffic into requested quality of service (qos)

ABSTRACT

Methods and apparatuses to enhance delivery capacity for traffic in a communication network are disclosed. Traffic is received to a Delivery Function with originally coded Quality of Services (QoS). A specification of requested QoS is received to the Delivery Function. The originally coded QoS is established to be higher than the requested QoS. The received traffic is transcoded into requested QoS. Optionally, the traffic is buffered with originally coded QoS and at request, the buffered traffic is retrieved.

TECHNICAL FIELD

The present invention relates to methods and arrangements to enhancedelivery capacity for traffic in a telecommunication network.

BACKGROUND

Optimized bandwidth consumption is a well known problem in communicationnetworks of today. Various solutions to keep down bandwidth consumptionexist. The problem with unevenly distributed data is identified in theInternational Patent Application PCT/IB02/03353. The problem is solvedby a user selecting delivery from at least two delivery classes:“deliver NOW” in real time or a specified “time delay delivery” wherebythe “time delay delivery” class allows the network to send content at atime when the network is least utilized. In the US application2002/0172222 a system administrator requests packet filtering based uponselected active users or active applications. A bandwidth historydatabase is compiled from bandwidth usage data associated with multipleentities within a data processing system. In response to a requestedaction within the data processing system, bandwidth usage for therequested action can be predicted with reference to the bandwidthhistory database in order to change bandwidth consumption behaviour. Theabove solutions present drawbacks such as preventing needed delivery ofservices to receiving users, at any time.

Also within the Lawful Interception concept high bandwidth consumptionproblems arise when high bandwidth consuming Content of Communicationlike, for instance, IP-TV or broadcasting data is to be delivered to amonitoring function.

FIG. 1 belongs to prior art and discloses a solution for monitoring ofInterception Related Information IRI and Content of Communication CC forthe same target. The different parts used for interception belong toprior art and are disclosed in current Lawful Interception standards(see 3GPP TS 33.108 and 3GPP TS 33.107—Release 7). A Law EnforcementMonitoring Facility LEMF is connected to three Mediation Functionsrespectively for ADMF, DF2, DF3 i.e. an Administration Function ADMF andtwo Delivery Functions DF2 and DF3. The Administration Function and theDelivery Functions are each one connected to the LEMF via standardizedhandover interfaces HI1-HI3, and connected via interfaces X1-X3 to anIntercepting Control Element ICE in a telecommunication system. Togetherwith the delivery functions, the ADMF is used to hide from ICEs thatthere might be multiple activations by different Law EnforcementAgencies. The messages sent from LEMF to ADMF via HI1 and from the ADMFto the network via the X1 interface comprise identities of a target thatis to be monitored. The Delivery Function DF2 receives Intercept RelatedInformation IRI from the network via the X2 interface. DF2 is used todistribute the IRI to relevant Law Enforcement Agencies via the HI2interface. The Delivery Function DF3 receives Content of CommunicationCC, i.e. speech and data, on X3 from the ICE. Requests are also sentfrom the ADMF to a Mediation Function MF3 in the DF3 on a HandoverInterface HI_3. The requests sent on HI_3 are used for activation ofContent of Communication, and to specify detailed handling options forintercepted CC. In Circuit Switching, DF3 is responsible for callcontrol signaling and bearer transport for an intercepted product.Intercept Related Information IRI, received by DF2 is triggered byEvents that in Circuit Switching domain are either call related ornon-call related. In Packet Switching domain the events are sessionrelated or session unrelated.

The access method for the delivering of Packet Data GPRS Support NodeGSN Intercept Product is based on duplication of packets withoutmodification at 3G GSN. The duplicated packets with additionalinformation are sent to DF3 for further delivery via a tunnel. Incurrently provided DF3 architecture in the lawful interception solution,when a LEMF is interested in receiving the service contents of thetarget subscriber, the LEMF must be able to receive and decode highbandwidth consuming Content of Communication for service like IP-TV orbroadcasting, which may be as high as Gbits of information per second.This requires the LEMF to handle/consume high bandwidth also when mediacontent is considered as non-meaningful for LI investigation purposes(e.g. encrypted attachments in MMS/SMS, bandwidth and processingcapacity consuming multimedia contents).

SUMMARY

The present invention relates to problems to limit bandwidth consumptionand not overload the system while yet open up for full delivery ofservices if needed. A further problem is unnecessary high bufferedtraffic storage amount, for example when a receiving monitoring facilitydoes not operate in real-time.

A purpose with the invention is to bandwidth optimize the use of thedelivery interface by introducing an enhanced delivery mechanism.

The solution to the problem is to delimit the Quality of Services QoS toa maximum sustainable level for the delivery interface and, optionally,if the delimited QoS is lower than the original QoS, buffer the originaltraffic for later usage and at request, retrieving the buffered traffic.

The solution to the problem more in detail is a method to enhancedelivery capacity for traffic in a communication network, comprising:

-   -   Receiving to a Delivery Function, the requested traffic with        originally coded Quality of Services QoS.    -   Receiving to the Delivery Function, a specification of requested        QoS.    -   establishing that the requested coded QoS is lower than        originally the QoS;    -   transcoding the received traffic from original to requested QoS.    -   Optionally, buffering traffic with originally coded Quality of        Services QoS and at request, retrieving the buffered traffic.

The further mentioned problem i.e. reduction of buffered storage amounte.g. when a traffic receiving monitoring facility does not operate inreal time is solved by a filtering mechanism that makes storage needs ofbuffered traffic significantly lower. Yet a further problem is to ensurethat possible buffered contents are not altered by unauthorizedentities. This problem is solved for example by techniques likerequirement of digital signatures to access stored data.

A purpose with the invention is to optimize usage of the deliveryinterface and prevent high bandwidth consumption unless necessary formonitoring aims. This purpose and others are achieved by methods,arrangements, nodes, systems and articles of manufacture.

Examples of advantages of the invention are as follows:

-   -   Enrichment of the LI functionality with video and audio        transcoding features in order to have an optimized use of the        HI3 interface bandwidth.    -   Enrichment of the LI functionality with the media compression        techniques for removing the media content considered as        non-meaningful for LI investigation purposes for example,        encrypted attachments in MMS/SMS, bandwidth and processing        capacity consuming multimedia contents.    -   The LI standards require that the QoS towards the delivery        function provided by the network must be of at least the level        that the network provides to the target. This is fulfilled also        with this solution, since the intercepted CC is buffered with        the QoS offered by the network and available to be retrieved        from the agency.    -   Possibility to provide the Video Transcoding features in        conjunction with the LI functionality.    -   Promote the usage of specified Service-aware products as        supporting functions in LI gateway. Due to the need to        differentiate the QoS on service basis this product shall serve        to single the different service contents from a unique data        stream.    -   No influence on the interception domain, i.e. on the elements in        the network.    -   Receipt of low Qos Content of Communication make storage needs        significantly lower.    -   Best fitting of the Agency's expectations (set on warrant basis)        in terms of the trade-off among the expected intelligibility of        the interception (i.e., minimum desired QoS) and the        capacity/bandiwidth endured load on the MC resources.

The invention will now be described more in detail with the aid ofpreferred embodiments in connection with the enclosed drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 belongs to prior art and discloses a block schematic illustrationof interception configuration items attached to an Intercepting ControlElement.

FIG. 2 discloses a block schematic illustration of an Intercept Controlelement that is split into an MSC server and a Media Gateway whereintraffic is monitored from the media Gateway.

FIG. 3 discloses a block schematic illustration of a monitoringconfiguration attached to IP Multimedia Subsystem IMS wherein a GatewayGPRS Support Node is acting as Intercept Control element.

FIG. 4 discloses a signal sequence diagram representing a method Whereintraffic in Packet Switched domain is monitored.

FIG. 5 disclose a flow chart illustrating some essential method steps ofthe invention.

FIG. 6 discloses a block schematic illustration of a system that can beused to put the invention into practise.

DETAILED DESCRIPTION

3GPP applies separation of signalling and media planes with theintroduction of split architecture for the Mobile Switching Centre MSC.The MSC is split into an MSC server and a Media Gateway MGW. The splitarchitecture was introduced in Release 4 of the 3GPP specifications.Media such as video and voice is handled in bearer domain and sent viathe MGW while signalling is handled by the MSC Server.

FIG. 2 discloses a delivery configuration to the Law EnforcementMonitoring Facility LEMF when monitoring a Circuit Switched call. Thefigure shows an Intercepting Control Element ICE that comprises an MSCServer and a Media Gateway MGW. In this example the ICE is connected totwo Radio Base Station RBS1 and RBS2 in a GSM Access Network wherein amobile station A (subscriber) is radio linked to RBS1 and a mobilestation B is radio linked to RBS2. A voice session is set up between Aand B. Signalling information used to set up the session is transportedvia the MSC Server between A and B. The signalling information is shownin the figure with divided lines. Traffic, such as speech SA in thisexample, is sent via the Media Gateway MGW. The earlier mentioned (seeFIG. 1) Law Enforcement Monitoring Facility LEMF is attached to theMedia Gateway via the Mediation Function MF3 in the delivery functionDF3. If requested, a copy of the traffic will be sent from the MGW tothe LEMF. The request is sent from LEMF to the MSC Server via the X1interface. MSC server will setup the multiparty in the MGW for theduplication of Content of Communication CC on the X3 interface. To benoted is that speech from A to B and speech from B to A will be sent onseparate stub-lines between the MF3 and the LEMF, and cause download ofthe Handover Interface HI3. The traffic SA sent between A to B comprisesa certain coded level of Quality of Services QoS, so called originallycoded QoS. The originally coded QoS for the speech SA is referred to inFIG. 2 as [X3QoSA]. According to the invention an agency have thepossibility to request a Quality of Service representing a maximumsustainable level for the Handover Interface HI3, a so called requestedcoded Quality of Services. The requested QoS level can be lower than theoriginally coded level of QoS. The requested QoS for the signal SA isreferred to in FIG. 2 as [HI3QoSA]. The request for a certain coded QoSlevel is sent from LEMF on HI1 to ADMF and forwarded from ADMF on X1_3to MF3.

A method according to a first embodiment of the invention will now beexplained together with FIG. 2. In this exemplified embodiment, acircuit switched call has been set up between subscriber A and B andspeech SA is transported via the Media Gateway MGW in the ICE. Themethod comprises the following steps:

-   -   A request 1 to activate interception of subscriber A is sent        from the LEMF to the MSC Server via the ADMF. The request 1        comprises a target identity related to subscriber A.

After receiving the request, the below information will be transferredvia the MGW from the MSC Server to the Delivery Function DF3. Thissignaling info are transferred to DF3 by MSC Server. In fact, asreferred in 33.107 for the case of CS split architecture, the X3interface consists of a signaling part (MSC server transfers to DF3 thetarget and correlation info of the interception case) and of payloadpart (transferred to DF3 via MGW). The following information will betransferred:

-   -   target identity (MSISDN, IMSI or IMEI).    -   The target location (if available) or the IAs in case of        location dependent interception.    -   Correlation number (IRI<->CC).    -   Direction indication (Signal from target or signal to target)

The above control information is needed to allow DF3 in correlating thereceived CC payload to the proper warrants and making accordingly theHI3 ISDN calls to LEMF. On X3, the bearer (a pure bearer copy of thetransmitted and received content of communication of the targetsubscriber) is sent from the MGW to DF3 that transcodes it in the HI3call towards LEMF.

-   -   A copy 3 of the speech SA with originally coded Quality of        Services is sent from the MGW to the Delivery Function DF3.

Up until now the method has followed Lawful Interception according tostandards referred to in the background part of this application. Themethod according to invention comprises the following further steps:

-   -   According to the invention, a signal 2 comprising a        specification of requested level of coded Quality of Services        QoS is sent from LEMF to MF3 via the ADMF. The requested level        is the level representing maximum sustainable QoS level on the        Handover Interface. In this example the requested level of QoS        is lower than the original level of QoS. While speech sent with        originally coded QoS appears with “perfect” speech quality,        speech with lower QoS is distorted and may appear with a quality        that is “less than perfect” even though usable for monitoring        purposes.    -   The speech 3 coded with original level of QoS [X3QoSA] is        received to the Delivery Function DF3 and transcoded in the DF3        to the requested level of QoS [HI3QoSA]. In this example speech        is explicitly referred to. In such a case, transcoding examples        would be the conversion of PCM payload into Full Rate/Half        Rate/Enhanced Full Rate AMR coded content. On the other end and        as a more effective example, when intercepting High Speed CS        data calls, the payload transcoding function would result in        making “simple” CSD calls towards LEMF (so less CS channels to        monitoring center compared to HSCSD calls).    -   The transcoded speech 4 with the requested level of QoS        [HI3QoSA] is sent on the Handover Interface HI3 from MF3 to the        LEMF. An agency will get access to the traffic from the LEMF.

Like in 3GPP, signalling and media paths are kept separated in IPMultimedia Subystems IMS. IMS however goes even further in thisseparation. The only nodes that need to handle both signalling and mediaare the IMS terminals; no network node needs to handle both. FIG. 3discloses in a second embodiment the previous explained LI configurationattached to an IP Multimedia Subsystem IMS. IMS is the technologydefined by the Third Generation Partnership Project 3GPP to provide IPMultimedia services over mobile communication networks (3GPP TS 22.228,TS 23.228, TS 24.229, TS 29.228, TS 29.229, TS 29.328 and TS 29.329Release 5 and Release 6). The IMS makes use of the Session InitiationProtocol SIP to set up and control calls or sessions between userterminals (or user terminals and application servers). The SessionDescription Protocol SDP, carried by SIP signaling, is used to describeand negotiate the media components of the session. The target identityfor multi-media is the SIP URL at the CSCF. Whilst SIP was created as auser-to-user protocol, IMS allows operators and service providers tocontrol user access to services and to charge users accordingly. IPMultimedia services provide a dynamic combination of voice, video,messaging, data, etc. within the same session.

FIG. 3 schematically shows the IMS structure used in the secondembodiment of the invention. The IMS in the example comprisesCall/Session Control Functions CSCF-A and CSCF-B. The CSCFs are SIPservers and essential nodes in the IMS. A CSCF processes SIP signalingin the IMS network. The CSCF comprises different Call/Session ControlFunction types such as P-/I-/S-CSCF as defined in the standards but isfor the sake of clarity shown in the schematic FIG. 3 as a single node.The bearer domain in the example consists of an access network ACC NW(such as PLMN and PSTN) and an UMTS Terrestrial Radio Access NetworksUTRAN and a backbone network IP NW. A transmitting video terminal C islocated in the ACC NW while a receiving terminal D is located in theUTRAN network. Two video services S1 and S2 are transported from aterminal attached to C through the IP network via a Media Gateway MGW inthe IMS domain, through a Packet Switched network PS, to D in the UTRANnetwork. A Gateway GPRS Support Node GGSN is located in the PacketSwitched PS network. The GGSN acts as Intercepting Control Element ICE.The GGSN comprises a Packet Duplicator PD and the LEMF is attached tothe PD via the Mediation/Delivery Function MF3/DF3. The access methodfor delivering Packet Data GSN Intercept Product is based on duplicationof Packets without modification at GGSN. The duplicated packets withadditional information in the header are sent to MF3/DF3 for furtherdelivery to LEMF.

FIG. 4 discloses a signal sequence diagram in which the method accordingto the second embodiment of the invention is shown. The method in FIG. 4is to be read together with FIG. 3. The method comprises the followingsteps:

-   -   A request 11 for Lawful Interception activation is sent from        LEMF via the ADMF to ICE. The request comprises a target        identity i.e. MSISDN—Mobile Station International ISDN Number        related to subscriber C. The request in this example also        comprises identification of two specific video-streaming        services to be observed, i.e. the services S1 and S2. The        request further comprises a requested Quality of Services QoS        for the services S1 and S2 respectively. The requested QoS in        this example is Animated GIF for both S1 and S2. The requested        QoS for S1 is in the figure referred to as [HI3QoS1]. The        request 11 also comprises a buffring option which in this        example is “buffering requested” for S1 and “no buffering        request” for S2.    -   A QoS request 12 is sent from the ADMF to the Mediation Function        MF3 in the Delivery Function DF3. The request 12 comprises        beyond the target identity, the identities of services S1 and S2        and the requested QoS for the services [HI3QoS1]&[HI3QoS1], i.e.        Animated GIF. Also the buffering options are sent in the request        12.    -   The service S1 is transported via the Packet Duplicator PD from        C to D (see FIG. 3). The original QoS [X3QoS1] in this example        is AVI-M-PEG.    -   Packets sent from C to D are duplicated without modification and        the Service S1 is forwarded with the original coded [X3QoS1]        from PD in the Intercepting Control Element ICE, to the Delivery        Function DF3.    -   A QoS check is performed in DF3. In case the QoS information for        S1 is available in the header of the Content of Communication        CC, then such info is used by MF3/DF3 to apply the behavior set        on warrant basis. Otherwise, MF3/DF3 needs to preliminary        inspect the CC and consequently treat it as set on warrant        basis.    -   In this example the requested Quality of Services [HI3QoS1] is        lower than the original Quality of Services [X3QoS1] and S1 is        consequently transcoded TC1 in the MF3/DF3 into the requested        [HI3QoS1] i.e. S1 is transcoded from AVI-M-PEG to Animated GIF.    -   S1 with original Quality of Services [X3QoS1] is buffered BUFF1,        as set on warrant basis, in an MF3 database.    -   S1 with requested Quality of Services [HI3QoS1] is sent from        MF3/DF3 to LEMF where it is observed by an agency.    -   In this example the agency finds the [HI3QoS1] not to be        sufficient for interception purposes (e.g. it is not possible to        interpret the meaning of the video signal).    -   A further request 13 is sent from LEMF to MF3/DF3. The buffered        S1 with original Quality of Services [X3QoS1] is hereby        requested to be retrieved.    -   The buffered S1 with original Quality of Services [X3QoS1] is        sent on the HI3 from MF3/DF3 to LEMF.    -   If no other agency has required the CC for the same target, the        buffered content will be removed DROP1 from MF3/DF3. As an        alternative, if the original QoS was not requested to be        retrieved the buffered CC still would have been removed after        expiration of a specified time period. The time period may be        set in a default manner or set in the request 12 by the        requesting agency. The clock hereby starts when S1 [HI3QoS1] is        sent from MF3/DF3 to LEMF and expires after the set time has        lapsed.

While S1 was requested to be buffered, S2 was requested not to bebuffered. FIG. 4 discloses the following further steps regarding thehandling of S2:

-   -   The service S2 is transported via the Packet Duplicator PD from        C to D. The coded QoS for the signal S2 when transported from C        to D is called the original QoS and is referred to as [X3QoS2]        in the figures. S2 is forwarded with the original coded [X3QoS2]        from PD, i.e. from the Intercepting Control Element ICE, to the        Delivery Function DF3.    -   A QoS check is performed in DF3 and [HI3QoS2] is found to be        lower than [X3QoS2].    -   S2 is transcoded TC2 in the MF3/DF3 into the requested [HI3QoS2]        i.e. S2 is transcoded from AVI-M-PEG to Animated GIF.    -   S2 with requested Quality of Services [HI3QoS2] is sent from        MF3/DF3 to LEMF without being buffered in MF3/DF3 and as a        consequence, S2 is removed DROP2 from MF3/DF3 after sending.    -   If the agency finds the [HI3QoS2] to be un-sufficient for        interception purposes, there will be no possibility to retrieve        the original information. The advantage is that no storage        consuming buffering has taken place.

The association on warrant basis can be taking into account severalHI3QoS specified on a service basis.

As seen in the example above, the buffered CC will be erased from theMF3 database at the expiry of the configured timer, or as an alternativeif the LI agency explicitly orders the erasure, for example if CC at thelower QoS is considered sufficient for lawful investigation purposes.

Other services involving video content (e.g., MMS messages with attachedvideo clips) could be required with different “presentations” (QoS). Ingeneral, for video services, the agency may require any of the possibleconversion as reported in the following table:

TABLE 1 Video-to-Slideshow and Video-to-Video Transcoding To AnimatedAnimation + Animation + Animation + Animation + SMIL + 3GPP From Gif MNGAMR-NB QCELP WAV-GSMG, 10 WAV-PCM JPEG H.263 MPEG-4 SP 3GPP H.263 ✓ ✓ ✓✓ ✓ ✓ ✓ ✓ ✓ MPEG-4 SP ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ 3GPP2/ H.263 ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓K3G/ MPEG-4 SP ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ AMC ISMA MPEG-4 SP ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓AVI M JPEG ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ DIVX ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ MS.RLE ✓ ✓ ✓ ✓ ✓ ✓ ✓✓ ✓ MS.MPEG4 ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ MPEG4 ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ Cinepak ✓ ✓ ✓ ✓ ✓✓ ✓ ✓ ✓ MPEG-1 ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ MPEG-2 ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ To AVI3GPP2/K3G/AMC ISMA MS.MPEG4 From H.263 MPEG-4 SP MPEG-4 SP M-JPEG (V2,V3) MPEG 4 MPEG-1 3GPP H.263 ✓ ✓ ✓ ✓ ✓ ✓ ✓ MPEG-4 SP ✓ ✓ ✓ ✓ ✓ ✓ ✓3GPP2/ H.263 ✓ ✓ ✓ ✓ ✓ ✓ ✓ K3G/ MPEG-4 SP ✓ ✓ ✓ ✓ ✓ ✓ ✓ AMC ISMA MPEG-4SP ✓ ✓ ✓ ✓ ✓ ✓ ✓ AVI M JPEG ✓ ✓ ✓ ✓ ✓ ✓ ✓ DIVX ✓ ✓ ✓ ✓ ✓ ✓ ✓ MS.RLE ✓ ✓✓ ✓ ✓ ✓ ✓ MS.MPEG4 ✓ ✓ ✓ ✓ ✓ ✓ ✓ MPEG4 ✓ ✓ ✓ ✓ ✓ ✓ ✓ Cinepak ✓ ✓ ✓ ✓ ✓ ✓✓ MPEG-1 ✓ ✓ ✓ ✓ ✓ ✓ ✓ MPEG-2 ✓ ✓ ✓ ✓ ✓ ✓ ✓

This solution results in a video transcoding functionality integrated inthe DF3/MF3. The Video Transcoding could perform the followingconversions:

-   -   Video-to-video    -   Video-to-slideshow    -   Video-to-image

Other possible usages: audio transcoding, media filtering (e.g., onlythe audio of a video call, no images/clip in web pages or MMS),replacement of media content by compressed file archives.

To prevent unauthorized users the Content of Communication may bebuffered in encrypted form. After sending the CC with lower QoS, itshall be ensured that the possible buffered contents are not altered byunauthorized entities. This can be done by commonly used techniques,like digital signatures. Besides, the HI3 Content of Communication sentto the agency with a lower QoS can serve itself as prove of the bufferedcontents integrity. The agency can use the same transcodingfunctionality to verify the integrity of the buffered contents. A proveis obtained if the same contents are obtained with the lower QoS. Theidea is that the CC at lower QoS can serve as digital signature of thebuffered CC at original QoS. When Agency shall retrieve the buffered CC,it could verify the integrity of such CC by applying on it thetranscoding function and comparing the result with the CC at lower Qos.If they are equal, then the retrieved buffered CC is integral.

Receipt of low QoS Content of Communication reduces the storage amountneeds in the situation where monitoring centre does not operate in realtime. A filtering mechanism at DF3 premises could be optionally offeredto make storage needs significantly lower.

FIG. 5 discloses a flowchart in which some important steps are shown.The flowchart is to be read together with the earlier shown figures. Theflowchart comprises the following steps:

-   -   The request 11 for Lawful Interception activation comprising        target identity and service identity S1 is sent from LEMF to        ICE. A block 101 discloses this step in FIG. 5.    -   A QoS request 12 is received from LEMF to the MF3/DF3. The        request 12 comprises beyond the target identity and the        identities of service S1, a specification of the requested QoS        [HI3QoS1] and also the buffering option “Buffering requested”. A        block 102 discloses this step in FIG. 5.    -   The service S1 is forwarded with the original coded Quality of        Services [X3QoS1] from the Packet Duplicator PD in ICE, to the        Delivery Function DF3. A block 103 discloses this step in FIG.        5.    -   The requested Quality of Services [HI3QoS1] is lower than the        original Quality of Services [X3QoS1] and S1 is transcoded TC1        in the MF3/DF3 into the requested Quality of Services [HI3QoS1].        A block 104 discloses this step in FIG. 5.    -   S1 with original Quality of Services [X3QoS1] is buffered BUFF1        in a MF3 database. A block 105 discloses this step in FIG. 5.    -   S1 with requested Quality of Services [HI3QoS1] is sent from        MF3/DF3 to LEMF. A block 106 discloses this step in FIG. 5.    -   The agency finds the [HI3QoS1] to be not sufficient for        interception purposes. A block 107 discloses this step in FIG.        5.    -   A further request 13 is sent from LEMF to MF3/DF3. The buffered        S1 with original Quality of Services [X3QoS1] is requested to be        retrieved. A block 108 discloses this step in FIG. 5.    -   The buffered S1 with original Quality of Services [X3QoS1] is        sent on the HI3 from MF3/DF3 to LEMF. A block 109 discloses this        step in FIG. 5.

An example of a system used to put the invention into practice isschematically shown in FIG. 6. The block schematic constellationcorresponds to the one disclosed in FIGS. 2 and 3 but is by no meanslimited to these two examples. The system disclosed in FIG. 6 is notnecessarily related to monitoring or Lawful Interception and can be usedin any data transportation configuration. FIG. 6 discloses a deliveryfunction 22 attached to a transmitter 21 and a receiver 28. Traffic,having originally coded QoS is transmitted from 21 to 22. The trafficwill optionally arrive to a filter 24 that is used to filter undesiredtraffic. The delivery function 22 comprises an input 29 to which aspecification of requested QoS will arrive. The traffic with originallycoded QoS will be received by a comparator 25 used to compare originalQoS value with requested QoS value. Traffic may optionally be sent to anEncryption Unit 26 and/or to storage 27 where traffic on request may bebuffered. A timer 30 will optionally after lapse, drop the bufferedtraffic. In dependence of the result from the comparator 25, trafficwith original or requested Qos will be forwarded from the deliverfunction 22 to the receiver 28. A processor unit 23 in delivery function22 handles the control of traffic and entities within the DF.

Enumerated items are shown in the figures as individual elements. Inactual implementations of the invention however, they may be inseparablecomponents of other electronic devices such as a digital computer. Thus,actions described above may be implemented in software that may beembodied in an article of manufacture that includes a program storagemedium. The program storage medium includes data signal embodied in oneor more of a carrier wave, a computer disk (magnetic, or optical (e.g.,CD or DVD, or both), non-volatile memory, tape, a system memory, and acomputer hard drive.

The invention is not limited to the above described and in the drawingsshown embodiments but can be modified within the scope of the enclosedclaims. The systems and methods of the present invention may beimplemented on any of the Third Generation Partnership Project (3GPP),European Telecommunications Standards Institute (ETSI), AmericanNational Standards Institute (ANSI) or other standard telecommunicationnetwork architecture.

1. Method to enhance delivery capacity for traffic in a communicationnetwork, comprising the following steps: receiving to an access point, arequest to monitor traffic; receiving from the access point to aDelivery Function, the requested traffic with originally coded Qualityof Services (QoS); comprising receiving to the Delivery Function, aspecification of requested QoS; establishing that the requested QoS islower than the originally coded QoS; transcoding the received trafficinto requested QoS.
 2. Method according to claim 1 comprising thefollowing further step: receiving to a Delivery Function, a request tobuffer requested traffic.
 3. Method according to claim 1 comprising thefollowing further step: buffering, in the Delivery Function, thereceived specified traffic with the original coded QoS.
 4. Methodaccording to claim 1 comprising the following further step: forwardingto a receiving facility, the traffic transcoded to the requested QoS. 5.Method according to claim 3 comprising the following further steps:lapse of a specified time interval; dropping out of the bufferedtraffic.
 6. Method according to claim 3 comprising the following furthersteps: receive to the Delivery Function, a request to drop out bufferedtraffic; dropping out the buffered traffic.
 7. Method according to claim1 whereby the traffic is encrypted before buffering.
 8. Method accordingto claim 1 whereby the received traffic is filtered at Delivery Functionpremises.
 9. Method to enhance delivery capacity for traffic in acommunication network, comprising the following steps: receiving to aDelivery Function, traffic with originally coded Quality of ServicesQoS; comprising receiving to the Delivery Function, a specification ofrequested QoS; establishing that the originally coded QoS is higher thanthe requested QoS; transcoding the received traffic into requested QoS.10. An apparatus used to enhance delivery capacity for traffic in acommunication network, comprising: means for receiving to an accesspoint, a request to monitor traffic; means for receiving from the accesspoint to a Delivery Function, the requested traffic with originallycoded Quality of Services QoS; comprising means for receiving to theDelivery Function, a specification of requested QoS; means forestablishing that the requested QoS is lower than the originally codedQoS; means for transcoding the received traffic into requested QoS. 11.The apparatus of claim 10 further comprising: means for receiving to theDelivery Function, a request to buffer requested traffic.
 12. Theapparatus of claim 10 further comprising: means for buffering, in theDelivery Function, the received specified traffic with the originalcoded QoS.
 13. The apparatus of claim 10, further comprising: means forforwarding to a receiving facility, the traffic transcoded to therequested QoS.
 14. The apparatus of claim 12 further comprising: meansto detect lapse of a specified time interval; means for dropping out ofthe buffered traffic.
 15. The apparatus of claim 12 further comprising:means for receiving to the Delivery Function, a request to drop outbuffered traffic; means for dropping out the buffered traffic.
 16. Theapparatus of claim 10 comprising means to encrypt the traffic beforebuffering.
 17. The apparatus of claim 10 comprising means to filter thereceived traffic.
 18. Node in a communication network, comprising: meansto receive requested traffic with originally coded Quality of ServicesQoS; comprising means to receive, a specification of requested QoS;means to establishing that the originally coded QoS is higher than therequested QoS; means for transcoding the received traffic into requestedQoS.
 19. A computer readable medium having stored thereon a plurality ofinstructions, the plurality of instructions which, when executed by aprocessor, cause the processor to perform the steps of a method forenhancing delivery capacity for traffic in a communication network,comprising: receiving with originally coded Quality of Services (QoS);receiving a specification of requested QoS; establishing that theoriginally coded QoS is higher than the requested QoS; transcoding thereceived traffic into requested QoS.