TMCnet - World's Largest Communications and Technology Community

TMCnews Featured Article

July 05, 2012

Vocal Technologies Launches TR-069 Application Protocol to Enable Lawful Interception of Fax Transmissions over IP Networks

By Ashok Bindra, TMCnet Contributor

Telecom and networking solutions provider Vocal Technologies has released an enhanced TR-069 VoIP stack with integrated fax image extraction.  According to the developer, the enhanced VoIP stack may be used for Lawful Interception (LI) of fax transmissions over PSTN or IP networks.  The company said that it can used where flexibility and dynamic reconfiguration of remote LI assets is required to intercept targeted facsimile communications.

Per Vocal Tech’s explanation, TR-069 allows remote management of LI assets and other networked devices as well as auto-provisioning and reconfiguration of devices that can be triggered by network events. For interception of fax transmissions, the LI system detects fax communications activity and identifies the codecs, protocols, routing, and other parameters that will be used during the transfer, said Vocal Tech. If necessary, the LI application can reconfigure itself using TR-069 auto-provisioning software to process the communications of interest, added the maker.

The supplier stated that with Fax over IP, SIP signaling and communications content will take separate routes through the network and are unlikely to use the same routing in successive sessions. In fact, they may even change routes during a transfer session due to network interruptions or congestion, noted Vocal Tech.

According to Vocal Tech, the LI system has to detect these events and potentially reconfigure LI assets at multiple network interception points to capture the targeted communications. The application layer protocol TR-069 offers the flexibility to remotely reconfigure the LI assets and respond to these changes as they occur, stated the supplier.

Per Vocal Tech’s description, the fax image extraction software is designed to work equally well with either live input or previously recorded data. Consequently, depending on the application and communications involved, interception and decoding of the telecommunications may be accomplished in near real-time, said Vocal Tech. However, if signaling or content messaging is encrypted, an additional (and non-real-time) step to decrypt the information is required for post processing by the image extraction applications, added Vocal Tech.

Dave Jamieson of business development at Vocal said, “Vocal’s integrated suite of modular software helps developers rapidly implement highly interoperable standards-based solutions such as Fax Lawful Interception with Fax Image Extraction and TR-069…Our customers can leverage our integrated software suite to quickly add new features to their applications. It reduces system integration efforts to get new products to market more quickly,” added Jamieson.

Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO West 2012, taking place Oct. 2-5, in Austin, TX. ITEXPO (News - Alert) offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations. It's also where service providers learn how to profitably roll out the services their subscribers are clamoring for – and where resellers can learn about new growth opportunities. For more information on registering for ITEXPO click here.

Stay in touch with everything happening at ITEXPO. Follow us on Twitter.

Edited by Rich Steeves

blog comments powered by Disqus

Technology Marketing Corporation

35 Nutmeg Drive Suite 340, Trumbull, Connecticut 06611 USA
Ph: 800-243-6002, 203-852-6800
Fx: 203-866-3326

General comments:
Comments about this site:


© 2018 Technology Marketing Corporation. All rights reserved | Privacy Policy