TR 102 528 : 1.1.1
Current
The latest, up-to-date edition.
LAWFUL INTERCEPTION (LI); INTERCEPTION DOMAIN ARCHITECTURE FOR IP NETWORKS
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Reference model
4.1 Description of functional elements
4.2 Operational considerations
5 Internal Network Interfaces (I N I)
5.1 INI1
5.2 INI2
5.3 INI3
5.4 CC Trigger Interface (CCTI)
5.5 CC Control Interface (CCCI)
6 Security
7 Applying the reference model
7.1 CCTF collocated with MF
7.2 CCTF collocated with IRI-IIF
7.3 CCTF collocated with IRI-IIF and CC-IIF
Annex A: Service scenarios
A.1 IP Multimedia service
A.2 Data services
Annex B: Deployment scenarios
B.1 IRI-IIF integrated in Call Agent, CC-IIF
integrated in aggregation router, CCTF collocated
with MF
B.2 IRI-IIF integrated in Call Agent, CC-IIF integrated
in Media Gateway, CCTF collocated with MF
B.3 IRI-IIF and CCTF integrated in Call Agent, CC-IIF
integrated in Media Gateway
B.4 Stand-alone IRI-IIF, CC-IIF integrated in aggregation
router or aggregation router, CCTF collocated with MF
B.5 IRI-IIF integrated in Call Agent, stand-alone
CC-IIF, CCTF collocated with MF
B.6 IRI-IIF, CCTF and CC-IIF integrated in a device
Annex C: Examples of CCCI
C.1 Dedicated CCCI using SNMPv3 MIBs
C.2 In-band CCCI using H.248
Annex D: Change Request history
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.