Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 23.784  Word version:  16.0.0

Top   Top   Up   Prev   None
1…   4…

 

4  Scenariosp. 8

4.1  Generalp. 8

4.2  Scenario 1: Discreet listening of MCPTT and MCVideo private callsp. 8

4.3  Scenario 2: Discreet listening of MCPTT and MCVideo group callsp. 10

4.4  Scenario 3: Discreet listening of MCVideo pullp. 11

4.5  Scenario 4: Discreet listening of MCVideo pushp. 12

4.6  Scenario 5: Discreet listening of MCData SDSp. 14

4.7  Scenario 6: Discreet listening of MCData file distributionp. 15

4.8  Scenario 7: Logging scenariosp. 16

4.8.1  Generalp. 16

4.9  Scenario 8: Limitations on discreet listening due to regulatory constraints and operator security policiesp. 17

5  Key Issuesp. 18

6  Solutionsp. 25

6.1  Solution 1: Functionality for discreet listeningp. 25

6.2  Solution 2: Discreet listening of MCVideo push and pullp. 28

6.3  Solution 3: Functionality for on-network logging and replayp. 32

6.4  Solution 4: On-network logging for interconnection and migrationp. 37

6.5  Solution 5: Discreet listening for interconnection and migrationp. 40

6.6  Solution 6: Discreet listening to an MCPTT groupp. 43

6.7  Solution 7: Logging of MCData message store and MCData content serverp. 48

6.8  Solution 8: Discreet listening of MCData message store and MCData content serverp. 50

6.9  Solution 9: Functionality for discreet listening with regulatory constraints and operator security policiesp. 52

6.10  Solution 10: Functionality for on-network logging and replayp. 56

7  Overall Evaluationp. 58

8  Conclusionsp. 62

A  Reproduction of stage 1 requirementsp. 62

$  Change Historyp. 64


Up   Top