Tech-invite3GPPspecsSIPRFCs
Overview21222324252627282931323334353637384‑5x

Content for  TS 33.107  Word version:  16.0.0

Top   Top   Up   Prev   Next
0…   4   5…   5A…   6…   7…   7A…   8…   9…   10…   11…   12…   12.2…   12.3…   12.4…   12.5…   13…   14…   15…   16…   17…   18…   19…   20…   21…   22…   23…   A…   B…   C…   D…   E…   F…   G…   H…   I…   J…   L…

 

D  Information flows for Lawful Interception invocation at the MGW using H.248 |R5|Word‑p. 311

D.0  General |R12|

The following figures show the use of H.248 in setting up a bearer intercept point at the MGW.

D.1  Mobile to Mobile call, originating side is target

Figure D.1 shows the network model for interception of a mobile-to-mobile call, where the originating mobile subscriber is the target for interception.
Figure D.2 message sequence only shows the H.248 elements related to the necessary topology, which could be used in this example.
Normal call establishment using other H.248 elements shall be in accordance with TS 23.205.
It should be noted that other means exist with H.248 to achieve similar interception.
[not reproduced yet]
Figure D.1: Mobile to Mobile call originating side is target (network model)
Up
[not reproduced yet]
Figure D.2: Mobile to Mobile call originating side is target
Up

Up   Top   ToC