Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TS 33.107  Word version:  17.0.0

Top   Top   Up   Prev   Next
0…   4   5…   5A…   6…   7…   7A…   8…   9…   10…   11…   12…   12.2…   12.3…   12.4…   12.5…   13…   14…   15…   16…   17…   18…   19…   20…   21…   22…   23…   A…   B…   C…   D…   E…   F…   G…   H…   I…   J…   L…

 

F  Examples of IMS-based VoIP Lawful Interception (LI) call flows |R12|p. 339

F.1  General remarksp. 339

F.2  Call Originations from Target in Home CSPp. 339

F.3  Call Terminations to Target - Home CSPp. 341

F.4  Call Forwarding - Non Roamingp. 342

F.5  IMS Roamingp. 346

F.6  Interception in Visited CSPp. 349

F.7  Ad-Hoc Conference Calls established by the Target |R13|p. 352


Up   Top   ToC