Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFs   Ti+SearchTech-invite World Map Symbol

 

Top   Up   Prev   Next
1…   5…   7…   8…   9…   10…   11…   12…   12.4…   12.5…   13…   16…   18…   19…   21…   A…   C…   E…   F…   H…

 

 

F  Examples of IMS-based VoIP Lawful Interception (LI) call flows [R12]PDF-p. 315
F.1  General remarks
F.2  Call Originations from Target in Home CSP
F.3  Call Terminations to Target - Home CSP
F.4  Call Forwarding - Non RoamingPDF-p. 318
F.5  IMS RoamingUp
F.6  Interception in Visited CSP
F.7  Ad-Hoc Conference Calls established by the Target [R13]Up
G  Examples of CC interception for transcoded media [R12]PDF-p. 337

Up   Top   ToC