Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 33.108
Word version: 18.0.0
0…
4…
5…
6…
9…
12…
14…
16…
A…
C…
L…
C
UMTS and EPS HI3 interfaces
C.0
Introduction
C.1
UMTS LI correlation header
C.2
FTP
C.3
ETSI TS 102 232-1 and ETSI TS 102 232-7
D
LEMF requirements - handling of unrecognised fields and parameters
E
Bibliography
F
Correlation indications of IMS IRI with GSN CC at the LEMF
G
United States lawful interception
G.1
Delivery methods preferences
G.2
HI2 delivery methods
G.3
HI3 delivery methods
G.4
Cross reference of terms between J-STD-025-A and 3GPP
H
United States lawful interception
J
Definition of the UUS1 content associated and sub-addressing to the CC link
J.0
Introduction
J.1
Definition of the UUS1 content associated to the CC link
J.2
Use of sub-address and calling party number to carry correlation information
K
VoIP HI3 Interface
K.1
VoIP CC Protocol Data Unit
K.2
Definition of VoIP LI Correlation header
K.3
Definition of Payload
K.4
LEMF Considerations
C
(Normative) UMTS and EPS HI3 interfaces
p. 243
C.0
Introduction
|R12|
p. 243
C.1
UMTS LI correlation header
p. 243
C.1.1
Introduction
p. 243
C.1.2
Definition of ULIC header version 0
p. 243
C.1.3
Definition of ULIC header version 1
p. 245
C.1.4
Exceptional procedure
p. 246
C.1.5
Other considerations
p. 246
C.2
FTP
p. 246
C.2.1
Introduction
p. 246
C.2.2
Usage of the FTP
p. 246
C.2.3
Exceptional procedures
p. 248
C.2.4
CC contents for FTP
p. 248
C.2.4.1
Fields
p. 248
C.2.4.2
Information element syntax
p. 250
C.2.5
Other considerations
p. 252
C.2.6
Profiles (informative)
|R7|
p. 253
C.3
ETSI TS 102 232-1 and ETSI TS 102 232-7
|R16|
p. 254
C.3.1
General
p. 254
D
LEMF requirements - handling of unrecognised fields and parameters
p. 256
E
Bibliography
p. 257
F
Correlation indications of IMS IRI with GSN CC at the LEMF
|R7|
p. 259
G
United States lawful interception
p. 260
G.1
Delivery methods preferences
p. 260
G.2
HI2 delivery methods
p. 260
G.2.1
TPKT/TCP/IP
p. 260
G.2.1.1
Introduction
p. 260
G.2.1.2
Normal Procedures
p. 260
G.2.1.2.0
General
|R12|
p. 260
G.2.1.2.1
Usage of TCP/IP when MF initiates TCP Connections
p. 260
G.2.1.2.2
Use of TPKT
p. 260
G.2.1.2.3
Sending of LI messages
p. 261
G.2.1.3
ASN.1 for HI2 Mediation Function Messages
p. 261
G.2.1.4
Error Procedures
p. 261
G.2.1.5
Security Considerations
p. 262
G.3
HI3 delivery methods
p. 262
G.3.1
Use of TCP/IP
p. 262
G.3.1.1
Normal Procedures
p. 262
G.3.1.1.0
Introduction
|R12|
p. 262
G.3.1.1.1
Usage of TCP/IP when MF/DF initiates TCP Connections
p. 262
G.3.1.1.2
Use of TPKT
p. 262
G.3.1.1.3
Sending of Content of Communication Messages
p. 263
G.3.1.2
ASN.1 for HI3 Mediation Function Messages
p. 263
G.3.1.3
Error Procedures
p. 263
G.3.1.4
Security Considerations
p. 263
G.4
Cross reference of terms between J-STD-025-A and 3GPP
p. 264
H
(Normative) United States lawful interception
p. 265
I
Void
J
(Normative) Definition of the UUS1 content associated and sub-addressing to the CC link
|R6|
p. 268
J.0
Introduction
|R12|
p. 268
J.1
Definition of the UUS1 content associated to the CC link
p. 268
J.2
Use of sub-address and calling party number to carry correlation information
p. 268
J.2.1
Introduction
p. 268
J.2.2
Subaddress options
p. 268
J.2.3
Subaddress coding
p. 269
J.2.3.0
General
|R12|
p. 269
J.2.3.1
BCD Values
p. 269
J.2.3.2
Field order and layout
p. 269
J.2.4
Field coding
p. 272
J.2.4.0
Introduction
|R12|
p. 272
J.2.4.1
Direction
p. 273
J.2.4.2
Coding of the Calling Party Number
p. 273
J.2.5
Length of fields
p. 273
K
(Normative) VoIP HI3 Interface
|R12|
p. 274
K.1
VoIP CC Protocol Data Unit
p. 274
K.2
Definition of VoIP LI Correlation header
p. 274
K.3
Definition of Payload
p. 275
K.4
LEMF Considerations
p. 275