1 / 10

Summary of NGN LI requirements

Summary of NGN LI requirements. Fitting standards together. Scott CADZOW. The goals for NGN LI standardisation. Conformance to International User Requirement

cyrah
Download Presentation

Summary of NGN LI requirements

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Summary of NGN LI requirements Fitting standards together Scott CADZOW

  2. The goals for NGN LI standardisation • Conformance to International User Requirement • As annex to COM 96/C329/01: "European Union Council Resolution COM 96/C329/01 of 17 January 1995 on the Lawful Interception of Telecommunications" • As found in TS 101 331 "Telecommunications security; Lawful Interception (LI); Requirements of Law Enforcement Agencies“ • Compliance with objectives of ECN&S regulatory framework • The NGN consists of many ECN and many ECS with loose relationships • Clear identification of Points of Interception • What is available at different PoI • Correlation between different PoI • Prevention of duplication of invocation of interception at PoIs

  3. Documents to integrate • TISPAN • TS 187 005, in draft for NGN-R2 • 3GPP SA3-LI • 33.107, stage 2 in draft for R8 • 33.108, stage 3 in draft for R8 • TC LI • TS 102 232, handover to IP networks • ES 201 671/TS 101 671, handover to Circuit Switched networks

  4. Technologies supported by the NGN • Separation of ECN and ECS • ECS technologies: • IMS (care of 3GPP) • PES (ISDN/PSTN on soft-switches) • IPTV • Corporate services • ECN technologies: • ADSL • PLMN Radio (care of 3GPP) • LAN radio (mostly care of 3GPP) • PSTN/ISDN

  5. Interception in the NGN - identity • ECS identity • MSISDN • E.164 • SIP-url (sip-user@sip-domain) • Other … • ECN identity • IMSI • Chap credential and identity

  6. Interception in the NGN - signalling • ECS • IMS (SIP) signalling • REGISTER (equivalent to MAP, found at HLR/VLR like entities) • INVITE, ACK, BYE, CANCEL, OPTIONS (found at CSCF entities) • PES/PSS • ISDN emulation signalling found at Signalling gateways (H.248) • SIGTRAN, SIP-I • ECN • Access signalling (no service), CHAP, PPP etc.

  7. Interception in the NGN - content • ECS • No traffic content • Some extended signalling content in SDP/SIP • ECN • IP traffic content • TCP, UDP, RTP • Non-IP traffic content

  8. Problems in NGN, ECN&S interception • Correlation across ECN/ECS boundary • IMS into NASS via RACS (Gq’) for QoS transport control • Resource requests from ECS to ECN not personalised • Ownership break across ECN/ECS boundary (one CSP for each of ECN and ECS) • No correlation as there is no common visibility to CSP

  9. IMS interception • IMS is an instance of ECS technology • Independent of ECN technologies • IMS is a platform • No services per-se • Expectation from NGN • Clear identification of PoI for various IMS capabilities • Common capability for all IMS implementations

  10. Concerns to be addressed • Structure of IMS interception • One clause for any technology (IMS is an ECS technology and any ECN technology can/should be able to access it) • Reference from TS 187 005 to 33.107 • Annex showing normative application from TS 187 005 to 33.108 • Timetable for IMS interception • Required for NGN-R2 • TS 187 005 to be finalised very soon and needs to have IMS interception included • Ideally by reference to 33.107 and 33.108 • If not by reference then in a transferable way (i.e. defined in TISPAN for movement to 33.107 and 33.108 when appropriate)

More Related