September 2008
Intermediate to advanced
384 pages
9h 5m
English
This chapter covers the methodology of deploying Lawful Interception in the following interfaces:
• Call Data Connection Interface
• Call Content Connection Interface
Chapter 10 covered the fundamentals of Lawful Interception, such as definition, requirements, basic architecture, and so on. This chapter covers the next step, how to implement each of the fundamentals in the VoIP service environment.
Even if the requirement from Law Enforcement Agent (LEA) is fixed, the implementation varies depending on a Telecommunications Service Provider (TSP). The primary reason for this variance is that there is no single standard that rules the method of implementation for whole ...