|
Etsi tc LI 06litd025 page of etsi/tc li#06 Povoa de Varzim, Portugal, 23-25 July 2004
|
bet | 16/19 | Sana | 03.07.2021 | Hajmi | 95 Kb. | | #15372 |
Coverage
Today, very few 802.11 networks offer broad coverage. Rather, the coverage is centred on a number of popular locations with gaps in between.
Lawful Interception
We start by reminding ourselves of the essence of LI arrangements. There are two general arrangements for LI of wireless LANs. These involve interception at a central location or at each access point.
The principal elements of LI arrangements are shown in figure 6 below. Two internal intercepting functions (IIF) are attached to the Internet access function (IIF (3)) and the AAA function (IIF (2)). A mediation function (MF), which includes handover functions, connects to each IIF. All of these elements are under the administrative control of a Lawful Interception Administration Function (LIAF).
The interface between an IIF and the activity it monitors may be active or passive. An active IIF might be implemented, uniquely in software, as otherwise extra functionality which makes and forwards copies of certain AAA activity to an MF. A passive IIF might be implemented using a classic sniffer. The comparison between these two approaches is not considered further in this document.
Within a wireless LAN there may be one or many instances of the MF. In general, there will only be one instance of the LIAF.
F igure 6: Elements of LI functionality in a Wireless LAN
|
| |