• Functional description of LI
  • Etsi tc LI 06litd025 page of etsi/tc li#06 Povoa de Varzim, Portugal, 23-25 July 2004




    Download 95 Kb.
    bet16/19
    Sana03.07.2021
    Hajmi95 Kb.
    #15372
    1   ...   11   12   13   14   15   16   17   18   19

    Coverage


    Today, very few 802.11 networks offer broad coverage. Rather, the coverage is centred on a number of popular locations with gaps in between.
    1. Lawful Interception


    We start by reminding ourselves of the essence of LI arrangements. There are two general arrangements for LI of wireless LANs. These involve interception at a central location or at each access point.
      1. Functional description of LI


    The principal elements of LI arrangements are shown in figure 6 below. Two internal intercepting functions (IIF) are attached to the Internet access function (IIF (3)) and the AAA function (IIF (2)). A mediation function (MF), which includes handover functions, connects to each IIF. All of these elements are under the administrative control of a Lawful Interception Administration Function (LIAF).

    The interface between an IIF and the activity it monitors may be active or passive. An active IIF might be implemented, uniquely in software, as otherwise extra functionality which makes and forwards copies of certain AAA activity to an MF. A passive IIF might be implemented using a classic sniffer. The comparison between these two approaches is not considered further in this document.



    Within a wireless LAN there may be one or many instances of the MF. In general, there will only be one instance of the LIAF.

    F
    igure 6: Elements of LI functionality in a Wireless LAN

      1. Download 95 Kb.
    1   ...   11   12   13   14   15   16   17   18   19




    Download 95 Kb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Etsi tc LI 06litd025 page of etsi/tc li#06 Povoa de Varzim, Portugal, 23-25 July 2004

    Download 95 Kb.