ࡱ> }S Lvbjbj q8xx^q~ol&&&$&PPPPPt`Q&D)lS.FVFVVVXdsrzK(M(M(M(M(M(M($+ -2q(&} XX}}q(_VV(j___}J V&VK(_}K(_ _ *"Z&[$V S I&)P~s"w$(TD)#</ˁ/w$_&& TD <> Draft ETSI EG 201 xxx V0.0.10 (2001-04) ETSI Guide Telecommunications Security; Lawful Interception (LI); Guide to Ssystem architectures for the Lawful Interception of telecommunications traffic Grimstad TD007 Reference DEG/SEC-0030xx Keywords architecture, data, IP, security, telephony, interception ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from:  HYPERLINK "http://www.etsi.org" http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at  HYPERLINK "http://www.etsi.org/tb/status" http://www.etsi.org/tb/status/ If you find errors in the present document, send your comment to: HYPERLINK "editor@etsi.fr"editor@etsi.fr Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2001. All rights reserved. Contents  TOC \o \w "1-9" Intellectual Property Rights  PAGEREF _Toc512748932 \h 3 Foreword  PAGEREF _Toc512748933 \h 3 1 Scope  PAGEREF _Toc512748934 \h 4 2 References  PAGEREF _Toc512748935 \h 5 3 Definitions and abbreviations  PAGEREF _Toc512748936 \h 6 3.1 Definitions  PAGEREF _Toc512748937 \h 6 3.2 Abbreviations  PAGEREF _Toc512748938 \h 8 4 Introduction to LI in ETSI  PAGEREF _Toc512748939 \h 8 5 Service Capability Framework  PAGEREF _Toc512748940 \h 10 5.1 Service capability - Lawful Interception access  PAGEREF _Toc512748941 \h 11 6 Additional Service Capabilities for LI  PAGEREF _Toc512748942 \h 12 6.1 Overview  PAGEREF _Toc512748943 \h 12 6.2 Service capability - Target identification  PAGEREF _Toc512748944 \h 13 7 Recommendations  PAGEREF _Toc512748945 \h 14 History  PAGEREF _Toc512748946 \h 14  Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSISR000314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server ( HYPERLINK "http://www.etsi.org/ipr" http://www.etsi.org/ipr). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSISR000314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This ETSI Guide (EG) has been produced by ETSI Technical Committee Security (SEC), and is now submitted for the ETSI standards Membership Approval Procedure. Scotts note: Well it will be after its complete and approved. 1 Scope The present document provides a guidelines to the elements required in a generic functional telecommunications regarding architectureral to support issues for implementing Lawful Interception (LI) for telecommunications. It therefore identifies essential architectural requirements and the relationship between them for any telecommunications system that hosts an identity that is subject to interception (hereinafter referred to as target). The essential requirements are described in terms of functions or functionality. Where parameters are required to implement these requirements these too are described. Lawful interception is provisioned by telecommunications systems that host a target in two ways: The functionality of the technology independent handover interface; The functionality of technology specific internal interfaces to map to the handover interface. This document is a guide to the use of the technology independent handover interface and provides a series of recommendations to the technology specific internal interfaces. It also provides recommendations against both parts for future work. The lawful interception function itself is broken into two parts: Interception; and, Handover. The first of these two parts is technology dependent, the second is technology independent. This document describes in an abstract architecture those functions and their parameters required for any technology to allow interception to be carried out lawfully. This document also describes in an abstract architecture those functions, parameters and protocols required to handover the intercepted material from any technology in a common way. This document fits within the overall set of LI documents from ETSI as shown below (needs some refinement):  EMBED Word.Picture.8  Figure A: Hierarchical ordering of ETSI LI documents It is based on ETSI requirements in this area. National requirements are not addressed here. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. References are either specific (identified by date of publication and/or edition number or version number) or nonspecific. For a specific reference, subsequent revisions do not apply. For a non-specific reference, the latest version applies. [ SEQ ref1] ETSI ETR 331: "Security Techniques Advisory Group (STAG); Definition of user requirements for lawful interception of telecommunications; Requirements of the law enforcement agencies". [ SEQ ref2] ETSI ES 201 158: "Telecommunications Security; Lawful Interception (LI); Requirements for network functions". [ SEQ ref3] ETSI ES 201 671: "Telecommunications security; Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic". [ SEQ ref4] ETSI ETR 332: "Security Techniques Advisory Group (STAG); Security requirements capture". 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the terms and definitions given in [ REF REF_ETSIETR331 1] and [ REF REF_ETSIES201158 2] and the following apply: access provider: access provider provides a user of some network with access from the user's terminal to that network NOTE 1: This definition applies specifically for the present document. In a particular case, the access provider and network operator may be a common commercial entity. NOTE 2: The definitions from ETR 331 [ REF REF_ETSIETR331 1] have been expanded to include reference to an access provider, where appropriate. authorizing authority: authority, such as court of law, that is entitled to authorize lawful interception (to) buffer: temporary storing of information in case the necessary telecommunication connection to transport information to the LEMF is temporarily unavailable call: any connection (fixed or temporary) capable of transferring information between two or more users of a telecommunications system. In this context a user may be a person or a machine content of communication: information exchanged between two or more users of a telecommunications service, excluding intercept related information. This includes information which may, as part of some telecommunications service, be stored by one user for subsequent retrieval by another Domain Name Server (DNS): network element, which functions as a translator between logical names and network addresses. This type of element is widely used for IP traffic today. It can be anticipated that similar functionality will be introduced also for telephony in the near future handover interface: physical and logical interface across which the interception measures are requested from an AP/NWO/SvPnetwork operator / access provider / service provider, and the results of interception are delivered from an AP/NWO/SvP network operator / access provider / service provider to an LEMF identity: technical label which may represent the origin or destination of any telecommunications traffic, as a rule clearly identified by a physical telecommunications identity number (such as a telephone number) or the logical or virtual telecommunications identity number (such as a personal number) which the subscriber can assign to a physical access on a case-by-case basis intercept related information: collection of information or data associated with telecommunication services involving the target identity, specifically call associated information or data (e.g. unsuccessful call attempts), service associated information or data (e.g. service profile management by subscriber) and location information interception (or lawful interception): action (based on applicable laws and regulations), performed by an AP/NWO/SvP, of making available certain information and providing that information to an LEMF NOTE 3: In the present document the term interception is not used to describe the action of observing communications by an LEA (see below). interception interface: physical and logical locations within the access provider's / network operator's / service provider's telecommunications facilities where access to the content of communication and intercept related information is provided. The interception interface is not necessarily a single, fixed point interception measure: technical measure which facilitates the interception of telecommunications traffic pursuant to the relevant national laws and regulations interception subject: a person or persons, specified in a lawful authorization, whose telecommunications are to be intercepted internal intercepting function: point within a network or network element at which the content of communication is made available internal network interface: network's internal interface between the Internal Intercepting Function and a mediation function Internet Service Provider (ISP): business entity that offers connectivity to the Internet, primarily for dial-in subscribers. The ISP will generally also provide e-mail facilities and other higher-level Internet services Law Enforcement Agency (LEA): organization authorized, by a lawful authorization based on a national law, to request interception measures and to receive the results of telecommunications interceptions Law Enforcement Monitoring Facility (LEMF): law enforcement facility designated as the transmission destination for the results of interception relating to a particular interception subject lawful authorization: permission granted to an LEA under certain conditions to intercept specified telecommunications and requiring co-operation from a AP/NWO/SvP. Typically this refers to a warrant or order issued by a lawfully authorized body LEA network: network connections and special protocol functions that are required for delivery of intercept products from a mediation function or delivery function to the LEMF(s). This network is specified by and normally belongs to the LEA domain location information: information relating to the geographic, physical or logical location of an identity relating to an interception subject mail server: network element which serves as a 'point of presence' (POP) for receiving and storing and forwarding email on behalf of a registered mail user on that server. A variant of the mail server is the send mail server (SMTP), which dispatches mail from the user to the e-mail network. The POP usually requires login with a password on the application level, while the SMTP can be used after session or link validation only mediation function: mechanism which passes information between an access provider or network operator or service provider and a handover interface network element: component of the network structure, such as a local exchange, higher order switch or service control processor network operator: operator of a public telecommunications infrastructure which permits the conveyance of signals between defined network termination points by wire, by microwave, by optical means or by other electromagnetic means Open System Interconnect (OSI) model: model with 7 layers for interconnection of network nodes. The model implies that nodes are to communicate on equivalent layers, for instance layer 3 (network) to layer 3, or telephone number to IP-address Quality of Service: quality specification of a telecommunications channel, system, virtual channel, computertelecommunications session, etc. Quality of service may be measured, for example, in terms of signaltonoise ratio, bit error rate, message throughput rate or call blocking probability reliability: probability that a system or service will perform in a satisfactory manner for a given period of time when used under specific operating conditions result of interception: information relating to a target service, including the content of communication and intercept related information, which is passed by an access provider or network operator or service provider to an LEA. Intercept related information shall be provided whether or not call activity is taking place service information: Information used by the telecommunications infrastructure in the establishment and operation of a network related service or services. The information may be established by an access provider, network operator, a service provider or a network user service provider: natural or legal person providing one or more public telecommunications services whose provision consists wholly or partly in the transmission and routing of signals on a telecommunications network. A service provider need not necessarily run his own network session: period of interaction with an information or communication system during which the user is authenticated and connected to a user identity with certain authorities target identity: identity associated with a target service (see below) used by the interception subject target identification: identity which relates to a specific lawful authorization as such. This might be a serial number or similar. It is not related to the denoted interception subject or subjects target service: telecommunications service associated with an interception subject and usually specified in a lawful authorization for interception NOTE 4: There may be more than one target service associated with a single interception subject. telecommunications: any transfer of signs, signals, writing images, sounds, data or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photo-optical system telecommunication service provider: can be a network operator, an access provider or a service provider 3.2 Abbreviations For the purposes of the present document, the abbreviations given in [ REF REF_ETSIETR331 1] and [ REF REF_ETSIES201158 2] and the following apply: AP Access Provider ETR ETSI Technical Report GSM Global System for Mobile communications HI Handover Interface IIF Internal Intercepting Function IN Intelligent Network INI Internal network interface IP Internet Protocol IRI Intercept Related Information ISDN Integrated Services Digital Network ISP Internet Service Provider LEA Law Enforcement Agency LEMF Law Enforcement Monitoring Facility LI Lawful Interception MF Mediation Function NWO NetWork Operator PTN Public Telephony Network PTO Public Telephony Operator QoS Quality of Service SMF Service Management Function (in IN) SMS GSM Short Message Service SvP Service Provider TCP/IP Transmission Control Protocol/Internet Protocol TM Transport Mechanism NWO/AP/SvP Telecommunication Service Provider 4 Introduction to LI in ETSI Lawful interception comprises two (2) parts: Interception; and, Handover. Handover in this context is the set of processes by which interception material is given to the LEA at its LEMF. The interface for handover is described in ES 201 671 and is composed of three (3) logical interfaces which may be implemented by a number of physical interfaces. CLARIFICATION POINT: Is the requirement of LEAs to restrict, by standardisation and conformance, the number of possible physical interfaces to (ideally) one (1) or is it sufficient to define only the logical exchange of data? Interception in this context is the set of processes that track the activities of a target in a particular environment and record these activities prior to handover. The delay between activity, recording and handover should in all cases be close to zero. In this context recording is a transient activity and does not infer any storage. CLARIFICATION POINT: It is unclear from the requirements documents (ETR 331 and ES 201 158) if auditing for LI purposes is carried out in the processes related to the handover interface or in the processes related to the interception activity. RECOMMENDATION  SEQ RECOMMENDATION \* MERGEFORMAT 1: Audit shall only be required in the handover interface processes. The provision and definition of LI within telecommunications standards is made with respect to the flows in figure x.  EMBED Word.Picture.8  Figure  SEQ Figure \* MERGEFORMAT 1: Method of definition in ETSI LI specifications The handover of data and media to the LEMF is described by ES 201 671. The form of the description in ES 201 671 is to describe the syntax of the data that is transferred using Abstract Syntax Notation 1 (ASN.1) with a description of the behaviour of the handover in text. Any technology used to build telecommunications systems that in turn need to be able to support an interception capability will map to ES 201 671 by defining technology specific encoding and behaviour mappings to the generic handover interface. RECOMMENDATION  SEQ RECOMMENDATION \* MERGEFORMAT 2: Augment the behavioural description in ES 201 671 using SDL or equivalent. ETSI does not specify the operation of the LEMF but in defining the syntax and behaviour for the transfer of interception material any termination of this transfer is required to comply to the syntax and behaviour specified in ES 201 671. Each technical body in ETSI that is responsible for the elaboration of specifications for technologies, from which it is possible to build telecommunications systems that host a target, is also responsible for the production of a technology specific mapping of syntax and behaviour to meet the requirements established in ES 201 671. If such mappings exist it should not be required for the LEMF as customers of ES 201 671 to make explicit reference to technology specific mappings. RECOMMENDATION  SEQ RECOMMENDATION \* MERGEFORMAT 3: ETSI TC SEC LI to ensure that ES 201 671 is maintained such that it can be mapped into by specific technology development groups. RECOMMENDATION  SEQ RECOMMENDATION \* MERGEFORMAT 4: Ensure that ES 201 671 does not define syntax for specific technologies. Current explicit technology definitions for the lawful interception of targets using GSM (including GPRS in development) and TETRA exist but do not always offer specific mappings to ES 201 671. An implicit mapping for circuit switched voice services over ISDN and PSTN exists as part of the content of ES 201 671. RECOMMENDATION  SEQ RECOMMENDATION \* MERGEFORMAT 5: Ensure that technology specific LI documents provide explicit mappings to ES 201 671. 5 Service Capability Framework To provide many services over many technologies where one service may coexist on more than one technology the conventional methods of design, such as used in the ITU 3-stage model (I.130 and I.210) are inadequate. An alternative method is decomposition of a service into constituent elements. The following meanings applied to the terminology used to describe services have been adopted by EP-TIPHON: Service: a service is a commercial offering to a customer. It comprises functionality - known as a Service Application - set in a business context. The business context is outside of the scope of standards bodies in general (including TIPHON) to consider as it is determined by commercial or political concerns. As shown in  REF _Ref493992332 \h Figure 2, Service Applications are constructed in a modular fashion from Service Capabilities within the Service Abstraction Layer.  EMBED PowerPoint.Slide.8  Figure  SEQ Figure \* ARABIC 2: Services and Service Capabilities. Service Application: a Service Application is an integrated set of one or more Service Capabilities. The ability to select and combine Service Capabilities offers a structured, yet flexible, means for creating service applications that: are internally coherent and self consistent enable the inter-operation of services between different implementations of (TIPHON) systems enable inter-working with other systems enable service providers to develop differentiated services that inter-work across multiple networks and multiple network technologies. Service Capability: an indivisible and exclusive set of functionality including the capabilities of users and networks that represent functionality required by either users of the service or for inter-service provider connection. A Service Capability does not include the definition of communication types (such as voice, video or text) or of communication formats such as specific codecs, since these are examples of attributes of a specific Service Application. A Service Capability must negotiate and manipulate these attributes by incorporating mechanisms, such as the ability to select a particular communication type and associate with it a specific communication format. Every Service Capability has an Identifier that enables it to be distinguished from other Service Capabilities. A register of all the current TIPHON Service Capabilities shall be maintained by ETSI. An existing Service Capability may be augmented by additional functionality, in which case a new Service Capability is created. Service Capabilities become related to each other when used to design a Service Application, as shown in  REF _Ref494082464 \h Figure 3. Service Capabilities do not interact other than through a Service Application.  EMBED PowerPoint.Slide.8  Figure  SEQ Figure \* ARABIC 3: TIPHON Service Capability Framework Service Capabilities are combined in the definition of Service Applications, which inherit their functionality and attributes. To be TIPHON compliant, TIPHON Service Capabilities may not be supplanted by independently defined Service Capabilities that provide the same functionality. Service Applications may also include additional functions that are not defined by TIPHON. Simple Call is an example of a Service Application. Other Service Applications may be defined using varying combinations of Service Capabilities, including those used to construct the Simple Call Service Application. For each Service Capability the following aspects are defined: Scope: short description of the intention of the capability Attributes: relevant parameters that are variable for the purpose of standardisation. This includes parameters that are signalled or set by management processes. Normal behaviour: high-level behaviour description in the normal case (i.e. sunny day) Exceptional behaviour: high-level behaviour description when the normal case can not be met when for instance faults occur or resources can not be acquired. 5.1 Service capability - Lawful Interception access Scope: To enable the lawful interception of calls using where the identity of the target is known to a particular Functional Group. This service capability is required of all Network Functional Groups. The means by which the signalling information is sent to a relevant authority and the way in which an intercept of media is effected are outside the scope of this Service Capability. Attributes: There are no attributes related to Lawful interception access Normal Behaviour: Where a Network Functional Group is notified that a communications for a given user is to be monitored all the signalling and media is subject to monitoring. The signalling information is made available to the relevant agency. When a call set-up involving a notified target is received at a Network Functional Group it shall refuse any request to permit a shorter media path which may be requested by other Functional Groups in the call. Signalling information relating to the call shall include information, e.g. IP address, protocols, port numbers etc., which are valid for the location at which the intercept point is located. If intercept could be effected at more than one place then valid addresses for all places where the Functional Group can provide intercept information shall be provided. Exceptional behaviour: None identified 6 Additional Service Capabilities for LI Scotts comment: This section of the document is intended to introduce a purely abstract model of the architecture which can then be mapped to physical elements of an architecture. 6.1 Overview The internal architecture of a system is determined by the services that are offered. The degree of optimisation of a system depends upon the number of, and relatedness of, the services provided. The architecture of handover is less variable than the systems in which interception takes place. Working to optimise a system for lawful interception is unlikely to ever take place. This is a conventional business decision for a number of reasons (only major ones shown): The level of traffic generated by intercepted targets should always be near zero when compared to the overall traffic generated by users of the system; and, There is no profit in optimising for interception if those same optimisations do not also optimise service provision. However as LI is often a pre-condition of operation in a licensed environment the internal architecture of the system may also be optimised to ensure the provision of the LI capability. The overall architecture of the LI handover interface however should not be affected in a like manner, in other words the handover interface should be insofar as is practical independent of the service being offered by a particular technology. Services in this context are those offered to customers and may include voice telephony, fax, e-mail. The service being offered may be considered as independent for the purposes of applying an interception capability of the technologies used to offer the service. As an example Voice over Internet Protocol (VoIP) is not expected to be considered as different to Voice over any other network technology. The functional elements described in table  REF Table_FunctionalElements \h 1 shall exist in one or both of ES 201 671 and the technology specific mappings for LI. Table  SEQ Table \* MERGEFORMAT 1: Required functions for LI (only) FunctionLocated inRoleTarget verification (note)Technology specific mappingsTo verify that the target is known to the telecommunications system. Invoked by receipt of an interception demand from the LEA/LEMF. Shall return a confirmation to the LEA/LEMF of the availability of the target.IRI DeliveryES 201 671To deliver CC Channel establishmentES 201 671CC DeliveryES 201 671IRI record preparationTechnology specific mappings ES 201 671Media stream deliveryTechnology specific mappingsNOTE: Initial identification of the target and the determination of ownership of that target by a particular service provider is not described by ETSIs LI documents. 6.2 Service capability - Target identification Scope: For further study. Attributes: For further study Normal Behaviour: For further study. Exceptional behaviour: None identified OSI levelIdentitiesTechnologyCommentApplicatione-mail addressServerweb addressDomain name serverIP Address may also be usedPresentationSessionISP customer idServerUser-id at login to ISP serviceTransportThe intercepting mechanism is not allowed to request error recoveryNetworkTelephone numberSwitchIP addressRouterApplicable only for permanently assigned IP addressesLinkATM channel/path ATM switchVPN trunkPhysicalTrunk idWith advanced equipment it may however be possible to analyze traffic on the physical line to extract higher-order identities 7 Recommendations The following recommendations for future work are made. History Document historyV1.0.0April 2001Initial draft EMBED Word.Picture.8 styleref ZA Draft ETSI EG 201 xxx V0.0.1 (2001-04) page 12 styleref ZGSM  ETSI  #$%.:qz{|+9:;@W~345ž|qqfqamH sH CJOJQJmH sH CJOJQJmH sH 56OJQJmH sH HhbS&CJOJQJCJOJQJcHdhbS& CJOJQJHhbS&cHdh,TF Hh,TF cHdh,TF Hh+TFCJ mH nH u0JmH nH ucHdhbS&mH nH uCJ@mH nH u<mH nH u mH nH u%/:Wq-$u &#$]^a$-$  u &#$&dP] ^ a$9&#$K>:987J$ p#^uuKv:;@W 3o-$  &#$] ^ a$-$  &#$] ^ a$-$  &#$&dP] ^ a$-$  &#$] ^ a$-$  u &#$] ^ a$-$  u &#$&dP] ^ a$ 345FCT q r  D  -$ua'&#$+Da$-$ua'&#$&d+DPa$-$ua'&#$+Da$ -$  ua'&#$&d+DP] ^ a$-$  &#$] ^ a$5F1  2 3 4 Q R S  񳦒ϳvpvmh jUaJ$ mH nH ujUmH nH uCJjHCJOJQJU'j>*B*CJOJQJUph>*B*CJOJQJph!j>*B*CJOJQJUphB*CJOJQJph0JaCJOJQJjCJOJQJUjCJOJQJU CJOJQJ56OJQJ%      # $ % ? @ A B C D K L M g h i j k l x y z         6 7 8 9 : ; W X Y s t u v w x jQUjUjWUaJ jUj]UjUjcUaJ$CJaJ jUjUED l ; x W 13PoM"   5 6 7 Q R S U V W c d e  +,-/012"I5jCJUmHnHujUj?UjUjEUjUaJ$jKUaJ CJaJjU jUBI,-RSTklM+Dux.9R~w HhTF HhTF HhTF HhTF HhTF HhTF HhTF cHdh0TF HhCTF Hh0TF Hh.TF cHdh-TF cHdh.TF Hh-TF B*ph0Jaj9 B*Uph B*phjB*Uph6-[OP /]rtuv&opxyz{ǻǯǀyrmmgmmmgm mHnHu jU cHdh4TF Hh/TF HhTF HhTF HhTF j Uj`t> 5OJQJUV HhTFjHhTFUHhTFB*ph Hh4TF HhTF HhTF HhTF HhTF HhTF HhTF Hh2TF([uu0DC$EƀTFD]C$EƀTFDC$EƀTF3FP ut/DC$Eƀ2TFCEƀ2TF] & F~CEƀTFuu00DC$EƀTFD=C$EƀTFD6C$Eƀ4TF&3usqDC$Eƀ/TFDC$Eƀ4TF0maN4 & F8EƀbS&^8`N4 & F8EƀbS&^8`mn+C~ !E"d#$% f "^`",N4 & F8EƀbS&^8` yz  ' ( ) * ~ !!E"^"d#~#$$$$$/%e%f%g%r%%%%/'M'~((o){)))+#+++++ cHdhbS&6 cHdhbS& HhbS& HhbS&5hmHnHu jUhh mHnHu jU OJQJhJ%/'~(F))++-,,,- ../0~1 23N44567o89:;<<=$$" f+-,L,,,,-L- .&...//00~11 2233M4^444556677o8899::;;<<<<==>>|??<@=@Q@R@S@T@[@\@r@s@t@u@CCEE3G'H6H7HZH[H\H]HHHHI HhTF HhTF HhYTFjHhYTFU B*ph HhTF mHnHu jU5L=A>>|???@@@@@"A9AXAmAAAAAB1BGB\ByBBBBB C/$" C@CWCCCCCCEE3G'HHIDC$EƀTF"],/ IIII0I1I2I3I;I 5OJQJUVmH sH  HhTFjHhTFU HhTF HhSTF"I4IIKu0DC$EƀTFD=C$EƀTFD6C$EƀTFKKLv>v?v@vAvBvCvDvEvFvGvHvIvJvKvLv/0@P. A!S"S#$*%>00 @&P 1P/R . A!n"n#$n%RTDyK yK *http://www.etsi.org/DyK yK <http://www.etsi.org/tb/statusDyK Feditor@etsi.fr}DyK _Toc512748932}DyK _Toc512748933}DyK _Toc512748934}DyK _Toc512748935}DyK _Toc512748936}DyK _Toc512748937}DyK _Toc512748938}DyK _Toc512748939}DyK _Toc512748940}DyK _Toc512748941}DyK _Toc512748942}DyK _Toc512748943}DyK _Toc512748944}DyK _Toc512748945}DyK _Toc512748946DyK yK 0http://www.etsi.org/iprUDdJ  C A? "2@g㣿r3`, `!@g㣿r3`,Xh,MPAYxڥ]LU9c(פ(Rl&P@- d4RR5imbbcl%C|jj44.M6i;30Kae&gνw93 @zGsVkzDz]23P69v;A8??#Ov%ʳev4f$}ܥX$W)xQ@ 3Df,m2wiy4R1&ky+ jeo* Q%?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~c  Root Entry1 FIData 6WordDocument0q8ObjectPool30II_1047814302  F0I0I1TableHCompObjhObjInfo i8@8 NormalCJ_HaJmH sH tH <A@< Default Paragraph Font !579;OPQ]nv      !579;OPQ]nq  v  @Vv&':;<=>?@ATWbcsw00000000000vvu8@&(  b m0  3"h  3 "m0 \   "* "$ \   "*&) \   "*=,. hB  S D"$& hB  S D")=,b &0  3"h   3 ̙"&0 \    " "E$$ \    "&E$) \    "=,E$. hB  S D"W!$W!& hB  S D"W!)W!=, >b A( 3&  3"h  3  "A( 3&  \    "* "0$  bB  c $D"bB  c $D"B S  ?v  Ft F tFG t |t Etww %'9ASWacrw@zv@UnknownGz Times New Roman5Symbol3& z Arial"hTFTF!W!r02 Scott Cadzow Scott Cadzow "$'()*+,-/013456789;<=>?@ABCDEFGI  FMicrosoft Word Picture MSWordDocWord.Picture.89q  FMicrosoft Word Picture MSWordDocWord.Picture.89q dO)Microsoft PowerPoint SlideMObjectPool 0I0IWordDocumentSummaryInformation( DocumentSummaryInformation8S vbjbj . xxol  $ Z V >;)0H9^H ETR 331 ES 201 158 ES 201 671 Handover documents GSM/GPRS documents EN 301 040 TETRA documents vjCJUmHnHsH u&':;<=>?@ATUVWbcstuv$a$u,1hN N!"#W!$% Oh+'0t  0 < HT\dlss Scott CadzowocotcotNormala Scott Cadzowo2otMicrosoft Word 9.0@F#@b;@c;՜.+,0 hp  ETSIitl2  Title_1047988051 FMI@OI1TableCompObj hObjInfo i8@8 NormalCJ_HaJmH sH tH `@` Heading 1$$7$8$@&H$a$#5B*CJ,OJQJ\^JaJ@ph<A@< Default Paragraph Font)>g   )>g  @V  34?HI]qr0000000000000606060606068@  (  >    " >    "lB  <D)?  Ta1?"    Te1?"   Za1?"    Za1?"    Ta1?"    Za1?" zB  <D)?"B S  ? '<2t  tD  t   t! & t  !}t x_t &2nt K(m~1`tK(~1t    24>?GI]@3]@UnknownGz Times New Roman5Symbol3& z Arial"h+T+T!A r02 Scott Cadzow Scott CadzowObjectPool@OI@OIWordDocumentSummaryInformation(DocumentSummaryInformation8S bjbj . xx l   @  @       $B bZ1   ] 0 1   SF      J   ߠfн@  \ 0  ^ 2 Specific technology Transfer Behaviour ES 201 671 Handover Technology Specific Lawful Interception Data encoding rules Behaviour encoding ASN.1 Transfer Syntax    34HIq5CJ,OJQJ\^J#5B*CJ(OJQJ\^JaJ(phB*CJ$OJQJ^JaJ$phjCJUmHnHsH u  34?HI]qr $7$8$H$a$ ,1hN N!"/#A $*% Oh+'0t  0 < HT\dlss Scott CadzowocotcotNormala Scott Cadzowo2otMicrosoft Word 9.0@F#@B.н@kRн՜.+,0 hp  ETSIitl2  Title_1036327317&dO)@;[I@;[IOle CompObjuObjInfo SPresentationPowerPoint.Slide.89q%_ bRichard Swale ՜.+,0    eOn-screen ShowBTs  PicturesCurrent User -SummaryInformation(PowerPoint Document( Oh+'0 `h  No Slide TitleRichard SwaleRichard Swale4chMicrosoft PowerPointP@ʉ@yE@SG~oM  7 L& &&#TNPPp0v & TNPP &&TNPP    - "-- !-- "-&G& - &Gy& &oS "--L$$}vrpp7rFvS}`ksz#z0s;kC`JSOFP7POJC;0#--& --- !'[--- Century Schoolbook- .2 Service   .- "---&y&} "--$ HPxxHP --&--- !' ---  ."2 $*Service Capability     .&&8&L "--$(Px(pxpP--&--- !'8@---  ."2 TJService Capability     .&& p& "--$H  H--&--- !'p`---  ."2 jService Capability     .&& "-̙- $--&̙--- !0W)--- Century Schoolbook- .2 9Network  . .2 3 Capability .&u--- !P ----- $ ** ---- $ pf*---- $ppff---kkk- $p *f-- "-- $ pp  $*ff*% *%pf%pf% *--& Century Schoolbook- ."2 QlCommercial Context      .--- !'---  .$2 Service Application      .&< "-̙- $@Z--&̙--- !0Vb--- Century Schoolbook- . 2 }User . .2 k Capability .--"System-&TNPP &   1" !3$%&'()*+,-./02aA56789:;<=>?@wCDEFGHIJKLMNPQRSTUVWXYZ[\]^_`bdefghijklmnopqrstuvyz{|/(@=</ 0DTimes New Romandbdbpb0bb 0DCentury Schoolbookbpb0bb 0  @n?" dd@  @@`` x  c $@ g4ddb 0bppp@ ? %X  u 0` ̙33` ` ff3333f` 333MMM` f` f` 3>?" dd@,|?" dd@   " @ ` n?" dd@   @@``PR    @ ` ` p>> c( 8   6T'v P v T Click to edit Master title style! !  0'v  v RClick to edit Master text styles Second level Third level Fourth level Fifth level!     S  0(v `` v =*  0t(v `  v ?*  0(v `  v ?*H  0޽h ? ̙33 0 _ W  ( _p "  T4)v1? Z hh88  Z)v1?  UServicehh88v  N1? F @0   0@ ~  N1?@    ZT*v1?0`  `Service Capabilityhh88F @0    P ~   N1?@    Z+v1?0`  `Service Capabilityhh88F @0    P` ~  N1?@   Z+v1?0`  `Service Capabilityhh88  ZG 1?P    Z,v1?   nNetwork Capability$ hh88B  TT-v1? pP bCommercial Contexthh88  Z.v1?@ ' aService Applicationhh88  ZG 1?P @   Z.v1? JP   kUser Capability$ hh88H  0޽h ? ̙33r07 pkDocumentSummaryInformation8 _1036605649!dO)fIfIOle CompObj uTimes New RomanCentury SchoolbookDefault DesignNo Slide Title  Fonts UsedDesign Template Slide Titles dO)Microsoft PowerPoint SlideMSPresentationPowerPoint.Slide.89q%_~ bRichard SwaleObjInfoPictures#Current User-SummaryInformation("$& Oh+'0% `h  No Slide TitleRichard SwaleRichard Swale2chMicrosoft PowerPointP@ @`% [V@`%[V G$oM  e,& &&#TNPPp0D v & TNPP &&TNPP    - "-- !-- "-&G& - &Gy& & 3 "--,$ !', /00/,'!--&&$U-̙-$2((FPP---2֭- $(FP2---{- $FPPF-- "--$2((FPP %(FP%FF--&&-̙-$---2֭- $---{- $-- "--$ %%--&&\-̙-$j``~---2֭- $`~j---{- $~~-- "--$j``~ %`~%~~--&&-̙-$---2֭- $---{- $-- "--$ %%--&&E-̙-$"6@@---2֭- $6@"---{- $6@@6-- "--$"6@@ %6@%66--&&T-̙-$bXXv---2֭- $Xvb---{- $vv-- "--$bXXv %Xv%vv--&--.-- Times New Roman- .2 Service   . .2  Abstraction   . .2 #Layer .&'G{--$(H(xxrH----$xrssr-- "--$(H(xxrH%xrssr--&&,TMu-̙-$6X0^0pBpHjHX---2֭- $0^B^HX6X---{- $B^HXHjBp-- "--$6X0^0pBpHjHX %0^B^HX%B^Bp--&&LTmu-̙-$VXP^PpbphjhX---2֭- $P^b^hXVX---{- $b^hXhjbp-- "--$VXP^PpbphjhX %P^b^hX%b^bp--&&lTu-̙-$vXp^pppjX---2֭- $p^^XvX---{- $^Xjp-- "--$vXp^pppjX %p^^X%^p--&&Tu-̙-$X^ppjX---2֭- $^^XX---{- $^Xjp-- "--$X^ppjX %^^X%^p--&&G[{--$HxJxXrXH----$JxNrOsRsXr-- "--$HxJxXrXH%JxNrOsRsXr--&&T u-̙-$X^ppjX---2֭- $^^XX---{- $^Xjp-- "--$X^ppjX %^^X%^p--&& T-u-̙-$X^p"p(j(X---2֭- $^"^(XX---{- $"^(X(j"p-- "--$X^p"p(j(X %^"^(X%"^"p--&&,TMu-̙-$6X0^0pBpHjHX---2֭- $0^B^HX6X---{- $B^HXHjBp-- "--$6X0^0pBpHjHX %0^B^HX%B^Bp--&&3o@ "--%79y-- $?{9p4{--&&Uoq "--%o[y-- $azYpV|--&&wo "--%}x-- $xypx|--&&o) "--%'u-- $sp{--&&o "--%y-- $|pz--&&o) "--%'y-- $ zp{--&&7oi "--%g=x-- $Cx9p8|--&&/  "--,$0 159?y y?9510--&--0--  .2 JService   . .2 c Application   . .2 }Layer .--N)0-- Times New Roman- .%2 DService Applications  .--61--  .%2 ,Service Capabilities  .--"System-&TNPP &PowerPoint Document(%#DocumentSummaryInformation8_1001833466* FPsIPsIOle  ( / 0LDTimes New Roman b b,b0PbPb 0  @n?" dd@  @@`` tl # c $@ g46d6d\b 0Tbf ppp@ ? %X  u 0` ̙33` ` ff3333f` 333MMM` f` f` 3>?" dd@,|?" dd@   " @ ` n?" dd@   @@``PR    @ ` ` p>> c( x   6U P  T Click to edit Master title style! !  0#v   RClick to edit Master text styles Second level Third level Fourth level Fifth level!     S  0t v `` v =*  0 v `  v ?*  0Tv `  v ?*H  0޽h ? ̙330  Z (  d"  <1? 0 d  <1?p ` d  <1?p  ` d  <1?p @0 ` d  <1?p ` d   <1?p ` d   <1?p `    Hv1? &  IService Abstraction Layer^   61? d   <1? d  <1?pd  <1?0 d  <1?` ^  61?p d  <1? 0 d  <1?` d  <1? d  <1?JV d  <1? d  <1? d  <1? d  <1?j d  <1? d  <1?V j d"  <1? 00   Htv1? 0(  IService Application Layer  <4v1? 0  NService Applications   <v1? ` =  NService Capabilities H  0޽h ?     ̙33r0\ pf ՜.+,0    NOn-screen ShowBTs Times New RomanDefault DesignNo Slide Title  Fonts UsedDesign Template Slide TitlesLFW<'5"  FMicrosoft Word Picture MSWordDocWord.Picture.89qOh+'0 PIC ')!LMETA 4RCompObj(,#hObjInfo%FW< %  &WordMicrosoft Word  ASystem    -Times New Roman*wgw & - &!H --j$3|  "$ .: :R If U} a m { &<< s Z B ,i D      \ 4 t a Q ? 0d :     Z ,    n >  ---- $}  N    B |  1 N ( j ^ 2  b 3 W ~ $ R   J v  , W } - ^  << h F %} X 2    k On 2D     l @ x _ I 3 T $    X !  s b GT F 8 . W$    i /   | A    W & . 8 oD 5P ^ l } Q  o 9 n <P y5   / m   & g s e %W eJ @ 8 %0 h* & $ +$ n$ & , 52 x8 E O B] k ----$ D v    8 (f : O e y H r     %B @j \ y   ( L  p / O q  <p <F   X Y 0 2   [ 0 b  A !  u D  w { \ F D  ,  l 3    J  q ve /[ Q K `G C A A MC G K S ?[ c o x| 5   s 3   s 5* D _ {{ < <AKiK.]1xOznf+^vZV VWXZ`=hr~%t----$ @ f     , :D Hf V e u   6 V y     % 96 MU bs v     <<w X :  u R .   w _ Ey ,R *     b 8 } h V D 4` #4    z L Z j}yw~w1{KjC2kL%hS /CSF~R 'iIkJ1,}mbY~zwZz~\ f  -- & --J$#p:u|'ma_QE;U1)#M K !O'/9EWSar#f--&V--$ 1 ` s` ot t  g a    B1 ----$}1 1 ` `  $ B` r` ---- $a1 9  $1 ----$bh f d ` ^ Z X X V T R R R R T T V X Z \ ^ d f j l n p r t x |                 t j b ^ \ \                           z rx rb tV zJ @ 8 1 . , , , / 4 ; F P Z h -- & &Nο--$@ . . 0 4 : B  L V < d W r q  8 T n o W :         ( > U i y  i P 6  q \ F w , f  X L D < 6 2 . . --ο--$@ . . 0 4 8  > 0 F L R h ^ m |   : X s k N 2        & > W o l T 8  k p R ` : T " H @ : 4 0 . --ο--$@ . . 0  2 2 8 J > e F P \ j | ! / 9 =  9 < / Z  w } ` D ,         * > V o q  V 8    p b m T T J < @ & :  4  0 . --ο--F$!, . 0 . 8 0 F 4 X : o @ H T ` n ~   1 = G I  t  n b O ; #  w f X N D { < c 6 N 2 > 0 2 . --ο--$@        j N 3    n T 8        3r Pd lV L B : 4 0 . . . 2 6 < F P y\ bj L{ 6 "      < ] x  . D \ w        --ο--$@     u Z > "     u X :       ~ n ^ <R XH r@ 8 4 0 . . . 0 4 : |B dL LX 4d t        8 V q     8 P h      --ο--$@   n X @ #      } iu [Z Q< M Q [ k   { j \ P )F D> \8 p2 0 . . . 0 r4 `: L@ 3J T b p      } { }8 V q       6 N b w   --ο--F$!\ X P @ .       w a Qe EH >( A  , O .m C [ u      # : J V -- & --$B* , 4 @ R d z~ n ` T J @  :  4 % 0 / . 3 . + .  0 4 8 @ H R ` np T < %    ( a ( ] D W ^ I w 8 $  t e  [  W  `  l  ~  6 N e w k N . --ο--$  A A  ---OlePres000+.BrWordDocumentO"SummaryInformation(-/&DocumentSummaryInformation8.FV<J %  &WordMicrosoft Word  ASystem    -Times New Roman*wgw & - &!H --j$3|  "$ .: :R If U} a m { &<< s Z B ,i D      \ 4 t a Q ? 0d :     Z ,    n >  ---- $}  N    B |  1 N ( j ^ 2  b 3 W ~ $ R   J v  , W } - ^  << h F %} X 2    k On 2D     l @ x _ I 3 T $    X !  s b GT F 8 . W$    i /   | A    W & . 8 oD 5P ^ l } Q  o 9 n <P y5   / m   & g s e %W eJ @ 8 %0 h* & $ +$ n$ & , 52 x8 E O B] k ----$ D v    8 (f : O e y H r     %B @j \ y   ( L  p / O q  <p <F   X Y 0 2   [ 0 b  A !  u D  w { \ F D  ,  l 3    J  q ve /[ Q K `G C A A MC G K S ?[ c o x| 5   s 3   s 5* D _ {{ < <AKiK.]1xOznf+^vZV VWXZ`=hr~%t----$ @ f     , :D Hf V e u   6 V y     % 96 MU bs v     <<w X :  u R .   w _ Ey ,R *     b 8 } h V D 4` #4    z L Z j}yw~w1{KjC2kL%hS /CSF~R 'iIkJ1,}mbY~zwZz~\ f  -- & --J$#p:u|'ma_QE;U1)#M K !O'/9EWSar#f--&V--$ 1 ` s` ot t  g a    B1 ----$}1 1 ` `  $ B` r` ---- $a1 9  $1 ----$bh f d ` ^ Z X X V T R R R R T T V X Z \ ^ d f j l n p r t x |                 t j b ^ \ \                           z rx rb tV zJ @ 8 1 . , , , / 4 ; F P Z h -- & &Nο--$@ . . 0 4 : B  L V < d W r q  8 T n o W :         ( > U i y  i P 6  q \ F w , f  X L D < 6 2 . . --ο--$@ . . 0 4 8  > 0 F L R h ^ m |   : X s k N 2        & > W o l T 8  k p R ` : T " H @ : 4 0 . --ο--$@ . . 0  2 2 8 J > e F P \ j | ! / 9 =  9 < / Z  w } ` D ,         * > V o q  V 8    p b m T T J < @ & :  4  0 . --ο--F$!, . 0 . 8 0 F 4 X : o @ H T ` n ~   1 = G I  t  n b O ; #  w f X N D { < c 6 N 2 > 0 2 . --ο--$@        j N 3    n T 8        3r Pd lV L B : 4 0 . . . 2 6 < F P y\ bj L{ 6 "      < ] x  . D \ w        --ο--$@     u Z > "     u X :       ~ n ^ <R XH r@ 8 4 0 . . . 0 4 : |B dL LX 4d t        8 V q     8 P h      --ο--$@   n X @ #      } iu [Z Q< M Q [ k   { j \ P )F D> \8 p2 0 . . . 0 r4 `: L@ 3J T b p      } { }8 V q       6 N b w   --ο--F$!\ X P @ .       w a Qe EH >( A  , O .m C [ u      # : J V -- & --$B* , 4 @ R d z~ n ` T J @  :  4 % 0 / . 3 . + .  0 4 8 @ H R ` np T < %    ( a ( ] D W ^ I w 8 $  t e  [  W  `  l  ~  6 N e w k N . --ο--$  A A  ---ܥhc e "  '"C::::<<<-iP P "j"X"0'": @:::'"::::::p9i|1l:::: NNFFH0>0>οο ==<02&.(mkpR-hy\CL+}V+?WTya15oXX[J*zJ(<O^acIl?lSlpg^O AJ(Vq6"f'~0t$.} n *mοοDt0(Hg`*d1k6;_l%b$<JoYDcll"gDcoTE2 E{X=(_|z6xUN*Je H5!f?  *kmοο,W&:JWtV"\6 EVzO -AO\^5gl ll0cWYJ7$(cl46Zx6xZa4'Yy\?+yN'*mοο,X &:ORo `W6O[A2ETN^'gl ll,cN^zO<( ^q>;e6ef9,Y}\C+pD" hοοC ?j+?\YyG"rWD P e@M5!R +*mοοllcYVJ<$Tlf;? 6 ?kk1Y`H0[ `!*:RoPDypk6uX<v/7eJT^gl*mοοllg^sO9A-r)zuJD" 6 "D\p")mtW?4+n}L0Hec-1kuk6u@u2m(V<O^cl*mοοllg^TGA2{2uOD" 6 "IWz<oR:Q& e+*C\}v<,fup6u;q<v /(i<O^clgοοCff]SId6%^\"paRf[:k5o(q,G?NXafyL0.zZppm;;haJppp,pvp: a~yo jjea\\\\aaejoty#7J^q{'Nvk^E(W:"pS6',6?INSWW\\WWSSNID:' kI55:eIH\0t(J g{&?Wo=Qb0K5F Gq O(1OqyaI*5'V N   " 0^ D \y8}!<f0F'," v g0 j 5 S p D t  (I Kz h   @ u u #  Gz '  y c" 2 j  kV:4mdB<g#hOD7a y6WX+"S-c7GP_Wd`FRG?#a(l7d ? ^ $ ! w! ! *"W*"W Oi E <  , f o"   >[  n  c *(  K  cS " vd=x[cJ82  q  S  6   $x7JdcK<(/V  a"LElm<)Zz&\DW 1  -  g  F"1&Nfj25+"<)P)v%dV>,yfD Yk(!e<?A  $ v8!!!i*" *"!Fw! ! "h  nF c z  k @  a 9 ~  h )  & p %6  i>p6vY>A)L Y   p  -1 A TqR|*F[{1 Op  ' 7 2;1zLcUTR uX X ; 'g  8 `,DaJ2+"=8QUr[ \9`XN'S7h7hF   /!e_!!!*"*"!e!=! K K    O?   E L  1  um 7  R  u !I  Q| `.>!O {IcPA7Q33<%Fm U m J   0 L}&w1 %u {  -U   ?Q 6MXr bI|4H`m 3 b # p N 6w= o?";]c|b Nu uDa ''K@Normala "A@"Default Paragraph FontH-@H Macro Text& ` @  ]`a    N   h" @\\ETSI10\a1c01Ne01:winspool\\ETSI10\a1c01\\ETSI10\a1c01_ 4dXA4ᆳ޺ eeeeeePRIV''''\\ETSI10\a1c01_ 4dXA4n Dy PRIV''''CTimes New Roman Symbol &Arial5Courier New"1h$v$&!0Michael WelserMichael Welser  H T ` lxMichael Welser Normal.dotMichael Welser2lsMicrosoft Word for Windows 95@F#@@* l@vz1l՜.+,0HP\dl t|  Wo, Oh+'0 0 HT p |  !DEG/SEC-003008 - LI ArchitecturerosLawful InterceptionStefan Bjornsonteftef ETSIW_80.DOTon Scott Cadzowonj8T c~^?x}VkU?ٙɬ$T)cS-Mhjc6@6J$]ͦ1(B)-H^-}U?61sgg>;9_{ @׍rD}??S= Jy<_g4Zw&ͫ[a{BƑnrYt u +I!QzHw\)-,:g՚)/%XzJp$Ocx48y̫Vܥ`$x,zk(E kf_gsDx~O4nA_,"y-g D9ɫG7;FPO1mhk3zw錾Me/pf.sUԆ^ߓQ(fgHFI VksPF͟Ɉ/Eyu;^)Exz ?ьh@{z1ݼsg^I,z81S, u&钡K:[{?qjP[dBi z322q=І gӶH3P9pu 6DkwXƮږSʗ Rta"s(\&;1v#j7T+I}DyK _Ref493992332iDdx N  s *0eA? 2);Yܾx`!);Yܾx0^&PixX_hGٙ%%i/MZQS5-@$5\̅j` yBM)RX(bK# %yKjw}G/߱ewf;3ٝ!k y &x,zp]>s fXc5jS# v!hiEefH{P{4OiȋI FjC` CK+W_iX eGd|0;бol#OIУ,z1Ic(%cTԌD8)DבR29dZk45ʕ6qՖ[FE8CV͢{p?nf  Adl%8si;p 'aoY*\ᶴt.5E7`&>݁yl`0!m{0¤# Y˘nz7kz< 4阾E#2} 8⠞>} Ql l҇pݺ 郸YoIG7{Qzn, 7Y_@WyX}͵;vP0K~40\}8J$xM)Wx68U5P.xjn]x1+srN9!1^|y= '7"'N俨Oi2\s8a5#^W躪ia{.'W~rj%%Cq*n)[0^I{K=^Ў8{.G߉ZzG&(oDUm"sw1!mJ=uuS;PZ]z9]> 84{pT䟊< I5wmS#iKs(vUzMeF %qS_fqTa9bhYuγ+$I8\WJ8q*2*)W?ԏd:K~CĪL׉y|}Kɏ WV&q5-=qH?NfHGPE; j>8͛Yn1:ǨT"h'gpɢ6>>^ϣ~6hK%hxh<5Оvow7w?&zYíґ}L߱ݻϗw_^sJ\& ttE}P2$1,sZ. r:gm|GoO| wV.ů25ޞdOrȖ H:{nS7"QӠU{Uiu?ovݨn YcSX,բCZx'HQfE[#4ןk '6}DyK _Ref494082464O Dd Z  6R# A? 2jn4(8K^YM}`!ujn4(8K^YMb%: jОE-4CxZh[9(JM8N<6]^mбPҖ5;eqvd]CFKah(V ӼAƖ?2?jesޕe$>}};;˄6B*R} y8*AGzGoCh<$#ǎy<7齄Oa5'Vo$BYh$qHB4l~mt"P2?M$=Q;v5G Em{Z yRK5sJoTJ:/Кa-\)e#pӴ[%;J9cY8RvNeLBN`B:D(C0-OدB0F'U ^TIWpVu+j7m'WԊsVIw\EU=lqe{Qeԝe윑qi7תoQ=Wbט.I1{G%^99 yB *JjJn֬(3f&.abm[0ʚ];z,UGgT٦l2OR7 B%Aaƛf1L5Z~M=ָ?q,Ӎs2yB:A!?xLl1L5Z~ =ָ?s?OII5|"Sw BPcX[?ղ6x u9s B&!K0 !x\! It4%LB[a;B\ѪBpLJJC̙?&)xDyK Table_FunctionalElementsDd'5"<  C A2KJ/4TcIc6'ME?`!J/4TcIc6JA bTxXy\~g{s-5-̥qQ "")T?+fhfB3q-pR낊;|mú-;3=sΙ SYM\8VДmly{fCM_u8UOTf{oVttìD0J#0&di~>KQK1pHpn)Ěv.eKRgKϒɻ;6>~X_ Q{%=YRu{Ì(X"={uY[yAXzY~~,CaXV}z>Fg[}V5JX zLBk`@] ׷uY5 =3]hƺifkwRinzPawTʈFl7n.o,V$cS;\OO2o=)tw~ԩ*[X*h9LHka,G&SbjT7|L7a9nmx 8l(ǻ1m언v_hS/zҷtx,\zu^7ZθeMNh_ui~8ovK pW{W [7xa0ʫ/xi/O&^^cU//uL|-2Ct_q)`&QnN-Tk;z-a-t{[in.oX(~j6fjG?1iFiuE+Z/c ݖ׌#cIzh(~b93QC=c#5ASsdNp8iC+ ΐeI+-` MqC}) Gy? yw .~̫?IҗI<~/U!e 5E0<, D Eċ 0Z9.ɸI,Cb+^刲Dvpd+纣e;OsH[eWaU~Yo:OPo::^]/;t܉zAԞ{׸[qװǽ‘xS c!:B8AQab0X}Z,Vj,(C6+"^5U全x՗?'~CxyB))Ef?aV֋j5TƩG|W 77VUnRkjqqwe#9Jp֊INHu'cSgř·R'y쳾pҭ',0 >ʛF_hdg-3N4\T"JA8ȏ"g 0D x1L,%B, σEd{1ݻo [R@~n :⹎򠈯!'b6L#Q8%;k< ҩX@9a Cqn#=bFV#j3YxL˄06]|Rְ֫G@tPQ /CL:UP WngP@0~  pL)U~83w \nRew VUC]Rux짮|||rp dh@b WW9`I] cRI TW8a <T,T,|JO!n` zS`46 NC!\#p *zx B*Di`nL\ke1 c|TױL1)B$ΐH]GIBL\|Ұg)jHEfX -GJNA0(˔s//w,$(ҫ>_0t&IIS$ z`6h̆s<m'b(6|Sp6C67ALc8\:\{TAMP`U:VPFi3a3ZaEh ^H~4k1"8 +`7_LM8}u: e hMՂ2Ϫѧ^Cd'4ʶ֔!0fBʤ97R@|A\xs%8< $9]1F887T=;jF ^6t g%ݓtw[NV`,4yQ&wc+Yu*4;EDWU=߀pN%}2 Zd!` SeWȔ` =5- [rIDm@Bse-c!N&BW9ș\ ~2 :|Aܢ](^ϣ^r9 +c]\dB"Έb>*{A2 f`R5& H"Bվ| %uǑI2ZP4.(E!ͿHxTL#5_a܃=q p"eAUBJr^Z! ٜsƯP|IQUPu͠0@ 5Vn oZa|i5OC LlL]G]UUܪJU ǚL]+M(B_`t=u)^82ZCus% pLp|vy>eVXʅ*tlY~ ;1Table~/SummaryInformation(22DocumentSummaryInformation8:DCompObjHj)a+`,^*_$](b1e5i-c0d/j.f3g4h6789'/;0<1=2>3?4@5A6B7C8D9E:?G@HAIBJCKDLEMFNGOH2kPIRJSKTLUMVNdQlX Z!["\#^_`bcaWOYm"[eijklgn  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnq      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXxd iL@L Normal5$7$8$9DH$OJQJ_HmH sH tH @ Heading 1D$$n$d 5$7$8$9D@&H$N ^n`CJ$OJQJ_HmH sH tH H@H Heading 2,H2$d@&NCJ 2@!2 Heading 3 x@&CJ>@1> Heading 4v@&^`vCJ>@A> Heading 5[@&^`[CJ** Heading 6@&** Heading 7@&:: Heading 8@&^`* * Heading 9 @&<A@< Default Paragraph Font0OQ0 H6?@& ^`?CJ.@.TOC 9v^`v6@!6TOC 8 {^ `{5@"TOC 1?$$ % 7x1$5$7$8$9DH$]^7`#CJOJQJ_HmHnHsH tH u2O2EQ$ p# mHnHuOA ZGSMZ@RZHeader1$5$7$8$9DH$&5CJOJQJ_HmHnHsH tH uZObZZD=&P#$1$5$7$8$9DH$#CJ OJQJ_HmHnHsH tH u.@r.TOC 5[^`[.@.TOC 4v^`v.@.TOC 3n^n`:@!:TOC 2$S^S`CJ* @* Index 1 $* @* Index 2 ^O TT@& * @Q*Footer$a$6@&@@ Footnote Reference 5CJEHJJ Footnote Text $:^`:CJ,O!, NF !$ CJOJQJ,O", NO"$o^o`2PL_# J !"$5$7$8$9DH$#CJOJQJ_HmHnHsH tH u QB TAR$$a$0OR0 TAL %$$ CJOJQJ:qb List Number 2g&S>T)Tf^S1r List Numberf' & F>T)Tf,/@, List(8^8`O TAH)5 OQ TAC*$a$TTLD+$$dL5$7$8$9DH$OJQJ_HmHnHsH tH u,O, EX,$v^`vO FP-! NW.O EW/O B10.@q.TOC 61?^`?.@.TOC 72$^`$6A2 List Bullet 2g3S>TTf^S0@B List Bulletf4 & F>T𷷷Tf8!R8 Editor's Note5 B*ph4Ob4 TH6$$$<a$ 5OJQJxOrxZA>7$o'&P#$&d +D1$5$7$8$9DH$P a$#CJ(OJQJ_HmHnHsH tH unOnZB58$'&P#$+D1$5$7$8$9DH$]a$"6OJQJ_HmHnHsH tH ubOb ZT+9$d&@#$1$5$7$8$9DH$a$5CJ"OJQJ_HmH sH tH pOpZU::$^'&P#$$d 1$5$7$8$9DH$N a$OJQJ_HmHnHsH tH u*OQ* TAN;S^S`ZZZH#<&P#$1$5$7$8$9DH$OJQJ_HmHnHsH tH u$Oa$ TF =$`O`ZG)>$&P#$1$5$7$8$9DH$a$OJQJ_HmHnHsH tH u6716 List Bullet 3 ?o^o(2( List 2 @S^S(3( List 3 Ao^o(4"( List 4 B^(5!2( List 5 C^68B6 List Bullet 4 D^69AR6 List Bullet 5 E^b B2Fr B3G! B4H1 B5I*O*ZTD JT+D6CJ(OZVK!?F!F Index HeadingLh$d  56CJ66 Normal Indent M^*B* Body TextN68Y8 Document MapO-D OJQJ.. PreliminaryP60P0 Body Text 2Q$a$&)@!& Page NumberHO2H ASN.1S  CJOJQJmH sH u@QB@ Body Text 3 T$@&a$ mH sH u2 2 Index 3UX8^X`82 2 Index 4V 8^ `822 Index 5W8^`822 Index 6X8^`822 Index 7Yx8^x`822 Index 8Z@8^@`822 Index 9[8^`8<< B3+#\ & Fy no^o`,O, B1+] & Fw 7<< B2+#^ & Fx SS^S`22 BL_ & F{ hSS^S:: BN#` & Fz 78^8`.U@. Hyperlink >*B*ph>V@!> FollowedHyperlink >*B* ph>"`> Captioncxx5$7$8$9DH$5  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnLrF;<=>]$%&m      !X:YTS'()*+, RfPQ#WZ%Vh\U-&.YZ[\]^_`abcdefghijklmLr818/:Wq:;@W 345FCTqrDl ;x W  1 3 P o M[3FP u&30mn+C~Ed !/#~$F%%''-((,) **+,~- ./N00123o4567889A::|;;;<<<<<"=9=X=m=====>1>G>\>y>>>>> ?@?W??????AA3C'DDE4EEGHIJK$L^MM NOPQQQRS]SS TV}WXXAY[[ \\]]]]Z_f___`mabbbb(cccee]ffhjjk kkkk2k9kVk*l+l8lClOlPliltlulvlllllllllllmmmmmmmmmmnn)nr?r@rArBrCrDrErFrGrHrIrJrMr0J0708090909090:0>00K00@90-0-0-0-00-0-0-0-0-0-0-0-0-0-00-0-0-0-0-0-0-0-0-0-000000000000000000000000"0000w ]0w ]000~ ]0~ ]00060=00000 00 40 40 40,0,0,0,00000"0"0"000000000"00000000000000000000000000"00000;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;/0;,0; 00?w ]0?w ]0?0?0?0?0"0060=00,000,0,00,000000c00w ]0w ]0w ]0w ]00000c000 0 0 0 00000000000000"0000w ]0w ]000060)0)0)00%0%0%0%00%0%0%00%0%0%00%0%0%00%0%0%0%00%0%0%00;0000000@0]0@0]0@0]@0]@0]0)0m)0m)0m)0m0m*0m*0m*0m*0m0m*0m*0m*0m*0m0m*0m*0m*0m*0m0m*0m*0m*0m*0m0m*0m*0m*0m*0m0m*0m*0m*0m*0m0m*0m*0m*0m*0m0m*0m*0m*0m*0m0m*0m*0m*0m*0m0m0m0m 00r0r 00s0s-0s-0s-0s0s-0s-0s-0s0s-0s-0s-0s0s-0s-0s-0s0s-0s-0s-0s0s-0s-0s-0s0s-0s-0s-0s0s0s@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0@0 0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000qsy{}5 I+IKP]puLvX]^`abiknpsu|3D um%= CIKN R `agnoo*pippppqrrrrrrrsKsssss)t=tt uDuTuzuuv!v>vLvY[\_cdefghjlmoqrtvwxyz{}~KvZ3Q$@BLhjy79Xtv 6 R U d    , / 1 , S k uoxzy')<<Q<S<[<r<t<6DZD\DE0E2E;EWEYEGGGJKKKKKmMMMPPQQQQQQQfX~XXXXXYYY@jcjejjjjLrXXX %4%4%4%4%4%4%4%4%4%4%4%4%4%4%4X:     4: 4 4 4 4 4: t: t4 4*QSY\^m: ! ?2$&5t>$2$ 4]=~ MA @ 0(  B S  ?Lr _Toc507468687 _Toc508434229 _Toc508438481 _Toc508438531 _Toc508438580page1doctitledoclogopage2 _Hlt480277958 _Hlt480277959 _Hlt480254381 _Hlt480254382 _Hlt480277940 _Hlt480277941 _Hlt480254238 _Hlt480272840 _Hlt480272838 _Hlt480272857copyrightaddon _Toc507468688 _Toc508434230 _Toc508438482 _Toc508438532 _Toc508438581 _Toc508509781 _Toc512748932 _Toc507468689 _Hlt480616298 _Hlt480616299 _Toc508434231 _Toc508438483 _Toc508438533 _Toc508438582 _Toc508509782 _Toc512748933 _Toc507468690 _Toc508434232 _Toc508438484 _Toc508438534 _Toc508438583 _Toc508509783 _Toc374930449 _Toc507468691 _Toc508434233 _Toc508438485 _Toc508438535 _Toc508438584 _Toc508509784 _Toc512748934 _1047813661 _1047814205 _1047880442 _Toc374930450 _Toc507468692 _Toc508434234 _Toc508438486 _Toc508438536 _Toc508438585 _Toc508509785 _Toc512748935 _Toc345380207 _Toc345380386 _Toc345380471 _Toc345380556 _Toc345380641 _Toc345381581 _Toc345381745 _Toc345381882 _Toc345382327 _Toc345382412 _Toc345382518 _Toc345382679 _Toc345382764 _Toc345383038 _Toc345383210 _Toc345383881 _Toc345384166 _Toc345384747 _Toc345384951 _Toc345386032 _Toc345405368 _Toc345405529 _Toc345405614 _Toc345405699 _Toc345405784 _Toc345406134 _Toc345406482 _Toc345406567 _Toc345406652 _Toc345406737 _Toc345407059 _Toc345409493 _Toc345409603 _Toc345409688 _Toc345410484 _Toc345410569 _Toc345735801 _Toc345736120 _Toc345736205 _Toc351282503 _Toc374930453REF_ETSIETR331REF_ETSIES201158REF_ETSIES201671REF_ETSIETR332 _Toc507468693 _Toc508434235 _Toc508438487 _Toc508438537 _Toc508438586 _Toc508509786 _Toc512748936 _Toc374930454 _Toc507468694 _Toc508434236 _Toc508438488 _Toc508438538 _Toc508438587 _Toc508509787 _Toc512748937 _Toc345380208 _Toc345380387 _Toc345380472 _Toc345380557 _Toc345380642 _Toc345381582 _Toc345381746 _Toc345381883 _Toc345382328 _Toc345382413 _Toc345382519 _Toc345382680 _Toc345382765 _Toc345383039 _Toc345383211 _Toc345383882 _Toc345384167 _Toc345384748 _Toc345384952 _Toc345386033 _Toc345405369 _Toc345405530 _Toc345405615 _Toc345405700 _Toc345405785 _Toc345406135 _Toc345406483 _Toc345406568 _Toc345406653 _Toc345406738 _Toc345407060 _Toc345409494 _Toc345409604 _Toc345409689 _Toc345410485 _Toc345410570 _Toc345735802 _Toc345736121 _Toc345736206 _Toc351282504 _Toc374930455 _Toc374930456 _Toc507468695 _Toc508434237 _Toc508438489 _Toc508438539 _Toc508438588 _Toc508509788 _Toc512748938 _Toc507468696 _Toc508434238 _Toc508438490 _Toc508438540 _Toc508438589 _Toc508509789 _Toc512748939 _1047815321 _1047880542 _1047987925 _Toc500793474 _Toc512748940 _1016478903 _1036327238 _1036327317 _Ref493992332 _1036605649 _Ref494082464 _Toc510521243 _Toc512748941 _Toc512748942 _Toc512748943Table_FunctionalElements _Toc512748944 _Toc345380288 _Toc345380467 _Toc345380552 _Toc345380637 _Toc345380722 _Toc345381662 _Toc345381826 _Toc345381963 _Toc345382408 _Toc345382493 _Toc345382599 _Toc345382760 _Toc345382845 _Toc345383119 _Toc345383291 _Toc345383962 _Toc345384247 _Toc345384828 _Toc345385032 _Toc345386113 _Toc345405449 _Toc345405610 _Toc345405695 _Toc345405780 _Toc345405865 _Toc345406215 _Toc345406563 _Toc345406648 _Toc345406733 _Toc345406818 _Toc345407140 _Toc345409574 _Toc345409684 _Toc345409769 _Toc345410565 _Toc345410650 _Toc345735882 _Toc345736201 _Toc345736286 _Toc351282584 _Toc374955690 _Toc507468733 _Toc508434275 _Toc508438528 _Toc508438578 _Toc508438626 _Toc508509826 _Toc512748945 _Toc512748946:HHII3 3 3 3 3 3 3 P _ _ &&&&&&&&o+++++++++++++++++++++++++++++++++++++++++;;;;;;;;???????0E0E0EMMQQQQXX]]bcjmpppppppppppppppppppppppppppppppppppppppppppppppp qMr@@@@@@ @ @ @ @ @@ !"#$%&'()*+,-./012@3@4@56789:;<ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi=>?@jklmnopqrstuvwxz{|}~y@@@@@@@JJJJO O O O O O O ` ` 22222222{********;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;?0E0E0E N NQQQQXY]]'ccjmpppppppqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqMrpuP T h l   n!q!$$0,3,T;c;K>R>>>>>^?a?UUmmspzp^qqqMr Sc~EL !!/#8#~$$F%%%%''''-(5(((++~-- ..//N0U00033o4u455M666677888899::|;;@@EEHHRRSS]ScSSSY[Z,\4\_&_)a3aCbKbccii3k7kmmmm)n;nnnnn^qqqMr33333333333333333333333333333333333333333333333333333333333/ 3 QQnnenonpp qq+q6q^qqqqqMr Scott CadzowC:\Documents and Settings\cadzow.ETSI\My Documents\DocBox for LI Security\meetings\2001-04_Grimstad\Guide to Interception and handover.doc Scott CadzowC:\Documents and Settings\cadzow.ETSI\Application Data\Microsoft\Word\AutoRecovery save of Guide to Interception and handover.asd Scott CadzowC:\Documents and Settings\cadzow.ETSI\Application Data\Microsoft\Word\AutoRecovery save of Guide to Interception and handover.asd Scott CadzowC:\Documents and Settings\cadzow.ETSI\My Documents\DocBox for LI Security\meetings\2001-04_Grimstad\Guide to Interception and handover.doc Scott CadzowC:\Documents and Settings\cadzow.ETSI\Application Data\Microsoft\Word\AutoRecovery save of Guide to Interception and handover.asd Scott CadzowC:\Documents and Settings\cadzow.ETSI\My Documents\DocBox for LI Security\meetings\2001-04_Grimstad\Guide to Interception and handover.doc Scott CadzowC:\Documents and Settings\cadzow.ETSI\Application Data\Microsoft\Word\AutoRecovery save of Guide to Interception and handover.asd Scott CadzowC:\Documents and Settings\cadzow.ETSI\Application Data\Microsoft\Word\AutoRecovery save of Guide to Interception and handover.asd Scott CadzowC:\Documents and Settings\cadzow.ETSI\My Documents\DocBox for LI Security\meetings\2001-04_Grimstad\Guide to Interception and handover.doc Scott CadzowC:\Documents and Settings\cadzow.ETSI\My Documents\DocBox for LI Security\meetings\2001-04_Grimstad\Guide to Interception and handover.docS, ,& 0g8B #,a * .  `_h&\J k p0KG  >^~~<wJ, vڐ$a"܎ "$|99% 3% -% V' -(\3y&(]j( x)~]6L* g, ;Z/ ~4~"`d 5Bp`I$6 g ; Pt Y@tNPJix Tly0P^7y  gz `h{ bw{6#rW|¬ * hh^h`OJQJo( hh^h`OJQJo(P^`P@@^@`.0^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ hh^h`OJQJo(hh^h`o()hh^h`. WW^W`o(WW^W`o(.WW^W`o(..WW^W`o(... WW^W`o( .... 88^8`o( ..... 88^8`o( ...... `^``o(....... `^``o(........P8^`PA2-@@^@`.08^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ ^`OJQJo( ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(hh^h`o( hh^h`OJQJo(P^`P@@^@`.0^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ hh^h`OJQJo(WW^W`o(WW^W`o(.WW^W`o(..WW^W`o(... WW^W`o( .... 88^8`o( ..... 88^8`o( ...... `^``o(....... `^``o(........P^`P@@^@`.08^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........P8^`PA1-@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........P^`P@@^@`.0^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........P8^`PA2-@@^@`.08^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ P^`P@@^@`.0^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ hh^h`OJQJo( hh^h`OJQJo(hh^h`.P^`P@@^@`.0^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........P^`P@@^@`.0^`0..`8^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ WW^W`o(WW^W`o(.WW^W`o(..WW^W`o(... WW^W`o( .... 88^8`o( ..... 88^8`o( ...... `^``o(....... `^``o(........ hh^h`OJQJo(8^8`B*OJQJo(ph ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo( hh^h`OJQJo(hh^h`o(. hh^h`OJQJo(P^`P@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........^`o()^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. hh^h`OJQJo( hh^h`OJQJo(^`o(^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. hh^h`OJQJo( P^`P@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ hh^h`OJQJo(^`o(^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L.*hh^h`5689;<B*CJOJQJTXo(l hh^h`OJQJo( WW^W`o(WW^W`o(.WW^W`o(..WW^W`o(... WW^W`o( .... 88^8`o( ..... 88^8`o( ...... `^``o(....... `^``o(........ hh^h`OJQJo(P8^`PA1.@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........h^`o()^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. hh^h`OJQJo( hh^h`OJQJo(P^`P@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........::^:`o(::^:`o(.0^`0o(..0^`0o(... 0^`0o( .... 88^8`o( ..... 88^8`o( ...... `^``o(....... `^``o(........hh^h`.hh^h`.h^`. ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(P^`P@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ WW^W`o(WW^W`o(.WW^W`o(..WW^W`o(... WW^W`o( .... 88^8`o( ..... 88^8`o( ...... `^``o(....... `^``o(........P^`P@@^@`.08^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........P^`P@@^@`.08^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ hh^h`OJQJo(hh^h`.^`o(^`.pLp^p`L.@ @ ^@ `.^`.L^`L.^`.^`.PLP^P`L. hh^h`OJQJo(P^`P@@^@`.0^`0..``^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........hh^h`o()0^`0o()P^`P@@^@`.08^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ hh^h`OJQJo( hh^h`OJQJo( hh^h`OJQJo(P^`P@@^@`.08^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ hh^h`OJQJo( P^`P@@^@`.0^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ P^`P@@^@`.0^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ hh^h`OJQJo(hh^h`.P^`P@@^@`.13tMicrosoft Word 9.0@@ު@;3@v8fz]՜.+,D՜.+,p, px  Ericsson Radio Systems/r2 !DEG/SEC-003008 - LI Architecture Title 8@ _PID_HLINKSA,>9http://www.etsi.org/iprX(editor@etsi.frKhttp://www.etsi.org/tb/statusENhttp://www.etsi.org/     0^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ hh^h`OJQJo(^`o(- ^`OJQJo(o pp^p`OJQJo( @ @ ^@ `OJQJo( ^`OJQJo(o ^`OJQJo( ^`OJQJo( ^`OJQJo(o PP^P`OJQJo(hh^h`o()qq^q`o() hh^h`OJQJo(P8^`PA2-@@^@`.08^`0..`^``... ^` .... ^` ..... ^` ...... `^``....... 00^0`........ ::^:`o(::^:`o(.0^`0o(..0^`0o(... 0^`0o( .... 88^8`o( ..... 88^8`o( ...... `^``o(....... `^``o(........hh^h`./ D/  -(y1]y1]/ y1]/ y1]D/ 7y#,a#i/ HDP"ky1]/ y1]D/ <N, , / , L/ |LJ,&O%=^6L*,, , / , 4) , ) -%n~Gixoie 6V 6VT) 6V 6V) A`OP) ^,pyO gz9%ho 7gBt%SPwwww0) www|) ~4**ȷ) -O @ww|) nC$s$s$s$sȻ) $sw$sY@tww) "$ww`) wrq/l0g8$a "$"wwg,wwwwwbw{w) bw{ V'pwG 3%]_)>t qZCQj(80tkg ;^KB"O. WKy&(`h{#rW|2 S>^~Jx)Tly_d 5<-OP<hqa*RG;Z/aoI$6/ @ 7^7`OJQJo(P/ @T^`CJOJQJo(l@@@d/ @T^`CJOJQJo(lܔ/ P8^`PA1.4/ !@8^@`A1../ "0^`0../ #``^``...D/ $ ^` ..../ % ^` ...../ & ^` ......p/ ' `^``.......ܗ/ ( 00^0`......../ P8^`PA1-/ !@8^@`A1-.L/ "0^`0../ #``^``.../ $ ^` ....`/ % ^` ...../ & ^` ......8/ ' `^``......./ ( 00^0`........&@+@ ,L ) P8^`PA1.؜) !@8^@`A1-.) "0^`0..4) #``^``...) $ ^` ....) % ^` .....T) & ^` ......) ' `^``.......() ( 00^0`........) P8^`PA1-<) !@8^@`A1-.) "0^`0..) #``^``...L) $ ^` ....) % ^` .....) & ^` ......x) ' `^``.......) ( 00^0`........@ ) @ OJQJo() P8^`PA2-2l) !@@^@`.) "08^`0..) #`^``...t) $ ^` ....Թ) % ^` .....8) & ^` ......) ' `^``....... ) ( 00^0`........ LSS|                  "`pQfͶjF2             bck kkkk9kVk*l+l8lClOlPliltlulvllllllllllmmmmmcndnenonznnnnnnnnnnnnnnnnnnoooo?o@oJoKoLoooooooooooooppp)p*p3p