Difference between revisions of "Telecommunications info"

From Got Opinion Wiki
Jump to navigation Jump to search
 
(10 intermediate revisions by the same user not shown)
Line 101: Line 101:
Stage 3
Stage 3
|| This document specifies non-3GPP access network discovery and selection procedures, the access authorization procedure used for accessing non-3GPP access networks. These non-3GPP access networks can be trusted non-3GPP access networks, untrusted non-3GPP access networks or wireline access networks.
|| This document specifies non-3GPP access network discovery and selection procedures, the access authorization procedure used for accessing non-3GPP access networks. These non-3GPP access networks can be trusted non-3GPP access networks, untrusted non-3GPP access networks or wireline access networks.
|-
| 29.503 || 3rd Generation Partnership Project;
Technical Specification Group Core Network and Terminals;
5G System; Unified Data Management Services;
Stage 3
|| The document specifies the stage 3 protocol and data model for the Nudm Service Based Interface. It provides stage 3 protocol definitions and message flows, and specifies the API for each service offered by the UDM.
The 5G System stage 2 architecture and procedures are specified in 3GPP TS 23.501 and 3GPP TS 23.502.
The Technical Realization of the Service Based Architecture and the Principles and Guidelines for Services Definition are specified in 3GPP TS 29.500 and 3GPP TS 29.501.
|-
|-
| 29.279 || Universal Mobile Telecommunications System (UMTS);<br>LTE;<br>Mobile IPv4 (MIPv4) based mobility protocols;<br>Stage 3 ||
| 29.279 || Universal Mobile Telecommunications System (UMTS);<br>LTE;<br>Mobile IPv4 (MIPv4) based mobility protocols;<br>Stage 3 ||
Line 173: Line 183:
=== [https://www.etsi.org/standards ETSI Standards] ===
=== [https://www.etsi.org/standards ETSI Standards] ===


==== Lawful Interception Standards ====
==== Lawful Interception or Related Standards ====


{| class="wikitable sortable"
{| class="wikitable sortable"
Line 186: Line 196:
* specifies protocols for the transfer of IRI and CC across the handover interfaces;
* specifies protocols for the transfer of IRI and CC across the handover interfaces;
* specifies protocol profiles for the handover interface.
* specifies protocol profiles for the handover interface.
[[My 102 232-1 notes]]
|-
|-
| ETSI TS 102 232-2 || Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services || This document contains a stage 1 like description of the interception information in relation to the process of sending and receiving asynchronous messages. The present document also contains a stage 2 like description of when Intercept Related Information (IRI) and Content of Communication (CC) need to be sent, and what information it needs to contain. Examples of asynchronous messages include: email, unified messaging and chat applications. See 102-232-1 for stage 3.
| ETSI TS 102 232-2 || Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services || This document contains a stage 1 like description of the interception information in relation to the process of sending and receiving asynchronous messages. The present document also contains a stage 2 like description of when Intercept Related Information (IRI) and Content of Communication (CC) need to be sent, and what information it needs to contain. Examples of asynchronous messages include: email, unified messaging and chat applications. See 102-232-1 for stage 3.
|-
|-
| ETSI TS 102 232-3 || Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 3: Service-specific details for internet access services ||
| ETSI TS 102 232-3 || Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 3: Service-specific details for internet access services || This document contains a stage 1 description of the interception information in relation to the process of binding a "target identity" to an IP address when providing Internet access and a stage 2 description of when Intercept Related Information (IRI) and Content of Communication (CC) need to be sent, and what information it needs to contain. The study includes but is not restricted to IRI based on application of Dynamic Host Configuration Protocol (DHCP) and Remote Authentication Dial-In User Service (RADIUS) technology for binding a "target identity" to an IP address and CC for the intercepted IP packets.
 
The definition of the Handover Interface 2 (HI2) and Handover Interface 3 (HI3) is outside the scope of the present document. For the handover interface is referred to ETSI TS 102 232-1.
 
[[My 102 232-3 notes]]
|-
|-
| ETSI TS 102 232-4 || Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 4: Service-specific details for Layer 2 services ||
| ETSI TS 102 232-4 || Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 4: Service-specific details for Layer 2 services ||
|-
|-
| ETSI TS 102 232-5 || Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia services ||
| ETSI TS 102 232-5 || Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia services || Document specifies interception of Internet Protocol (IP) Multimedia (MM) Services based on the Session Initiation Protocol (SIP) and Real Time Transport Protocol (RTP) and Message Session Relay Protocol (MSRP) and IPMM services as described by the Recommendations ITU-T H.323 and H.248-1.
 
The present document is consistent with the definition of the Handover Interface, as described in ETSI TS 102 232-1.
 
The present document does not override or supersede any specifications or requirements in 3GPP TS 33.108 and ETSI TS 101 671.
|-
|-
| ETSI TS 102 232-6 || Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 6: Service-specific details for PSTN/ISDN services ||  
| ETSI TS 102 232-6 || Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 6: Service-specific details for PSTN/ISDN services ||  
Line 199: Line 219:
| ETSI TS 102 232-7 || Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 7: Service-specific details for Mobile Services ||
| ETSI TS 102 232-7 || Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 7: Service-specific details for Mobile Services ||
|-
|-
| ETSI TS 103 221 || Lawful Interception (LI); Internal Network Interfaces || Part I (X1) and Part II (X2/X3)
| ETSI TR 102 528 || Lawful Interception (LI); Interception domain Architecture for IP networks || Document describes a high level reference architecture for supporting lawful interception in network operator (NWO) and communication service providers (SvP) domain for IP networks.
 
The document contains:
* A reference model in the network operator (NWO) and communication service provider (SvP) domain.
* A High level description of Internal Network Functions and Interfaces.
* Application of the reference model to voice and multimedia over IP services, data layer 3 and layer 2 services.
|-
| ETSI TS 103 221 || Lawful Interception (LI); Internal Network Interfaces || Part I (X1) and Part II (X2/X3) [[My TS 103 221-2 notes]]
|-
|-
| ETSI TS 103 643 || Techniques for assurance of digital material used in legal proceedings ||
| ETSI TS 103 643 || Techniques for assurance of digital material used in legal proceedings ||
Line 218: Line 245:
|-
|-
| ETSI TS 103 120 || Lawful Interception (LI); Interface for warrant information || Document defines an electronic interface between two systems for the exchange of information relating to the establishment and management of lawful required action, typically Lawful Interception.
| ETSI TS 103 120 || Lawful Interception (LI); Interface for warrant information || Document defines an electronic interface between two systems for the exchange of information relating to the establishment and management of lawful required action, typically Lawful Interception.
|-
| ETSI TS 103 280 || Lawful Interception (LI); Dictionary for common parameters || Document defines a dictionary of parameters that are commonly used in multiple TC LI specifications. Aside from defining a dictionary, the present document aims to provide technical means for other specifications to use. It is encouraged to use the present document in the development of new specifications. [[My ETSI TS 103 280 notes]]
|-
|-
| ETSI TS 103 690 || Lawful Interception (LI); eWarrant Interface || Document presents a high-level description of an interface mechanism - the eWarrant Interface - for receipt of requests for measures producing real-time or stored information by an issuing authority possessing lawful authorization to initiate such a request
| ETSI TS 103 690 || Lawful Interception (LI); eWarrant Interface || Document presents a high-level description of an interface mechanism - the eWarrant Interface - for receipt of requests for measures producing real-time or stored information by an issuing authority possessing lawful authorization to initiate such a request
Line 284: Line 313:


MCPTT ID parameter is defined in TS 23.280
MCPTT ID parameter is defined in TS 23.280
[[My ATIS lawful interception standard notes]]


[[My lawful interception notes]]
[[My lawful interception notes]]
Line 301: Line 332:
== National Requirements Resources ==
== National Requirements Resources ==


[https://www.bundesnetzagentur.de/EN/Areas/Telecommunications/Companies/ServicerProviderObligation/PublicSafety/Intercepts/start.html German ], see TR TKÜV. See [My German LI notes]
[https://www.bundesnetzagentur.de/EN/Areas/Telecommunications/Companies/ServicerProviderObligation/PublicSafety/Intercepts/start.html German ], see TR TKÜV. See [[My German LI notes]]

Latest revision as of 09:58, 25 March 2024

NNI Task Force

NNI Task Force Introduction

3GPP SA3 Security

SA3 - Security

3GPP Standards

3GPP specification numbering

3GPP Specification Status Report

Definition and abbreviations

See My 3GPP definition notes for definitions

See My 3GPP abbreviation notes for abbreviations

EPS and NR related standards with notes

My New Radio (NR) notes

Standard # Title Notes
22.011 3rd Generation Partnership Project;

Technical Specification Group Services and System Aspects; Service accessibility

The purpose of 22.011 is to describe the service access procedures as presented to the user. Definitions and procedures are provided in 22.011 for international roaming, national roaming and regionally provided service. These are mandatory in relation to the technical realization of the Mobile Station, or User Equipment (UE).

My 3GPP TS 22.011 Notes

22.261 3rd Generation Partnership Project;

Technical Specification Group Services and System Aspects; Service requirements for the 5G system; Stage 1

Document describes the service and operational requirements for a 5G system, including a UE, NG-RAN, and 5G Core network. Requirements for a 5G E-UTRA-NR Dual Connectivity in E-UTRAN connected to EPC are found in TS 22.278.
23.122 3rd Generation Partnership Project;

Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) functions related to Mobile Station (MS) in idle mode

Document gives an overview of the tasks undertaken by the Core network protocols of a Mobile Station (MS) when in idle mode, that is, switched on but typically not having a dedicated channel allocated. It also describes the corresponding network functions. The conditions when the idle mode functions are performed by an MS in the UTRA RRC connected mode states are specified in 3GPP TS 25.331. The conditions when the idle mode functions are performed by an MS in the E-UTRAN are specified in 3GPP TS 36.304. The conditions when the idle mode functions are performed by an MS in the NG-RAN are specified in 3GPP TS 36.304 and 3GPP TS 38.304. The conditions when the idle mode functions are performed by an MS in the NG-RAN RRC inactive state are specified in 3GPP TS 36.331 and 3GPP TS 38.331.
23.271 3rd Generation Partnership Project;

Technical Specification Group Services and System Aspects; Functional stage 2 description of Location Services (LCS) (Release 16)

Document specifies the stage 2 of the LoCation Services (LCS) feature in UMTS, GSM and EPS (for E-UTRAN), which provides the mechanisms to support mobile location services for operators, subscribers and third party service providers. Location Services in 5GC are restricted to regulatory services and are specified in TS 23.501 and TS 23.502 in this release of the specification. The architecture and signalling procedures in NG-RAN are defined in TS 38.305.
23.273 3rd Generation Partnership Project;

Technical Specification Group Services and System Aspects; 5G System (5GS) Location Services (LCS); Stage 2

V17.5.0 document specifies the stage 2 of the service-based architecture used for location services in the 5G system, and corresponding Network Functions (NFs), NF services and procedures, to meet the service requirements defined in TS 22.261 and TS 22.071.
23.401 3rd Generation Partnership Project;

Technical Specification Group Services and System Aspects; General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access (Release 17)

This document defines the Stage 2 service description for the Evolved 3GPP Packet Switched Domain - also known as the Evolved Packet System (EPS) in this document. The Evolved 3GPP Packet Switched Domain provides IP connectivity using the Evolved Universal Terrestrial Radio Access Network (E-UTRAN).

The specification covers both roaming and non-roaming scenarios and covers all aspects, including mobility between E-UTRAN and pre-E-UTRAN 3GPP radio access technologies, policy control and charging, and authentication.

23.501 3rd Generation Partnership Project;

Technical Specification Group Services and System Aspects; System architecture for the 5G System (5GS); Stage 2

5G core network My 3GPP 23.501 Notes
23.502 3rd Generation Partnership Project;

Technical Specification Group Services and System Aspects; Procedures for the 5G System (5GS); Stage 2

V17.5.0 document defines the Stage 2 procedures and Network Function Services for the 5G system architecture which is described in the TS 23.501 and for the policy and charging control framework which is described in TS 23.503.

My 3GPP 23.502 Notes

24.229 Digital cellular telecommunications system (Phase 2+) (GSM);
Universal Mobile Telecommunications System (UMTS);
LTE;
IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP);
Stage 3
P-Access-Network-Info values for "cgi-3gpp", "utran-cell-id-3gpp", "i-wlan-node-id", "dsl-location", "ci-3gpp2", "ci-3gpp2-femto" and "gstn-location" are defined in section 7.2A.4
24.501 3rd Generation Partnership Project;

Technical Specification Group Core Network and Terminals; Non-Access-Stratum (NAS) protocol for 5G System (5GS); Stage 3;

This present document specifies the non-access stratum (NAS) procedures in the 5G system (5GS) used by the protocols for:
  • mobility management between the user equipment (UE) and the access and mobility management function (AMF) for both 3GPP access and non-3GPP access; and
  • session management between the user equipment (UE) and the session management function (SMF) for both 3GPP access and non-3GPP access.

The 5GS mobility management (5GMM) protocol defined in the present document provides procedures for the control of mobility when the user equipment (UE) is using the NG radio access network (NG-RAN) and/or non-3GPP access network. The 5GMM protocol also provides control of security for the NAS protocols.

My 3GPP 24.501 notes

24.502 3rd Generation Partnership Project;

Technical Specification Group Core Network and Terminals; Access to the 3GPP 5G Core Network (5GCN) via Non-3GPP Access Networks (N3AN); Stage 3

This document specifies non-3GPP access network discovery and selection procedures, the access authorization procedure used for accessing non-3GPP access networks. These non-3GPP access networks can be trusted non-3GPP access networks, untrusted non-3GPP access networks or wireline access networks.
29.503 3rd Generation Partnership Project;

Technical Specification Group Core Network and Terminals; 5G System; Unified Data Management Services; Stage 3

The document specifies the stage 3 protocol and data model for the Nudm Service Based Interface. It provides stage 3 protocol definitions and message flows, and specifies the API for each service offered by the UDM.

The 5G System stage 2 architecture and procedures are specified in 3GPP TS 23.501 and 3GPP TS 23.502.

The Technical Realization of the Service Based Architecture and the Principles and Guidelines for Services Definition are specified in 3GPP TS 29.500 and 3GPP TS 29.501.

29.279 Universal Mobile Telecommunications System (UMTS);
LTE;
Mobile IPv4 (MIPv4) based mobility protocols;
Stage 3
29.571 5G System; Common Data Types for Service Based Interfaces; Stage 3 The document specifies the stage 3 protocol and data model for common data types that are used or may be expected to be used by multiple Service Based Interface APIs supported by the same or different Network Function(s).
33.501 3rd Generation Partnership Project;

Technical Specification Group Services and System Aspects; Security architecture and procedures for 5G system

Document specifies the security architecture, i.e., the security features and the security mechanisms for the 5G System and the 5G Core, and the security procedures performed within the 5G System including the 5G Core and the 5G New Radio.

My 3GPP 33.501 notes

37.340 3rd Generation Partnership Project;

Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA) and NR; Multi-connectivity; Stage 2

Document provides an overview of the multi-connectivity operation using E-UTRA and NR radio access technologies.
38.300 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; NR; NR and NG-RAN Overall Description; Stage 2 This document provides an overview and overall description of the NG-RAN and focuses on the radio interface protocol architecture of NR connected to 5GC (E-UTRA connected to 5GC is covered in the 36 series). Details of the radio interface protocols are specified in companion specifications of the 38 series.

My 3GPP 38.300 Notes

38.304 3rd Generation Partnership Project;

Technical Specification Group Radio Access Network; NR; User Equipment (UE) procedures in Idle mode and RRC Inactive state

Document specifies the Access Stratum (AS) part of the UE procedures in RRC_IDLE state (also called Idle mode) and RRC_INACTIVE state. The non-access stratum (NAS) part of Idle mode procedures and processes is specified in TS 23.122.

My 3GPP TS 38.304 Notes

38.331 3rd Generation Partnership Project;

Technical Specification Group Radio Access Network; NR; Radio Resource Control (RRC) protocol specification (Release 17)

This document specifies the Radio Resource Control protocol for the radio interface between UE and NG-RAN.
38.401 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; NG-RAN; Architecture description Document describes the overall architecture of the NG-RAN, including interfaces NG, Xn and F1 interfaces and their interaction with the radio interface.

My 3GPP TS 38.401 Notes

38.413 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; NG-RAN; NG Application Protocol (NGAP)(Release 16) This document specifies the radio network layer signalling protocol for the NG interface. The NG Application Protocol (NGAP) supports the functions of the NG interface by signalling procedures defined in this document. NGAP is developed in accordance to the general principles stated in TS 38.401 and TS 38.410.
Example Example Example
Example Example Example
Example Example Example
Example Example Example
Example Example Example
Example Example Example
Example Example Example
Example Example Example

3GPP/ETSI info

ETSI 5G information page

ETSI Lawful Interception (LI) information page

ETSI Technical Committee (TC) Lawful Interception information page and contains list of latest publications

ETSI Standards

Lawful Interception or Related Standards

ETSI Standard Title Notes
ETSI TS 102 232-1 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 1: Handover specification for IP delivery This document specifies the general aspects of HI2 and HI3 interfaces for handover via IP based networks. This document:
  • specifies the modular approach used for specifying IP based handover interfaces;
  • specifies the header(s) to be added to IRI and CC sent over the HI2 and HI3 interfaces respectively;
  • specifies protocols for the transfer of IRI and CC across the handover interfaces;
  • specifies protocol profiles for the handover interface.

My 102 232-1 notes

ETSI TS 102 232-2 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services This document contains a stage 1 like description of the interception information in relation to the process of sending and receiving asynchronous messages. The present document also contains a stage 2 like description of when Intercept Related Information (IRI) and Content of Communication (CC) need to be sent, and what information it needs to contain. Examples of asynchronous messages include: email, unified messaging and chat applications. See 102-232-1 for stage 3.
ETSI TS 102 232-3 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 3: Service-specific details for internet access services This document contains a stage 1 description of the interception information in relation to the process of binding a "target identity" to an IP address when providing Internet access and a stage 2 description of when Intercept Related Information (IRI) and Content of Communication (CC) need to be sent, and what information it needs to contain. The study includes but is not restricted to IRI based on application of Dynamic Host Configuration Protocol (DHCP) and Remote Authentication Dial-In User Service (RADIUS) technology for binding a "target identity" to an IP address and CC for the intercepted IP packets.

The definition of the Handover Interface 2 (HI2) and Handover Interface 3 (HI3) is outside the scope of the present document. For the handover interface is referred to ETSI TS 102 232-1.

My 102 232-3 notes

ETSI TS 102 232-4 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 4: Service-specific details for Layer 2 services
ETSI TS 102 232-5 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia services Document specifies interception of Internet Protocol (IP) Multimedia (MM) Services based on the Session Initiation Protocol (SIP) and Real Time Transport Protocol (RTP) and Message Session Relay Protocol (MSRP) and IPMM services as described by the Recommendations ITU-T H.323 and H.248-1.

The present document is consistent with the definition of the Handover Interface, as described in ETSI TS 102 232-1.

The present document does not override or supersede any specifications or requirements in 3GPP TS 33.108 and ETSI TS 101 671.

ETSI TS 102 232-6 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 6: Service-specific details for PSTN/ISDN services
ETSI TS 102 232-7 Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 7: Service-specific details for Mobile Services
ETSI TR 102 528 Lawful Interception (LI); Interception domain Architecture for IP networks Document describes a high level reference architecture for supporting lawful interception in network operator (NWO) and communication service providers (SvP) domain for IP networks.

The document contains:

  • A reference model in the network operator (NWO) and communication service provider (SvP) domain.
  • A High level description of Internal Network Functions and Interfaces.
  • Application of the reference model to voice and multimedia over IP services, data layer 3 and layer 2 services.
ETSI TS 103 221 Lawful Interception (LI); Internal Network Interfaces Part I (X1) and Part II (X2/X3) My TS 103 221-2 notes
ETSI TS 103 643 Techniques for assurance of digital material used in legal proceedings
ETSI TS 101 671 Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic Document is step 3 of a three-step approach to describe a generic Handover Interface (HI) for the provision of lawful interception from a Network Operator, an Access Provider or a Service Provider (NWO/AP/SvP) to the Law Enforcement Agencies (LEAs). The provision of lawful interception is a requirement of national law, which is usually mandatory for the operation of any telecommunication service. Step 1 contains the requirements for lawful interception from a users (LEAs) point of view and is published in ETSI TS 101 331. Step 2 describes the derived network functions and the general architecture (or functional model) and is published in ETSI ES 201 158.
ETSI TS 103 462 Lawful Interception (LI); Inter LEMF Handover Interface
ETSI TR 102 503 Lawful Interception (LI); ASN.1 Object Identifiers in Lawful Interception and Retained data handling Specifications
ETSI TS 102 656 Lawful Interception (LI); Retained Data; Requirements of Law Enforcement Agencies for handling Retained Data
ETSI TS 102 657 Lawful Interception (LI); Retained data handling; Handover interface for the request and delivery of retained data
ETSI TS 101 331 Lawful Interception (LI); Requirements of Law Enforcement Agencies Document gives guidance for lawful interception of telecommunications in the area of co-operation by network operators, access providers, and service providers. Document describes the requirements from a Law Enforcement Agency's (LEA's) point of view.
ETSI TS 103 707 Lawful Interception (LI); Handover for messaging services over HTTP/XML Document specifies the handover details to deliver messaging services for LI over HTTP/XML
ETSI TS 103 120 Lawful Interception (LI); Interface for warrant information Document defines an electronic interface between two systems for the exchange of information relating to the establishment and management of lawful required action, typically Lawful Interception.
ETSI TS 103 280 Lawful Interception (LI); Dictionary for common parameters Document defines a dictionary of parameters that are commonly used in multiple TC LI specifications. Aside from defining a dictionary, the present document aims to provide technical means for other specifications to use. It is encouraged to use the present document in the development of new specifications. My ETSI TS 103 280 notes
ETSI TS 103 690 Lawful Interception (LI); eWarrant Interface Document presents a high-level description of an interface mechanism - the eWarrant Interface - for receipt of requests for measures producing real-time or stored information by an issuing authority possessing lawful authorization to initiate such a request

Other Standards

3GPP Title Notes
23.003 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Numbering, addressing and identification; (Release 17) This document defines the principal purpose and use of different naming, numbering, addressing and identification resources (i.e. Identifiers (ID)) within the digital cellular telecommunications system and the 3GPP system. IDs that are covered by this specification includes both public IDs, private IDs and IDs that are assigned to MSs/UEs. Many of the IDs are used temporary in the networks and are allocated and assigned by the operators and some other IDs are allocated and assigned on either global, regional and national level by an administrator.

My 3GPP TS 23.003 notes

23.228 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; IP Multimedia Subsystem (IMS); Stage 2 (Release 16) This document defines the stage-2 service description for the IP Multimedia Core Network Subsystem (IMS), which includes the elements necessary to support IP Multimedia (IM) services. My 3GPP TS 23.228 Notes
23.401 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; General Packet Radio Service (GPRS) enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) access (Release 16) The document defines the Stage 2 service description for the Evolved 3GPP Packet Switched Domain - also known as the Evolved Packet System (EPS) in this document. The Evolved 3GPP Packet Switched Domain provides IP connectivity using the Evolved Universal Terrestrial Radio Access Network (E-UTRAN). The specification covers both roaming and non-roaming scenarios and covers all aspects, including mobility between E-UTRAN and pre-E-UTRAN 3GPP radio access technologies, policy control and charging, and authentication.
24.007 3rd Generation Partnership Project;

Technical Specification Group Core Network and Terminals; Mobile radio interface signalling layer 3; General aspects (Release 17)

24.007 document defines the principal architecture of layer 3 and its sublayers on the GSM Um interface, i.e. the interface between Mobile Station (MS) and network; for the CM sublayer, the description is restricted to paradigmatic examples, call control, supplementary services, and short message services for non-GPRS services. It also defines the basic message format and error handling applied by the layer 3 protocols.

This document also defines the principal architecture of the EPS NAS and 5GS NAS layer 3 protocol and their sublayers, including the message format applied by layer 3.

My 3GPP TS 24.007 Notes

33.108 UMTS; LTE; GSM; 3G Security; Handover interface for lawful interception (LI) My TS 133 108 notes
33.127 3rd Generation Partnership Project;

Technical Specification Group Services and System Aspects; Security; Lawful Interception (LI) architecture and functions

This document specifies both the architectural and functional system requirements for Lawful Interception (LI) in 3GPP networks. The present document provides an LI architecture supporting both network layer based and service layer based Interception. National regulations determine the specific set of LI functional capabilities that are applicable to a specific 3GPP operator deployment.

My 33.127 Notes

33.128 3rd Generation Partnership Project;

Technical Specification Group Services and System Aspects; Security; Protocol and procedures for Lawful Interception (LI); Stage 3

This document specifies the protocols and procedures required to perform Lawful Interception within a 3GPP network. The present document addresses both internal interfaces used internally with a 3GPP network and external handover interfaces used to handover intercepted communications to law enforcement.

My 33.128 Notes

Standards related info

MCPTT ID parameter is defined in TS 23.280

My ATIS lawful interception standard notes

My lawful interception notes

RFCs of interest

RFC 3261 SIP: Session Initiation Protocol

RFC 3455 Private Header (P-Header) Extensions to the Session Initiation Protocol (SIP) for the 3rd-Generation Partnership Project (3GPP)

RFC 7913 P-Access-Network-Info ABNF Update

RFC 4984 Report from the IAB Workshop on Routing and Addressing

RFC 6830 The Locator/ID Separation Protocol (LISP)

National Requirements Resources

German , see TR TKÜV. See My German LI notes