English
Language : 

J7824A Datasheet, PDF (2/8 Pages) Keysight Technologies – Network Monitoring Content Intercept Manager
02 | Keysight | Network Monitoring Content Intercept Manager - Data Sheet
Overview
Intercept agencies face the extreme challenge of maintaining
effective operations in a constantly changing telecommunications
technology landscape.
In mobile communications GSM remains the dominant technology
with approximately 66% of the world’s mobile subscribers. The vast
majority of GSM network operators have evolved their networks by
introducing UMTS, HSPA and LTE access. While GSM is the dominant
technology CDMA remains an important technology and with the
advent of LTE CDMA operators at last have a route to high speed
data services. As of Fall 2013 there are 406 telecoms operators in
123 countries who have committed to commercial LTE network
deployments or are engaged on trials, technology testing or studies,
with 213 commercial networks live around the world. These networks
are delivering services to over 63 million subscribers around the
globe. Keysight Technologies, Inc. has evolved with the networks and
is in a position to ensure that those with the legal right to monitor
communications can maintain effective operations in the new and
legacy domains.
Content Intercept Manager (CIM) is part of Keysight’s powerful
portfolio of Network Monitoring solutions targeted at the global
security and safety market. CIM allows personnel to quickly and easily
intercept cellular communications based upon pre-defined and legal
targeting information. The solution is based upon high density passive
probes and is totally independent of the telecoms network elements.
It handles a high volume of call intercepts and supports many complex
combination of call filters. Configuration and operation has been
designed to be fast, flexible and productive, with automatic discovery
of all relvant control and user plane information plus an easy-to-use
graphical interface for creating, viewing and editing points of interest.
Keysight expertize
In common with all Network Monitoring solutions, CIM is totally inde-
pendent of the network equipment vendor and does not interact with
network equipment. It leverages Keysight’s proven skills and expertise
in wireless test to provide tightly-specified intelligence information,
cost-effectively, reliably and efficiently. It can be scaled as required for
use in passive, single or multi-point access applications.
Tageting key technologies
In order to be effective CIM must be able to support a wide range of
cellular technologies and the key links/interfaces within them
as follows:
Cellular technology
GSM (voice/SMS/Fax)
GSM (voice/SMS/Fax)
UMTS (voice/SMS/Fax)
GSM/UMTS (data)
CDMA (voice/SMS/Fax)
LTE (data)
Key link/interface
Abis (uplink and downlink
only or both)
A-interface
IuCS
GPRS Gn
A1
S1, S6a
Easy targeting, usage and system set-up
The CIM solution reconstructs and records voice, SMS (text), Fax,
DTMF (inband tones) and mobile data from cellular networks. It can
handle a large volume of points of interest – potentially 5000 per
system – and supports many complex call filtering scenarios including
the actual telephone number (MSISDN), the network number for the
subscriber (IMSI), the identity number for the mobile station (IMEI)
or calling and called numbers. These filters may be prioritized and
updated dynamically.
Cellular networks constantly change their configuration parameters in
real-time. CIM automatically discovers the required control and user
plane parameters from cellular networks, which means that users
need little or no prior network knowledge. Operating the system is also
easy and intuitive. A simple graphical user interface helps to visualize
the data captured, update and track details of suspects and repriori-
tize them. Filters for handsets or numbers of interest can be quickly
created and dynamically edited, allowing voice communications,
SMS and mobile data to be monitored in real time or stored for later
analysis. Users listening to calls in real time can be alerted by the
system when calls with higher priority start and are given the option
to switch between them.
The CIM user interface runs on a standard PC/Laptop and up to
ten users may use the system simultaneously. The product scales
from tactical point solutions to solutions covering an entire
cellular network.