Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 22.889
Word version: 17.4.0
0…
4…
6…
7…
8…
10…
8
Business communication applications related use cases
8.1
Multimedia applications related use cases
8.2
Use Case: Live streaming of multimedia
8.3
Use Case: Bulk transfer of multimedia from ground to train
9
Critical support applications related use cases
9.1
Overview
9.2
Assured voice communication (AVC)
9.3
Functional identities and role management
9.4
Location services related use cases
9.5
FRMCS User communication handling related use cases
9.7
Multi user talker control related use cases
9.8
Authorisation of communication
9.9
Authorisation of application
9.10
Sharing FRMCS Equipment by FRMCS Users
9.11
FRMCS naming authority
9.12
Wayside-Centric Automatic Train Control
9.13
Autonomous Train Control and Operation
9.14
Virtual Coupling
9.15
Composite-based train operation
9.16
Arbitration related use cases
9.17
Data communication to exchange key information for train safety application use cases
8
Business communication applications related use cases
p. 126
8.1
Multimedia applications related use cases
p. 126
8.1.1
Introduction
p. 126
8.2
Use Case: Live streaming of multimedia
p. 126
8.2.1
Description
p. 126
8.2.2
Pre-conditions
p. 126
8.2.3
Service flows
p. 126
8.2.4
Post-conditions
p. 126
8.2.5
Potential requirements and gap analysis
p. 126
8.3
Use Case: Bulk transfer of multimedia from ground to train
p. 127
8.3.1
Description
p. 127
8.3.2
Pre-conditions
p. 127
8.3.3
Service flows
p. 127
8.3.4
Post-conditions
p. 127
8.3.5
Potential requirements and gap analysis
p. 128
9
Critical support applications related use cases
p. 128
9.1
Overview
p. 128
9.2
Assured voice communication (AVC)
p. 128
9.2.1
Introduction
p. 128
9.2.2
Use case: Invocation of Assured Voice Communication
p. 128
9.2.2.1
Description
p. 128
9.2.2.2
Pre-conditions
p. 128
9.2.2.3
Service flows
p. 128
9.2.2.4
Post-conditions
p. 129
9.2.2.5
Potential requirements and gap analysis
p. 129
9.2.3
Use case: Stopping Assured Voice Communication
p. 129
9.2.3.1
Description
p. 129
9.2.3.2
Pre-conditions
p. 129
9.2.3.3
Service flows
p. 129
9.2.3.4
Post-conditions
p. 129
9.2.3.5
Potential requirements and gap analysis
p. 130
9.2.4
Use case: Degradation of a communication link
p. 130
9.2.4.1
Description
p. 130
9.2.4.2
Pre-conditions
p. 130
9.2.4.3
Service flows
p. 130
9.2.4.4
Post-conditions
p. 131
9.2.4.5
Potential requirements and gap analysis
p. 132
9.2.5
Use case: Extension of Assured Voice Communication
p. 133
9.2.5.1
Description
p. 133
9.2.5.2
Pre-conditions
p. 133
9.2.5.3
Service flows
p. 133
9.2.5.4
Post-conditions
p. 133
9.2.5.5
Potential requirements and gap analysis
p. 133
9.3
Functional identities and role management
p. 133
9.3.1
Introduction
p. 133
9.3.2
General pre-conditions
p. 134
9.3.2.1
Potential requirements and gap analysis
p. 137
9.3.3
Use case: Registration to a functional identity
p. 137
9.3.3.1
Description
p. 137
9.3.3.2
Pre-conditions
p. 137
9.3.3.3
Service flows
p. 137
9.3.3.4
Post-conditions
p. 138
9.3.3.5
Potential requirements and gap analysis
p. 139
9.3.4
Use case: Deregistration of a functional identity
p. 140
9.3.4.1
Description
p. 140
9.3.4.2
Pre-conditions
p. 140
9.3.4.3
Service flows
p. 140
9.3.4.4
Post-conditions
p. 140
9.3.4.5
Potential requirements and gap analysis
p. 141
9.3.5
Use case: User log-in to the FRMCS System
p. 141
9.3.5.1
Description
p. 141
9.3.5.2
Pre-conditions
p. 141
9.3.5.3
Service flows
p. 142
9.3.5.4
Post-conditions
p. 142
9.3.5.5
Potential requirements and gap analysis
p. 142
9.3.6
Use case: User log-out from FRMCS System
p. 142
9.3.6.1
Description
p. 142
9.3.6.2
Pre-conditions
p. 142
9.3.6.3
Service flows
p. 142
9.3.6.4
Post-conditions
p. 143
9.3.6.5
Potential requirements and gap analysis
p. 143
9.3.7
Use case: Presentation of identities
p. 143
9.3.7.1
Description
p. 143
9.3.7.2
Pre-conditions
p. 144
9.3.7.3
Service flows
p. 144
9.3.7.4
Post-conditions
p. 144
9.3.7.5
Potential requirements and gap analysis
p. 145
9.3.8
Use case: Interrogation of identities within a certain context
p. 145
9.3.8.1
Description
p. 145
9.3.8.2
Pre-conditions
p. 145
9.3.8.3
Service flows
p. 145
9.3.8.4
Post-conditions
p. 146
9.3.8.5
Potential requirements and gap analysis
p. 147
9.3.9.5
Potential requirements and gap analysis
p. 150
9.4
Location services related use cases
p. 151
9.4.1
Introduction
p. 151
9.4.2
Use Case: Provide location information
p. 151
9.4.2.1
Description
p. 151
9.4.2.2
Pre-conditions
p. 151
9.4.2.3
Service flows
p. 151
9.4.2.4
Post-conditions
p. 152
9.4.2.5
Potential requirements and gap analysis
p. 152
9.4.3
Use Case: Request for location information
p. 152
9.4.3.1
Description
p. 152
9.4.3.2
Pre-conditions
p. 152
9.4.3.3
Service flows
p. 153
9.4.3.4
Post-conditions
p. 153
9.4.3.5
Potential requirements and gap analysis
p. 153
9.4.4
Use Case: Request for identities in a certain area
p. 153
9.4.4.1
Description
p. 153
9.4.4.2
Pre-conditions
p. 154
9.4.4.3
Service flows
p. 154
9.4.4.4
Post-conditions
p. 154
9.4.4.5
Potential requirements and gap analysis
p. 154
9.5
FRMCS User communication handling related use cases
p. 154
9.5.1
Introduction
p. 154
9.5.2
Use Case: Inviting-a-FRMCS User to a voice communication
p. 155
9.5.2.1
Description
p. 155
9.5.2.2
Pre-conditions
p. 155
9.5.2.3
Service flows
p. 155
9.5.2.4
Post-conditions
p. 155
9.5.2.5
Potential requirements and gap analysis
p. 155
9.5.3
Use Case: FRMCS User receiving an invitation to a voice communication
p. 155
9.5.3.1
Description
p. 155
9.5.3.2
Pre-conditions
p. 156
9.5.3.3
Service flows
p. 156
9.5.3.4
Post-conditions
p. 156
9.5.3.5
Potential requirements and gap analysis
p. 156
9.5.4
Use case: FRMCS User accepting an invitation to a voice communication
p. 156
9.5.4.1
Description
p. 156
9.5.4.2
Pre-conditions
p. 156
9.5.4.3
Service flows
p. 156
9.5.4.4
Post-conditions
p. 157
9.5.4.5
Potential requirements and gap analysis
p. 157
9.5.5
Use case: FRMCS User rejecting an invitation to a voice communication
p. 157
9.5.5.1
Description
p. 157
9.5.5.2
Pre-conditions
p. 157
9.5.5.3
Service flows
p. 157
9.5.5.4
Post-conditions
p. 157
9.5.5.5
Potential requirements and gap analysis
p. 158
9.5.6
Use case: FRMCS User ignoring an invitation to a voice communication
p. 158
9.5.6.1
Description
p. 158
9.5.6.2
Pre-conditions
p. 158
9.5.6.3
Service flows
p. 158
9.5.6.4
Post-conditions
p. 158
9.5.6.5
Potential requirements and gap analysis
p. 158
9.6
Void
9.7
Multi user talker control related use cases
p. 158
9.7.1
General Description and potential requirements
p. 158
9.7.1.1
General Description
p. 158
9.7.1.2
Potential requirements and gap analysis
p. 159
9.7.2
Use case: Set the number of simultaneous talkers
p. 159
9.7.2.1
Description
p. 159
9.7.2.2
Pre-conditions
p. 159
9.7.2.3
Service flows
p. 159
9.7.2.4
Post-conditions
p. 159
9.7.2.5
Potential requirements and gap analysis
p. 160
9.7.3
Use case: Set initial talker permissions and priorities
p. 160
9.7.3.1
Description
p. 160
9.7.3.2
Pre-conditions
p. 160
9.7.3.3
Service flows
p. 160
9.7.3.4
Post-conditions
p. 160
9.7.3.5
Potential requirements and gap analysis
p. 161
9.7.4
Use case: Request permission to talk
p. 161
9.7.4.1
Description
p. 161
9.7.4.2
Pre-conditions
p. 161
9.7.4.3
Service flows
p. 162
9.7.4.4
Post-conditions
p. 162
9.7.4.5
Potential requirements and gap analysis
p. 162
9.7.5
Use case: Grant permission to talk
p. 162
9.7.5.1
Description
p. 162
9.7.5.2
Pre-conditions
p. 162
9.7.5.3
Service flows
p. 162
9.7.5.4
Post-conditions
p. 163
9.7.5.5
Potential requirements and gap analysis
p. 164
9.7.6
Use case: Revoke permission to talk
p. 164
9.7.6.1
Description
p. 164
9.7.6.2
Pre-conditions
p. 165
9.7.6.3
Service flows
p. 165
9.7.6.4
Post-conditions
p. 165
9.7.6.5
Potential requirements and gap analysis
p. 166
9.8
Authorisation of communication
p. 166
9.8.1
Introduction
p. 166
9.8.2
Use case: Permit / deny communication
p. 166
9.8.2.1
Description
p. 166
9.8.2.2
Pre-conditions
p. 166
9.8.2.3
Service flows
p. 166
9.8.2.4
Post-conditions
p. 167
9.8.2.5
Potential requirements and gap analysis
p. 167
9.9
Authorisation of application
p. 167
9.9.1
Introduction
p. 167
9.9.2
Use case: Enabling/Disabling applications
p. 167
9.9.2.1
Description
p. 167
9.9.2.2
Pre-conditions
p. 168
9.9.2.3
Service flows
p. 168
9.9.2.4
Post-conditions
p. 168
9.9.2.5
Potential requirements and gap analysis
p. 169
9.9.3
Use case: Robust mission critical group communication services
p. 170
9.9.3.1
Description
p. 170
9.9.3.2
Pre-conditions
p. 170
9.9.3.3
Service Flows
p. 171
9.9.3.4
Post-conditions
p. 171
9.9.3.5
Potential requirements and gap analysis
p. 172
9.10
Sharing FRMCS Equipment by FRMCS Users
p. 172
9.10.1
Description
p. 172
9.10.2
Pre-conditions
p. 172
9.10.3
Service Flows
p. 172
9.10.4
Post-conditions
p. 173
9.10.5
Potential requirements and gap analysis
p. 173
9.11
FRMCS naming authority
p. 173
9.11.1
Description
p. 173
9.11.2
Pre-conditions
p. 173
9.11.3
Service Flows
p. 173
9.11.4
Post-conditions
p. 174
9.11.5
Potential requirements and gap analysis
p. 174
9.12
Wayside-Centric Automatic Train Control
p. 174
9.12.1
Description
p. 174
9.12.2
Pre-conditions
p. 175
9.12.3
Service flows
p. 175
9.12.4
Post-conditions
p. 175
9.12.5
Potential requirements and gap analysis
p. 175
9.13
Autonomous Train Control and Operation
p. 175
9.13.1
Description
p. 175
9.13.2
Pre-conditions
p. 176
9.13.3
Service Flows
p. 176
9.13.4
Post-conditions
p. 176
9.13.5
Potential requirements and gap analysis
p. 177
9.14
Virtual Coupling
p. 177
9.14.1
Description
p. 177
9.14.2
Pre-conditions
p. 178
9.14.3
Service Flows
p. 179
9.14.4
Post-conditions
p. 179
9.14.5
Potential requirements and gap analysis
p. 180
9.15
Composite-based train operation
p. 180
9.15.1
Description
p. 180
9.15.2
Pre-conditions
p. 180
9.15.3
Service Flows
p. 180
9.15.4
Post-conditions
p. 181
9.15.5
Potential requirements and gap analysis
p. 181
9.16
Arbitration related use cases
p. 181
9.16.1
Introduction
p. 181
9.16.2
Use case: Arbitration
p. 181
9.16.2.1
Description
p. 181
9.16.2.2
Pre-conditions
p. 182
9.16.2.3
Service flows
p. 182
9.16.2.4
Post-conditions
p. 182
9.16.2.5
Potential requirements and gap analysis
p. 182
9.17
Data communication to exchange key information for train safety application use cases
p. 183
9.17.1
Introduction
p. 183
9.17.2
Use case: Initiation of a Key Management data communication
p. 183
9.17.2.1
Description
p. 183
9.17.2.2
Pre-conditions
p. 183
9.17.2.3
Service flows
p. 184
9.17.2.4
Post-conditions
p. 184
9.17.2.5
Potential requirements and gap analysis
p. 185
9.17.3
Use case: Termination of a Key Management data communication
p. 186
9.17.3.1
Description
p. 186
9.17.3.2
Pre-conditions
p. 186
9.17.3.3
Service flows
p. 186
9.17.3.4
Post-conditions
p. 186
9.17.3.5
Potential requirements and gap analysis
p. 187
9.17.4
Use case: service interworking and service continuation with GSM-R
p. 187
9.17.4.1
Description
p. 187
9.17.4.2
Pre-conditions
p. 187
9.17.4.3
Service flows
p. 187
9.17.4.4
Post-conditions
p. 188