Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 22.989  Word version:  20.1.0

Top   Top   Up   Prev   Next
0…   4…   6…   6.3…   6.4…   6.5…   6.8…   6.13…   6.16…   7…   8…   10…

 

8  Business communication applications related use casesp. 157

9  Critical support applications related use casesp. 162

9.1  Overviewp. 162

9.2  Assured voice communication (AVC)p. 162

9.3  Functional identities and role managementp. 167

9.3.1  Introductionp. 167

9.3.2  General pre-conditionsp. 168

9.3.3  Use case: Registration to a functional identityp. 171

9.3.4  Use case: Deregistration of a functional identityp. 174

9.3.5  Use case: User log-in to the FRMCS Systemp. 175

9.3.6  Use case: User log-out from FRMCS Systemp. 176

9.3.7  Use case: Presentation of identitiesp. 177

9.3.8  Use case: Interrogation of identities within a certain contextp. 179

9.4  Location services related use casesp. 185

9.5  FRMCS User communication handling related use casesp. 188

9.5.1  Introductionp. 188

9.5.2  Use Case: Inviting-FRMCS User(s) to a voice communicationp. 189

9.5.3  Use Case: FRMCS User receiving an invitation to a voice communicationp. 190

9.5.4  Use case: FRMCS User accepting an invitation to a voice communicationp. 191

9.5.5  Use case: FRMCS User rejecting an invitation to a voice communicationp. 192

9.5.6  Use case: FRMCS User ignoring an invitation to a voice communicationp. 193

9.5.7  Service interworking with GSM-Rp. 193

9.6Void

9.7  Multiuser talker control related use casesp. 196

9.7.1  General Description and potential requirementsp. 196

9.7.2  Use case: Set the number of simultaneous talkersp. 197

9.7.3  Use case: Set initial talker permissions and prioritiesp. 197

9.7.4  Use case: Request permission to talkp. 199

9.7.5  Use case: Grant permission to talkp. 200

9.7.6  Use case: Revoke permission to talkp. 203

9.7.7  Use case: Service interworking and service continuation with GSM-Rp. 204

9.8  Authorisation of communicationp. 204

9.9  Authorisation of applicationp. 206

9.10  Sharing FRMCS Equipment by FRMCS Usersp. 215

9.11  FRMCS naming authorityp. 216

9.12  Wayside-Centric Automatic Train Controlp. 217

9.13  Autonomous Train Control and Operationp. 219

9.14  Virtual Couplingp. 221

9.15  Composite-based train operationp. 224

9.16  Arbitration related use casesp. 225

9.17  Data communication to exchange key information for train safety application use casesp. 230


Up   Top   ToC