Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 22.989  Word version:  20.2.0

Top   Top   Up   Prev   Next
0…   4…   6…   6.3…   6.4…   6.5…   6.8…   6.13…   6.16…   7…   8…   10…

 

8  Business communication applications related use casesp. 161

9  Critical support applications related use casesp. 166

9.1  Overviewp. 166

9.2  Assured voice communication (AVC)p. 166

9.3  Functional identities and role managementp. 171

9.3.1  Introductionp. 171

9.3.2  General pre-conditionsp. 172

9.3.3  Use case: Registration to a functional identityp. 175

9.3.4  Use case: Deregistration of a functional identityp. 178

9.3.5  Use case: User log-in to the FRMCS Systemp. 179

9.3.6  Use case: User log-out from FRMCS Systemp. 180

9.3.7  Use case: Presentation of identitiesp. 181

9.3.8  Use case: Interrogation of identities within a certain contextp. 183

9.3.10  Use case: Status of a functional identityp. 189

9.4  Location services related use casesp. 190

9.5  FRMCS User communication handling related use casesp. 193

9.5.1  Introductionp. 193

9.5.2  Use Case: Inviting-FRMCS User(s) to a voice communicationp. 193

9.5.3  Use Case: FRMCS User receiving an invitation to a voice communicationp. 194

9.5.4  Use case: FRMCS User accepting an invitation to a voice communicationp. 195

9.5.5  Use case: FRMCS User rejecting an invitation to a voice communicationp. 196

9.5.6  Use case: FRMCS User ignoring an invitation to a voice communicationp. 197

9.5.7  Service interworking with GSM-Rp. 198

9.6Void

9.7  Multiuser talker control related use casesp. 200

9.7.1  General Description and potential requirementsp. 200

9.7.2  Use case: Set the number of simultaneous talkersp. 201

9.7.3  Use case: Set initial talker permissions and prioritiesp. 202

9.7.4  Use case: Request permission to talkp. 203

9.7.5  Use case: Grant permission to talkp. 204

9.7.6  Use case: Revoke permission to talkp. 207

9.7.7  Use case: Service interworking and service continuation with GSM-Rp. 208

9.8  Authorisation of communicationp. 208

9.9  Authorisation of applicationp. 210

9.10  Sharing FRMCS Equipment by FRMCS Usersp. 219

9.11  FRMCS naming authorityp. 220

9.12  Wayside-Centric Automatic Train Controlp. 221

9.13  Autonomous Train Control and Operationp. 223

9.14  Virtual Couplingp. 225

9.15  Composite-based train operationp. 228

9.16  Arbitration related use casesp. 229

9.17  Data communication to exchange key information for train safety application use casesp. 234

9.18  Presencep. 239


Up   Top   ToC