Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 23.206
Word version: 7.5.0
1…
4…
4
VCC Concepts
5
Architecture
6
Information flows and procedures
7
Security
8
Charging
A
Call diversion techniques from CS to IMS
B
Domain selection for VCC
C
Techniques for the prevention of circular looping for CS Terminations
$
Change history
4
VCC Concepts
p. 8
4.1
General
p. 8
4.2
Radio environments
p. 8
4.3
Domain selection
p. 8
4.4
Anchoring in IMS of VCC subscriber calls
p. 9
4.4.1
Calls originated by VCC subscribers
p. 9
4.4.2
Calls terminated to VCC subscribers
p. 9
4.5
Domain transfer procedures
p. 9
4.6
Regulatory aspects
p. 10
5
Architecture
p. 10
5.1
General
p. 10
5.2
Reference model
p. 10
5.3
VCC entities
p. 12
5.3.1
VCC application
p. 12
5.3.1.1
General
p. 12
5.3.1.2
Functional Entities used by the VCC application
p. 12
5.3.1.2.1
Domain Transfer Function (DTF)
p. 12
5.3.1.2.2
Domain Selection Function (DSF)
p. 12
5.3.1.2.3
CS Adaptation Function (CSAF)
p. 13
5.3.1.2.4
CAMEL Service
p. 13
5.3.2
VCC UE
p. 13
5.4
Reference points
p. 14
5.4.1
DTF - S-CSCF, CSAF - S-CSCF, DSF - S-CSCF reference point (ISC)
p. 14
5.4.2
CSAF - I-CSCF, DTF - I-CSCF reference point (Ma)
p. 14
5.4.3
Functional entity - HSS reference point
p. 14
5.4.4
gsmSCF - VMSC reference point
p. 14
5.4.5
gsmSCF - HSS reference point
p. 14
5.4.6
VCC Application - VCC UE reference point (V3)
p. 14
6
Information flows and procedures
p. 14
6.1
Registration
p. 14
6.1.1
CS domain registration
p. 14
6.1.2
IMS registration
p. 15
6.2
Origination
p. 15
6.2.1
General
p. 15
6.2.2
VCC UE origination from CS domain
p. 15
6.2.2.1
General
p. 15
6.2.2.2
UE origination from CS domain using CAMEL
p. 16
6.2.3
VCC UE origination from IMS domain
p. 17
6.3
Termination
p. 17
6.3.0
General
p. 17
6.3.1
Terminated call coming from CS
p. 18
6.3.2
Terminated call coming from IMS
p. 18
6.3.3
Terminated call directed to CS
p. 18
6.3.4
Terminated call directed to IMS
p. 19
6.4
Domain transfer
p. 21
6.4.1
Domain transfer procedures
p. 21
6.4.1.1
General
p. 21
6.4.1.2
Enablement of domain transfer procedures
p. 21
6.4.1.3
Execution of domain transfer procedures
p. 22
6.4.1.4
Access Leg Update toward the remote end
p. 23
6.4.1.5
Source Access Leg Release
p. 24
6.4.2
Domain transfer information flows
p. 24
6.4.2.1
Domain transfer: IMS to CS domain
p. 24
6.4.2.2
Domain transfer: CS domain to IMS
p. 26
6.4.2.3
Subsequent domain transfers
p. 26
6.4.3
Void
6.5
Supplementary services
p. 27
6.5.1
General
p. 27
6.5.2
Supplementary services behaviour
p. 27
6.5.2.1
General
p. 27
6.5.2.2
Line Identification supplementary services
p. 27
6.5.2.2.1
General
p. 27
6.5.2.2.2
IMS: Originating Identification Presentation (OIP), CS: Calling Line Identity Presentation (CLIP)
p. 27
6.5.2.2.3
IMS: Terminating Identification Presentation (TIP), CS: Connected Line Identity Presentation (COLP)
p. 27
6.5.2.2.4
IMS: Originating Identification Restriction (OIR), CS: Calling Line Identity Restriction (CLIR)
p. 27
6.5.2.2.5
IMS: Terminating Identification Restriction (TIR), CS: Connected Line Identity Restriction (COLR)
p. 27
6.5.2.3
IMS: Communication Diversion (CDIV), CS: Call Forwarding supplementary services
p. 27
6.5.2.4
IMS: Communication Hold, CS: Call Wait and CS: Call Hold supplementary services
p. 28
6.5.2.5
IMS: Conference (CONF), CS: Multiparty (MPTY) supplementary service
p. 28
6.5.2.6
IMS: Call Barring (CB), CS: Call Barring (Operator Determined and supplementary service)
p. 28
6.5.3
Impact of service behaviour
p. 28
6.6
CAMEL services
p. 28
6.7
Presence services
p. 29
6.8
Other procedures
p. 29
6.8.1
User preferences and operator policy
p. 29
7
Security
p. 29
7.1
General
p. 29
7.2
Access security for CS Domain
p. 29
7.3
Access security for IMS
p. 29
8
Charging
p. 30
8.1
General description
p. 30
8.2
Charging strategy
p. 30
8.3
Accounting strategy
p. 30
A
Call diversion techniques from CS to IMS
p. 31
A.1
Implementation options for call diversion from CS to the DTF in IMS
p. 31
B
Domain selection for VCC
p. 33
C
Techniques for the prevention of circular looping for CS Terminations
p. 34
C.1
Implementation options prevention of circular looping for CS Terminations
p. 34
$
Change history
p. 36