Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 24.525
Word version: 18.0.0
1…
5…
A…
5
Functional architecture
5.1
General
5.2
Subscription based business trunking
5.3
Peering-based business trunking
5.4
Session-level virtual leased line
5.5
Support for roaming NGCN user
5.6
Support for roaming NGN user
6
Procedures
6.1
Subscription based business trunking
6.2
Peering-based business trunking
6.3
Session-level virtual leased line between NGCN sites
6.4
NGCN user roaming into NGN public network
7
Use of transport functions
7.1
Use of transport control sublayer
7.2
Use of transport processing functions
8
Security
9
Management
5
Functional architecture
p. 12
5.1
General
p. 12
5.2
Subscription based business trunking
p. 12
5.2.1
General
p. 12
5.2.2
Used functional entities at the service layer
p. 12
5.2.3
Used reference points at the service layer
p. 13
5.2.4
Used functional entities at the transport layer
p. 13
5.2.5
Used reference points at the transport layer
p. 13
5.3
Peering-based business trunking
p. 13
5.3.1
General
p. 13
5.3.2
Used functional entities at the service layer
p. 14
5.3.3
Used reference points at the service layer
p. 15
5.3.4
Used functional entities at the transport layer
p. 15
5.3.5
Used reference points at the transport layer
p. 15
5.4
Session-level virtual leased line
p. 16
5.4.1
General
p. 16
5.4.2
Used functional entities at the service layer
p. 16
5.4.3
Used reference points at the service layer
p. 16
5.4.4
Used functional entities at the transport layer
p. 16
5.4.5
Used reference points at the transport layer
p. 16
5.5
Support for roaming NGCN user
p. 17
5.5.1
General
p. 17
5.5.2
Used functional entities at the service layer
p. 17
5.5.3
Used reference points at the service layer
p. 17
5.5.4
Used functional entities at the transport layer
p. 17
5.5.5
Used reference points at the transport layer
p. 17
5.6
Support for roaming NGN user
p. 18
6
Procedures
p. 18
6.1
Subscription based business trunking
p. 18
6.1.1
Introduction
p. 18
6.1.2
Identification
p. 18
6.1.3
Registration
p. 18
6.1.4
Requests originating from an NGCN user entering NGN
p. 19
6.1.4.1
General
p. 19
6.1.4.2
NGCN not considered as privileged sender and not trusted by NGN
p. 20
6.1.4.3
NGCN considered as privileged sender and trusted by NGN
p. 21
6.1.4.4
NGCN considered as privileged sender and not trusted by NGN
p. 21
6.1.5
Requests terminating to an NGCN user leaving NGN
p. 22
6.1.5.1
General
p. 22
6.1.5.2
NGCN not considered as privileged sender and not trusted by NGN
p. 23
6.1.5.3
NGCN considered as privileged sender and trusted by NGN
p. 23
6.1.5.4
NGCN considered as privileged sender and not trusted by NGN
p. 23
6.1.6
Business trunking applications
p. 24
6.1.6.1
General
p. 24
6.1.6.2
Routeing capabilities
p. 24
6.1.6.2.1
Overview
p. 24
6.1.6.2.2
Break-in
p. 24
6.1.6.2.3
Break-out
p. 24
6.1.6.2.4
Bulk rerouting
p. 24
6.1.6.3
Communication admission control
p. 25
6.1.6.4
Anonymous communication rejection
p. 25
6.1.6.5
Communication barring
p. 25
6.1.7
Signalling transparency
p. 25
6.1.8
Involvement of functions on the media path
p. 25
6.1.8.1
General
p. 25
6.1.8.2
DTMF
p. 25
6.1.8.3
Codecs
p. 26
6.1.9
Handling of the P-Access-Network-Info header field
p. 26
6.1.10
Emergency calls
p. 26
6.1.11
Charging
p. 27
6.1.12
Advice of Charge
p. 27
6.1.13
NAT traversal
p. 27
6.1.14
Private network traffic
p. 27
6.1.15
P-CSCF and IP-CAN redundancy
p. 28
6.2
Peering-based business trunking
p. 28
6.2.1
Introduction
p. 28
6.2.2
Identification
p. 28
6.2.3
Registration
p. 28
6.2.4
Requests originating from an NGCN user entering NGN
p. 29
6.2.4.1
General
p. 29
6.2.4.2
NGCN not trusted by NGN
p. 29
6.2.4.3
NGCN trusted by NGN
p. 29
6.2.5
Requests terminating to an NGCN user leaving NGN
p. 30
6.2.5.1
General
p. 30
6.2.5.2
NGCN not trusted by NGN
p. 30
6.2.5.3
NGCN trusted by NGN
p. 30
6.2.6
Business trunking application
p. 30
6.2.6.1
General
p. 30
6.2.6.2
Routeing related business trunking applications
p. 31
6.2.6.2.0
General
p. 31
6.2.6.2.1
Originating requests
p. 31
6.2.6.2.2
Terminating responses to an originating request
p. 31
6.2.6.2.3
Terminating requests
p. 31
6.2.6.3
Communication admission control
p. 31
6.2.6.4
Anonymous communication rejection
p. 32
6.2.6.5
Communication barring
p. 32
6.2.7
Signalling transparency
p. 32
6.2.8
Involvement of functions on the media path
p. 32
6.2.9
Handling of the P-Access-Network-Info header field
p. 32
6.2.10
Emergency calls
p. 32
6.2.11
Charging
p. 33
6.2.12
Advice of Charge
p. 33
6.2.13
NAT traversal
p. 33
6.2.14
Private network traffic
p. 33
6.3
Session-level virtual leased line between NGCN sites
p. 33
6.3.1
Introduction
p. 33
6.3.2
Identification
p. 33
6.3.3
Registration
p. 33
6.3.4
Session originating from a NGCN user entering NGN
p. 33
6.3.4.1
General
p. 33
6.3.4.2
NGCN not trusted by NGN
p. 34
6.3.4.3
NGCN trusted by NGN
p. 34
6.3.5
Session terminating to an NGCN user leaving NGN
p. 34
6.3.5.1
General
p. 34
6.3.5.2
NGCN not trusted by NGN
p. 34
6.3.5.3
NGCN trusted by NGN
p. 34
6.3.6
Business trunking applications
p. 34
6.3.7
Signalling transparency
p. 34
6.3.8
Involvement of functions on the media path
p. 34
6.3.9
Handing of the P-Access-Network-Info header
p. 34
6.3.10
Emergency calls
p. 34
6.3.11
Charging
p. 35
6.3.12
Advice of Charge
p. 35
6.3.13
NAT traversal
p. 35
6.3.14
Private network traffic
p. 35
6.4
NGCN user roaming into NGN public network
p. 35
6.4.1
Introduction
p. 35
6.4.2
Identification
p. 35
6.4.3
Registration
p. 35
6.4.4
Requests originating from an NGCN user roaming in NGN
p. 35
6.4.5
Requests terminating on an NGCN user roaming in NGN
p. 36
6.4.6
Business trunking applications
p. 36
6.4.7
Signalling transparency
p. 36
6.4.8
Involvement of functions on the media path
p. 36
6.4.9
Handing of the P-Access-Network-Info header
p. 36
6.4.10
Emergency calls
p. 36
6.4.11
Charging
p. 36
6.4.12
Advice of Charge
p. 36
6.4.13
NAT traversal
p. 36
6.4.14
Private network traffic
p. 36
7
Use of transport functions
p. 37
7.1
Use of transport control sublayer
p. 37
7.1.1
Use of NASS
p. 37
7.1.2
Use of RACS
p. 37
7.1.3
Use of PCC
p. 37
7.2
Use of transport processing functions
p. 37
8
Security
p. 37
9
Management
p. 38