tech-invite   World Map     

3GPP     Specs     Glossaries     Architecture     IMS     UICC       IETF     RFCs     Groups     SIP     ABNFs       Search

Top        in Index        Prev        Next

TS 24.525 (CT1)
Business Trunking – Architecture and Functional description

|   ToC   |   3GPP‑Page   |   ETSI‑search   |   Help   |

(P) V14.0.0    2017/03    51 p.
(P) V13.1.0    2016/06    51 p.
(P) V12.2.0    2016/06    51 p.


Rapporteur:  Mr. Kreipl, Michael
See also:  –


The present document provides architecture and functional requirements for business trunking for the Next Generation Network (NGN).

The present document also specifies the protocol requirements for the Next Generation Corporate Networks (NGCNs) to attach to the NGN (in particular the IM CN subsystem) and also any protocol requirements relation to application servers provided in support of business trunking.

Business trunking is a set of NGN capabilities that may be applied to communications between NGCNs using the NGN as a transit.


 

Here        Top

 

 

1   Scope   PDF-p. 8
2   References
3   Definitions, symbols and abbreviations   PDF-p. 10
4   Overview
5   Functional architecture   PDF-p. 12
6   Procedures
6.1   Subscription based business trunking
6.1.1   Introduction
6.1.2   Identification
6.1.3   Registration      Up
6.1.4   Requests originating from an NGCN user entering NGN   PDF-p. 19
6.1.5   Requests terminating to an NGCN user leaving NGN   PDF-p. 22
6.1.6   Business trunking applications   PDF-p. 24
6.1.7   Signalling transparency
6.1.8   Involvement of functions on the media path
6.1.9   Handling of the P-Access-Network-Info header field
6.1.10   Emergency calls
6.1.11   Charging   PDF-p. 27
6.1.12   Advice of Charge
6.1.13   NAT traversal      Up
6.1.14   Private network traffic
6.1.15   P-CSCF and IP-CAN redundancy   PDF-p. 28
6.2   Peering-based business trunking
6.3   Session-level virtual leased line between NGCN sites
6.4   NGCN user roaming into NGN public network
7   Use of transport functions   PDF-p. 37
8   Security
9   Management   PDF-p. 38
A   Example signalling flows of business trunking and roaming arrangements   PDF-p. 39
B   Service Level Agreement (SLA) considerations   PDF-p. 47
C   Void
D   Change history   PDF-p. 49

Up        Top