Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 22.989  Word version:  19.4.0

Top   Top   Up   Prev   Next
0…   4…   6…   6.3…   6.4…   6.5…   6.8…   6.13…   6.16…   7…   8…   10…

 

8  Business communication applications related use casesp. 147

9  Critical support applications related use casesp. 152

9.1  Overviewp. 152

9.2  Assured voice communication (AVC)p. 152

9.3  Functional identities and role managementp. 157

9.3.1  Introductionp. 157

9.3.2  General pre-conditionsp. 158

9.3.3  Use case: Registration to a functional identityp. 161

9.3.4  Use case: Deregistration of a functional identityp. 164

9.3.5  Use case: User log-in to the FRMCS Systemp. 165

9.3.6  Use case: User log-out from FRMCS Systemp. 166

9.3.7  Use case: Presentation of identitiesp. 167

9.3.8  Use case: Interrogation of identities within a certain contextp. 169

9.4  Location services related use casesp. 175

9.5  FRMCS User communication handling related use casesp. 178

9.5.1  Introductionp. 178

9.5.2  Use Case: Inviting-FRMCS User(s) to a voice communicationp. 179

9.5.3  Use Case: FRMCS User receiving an invitation to a voice communicationp. 180

9.5.4  Use case: FRMCS User accepting an invitation to a voice communicationp. 181

9.5.5  Use case: FRMCS User rejecting an invitation to a voice communicationp. 182

9.5.6  Use case: FRMCS User ignoring an invitation to a voice communicationp. 183

9.5.7  Service interworking with GSM-Rp. 183

9.6Void

9.7  Multiuser talker control related use casesp. 186

9.7.1  General Description and potential requirementsp. 186

9.7.2  Use case: Set the number of simultaneous talkersp. 187

9.7.3  Use case: Set initial talker permissions and prioritiesp. 187

9.7.4  Use case: Request permission to talkp. 189

9.7.5  Use case: Grant permission to talkp. 190

9.7.6  Use case: Revoke permission to talkp. 193

9.7.7  Use case: Service interworking and service continuation with GSM-Rp. 194

9.8  Authorisation of communicationp. 194

9.9  Authorisation of applicationp. 196

9.10  Sharing FRMCS Equipment by FRMCS Usersp. 205

9.11  FRMCS naming authorityp. 206

9.12  Wayside-Centric Automatic Train Controlp. 207

9.13  Autonomous Train Control and Operationp. 209

9.14  Virtual Couplingp. 211

9.15  Composite-based train operationp. 214

9.16  Arbitration related use casesp. 215

9.17  Data communication to exchange key information for train safety application use casesp. 220


Up   Top   ToC