Tech-invite   3GPPspecs   Glossaries   IETFRFCs   Groups   SIP   ABNFs   Ti+   Search in Tech-invite

Top   in Index   Prev   Next

TR 23.782 (SA6)
Study on Mission Critical Communication Interworking
between LTE and non‑LTE Systems

3GPP‑Page   full‑ToC    
use "3GPP‑Page" to get the Word version
for a better overview, the Table of Contents (ToC) is reproduced
V15.0.0 (Wzip)  2017/06  101 p.

Rapporteur:  Mr. Monnes, Peter
See also:

The objective of this technical report is to study and identify solutions suitable for interworking between LTE mission critical systems and non-LTE mission critical systems that satisfy the MCPTT requirements in TS 22.179 and the MCData requirements in 22.282 (SDS only).

The present document refers to an IWF entity as an editorial convenience. The structure and functionality of the IWF is out of scope of the present document. The definition of IWF-1 and interactions with IWF-1 by the MCPTT system and the definition of IWF-2 and interactions with IWF-2 by the MCData (SDS only) are in scope of the present document.

full Table of Contents for  TR 23.782  Word version:   15.0.0


Here   Top


1  ScopeWord-p. 10
2  References
3  Definitions and abbreviationsWord-p. 11
4  Interworking scenariosWord-p. 12
5  Key issuesWord-p. 18
5.1  Identity
5.2  Homing and affiliation
5.3  Session setup and termination
5.4  Media planeWord-p. 22
5.5  EncryptionWord-p. 24
5.6  Group managementWord-p. 27
5.7  Prioritisation and pre-emption
5.8  Floor controlWord-p. 30
5.9  MCData SDS
6  SolutionsWord-p. 33
6.1  General solutions
6.2  IdentityWord-p. 35
6.3  Homing and affiliation
6.4  Session setup and termination
6.4.1  Solution #3-1: Private call with parameter negotiation solution
6.4.2  Solution #3-2: Private call initiated by LMR user to MCPTT userWord-p. 43
6.4.3  Solution #3-3: Group call on a temporary group
6.4.4  Solution #3-4: Group call on an interworking group
6.4.5  Solution #3-5: Late entry in interworking group call
6.4.6  Solution #3-6: Group call over linked group
6.5  Media plane
6.6  Encryption
6.7  Group management
6.8  Prioritization and pre-emption
6.9  Floor control
6.10  MCData SDSWord-p. 86
7  Overall evaluationUp
8  ConclusionsWord-p. 97
A  Change historyWord-p. 101

Up   Top