Tech-
invite
3GPP
space
IETF
RFCs
SIP
Quick
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
TS 24.529
TISPAN; PSTN/ISDN simulation services:
Explicit Communication Transfer (ECT);
Protocol specification
3GPP‑Page
ETSI‑search
ToC
↓
V8.2.0 (PDF)
2012/12 27 p.
Rapporteur:
Mr. Leis, Peter
full Table of Contents for
TS 24.529
Word version: 8.2.0
1
Scope
Word‑p. 6
2
References
Word‑p. 6
2.1
Normative references
Word‑p. 6
2.2
Informative references
Word‑p. 7
3
Definitions and abbreviations
Word‑p. 7
3.1
Definitions
Word‑p. 7
3.2
Abbreviations
Word‑p. 7
4
Explicit Communication Transfer (ECT)
Word‑p. 8
4.1
Introduction
Word‑p. 8
4.2
Description
Word‑p. 8
4.2.1
General description
Word‑p. 8
4.3
Operational requirements
Word‑p. 8
4.3.1
Provision/withdrawal
Word‑p. 8
4.3.2
Requirements on the transferor network side
Word‑p. 9
4.3.3
Requirements on the transferee network side
Word‑p. 9
4.3.4
Requirements on the transfer target network side
Word‑p. 9
4.4
Coding requirements
Word‑p. 9
4.5
Signalling requirements
Word‑p. 9
4.5.1
Activation/deactivation
Word‑p. 9
4.5.1A
Registration/erasure
Word‑p. 9
4.5.1B
Interrogation
Word‑p. 9
4.5.2
Invocation and operation
Word‑p. 9
4.5.2.1
Actions at the transferor UE
Word‑p. 9
4.5.2.2
Actions at the transferor P-CSCF
Word‑p. 10
4.5.2.3
Actions at the transferor S-CSCF
Word‑p. 10
4.5.2.4
Actions at the transferor AS
Word‑p. 10
4.5.2.4.1
Invocation of ECT service
Word‑p. 10
4.5.2.4.2
Subsequent procedures
Word‑p. 11
4.5.2.5
Actions at the transferee UE
Word‑p. 12
4.5.2.6
Actions at the transferee S-CSCF
Word‑p. 12
4.5.2.7
Actions at the transferee AS
Word‑p. 12
4.5.2.7.0
Prerequisite for invocation of the ECT service
Word‑p. 12
4.5.2.7.1
Determine whether the ECT applies
Word‑p. 12
4.5.2.7.2
Actions of ECT when invoked with a transfer request
Word‑p. 12
4.5.2.7.3
Actions of ECT when invoked again by the transferred communication
Word‑p. 12
4.5.2.8
Void
4.5.2.9
Actions at the incoming I-CSCF
Word‑p. 13
4.5.2.10
Actions at the outgoing IBCF
Word‑p. 13
4.5.2.11
Actions at the incoming IBCF
Word‑p. 13
4.5.2.12
Actions at the BGCF
Word‑p. 13
4.5.2.13
Actions at the MGCF
Word‑p. 13
4.5.2.14
Actions at the transfer target's S-CSCF
Word‑p. 13
4.5.2.15
Actions at the transfer target's AS
Word‑p. 13
4.5.2.16
Actions at the transfer target's P-CSCF
Word‑p. 13
4.5.2.17
Actions at the transfer target's UE
Word‑p. 13
4.6
Interaction with other services
Word‑p. 14
4.6.1
Communication HOLD (HOLD)
Word‑p. 14
4.6.2
Terminating Identification Presentation (TIP)
Word‑p. 14
4.6.3
Terminating Identification Restriction (TIR)
Word‑p. 14
4.6.4
Originating Identification Presentation (OIP)
Word‑p. 14
4.6.5
Originating Identification Restriction (OIR)
Word‑p. 14
4.6.6
CONFerence Calling (CONF)
Word‑p. 14
4.6.7
Communication DIVersion Services (CDIV)
Word‑p. 14
4.6.8
Malicious Communication IDentification (MCID)
Word‑p. 14
4.6.9
Anonymous Communication Rejection and Communication Barring (ACR/CB)
Word‑p. 15
4.6.10
Explicit Communication Transfer (ECT)
Word‑p. 15
4.6.10.1
Determine whether a previously transferred communication is transferred again
Word‑p. 15
4.6.10.2
Handling of transfer requests
Word‑p. 15
4.6.10.3
Actions when this ECT instance is invoked again by the transferred communication
Word‑p. 15
4.7
Interworking with other networks
Word‑p. 15
4.7.1
Interworking with PSTN/ISDN
Word‑p. 15
4.7.2
Interaction with PSTN/ISDN Emulation
Word‑p. 16
4.7.3
Interworking with external IP Network
Word‑p. 16
4.8
Parameter values (timers)
Word‑p. 16
4.9
Service configuration
Word‑p. 16
A
Signalling flows
Word‑p. 17
A.1
Blind transfer
Word‑p. 17
A.2
Consultative transfer
Word‑p. 19
B
Example of filter criteria
Word‑p. 21
B.1
Example of filter criteria for ECT
Word‑p. 21
C
Example charging model
Word‑p. 22
C.1
Example of B REFER's A to C
Word‑p. 22
C.2
Example of A REFER's B to C
Word‑p. 23
D
Bibliography
Word‑p. 24
$
Change history
Word‑p. 25