1 Scope
2 References
3 Definitions
4 Abbreviations and acronyms
5 Introduction
5.1 Description of information flow modelling techniques
5.1.1 Functional models
5.1.2 End-to-end subsystem relationship model
5.1.3 Information flow
sequence type
5.2 Information flow template
6 Mobility management
6.1 Authentication management
6.1.1 UIM holder authorization
6.1.2 User
authentication
6.2 Location management
6.2.1 Subscriber data
management
6.2.2 Identity
retrieval user
6.2.3 Registration
management
6.2.4 Location data fault recovery
7 Basic call and bearer control
7.1 Mobile outgoing call
7.1.1 Initial mobile
outgoing call
7.1.2 Additional mobile
outgoing call
7.2 Terminal paging
7.3 Network call routing
7.4 Mobile incoming call
7.4.1 Initial mobile
incoming call
7.4.2 Additional mobile
incoming call
7.5 Mobile call release
7.5.1 Normal
release: mobile initiated
7.5.2 Normal release:
network initiated
7.6 Emergency calls
7.6.1 Emergency call
origination
7.6.2 Emergency call
release: network initiated
7.6.3 Emergency call
release: mobile initiated
7.7 Priority calls
8 Multimedia call and bearer control
8.1 Teleservice change
8.2 Add media during a call (mobile user originating)
8.3 Drop media from an active call
8.4 Point-to-multipoint call
8.4.1 Party addition
(mobile-to-mobile)
8.4.2 Party dropping
8.5 Access to Internet services
8.5.1 Packet
data service session establishment
8.5.2 Roaming during an
established packet data session
8.5.3 Packet data
service session termination
9 Virtual Home Environment
9.1 "Direct Home Command"
9.1.1 High level
"Direct Home Command" service procedure
9.1.2 "Direct Home
Command" Call related services
9.1.3 "Direct Home
Command" LMF invoked services
9.1.4 "Direct
Home Command" AMF invoked services
9.2 "Relay Service Control"
9.2.1 "Relay
Service Control" service procedure
10 Messaging
services applications
10.1 Short message service (SMS)
10.1.1 SMS notification transfer
10.1.2 Mobile originated
short message
10.1.3 Mobile terminated
short message
10.2 Teleservice message broadcast (TMB)
10.3 Message waiting notification (MWN)
10.3.1 MWN information
flows
11 Supplementary
service procedures
11.1 Get password
11.2 Register password
11.3 Register SS
11.4 Erase SS
11.5 Activate SS
11.6 Deactivate SS
11.7 Interrogate SS
11.8 Invoke SS
11.9 Process unstructured SS request
11.10 Unstructured SS request
11.11 Unstructured SS notify
11.12 SS invocation notification
12 Over-the-air services
12.1 Over-the-air service provisioning (OTASP)
12.2 Overview
12.3 Description
12.4 Over-the-air service provisioning information flows
12.4.1 Invocation of
activation with desired service provider
12.4.2 A-key generation
12.4.3 Re-authentication
for voice and signalling ciphering
12.4.4 Transfer of OTASP
data
13 Definitions of
information elements
Annex A List of common procedure modules used in this
Recommendation
Appendix I Q.1721 Coverage of Table 1/Q.1701,
Capability Set 1 Requirements
Appendix II A-key generation
II.1 Introduction
II.2 A-key Generation using the Diffie-Hellman Algorithm
Appendix III Bibliography