CONTENTS

 1     Scope
 2     References
 3     Definitions
 4     Abbreviations and acronyms
 5     Introduction
        5.1     Description of information flow modelling techniques
                  5.1.1     Functional models
                  5.1.2     End-to-end subsystem relationship model
                  5.1.3     Information flow sequence type
        5.2     Information flow template
 6     Mobility management
        6.1     Authentication management
                  6.1.1     UIM holder authorization
                  6.1.2     User authentication
        6.2     Location management
                  6.2.1     Subscriber data management
                  6.2.2     Identity retrieval – user
                  6.2.3     Registration management
                  6.2.4     Location data fault recovery
 7     Basic call and bearer control
        7.1     Mobile outgoing call
                  7.1.1     Initial mobile outgoing call
                  7.1.2     Additional mobile outgoing call
        7.2     Terminal paging
        7.3     Network call routing
        7.4     Mobile incoming call
                  7.4.1     Initial mobile incoming call
                  7.4.2     Additional mobile incoming call
        7.5     Mobile call release
                  7.5.1     Normal release: mobile initiated
                  7.5.2     Normal release: network initiated
        7.6     Emergency calls
                  7.6.1     Emergency call origination
                  7.6.2     Emergency call release: network initiated
                  7.6.3     Emergency call release: mobile initiated
        7.7     Priority calls
 8     Multimedia call and bearer control
        8.1     Teleservice change
        8.2     Add media during a call (mobile user originating)
        8.3     Drop media from an active call
        8.4     Point-to-multipoint call
                  8.4.1     Party addition (mobile-to-mobile)
                  8.4.2     Party dropping
        8.5     Access to Internet services
                  8.5.1     Packet data service session establishment
                  8.5.2     Roaming during an established packet data session
                  8.5.3     Packet data service session termination
 9     Virtual Home Environment
        9.1     "Direct Home Command"
                  9.1.1     High level "Direct Home Command" service procedure
                  9.1.2     "Direct Home Command" – Call related services
                  9.1.3     "Direct Home Command" – LMF invoked services
                  9.1.4     "Direct Home Command" – AMF invoked services
        9.2     "Relay Service Control"
                  9.2.1     "Relay Service Control" service procedure
10     Messaging services applications
       10.1     Short message service (SMS)
                 10.1.1     SMS notification transfer
                 10.1.2     Mobile originated short message
                 10.1.3     Mobile terminated short message
       10.2     Teleservice message broadcast (TMB)
       10.3     Message waiting notification (MWN)
                 10.3.1     MWN information flows
11     Supplementary service procedures
       11.1     Get password
       11.2     Register password
       11.3     Register SS
       11.4     Erase SS
       11.5     Activate SS
       11.6     Deactivate SS
       11.7     Interrogate SS
       11.8     Invoke SS
       11.9     Process unstructured SS request
      11.10     Unstructured SS request
      11.11     Unstructured SS notify
      11.12     SS invocation notification
12     Over-the-air services
       12.1     Over-the-air service provisioning (OTASP)
       12.2     Overview
       12.3     Description
       12.4     Over-the-air service provisioning information flows
                 12.4.1     Invocation of activation with desired service provider
                 12.4.2     A-key generation
                 12.4.3     Re-authentication for voice and signalling ciphering
                 12.4.4     Transfer of OTASP data
13     Definitions of information elements
Annex A – List of common procedure modules used in this Recommendation
Appendix I – Q.1721 Coverage of Table 1/Q.1701, Capability Set 1 Requirements
Appendix II – A-key generation
       II.1     Introduction
       II.2     A-key Generation using the Diffie-Hellman Algorithm
Appendix III – Bibliography