1 Scope and field of application
2
Normative references
2.1 Identical Recommendations | International Standards
2.2 Paired Recommendations | International Standards equivalent in
technical content
2.3 Additional references
3
Definitions
3.1 Reference Model definitions
3.1.1 Basic Reference Model definitions
3.1.2 Security architecture definitions
3.1.3 Naming and addressing definitions
3.2 Service conventions definitions
3.3 Presentation service definitions
3.4 Application Layer Structure definitions
3.5 ACSE service definitions
3.6 Association Control protocol specification definitions
4
Abbreviations
4.1 Data units
4.2 Types of application-protocol-data-units
4.3 Other abbreviations
5
Conventions
6
Overview of the protocol
6.1 Service provision
6.2 Functional units
6.3 Use of the presentation-service
6.4 Relationship to the session-service
6.5 Model
7
Elements of procedure
7.1 Association establishment
7.1.1 Purpose
7.1.2 APDUs used
7.1.3 Association establishment procedure
7.1.4 Use of the AARQ APDU fields
7.1.5 Use of the AARE APDU fields
7.1.6 Collisions and interactions
7.2 Normal release of an association
7.2.1 Purpose
7.2.2 APDUs used
7.2.3 Normal release procedure
7.2.4 Use of the RLRQ APDU fields
7.2.5 Use
of the RLRE APDU fields
7.2.6 Collisions and disruptions
7.3 Abnormal release of an association
7.3.1 Purpose
7.3.2 APDUs used
7.3.3 Abnormal release procedure
7.3.4 Use of the ABRT APDU fields
7.3.5 Collisions and interactions
7.4 Rules for extensibility
8
Mapping to the presentation-service
8.1 Association establishment (normal mode)
8.1.1 Directly mapped parameters
8.1.2 Use of other P-CONNECT request and
indication parameters
8.1.3 Use of other P-CONNECT response and
confirm parameters
8.2 Normal release of
an association (normal mode)
8.2.1 Use of P-RELEASE request and indication
parameters
8.2.2 Use of P-RELEASE response and confirm
parameters
8.3 Abnormal release of an association (normal mode)
8.3.1 Use of P-U-ABORT request and indication
parameters
8.3.2 Use of P-P-ABORT indication parameter
8.4 Association establishment (X.410-1984 mode)
8.4.1 Directly mapped parameters
8.4.2 Use of other P-CONNECT request and
indication parameters
8.4.3 Use of other P-CONNECT response and
confirm parameters
8.5 Normal release of an association (X.410-1984 mode)
8.6 Abnormal release of an association (X.410-1984 mode)
8.6.1 Use of P-U-ABORT request and indication
parameters
8.6.2 Use of P-P-ABORT indication parameter
9
Structure and encoding of ACSE APDUs
9.1 Abstract syntax of the ACSE APDUs
9.2 Encoding rules used to reference the transfer syntax
10 Conformance
10.1 Statement requirements
10.2 Static requirements
10.2.1 Normal mode
10.2.2 X.410-1984 mode
10.3 Dynamic requirements
10.3.1 Normal mode
10.3.2 X.410-1984 mode
11 Precedence
12 Registration requirements
12.1 Application titles
12.2 Application context
12.3 Authentication-mechanism
Annex A – ACPM state table
A.1 General
A.2 Conventions
A.3 Actions to be taken by the ACPM
A.3.1 Invalid intersections
A.3.2 Valid intersections
A.4 Relationship to Presentation and other ASEs
Annex B –
Authentication-mechanism using password
B.0 Introduction
B.1 Assigned name
B.2 Authentication-value ASN.1 datatype
B.3 Processing specification
B.3.1 Requesting authentication
B.3.2 Performing authentication