1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
5.1 Conventions used in signalling flows
5.2 DTLS endpoint notations
6 Use case descriptions
6.1 Use cases related to DTLS transport modes
6.2 Bearer connection network use cases with ITU-T H.248 IP-IP
gateways
6.3 Bearer connection network use cases with DTLS transport mode
change
6.4 Bearer connection network use cases with multiparty services
7 Models
7.1 Network model from ITU-T H.248 entity point of view
7.2 Bearer connection model
8 Basic session control package (for DTLS)
9 DTLS-specific stream endpoint interlinkage procedures
10 Capability negotiation package (for DTLS)
11 DTLS extended capabilities package
11.1 Properties
11.2 Events
11.3 Signals
11.4 Statistics
11.5 Error codes
11.6 Procedures
12 Session maintenance package (for DTLS)
13 Traffic volume metrics package (for DTLS)
14 Package-less DTLS control
14.1 Related to DTLS authentication
Annex A – State modelling for DTLS bearer connection endpoints
Annex B – DTLS protocol layer: Data model
Appendix I – Sample use cases of DTLS bearer encryption
I.1 Use cases for "application protocol agnostic
DTLS handling"
I.2 Use cases for "DTLS-based transport security
for facsimile packet relay service ITU‑T T.38"
I.3 Use cases for "WebRTC data traffic"
I.4 Use cases for "DTLS-based key exchange for
SRTP"
Appendix II – Signalling flows for basic DTLS session establishment and
release
II.1 Overview
II.2 Conventions
II.3 Establishment of DTLS security sessions
II.4 Release of DTLS security sessions
Bibliography