CONTENTS

 

 1     Scope 
 2     References 
 3     Definitions  
 4     Abbreviations   
 5     Conventions     
 6     Overview   
        6.1     System model for a conference node          
        6.2     Conference establishment and termination   
        6.3     The conference roster        
        6.4     The application roster        
        6.5     The Application Registry    
        6.6     Conference conductorship 
        6.7     Miscellaneous functions      
        6.8     Scalable conferences         
        6.9     Summary of GCC abstract services
 7     GCC service definition     
        7.1     Conference establishment and termination   
        7.2     The conference roster        
        7.3     The application roster        
        7.4     The Application Registry    
        7.5     Conference conductorship 
        7.6     Miscellaneous functions      
 8     GCC Protocol Specification         
        8.1     General operation  
        8.2     Conference establishment and termination   
        8.3     The conference and application rosters       
        8.4     The Application Registry    
        8.5     Conference conductorship 
        8.6     Miscellaneous functions      
        8.7     GCCPDU definitions         
 9     Use of the Multipoint Communication Service       
        9.1     MCS services        
        9.2     Channel allocation  
        9.3     Token allocation    
        9.4     Use of MCS data transmission services      
        9.5     Encoding of PDUs in MCS primitives         
        9.6     Format of User Data parameter of MCS-Connect-Provider           
        9.7     Interpretation of the MCS Domain Selector
Annex A – Static channel and token ID assignments     
        A.1     Static channel ID assignments        
        A.2     Static token ID assignments           
Annex B – Object Identifier assignments     
Annex C – Network Address Parameter – Description and use     
Appendix I – Relationship of T.120 to H.243 in H.320 conferences     
        I.1        Introduction         
        I.2        Conference selection and Password protection     
        I.3          Alternative Node ID