1     Scope           
 2     Normative references           
 3     Definitions  
 4     Abbreviations and acronyms              
 5     Introduction              
        5.1     Conventions   
 6     Communication between gateways                
        6.1     Internet protocol – TCP or UDP              
        6.2     Gateway facsimile data transfer functions         
 7     IFT protocol definition and procedures          
        7.1     General             
        7.2     IFP packet format         
        7.3     TYPE definitions             
        7.4     The IFP DATA element               
        7.5     Limitation of ITU-T V.21 frame packet size         
 8     IFP message flow for facsimile modulations up to ITU-T V.17               
        8.1     Data rate management method 1         
        8.2     Data rate management method 2         
 9     IFT over UDP transport         
        9.1     IFT over UDP transport using UDPTL protocol: IFT/UDPTL/UDP                
        9.2     IFT over UDP transport using RTP protocol: IFT/RTP/UDP           
10     Message flow for ITU-T V.8 signals and Annex F of ITU-T V.34 facsimile         
       10.1     ITU-T V.8 negotiation 
       10.2     ITU-T V.34 data rate management       
       10.3     Facsimile mode            
       10.4     Compatibility with equipment conforming to prior versions of
this Recommendation     
11     Security considerations       
Annex A – ASN.1 notation     
        A.1     ITU-T T.38 (2002) ASN.1 notation           
        A.2     ITU-T T.38 (1998) ASN.1 notation           
Annex B – ITU-T H.323 call establishment procedures     
        B.1     Introduction   
        B.2     Communication between facsimile terminal and gateway         
        B.3     Communication between gateways     
Annex C – The optional forward error correction scheme for UDPTL     
        C.1     Overview of the optional forward error correction mechanism               
        C.2     Parity encode/decode scheme operation and characteristics   
Annex D – SIP/SDP call establishment procedures     
        D.1     Introduction   
        D.2     Communication between gateways    
Annex E – ITU-T H.248.1 call establishment procedures     
        E.1     Introduction    
        E.2     Communication between gateways     
Annex F – Interworking procedures: ITU-T T.38 and ITU-T V.150.1 in the same
gateway     
        F.1     Introduction    
        F.2     SSE reason identifier codes for ITU-T T.38 transition      
        F.3     Mode override from ITU-T V.34 Group 3 facsimile to standard
Group 3 facsimile             
        F.4     External signalling         
Annex G – ITU-T H.245 capability definition for ITU-T T.38 over RTP     
Annex H – Signalled and provisioned ITU-T T.38 protocol parameters     
        H.1     Introduction   
        H.2     Transport conditional ITU-T T.38 parameters   
        H.3     Guidelines for signalling ITU-T T.38 protocol parameters            
        H.4     Legacy Interpretation of SDP Parameters          
Appendix I – Session examples     
        I.1                   Session examples            
        I.2                   IAF device           
Appendix II – Examples of call establishment procedures described in Annex B of
ITU‑T T.38     
       II.1     Sequence examples of call establishment procedures  
       II.2     Protocol data used in call establishment procedures     
Appendix III – ITU-T H.248 call establishment procedure examples for
facsimile-capable media gateways     
      III.1     Introduction    
      III.2     Examples of call set-up               
Appendix IV – ITU-T
V.34 session examples     
       IV.1     ITU-T V.34 session examples  
Appendix V –
ITU-T T.38 implementation guidelines     
        V.1     General issue 
        V.2     IAF issues        
        V.3     Call set-up issues          
        V.4     Others              
      Page
Appendix VI – Security considerations from a historical perspective     
       VI.1     Historical origin and use of Recommendation ITU-T T.38            
       VI.2     Application vs network/transport level security             
Bibliography