Вы находитесь на странице: 1из 41

OWG000002 BICC Protocol and Application

ISSUE 1.0

Wireless Curriculum Development Section

Objectives

Upon completion of this course,you will be able to:

BICC application in R4 network BICC protocol structure and

message introduction


BICC signaling flow

2
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Course Contents

OVERVIEW BICC protocol introduction Signal flow introduction Examples

3
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

The Architecture of 3G R4
UTRAN

Iu MGW MGW Nb A Mc Nc MSC server CAP Applications & Services Mc GMSC server

PSTN/ Legacy/External

Iu
GERAN

CAP

D HLR

Signalling Interface Signalling and Data Transfer Interface

BICC apply in the Nc interface


4
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Basic concept
Serving node:
SERVING NODE (SN)

Call Control Signalling (BICC protocol or other signalling system)

Incoming procedures

Call Service Function (CSF)

Outgoing procedures

Call Control Signalling (BICC protocol or other signalling system)

SCOPE OF THIS RECOMMENDATION

Call Bearer Control (CBC) signalling

Bearer Control Signalling

BIWF BCF

Bearer Control Signalling

Bearer

5
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Basic concept
SN types

ISN : provides the interface with non-BICC networks and terminal equipment

GSN : provides gateway functionality between two network domains

TSN : provides transit functionality between ISNs and GSNs

6
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Basic concept
Separation between call and bearer
Ser ing ode (SN) Call Control Signaling ( ICC rotocol) Call Control Signaling ( ICC rotocol)

Call

r ic F (CSF)

cti

ain scope of t e BICC specification

earer Control Signaling

ar r Control F nction ( CF)

Bearer Control Signaling

Bearer

7
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Course Contents

OVERVIEW BICC protocol introduction Signal flow introduction Examples

8
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Network model of BICC

BAT ASE ISUP CC

APM ASE BICC ASE

BICC signaling

BICC ASE

APM ASE

BAT ASE CC

BAT ASE

APM ASE

BICC ASE

BC

Bearer control signaling BC Bearer streams Bear BC

Bear

Bear

Interface Serving Node (ISN)

Transit Serving Node (TSN)

9
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

BICC protocol Model

Signalling Transport Layer : MTP3 for TDM Network SCTP over IP for IP network SSLOP for TAM network
generic inter ace

BICC rocedures
generic inter ace

Signalling Transport onverter


transport speci ic inter ace

Mapping Function
bearer speci ic inter ace

STC : Signalling Transport Converters. Mapping function according to underlying layers

Signalling Transport Layers


call control protocol

earer ontrol
bearer control protocol

10
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Structure of the Protocol Stack


Nc (G)MSC Server BICC MSC Server BICC (G)MSC Server Nc MSC Server

BICC M3UA

BICC M3UA SCTP IP MAC L1

MTP3

MTP3 SCTP IP MAC

MTP2

MTP2

MTP1

MTP1

L1

a) TDM based Nc (G)MSC Server MSC Server

b) M3UA based Nc (G)MSC Server BICC MTP3B MSC Server BICC MTP3B STC SAAL AAL5 ATM PL

BICC SCTP IP MAC L1

BICC SCTP IP MAC

STC SAAL AAL5 ATM

L1

PL

c) SCTP/IP based

d) ATM based

11
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

BICC Message Structure


CIC Message type code Mandatory ixed part Mandatory variable part Optional part

Call Instance Code (CIC) is a logic number associated with the inter-o ice calling relation

12
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Format of BICC messages


 

CIC is used to identify signalling relation between peer BICC entities and associate all the PDUs to that relation. message type code the mandatory fixed part the mandatory variable part the optional part, which may contain fixed length and variable length parameter fields

13
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Blocking and Unblocking of CIC

All outgoing non test calls are blocked using those CIC values

Incoming non test call with those CIC leads to error case

Incoming Test calls with those CIC values are permitted to be carried out

Outgoing test calls using those CIC values are also permitted

14
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Main message of BICC protocol

IAM Initial address message APM Application transport message ACM Address complete message ANM Answer message REL RLC Release Release complete

15
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Course Contents

OVERVIEW H.248 protocol introduction Signal flow Examples

16
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Chap3 signaling flow

     

3.1 BICC bearer establish mode 3.2 forward bearer establish 3.3 backward bearer establish 3.4 tunnel 3.5 CODEC negotiation 3.6 call release

17
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Basic Call Setup

Forward Bearer Setup


No Tunnel case Fast Tunnel Delayed Forward Tunnel

Backward Bearer Setup


No Tunnel Case Delayed Backward Tunnel

18
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Forward Bearer Setup




Bearer setup is initiated in the forward direction of the call CSF decides whether bearer setup will be in forward direction or in backward direction CSF decides if tunnelling is supported. BCF decides if tunnelling is used Tunnelling is carrying Bearer Control Info embedded in BICC messages

19
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Chap3 signaling flow

     

3.1 BICC bearer establish mode 3.2 forward bearer establish 3.3 backward bearer establish 3.4 tunnel 3.5 CODEC negotiation 3.6 call release

20
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Forward Establish Flow


ISN-B

CSF

CSF

CSF-N

( )

Bearer Set-u req. (BNC-I = y1), (BI

F- d dr=y)

APM (Action = Connect For ard, no notification) (BNC-I =z1), (BI F Addr=z)

Bearer Set-u req. (BNC-I =z1), (BI

ACM

ANM ANM

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal



Bearer-Setu -Co

Bearer-Setu -Co

e ct

C T e ct
BBB

C
ANM NM

 

APM (Actio = Co e ct For ard, no notification) (BNC-I =y1), (BI F Addr=y)





 

 

 

( ctio = Co e ct For ard), (BNC characteristics)

BCF-N ( )

BCF-N

BCF-N
(z)

IAM (C T o r evious), (Actio = Co For ard) , (BNC characteristics)

e ct
AAA

F-Addr=z)

ACM

IS P

BICC

BICC

IS P

21

Chap3 signaling flow

     

3.1 BICC bearer establish mode 3.2 forward bearer establish 3.3 backward bearer establish 3.4 tunnel 3.5 CODEC negotiation 3.6 call release

22
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Backward Establish Flow

ISUP

B ICC CSF-N CSF-T

B ICC CSF-N

ISUP

BCF-N (x)

BCF-N (y)

BCF-N (z)

IAM

IAM (Action Connect backw ard), (B NC-ID x 1), (B IW F-Addr=x) , (B NC characteristics) B earer Set-up re . (B NC-ID=x1), (B IW F-Addr=x)

B earer-Setup-Connect

CO T
BBB ACM ACM ACM ACM ANM ANM ANM ANM

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

IAM (Action = Connect backw ard), (COT on previous), (B NC-ID=y1), (B IW FAddr=y) , (B NC characteristics) B earer Set-up re . (B NC-ID of B IW F y), (B IW FAddr=y) B earer-Setup-Connect

AAA

23

Chap3 signaling flow

     

3.1 BICC bearer establish mode 3.2 forward bearer establish 3.3 backward bearer establish 3.4 tunnel 3.5 CODEC negotiation 3.6 call release

24
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Tunnel

Bearer Setup Messages (IPBCP) are sent embedded in BICC messages Fast Tunnel : Tunnel data transferred in first IAM message

2: IA CS 5: AP

(tunnel data) CS (tunnel data)

1: Tunnel Info

6: Tunnel Info

3: Tunnel Info

4: Tunnel Info

BC

BC

25
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Tunnel Contd

Forward Delayed Tunnel : Tunnel data not transferred in first IAM message or in first backward APM message , Starts from first forward direction APM message
1: IA CS 2: AP 4: AP 7: AP 3: Tunnel Info 8: Tunnel Info (tunnel data) (tunnel data) (tunnel data) (tunnel data) 5: Tunnel Info 6: Tunnel Info CS

BC

BC

26
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Tunnel contd


Backward Delayed Tunnel : Tunnel data not transferred in first IAM message , but starts from first APM message in backward direction

1: I M (tunnel data) CSF 4: M (tunnel data) CSF

6: Tunnel In o

5: Tunnel In o

3: Tunnel In o

2: Tunnel In o

CF

CF

27
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Chap3 signaling flow

     

3.1 BICC bearer establish mode 3.2 forward bearer establish 3.3 backward bearer establish 3.4 tunnel 3.5 CODEC negotiation 3.6 call release

28
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Codec Negotiation
The Supported Codec List is constructed and contains all the codecs, in priority order, that are offered for use in the call from the SN initiating codec negotiation.

Intermediate SN will delete the codecs from the received Supported Codec List which it cannot support and is passed to next SN

Terminating SN selects the codec with highest priority in the received Supported Codec List that can be supported by it. This is selected codec. This is passed to previous SN.

29
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Codec Negotiation contd.

ISN-A
ISUP

BICC CSF-N

TSN

ISN-B

BICC CSF-N

ISUP

CSF-T

BCF-N

(x)

BCF-N (y)

BCF-N (z)

IAM

IAM (Action = Connect backward), (Codec list) (BNC-ID=x1), (BIWF-Addr=x) , (BNC characteristics)

IAM (Action = Connect backward), (Codec list) (COT on previous), (BNC-ID=y1), (BIWFAddr=y) , (BNC characteristics) APM (Action = Selected codec), (Selected codec), (Available codec list)

AAA

APM (Action = Selected codec), (Selected codec), (Available codec list)

Bearer Set-up re . (BNC-ID=x1), (BIWF-Addr=x)

Bearer Set-up re . (BNC-ID=y1), (BIWF-Addr=y)

Bearer-Setup-Connect

Bearer-Setup-Connect

ACM ACM ANM ANM ANM ANM

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

"

ACM ACM

30

Chap3 signaling flow

     

3.1 BICC bearer establish mode 3.2 forward bearer establish 3.3 backward bearer establish 3.4 tunnel 3.5 CODEC negotiation 3.6 call release

31
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Release
CSF receiving REL, initiates bearer release towards the sender of REL if this CSF initiated bearer setup before and then sends back RLC

CSF sending REL to the other CSF, waits until it gets RLC and then initiates bearer release towards the sender of RLC, if this CSF initiated bearer setup before

32
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Release while forward bearer establishment


ISN-A
CSF-N

IS P

BICC

BICC CSF-N

IS P

CSF-T

BCF-N

BCF-N REL

BCF-N

REL RLC

REL REL

RLC
Bearer release req. Bearer release Ack.

RLC

RLC

Bearer release Req. Bearer release Ack.

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

TSN

ISN-B

33

Release while Backward bearer establishment

ISUP

ISN-A
CSF-N

BICC

TSN
CSF-T

ISN-B
BICC CSF-N
ISUP

BCF-N

BCF-N

BCF-N

REL REL RLC RLC Bearer release req. Bearer release Ack. RLC Bearer release req. Bearer release Ack. REL REL RLC

34
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Course Contents

OVERVIEW H.248 protocol introduction Signal flow Examples

35
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Example of call setup in caller MSC Server, Forward no tunnel case


6 6C C 6
S etu p (F o r a rd , n o tu n n el, n o M G W ID , In itia to r)

I M (c o n n ec t o r a rd , n o tu n n elin g c o n tro l in o IE is p resen t, C O T to b e ex p ec ted ) M (C o n n ec t o r a rd , p lu s n o ti ic ation , C id , IW F a d d ress,su c c eed in g M G W -ID )

In o ( M In d , IW F a d d ress su cc eed in g M G W - ID ) In o (M G W _ ID 1 , M G W ID 2 )

ea rer E stab lish (M G W -ID 2 ,n o tu n n elin g su p p o rted , sen d /rec eiv e, C id , IW F a d d r)

ea rer E stab lish c k ( n o tu n n elin g , c o n tex t id , term in atio n id )

ea rer rep a re c k (c on tex t id , term in ation id , M G W -ID 2 a d d ress)

( h e n M G W -I D 1 < > M G W -I D 2 e x e c u te in te r n a l c o n n e c tio n )

ea rer E stab lish (M G W - ID 1 ,M G W ID 2 a d d ress)

In o (c o n tex t id /c o n tex t id 2 , term in a tio n id )

ea rer E sstab lish (c o n tex t id 2 term in atio n id , M G W -ID 2 a d d ress)

ea rer E stab lish ed

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

ea rer rep a re ( M G W -ID 2 , c o n tex t id )

21 ' )

0(

S etu p

ck

' )

1 21 1

& 1 ' ( 0( ) ) )

IC C

MGRM

STC

36

Example of call setup in MSC Server contd.

666 CC

BICC
AP

W_
(Connected) is sent only plus notification

STC

Continuity

C T
Alerting

AC

Answer

AN

Connect Ack

Confidential Information of Huawei. No Spreading without Permission.

Security Level: Internal

66

55

37

Few CBC Methods used for Codec negotiation and codec modification

Reserve Char
to reserve the necessary resources for all specified bearer service characteristics or codecs.

Confirm Char
to confirm one particular codec or one bearer service characteristics to be used and others resources if allocated previously to be released

Modify Char
to change a codec or a bearer service characterstics

38
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Backward bearer setup with Codec Negotiation in caller MSC

CC

BIC C

M GW _ R M

STC

Se t u p (M G W - I D 1 ,M G W I D 2 , b a ck a r d , n o t u n n e l, c o d e c lis t, in it iato r B e a r er re p a r e ( n o t u n n e l s u p p o rt , co d e c list , s e n d /r e c e iv e, c o n t ex t id ) I M ( co n n e ct o r a r d , B IW F a d d r e s s , B N C id , n o t u n n e lin g in d ic at io n )

I n o ( co n t ex t id , t er m in at io n id 1 )

I n o ( co n t ex t id , t er m in at io n id 2

C o n t in u it y C OT A P M ( co n n e ct b a ck a r d s e le cte d c o d e c , av a ila b le co d e c list ) C o n irm Ch a r( s e lect e d co d e c )

C o n irm Ch a r A ck ACM

A le rt in g A n s er ANM

Confidential Information of Huawei. No Spreading without Permission.

I n o ( s e lect e d co d e c , a v a ila b le co d e c list)

Security Level: Internal

7 9

B e a r er re p a r e ck (n o t u n n e l, t er m in at io n id 2 , B N C id , B IW F a d d r )

Se t u p A c k

39

Release of Call


Outgoing side while bearer setup was forward

Incoming side while bearer setup was in the forward direction

CC
Release

BICC

MGW_R M REL RLC

STC

STC REL

MGW_RM

BICC
Release

CC

Release Complete

Release Complete

RLC
Bearer Released

Release bearer
Termination Release

Release bearer Ack


Termination Release Ack

40
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

41
Confidential Information of Huawei. No Spreading without Permission. Security Level: Internal

Вам также может понравиться