HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
HUAWEI Confidential
Security Level: Public
OWG001209 MSOFTX3000 BICC data configuration
ISSUE1.0
HUAWEI TECHNOLOGIES CO., LTD. Page 2HUAWEI Confidential
References
MSOFTX3000 Package of Document-
MSOFTX3000 Configuration Guide
UMG8900 Package of Document-
Configuration Guide
HUAWEI TECHNOLOGIES CO., LTD. Page 3HUAWEI Confidential
Upon completion this course, you will be able to:
Master BICC data configuration based on SCTP.
Master BICC data configuration based on M3UA.
Master Nb interface data configuration.
HUAWEI TECHNOLOGIES CO., LTD. Page 4HUAWEI Confidential
Network structure
If Nb interface adopts IP beare, BICC should be used for the MSC Server,
which controls the MGW.
BICC can bases on SCTP or M3UA.
Mc Mc
Nb
Nc
BTS BSCNode BRNC
A
MGWMGW
MSC ServerMSC Server
A
Iu-cs
Iu-cs
BICCSCTP
IPLL
BICCM3UASCTP
IPLL
Nc
MAP/CAP MAP/CAP
IP back bone
HUAWEI TECHNOLOGIES CO., LTD. Page 5HUAWEI Confidential
Chapter 1 BICC data configuration based on SCTPChapter 1 BICC data configuration based on SCTP
Chapter 2 BICC data configuration based on M3UAChapter 2 BICC data configuration based on M3UA
Chapter 3 UMG8900 Nb data configurationChapter 3 UMG8900 Nb data configuration
HUAWEI TECHNOLOGIES CO., LTD. Page 6HUAWEI Confidential
Chapter 1 Chapter 1 BICC data configuration based on SCTPBICC data configuration based on SCTP
1.1 Basic principle1.1 Basic principle
1.2 Data configuration1.2 Data configuration
1.3 Debug commands1.3 Debug commands
HUAWEI TECHNOLOGIES CO., LTD. Page 7HUAWEI Confidential
BICC protocol stacks based on SCTP
Mc Mc
Nb
Nc
BTS BSC Node BRNC
A
MGWMGW
MSC ServerMSC Server
A
Iu-cs
SG
Iu-cs
MAP/CAP MAP/CAP
IP back bone
BICCSCTP
IPMACPHY
HUAWEI TECHNOLOGIES CO., LTD. Page 8HUAWEI Confidential
Ralationship between boards and protocols
PHY
MAC
IP
SCTP
BICC
HUAWEI TECHNOLOGIES CO., LTD. Page 9HUAWEI Confidential
Chapter 1 Chapter 1 BICC data configuration based on SCTPBICC data configuration based on SCTP
1.1 Basic principle1.1 Basic principle
1.2 Data configuration1.2 Data configuration
1.3 Debug commands1.3 Debug commands
HUAWEI TECHNOLOGIES CO., LTD. Page 10HUAWEI Confidential
Ralationship between commands and protocols
PHY
MAC
IP
SCTP
BICC
HUAWEI TECHNOLOGIES CO., LTD. Page 11HUAWEI Confidential
Parameter relationship of commandsOpposite office
parameters ADD OFC
[ Destination point code]
ADD SRT
[ Subroute number ]
[ Office direction ]
[ BICC signaling bearer type ]
[ Office direction ]ADD RT
[ Route number ]
[ Network ID ]
[Sub- route1]
ADD RTANA
[ Route selection code ] (ADD CNACLD )
[ Route number ]
[ Route selection source code ](ADD CALLSRC)
ADD BICCTG
ADD BICCCICMDU
[ Start CIC ]
[ Office direction ]
[ CIC convert type ][Sub- route number ]
[ Trunk group ]
[ MGW index ] ( ADD MGW )
[ Establish Direction]
[ tunnel mode ]
[ Connect notification ]
[ Out of Band Dtmf ]
[ Module No ]
[ End CIC]
[ CIC convert values]
ADD BICCSCTPLNK
[ Link No ]
[ Office direction ]
[ Module No ]
[ Local IP address1 ]
[ Local Port number ]
[ Peer IP address 1 ]
[ Peer Port number ]
Local office parameters
[ Client/server ]
HUAWEI TECHNOLOGIES CO., LTD. Page 12HUAWEI Confidential
ADD OFC
If BICC over SCTP
If BICC over M3UA
HUAWEI TECHNOLOGIES CO., LTD. Page 13HUAWEI Confidential
ADD BICCTG
FORWARD is suggested
Delay is suggested
HUAWEI TECHNOLOGIES CO., LTD. Page 14HUAWEI Confidential
ADD BICCCICMDU
BICC’s CIC is different from ISUP’s CIC, it is “Call Instance Code
(CIC)”, which is a logic number associated with the inter-office calling
relation
HUAWEI TECHNOLOGIES CO., LTD. Page 15HUAWEI Confidential
MSRN allocation and analysis
The called MSC allocates the MSRN, the calling MSC analyzes the MSRN
allocated by the called MSC.
Mc Mc
Nb
Nc
BTS BSCNode BRNC
A
MGWMGW
MSC Server B
MSC Server A
A
Iu-cs
Iu-cs
IP back bone
HLR
Allocate MSRN Analyze MSRN
HUAWEI TECHNOLOGIES CO., LTD. Page 16HUAWEI Confidential
Chapter 1 Chapter 1 BICC data configuration based on SCTPBICC data configuration based on SCTP
1.1 Basic principle1.1 Basic principle
1.2 Data configuration1.2 Data configuration
1.3 Debug commands1.3 Debug commands
HUAWEI TECHNOLOGIES CO., LTD. Page 17HUAWEI Confidential
Debug commands
PHY
MAC
IP
SCTP
BICC
HUAWEI TECHNOLOGIES CO., LTD. Page 18HUAWEI Confidential
Status of trunk circuit
Not blocked, Idle : The circuit is in Idle state and is available for a call.
Transient : The circuit is in Transient state and is unavailable for a call.
Locally blocked, Idle : The Locally blocked state indicates that the circuit is blocked at the local side. The system cannot select a trunk circuit in this state to route an outgoing call. You can run UBL BICCCIC to unblock a circuit in this state. The Idle state indicates that the circuit can be used to receive an incoming call.
Remotely blocked, Idle : The Remotely blocked state indicates that the BICC CIC circuit is blocked at the peer side. The system cannot select a circuit in this state to receive an incoming call originated by the peer office. The Idle state indicates that the trunk circuit can be used to route an outgoing call.
Locally and remotely blocked, Idle : The circuit is blocked at the local side and the peer side and is unavailable for a call.
Unequipped : The circuit is not configured, or it is not configured with the online setting. It is unavailable for a call.
HUAWEI TECHNOLOGIES CO., LTD. Page 19HUAWEI Confidential
Questions
Please describe the BICC protocol stacks based on SCTP?
What’s the data configuration difference between BICC CIC and ISUP
CIC ?
In the BICCTG command how to configure the parameters of “bearer
establish direction” and “Tunnel mode”?
HUAWEI TECHNOLOGIES CO., LTD. Page 20HUAWEI Confidential
Chapter 1 BICC data configuration based on SCTPChapter 1 BICC data configuration based on SCTP
Chapter 2 BICC data configuration based on M3UAChapter 2 BICC data configuration based on M3UA
Chapter 3 UMG8900 Nb data configurationChapter 3 UMG8900 Nb data configuration
HUAWEI TECHNOLOGIES CO., LTD. Page 21HUAWEI Confidential
Chapter 2 Chapter 2 BICC data configuration based on BICC data configuration based on M3UAM3UA
22.1 Basic principle.1 Basic principle
2.2 Data configuration2.2 Data configuration
2.3 Debug commands2.3 Debug commands
HUAWEI TECHNOLOGIES CO., LTD. Page 22HUAWEI Confidential
BICC protocol stacks based on SCTP
Mc Mc
Nb
Nc
BTS BSC Node BRNC
A
MGWMGW
MSC ServerMSC Server
A
Iu-cs
Iu-cs
MAP/CAP MAP/CAP
IP back bone
M3UASCTP
IPMACPHY
BICC
HUAWEI TECHNOLOGIES CO., LTD. Page 23HUAWEI Confidential
Ralationship between boards and protocols
PHY
MAC
IP
SCTP
M3UA
BICC
HUAWEI TECHNOLOGIES CO., LTD. Page 24HUAWEI Confidential
Chapter 1 Chapter 1 BICC data configuration based on BICC data configuration based on M3UAM3UA
1.1 Basic principle1.1 Basic principle
1.2 Data configuration1.2 Data configuration
1.3 Debug commands1.3 Debug commands
HUAWEI TECHNOLOGIES CO., LTD. Page 25HUAWEI Confidential
Ralationship between commands and protocols
PHY
MAC
IP
M3UASCTP
BICC
HUAWEI TECHNOLOGIES CO., LTD. Page 26HUAWEI Confidential
Parameter relationship of BICC layer commands
Opposite office parameters
ADD OFC
[ Destination point code]
ADD SRT
[ Subroute number ]
[ Office direction ]
[ BICC signaling bearer type ]
[ Office direction ]ADD RT
[ Route number ]
[Network ID ]
[Sub- route1]
ADD RTANA
[ Route selection code ] (ADD CNACLD )
[ Route number ]
[ Route selection source code ](ADD CALLSRC)
ADD BICCTG
ADD BICCCICMDU
[ Start CIC ]
[ Office direction ]
[ CIC convert type ][Sub- route number ]
[ Trunk group ]
[ MGW index ] ( ADD MGW )
[ Establish Direction]
[ tunnel mode ]
[ Connect notification ]
[ Out of Band Dtmf ]
[ Module No ]
[ End CIC]
[ CIC convert values]
Local office parameters ADD M3DE
[ STP flag ]
[ DE type ]
[ SPC of DE ]
[ Network ID ]
HUAWEI TECHNOLOGIES CO., LTD. Page 27HUAWEI Confidential
Parameter relationship of M3UA and low layer commands
ADD M3LE
[ NI ][ SPC of LE ][Local entity type ]
ADD M3DE
[ STP flag ][ DE type ]
[ SPC of DE ][ NI ]
[ LE name ]
[ LE name ]
[ DE name ]
ADD M3LKS
[ Work mode ][ Traffic name ]
[ AD name ]
[ LKS name ]
ADD M3RT
[ LKS name ]
[ DE name ]
[ RT name ]
ADD M3LNK
[ C/S mode ][ LKS name ]
[ Peer port ][ Peer IP ]
[ Local port ]
[ Local IP ]
SET OFI
[ SPC ]
[ Network ID ]
Opposite office
MSOFTX3000
ADD FECFG
[ Default GW ]
[ IP MARSK ]
[ IP ADDR ]
HUAWEI TECHNOLOGIES CO., LTD. Page 28HUAWEI Confidential
ADD OFC
If BICC over SCTP
If BICC over M3UA
HUAWEI TECHNOLOGIES CO., LTD. Page 29HUAWEI Confidential
ADD BICCTG
FORWARD is suggested
Delay is suggested
HUAWEI TECHNOLOGIES CO., LTD. Page 30HUAWEI Confidential
Chapter 1 Chapter 1 BICC data configuration based on BICC data configuration based on M3UAM3UA
1.1 Basic principle1.1 Basic principle
1.2 Data configuration1.2 Data configuration
1.3 Debug commands1.3 Debug commands
HUAWEI TECHNOLOGIES CO., LTD. Page 31HUAWEI Confidential
Debug commands
PHY
MAC
IP
M3UASCTP
BICC
HUAWEI TECHNOLOGIES CO., LTD. Page 32HUAWEI Confidential
Status of trunk circuit
Not blocked, Idle : The circuit is in Idle state and is available for a call.
Transient : The circuit is in Transient state and is unavailable for a call.
Locally blocked, Idle : The Locally blocked state indicates that the circuit is blocked at the local side. The system cannot select a trunk circuit in this state to route an outgoing call. You can run UBL BICCCIC to unblock a circuit in this state. The Idle state indicates that the circuit can be used to receive an incoming call.
Remotely blocked, Idle : The Remotely blocked state indicates that the BICC CIC circuit is blocked at the peer side. The system cannot select a circuit in this state to receive an incoming call originated by the peer office. The Idle state indicates that the trunk circuit can be used to route an outgoing call.
Locally and remotely blocked, Idle : The circuit is blocked at the local side and the peer side and is unavailable for a call.
Unequipped : The circuit is not configured, or it is not configured with the online setting. It is unavailable for a call.
HUAWEI TECHNOLOGIES CO., LTD. Page 33HUAWEI Confidential
Questions
Please describe the BICC protocol stacks based on SCTP?
What’s the data configuration difference between BICC CIC and ISUP CIC ?
In the BICCTG command how to configure the parameters of “bearer establish direction” and “Tunnel mode”?
What’s data configuration difference between BICC over SCTP and BICC over M3UA
HUAWEI TECHNOLOGIES CO., LTD. Page 34HUAWEI Confidential
Chapter 1 BICC data configuration based on SCTPChapter 1 BICC data configuration based on SCTP
Chapter 2 BICC data configuration based on M3UAChapter 2 BICC data configuration based on M3UA
Chapter 3 UMG8900 Nb data configurationChapter 3 UMG8900 Nb data configuration
HUAWEI TECHNOLOGIES CO., LTD. Page 35HUAWEI Confidential
Chapter 1 UMG8900 Nb data configurationChapter 1 UMG8900 Nb data configuration
1.1 Basic principle1.1 Basic principle
1.2 Data configuration1.2 Data configuration
1.3 Debug commands1.3 Debug commands
HUAWEI TECHNOLOGIES CO., LTD. Page 36HUAWEI Confidential
Nb interface protocol stacks
Mc Mc
Nb
Nc
BTS BSC Node BRNC
A
MGWMGW
MSC ServerMSC Server
A
Iu-cs
Iu-cs
MAP/CAP MAP/CAP
IP back bone
RTPUDP
IPMACPHY
NbUPRTCPUDP
IPMACPHY
IPBCP
HUAWEI TECHNOLOGIES CO., LTD. Page 37HUAWEI Confidential
Chapter 1 UMG8900 Nb data configurationChapter 1 UMG8900 Nb data configuration
1.1 Basic principle1.1 Basic principle
1.2 Data configuration1.2 Data configuration
1.3 Debug commands1.3 Debug commands
HUAWEI TECHNOLOGIES CO., LTD. Page 38HUAWEI Confidential
Relationship between tables
BTBNIFT
UMG8900
ADD IPADDR
ADD IFVLAN(opti onal )
IFT
VIDVDOMAINVBEARBW
Others
BTBN
IFN
IPADDRMASKFLAG
INVLANVID
VLAN
LAN Switch/Router
IFN
DOMAINDESC
ISSAFE
SET DOMAIN(opti onal )
ASTARTAEND
MOD IPIF
BNIFN
SPEED SPEEDDUPLEX DUPLEX
DOMAINAUTONEGO
BEARBW
AUTONEGO
BTIFT
BTBNIFT
DOMAINIPADDR
IPADDRBAK
ADD RTBAK(optional)
IFN
BTBN
DOMAINIPADDRSPORT
ADD RSVPORT(optional)
EPORT
BTBN
DOMAINIPADDR
GWIP
ADD GWADDRADD BFD(optional)
BTBNIFT
SRCIP
HUAWEI TECHNOLOGIES CO., LTD. Page 39HUAWEI Confidential
Set domain
When the networks which connected to one MGW have same IP addresses, different
domain should be set for different network.
IP Core Network
MSC SERVER
MGW
10. 251. 0. 1/ 2410. 251. 0. 2/ 2410. 251. 0. 3/ 2410. 251. 0. 4/ 24. . .
10. 251. 0. 1/ 2410. 251. 0. 2/ 2410. 251. 0. 3/ 2410. 251. 0. 4/ 24. . .
Company A Company B
HUAWEI TECHNOLOGIES CO., LTD. Page 40HUAWEI Confidential
MOD IPIF
This command is used for the bandwidth control
Suppose the there is a HRB board, the module number is 0, the bandwidth of port 0
should be set 500M, the following command can be used
MOD IPIF: IFT=GE, BT=HRB, BN=0, IFN=0, BEARBW=512000;
HUAWEI TECHNOLOGIES CO., LTD. Page 41HUAWEI Confidential
ADD IFVLAN
The VLAN ID can be configured for different IP address.
The LANSWITCH can distinguish the signaling flow, media flow, O&M flow by VLAN
ID, in order to grantee the reliable delivery
VLAN : 30VLAN : 10
VLAN : 20
VLAN :10 、 20 、 30
MGW MSC Server
LANSWITCH
OMC IP backbone
HUAWEI TECHNOLOGIES CO., LTD. Page 42HUAWEI Confidential
ADD RTBAK
By this data configuration, the media flow can be sent through two plane, and these two
plane are load sharing ; If one plane breaks down, other plane will carry all the media
flow.
HRB GW0
GW1
0 号口, IP0 500M
1 号口, IP1 500M
IP2
IP3
GW0HRB
GW1
0号口,IP0 0M
1号口,IP1 1000M
IP2
IP3
GW0HRB
GW1
0号口,IP0 0M
1号口,IP1 1000M
IP2
IP3
HUAWEI TECHNOLOGIES CO., LTD. Page 43HUAWEI Confidential
ADD RSVPORT
This command is used to define which ports are not used for bearer
HUAWEI TECHNOLOGIES CO., LTD. Page 44HUAWEI Confidential
ADD BFD
BFD : Bidirectional Forwarding Detection
BFD is used to check the channel state between two devices. If the active channel is found
faulty, the standby channel can be used rapidly to transmit the service. In this case, the service
and inband maintenance channel are more reliable.
The BFD association will occupy the UDP port 3784 and 3785, these two ports can not
be used for signaling and bearer flow.
HUAWEI TECHNOLOGIES CO., LTD. Page 45HUAWEI Confidential
ADD GWADDR
Just when FE or GE interface is adopted, this table should be configured, if POS
interface is adopted, this table needn’t configure.
The address of the IP interface on the HRB must be in the same network segment with
the gateway IP address
HUAWEI TECHNOLOGIES CO., LTD. Page 46HUAWEI Confidential
Questions
When the “set domain” command must be configured?
By which command the bandwidth can be configured for the IP port?
By which command, we can define the IP ports are not used for bearer
services?
HUAWEI TECHNOLOGIES CO., LTD. Page 47HUAWEI Confidential
Chapter 1 UMG8900 Nb data configurationChapter 1 UMG8900 Nb data configuration
1.1 Basic principle1.1 Basic principle
1.2 Data configuration1.2 Data configuration
1.3 Debug commands1.3 Debug commands
HUAWEI TECHNOLOGIES CO., LTD. Page 48HUAWEI Confidential
DSP IPIF
Check if the physical and link layers are UP or not.
DSP IPIF
HUAWEI TECHNOLOGIES CO., LTD. Page 49HUAWEI Confidential
DSP BFD
“DSP BFD” is used to display BFD measurement information
DSP BFD
HUAWEI TECHNOLOGIES CO., LTD. Page 50HUAWEI Confidential
DSP GWADDR
Check if the MAC address of Gateway is resolved or not.
%%DSP GWADDR: BT=HRB, BN=0;%%
RETCODE = 0 accomplished
Gateway Running Information
------------
BT BN IP address mask MAC address valid or not
HRB 0 10.1.1.3 255.255.255.0 00e0.fc39.ef9f yes
HUAWEI TECHNOLOGIES CO., LTD. Page 51HUAWEI Confidential
Questions
How many commands can be used to check if the data configuration for
IP bearer services is correct or not?
Thank You
www.huawei.com