Internet Engineering Task Force                           Young-Fu Chang
Internet Draft                                       Lucent Technologies
draft-chang-sipping-bicc-network-00.txt
September 2001
Expires: March 2002

             BICC extension of SIP in Inter-Network Configuration

STATUS OF THIS MEMO This document is an Internet-Draft and is in full 
conformance with all provisions of Section 10 of RFC2026. 

Internet-Drafts are working documents of the Internet Engineering Task 
Force (IETF), its areas, and its working groups. Note that other groups 
may also distribute working documents as Internet- Drafts. 

Internet-Drafts are draft documents valid for a maximum of six months 
and may be updated, replaced, or obsoleted by other documents at any 
time. It is inappropriate to use Internet- Drafts as reference material 
or to cite them other than as work in progress. 

The list of current Internet-Drafts can be accessed at 
http://www.ietf.org/ietf/1id-abstracts.txt 

The list of Internet-Draft Shadow Directories can be accessed at 
http://www.ietf.org/shadow.html.

Abstract:

This Internet Draft describes a framework of extending SIP to support 
call control across different networks. This extension encapsulates 
Bearer Independent Call Control (BICC) in the SIP message to provide the 
information needed across networks. Integrating both SIP and BICC 
features, this extension provides service providers a vehicle to deploy 
services across different administration domains and different types of 
network. 

1.  Introduction

The capabilities of SIP provide a good foundation for integrating 
various communication media into single platform [1]. To address the 
needs of interworking with PSTN, the SIP-T proposal [2] supports 
interworking between the PSTN network and the SIP network.

Interworking between SIP/SIP-T and BICC is also proposed [3] to address 
the need of protocol interworking. However, these proposals did not 
address the needs of providing SIP services in different service 
domains. Two additional services should be provided for the SIP:

- A service provider should be able to control and manage the traffic 
origination from its network or the traffic termination on its network.

- SIP should be extended to bridge network-to-network signaling 




Chang                                                          [Page 1]
Internet Draft           sipping-bicc-network	            September 2001

These two requirements are important to service providers when dealing 
with a controlled environment in their packet networks. SIP-T [2] 
provided a solution for services between service providers, however, its 
scope is limited to SS7/TDM interface. On the other hand, 
interworking between SIP/SIP-T and BICC [3] provided a solution to 
different transport domain IP/ATM/TDM, however, it lost the SIP 
services, such as redirect or web enabled service, after interworking 
with another protocol.

The next section describes a general information flow model in the 
network. Section 3 briefly describes BICC network components and 
interfaces. Section 4 describes several basic constructs for integrating 
both SIP and BICC protocols. Section 5 will discuss various supported 
network configurations to validate the coverage of proposed basic 
constructs. The role of SIP components, required support, and network 
features are also covered in this proposal.

2. An Information Flow Model

When establishing a session between two SIP end-points, there are many 
steps and information flows contributing to the connection. Using 
Figure 1 as an example, User 1 starts a session to connect User 2.
This example illustrates an example of sessions that go between two SIP 
networks.
                                 |       
                                 |
       Service Provider A        |           Service Provider B
          SIP Network            |              SIP Network                  
                       +-----+  Session +   +-----+                  
   +--------+          |B2BUA| Network Info |B2BUA|              
   |Location|          |  X  |---|--(4)---->|  Y  |--|               
   | Server |          +-----+   |          +-----+  |                
   +--------+            ^       |                  (5) Session           
       ^ Location        |Session|                   |   Info        
       | Info           (3) Info |                   |           
      (2)   +-------+    |       |               +-------+                
       |--->|Proxy A|----|       |               |Proxy B|   
            +-------+            |               +-------+        
                ^                |                   |
        Session |                |                  (6) Session  
          Info (1)               |                   |   Info  
                |                |                   v
             +------+            |                +-------+
             | User1|            |                | User2 |
             +------+            |                +-------+

          
        Figure 1. Information Flow Model in Two SIP Networks

Step 1: The session information is inserted into the message between 
User 1 and Proxy A. The information at this step provides enough 
information for Service Network Provider A to manage the session. 


Chang                                                           [Page 2]
Internet Draft           sipping-bicc-network	            September 2001

Information, such as Called ID, Calling ID, are provided in this step as 
the interface between a user and the service provider. 
When processing the session information in Step 1, Proxy A needs to find 
out the translated address of the called address by going to the 
Location Server. 

Step 2: Translated address is obtained from Location Server. This step 
provides the routing information in the network of Service Provider A.

Step 3: Deciding on the session routing, Service Provider Network A 
sends the session to MGC A for a session that will go across two service 
providers.

Step 4: Going between two service provider networks, this session is 
augmented by additional network information between B2BUA X and B2BUA Y
B. This information flow could support the session across different 
service administration domains as well different types of networks. The 
information, such as network ID or billing information across networks, 
helps service providers resolve the services across different networks. 
On the other hand, when the session goes between two different types of 
network, network components such as Media Gateways (MG) serve as the 
media conversion point between two types of network. The information and procedures exchanged resolve the differences between networks.
                                                                     
Step 5: Resolving the network-to-network services, B2BUA Y passes on
only the session information needed by Proxy B, which hosts User 2.

Step 6: This session terminates on User 2.

The scenario described above is a typical information flow model in the 
service network. The session information supports the connection between 
User 1 and User 2. However, additional information is inserted into the 
flow and deleted from the flow at various points in the network. It is 
not practical and also inefficient to provide all the information at 
once.

There are two possible approaches to support the network-to-network 
information needed in the information flow model described above. 

- Expand the SIP parameters and procedures to support network-to-network 
information.
- Encapsulate the network-to-network protocol such as BICC in the SIP to 
supplement the information needed across networks.

Encapsulating the BICC information in SIP messages has the following 
advantages:

(1) It is an extension of the SIP. It inserts/deletes network 
information at the edge of the network. Only the components, such as MGC 
or B2BUA, at the edge of the network need to be aware of this extension.




Chang                                                           [Page 3]
Internet Draft           sipping-bicc-network	            September 2001
	

(2) The BICC protocol modifies ISUP and enhances it for packet network 
features. These features support many network-to-network interfaces and
extension in many countries. Supplementing the SIP with BICC 
information, this framework automatically picks up the long efforts 
devoted to solve the network-to-network interface.

(3) Encapsulating the BICC message in the SIP messages provides a good 
way of passing BICC through a SIP network. Otherwise, the SIP network 
must perform interworking from BICC to SIP and SIP to BICC.
 
The scope of this contribution covers Step 4, i.e., the interface 
between two networks. These two networks can be the same type of 
network, such as the SIP network, but are administrated by different 
service providers. On the other hand, two networks can be different 
types of network, e.g., SIP/BICC network. The next section introduces 
some terms of the BICC network. 



3. Overview of the BICC Network

  +-----+        +-----+        +-----+        +-----+        +-----+
  |CSF-N|<-BICC->|CSF-T|<-BICC->|CSF-C|<-BICC->|CSF-G|<-BICC->|CSF-G| 
  +-----+        +-----+        +-----+        +-----+        |---- |
    |              |                              |              |   
    |CBC           |CBC                           |CBC           |   
    |              |                              |              |   
  +----+         +----+                        +----+         +----+
  |BIWF|<--BCP-->|BIWF|<----------BCP--------->|BIWF|<--BCP-->|BIWF|
  +----+         +----+                        +----+         +----+ 

  ISN-A           TSN-x           CMN-x         GSN-x          GSN-y 

                       Figure 2. BICC Network

Figure 2 shows various components in a BICC network.

- Call Service Function (CSF):
This functional entity supports the following service control function:
- Call Service Nodal Function (CSF-N): In an Interface Serving Node 
(ISN), it supports narrowband and BICC signaling interworking. 
- Call Service Transit Function (CSF-T): In a Transit Serving Node 
(TSN), it establishes and maintains a network backbone call between CSF-
Ns.
- Call Service Gateway Function (CSF-G): In a Gateway Serving Node 
(GSN), it establishes and maintains calls between CSF-N peers across 
different networks.
- Call Service Coordination Function (CSF-C): In a CMN, it supports call 
coordination and mediation.




Chang                                                           [Page 4]
Internet Draft           sipping-bicc-network	            September 2001
	
- Bearer Inter-Working Function (BIWF): A functional entity supports 
bearer control and media mapping switching. It performs these functions 
according to the service node characteristics. The BIWF is functionally 
equivalent to the Media Gateway (MG) with bearer control function.
- Bearer Independent Call Control (BICC): The BICC is the signaling at 
the call control level between different service nodes.
- Call & Bearer Control (CBC): It is an interface between the CSF and 
the Bearer Control Function (BCF) in the BIWF
- Bearer Control Protocol (BCP): It is the interface between BIWFs to 
set up the bearer connection.
- Call Mediation Node: A functional entity provides Call Service 
Coordination Function without an associated Bearer Control Function.

By separating the call control and the bearer control, the BICC network 
supports different transport types with a common call control signaling 
across networks. Without extending the session information in the BICC 
message, current BICC network has limited capability to support various 
SIP features in the network. Extending the SIP scope with the BICC gives 
the SIP network a much better coverage of the network-to-network 
interface in the packet network environment.

4. Information Taxonomy

4.1 Layer of Information

Figure 3 illustrates the protocol chart used when a SIP session goes 
across network boundary. The BICC information is introduced when a 
session goes across network boundary. The other network should process 
BICC information introduced at this point. If the network is SIP-
capable, the SIP features should be supported beyond the entry point of 
the other network. If the network does not have all the SIP features, 
then the SIP protocol with BICC information should be terminated on the 
entry point of the network.
                             Network
                             Boundary
              +-----------+    |                    
              |  B2BUA    |    |                    
              |  +----+   |    |                       
              |  |BICC|   |    |                       
         SIP  |  |----|   |    |                     
       ----------| SIP|--------|---> SIP(BICC)                     
              |  +----+   |    |                     
              +-----------+    |                     

      Figure 3. Protocol chart of SIP supplemented with BICC

Figure 4 shows another case that the BICC protocol is used between a 
SIP network and the BICC network. This case uses SIP as transport 
mechanism to get the BICC protocol across a SIP network. Depending on
the configuration, the SIP network may or may not have to handle bearer 
interworking. Section 5 has more detailed network configurations.



Chang                                                           [Page 5]
Internet Draft           sipping-bicc-network	            September 2001

          Network                                     Network
          Boundary                                    Boundary
              |                                          |                             
              |  +-----------+           +-----------+   |                    
              |  |B2BUA/MGC  |           |B2BUA/MGC  |   |                     
              |  |  |----|   |           |  |----|   |   |                       
      BICC <--|-----|BICC|   |           |  |BICC|-------|--> BICC                       
              |  |  |----|   | SIP(BICC) |  |----|   |   |                   
              |  |  |SIP |------------------| SIP|   |   |                   
              |  |  |----|   |           |  |----|   |   |                     
              |  +-----------+           +-----------+   |                    
                                 
    Figure 4. Protocol chart of BICC transported in SIP network

Encapsulated BICC is used in Figure 3 and Figure 4. Depending on the 
role of the B2BUA or MGC, both cases are supported across network 
boundary.

Another model shown in Figure 5 is the Interworking Model that MGC 
servers as the interworking point. This model is not within the scope 
of this paper. More information of this model can be found in another contribution [7].
 
                     Network 
                     Boundary
                       | +-------------+         
                       | |    MGC      |
                       | |+----+  +---+|
                BICC   | ||BICC|--|SIP||    +--- ----+
               --------|-|+----+  +---+|----| SIP UA |
                       | +-------------+    +--------+

                   Figure 5. SIP interworking Model

4.2. Basic Constructs

The BICC protocol has specified messages, coding, procedures, and etc. 
in CS1, and CS2 documents. Mapping all the BICC information into SIP 
requires mass documentation. Providing basic constructs of the mapping 
is the strategy of this contribution. After supporting the basic 
constructs, this framework can easily be used to derive many other 
procedures.

4.2.1. Message Constructs

Table 1 lists the mapping from BICC messages into SIP messages. It is 
desired that the mapping keeps the SIP semantics and BICC semantics. 
Using this mapping as basic building blocks, all the BICC information 
can be carried in the SIP message across the network boundary.





Chang                                                           [Page 6]
Internet Draft           sipping-bicc-network	            September 2001
	

|-------------|-------|-----|-------|-----|-----|--------|------|
|          SIP| INVITE| 18x | PRACK | BYE | 200 | NOTIFY | INFO |
|BICC         |       |     |       |     |     |        |      |
|-------------|-------|-----|-------|-----|-----|--------|------|
|IAM          |   X                                             |
|ACM          |         180                                     |
|Early ACM    |         183                                     |
|CPG          |         183                                     |
|FOT          |         181                                     |
|ANM          |                               X                 |
|CON          |                               X                 |
|COT          |                 X                               |
|SUS          |   X                                         X   |
|REL          |                        X                        |
|RLC          |                               X                 |
|---------------------------------------------------------------|
|Backward APM,|         183                                     |
|FAC,INR, SGM |                                                 |
|-------------|-------------------------------------------------|
|Forward APM, |                 X                               |
|FAC,INF,SAM, |                                                 |
|SGM          |                                                 |
|-------------|-------------------------------------------------|
|CGB,CFN,CGU, |                                                 |
|CQM,GRS,RES, |                                                 |
|RSC,UCIC     |                                      X          |
|---------------------------------------------------------------|
|CGBA,CGUA,CQR|                                                 |
|GRA,RSC      |                               X                 |
|---------------------------------------------------------------|

        Table 1. BICC messages mapped into SIP

4.2.2. Procedure Constructs

Three types of procedure constructs are described as follows:

(1) General Procedure

These procedures are for those messages have one-one mapping into SIP 
messages, E.g., IAM is mapped into INVITE, and ACM is mapped into 180
or 183. All the messages in Table 1 are in this category expect those 
are specified in the next two categories.

(2) Procedure for the ANM Message

For keeping the semantics of the SIP procedure, the BICC ANM message is 
mapped into the SIP 200 OK message and one additional SIP ACK message as 
shown in Figure 6.




Chang                                                           [Page 7]
Internet Draft           sipping-bicc-network	            September 2001
	

                   |<--200(ANM)----|
                   |               |
                   |---- ACK------>|

             Figure 6. BICC ANM procedure

(3) Additional Procedure for Forward Messages

The messages using this procedure are those mapped into PRACK in Table 
1. Figure 7 uses APM as an example to show the procedure. 

                   |-- PRACK(APM)->|
                   |               |
                   |<--- 200 OK ---|

        Figure 7. Additional Procedure for BICC Forward Message 

Using the basic constructs of message and procedure, different 
variation of the BICC scenarios can be mapped into these building 
blocks. The next section gives several examples of these building blocks 
in a list of supported network configurations.

5. Configurations of SIP Networks

This section elaborates supported network configurations. Using these 
configurations as examples, bundling of the basic constructs described 
in Section 4 demonstrates a systematic approach to address various 
scenarios.
  
5.1. Service across network boundary

When a SIP session traverses through different service providers, there 
is a need to provide the information needed between service providers. 
Some of the capabilities have been adopted by the SIP protocol. For the 
completeness, the SIP message needs to carry information handled between 
service providers. Services provided between service providers such as 
transit network selection, local service provider identification, 
blocking/unblocking traffic are important to service providers. BICC 
adopted ISUP and enhanced the signaling to handle the packet bearer 
interface. Service providers also demand a controlled external interface 
so that the internal addressing and other information will not be 
revealed to external networks. Figure 8 depicts the session in SIP VoIP 
across different service providers. It is important to have extended 
BICC interface between LEC 1 SIP network and LEC 2 SIP network so that 
either network has the capability of managing traffic from/to the other 
network.   







Chang                                                           [Page 8]
Internet Draft           sipping-bicc-network	            September 2001

    +---------------------+           +---------------------+
    |  +-----+   +-----+  | SIP(BICC) | +-----+   +-----+   |
    |  |Proxy|<->|B2BUA|<-------------->|B2BUA|<->|Proxy|   |
    |  |  A  |   |  X  |  |           | |  Y  |   |  B  |   |
    |  +-----+   +-----+  |           | +-----+   +-----+   |
    |       ^             |           |            ^        |
    |       |             |           |            |        |
    |       |             |           |            |        |
    | LEC 1 |             |           |            | LEC 2  |
    | SIP   |       +----------------------+       | SIP    |
    |Network|       |     |           |    |       | Network|
    |       |       |     |           |    |       |        |
    +-------|-------|-----+           +----|-------|--------+
            V       V                      V       V
           +---------+                    +---------+
           |SIP Phone|                    |SIP Phone|
           +---------+                    +---------+
Figure 8. Extended SIP for Packet Interworking and Service Interworking	

Figure 9 shows the session establishment and release between two SIP 
Phones in Figure 8. It only shows messages exchanged between two 
Proxies. 

  Proxy A          B2BUA X           B2BUA Y            Proxy B
    |                 |                 |                 | 
    |  (1)INVITE      |                 |                 |
    |---------------->|(2)INVITE(IAM)   |                 |
    |                 |---------------->|   (3)INVITE     |
    |                 |                 |---------------->| 
    |                 |                 |    (4)180       |
    |                 |  (5)180(ACM)    |<----------------|
    |   (6)180        |<----------------|    (7)200 OK    |
    |<----------------|  (8)200(ANM)    |<----------------|
    |    (9)200       |<----------------|                 |
    |<----------------|                 |                 |
    |   (10)ACK       |                 |                 |
    |---------------->|    (11)ACK      |                 |
    |                 |---------------->|    (12)ACK      |
    |                 |                 |---------------->|
    |================== CONVERSATION =====================|
    |   (13)BYE       |                 |                 |
    |---------------->| (14)BYE(REL)    |                 |
    |                 |---------------->|  (15)BYE        |
    |                 |                 |---------------->|
    |                 |                 |   (16)200 OK    |
    |                 |  (17)200(RLC)   |<----------------|
    |   (18)200       |<----------------|                 |
    |<----------------|                 |                 | 


          Figure 9. Call Flow between two SIP networks 



Chang                                                           [Page 9]
Internet Draft           sipping-bicc-network	            September 2001
	


The basic constructs used in Figure 9 are:

- IAM
- ACM
- ANM
- REL
- RLC

The step-by-step descriptions of this procedure are in Appendix A.



5.2. BICC bridging using SIP

When serving as the bridge between two BICC networks, SIP can transport 
the BICC messages across the SIP network with this extension. Figure 10
shows a bridging SIP network between two BICC networks.

+-------------+      +---------------------+      +--------------+
|+---+   +---+| BICC |+---+ SIP(BICC) +---|| BICC |+---|   +---+ | 
||CSF|<->|CSF|<----->||MGC|<--------->|MGC|<------>|CSF|<->|CSF| |
|+---+   | A ||      || X |           | Y ||      || B |   +---+ |
|        +---||      |+---+           +---+|      |+---+         |
|+----+ +----+|      |+--+             +--+|      |+----+ +----+ | 
||BIWF|-|BIWF|--------|MG|-------------|MG|--------|BIWF--|BIWF| |
|+----+ +----+|      |+--+             +--+|      |+----+ +----+ |
+-------------|      +---------------------+      +--------------+
   BICC Network            SIP Network              BICC Netwrok

            Figure 10 SIP as a bridging network

Figure 11 uses the following basic constructs to achieve the procedure 
of forward setup:

- IAM
- Backward APM
- Forward APM
- ACM
- ANM
- REL
- RLC

  Proxy A           MGC X             MGC Y            Proxy B
    |                 |                 |                 | 
    |  (1)IAM         |                 |                 |
    |---------------->|(2)INVITE(IAM)   |                 |
    |                 |---------------->|   (3)IAM        |
    |                 |                 |---------------->|  
    |                 |                 |   (4)APM        |
    |                 |  (5)183(APM)    |<----------------|
    |                 |<----------------|                 |

Chang                                                          [Page 10]
Internet Draft           sipping-bicc-network	            September 2001

    |   (6)APM        |                 |                 |
    |<----------------|                 |                 |
    |    (7)APM       |                 |                 |
    |---------------->|                 |                 |
    |                 | (8)PRACK(APM)   |                 | 
    |                 |---------------->|    (9)APM       |
    |                 | (10)200 OK      |---------------->|
    |                 |<----------------|    (11)ACM      |
    |                 | (12)180(ACM)    |<----------------|
    |   (13)ACM       |<----------------|    (14)ANM      |
    |<----------------| (15)200(ANM)    |<----------------|
    |   (16)ANM       |<----------------|                 |
    |<----------------|                 |                 |
    |================== CONVERSATION =====================|
    |   (17)REL       |                 |                 |
    |---------------->| (18)BYE(REL)    |                 |
    |                 |---------------->|  (19)REL        |
    |                 |                 |---------------->|
    |                 |                 |   (20)RLC       |
    |                 | (21)200(RLC)    |<----------------|
    |   (22)RLC       |<----------------|                 |
    |<----------------|                 |                 | 

  Figure 10. Call Flow of Fast Forward Setup with tunnelling
 
In other network configurations, MGs are not required for media 
interworking. Figure 12 illustrates an example of the configurations 
that do not require MGs.

 +-------------+      +------------------------+     +-------------+ 
 |+---+   +---+| BICC |+-----+ SIP(BICC)+-----+| BICC|+---+   +---+| 
 ||CSF|<->|CSF|<------>|B2BUA|<--------->|B2BUA|<----->|CSF|<->|CSF||
 |+---+   | a ||      ||  X  |          |  Y  ||     || b |   +---+|
 |        +---+|      |+-----+          +-----+|     |+---+        |
 |             |      |                        |     |             |
 |+----+ +----+|      +------------------------+     |+----+ +----+| 
 ||BIWF|-|BIWF|---------------------------------------|BIWF--|BIWF||
 |+----+ |  a ||                                     ||  b | +----+|
 |       +----+|                                     |+----+       |
 +-------------+                                     +-------------+
  BICC Network               SIP Network               BICC Network

             Figure 12. SIP serves as a Call Mediation Node

Using the basic constructs described above, Figure 13 shows a scenario 
for the call mediation configuration. More detailed descriptions of the 
flow are in Appendix B.







Chang                                                          [Page 11]
Internet Draft           sipping-bicc-network	            September 2001
	
CSF A              B2BUA X          B2BUA Y            CSF B  
    |                 |                 |                 | 
    |    (1)IAM       |                 |                 |
    |---------------->|(2)INVITE(IAM)   |                 |
    |                 |---------------->|     (3)IAM      |
    |                 |                 |---------------->|
    |                 |                 |     (4)APM      |
    |                 |  (5)183(APM)    |<----------------|
    |     (6)APM      |<----------------|                 |
    |<----------------|                 |                 |

     Figure 13. Call Flow of SIP as a Call Mediation Node

5.3. Extended SIP between different network transport

In this case, the session between a SIP terminal and an ISDN terminal 
goes between the SIP network and the BICC network. There are two 
possible scenarios between the MGC of the SIP network and the CSF in the 
BICC network:

(1) BICC is used between MGC/B2BUA and CSF: In this scenario, the MGC 
must support the BICC-to-SIP interworking function in the MGC/B2BUA.

(2) SIP with BICC extension is used between B2BUA/MGC and CSF: In this 
scenario, CSF must support the extended SIP to ISDN interworking 
function.

Case (1) is similar to the T1S1 contribution [5]. Case (2) is the 
scenario that B2BUA/MGC supports the SIP across network boundary. The SIP 
session needs to go through signaling interworking in the CSF.
Figure 14 depicts the first option that extended SIP is used between a 
SIP network and a BICC network.
  
    +---------------------+           +-----------------+
    |  +-----+   +-----+  | SIP(BICC) | +---+           |
    |  |Proxy|<->|B2BUA|<-------------->|CSF|           |
    |  +-----+   +-----+  |           | +---+           |
    |       ^             |           |   ^     LEC 2   |
    |       |             |           |   |             |
    | LEC 1 |             |           | +-v--+  BICC    |
    | SIP   |       +------------------>|BIWF|  Network |
    |Network|       |     |           | +----+          |
    |       |       |     |           |    ^            |
    +-------|-------|-----+           +----|------------+
            |       |                      |         
            v       v                      v        
           +---------+                  +----------+
           |SIP Phone|                  |ISDN Phone|
           +---------+                  +----------+

   Figure 14. Extended SIP across different network transport 



Chang                                                          [Page 12]
Internet Draft           sipping-bicc-network	            September 2001

Figure 15 shows another option that a Media-Gateway and a Media-Gateway 
Controller are supported at the SIP network boundary. This option 
provides a solution for incompatible media between networks. MG in this
configuration performs transcoding between SIP phone and the voice 
coding that is agreed upon between service providers.
 

    +---------------------+           +-----------------+
    |  +-----+   +-----+  | SIP(BICC) | +---+           |
    |  |Proxy|<->| MGC |<-------------->|CSF|           |
    |  +-----+   +-----+  |           | +---+           |
    |       ^       ^     |           |   ^     LEC 2   |
    |       |       |     |           |   |             |
    | LEC 1 |     +-V--+  |           | +-v--+  BICC    |
    | SIP   |     | MG |--------------->|BIWF|  Network |
    |Network|     +----+  |           | +----+          |
    |       |       |     |           |    ^            |
    +-------|-------|-----+           +----|------------+
            |       |                      |         
            v       v                      v        
           +---------+                  +----------+
           |SIP Phone|                  |ISDN Phone|
           +---------+                  +----------+

   Figure 15. MG used for different network transport 

In Figure 15, the media stream between the SIP phone and the BIWF has
two sections. The media negotiation between MG and BIWF can be done
either by the SDP of the SIP or the SDP of the BICC.

6. Enhanced SIP Roles

- B2BUA/MGC
The B2BUA/MGC is a signaling point between networks. It supports the 
translation/mapping between protocols such as BICC, SIP, and ISUP. 
Traffic control between networks is also a function of the MGC. When the 
MG is required in the interworking, MGC performs the signaling 
interworking and the media control interface to the MG. 

- Media Gateway (MG)
The MG supports conversion between different media types. In some 
network configurations, the MG can support media proxy function, so that 
the internal network configurations and addressing scheme can be 
independent of external addresses. Functions of the MG can be 
interworking, interworking + firewall, or as simple as router only.

7. Required Support 

Similar to the ISUP to SIP-T mapping [3], SIP with BICC extension 
mustsupport the following capabilities:
- Supports the method and procedure of pure SIP as defined by RFC 
2543.


Chang                                                          [Page 13]
Internet Draft           sipping-bicc-network	            September 2001	

- Encapsulation
- Similar to ISUP MIME type [6], the BICC MIME type must be supported 
for this extension
- Interworking/Mapping
- SDP
Depending on the role of the SIP in the network, the SDP in SIP may or 
may not exist. If the SDP exists in the SIP protocol, the media between 
two MGs should follow the specification in the SIP SDP. Otherwise, the
bearer characteristics should follow what specified in the BICC. 

- Mid-call events: These events should be mapped into the SIP INFO 
message.
- Mid-call reconfigurations due to mid-call events.

8. Network Features
- Traffic Control
Existing traffic control in the BICC message should be supported by 
enhanced SIP. Blocking/Unblocking and Reset these messages should be 
supported by encapsulated in the SIP NOTIFY/ACK messages.
- Other features: Other network features, such as automatic repeat 
attempt, hop counter procedure, call collect request procedure and etc., 
must be supported by mapping into SIP features or BICC procedures.

9. Acknowledgement

The author would like to thank Richard Hemmeter, and Hui-Lan Lu for 
their comments and suggestions.

10. Acronyms

ACM	Address Complete Message
ANM 	Answer
CFN 	Confusion 
CGB 	Circuit Group Blocking
CGBA 	Circuit Group Blocking Acknowledgement
CGU 	Circuit Group Unblocking
CGUA 	Circuit Group Unblocking Acknowledgement
CON	Connect
COT 	Continuity
CPG 	Call Progress
CQM 	Circuit Query
CQR 	Circuit Query Response
CRA 	Circuit Reservation Acknowledgement
FOT 	Forward Transfer
GRS 	Group Reset
IAM 	Initial Address Message
INF 	Information 
REL 	Release
RES 	Resume
RLC 	Release Complete RSC 	Reset Circuit
SUS 	Suspend
UCIC 	Unequipped Circuit Identification Code 


Chang                                                          [Page 14]
Internet Draft           sipping-bicc-network	            September 2001

11. References

[1]	Handley, et al, "SIP: Session Initiation Protocol," RFC 2543, 
IETF, March 1999.
 
[2]	Vemuri, Peterson, "SIP for Telephony (SIP-T): Context and 
Architectures," draft-vemuri-sip-t-context-02.txt, February 
2001.

[3]	Mainwaring, "Requirements for interworking between 
SIP/SIP-T and ISUP/BIC," T1S1.3-108/2001 T1S1.7/2001-153, 
April 2001.

[4]	ITU-T Recommendations Q.1902.1 - Q.1902.6 (2001), Bearer 
Independent Call Control protocol (CS2).

[5]	Gonzalo, Roach "ISUP to SIP Mapping," draft-ietf-sip-isup-
00.txt, November 2000.

[6] 	Zimmerer, Vemuri, Peterson, Ong, Zonoun, Watson, "MIME media 
types for ISUP and QSIG objects," draft-ietf-sip-isup-mime-
09.txt, January 2001. 

[7]	Bin-wen Ho, "Application of SIP to support BICC (Bearer Independent
Call Control," to be submitted to IETF.

12. Author's Address
Young-Fu Chang
Lucent Technologies, Inc.
PO Box 7033
1960 Lucent Lane
Naperville, IL 60566-7033
email: yfchang@lucent.com

	
APPENDICES

Appendix A

(1) INVITE sip: watson@chicago.optical-net.com SIP/2.0
Via:SIP/2.0/UDP oak.bell-tel.com
Via:SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 1 INVITE
Contact: <sip:a.g.bell@maple.bell-tel.com>
Subject: Mr. Watson, come here.
Content-Type: application/sdp
Content-length: . . .




Chang                                                          [Page 15]
Internet Draft           sipping-bicc-network	            September 2001

v=0
o=bell 53655768 2353687636 IN IP4 135.234.2.23
s=Mr. Watson, come here
t=3149328600 0
c=IN IP maple.bell-com.com
m=audio 4567 RTP/AVP 0 3 4 5
a=rtpmap:0 PCMU/8000
a=rtpmap:3 GSM/8000
a=rtpmap:4 G723/8000
a=rtpmap:5 DVI4/8000

(2)	INVITE sip:watson@chicago.optical-net.com SIP/2.0
Via: SIP/2.0/UDP pine.bell-tel.com
Via: SIP/2.0/UDP oak.bell-tel.com
Via: SIP/2.0/UDP maple.bell-tel.com
Supported: 100rel
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 1 INVITE
Contact: <sip:a.g.bell@maple.bell-tel.com>
Subject: Mr. Watson, come here.
Content-length: . . .
Content-Type: multipart/mixed; boundary=unique-boundary-1
MIME-Version: 1.0
--unique-boundary-1
Content-Type: application/SDP;
....
--unique-boundary-1
Content-Type: application/BICC; version=cs2;
Base=itu-2000
Content-Disposition: signal; handling=required
IAM (CIC=10), (Action Indicator = None), 
(Bearer Control Tunneling = tunneling to be used), 
(Calling Party addr=???), (Called Party Addr=???),
(Bearer Network Connection Characteristics = IP), 
(Bearer Control Information)
--unique-boundary-1

Note: The encoding of BICC message is binary. For readability, 
the BICC message is represented in text form in the message 
above.

(3) INVITE sip:watson@chicago.optical-net.com SIP/2.0
Via: SIP/2.0/UDP jupiter.optical-net.com
Via: SIP/2.0/UDP pine.bell-tel.com
Via: SIP/2.0/UDP oak.bell-tel.com
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com



Chang                                                          [Page 16]
Internet Draft           sipping-bicc-network	            September 2001

Cseq: 1 INVITE
Contact: <sip:a.g.bell@maple.bell-tel.com>
Subject: Mr. Watson, come here.
Content-Type: application/sdp
Content-length: . . .

(4) SIP/2.0 180 Ringing
Via: SIP/2.0/UDP pine.bell-tel.com
Via: SIP/2.0/UDP oak.bell-tel.com
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 1 INVITE
CContent-length: . . 

(5) SIP/2.0 180 Ringing
Via: SIP/2.0/UDP oak.bell-tel.com 
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 1 INVITE
Content-Type: application/BICC; version=cs2;
Base=itu-2000
Content-Disposition: signal; handling=required
ACM (CIC=10)

(6) SIP/2.0 180 Ringing
Via: SIP/2.0/UDP maple.bell-tel.com 
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 1 INVITE

(7) SIP/2.0 200 OK
Via: SIP/2.0/UDP pine.bell-tel.com
Via: SIP/2.0/UDP oak.bell-tel.com
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 1 INVITE

(8) SIP/2.0 200 OK
Via: SIP/2.0/UDP oak.bell-tel.com
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 1 INVITE
Content-length: . . .
Content-Type: application/BICC; version=cs2;
Base=itu-2000


Chang                                                          [Page 17]
Internet Draft          sipping-bicc-network	            September 2001

Content-Disposition: signal; handling=required
ANM (CIC=10)

(9) SIP/2.0 200 OK
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 1 INVITE
	
(10) SIP/2.0 ACK
Via: SIP/2.0/UDP oak.bell-tel.com
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 1 INVITE

(11) SIP/2.0 ACK
Via: SIP/2.0/UDP pine.bell-tel.com
Via: SIP/2.0/UDP oak.bell-tel.com
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 1 INVITE

(12) SIP/2.0 ACK
Via: SIP/2.0/UDP jupiter.optical-net.com
Via: SIP/2.0/UDP pine.bell-tel.com
Via: SIP/2.0/UDP oak.bell-tel.com
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 1 INVITE

(13) SIP/2.0 BYE
Via: SIP/2.0/UDP oak.bell-tel.com
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 2 BYE

(14) SIP/2.0 BYE
Via: SIP/2.0/UDP pine.bell-tel.com
Via: SIP/2.0/UDP oak.bell-tel.com
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 2 BYE

Chang                                                          [Page 18]
Internet Draft           sipping-bicc-network	            September 2001

Content-length: . . .
Content-Type: application/BICC; version=cs2;
Base=itu-2000
Content-Disposition: signal; handling=required
REL (CIC=10)

(15) SIP/2.0 BYE
Via: SIP/2.0/UDP jupiter.optical-net.com
Via: SIP/2.0/UDP pine.bell-tel.com
Via: SIP/2.0/UDP oak.bell-tel.com 
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 2 BYE 
	
(16) SIP/2.0 200 OK
Via: SIP/2.0/UDP pine.bell-tel.com
Via: SIP/2.0/UDP oak.bell-tel.com
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 2 BYE

(17) SIP/2.0 200 OK
Via: SIP/2.0/UDP oak.bell-tel.com
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 2 BYE
Content-length: . . .
Content-Type: application/BICC; version=cs2;
Base=itu-2000
Content-Disposition: signal; handling=required
RLC (CIC=10)

(18) SIP/2.0 200 OK
Via: SIP/2.0/UDP maple.bell-tel.com
From: A. Bell <sip:a.g.bell@bell-tel.com>;tag=3
To: T. Watson <sip:watson@chicago.optical-net.com>
Call-ID: 6601698@maple.bell-tel.com
Cseq: 2 BYE


Appendix B

(1) IAM (CIC=10), (Action Indicator= Connect Backwards), 
(Tunnel Indication = No), (Calling Party addr=19789492000), 
(Called Party Addr=16309792000), (T-BIWF address=BIWFa),
(Bearer Service Characteristics),(BNC-ID=5698), 
(BNC characteristics), (Codec list), (BCU-ID=A)

Chang                                                          [Page 19]
Internet Draft           sipping-bicc-network	            September 2001


(2) INVITE tel:+16309792000 SIP/2.0		
Via: SIP/2.0/UDP oak.bell-tel.com
From: tel:+19789492000;tag=3
To: tel:+16309792000
Call-ID: 6601698@oak.bell-tel.com
Cseq: 1 INVITE
Contact: <sip:admin@oak.bell-tel.com>
Content-length: . . .
Content-Type: application/BICC; version=cs2;
Base=itu-2000
Content-Disposition: signal; handling=required
IAM (CIC=10),(Action-ID= Connect Backwards), 
(Tunnel Indication = No), (Calling Party addr=19789492000), 
(Called Party Addr=16309792000), (T-BIWF address=BIWFa),
(Bearer Service Characteristics),(BNC-ID=5698),  
(BNC characteristics), (Codec list), (BCU-ID=A)

Note: The encoding of BICC message is binary. For readability, the 
BICC message is represented in text form in the message above.

(3) IAM (CIC=50), (Action Indicator = Connect Backwards), 
(Tunnel Indication = No), (Calling Party addr=19789492000), 
(Called Party Addr=16309792000), (T-BIWF address=BIWFa),
(Bearer Service Characteristics),(BNC-ID=5698), (Codec list), (BCU-
ID=A)

(4) APM (CIC=50), (Action Indicator = Selected Codec), (Selected Codec), 
(Supported Codec), (BNC-ID=5698), (BCU-ID=A)

(5) SIP/2.0 183 Session Progress
From: tel:+19789492000;tag=3
To: tel:+16309792000
Call-ID: 6601698@oak.bell-tel.com
Cseq: 1 INVITE
Contact: <sip:admin@oak.bell-tel.com>
Content-length: . . .
Content-Type: application/BICC; version=cs2;
Base=itu-2000
Content-Disposition: signal; handling=required
APM (CIC=50), (Action Indicator = Codec Selected), (Selected Codec), 
(Supported Codec), (BNC-ID=5698), (BCU-ID=A)

(6) APM (CIC=10), (Action Indicator = Codec Selected), (Selected Codec), 
(Supported Codec), (BNC-ID=5698), (BCU-ID=A)







Expires: March 2002

Chang                                                          [Page 20]