US20100251317A1 - Systems and methods for connecting large numbers of cable modems - Google Patents
Systems and methods for connecting large numbers of cable modems Download PDFInfo
- Publication number
- US20100251317A1 US20100251317A1 US12/813,649 US81364910A US2010251317A1 US 20100251317 A1 US20100251317 A1 US 20100251317A1 US 81364910 A US81364910 A US 81364910A US 2010251317 A1 US2010251317 A1 US 2010251317A1
- Authority
- US
- United States
- Prior art keywords
- cmts
- upstream
- cms
- channels
- virtual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2801—Broadband local area networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2854—Wide area networks, e.g. public data networks
- H04L12/2856—Access arrangements, e.g. Internet access
- H04L12/2858—Access network architectures
- H04L12/2861—Point-to-multipoint connection from the data network to the subscribers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2854—Wide area networks, e.g. public data networks
- H04L12/2856—Access arrangements, e.g. Internet access
- H04L12/2869—Operational details of access network equipments
- H04L12/2878—Access multiplexer, e.g. DSLAM
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0896—Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0896—Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
- H04L41/0897—Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities by horizontal or vertical scaling of resources, or by migrating entities, e.g. virtual resources or entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5003—Managing SLA; Interaction between SLA and QoS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/02—Capturing of monitoring data
- H04L43/026—Capturing of monitoring data using flow identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Definitions
- the present invention relates generally to data transfer and, more particularly, to data transmission via a cable modem system.
- CMTS cable modem termination system
- RF radio frequency
- One or more upstream communication channels may be bundled with one or more downstream communication channels to form a Media Access Control (MAC) domain.
- the MAC domain provides a broadcast network impression, such that a packet sent on an upstream channel may be broadcast to all of the cable modems connected to the downstream channel.
- the CMTS can have one or more MAC domains, where each of the MAC domains may be associated with one or more cable modems.
- DOCSIS Data-Over-Cable Service Interface Specification
- One aspect consistent with the principles of the invention includes a system that assigns identifiers to devices communicating via a number of virtual channels.
- the system assigns identifiers to the devices and determines whether additional identifiers are needed. When additional identifiers are needed, the system creates a new virtual channel and reuses the identifiers for the new virtual channel.
- a CMTS in another aspect consistent with the principles of the invention, includes a downstream processor, an upstream processor, and a system manager.
- the downstream processor is configured to transmit data to cable modems via one or more downstream channels.
- the upstream processor is configured to receive data from the cable modems via one or more upstream channels, where at least one of the one or more upstream channels includes multiple virtual channels.
- the system manager is configured to assign identifiers to the cable modems, determine whether additional identifiers are needed, create a new virtual channel when additional identifiers are needed, and reuse the identifiers for the new virtual channel.
- a method for allocating transmission opportunities for communicating via a number of virtual channels includes receiving bandwidth requests from the devices via the virtual channels, where the bandwidth requests include identifiers; identifying the devices based on the identifiers and the virtual channels on which the bandwidth requests were received; and allocating transmission opportunities for the identified devices.
- a method for identifying security information associated with communications with a device includes creating an identifier based on an address of the device and a security identifier; and determining, from the identifier, the security information associated with communications with the device.
- FIG. 1 is a block diagram illustrating an exemplary cable system in which systems and methods consistent with principles of the invention may be implemented;
- FIG. 2 is an exemplary diagram of communication channels that may be used for communication in the cable system of FIG. 1 according to an implementation consistent with the principles of the invention
- FIG. 3 is an exemplary diagram of an upstream channel of FIG. 2 according to an implementation consistent with the principles of the invention
- FIG. 4 is an exemplary diagram of a virtual MAC domain according to an implementation consistent with the principles of the invention.
- FIG. 5 is an exemplary diagram of the CMTS of FIG. 1 according to an implementation consistent with the principles of the invention
- FIG. 6 is a diagram of an exemplary table that may be used by the CMTS of FIG. 5 according to an implementation consistent with the principles of the invention
- FIG. 7 is a flowchart of exemplary processing for assigning service identifiers in a manner consistent with the principles of the invention.
- FIG. 8 is a flowchart of exemplary processing for allocating transmission opportunities according to an implementation consistent with the principles of the invention.
- FIG. 9 is a flowchart of exemplary processing for using security association identifiers in a manner consistent with the principles of the invention.
- Systems and methods consistent with the principles of the invention provide virtual upstream channel techniques and reuse service identifiers to thereby permit an increased number of cable modems to connect to a CMTS.
- FIG. 1 is a block diagram illustrating an exemplary cable system 100 in which systems and methods consistent with the principles of the invention may be implemented.
- System 100 may include N (where N ⁇ 1) cable modems (CMs) 110 - 1 , 110 - 2 , . . . , 110 -N (referred to collectively as CMs 110 ) connected to a CMTS 120 and a network 130 .
- Network 130 may include any type of network, such as a wide area network, a local area network, an intranet, the Internet, the Public Switched Telephone Network, or another type of network.
- CMs 110 may include devices, such as cable modems, that are available from a number of manufacturers. CMs 110 may receive data from CMTS 120 via a downstream path and send the data to one or more connected devices, such as computers, televisions, telephones, or other types of devices that receive, process, and/or transmit data. CMs 110 may also transmit data to CMTS 120 via an upstream path.
- devices such as cable modems, that are available from a number of manufacturers.
- CMs 110 may receive data from CMTS 120 via a downstream path and send the data to one or more connected devices, such as computers, televisions, telephones, or other types of devices that receive, process, and/or transmit data.
- CMs 110 may also transmit data to CMTS 120 via an upstream path.
- CMTS 120 may facilitate communication between CMs 110 and network 130 .
- CMTS 120 may be maintained by a cable company at a facility in relative proximity to CMs 110 .
- CMTS 120 may transmit data to CMs 110 via downstream channels on the downstream path and receive data from CMs 110 via upstream channels on the upstream path.
- a group of CMs 110 may be served by 16 upstream channels and 4 downstream channels.
- the downstream channels may be higher bandwidth channels than the upstream channels.
- CMs 110 may share both upstream and downstream channels by time-multiplexing data on each of these channels.
- CMs 110 transmit data to CMTS 120 on the upstream channels during pre-assigned time slots.
- FIG. 2 illustrates exemplary upstream and downstream communication between CMs 110 and CMTS 120 according to an implementation consistent with the principles of the invention.
- CMs 110 and CMTS 120 interconnect via upstream channels 210 - 1 , 210 - 2 , . . . , 210 -X (referred to collectively as upstream channels 210 ) and downstream channels 220 - 1 , 220 - 2 , . . . , 220 -Y (referred to collectively as downstream channels 220 ); where X ⁇ 1 and Y ⁇ 1.
- Each upstream channel 210 - x and downstream channel 220 - y may communicate via a different frequency band.
- Each upstream channel 210 - x may further include multiple “virtual” channels.
- FIG. 3 is an exemplary diagram of an upstream channel 210 - x according to an implementation consistent with the principles of the invention. As shown in FIG. 3 , upstream channel 210 - x may include multiple virtual upstream channels 310 - 1 , 310 - 2 , . . . , 310 -Z (referred to collectively as virtual upstream channels 310 ), where Z ⁇ 2.
- Each of virtual upstream channels 310 may include a multiplexed timeslot of the upstream channel frequency.
- Each of virtual upstream channels 310 may further be associated with different transmission characteristics of CMs 110 .
- Upstream channels 210 from CMs 110 may, thus, include frequency bandwidth divided into multiple channels, with each channel possibly further time division multiplexed into multiple virtual upstream channels.
- FIG. 4 is an exemplary diagram of a virtual MAC domain 400 that may be formed in accordance with the principles of the invention.
- a virtual upstream channel such as virtual upstream channel 310 - z, may be linked with downstream channel 220 - y to form virtual MAC domain 400 .
- CMTS 120 may include one or more virtual MAC domains 400 .
- Each virtual MAC domain 400 may be associated with one or more of CMs 110 .
- virtual MAC domain 400 may include one or more of virtual upstream channels 310 and/or one or more of downstream channels 220 in implementations consistent with the principles of the invention.
- FIG. 5 is an exemplary functional block diagram of CMTS 120 according to an implementation consistent with the principles of the invention.
- CMTS 120 may include a scheduler 510 , a downstream processor 520 , an upstream processor 530 , a cable modem/service flow (CM/SF) manager 540 , and a system manager 550 .
- Downstream processor 520 may connect to the downstream path (from CMTS 120 to CMs 110 ).
- Upstream processor 530 may connect to the upstream path (from CMs 110 to CMTS 120 ).
- Scheduler 510 may include logic that schedules transmission opportunities in the upstream direction. Scheduler 510 may receive requests for the transmission of data from CMs 110 and allocate transmission opportunities to CMs 110 for the transmission of some or all of the data.
- Downstream processor 520 may include logic that receives information regarding the transmission opportunities allocated by scheduler 510 and generates messages, such as manufacturing automation protocol (MAP) messages, from this information.
- a MAP message is a downstream message that informs CMs 110 when to transmit on the upstream path.
- Downstream processor 520 may also include logic that receives data intended for CMs 110 and transmits the data, possibly in the form of one or more packets, to CMs 110 .
- Upstream processor 530 may include logic that separates data from control messages that it receives from CMs 110 on the upstream path. Some of the control messages may include bandwidth requests for future transmission opportunities. Upstream processor 530 may also buffer data fragments (e.g., fragments of a packet). Upstream processor 530 may reassemble the data fragments and transmit the reassembled fragments via network 130 ( FIG. 1 ).
- CM/SF manager 540 may include logic that tracks information regarding which CMs 110 are connected, the service flows associated with each CM 110 , and the quality of service associated with each of the service flows. CM/SF manager 540 may use data gathered through the process of registration and the setting up of service flows to determine this information.
- System manager 550 may include logic that controls many aspects of CMTS 120 .
- system manager 550 may control the creation of new virtual upstream channels and reuse of service identifiers (SIDs) and security association identifiers (SAIDs).
- SIDs may be used by CMs 110 for bandwidth requests and by scheduler 510 for scheduling transmission opportunities for CMs 110 .
- the SAIDs may be associated with security information that CMTS 120 and CMs 110 share to support secure communications between them.
- the shared information may include traffic encryption keys and initialization vectors (e.g., Cipher Block Chaining (CBC) initialization vectors) that may be exchanged using DOCSIS MAC management messages.
- CBC Cipher Block Chaining
- SAIDs are described in more detail in Data-Over-Cable Service Interface Specifications, “Baseline Privacy Plus Interface Specification SP-BPI+-I04-000407,” Apr. 7, 2000.
- System manager 550 may assign the SIDs and the SAIDs based on the virtual MAC domains. In other words, system manager 550 may reuse the limited number of SIDs and SAIDs within each of the virtual MAC domains. As a result, the number of CMs 110 that may connect to CMTS 120 is practically unlimited.
- system manager 550 Whenever system manager 550 runs out of available SIDs within a virtual MAC domain, system manager 550 creates a new virtual upstream channel and uses the new virtual upstream channel to create a new virtual MAC domain. System manager 550 may then reuse the SIDs within the new virtual MAC domain. Because the SIDs are reused, system manager 550 cannot use the SIDs to uniquely identify CMs 110 . Therefore, system manager 550 may use additional information to identify CMs 110 . For example, system manager 550 may use a combination of the SID and the channel number associated with each of virtual upstream channels 310 used by a CM 110 - n to uniquely identify CM 110 - n for scheduling transmission opportunities.
- system manager 550 Whenever system manager 550 runs out of available SAIDs, system manager 550 simply reuses them. As a result, system manager 550 cannot use the SAIDs to uniquely identify security information. Therefore, system manager 550 may use additional information to identify the security information. For example, system manager 550 may use a combination of the SAID and the MAC address of a CM 110 - n to uniquely identify security information associated with communication of CM 110 - n.
- System manager 550 may maintain a table that maps an identifier formed by combining the MAC address of a CM 110 - n and the SAID to an encryption key and/or an encryption technique or algorithm.
- FIG. 6 is a diagram of an exemplary table 600 according to an implementation consistent with the principles of the invention.
- an identifier formed by combining the MAC address x0012A5BFFF and the SAID 112 maps to an encryption key of A and an encryption technique of 56-bit Data Encryption Standard (DES).
- DES Data Encryption Standard
- FIG. 7 is a flowchart of exemplary processing for assigning SIDs in a manner consistent with the principles of the invention.
- CMTS 120 may assign SIDs to CMs 110 on a periodic or regular basis (act 710 ). For example, when new CMs 110 connect to CMTS 120 , CMTS 120 may assign the new CMs 110 any available SIDs for one or more available virtual upstream channels 310 . CMTS 120 may use the SIDs when identifying CMs 110 communicating via upstream channels 210 . The same group of SIDs may be associated with each one of virtual upstream channels 310 within a particular upstream channel 210 - x . CMTS 120 may reuse the SIDs for different ones of virtual upstream channels 310 .
- CMTS 120 When CMTS 120 runs out of available SIDs, CMTS 120 creates a new virtual upstream channel (acts 720 and 730 ). CMTS 120 may then form a new virtual MAC domain that links the new virtual upstream channel to one of downstream channels 220 (act 740 ). CMTS 120 may reuse the SIDs for the new virtual MAC domain (act 750 ). CMTS 120 may then assign one or more of these reused SIDs to one or more CMs 110 desiring to connect to CMTS 120 on the new virtual upstream channel.
- FIG. 8 is a flowchart of exemplary processing for allocating transmission opportunities according to an implementation consistent with the principles of the invention.
- CMTS 120 may receive bandwidth requests from one or more of CMs 110 (act 810 ).
- the bandwidth request for CM 110 - n may include the SID assigned to CM 110 - n and, possibly, the channel number of one of virtual upstream channels 310 used by CM 110 - n.
- CMTS 120 may use a combination of the SID and the channel number of the virtual upstream channel 310 to uniquely identify CM 110 - n (act 820 ). CMTS 120 may then allocate a transmission opportunity for CM 110 - n (e.g., a time slot during which CM 110 - n can transmit) to satisfy some or all of its request (act 830 ). CMTS 120 may generate a MAP message that identifies this allocated time slot and send the MAP message, possibly along with other information, to CM 110 - n. CM 110 - n may, thereafter, transmit data during its allocated time slot.
- CM 110 - n may, thereafter, transmit data during its allocated time slot.
- FIG. 9 is a flowchart of exemplary processing for using SAIDs in a manner consistent with the principles of the invention.
- CMTS 120 may use SAIDs for messages, such as DOCSIS MAC management messages, exchanged with CMs 110 .
- CMTS 120 may assign available SAIDs for communications with CMs 110 .
- CMTS 120 may create an identifier by combining the SAID assigned to CM 110 - n and the MAC address of CM 110 - n , for example, (act 910 ).
- CMTS 120 may use this identifier to identify an encryption key and/or an encryption technique used for communication with CM 110 - n (act 920 ).
- CMTS 120 When CMTS 120 runs out of available SAIDs, CMTS 120 simply reuses them (acts 930 and 940 ). Because CMs 110 are identified based on their assigned SAIDs as well as their MAC addresses, reusing the SAIDs does not create any problems when identifying CMs 110 or encryption keys and/or encryption techniques used in communicating with CMs 110 .
- Systems and methods consistent with the principles of the invention provide mechanisms for increasing the number of cable modems that may connect to a CMTS. For example, the systems and methods reuse service identifiers and/or security association identifiers to permit additional cable modems to connect.
- systems and methods have been described as processing data.
- systems and methods consistent with the principles of the invention may process different forms of data, such as packet data and data units.
- a data unit may include any form of data.
- logic that performs one or more functions.
- This logic may include hardware, such as an application specific integrated circuit, software, or a combination of hardware and software.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Identifiers are assigned to devices communicating via a number of virtual channels. If additional identifiers are needed, one or more new virtual channels are created and the identifiers are reused for the new virtual channel.
Description
- This application claims priority under 35 U.S.C. §119 based on U.S. Provisional Application No. 60/436,008, filed Dec. 26, 2002, the disclosure of which is incorporated herein by reference.
- 1. Field of the Invention
- The present invention relates generally to data transfer and, more particularly, to data transmission via a cable modem system.
- 2. Description of Related Art
- Conventional cable modem systems include a cable modem termination system (CMTS) connected to one or more cable modems via a coaxial cable. The CMTS communicates with the cable modems via a radio frequency (RF) interface and provides packet forwarding functions via a network side interface. Separate frequency bands are used for upstream and downstream communication on the coaxial cable. For example, the upstream communication may take place on communication channels within the 5-42 MHz frequency band and the downstream communication may take place on communication channels within the 88-860 MHz frequency band.
- One or more upstream communication channels may be bundled with one or more downstream communication channels to form a Media Access Control (MAC) domain. The MAC domain provides a broadcast network impression, such that a packet sent on an upstream channel may be broadcast to all of the cable modems connected to the downstream channel. The CMTS can have one or more MAC domains, where each of the MAC domains may be associated with one or more cable modems.
- Data-Over-Cable Service Interface Specification (DOCSIS) is the standard for cable modem systems throughout the world. DOCSIS dictates that service identifiers be assigned to the cable modems by the CMTS. Each cable modem is assigned a different one of the service identifiers. As a result, there is a limit on the number of cable modems that can connect to the CMTS. This limit is based on the number of available service identifiers. In existing systems, there are approximately 8,000 different service identifiers, resulting in approximately 8,000 different cable modems that can connect to the CMTS.
- In an embedded DOCSIS environment where there are devices that do not require large amounts of data to be exchanged, the 8,000 limit on the number of cable modems is inadequate.
- As a result, there is a need for systems and methods for increasing the number of cable modems that may connect to a CMTS.
- Systems and methods consistent with the principles of the invention address this and other needs by using virtual upstream channel techniques to permit an increased number of cable modems to connect to a CMTS. The virtual upstream channel techniques permit the service identifiers to be reused.
- One aspect consistent with the principles of the invention includes a system that assigns identifiers to devices communicating via a number of virtual channels. The system assigns identifiers to the devices and determines whether additional identifiers are needed. When additional identifiers are needed, the system creates a new virtual channel and reuses the identifiers for the new virtual channel.
- In another aspect consistent with the principles of the invention, a CMTS is provided. The system includes a downstream processor, an upstream processor, and a system manager. The downstream processor is configured to transmit data to cable modems via one or more downstream channels. The upstream processor is configured to receive data from the cable modems via one or more upstream channels, where at least one of the one or more upstream channels includes multiple virtual channels. The system manager is configured to assign identifiers to the cable modems, determine whether additional identifiers are needed, create a new virtual channel when additional identifiers are needed, and reuse the identifiers for the new virtual channel.
- In yet another aspect consistent with the principles of the invention, a method for allocating transmission opportunities for communicating via a number of virtual channels is provided. The method includes receiving bandwidth requests from the devices via the virtual channels, where the bandwidth requests include identifiers; identifying the devices based on the identifiers and the virtual channels on which the bandwidth requests were received; and allocating transmission opportunities for the identified devices.
- In a further aspect consistent with the principles of the invention, a method for identifying security information associated with communications with a device is provided. The method includes creating an identifier based on an address of the device and a security identifier; and determining, from the identifier, the security information associated with communications with the device.
- The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate an embodiment of the invention and, together with the description, explain the invention. In the drawings,
-
FIG. 1 is a block diagram illustrating an exemplary cable system in which systems and methods consistent with principles of the invention may be implemented; -
FIG. 2 is an exemplary diagram of communication channels that may be used for communication in the cable system ofFIG. 1 according to an implementation consistent with the principles of the invention; -
FIG. 3 is an exemplary diagram of an upstream channel ofFIG. 2 according to an implementation consistent with the principles of the invention; -
FIG. 4 is an exemplary diagram of a virtual MAC domain according to an implementation consistent with the principles of the invention; -
FIG. 5 is an exemplary diagram of the CMTS ofFIG. 1 according to an implementation consistent with the principles of the invention; -
FIG. 6 is a diagram of an exemplary table that may be used by the CMTS ofFIG. 5 according to an implementation consistent with the principles of the invention; -
FIG. 7 is a flowchart of exemplary processing for assigning service identifiers in a manner consistent with the principles of the invention; -
FIG. 8 is a flowchart of exemplary processing for allocating transmission opportunities according to an implementation consistent with the principles of the invention; and -
FIG. 9 is a flowchart of exemplary processing for using security association identifiers in a manner consistent with the principles of the invention. - The following detailed description of the invention refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements. Also, the following detailed description does not limit the invention. Instead, the scope of the invention is defined by the appended claims and equivalents.
- Systems and methods consistent with the principles of the invention provide virtual upstream channel techniques and reuse service identifiers to thereby permit an increased number of cable modems to connect to a CMTS.
-
FIG. 1 is a block diagram illustrating anexemplary cable system 100 in which systems and methods consistent with the principles of the invention may be implemented.System 100 may include N (where N≧1) cable modems (CMs) 110-1, 110-2, . . . , 110-N (referred to collectively as CMs 110) connected to aCMTS 120 and anetwork 130. Network 130 may include any type of network, such as a wide area network, a local area network, an intranet, the Internet, the Public Switched Telephone Network, or another type of network. -
CMs 110 may include devices, such as cable modems, that are available from a number of manufacturers.CMs 110 may receive data from CMTS 120 via a downstream path and send the data to one or more connected devices, such as computers, televisions, telephones, or other types of devices that receive, process, and/or transmit data.CMs 110 may also transmit data to CMTS 120 via an upstream path. - CMTS 120 may facilitate communication between
CMs 110 andnetwork 130. CMTS 120 may be maintained by a cable company at a facility in relative proximity toCMs 110.CMTS 120 may transmit data toCMs 110 via downstream channels on the downstream path and receive data fromCMs 110 via upstream channels on the upstream path. For example, a group ofCMs 110 may be served by 16 upstream channels and 4 downstream channels. The downstream channels may be higher bandwidth channels than the upstream channels.CMs 110 may share both upstream and downstream channels by time-multiplexing data on each of these channels.CMs 110 transmit data toCMTS 120 on the upstream channels during pre-assigned time slots. -
FIG. 2 illustrates exemplary upstream and downstream communication betweenCMs 110 andCMTS 120 according to an implementation consistent with the principles of the invention. As illustrated inFIG. 2 ,CMs 110 andCMTS 120 interconnect via upstream channels 210-1, 210-2, . . . , 210-X (referred to collectively as upstream channels 210) and downstream channels 220-1, 220-2, . . . , 220-Y (referred to collectively as downstream channels 220); where X≧1 and Y≧1. - Each upstream channel 210-x and downstream channel 220-y may communicate via a different frequency band. Each upstream channel 210-x may further include multiple “virtual” channels.
FIG. 3 is an exemplary diagram of an upstream channel 210-x according to an implementation consistent with the principles of the invention. As shown inFIG. 3 , upstream channel 210-x may include multiple virtual upstream channels 310-1, 310-2, . . . , 310-Z (referred to collectively as virtual upstream channels 310), where Z≧2. - Each of virtual
upstream channels 310 may include a multiplexed timeslot of the upstream channel frequency. Each of virtualupstream channels 310 may further be associated with different transmission characteristics ofCMs 110.Upstream channels 210 fromCMs 110 may, thus, include frequency bandwidth divided into multiple channels, with each channel possibly further time division multiplexed into multiple virtual upstream channels. -
FIG. 4 is an exemplary diagram of a virtual MAC domain 400 that may be formed in accordance with the principles of the invention. UsingCM 110 by way of example, a virtual upstream channel, such as virtual upstream channel 310-z, may be linked with downstream channel 220-y to form virtual MAC domain 400.CMTS 120 may include one or more virtual MAC domains 400. Each virtual MAC domain 400 may be associated with one or more ofCMs 110. Even though virtual MAC domain 400 has been shown as including a single virtual upstream channel 310-z and a single downstream channel 220-y, virtual MAC domain 400 may include one or more of virtualupstream channels 310 and/or one or more ofdownstream channels 220 in implementations consistent with the principles of the invention. -
FIG. 5 is an exemplary functional block diagram ofCMTS 120 according to an implementation consistent with the principles of the invention.CMTS 120 may include ascheduler 510, adownstream processor 520, anupstream processor 530, a cable modem/service flow (CM/SF)manager 540, and asystem manager 550.Downstream processor 520 may connect to the downstream path (fromCMTS 120 to CMs 110).Upstream processor 530 may connect to the upstream path (fromCMs 110 to CMTS 120). -
Scheduler 510 may include logic that schedules transmission opportunities in the upstream direction.Scheduler 510 may receive requests for the transmission of data fromCMs 110 and allocate transmission opportunities toCMs 110 for the transmission of some or all of the data. -
Downstream processor 520 may include logic that receives information regarding the transmission opportunities allocated byscheduler 510 and generates messages, such as manufacturing automation protocol (MAP) messages, from this information. A MAP message is a downstream message that informsCMs 110 when to transmit on the upstream path.Downstream processor 520 may also include logic that receives data intended forCMs 110 and transmits the data, possibly in the form of one or more packets, toCMs 110. -
Upstream processor 530 may include logic that separates data from control messages that it receives fromCMs 110 on the upstream path. Some of the control messages may include bandwidth requests for future transmission opportunities.Upstream processor 530 may also buffer data fragments (e.g., fragments of a packet).Upstream processor 530 may reassemble the data fragments and transmit the reassembled fragments via network 130 (FIG. 1 ). - CM/
SF manager 540 may include logic that tracks information regarding whichCMs 110 are connected, the service flows associated with eachCM 110, and the quality of service associated with each of the service flows. CM/SF manager 540 may use data gathered through the process of registration and the setting up of service flows to determine this information. -
System manager 550 may include logic that controls many aspects ofCMTS 120. For example,system manager 550 may control the creation of new virtual upstream channels and reuse of service identifiers (SIDs) and security association identifiers (SAIDs). The SIDs may be used byCMs 110 for bandwidth requests and byscheduler 510 for scheduling transmission opportunities forCMs 110. The SAIDs may be associated with security information thatCMTS 120 andCMs 110 share to support secure communications between them. The shared information may include traffic encryption keys and initialization vectors (e.g., Cipher Block Chaining (CBC) initialization vectors) that may be exchanged using DOCSIS MAC management messages. SAIDs are described in more detail in Data-Over-Cable Service Interface Specifications, “Baseline Privacy Plus Interface Specification SP-BPI+-I04-000407,” Apr. 7, 2000. -
System manager 550 may assign the SIDs and the SAIDs based on the virtual MAC domains. In other words,system manager 550 may reuse the limited number of SIDs and SAIDs within each of the virtual MAC domains. As a result, the number ofCMs 110 that may connect toCMTS 120 is practically unlimited. - Whenever
system manager 550 runs out of available SIDs within a virtual MAC domain,system manager 550 creates a new virtual upstream channel and uses the new virtual upstream channel to create a new virtual MAC domain.System manager 550 may then reuse the SIDs within the new virtual MAC domain. Because the SIDs are reused,system manager 550 cannot use the SIDs to uniquely identifyCMs 110. Therefore,system manager 550 may use additional information to identifyCMs 110. For example,system manager 550 may use a combination of the SID and the channel number associated with each of virtualupstream channels 310 used by a CM 110-n to uniquely identify CM 110-n for scheduling transmission opportunities. - Whenever
system manager 550 runs out of available SAIDs,system manager 550 simply reuses them. As a result,system manager 550 cannot use the SAIDs to uniquely identify security information. Therefore,system manager 550 may use additional information to identify the security information. For example,system manager 550 may use a combination of the SAID and the MAC address of a CM 110-n to uniquely identify security information associated with communication of CM 110-n. -
System manager 550 may maintain a table that maps an identifier formed by combining the MAC address of a CM 110-n and the SAID to an encryption key and/or an encryption technique or algorithm.FIG. 6 is a diagram of an exemplary table 600 according to an implementation consistent with the principles of the invention. In the exemplary entry of table 600, an identifier formed by combining the MAC address x0012A5BFFF and theSAID 112 maps to an encryption key of A and an encryption technique of 56-bit Data Encryption Standard (DES). -
FIG. 7 is a flowchart of exemplary processing for assigning SIDs in a manner consistent with the principles of the invention.CMTS 120 may assign SIDs toCMs 110 on a periodic or regular basis (act 710). For example, whennew CMs 110 connect toCMTS 120,CMTS 120 may assign thenew CMs 110 any available SIDs for one or more available virtualupstream channels 310.CMTS 120 may use the SIDs when identifyingCMs 110 communicating viaupstream channels 210. The same group of SIDs may be associated with each one of virtualupstream channels 310 within a particular upstream channel 210-x.CMTS 120 may reuse the SIDs for different ones of virtualupstream channels 310. - When
CMTS 120 runs out of available SIDs,CMTS 120 creates a new virtual upstream channel (acts 720 and 730).CMTS 120 may then form a new virtual MAC domain that links the new virtual upstream channel to one of downstream channels 220 (act 740).CMTS 120 may reuse the SIDs for the new virtual MAC domain (act 750).CMTS 120 may then assign one or more of these reused SIDs to one ormore CMs 110 desiring to connect toCMTS 120 on the new virtual upstream channel. -
FIG. 8 is a flowchart of exemplary processing for allocating transmission opportunities according to an implementation consistent with the principles of the invention. Periodically,CMTS 120 may receive bandwidth requests from one or more of CMs 110 (act 810). The bandwidth request for CM 110-n, for example, may include the SID assigned to CM 110-n and, possibly, the channel number of one of virtualupstream channels 310 used by CM 110-n. -
CMTS 120 may use a combination of the SID and the channel number of the virtualupstream channel 310 to uniquely identify CM 110-n (act 820).CMTS 120 may then allocate a transmission opportunity for CM 110-n (e.g., a time slot during which CM 110-n can transmit) to satisfy some or all of its request (act 830).CMTS 120 may generate a MAP message that identifies this allocated time slot and send the MAP message, possibly along with other information, to CM 110-n. CM 110-n may, thereafter, transmit data during its allocated time slot. -
FIG. 9 is a flowchart of exemplary processing for using SAIDs in a manner consistent with the principles of the invention.CMTS 120 may use SAIDs for messages, such as DOCSIS MAC management messages, exchanged withCMs 110.CMTS 120 may assign available SAIDs for communications withCMs 110.CMTS 120 may create an identifier by combining the SAID assigned to CM 110-n and the MAC address of CM 110-n, for example, (act 910).CMTS 120 may use this identifier to identify an encryption key and/or an encryption technique used for communication with CM 110-n (act 920). - When
CMTS 120 runs out of available SAIDs,CMTS 120 simply reuses them (acts 930 and 940). BecauseCMs 110 are identified based on their assigned SAIDs as well as their MAC addresses, reusing the SAIDs does not create any problems when identifyingCMs 110 or encryption keys and/or encryption techniques used in communicating withCMs 110. - Systems and methods consistent with the principles of the invention provide mechanisms for increasing the number of cable modems that may connect to a CMTS. For example, the systems and methods reuse service identifiers and/or security association identifiers to permit additional cable modems to connect.
- The foregoing description of preferred embodiments of the present invention provides illustration and description, but is not intended to be exhaustive or to limit the invention to the precise form disclosed. Modifications and variations are possible in light of the above teachings or may be acquired from practice of the invention.
- For example, although described in the context of a cable routing system, concepts consistent with the principles of the invention can be implemented in any system, device, or chip that communicates with another system, device, or chip via one or more buses.
- In addition, systems and methods have been described as processing data. In implementations consistent with the principles of the invention, systems and methods consistent with the principles of the invention may process different forms of data, such as packet data and data units. A data unit may include any form of data.
- Also, while series of acts have been described with regard to the flowcharts of
FIGS. 7-9 , the order of the acts may differ in other implementations consistent with the principles of the invention. Non-dependent acts may be performed in parallel. - Further, certain portions of the invention have been described as “logic” that performs one or more functions. This logic may include hardware, such as an application specific integrated circuit, software, or a combination of hardware and software.
- No element, act, or instruction used in the description of the present application should be construed as critical or essential to the invention unless explicitly described as such. Also, as used herein, the article “a” is intended to include one or more items. Where only one item is intended, the term “one” or similar language is used. The scope of the invention is defined by the claims and their equivalents.
Claims (2)
1. A method for assigning identifiers to devices communicating via a plurality of virtual channels, comprising:
assigning identifiers to the devices;
determining whether additional identifiers are needed;
creating a new virtual channel when additional identifiers are needed; and
reusing the identifiers for the new virtual channel.
2-39. (canceled)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/813,649 US20100251317A1 (en) | 2002-12-26 | 2010-06-11 | Systems and methods for connecting large numbers of cable modems |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US43600802P | 2002-12-26 | 2002-12-26 | |
US10/378,858 US7761598B1 (en) | 2002-12-26 | 2003-03-05 | Systems and methods for connecting large numbers of cable modems |
US12/813,649 US20100251317A1 (en) | 2002-12-26 | 2010-06-11 | Systems and methods for connecting large numbers of cable modems |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/378,858 Continuation US7761598B1 (en) | 2002-12-26 | 2003-03-05 | Systems and methods for connecting large numbers of cable modems |
Publications (1)
Publication Number | Publication Date |
---|---|
US20100251317A1 true US20100251317A1 (en) | 2010-09-30 |
Family
ID=42332733
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/378,858 Active 2028-02-08 US7761598B1 (en) | 2002-12-26 | 2003-03-05 | Systems and methods for connecting large numbers of cable modems |
US12/813,649 Abandoned US20100251317A1 (en) | 2002-12-26 | 2010-06-11 | Systems and methods for connecting large numbers of cable modems |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/378,858 Active 2028-02-08 US7761598B1 (en) | 2002-12-26 | 2003-03-05 | Systems and methods for connecting large numbers of cable modems |
Country Status (1)
Country | Link |
---|---|
US (2) | US7761598B1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070011735A1 (en) * | 2005-07-06 | 2007-01-11 | Cable Television Laboratories, Inc. | Open standard conditional access system |
US8230464B2 (en) * | 2006-09-26 | 2012-07-24 | Viasat, Inc. | DOCSIS MAC chip adapted |
US8660142B2 (en) * | 2008-09-25 | 2014-02-25 | Viasat, Inc. | Scheduling virtual bandwidth requests |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5883901A (en) * | 1995-09-22 | 1999-03-16 | Hewlett-Packard Company | Communications system including synchronization information for timing upstream transmission of data and ability to vary slot duration |
US6070246A (en) * | 1998-02-04 | 2000-05-30 | 3Com Corporation | Method and system for secure cable modem initialization |
US6185624B1 (en) * | 1998-02-04 | 2001-02-06 | 3Com Corporation | Method and system for cable modem management of a data-over-cable system |
US6331987B1 (en) * | 1998-05-27 | 2001-12-18 | 3Com Corporation | Method and system for bundling data in a data-over-cable system |
US20020052927A1 (en) * | 2000-11-20 | 2002-05-02 | Lg Electronics Inc. | Initialization file downloading apparatus and method of cable modem |
US6438123B1 (en) * | 1998-11-10 | 2002-08-20 | Cisco Technology, Inc. | Method and apparatus for supporting header suppression and multiple microflows in a network |
US6490727B1 (en) * | 1999-10-07 | 2002-12-03 | Harmonic, Inc. | Distributed termination system for two-way hybrid networks |
US6510162B1 (en) * | 1998-05-27 | 2003-01-21 | 3Com Corporation | System and method for managing channel usage in a data over cable system |
US20030035442A1 (en) * | 2001-04-14 | 2003-02-20 | Eng John Wai Tsang | Full-service broadband cable modem system |
US20030202534A1 (en) * | 2002-04-25 | 2003-10-30 | Cloonan Thomas J. | Method and system for adjusting bandwidth in a hybrid-fiber coaxial network using an intelligently controlled dynamic RF combiner |
US6950399B1 (en) * | 2000-07-06 | 2005-09-27 | Matsushita Electric Industrial Co., Ltd. | System and associated method for scheduling transport of variable bit-rate data over a network |
US7085287B1 (en) * | 2001-06-27 | 2006-08-01 | Cisco Technology, Inc. | Map routing technique implemented in access networks |
US7113484B1 (en) * | 1999-10-13 | 2006-09-26 | Cisco Technology, Inc. | Downstream channel change technique implemented in an access network |
US7496110B1 (en) * | 2001-08-21 | 2009-02-24 | Juniper Networks, Inc. | Virtual upstream channel scheduling in broadband communication systems |
US7639617B2 (en) * | 2001-06-27 | 2009-12-29 | Cisco Technology, Inc. | Upstream physical interface for modular cable modem termination system |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5809012A (en) * | 1991-01-31 | 1998-09-15 | Fujitsu Limited | Connectionless communication system |
US5734656A (en) * | 1995-07-12 | 1998-03-31 | Bay Networks, Inc. | Method and apparatus for dynamically allocating bandwidth on a TDM bus |
US5835723A (en) * | 1995-12-28 | 1998-11-10 | Intel Corporation | Dynamic assignment of multicast addresses |
US6028860A (en) * | 1996-10-23 | 2000-02-22 | Com21, Inc. | Prioritized virtual connection transmissions in a packet to ATM cell cable network |
US6028933A (en) * | 1997-04-17 | 2000-02-22 | Lucent Technologies Inc. | Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network |
US6862622B2 (en) * | 1998-07-10 | 2005-03-01 | Van Drebbel Mariner Llc | Transmission control protocol/internet protocol (TCP/IP) packet-centric wireless point to multi-point (PTMP) transmission system architecture |
US7216175B1 (en) * | 2000-01-20 | 2007-05-08 | Cisco Systems, Inc. | System and method for determining subscriber information |
US6795851B1 (en) * | 2000-06-19 | 2004-09-21 | Path Communications Inc. | Web-based client/server communication channel with automated client-side channel endpoint feature detection and selection |
CA2327898A1 (en) * | 2000-12-08 | 2002-06-08 | Alcatel Canada Inc. | System and method for establishing a communication path associated with an mpls implementation on an atm platform |
US7197565B2 (en) * | 2001-01-22 | 2007-03-27 | Sun Microsystems, Inc. | System and method of using a pipe advertisement for a peer-to-peer network entity in peer-to-peer presence detection |
US7171453B2 (en) * | 2001-04-19 | 2007-01-30 | Hitachi, Ltd. | Virtual private volume method and system |
US7337220B2 (en) * | 2001-10-24 | 2008-02-26 | At&T Labs, Inc. | Unified interface for managing DSL services |
-
2003
- 2003-03-05 US US10/378,858 patent/US7761598B1/en active Active
-
2010
- 2010-06-11 US US12/813,649 patent/US20100251317A1/en not_active Abandoned
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5883901A (en) * | 1995-09-22 | 1999-03-16 | Hewlett-Packard Company | Communications system including synchronization information for timing upstream transmission of data and ability to vary slot duration |
US6070246A (en) * | 1998-02-04 | 2000-05-30 | 3Com Corporation | Method and system for secure cable modem initialization |
US6185624B1 (en) * | 1998-02-04 | 2001-02-06 | 3Com Corporation | Method and system for cable modem management of a data-over-cable system |
US6510162B1 (en) * | 1998-05-27 | 2003-01-21 | 3Com Corporation | System and method for managing channel usage in a data over cable system |
US6331987B1 (en) * | 1998-05-27 | 2001-12-18 | 3Com Corporation | Method and system for bundling data in a data-over-cable system |
US6594280B1 (en) * | 1998-11-10 | 2003-07-15 | Cisco Technology, Inc. | Method and apparatus for supporting header suppression and multiple microflows in a network |
US6438123B1 (en) * | 1998-11-10 | 2002-08-20 | Cisco Technology, Inc. | Method and apparatus for supporting header suppression and multiple microflows in a network |
US6490727B1 (en) * | 1999-10-07 | 2002-12-03 | Harmonic, Inc. | Distributed termination system for two-way hybrid networks |
US7672230B2 (en) * | 1999-10-13 | 2010-03-02 | Cisco Technology, Inc. | Downstream channel change technique implemented in an access network |
US7113484B1 (en) * | 1999-10-13 | 2006-09-26 | Cisco Technology, Inc. | Downstream channel change technique implemented in an access network |
US7656890B2 (en) * | 1999-10-13 | 2010-02-02 | Cisco Technology, Inc. | Downstream channel change technique implemented in an access network |
US6950399B1 (en) * | 2000-07-06 | 2005-09-27 | Matsushita Electric Industrial Co., Ltd. | System and associated method for scheduling transport of variable bit-rate data over a network |
US20020052927A1 (en) * | 2000-11-20 | 2002-05-02 | Lg Electronics Inc. | Initialization file downloading apparatus and method of cable modem |
US20070140298A1 (en) * | 2001-04-14 | 2007-06-21 | Eng John W T | Method and apparatus of downstream communication for a full-service cable modem system |
US7194009B2 (en) * | 2001-04-14 | 2007-03-20 | John Wai Tsang Eng | Full-service broadband cable modem system |
US20030035442A1 (en) * | 2001-04-14 | 2003-02-20 | Eng John Wai Tsang | Full-service broadband cable modem system |
US7085287B1 (en) * | 2001-06-27 | 2006-08-01 | Cisco Technology, Inc. | Map routing technique implemented in access networks |
US7639617B2 (en) * | 2001-06-27 | 2009-12-29 | Cisco Technology, Inc. | Upstream physical interface for modular cable modem termination system |
US7496110B1 (en) * | 2001-08-21 | 2009-02-24 | Juniper Networks, Inc. | Virtual upstream channel scheduling in broadband communication systems |
US20090180490A1 (en) * | 2001-08-21 | 2009-07-16 | Juniper Networks, Inc. | Virtual upstream channel scheduling in broadband communication systems |
US20030202534A1 (en) * | 2002-04-25 | 2003-10-30 | Cloonan Thomas J. | Method and system for adjusting bandwidth in a hybrid-fiber coaxial network using an intelligently controlled dynamic RF combiner |
Non-Patent Citations (1)
Title |
---|
Data-Over-Cable Service Interface Specifications: Baeline Privacy Plus Interface Specification; April 7, 2000; pages 9 & 10 * |
Also Published As
Publication number | Publication date |
---|---|
US7761598B1 (en) | 2010-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5675732A (en) | Dynamic channel assignment for TCP/IP data transmitted via cable television channels by managing the channels as a single sub network | |
US8018963B2 (en) | Systems for flexible wireless channel association | |
CN101288272B (en) | Tunneled security groups | |
US7672332B1 (en) | Map routing technique implemented in access networks | |
US8345553B2 (en) | Apparatus and methods for reduction of transmission delay in a communication network | |
US8553704B2 (en) | Wideband upstream protocol | |
US7349430B1 (en) | Addressing scheme implemented in access networks | |
JPH1070565A (en) | System and method for catv communication | |
CN109525489B (en) | Fusion gateway and data transmission method | |
US20030005147A1 (en) | IP/HDLC addressing system for replacing frame relay based systems and method therefor | |
US20100251317A1 (en) | Systems and methods for connecting large numbers of cable modems | |
JP2001339437A (en) | Method and device for provider switchable communication | |
US7570647B2 (en) | LAN type internet access network and subscriber line accommodation method for use in the same network | |
US20090249417A1 (en) | Cmts upstream channel bandwidth scheduler | |
CN108259633B (en) | Method, system and device for realizing management message three-layer communication | |
CN100568836C (en) | According to terminal type is the method and the server of terminal distribution local area network (LAN) resource | |
US8254394B1 (en) | Technique for providing constant bit rate (CBR) service over a time-slotted access channel | |
CN113973098A (en) | Method and device for sending domain name system request | |
US20040098468A1 (en) | Multi internet service provider system and method of the same | |
US20030206518A1 (en) | Public access separation in a virtual networking environment | |
US8605747B2 (en) | Using dedicated upstream channel(s) for cable modem initialization | |
KR100719162B1 (en) | Method of voice over internet protocol modem, and system thereof | |
US7991888B1 (en) | Systems and methods for ordered initialization of cable modems | |
CN100373879C (en) | Wideband access net with three layer access point and its IP address distributing method | |
US20030193928A1 (en) | Universal Network and Internet Point-Of-Presence (UNIPOP) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |