Ajay Gummalla-July 2001



Similar documents
Channel Bonding in DOCSIS 3.0. Greg White Lead Architect Broadband Access CableLabs

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work

DOCSIS 3.0. The road to 100 Mbps. Greg White Principal Architect CableLabs

Broadband Cable Service Deployment at WorldCall Telecom - Pakistan. Hassan Zaheer Manager Operations Broadband Division

ITU-T RECOMMENDATION J.122, SECOND-GENERATION TRANSMISSION SYSTEMS FOR INTERACTIVE CABLE TELEVISION SERVICES IP CABLE MODEMS

IEEE Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the Air Interface Specification

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Configuring Load Balancing and Dynamic Channel Change (DCC) on the Cisco CMTS

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

CS263: Wireless Communications and Sensor Networks

CMA5000 SPECIFICATIONS Gigabit Ethernet Module

Configuring Load Balancing and Dynamic Channel Change (DCC) on the Cisco CMTS

Residential Broadband: Technologies for High-Speed Access To Homes

The Wireless Network Road Trip

Basic processes in IEEE networks

ADSL part 2, Cable Internet, Cellular

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

CX380X Advanced Spectrum and Burst QAM Analyzer

CSMA/CA. Information Networks p. 1

DOCSIS 3.1. High Level Overview at NANOG 59. Karthik Sundaresan, Lead Architect. Oct 09, Cable Television Laboratories, Inc.

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Copyright. Transport networks. Physical layer Transport and access networks. Pag. 1

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

EPON Technology White Paper

11/22/

GPON Section Reporter: 王 依 盈

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Based on Computer Networking, 4 th Edition by Kurose and Ross

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Ubee Interactive DOCSIS 3.0 Cable Modem Model: DDM3513

IEEE C802.16j-06/133r4. IEEE Broadband Wireless Access Working Group <

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

PMD Burst Mode Dynamic Performance Requirement

IEEE frame format

How To Analyze The Security On An Ipa Wireless Sensor Network

Residential Broadband: Technologies for High-Speed Access To Homes

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Ring Local Area Network. Ring LANs

DOCSIS Cable Modem Connection Process

Configuring Basic Broadband Internet Access

Responses by TG1 ( ) included

Ethernet Passive Optical Networks EPON

E P o C. IEEE P802.3bn Tutorial. Part 1. EPON Protocol Over Coax EPoC. Monday, 3 November 2014

High-Level Data Link Control

DOCSIS 1.1 Cable Modem Termination Systems

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF

IEEE C802.16j-07/024. IEEE Broadband Wireless Access Working Group <

802.3ah Operations Management: Requirements From A Diverse Services Provider

Broadband 101: Installation and Testing

Wideband: Delivering the Connected Life

DOCSIS/EuroDOCSIS 3.0 Cable Modems

RTT 60.5 msec receiver window size: 32 KB

Chapter 9 Using Telephone and Cable Networks for Data Transmission

EETS 8316 Wireless Networks Fall 2013

Configuring Basic Broadband Internet Access

PERFORMANCE OF VOIP SERVICES ON A DOCSIS NETWORK TARGETED BY A DENIAL OF SERVICE ATTACK

Written examination in Computer Networks

Cisco Cable Radio Frequency (RF) FAQs

Wholesale IP Bitstream on a Cable HFC infrastructure

Lecture 7 Multiple Access Protocols and Wireless

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Technical Specification. Cable Modems (CM) Radio Frequency Interface. High-speed Data-Over-Cable Systems (DOCSIS 1.1)

Chapter 2 - The TCP/IP and OSI Networking Models

Task or Information to Monitor. ARP table clear cable arp on page 200 show cable arp on page 205

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

: Instructor

An Overview of ZigBee Networks

Practical Attacks on DOCSIS

Superseded by a later version of this document.

Communication Networks. MAP-TELE 2011/12 José Ruela

Lecture 17: Wireless Networking"

EFM Copper (EFMC) Tutorial. June 2004

Main Ways to Enhance Throughput

Making Ethernet Over SONET Fit a Transport Network Operations Model

Extended DQRAP - A Case Study

Multicast Polling and Efficient VoIP Connections in IEEE Networks

Master Course Computer Networks IN2097

Ethernet, VLAN, Ethernet Carrier Grade

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

Study on the Network Termination Point of Internet access and Telephony over Cable Networks (HFC)

From Fieldbus to toreal Time Ethernet

ACRS 2.0 User Manual 1

Demystifying Wireless for Real-World Measurement Applications

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

The Recommended Testing Process for PacketCableTM Voice Service at a Customer Premises

Computer Networks CS321

Introduction to IP v6

Increasing cable bandwidth to retain high-value customers

GTER 26 tudo o que você. quer saber sobre n

GPON - EPON Comparison

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting

Example: Multiple OFDM Downstream Channels and Examining Backwards Compatibility. Mark Laubach, Avi Kliger Broadcom

Transcription:

DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1

HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way Amp Divid er Headend Fiber Node CM TV VCR Subscriber Premises Typical fiber node supports about 2000 subscribers Ajay Gummalla-July 2001 2

Terminology DOCSIS: Data over cable service interface specification CM: Cable Modem CMTS: Cable Modem Termination System Ajay Gummalla-July 2001 3

Communication Basics Upstream Channels (0 to 45 MHz) Downstream Channels (50 MHz to 1GHz or higher) Frequency CMTS (Cable Headend) upstream downstream Cable Modems (CM) The DOCSIS system is a Point to Multipoint communications system employing a continuous signal in the downstream direction and a TDMA burst signal in the upstream direction Upstream TDMA Burst of QPSK or 16QAM signals Supports data rates upto 10 Mbps Supports multiple upstream channels Downstream TDM Continuous Transmission 64 or 256 QAM signals The downstream uses an MPEG transmission convergence sublayer Data rates upto 100 Mbps Ajay Gummalla-July 2001 4

Objective Show DOCSIS solutions for P2MP issues Link management Upstream synchronization (timing adjustment) Ranging (offset adjustment) (Periodic and Initial) Power adjustment Burst transmission and reception Bandwidth management Bandwidth allocation Contention resolution Prioritization/classification of traffic Supports unsolicited grant service (voice/t1 ckts) Subscriber management Authentication Security Registration MIBs Ajay Gummalla-July 2001 5

Overview DOCSIS1.0 Designed for Best Effort Service Uses request/grant mechanism for accessing upstream bandwidth Single Quality of Service association per modem Baseline Privacy provides in-line 56-bit DES encryption/decryption to secure the privacy of the connection DOCSIS1.1: Quality of Service Extensions Ajay Gummalla-July 2001 6

Protocol Layering CMTS Protocol Stack CM Protocol Stack IP IP forwarding 802.2/DIX LLC 802.2/DIX LLC Transparent Bridging 802.2/DIX LLC Data Link Layer Link Security Link Security MAC MAC 802.3 MAC Physical Layer TC layer DS PMD US PMD US PMD TC layer DS PMD 10/100BaseT Phy CMTS Network Interface Cable RF interface CM Subscriber Interface Conforms to 802.1d forwarding rules CMTS reflects all broadcast packets and CMs drop based on SA match Ajay Gummalla-July 2001 7

Frame Formats Registration Request (REG-REQ) SID 2 bytes TLV Encoded Information Ranging Request (RNG-REQ) SID 2 bytes DS Ch. ID MAC Management Message ISO 8802-2 DA 6 bytes SA 6 bytes msglen 2 bytes DSAP SSAP control version type RSVD management message payload CRC 4 bytes PHY OH MAC HEADER DATA PDU 18~1518 bytes Ethernet / 8802-3 Variable-Length Packets or Packet PDU fragment FC MAC_PARM LEN (SID) 2 bytes EHDR 0~240 bytes HCS 2 bytes DA 6 bytes SA 6 bytes TYPE/LEN 2 bytes USER DATA 0~1500 bytes CRC 4 bytes Ajay Gummalla-July 2001 8

MAC Management Messages MAC Management Message ISO 8802-2 DA 6 bytes SA 6 bytes msglen 2 bytes DSAP SSAP control version msg type RSVD management message payload CRC 4 bytes Type Value Version Message Name Message Description 1 1 SYNC Timing Synchronization 2 1 UCD Upstream Channel Descriptor 3 1 MAP Upstream Bandwidth Allocation 4 1 RNG-REQ Ranging Request 5 1 RNG-RSP Ranging Response 6 1 REG-REQ Registration Request 7 1 REG-RSP Registration Response 12 1 BPKM-REQ Privacy Key Management Request [DOCSIS8] 13 1 BPKM-RSP Privacy Key Management Response [DOCSIS8] 14 2 REG-ACK Registration Acknowledge 15 2 DSA-REQ Dynamic Service Addition Request 16 2 DSA-RSP Dynamic Service Addition Response 17 2 DSA-ACK Dynamic Service Addition Acknowledge 18 2 DSD-REQ Dynamic Service Deletion Request 19 2 DSD-RSP Dynamic Service Deletion Response 20 2 DSC-REQ Dynamic Service Change Request 21 2 DSC-RSP Dynamic Service Change Response 22 2 DSC-ACK Dynamic Service Change Acknowledge 25-255 Reserved for future use All management messages are in TLV format and are encapsulated in Ethernet format Ajay Gummalla-July 2001 9

CM Initialization DS synchronization Obtain upstream parameters Ranging and automatic adjustments Establish IP connectivity Establish time of day Transfer operational parameters (TFTP download of Configuration parameters) Registration Baseline privacy initialization Ajay Gummalla-July 2001 10

CM Initialization (Details..) CMTS Upstream Channel Descriptor (<2s) CM MAP (usually 1-10ms) CM locks on DS channel, acquires time sync for US, sets up modulator for appropriate US channel. CM picks random number in ranging backoff window, searches MAPs for appropriate initial ranging slot, and transmits at that time. MAC waits for ranging response message. Ranging Request If CM times out on response, CM increases TX power level and signals MAC. MAC increases backoff window and picks a new slot, searches MAPs for appropriate initial ranging slot, and transmits at that time. MAC waits for ranging response message. CMTS eventually hears modems ranging request and sends ranging response. CMTS then sends station maintenance slots to CM being ranged. Ranging Request Ranging Response CM tells MAC to switch to station maintenance slots. MAC automatically transmits a ranging request in any station maintenance slot reserved for it. Modem adjusts timing, power level, and frequency offset per ranging response. Ranging Complete Message Ajay Gummalla-July 2001 11

Clock Synchronization CMTS SYNC Msg CM TX RX Timestamp Generation Circuit 32-bit Counter Timestamp Recovery Circuit 32-bit Counter TX RX Local Reference or Network Clock CMTS sends out periodic sync messages that contain a 32-bit time stamp of 10.24 MHz clock CM receives sync messages and locks the frequency of it s local clock so that it matches the time stamp in the sync messages CM now knows frequency of CMTS clock but not the phase because of propagation delays in receiving the sync messages Ajay Gummalla-July 2001 12

Ranging Process CMTS SYNC Msg CM TX Timestamp Generation Circuit 32-bit Counter RNG RSP RX Timestamp Recovery Circuit 32-bit Counter Ranging Offset Local Reference or Network Clock RX RNG REQ TX MS Counter Before initial transmission, CM loads it s ranging offset register with a value to compensate for the known delays (DS interleaver, implementation delays, etc.) The CM the adjusts it s 32-bit sync counter by the amount in the ranging offset. The CM then selects an initial ranging slot and transmits. The CMTS measures the difference between the received and expected transmission boundaries and sends that back to the CM as a ranging adjustment. It also communicates the power level, frequency offset and delay adjustment to the CM. Ajay Gummalla-July 2001 13

Bandwidth Management Request-Grant arbitration mechanism CM makes requests to the CMTS Requests can be made in Contention or as Piggybacks Contention is resolved using combination of Binary exponential back off and Ack- Timer Piggyback is a request for additional bandwidth sent in a data transmission Only one unresolved request allowed per priority per CM CMTS issues grants using a MAP message CM transmits data during its Grant period Ajay Gummalla-July 2001 14

TDMA Control 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 Request Region Grant for CM20 Grant for CM90 Upstream time is divided into minislots. Minislot is just a convenient partitioning of time for bandwidth allocation purposes An upstream transmission is described by a burst profile A burst profile specifies: Modulation type, Preamble length and value, FEC, Scrambler properties, Maximum burst size, Guard period Burst types: Initial Maintenance, Periodic Maintenance, Request, Short Data and Long Data The CMTS serves as the upstream (TDMA) controller. The upstream is divided into different regions. Downstream messages called MAPs assign upstream regions to CMs. Portions of the upstream bandwidth are open to all modems (contention) for requesting upstream bandwidth and for initial ranging. MAP Information Upstream Channel ID UCD Count (misc.) MAP start time = 1099 ACK time=0800 Ranging Backoffs Data Backoffs Request Region Offset=0 Grant for CM20 Offset=5 Grant for CM90 Offset=9 Null Offset=19 Zero Length Grants (Data Grant Pending) Ajay Gummalla-July 2001 15

CM Request Grant Process Ack time less than transmit time or Received Grant Pending Grant Received before ack expire Packet Transmitted with piggyback Wait for Grant Ack expires & Retries left (increment retry cnt) Request Transmitted (remember transmit time) Wait for transmit time Ack expires & no Retries left (purge packet) Wait for Request Opportunity Grant Received Packet Transmitted without piggyback Packet enqueued and grant received Start Wait for packet to be enqueued Packet enqueued (pick request opportunity) Normal Req/Gnt process Normal UGS process Normal contention process Excessive contention or lost MAP Ajay Gummalla-July 2001 16

Security Baseline Privacy Two component protocols: Encapsulation protocol for encrypting packet data across the cable network BPKM (Baseline Privacy Key Management) protocol for providing secure distribution of keying material from the CMTS to the CM Encapsulation protocol defines the frame format for carrying encrypted data within DOCSIS MAC frames set of supported cryptographic suites (pairings of data encryption and authentication algorithms) Currently employs Cipher based chaining mode of DES rules for applying these algorithms to a DOCSIS frame s packet data DOCSIS frame header is not encrypted to facilitate registration, ranging and normal operation of the DOCSIS MAC sublayer Ref: http://www.cablemodem.com/security_in_docsis.pdf BPI has been enhanced in DOCSIS1.1 to add authentication and Multicast support. http://www.cablemodem.com/bpi+_i06-001215.pdf Ajay Gummalla-July 2001 17

DOCSIS 1.1 Quality of Service: Service flows, classifiers, scheduling types and dynamic service establishment Fragmentation - Allows segmentation of large packets simplifying bandwidth allocation for CBR-type services Concatenation - Allows bundling of multiple small packets to increase throughput Security Enhancements (Authentication) - Baseline Privacy Plus provides authentication as well as in-line DES encryption/decryption Encryption support for Multicast Signaling (IGMP-Internet Group Management Protocol) Payload Header Suppression- Allows suppression of ethernet/ip header information for improved bandwidth utilization Ajay Gummalla-July 2001 18

Summary DOCSIS is widely deployed today. DOCSIS addresses point to multipoint issues. It has been used in cable and wireless systems. All DOCSIS Management and Control is through Ethernet messages. DOCSIS specifies all aspects of a complete access system which are relevant to PON in EFM. Ajay Gummalla-July 2001 19