摘要:
A method and a system for providing a service in a network, is provided. In one embodiment, a first modem with a first address, which is identical to a second address of a second modem, requests for services in the network. A modem termination system (MTS) checks whether the first modem is a clone of the second modem. If the first modem is identified to be the clone of the second modem, then, the first modem is restricted from obtaining the requested service. However, the second modem is continuously provided services.
摘要:
A CMTS redundancy technique requires at least two CMTS interfaces (e.g., line cards) on one or more CMTS chassis at the head end of a cable network. One of the CMTSs serves as a backup or “protecting” CMTS. When another CMTS (a “working” CMTS) becomes unavailable to service its group of cable modems, the protecting CMTS takes over service to those cable modems. The SWITCHOVER takes place transparently (or nearly transparently) to the cable modems. The protecting CMTS provides service on the same downstream channel as used by the working CMTS. The cable modems need not modify any settings pursuant to their cable modem communication protocol (e.g., DOCSIS ranging). This transparency to the cable modems is realized by keeping the working and protecting CMTSs in synchronization regarding service parameters for the cable modems. In other words, the protecting CMTS maintains a list of current parameters for allowing service to the cable modems.
摘要:
A wideband cable network system includes multiple wideband cable modems and a Wideband Cable Modem Termination System (WCMTS). The WCMTS operates a Media Access Control (MAC) layer that communicates with the cable modems over multiple different downstream Radio Frequency (RF) channels and upstream RF channels. A wideband failure analytic manager tracks fault indicators associated with the MAC layer communications. Separate failure analytics are then generated, indexed, and correlated for different cable modems and different upstream or downstream channels.
摘要:
A method is provided in one example embodiment and includes receiving a request for a service flow over a wireless link, where the request specifies resource requirements; dynamically reserving bandwidth for the resource requirements in a backhaul link; and mapping a packet received over the wireless link to the backhaul link based on an identification element associated with the packet and the service flow.
摘要:
Methods and apparatus are provided for enhancing security and features during cable modem configuration. According to various embodiments, a cable network head end is configured to ensure that a cable modem subscriber registers with its assigned configuration profile. Techniques for verifying parameters in a received configuration profile, enhancing authentication, preventing access to provisioning servers, securing communications, and enhancing feature sets are provided.
摘要:
Disclosed are a method and apparatus for addressing theft of cable services and breach of cable system privacy and security. In one example, a method for preventing suspect cable modems from stealing cable services and breaching cable system privacy and security includes (i) determining in a cable modem termination system that a cable modem seeking to access cable services is suspect, wherein it is determined that the cable modem is suspect when such cable modem is attempting or performing one or more of a plurality of predefined suspect activities; (ii) categorizing the cable modem as suspect after it is determined that the cable modem is suspect; (iii) indicating to the cable modem that it has been approved for cable services at a first service level after it is determined that the cable modem is suspect; and (iv) providing cable services to the cable modem at a second service level after it is determined that the cable modem is suspect, wherein the second service level is lower than the first service level.
摘要:
A method and a system for providing a service in a network, is provided. In one embodiment, a first modem with a first address, which is identical to a second address of a second modem, requests for services in the network. A modem termination system (MTS) checks whether the first modem is a clone of the second modem. If the first modem is identified to be the clone of the second modem, then, the first modem is restricted from obtaining the requested service. However, the second modem is continuously provided services.
摘要:
Methods, systems, and computer program products are disclosed for allowing rapid re-provisioning of a cable modem at the MAC/physical layer in a cable modem network. After a cable modem goes through power-up/self-test, i.e., a hard boot, and goes through initial provisioning, the modem is in a steady state in which standard DOCSIS periodic ranging is performed. It is during periodic ranging that the provisioning status, such as bit rate, ISP, etc., can be rapidly changed to allow for “on the fly” changes in provisioning. A cable modem is synchronized with the cable modem network. The modem is then provisioned once it receives a configuration file from a provisioning system. Periodic ranging is then performed between the modem and the CMTS, located either in a headend or a fiber node in the cable plant. The periodic ranging is interrupted by a command or action taken by the CMTS on the cable modem instead of the modem being affected directly by the provisioning system. Once periodic ranging is broken, either by cessation of polling messages or a ranging abort command, the modem goes directly to re-synchronizing with the cable network and re-provisions, i.e., avoids performing a power-on/self test or hard boot.
摘要:
Techniques are provided to detect cloning of network device identity when network device is seeking registration for service in a network. A control server manages access to the network in which a plurality of network devices are configured to communicate and serve client devices. The network devices require registration with the service gateway in order to provide services. When network devices register with the service gateway, the service gateway performs local clone detection by looking for active registrations from devices with the same identity and by further communicating with the control server. The control server receives registration request messages associated with network devices seeking registration for service from gateway devices, wherein each registration request message includes data comprising an identifier of the network device that is seeking registration that is derived from data stored within a memory of the network device, and an identifier of the gateway device from which the registration request message is received. The control server evaluates the data contained in registration request messages with respect to stored data in order to determine whether a network device identity has been cloned when its registration request message contains an identifier that is already being used by at least one other network device.
摘要:
Techniques are provided to detect cloning of network device identity when network device is seeking registration for service in a network. A control server manages access to the network in which a plurality of network devices are configured to communicate and serve client devices. The network devices require registration with the service gateway in order to provide services. When network devices register with the service gateway, the service gateway performs local clone detection by looking for active registrations from devices with the same identity and by further communicating with the control server. The control server receives registration request messages associated with network devices seeking registration for service from gateway devices, wherein each registration request message includes data comprising an identifier of the network device that is seeking registration that is derived from data stored within a memory of the network device, and an identifier of the gateway device from which the registration request message is received. The control server evaluates the data contained in registration request messages with respect to stored data in order to determine whether a network device identity has been cloned when its registration request message contains an identifier that is already being used by at least one other network device.