摘要:
A data communication system includes multiple Media Access Control (MAC) units, multiple physical layer (PHY) interface units, and logic to communicate between the MAC units and the PHY units using a single tunneling protocol over Internet Protocol (IP).
摘要:
A data communication system includes multiple Media Access Control (MAC) units, multiple physical layer (PHY) interface units, and logic to communicate between the MAC units and the PHY units using a single tunneling protocol over Internet Protocol (IP).
摘要:
Bandwidth is assigned to subscribers of a data network by applying logic of one or more network devices to sample bits of information communicated over a network communication medium to identify if there is a network congestion condition or an extremely lightly loaded condition. The maximum bandwidth assigned to a subscriber is below a normative maximum bandwidth assigned to the subscriber if the network is congested and the logic of the one or more network devices identifies the subscriber as a heavy bandwidth user. The maximum bandwidth assigned to a subscriber is above the normative maximum bandwidth if the network is extremely lightly loaded and the subscriber is a heavy bandwidth user.
摘要:
Bandwidth is assigned to subscribers of a data network by applying logic of one or more network devices to sample bits of information communicated over a network communication medium to identify if there is a network congestion condition or an extremely lightly loaded condition. The maximum bandwidth assigned to a subscriber is below a normative maximum bandwidth assigned to the subscriber if the network is congested and the logic of the one or more network devices identifies the subscriber as a heavy bandwidth user. The maximum bandwidth assigned to a subscriber is above the normative maximum bandwidth if the network is extremely lightly loaded and the subscriber is a heavy bandwidth user.
摘要:
Systems and methods can operate to improve the communication bandwidth in communication systems. Communication systems can use new forward error correction (FEC) algorithms to increase communication bandwidth. New FEC algorithms can also enable the use of other modulation formats to further improve communication bandwidth. Communication devices that can select from a plurality of FEC algorithms and modulation formats can maintain backward compatibility with the deployed FEC algorithms and modulation formats implemented in legacy communication devices while realizing increased communication bandwidth.
摘要:
Methods, systems, and apparatus used to provide duplicate address detection in edge devices. Edge devices can include CMTS devices or DSLAMs where network nodes are not allowed to communicate with each other directly. Duplicate address detection proxies can provide duplicate address protection for network devices and can avoid the issue of broadcasting node advertisement messages to all of the devices connected to a particular downstream link.
摘要:
A method performed by a central network device, such as a network edge device, or a CMTS, determines whether some of a plurality of user devices coupled to a communication device are transmitting at substantially their respective maximum power output level over a given channel. If the central device determines that some of the devices are operating at near their maximum output level (“power pegged,) the central device searches for another channel that can carry the traffic of the power pegged devices at reduced data rate. If another channel can accommodate transmission of signals of the power pegged device, the central device instructs the power pegged devices to tune to the new channel at a reduced data rate compared to the data rate of the current channel.
摘要:
Systems and methods can operate to use a deterministic finite automata module to classify data. In various implementations, a converter can be used to convert a classification list to a state machine operable to be executed by the deterministic finite automata module. In some implementations, the converter can be used to produce a state machine from template data, the state machine being operable to be executed by the deterministic finite automata module.
摘要:
Methods for providing adaptive equalization in the presence of a burst error are provided. If an equalization algorithm has converged and burst errors are present during a symbol interval, the equalizer coefficients remain unchanged during the symbol interval. If the burst error is no longer present during the next symbol interval, the equalizer coefficients are updated based on the previously converged coefficients.
摘要:
Systems, methods and computer readable media for providing low-latency scheduling on upstream channels. Systems and methods can include a low-latency scheduler and a network interface. The low-latency scheduler can assign a first group of upstream channels for standard communication of packets on a network, and to assign a second group of upstream channels for communication of small upstream packets on the network. The network interface can communicate transmission opportunities identified by the low-latency scheduler to the subscriber devices. The transmission opportunities for subscriber devices are assigned such that devices with a threshold amount of traffic receive transmission opportunities in the first group of upstream channels, and subscriber devices with less than the threshold amount of traffic receive transmission opportunities in the second group of upstream channels.