摘要:
Techniques are provided to detect cloning of network device identity when network device is seeking registration for service in a network. A control server manages access to the network in which a plurality of network devices are configured to communicate and serve client devices. The network devices require registration with the service gateway in order to provide services. When network devices register with the service gateway, the service gateway performs local clone detection by looking for active registrations from devices with the same identity and by further communicating with the control server. The control server receives registration request messages associated with network devices seeking registration for service from gateway devices, wherein each registration request message includes data comprising an identifier of the network device that is seeking registration that is derived from data stored within a memory of the network device, and an identifier of the gateway device from which the registration request message is received. The control server evaluates the data contained in registration request messages with respect to stored data in order to determine whether a network device identity has been cloned when its registration request message contains an identifier that is already being used by at least one other network device.
摘要:
Techniques are provided to detect cloning of network device identity when network device is seeking registration for service in a network. A control server manages access to the network in which a plurality of network devices are configured to communicate and serve client devices. The network devices require registration with the service gateway in order to provide services. When network devices register with the service gateway, the service gateway performs local clone detection by looking for active registrations from devices with the same identity and by further communicating with the control server. The control server receives registration request messages associated with network devices seeking registration for service from gateway devices, wherein each registration request message includes data comprising an identifier of the network device that is seeking registration that is derived from data stored within a memory of the network device, and an identifier of the gateway device from which the registration request message is received. The control server evaluates the data contained in registration request messages with respect to stored data in order to determine whether a network device identity has been cloned when its registration request message contains an identifier that is already being used by at least one other network device.
摘要:
A wideband cable network system includes multiple wideband cable modems and a Wideband Cable Modem Termination System (WCMTS). The WCMTS operates a Media Access Control (MAC) layer that communicates with the cable modems over multiple different downstream Radio Frequency (RF) channels and upstream RF channels. A wideband failure analytic manager tracks fault indicators associated with the MAC layer communications. Separate failure analytics are then generated, indexed, and correlated for different cable modems and different upstream or downstream channels.
摘要:
A method and a system for providing a service in a network, is provided. In one embodiment, a first modem with a first address, which is identical to a second address of a second modem, requests for services in the network. A modem termination system (MTS) checks whether the first modem is a clone of the second modem. If the first modem is identified to be the clone of the second modem, then, the first modem is restricted from obtaining the requested service. However, the second modem is continuously provided services.
摘要:
A CMTS redundancy technique requires at least two CMTS interfaces (e.g., line cards) on one or more CMTS chassis at the head end of a cable network. One of the CMTSs serves as a backup or “protecting” CMTS. When another CMTS (a “working” CMTS) becomes unavailable to service its group of cable modems, the protecting CMTS takes over service to those cable modems. The SWITCHOVER takes place transparently (or nearly transparently) to the cable modems. The protecting CMTS provides service on the same downstream channel as used by the working CMTS. The cable modems need not modify any settings pursuant to their cable modem communication protocol (e.g., DOCSIS ranging). This transparency to the cable modems is realized by keeping the working and protecting CMTSs in synchronization regarding service parameters for the cable modems. In other words, the protecting CMTS maintains a list of current parameters for allowing service to the cable modems.
摘要:
In one embodiment a technique is disclosed for facilitating communication between nodes and a head end of an access network including a head end, at least one shared access upstream channel and at least one downstream channel. A first insertion rate estimate is determined. In at least one embodiment, the first insertion rate estimate may relate to an estimated number of nodes attempting to sign-on to the access network during one or more time interval(s). In at least one embodiment, a frequency of occurrence of initial maintenance opportunities available to a first plurality of network nodes may be dynamically adjusted, for example, using data relating to the first insertion rate estimate. According to one embodiment where the access network corresponds to a cable network, the head end of the cable network may be operable to sign on at least 40,000 cable modems within a time interval of not more than 300 seconds.
摘要:
Disclosed is an apparatus and method for simulating a plurality of cable modems for testing a device, such as a head end complex. In general terms, the present invention provides a multiple cable modem simulator and techniques for setting up and executing the same. In one implementation, the multiple cable modems are simulated by simulating multiple MAC (media access control) state machines for multiple cable modems. In other embodiments, a simulator of the present invention includes a mechanism for simulating physical operating conditions of the simulated cable modems. For example, even when the simulator is located at a single test location, different distances and power levels may be simulated for the different simulated cable modems.
摘要:
A wideband cable network system includes multiple wideband cable modems and a Wideband Cable Modem Termination System (WCMTS). The WCMTS operates a Media Access Control (MAC) layer that communicates with the cable modems over multiple different downstream Radio Frequency (RF) channels and upstream RF channels. A wideband failure analytic manager tracks fault indicators associated with the MAC layer communications. Separate failure analytics are then generated, indexed, and correlated for different cable modems and different upstream or downstream channels.
摘要:
A method is provided in one example embodiment and includes receiving a request for a service flow over a wireless link, where the request specifies resource requirements; dynamically reserving bandwidth for the resource requirements in a backhaul link; and mapping a packet received over the wireless link to the backhaul link based on an identification element associated with the packet and the service flow.
摘要:
Methods and apparatus are provided for enhancing security and features during cable modem configuration. According to various embodiments, a cable network head end is configured to ensure that a cable modem subscriber registers with its assigned configuration profile. Techniques for verifying parameters in a received configuration profile, enhancing authentication, preventing access to provisioning servers, securing communications, and enhancing feature sets are provided.