Part Number Hot Search : 
TKE0303D 05351 73D2248A TP337A CD214A NJM2388 836087 01726203
Product Description
Full Text Search
 

To Download SP-RFI-I03-980202NBSP Datasheet File

  If you can't view the Datasheet, Please click here to try to view without PDF Reader .  
 
 


  Datasheet File OCR Text:
 Data-Over-Cable Service Interface Specifications
Radio Frequency Interface Specification SP-RFI-I03-980202
INTERIM SPECIFICATION
Notice
This document is a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. for the benefit of MCNS Holdings, L.P. and the cable industry in general. Neither CableLabs, MCNS Holdings, L.P. nor any other participating entity including Media One (Continental Cablevision) and Rogers Cablesystems Limited (the "Other Participants") is responsible for any liability of any nature whatsoever resulting from or arising out of use or reliance upon this test suite by any party. This document is furnished on an "AS IS" basis and neither CableLabs, MCNS Holdings, L.P. nor the Other Participants provides any representation or warranty, express or implied, regarding its accuracy, completeness, or fitness for a particular purpose. Distribution of this document is restricted pursuant to the terms of separate access agreements negotiated with each of the parties to whom this document has been furnished. (c) Copyright 1997 Cable Television Laboratories, Inc. All rights reserved.
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Document Status Sheet
Document Control Number: Reference: Revision History:
SP-RFI-I03-980202 Radio Frequency Interface Specification I01 I01 I02 I03 3/21/97 Released for publication 3/26/97 Re-released for publication 10/8/97 Re-released for publication 2/2/98 Re-released for publication
Date: Status Code:
February 2, 1998 Work in Process CableLabs only Draft Interim Released
Distribution Restrictions:
CL/MCNS/ Authors
CL/MCNS/ Vendor
Public
Key to Document Status Codes
Work in Process Draft An incomplete document, designed to guide discussion and generate feedback, that may include several alternative requirements for consideration. A document in specification format considered largely complete, but lacking review by MCNS and vendors. Drafts are susceptible to substantial change during the review process. A document which has undergone rigorous MCNS and vendor review, suitable for use by vendors to design in conformance with, and suitable for field testing. A stable document, reviewed, tested and validated, suitable to enable crossvendor interoperability.
Interim Released
ii
Radio Frequency Interface Specification
SP-RFI-I03-980202
Contents
1 1.1 1.2 1.3 SCOPE AND PURPOSE................................................................................................................................1 SCOPE.........................................................................................................................................................1 REQUIREMENTS..........................................................................................................................................1 BACKGROUND ............................................................................................................................................1 1.3.1 1.3.2 1.3.3 2 2.1 2.2 Service Goals......................................................................................................................................1 Reference Architecture .......................................................................................................................2 Server Location ..................................................................................................................................5
FUNCTIONAL ASSUMPTIONS .................................................................................................................7 BROADBAND ACCESS NETWORK ...............................................................................................................7 EQUIPMENT ASSUMPTIONS ........................................................................................................................7 2.2.1 2.2.2 2.2.3 Frequency Plan ..................................................................................................................................7 Compatibility with Other Services .....................................................................................................7 Fault Isolation Impact on Other Users ..............................................................................................7 Transmission Downstream.................................................................................................................8 Transmission Upstream......................................................................................................................9
2.3
RF CHANNEL ASSUMPTIONS......................................................................................................................8 2.3.1 2.3.2
2.4 2.5 3 3.1
TRANSMISSION LEVELS..............................................................................................................................9 FREQUENCY INVERSION ...........................................................................................................................10 COMMUNICATION PROTOCOLS .........................................................................................................11 PROTOCOL STACK....................................................................................................................................11 3.1.1 3.1.2 CM and CMTS as Hosts ...................................................................................................................11 Data Forwarding Through the CM and CMTS................................................................................12 Example Rules for Data-Link-Layer Forwarding ............................................................................15
3.2 3.3 3.4 3.5
THE MAC FORWARDER...........................................................................................................................15 3.2.1 NETWORK LAYER ....................................................................................................................................16 ABOVE THE NETWORK LAYER.................................................................................................................16 DATA LINK LAYER ..................................................................................................................................17 3.5.1 3.5.2 3.5.3 LLC Sublayer....................................................................................................................................17 Link-Layer Security Sublayer...........................................................................................................17 MAC Sublayer ..................................................................................................................................17 Downstream Transmission Convergence Sublayer..........................................................................18 PMD Sublayer ..................................................................................................................................18
3.6
PHYSICAL LAYER.....................................................................................................................................18 3.6.1 3.6.2
4 4.1 4.2
PHYSICAL MEDIA DEPENDENT SUBLAYER SPECIFICATION....................................................21 SCOPE.......................................................................................................................................................21 UPSTREAM ...............................................................................................................................................21 4.2.1 4.2.2 4.2.3 Overview...........................................................................................................................................21 Modulation Formats.........................................................................................................................22 FEC Encode .....................................................................................................................................25
iii
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
4.2.4 4.2.5 4.2.6 4.2.7 4.2.8 4.2.9 4.2.10 4.2.11 4.2.12 4.2.13 4.3 4.3.1 4.3.2 4.3.3 4.3.4 4.3.5 4.3.6 4.3.7 5 5.1 5.2 5.3 5.4 5.5 5.6 5.7 6 6.1
Scrambler (Randomizer) ................................................................................................................. 25 Preamble Prepend ........................................................................................................................... 26 Burst Profiles................................................................................................................................... 26 Burst Timing Convention................................................................................................................. 29 Transmit Power Requirements ........................................................................................................ 30 Fidelity Requirements...................................................................................................................... 31 Frame Structure............................................................................................................................... 35 Signal Processing Requirements ..................................................................................................... 36 Upstream Demodulator Input Power Characteristics .................................................................... 37 Upstream Electrical Output from the CM ....................................................................................... 38 Downstream Protocol...................................................................................................................... 38 Scalable Interleaving to Support Low Latency ............................................................................... 38 Downstream Frequency Plan .......................................................................................................... 39 CMTS Output Electrical .................................................................................................................. 39 Downstream Electrical Input to CM ............................................................................................... 40 CM BER Performance ..................................................................................................................... 40 CMTS Timestamp Jitter ................................................................................................................... 41
DOWNSTREAM......................................................................................................................................... 38
DOWNSTREAM TRANSMISSION CONVERGENCE SUBLAYER .................................................. 43 INTRODUCTION ........................................................................................................................................ 43 MPEG PACKET FORMAT ........................................................................................................................ 43 MPEG HEADER FOR MCNS DATA-OVER-CABLE.................................................................................. 44 MPEG PAYLOAD FOR MCNS DATA-OVER-CABLE ............................................................................... 44 INTERACTION WITH THE MAC SUBLAYER ............................................................................................. 45 INTERACTION WITH THE PHYSICAL LAYER............................................................................................. 46 MPEG HEADER SYNCHRONIZATION AND RECOVERY ............................................................................ 46 MEDIA ACCESS CONTROL SPECIFICATION ................................................................................... 47 INTRODUCTION ........................................................................................................................................ 47 6.1.1 6.1.2 6.1.3 Overview.......................................................................................................................................... 47 Definitions ....................................................................................................................................... 47 Future Use ....................................................................................................................................... 48 Generic MAC Frame Format .......................................................................................................... 48 Packet-Based MAC Frames ............................................................................................................ 53 ATM Cell MAC Frames................................................................................................................... 54 Reserved PDU MAC Frames........................................................................................................... 55 MAC-Specific Headers .................................................................................................................... 56 Extended MAC Headers .................................................................................................................. 60 Error-Handling................................................................................................................................ 61 MAC Management Message Header............................................................................................... 62
6.2
MAC FRAME FORMATS .......................................................................................................................... 48 6.2.1 6.2.2 6.2.3 6.2.4 6.2.5 6.2.6 6.2.7
6.3
MAC MANAGEMENT MESSAGES............................................................................................................ 62 6.3.1
iv
Radio Frequency Interface Specification
SP-RFI-I03-980202
6.3.2 6.4 6.4.1 6.4.2 6.4.3 6.4.4 6.4.5 6.4.6 6.4.7 6.5 6.5.1 6.5.2 6.5.3 6.5.4 6.6 6.6.1 6.6.2 7 7.1 7.2
MAC Management Messages ...........................................................................................................63 The Allocation Map MAC Management Message............................................................................83 Map Transmission and Timing.........................................................................................................85 Protocol Example .............................................................................................................................86 Contention Resolution ......................................................................................................................87 CM Behavior ....................................................................................................................................89 Support for Multiple Channels .........................................................................................................89 Classes of Service.............................................................................................................................89 Global Timing Reference .................................................................................................................91 CM Channel Acquisition ..................................................................................................................91 Ranging ............................................................................................................................................91 Timing Units and Relationships .......................................................................................................92 MAC Messages .................................................................................................................................93 Framing ............................................................................................................................................93
UPSTREAM BANDWIDTH ALLOCATION ....................................................................................................82
TIMING AND SYNCHRONIZATION .............................................................................................................91
DATA LINK ENCRYPTION SUPPORT .........................................................................................................93
CABLE MODEM - CMTS INTERACTION.............................................................................................97 CMTS INITIALIZATION ............................................................................................................................97 CABLE MODEM INITIALIZATION ..............................................................................................................97 7.2.1 7.2.2 7.2.3 7.2.4 7.2.5 7.2.6 7.2.7 7.2.8 7.2.9 7.2.10 7.2.11 7.2.12 7.2.13 7.2.14 7.2.15 7.2.16 7.2.17 7.2.18 RSM Detection..................................................................................................................................99 Scanning and Synchronization to Downstream ...............................................................................99 Obtain Upstream Parameters ........................................................................................................100 Message Flows During Scanning and Upstream Parameter Acquisition......................................101 Ranging and Automatic Adjustments .............................................................................................103 Establish IP Connectivity ...............................................................................................................107 Establish Time of Day ....................................................................................................................107 Establish Security Association .......................................................................................................108 Transfer Operational Parameters ..................................................................................................108 Registration ....................................................................................................................................108 Baseline Privacy Initialization .......................................................................................................109 Service IDs During CM Initialization ............................................................................................109 Multiple-Channel Support..............................................................................................................110 Remote RF Signal Level Adjustment ..............................................................................................110 Changing Upstream Burst Parameters ..........................................................................................112 Changing Upstream Channels .......................................................................................................112 Fault Detection and Recovery........................................................................................................114 Prevention of Unauthorized Transmissions ...................................................................................115
8 8.1
SUPPORTING FUTURE NEW CABLE MODEM CAPABILITIES ..................................................117 SETTING UP COMMUNICATIONS ON AN ENHANCED BASIS ...................................................................117 8.1.1 Upstream Enhanced / Downstream Standard ................................................................................117
v
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
8.1.2 8.2 9 9.1
Downstream Enhanced / Upstream Enhanced or Standard.......................................................... 117
DOWNLOADING CABLE MODEM OPERATING SOFTWARE..................................................................... 117 PROVISION FOR OTHER FUTURE CAPABILITIES ....................................................................... 119 ANTICIPATED PHYSICAL-LAYER CHANGES .......................................................................................... 119 9.1.1 9.1.2 Adding Upstream Channel and Burst Configuration Settings ...................................................... 119 Downstream Channel Improvements ............................................................................................ 120 Multicast Service IDs .................................................................................................................... 120 RSVP Support for Upstream Traffic.............................................................................................. 121
9.2
NEW NETWORK SERVICE REQUIREMENTS............................................................................................ 120 9.2.1 9.2.2
9.3
PID FILTERING CAPABILITY ................................................................................................................. 122
APPENDIX A. WELL-KNOWN ADDRESSES ........................................................................................... 123 A.1 A.2 A.3 MAC ADDRESSES ................................................................................................................................. 123 MAC SERVICE IDS ............................................................................................................................... 123 MPEG PID............................................................................................................................................ 124
APPENDIX B. PARAMETERS AND CONSTANTS ................................................................................... 125 APPENDIX C. CM CONFIGURATION INTERFACE SPECIFICATION .............................................. 127 C.1 C.2 C.3 C.4 C.5 C.6 C.7 C.8 DHCP FIELDS USED BY THE CM ......................................................................................................... 127 CM BINARY CONFIGURATION FILE FORMAT ....................................................................................... 127 CONFIGURATION FILE SETTINGS........................................................................................................... 128 CONFIGURATION FILE CREATION.......................................................................................................... 129 CM MIC CALCULATION ....................................................................................................................... 130 CMTS MIC CALCULATION................................................................................................................... 130 C.6.1 Digest Calculation......................................................................................................................... 131 REGISTRATION CONFIGURATION SETTINGS .......................................................................................... 131 ENCODINGS ........................................................................................................................................... 132 C.8.1 C.8.2 C.8.3 C.8.4 C.8.5 C.8.6 C.8.7 C.8.8 C.8.9 End-of-Data Marker ...................................................................................................................... 132 Pad Configuration Setting ............................................................................................................. 132 Downstream Frequency Configuration Setting............................................................................. 132 Upstream Channel ID Configuration Setting................................................................................ 133 Network Access Control Object..................................................................................................... 133 Class of Service Configuration Setting.......................................................................................... 133 Modem Capabilities Configuration Setting................................................................................... 135 CM Message Integrity Check (MIC) Configuration Setting.......................................................... 136 CMTS Message Integrity Check (MIC) Configuration Setting ..................................................... 136
C.8.10 Vendor ID Configuration Setting .................................................................................................. 136 C.8.11 Software Upgrade Filename.......................................................................................................... 136 C.8.12 SNMP Write-Access Control ......................................................................................................... 136 C.8.13 SNMP MIB Object ......................................................................................................................... 137 C.8.14 Vendor-Specific Information ......................................................................................................... 137 C.8.15 Modem IP Address ........................................................................................................................ 138
vi
Radio Frequency Interface Specification
SP-RFI-I03-980202
C.8.16 Service(s) Not Available Response.................................................................................................138 C.8.17 CPE Ethernet MAC Address ..........................................................................................................139 C.8.18 Telephone Settings Option .............................................................................................................139 C.8.19 SNMP IP Address...........................................................................................................................139 C.8.20 Baseline Privacy Configuration Settings Option ...........................................................................139 APPENDIX D. MAC SUBLAYER SERVICE DEFINITION.......................................................................141 D.1 D.2 D.3 D.4 D.5 D.6 D.7 D.8 SERVICE AT THE CM..............................................................................................................................141 MAC_CM_802_DATA.REQUEST .........................................................................................................141 MAC_CM_DIX_DATA.REQUEST ........................................................................................................141 MAC_CM_ATM_DATA.REQUEST ......................................................................................................142 MAC_CM_802_DATA.INDICATION.....................................................................................................142 MAC_CM_DIX_DATA.INDICATION....................................................................................................142 MAC_CM_ATM_DATA.INDICATION ..................................................................................................143 MAC_CM_DATA.ACKNOWLEDGMENT................................................................................................143
APPENDIX E. EXAMPLE BURST PROFILES............................................................................................145 E.1 E.2 E.3 INTRODUCTION.......................................................................................................................................145 EXAMPLE PREAMBLE SEQUENCE...........................................................................................................145 EXAMPLE BURST PROFILES ...................................................................................................................147
APPENDIX F. UPSTREAM MODULATION RATES .................................................................................159 F.1 F.2 INTRODUCTION.......................................................................................................................................159 SOURCES OF NARROWBAND INGRESS....................................................................................................159 F.2.1 F.2.2 F.2.3 F.2.4 F.2.5 F.3 HF Propagation .............................................................................................................................159 Users of the HF Radio Spectrum....................................................................................................159 Broadcasting ..................................................................................................................................160 Amateur and CB .............................................................................................................................160 Other Services ................................................................................................................................161
FITTING DATA CARRIERS WITHIN THE INGRESS GAPS .........................................................................161
APPENDIX G. EXAMPLE: MULTIPLE UPSTREAM CHANNELS ........................................................163 APPENDIX H. THE DATA-OVER-CABLE SPANNING TREE PROTOCOL ........................................165 H.1 H.2 H.3 H.4 BACKGROUND ........................................................................................................................................165 PUBLIC SPANNING TREE ........................................................................................................................165 PUBLIC SPANNING TREE PROTOCOL DETAILS .......................................................................................166 SPANNING TREE PARAMETERS AND DEFAULTS ....................................................................................167
APPENDIX I. REFERENCES .........................................................................................................................169 APPENDIX J. GLOSSARY ..............................................................................................................................173 APPENDIX K. REVISIONS.............................................................................................................................185 K.1 ECNS INCLUDED IN SP-RFI-I02-971008 ..............................................................................................185
vii
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
K.2
ECNS INCLUDED IN SP-RFI-I03-980202 ............................................................................................. 186
ACKNOWLEDGMENT .................................................................................................................................. 187
viii
Radio Frequency Interface Specification
SP-RFI-I03-980202
Figures
FIGURE 1-1. FIGURE 1-2. FIGURE 1-3. FIGURE 3-1. FIGURE 3-2. FIGURE 3-3. FIGURE 3-4. FIGURE 4-1. FIGURE 4-2. FIGURE 4-3. FIGURE 4-4. FIGURE 4-5. FIGURE 4-6. FIGURE 4-7. FIGURE 4-8. FIGURE 4-9. FIGURE 5-1. FIGURE 5-2. FIGURE 5-3. FIGURE 5-4. FIGURE 5-5. FIGURE 5-6. FIGURE 6-1. FIGURE 6-2. FIGURE 6-3. FIGURE 6-4. FIGURE 6-5. FIGURE 6-6. FIGURE 6-7. FIGURE 6-8. FIGURE 6-9. FIGURE 6-10. FIGURE 6-11. FIGURE 6-12. FIGURE 6-13. FIGURE 6-14. FIGURE 6-15. FIGURE 6-16. FIGURE 6-17. FIGURE 6-18. FIGURE 6-19. TRANSPARENT IP TRAFFIC THROUGH THE DATA-OVER-CABLE SYSTEM ..................................2 DATA-OVER-CABLE REFERENCE ARCHITECTURE ......................................................................3 SERVER LOCATION NOT AT CMTS ............................................................................................6 PROTOCOL STACK ON THE RF INTERFACE................................................................................11 DATA FORWARDING THROUGH THE CM AND CMTS...............................................................12 EXAMPLE CONDITION FOR NETWORK LOOPS ...........................................................................13 MAC FORWARDER ....................................................................................................................15 QPSK SYMBOL MAPPING..........................................................................................................23 16QAM GRAY-CODED SYMBOL MAPPING ...............................................................................23 16QAM DIFFERENTIAL-CODED SYMBOL MAPPING .................................................................23 SCRAMBLER STRUCTURE...........................................................................................................26 NOMINAL BURST TIMING ..........................................................................................................29 WORST-CASE BURST TIMING....................................................................................................30 EXAMPLE FRAME STRUCTURES WITH FLEXIBLE BURST LENGTH MODE..................................35 SIGNAL-PROCESSING SEQUENCE ...............................................................................................36 TDMA UPSTREAM TRANSMISSION PROCESSING ......................................................................37 EXAMPLE OF INTERLEAVING MPEG PACKETS IN DOWNSTREAM ............................................43 FORMAT OF AN MPEG PACKET ................................................................................................43 PACKET FORMAT WHERE A MAC FRAME IMMEDIATELY FOLLOWS THE POINTER_FIELD.......45 PACKET FORMAT WITH MAC FRAME PRECEDED BY STUFFING BYTES ...................................45 PACKET FORMAT SHOWING MULTIPLE MAC FRAMES IN A SINGLE PACKET ..........................45 PACKET FORMAT WHERE A MAC FRAME SPANS MULTIPLE PACKETS ...................................46 GENERIC MAC FRAME FORMAT...............................................................................................49 UPSTREAM MAC/PMD CONVERGENCE....................................................................................49 MAC HEADER FORMAT ............................................................................................................51 ETHERNET/802.3 PACKET PDU FORMAT..................................................................................53 ATM CELL MAC FRAME FORMAT ...........................................................................................54 RESERVED PDU FORMAT..........................................................................................................55 TIMING MAC HEADER ..............................................................................................................56 MANAGEMENT MAC HEADER ..................................................................................................57 REQUEST MAC HEADER FORMAT ............................................................................................58 CONCATENATION OF MULTIPLE MAC FRAMES........................................................................59 CONCATENATION MAC HEADER FORMAT ...............................................................................59 EXTENDED MAC FORMAT ........................................................................................................60 MAC HEADER AND MAC MANAGEMENT MESSAGE HEADER FIELDS.....................................62 FORMAT OF PACKET PDU FOLLOWING THE TIMING HEADER..................................................64 UPSTREAM CHANNEL DESCRIPTOR ...........................................................................................65 TOP-LEVEL ENCODING FOR A BURST DESCRIPTOR ..................................................................66 EXAMPLE OF UCD ENCODED TLV DATA.................................................................................68 MAP FORMAT ...........................................................................................................................68 MAP INFORMATION ELEMENT STRUCTURE..............................................................................69
ix
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
FIGURE 6-20. FIGURE 6-21. FIGURE 6-22. FIGURE 6-23. FIGURE 6-24. FIGURE 6-25. FIGURE 6-26. FIGURE 6-27. FIGURE 6-28. FIGURE 6-29. FIGURE 6-30. FIGURE 6-31. FIGURE 6-32. FIGURE 6-33. FIGURE 6-34. FIGURE 7-1. FIGURE 7-2. FIGURE 7-3. FIGURE 7-4. FIGURE 7-5. FIGURE 7-6. FIGURE 7-7. FIGURE 7-8. FIGURE 7-9. FIGURE 7-10. FIGURE 7-11. FIGURE 7-12. FIGURE 7-13. FIGURE 7-14. FIGURE 7-15. FIGURE C-1. FIGURE C-2. FIGURE C-3. FIGURE C-4. FIGURE C-5. FIGURE G-1. FIGURE H-1. FIGURE H-2.
PACKET PDU FOLLOWING THE TIMING HEADER..................................................................... 71 RANGING RESPONSE ................................................................................................................. 72 GENERALIZED DECISION FEEDBACK EQUALIZATION COEFFICIENTS ....................................... 73 CMTS DEMODULATOR EQUALIZER TAP LOCATION DEFINITION ............................................ 74 EXAMPLE OF TLV DATA .......................................................................................................... 74 REGISTRATION REQUEST .......................................................................................................... 76 EXAMPLE OF REGISTRATION REQUEST TYPE VALUE ENCODINGS........................................... 77 REGISTRATION RESPONSE FORMAT.......................................................................................... 78 EXAMPLE OF REGISTRATION RESPONSE ENCODING................................................................. 80 UPSTREAM CHANNEL CHANGE REQUEST................................................................................. 81 UPSTREAM CHANNEL CHANGE RESPONSE ............................................................................... 81 ALLOCATION MAP .................................................................................................................... 82 PROTOCOL EXAMPLE ................................................................................................................ 86 EXAMPLE OF SECURITY FRAMING AT THE CM ........................................................................ 94 EXAMPLE OF SECURITY FRAMING AT THE CMTS.................................................................... 94 CM INITIALIZATION OVERVIEW ............................................................................................... 98 SDL NOTATION ........................................................................................................................ 99 OBTAINING UPSTREAM PARAMETERS .................................................................................... 101 MESSAGE FLOWS DURING SCANNING AND UPSTREAM PARAMETER ACQUISITION .............. 102 RANGING AND AUTOMATIC ADJUSTMENTS PROCEDURE ....................................................... 103 INITIAL RANGING - CM .......................................................................................................... 104 INITIAL RANGING - CM (CONTINUED).................................................................................... 105 INITIAL RANGING - CMTS ..................................................................................................... 106 ESTABLISHING IP CONNECTIVITY........................................................................................... 107 ESTABLISHING TIME OF DAY.................................................................................................. 108 TRANSFERRING OPERATIONAL PARAMETERS AND REGISTRATION ........................................ 109 PERIODIC RANGING - CMTS .................................................................................................. 111 PERIODIC RANGING - CM VIEW ............................................................................................. 112 CHANGING UPSTREAM CHANNELS: CMTS VIEW .................................................................. 113 CHANGING UPSTREAM CHANNELS: CM VIEW....................................................................... 114 BINARY CONFIGURATION FILE FORMAT ................................................................................ 128 CREATE TLV ENTRIES FOR PARAMETERS REQUIRED BY THE CM ........................................ 129 ADD CM MIC......................................................................................................................... 129 ADD CMTS MIC .................................................................................................................... 130 ADD END OF DATA MARKER ................................................................................................. 130 ONE DOWNSTREAM AND FOUR UPSTREAM CHANNELS ......................................................... 163 SPANNING TREE TOPOLOGY ................................................................................................... 165 SPANNING TREE ACROSS CMTSS .......................................................................................... 166
x
Radio Frequency Interface Specification
SP-RFI-I03-980202
Tables
TABLE 2-1. TABLE 2-2. TABLE 4-1. TABLE 4-2. TABLE 4-3. TABLE 4-4. TABLE 4-5. TABLE 4-6. TABLE 4-7. TABLE 4-8. TABLE 4-9. TABLE 4-10. TABLE 4-11. TABLE 4-12. TABLE 4-13. TABLE 5-1. TABLE 6-1. TABLE 6-2. TABLE 6-3. TABLE 6-4. TABLE 6-5. TABLE 6-6. TABLE 6-7. TABLE 6-8. TABLE 6-9. TABLE 6-10. TABLE 6-11. TABLE 6-12. TABLE 6-13. TABLE 6-14. TABLE 6-15. TABLE 6-16. TABLE 6-17. TABLE 6-18. TABLE 6-19. TABLE 6-20. TABLE 7-1. TABLE 9-1. TABLE C-1. TABLE C-2. ASSUMED DOWNSTREAM RF CHANNEL TRANSMISSION CHARACTERISTICS..............................8 ASSUMED UPSTREAM RF CHANNEL TRANSMISSION CHARACTERISTICS....................................9 I/Q MAPPING ............................................................................................................................22 DERIVATION OF CURRENTLY TRANSMITTED SYMBOL QUADRANT ..........................................24 MAXIMUM CHANNEL WIDTH ....................................................................................................24 BURST PROFILE ATTRIBUTES ....................................................................................................27 USER UNIQUE BURST PARAMETERS..........................................................................................27 SPURIOUS EMISSIONS ................................................................................................................32 ADJACENT CHANNEL SPURIOUS EMISSIONS .............................................................................33 SPURIOUS EMISSIONS IN 5 TO 42 MHZ .....................................................................................33 MAXIMUM RANGE OF COMMANDED NOMINAL RECEIVE POWER IN EACH CARRIER ..........................................................................................37 ELECTRICAL OUTPUT FROM CM ...............................................................................................38 INTERLEAVER CHARACTERISTICS..............................................................................................38 CMTS OUTPUT..........................................................................................................................39 ELECTRICAL INPUT TO CM .......................................................................................................40 MPEG HEADER FORMAT FOR MCNS DATA-OVER-CABLE PACKETS......................................44 GENERIC MAC HEADER FORMAT.............................................................................................51 FC FIELD FORMAT ....................................................................................................................52 PACKET PDU FORMAT ..............................................................................................................53 ATM CELL MAC FRAME FORMAT ...........................................................................................54 RESERVED PDU FORMAT..........................................................................................................55 TIMING MAC HEADER FORMAT ...............................................................................................56 MANAGEMENT MAC HEADER FORMAT ...................................................................................57 REQUEST MAC HEADER (REQ) FORMAT.................................................................................58 CONCATENATED MAC FRAME FORMAT...................................................................................59 EXTENDED HEADER FORMAT....................................................................................................60 EH ELEMENT FORMAT ..............................................................................................................61 EH ELEMENT FORMAT ..............................................................................................................61 MAC MANAGEMENT MESSAGE TYPES.....................................................................................63 CHANNEL TLV PARAMETERS ...................................................................................................66 UPSTREAM PHYSICAL-LAYER BURST ATTRIBUTES ..................................................................67 ALLOCATION MAP INFORMATION ELEMENTS (IE) ..................................................................70 RANGING RESPONSE MESSAGE ENCODINGS .............................................................................73 SAMPLE SERVICE CLASS DATA ENCODING...............................................................................80 TRANSMIT OPPORTUNITY ..........................................................................................................89 EXAMPLE RELATING MINI-SLOTS TO TIME TICKS....................................................................93 RECOVERY PROCESS ON LOSS OF SPECIFIC MAC MESSAGES ................................................115 CHANNEL BURST PARAMETERS FOR ADVANCED MODEMS ....................................................120 SAMPLE CLASS OF SERVICE ENCODING ..................................................................................135 SAMPLE CAPABILITY ENCODING .............................................................................................136
xi
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
TABLE E-1. TABLE E-2. TABLE E-3. TABLE E-4. TABLE E-5. TABLE E-6. TABLE E-6. TABLE E-6. TABLE E-7. TABLE E-7. TABLE E-7. TABLE F-1. TABLE F-2. TABLE F-3. TABLE F-4. TABLE H-1. TABLE K-1. TABLE K-2.
AND
EXAMPLE CHANNEL BURST PARAMETER VALUES FOR QPSK OPERATION AT 160, 320, 640 KSYM/SEC................................................................................................................. 147
EXAMPLE CHANNEL BURST PARAMETER VALUES FOR QPSK OPERATION AT 1.28 AND 2.56 MSYM/SEC ...................................................................................................................... 148 EXAMPLE CHANNEL BURST PARAMETER VALUES FOR 16QAM OPERATION AT 160, 320, AND 640 KSYM/SEC................................................................................................. 149 EXAMPLE CHANNEL BURST PARAMETER VALUES FOR 16QAM OPERATION AT 1.28 AND 2.56 MSYM/SEC .............................................................................................................................. 150 EXAMPLE CHANNEL BURST PARAMETER VALUES FOR POWER-UP AND ACQUISITION IN A NEW CHANNEL .............................................................................................................. 151 FRAME FORMAT EXAMPLES WITH QPSK OPERATION ........................................................... 152 TABLE E-6. FRAME FORMAT EXAMPLES WITH QPSK OPERATION (CONTINUED) ................ 153 TABLE E-6. FRAME FORMAT EXAMPLES WITH QPSK OPERATION (CONTINUED) ................. 154 FRAME FORMAT EXAMPLES WITH 16QAM OPERATION ........................................................ 155 TABLE E-7. FRAME FORMAT EXAMPLES WITH 16QAM OPERATION (CONTINUED) .............. 156 TABLE E-7. FRAME FORMAT EXAMPLES WITH 16QAM OPERATION (CONTINUED) .............. 157 BROADCASTING ALLOCATIONS BETWEEN 5 AND 42 MHZ .................................................... 160 AMATEUR AND CITIZENS BAND ALLOCATIONS BETWEEN 5 AND 42 MHZ ........................... 161 DATA CARRIERS IN THE GAPS BETWEEN BROADCASTING BANDS ........................................ 162 DATA CARRIERS IN THE GAPS BETWEEN BROADCASTING, AMATEUR AND CB BANDS ....... 162 CM PATH COST ...................................................................................................................... 167 ECN REVISION TABLE............................................................................................................ 185 ECN REVISION TABLE............................................................................................................ 186
xii
Radio Frequency Interface Specification
SP-RFI-I03-980202
Radio Frequency Interface Specifications 1 Scope and Purpose
1.1 Scope
This Interim Specification defines the radio-frequency interface specifications for high-speed data-over-cable systems that are being developed by the Multimedia Cable Network System (MCNS) consortium. It is being issued to facilitate design and field testing leading to the early manufacturability and interoperability of conforming hardware by multiple vendors.
1.2 Requirements
Throughout this document, the words that are used to define the significance of particular requirements are capitalized. These words are: "MUST" "MUST NOT" "SHOULD" This word or the adjective "REQUIRED" means that the item is an absolute requirement of this specification. This phrase means that the item is an absolute prohibition of this specification. This word or the adjective "RECOMMENDED" means that there may exist valid reasons in particular circumstances to ignore this item, but the full implications should be understood and the case carefully weighed before choosing a different course. This phrase means that there may exist valid reasons in particular circumstances when the listed behavior is acceptable or even useful, but the full implications should be understood and the case carefully weighed before implementing any behavior described with this label. This word or the adjective "OPTIONAL" means that this item is truly optional. One vendor may choose to include the item because a particular marketplace requires it or because it enhances the product, for example; another vendor may omit the same item.
"SHOULD NOT"
"MAY"
Other text is descriptive or explanatory.
1.3 Background
1.3.1 Service Goals
Cable operators are interested in deploying high-speed data communications systems on cable television systems. Comcast Cable Communications, Inc., Cox Communications, Tele-Communications, Inc., Time Warner Cable, MediaOne, Inc., Rogers Cablesystems Limited, and Cable Television Laboratories, Inc. (on behalf of the CableLabs member companies), have decided to prepare a series of interface specifications that will permit the early definition, design, development and deployment of data-over-cable systems on an uniform, consistent, open, non-proprietary, multi-vendor interoperable basis. The intended service will allow transparent bi-directional transfer of Internet Protocol (IP) traffic, between the cable system headend and customer locations, over an all-coaxial or hybrid-fiber/coax (HFC) cable network. This is shown in simplified form in Figure 1-1.
1
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Wide-Area Network CMTS Network Side Interface
Cable Modem Termination System CMTS
Cable Network
Cable Modem (CM)
CM Customer Premises Equipment Interface Customer Premises Equipment
Transparent IP Traffic Through the System
Figure 1-1. Transparent IP Traffic Through the Data-Over-Cable System
The transmission path over the cable system is realized at the headend by a Cable Modem Termination System (CMTS), and at each customer location by a Cable Modem (CM). At the headend (or hub), the interface to the data-over-cable system is called the Cable Modem Termination System - Network-Side Interface (CMTS-NSI) and is specified in [MCNS3]. At the customer locations, the interface is called the cable-modem-to-customerpremises-equipment interface (CMCI) and is specified in [MCNS4]. The intent is for the MCNS operators to transparently transfer IP traffic between these interfaces, including but not limited to datagrams, DHCP, ICMP, and IP Group addressing (broadcast and multicast). 1.3.2 Reference Architecture
The reference architecture for the data-over-cable services and interfaces is shown in Figure 1-2.
2
Radio Frequency Interface Specification
Distribution Hub or Headend
Operations Support System
Copper Pairs, DS1 or DS3
PSTN
Telco Return Access Concentrator (TRAC)
Data Over Cable System OSS Interface, DOCS-OSSI Cable Modem Termination System Downstream RF Interface
Cable Modem Termination System Network Side Interface, CMTS-NSI
Distribution Network O/E Node O/E Node Tx Rx Fiber O/E Node Customer Removable Premise Security Equipment Cable Module Modem
Coax
Video 1 Combiner
Cable Modem Termination System
Video 2 . Data
50-860MHz
WAN
Generic Headend Switch or Backbone Transport Adapter
Mod Network Termination Demod Data . . . Upstream splitter and filter bank
5-42MHz
Cable Modem to RF Interface, Cable Modem to CPE Interface, CMCI Telco return
Backbone Network
Local Server Facility
Data Over Cable Security System (DOCSS)
Security & Access Controller
. Cable Modem Termination System Upstream RF Interface
Cable Modem Telco Return Interface, CMTRI
WAN
Remote Server Facility
SP-RFI-I03-980202
Figure 1-2. Data-Over-Cable Reference Architecture 3
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
1.3.2.1 Categories of Interface Specification The basic reference architecture of Figure 1-2 involves three categories of interface. These are being developed in phases. a. Phase 1 Data Interfaces - These are the CMCI [MCNS4] and CMTS-NSI [MCNS3], corresponding respectively to the cable-modem-to-customer-premises-equipment (CPE) interface (for example, between the customer's computer and the cable modem), and the cable modem termination system network-side interface between the cable modem termination system and the data network. b. Phase 2 Operations Support Systems Interfaces - These are network element management layer interfaces between the network elements and the high-level OSSs (operations support systems) which support the basic business processes, and are documented in [MCNS5]. Telephone Return Interface - CMTRI - This is the interface between the cable modem and a telephone return path, for use in cases where the return path is not provided or not available via the cable network, and is documented in [MCNS6]. c. Phase 3 RF Interfaces - The RF interfaces defined in this document are the following:
* Between the cable modem and the cable network. * Between the CMTS and the cable network, in the downstream direction (traffic toward the
customer)
* Between the CMTS and the cable network, in the upstream direction (traffic from the customer).
Security requirements -
* The Data Over Cable Security System (DOCSS) is defined in [MCNS2]. * The CM Removable Security Module (RSM) is defined in [MCNS7]. * Baseline data-over-cable security is defined in [MCNS8].
4
Radio Frequency Interface Specification
SP-RFI-I03-980202
1.3.2.2 Data-Over-Cable Interface Documents A list of the documents in the Data-Over-Cable Interface Specifications family is provided below. For updates, please refer to URL http://www.cablemodem.com.
Designation SP-CMCI SP-CMTS-NSI SP-CMTRI SP-OSSI SP-RFI SP-DOCSS SP-RSM SP-BDS Title Cable Modem to Customer Premises Equipment Interface Specification Cable Modem Termination System Network Side Interface Specification Cable Modem Telco Return Interface Specification Operations Support System Interface Specification Radio Frequency Interface Specification Data Over Cable Security System (DOCSS) Specification Removable Security Module Specification Baseline Data Over Cable Security Specification
Key to Designations: SP TR Specification Technical Report (provides a context for understanding and applying the specification-- documents of this type may be issued in the future.) Server Location
1.3.3
This document refers to several servers which are central to the system operation (e.g., provision and security servers). The message sequence charts used as examples within this document show sample message exchanges in which access to the servers is via the CMTS. It is important to note that access to these servers need not necessarily be via the CMTS, but MAY be via any CM suitably configured. In this case, the scenarios become slightly more complex, as the message flows are as shown in Figure 1-3. Allowing placement of these components to be at locations other than the CMTS allows the system operator the maximum flexibility in server placement and network configuration. Note that the CMTS MUST be able to initialize without access to the servers in this configuration.
5
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Configuration: CMTS
CM1 Servers CM2
Message Flows: CM1 CMTS CM2 Server
Figure 1-3. Server Location Not At CMTS
6
Radio Frequency Interface Specification
SP-RFI-I03-980202
2 Functional Assumptions
This section describes the characteristics of cable television plant to be assumed for the purposes of operation of the data-over-cable system. It is not a description of CMTS or CM parameters. The data-over-cable system MUST operate satisfactorily in the environment described in this section.
2.1 Broadband Access Network
A coaxial-based broadband access network is assumed. This may take the form of either an all-coax or hybridfiber/coax (HFC) network. The generic term "cable network" is used here to cover all cases. A cable network uses a shared-medium, tree-and-branch architecture with analog transmission. The key functional characteristics assumed in this document are the following:
* Two-way transmission. * A maximum optical/electrical spacing between the CMTS and the most distant customer terminal of 100
miles, although typical maximum separation may be 10-15 miles.
* A maximum differential optical/electrical spacing between the CMTS and the closest and most distant
modems of 100 miles, although this would typically be limited to 15 miles.
2.2 Equipment Assumptions
2.2.1 Frequency Plan
In the downstream direction, the cable system is assumed to have a passband with a lower edge at 50 or 54 MHz and an upper edge which is implementation-dependent but is typically in the range of 300 to 860 MHz. Within that passband, NTSC analog television signals in 6-MHz channels are assumed to be present on the standard, HRC or IRC frequency plans of EIA Interim Standard IS-6, as well as other narrowband and wideband digital signals. In the upstream direction, the cable system may have a subsplit (5-30 MHz) or extended subsplit (5-42 MHz) passband. NTSC analog television signals in 6-MHz channels may be present, as well as other signals. 2.2.2 Compatibility with Other Services
The CM and CMTS MUST coexist with the other services on the cable network. In particular, a) they MUST operate satisfactorily in cable spectrum assigned for CMTS-CM interoperation while the balance of the cable spectrum is occupied by any combination of television and other signals; and
b) they MUST NOT cause harmful interference to any other services that are assigned to the cable network in spectrum outside of that allocated to the CMTS. 2.2.3 Fault Isolation Impact on Other Users
As the data-over-cable system is a shared-media, point-to-multipoint system, fault-isolation procedures MUST take into account the potential harmful impact of faults and fault-isolation procedures on numerous users of the data-over-cable and other services.
7
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
2.3 RF Channel Assumptions
The data-over-cable system, configured with at least one set of defined physical-layer parameters (e.g., modulation, forward error correction, symbol rate, etc.) from the range of configuration settings described in this specification, must be capable of operating with a 1500-byte packet loss rate of less than one percent while forwarding at least 100 packets per second on cable networks having characteristics defined in Section 2.3. 2.3.1 Transmission Downstream
The RF channel transmission characteristics of the cable network in the downstream direction assumed for the purposes of minimal operating capability are described in Table 2-1. This assumes nominal analog video carrier level (peak envelope power) in a 6-MHz channel bandwidth. All conditions are present concurrently.
Table 2-1. Assumed Downstream RF Channel Transmission Characteristics
Parameter Frequency range Value Cable system normal downstream operating range is from 50 MHz to as high as 860 MHz. However, the values in this table apply only at frequencies >= 88 MHz. 6 MHz <= 0.800 msec (typically much less) Not less than 35 dB (Note 4) Not less than 35 dB within the design bandwidth Not greater than -50 dBc within the design bandwidth Not greater than -50 dBc within the design bandwidth Not greater than -40 dBc within the design bandwidth 0.5 dB within the design bandwidth 75 ns within the design bandwidth -10 dBc @ <= 0.5 sec, -15 dBc @ <= 1.0 sec -20 dBc @ <= 1.5 sec, -30 dBc @ > 1.5 sec Carrier hum modulation Burst noise Seasonal and diurnal signal level variation Signal level slope, 50-750 MHz Maximum analog video carrier level at the CM input, inclusive of above signal level variation Lowest analog video carrier level at the CM input, inclusive of above signal level variation Notes to Table 2-1: 1. 2. 3. 4. 5. Transmission is from the headend combiner to the CM input at the customer location. For measurements above the normal downstream operating frequency band (except hum), impairments are referenced to the highest-frequency NTSC carrier level. For hum measurements above the normal downstream operating frequency band, a continuous-wave carrier is sent at the test frequency at the same level as the highest-frequency NTSC carrier. This presumes that the digital carrier is operated at analog peak carrier level. When the digital carrier is operated below the analog peak carrier level, this C/N may be less. Measurement methods defined in [NCTA] or [CableLabs2]. Not greater than -26 dBc (5%) Not longer than 25 sec at a 10 Hz average rate 8 dB 16 dB 17 dBmV -5 dBmV
RF channel spacing (design bandwidth) Transit delay from headend to most distant customer Carrier-to-noise ratio in a 6-MHz band (analog video level) Carrier-to-interference ratio for total power (discrete and broadband ingress signals) Composite triple beat distortion for analog modulated carriers Composite second order distortion for analog modulated carriers Cross-modulation level Amplitude ripple Group delay ripple in the spectrum occupied by the CMTS Micro-reflections bound for dominant echo
8
Radio Frequency Interface Specification
SP-RFI-I03-980202
2.3.2
Transmission Upstream
The RF channel transmission characteristics of the cable network in the upstream direction assumed for the purposes of minimal operating capability are described in Table 2-2. All conditions are present concurrently.
Table 2-2. Assumed Upstream RF Channel Transmission Characteristics
Parameter Frequency range Transit delay from the most distant CM to the nearest CM or CMTS Carrier-to-noise ratio Carrier-to-ingress power (the sum of discrete and broadband ingress signals) ratio Carrier- to-interference (the sum of noise, distortion, common-path distortion and cross-modulation) ratio Carrier hum modulation Burst noise Amplitude ripple Group delay ripple Micro-reflections -- single echo Value 5 to 42 MHz edge to edge <= 0.800 msec (typically much less) Not less than 25 dB Not less than 25 dB (Note 2) Not less than 25 dB Not greater than -23 dBc (7.0 %) Not longer than 10 sec at a 1 kHz average rate for most cases (Notes 3, 4 and 5) 5-42 MHz: 0.5 dB/MHz 5-42 MHz: 200 ns/MHz -10 dBc @ <= 0.5 -20 dBc @ <= 1.0
sec sec
-30 dBc @ > 1.0 sec Seasonal and diurnal signal level variation Notes to Table 2-2. 1. 2. 3. 4. 5. Transmission is from the CM output at the customer location to the headend. Ingress avoidance or tolerance techniques MAY be used to ensure operation in the presence of time-varying discrete ingress signals that could be as high as 0 dBc [CableLabs1]. Amplitude and frequency characteristics sufficiently strong to partially or wholly mask the data carrier. CableLabs report containing distribution of return-path burst noise measurements and measurement method is forthcoming. Impulse noise levels more prevalent at lower frequencies (< 15 MHz). Not greater than 8 dB min to max
2.3.2.1 Availability Typical cable network availability is considerably greater than 99 %.
2.4 Transmission Levels
The nominal power level of the downstream CMTS 64QAM signal(s) within a 6-MHz channel is targeted to be in the range -10 dBc to -6 dBc relative to analog video carrier level and will normally not exceed analog video carrier level. The nominal power level of the upstream CM signal(s) will be as low as possible to achieve the required margin above noise and interference. Uniform power loading per unit bandwidth is commonly followed in setting upstream signal levels, with specific levels established by the cable network operator to achieve the required carrier-to-noise and carrier-to-interference ratios.
9
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
2.5 Frequency Inversion
There will be no frequency inversion in the transmission path in either the downstream or upstream directions, i.e., a positive change in frequency at the input to the cable network will result in a positive change in frequency at the output.
10
Radio Frequency Interface Specification
SP-RFI-I03-980202
3 Communication Protocols
This section provides a high-level overview of the communication protocols that MUST be used in the dataover-cable system. Detailed specifications for the physical media dependent, downstream transmission, and media access control sublayers are provided in Section 4, Section 5, and Section 6, respectively.
3.1 Protocol Stack
The CM and CMTS operate as forwarding agents and also as end-systems (hosts). The protocol stacks used in these modes differ as shown below. The principal function of the cable modem system is to transmit Internet Protocol (IP) packets transparently between the headend and the subscriber location. Certain management functions also ride on IP, so that the protocol stack on the cable network is as shown in Figure 3-1 (this does not restrict the generality of IP transparency between the headend and the customer). These management functions include, for example, supporting spectrum management functions and the downloading of software. 3.1.1 CM and CMTS as Hosts
CMs and CMTSs will operate as IP and LLC hosts in terms of IEEE Standard 802 [IEEE802] for communication over the cable network. The protocol stack at the CM and CMTS RF interfaces is shown in Figure 3-1.
SNMP
TFTP
DHCP
Security Management
UDP
IP, ICMP
ARP
LLC/DIX
Link Security
MAC
Transmission Convergence (Downstream Only)
PMD
Figure 3-1. Protocol Stack on the RF Interface
11
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
The CM and CMTS MUST function as IP hosts. As such, the CM and CMTS MUST support IP and ARP over DIX link-layer framing (see [DIX]). The CM and CMTS MAY also support IP and ARP over SNAP framing [RFC-1042]. The CM and CMTS also MUST function as LLC hosts. As such, the CM and CMTS MUST respond appropriately to TEST and XID requests per [ISO8802-2]. 3.1.2 Data Forwarding Through the CM and CMTS
3.1.2.1 General Data forwarding through the CMTS MAY be transparent bridging, or MAY employ network-layer forwarding (routing, IP switching) as shown in Figure 3-2. Data forwarding through the CM is link-layer transparent bridging, as shown in Figure 3-2. Forwarding rules are similar to [ISO/IEC10038] with the modifications described in Section 3.1.2.2 and Section 3.1.2.3. This allows the support of multiple network layers.
CMTS Stack IP Forwarding 802.2/DIX LLC Data Link Layer Link Security Cable MAC PHY Layer Downstream Trans Conv Cable PMD
CM Stack IP 802.2/DIX LLC Transparent Bridging Link Security Cable MAC Downstream Trans Conv Cable PMD 802.2/DIX LLC 802.3/DIX MAC 802.3 10Base-T
CMTS-NSI Interface to/from Network Equipment
Cable Network Transmission
CMCI Interface to/from Customer Premises Equipment
Figure 3-2. Data Forwarding Through the CM and CMTS
Forwarding of IP traffic MUST be supported. Support of other network layer protocols is OPTIONAL. The ability to restrict the network layer to a single protocol such as IP is REQUIRED. Support for the 802.1d spanning tree protocol of [ISO/IEC10038] with the modifications described in Section 3.1.2.3 is OPTIONAL for CMs intended for residential use. CMs intended for commercial use and bridging CMTSs MUST support this version of spanning tree (see Appendix H). CMs and CMTSs MUST include the ability to filter (and disregard) 802.1d BPDUs. This specification assumes that CMs intended for residential use will not be connected in a configuration which would create network loops such as that shown in Figure 3-3.
12
Radio Frequency Interface Specification
SP-RFI-I03-980202
CMTS
Cable Network
CM #1
CM #2
Local ISO8802 Network
CPE
Figure 3-3. Example Condition for Network Loops
3.1.2.2 CMTS Forwarding Rules At the CMTS, if link-layer forwarding is used, then it MUST conform to the following general 802.1d guidelines:
* Link-layer frames between a given pair of end-stations MUST be delivered in order. * Link-layer frames MUST NOT be duplicated. * Stale frames (those that cannot be delivered in a timely fashion) MUST be discarded.
The address-learning and -aging mechanisms used are vendor-dependent. If network-layer forwarding is used, then the CMTS should conform to IETF Router Requirements [RFC-1812] with respect to its CMTS-RFI and CMTS-NSI interfaces. Conceptually, the CMTS forwards data packets at two abstract interfaces: between the CMTS-RFI and the CMTS-NSI, and between the upstream and downstream channels. The CMTS MAY use any combination of link-layer (bridging) and network-layer (routing) semantics at each of these interfaces. The methods used at the two interfaces need not be the same. Forwarding between the upstream and downstream channels within a MAC layer differs from traditional LAN forwarding in that:
* A single channel is simplex, and cannot be considered a complete interface for most protocol (e.g., 802.1d
spanning tree, Routing Information Protocol per [RFC-1058]) purposes.
* Upstream channels are essentially point-to-point, whereas downstream channels are shared-media. * As a public network, policy decisions may override full connectivity.
For these reasons, an abstract entity called the MAC Forwarder exists within the CMTS to provide connectivity between stations within a MAC domain (see Section 3.2). 3.1.2.3 CM Forwarding Rules Data forwarding through the CM is link-layer bridging with the following specific rules.
13
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
3.1.2.3.1
Address Learning
* The CM MUST acquire Ethernet MAC addresses of connected CPE devices, either from the provisioning
process or from learning, until the CM acquires its maximum number of CPE addresses (a device-dependent value). Once the CM acquires its maximum number of CPE addresses, then newly discovered CPE addresses MUST NOT replace previously acquired addresses. The CM must support acquisition of at least one CPE address.
* The CM MUST allow configuration of CPE addresses during the provisioning process (up to its maximum
number of CPE addresses) to support configurations in which learning is not practical nor desired.
* Addresses provided during the CM provisioning MUST take preference over learned addresses. * CPE addresses MUST NOT be aged out. * On a CM reset (e.g., a power cycle), all learned addresses MUST be discarded (they are not retained in nonvolatile storage, to allow modification of user MAC addresses or movement of the CM). 3.1.2.3.2 Forwarding
CM forwarding in both directions MUST conform to the following general 802.1d guidelines:
* Link-layer frames between a given pair of end-stations MUST be delivered in order. * Link-layer frames MUST NOT be duplicated. * Stale frames (those that cannot be delivered in a timely fashion) MUST be discarded.
Cable-Network-to-Ethernet forwarding MUST follow the following specific rules:
* Frames addressed to unknown destinations MUST NOT be forwarded from the cable port to the Ethernet
port.
* Broadcast frames MUST be forwarded to the Ethernet port, unless they are from source addresses which are
provisioned or learned as supported CPE devices, in which case they MUST NOT be forwarded.
* Multicast frames MUST be forwarded to the Ethernet ports in accordance with filtering configuration settings
specified by the cable operator's operations and business support systems, unless they are from source addresses which are provisioned or learned as supported CPE devices, in which case they MUST NOT be forwarded. Ethernet-to-Cable-Network forwarding MUST follow the following specific rules:
* Frames addressed to unknown destinations MUST be forwarded from the Ethernet port to the cable port. * Broadcast frames MUST be forwarded to the cable port. * Multicast frames MUST be forwarded to the cable port in accordance with filtering configuration settings
specified by the cable operator's operations and business support systems.
* Frames from source addresses other than those provisioned or learned as supported CPE devices MUST NOT
be forwarded.
* If a single-user CM has learned a supported address, it MUST NOT forward data from a second source. Other
(non-supported) CPE source addresses MUST be learned from the Ethernet port and this information used to filter local traffic as in a traditional learning bridge.
* If a single-user CM has learned A as its supported CPE device and learned B as a second device connected to
the Ethernet port, it MUST filter any traffic from A to B.
14
Radio Frequency Interface Specification
SP-RFI-I03-980202
3.2 The MAC Forwarder
The MAC Forwarder is a MAC sublayer that resides on the CMTS just below the MAC service access point (MSAP) interface, as shown in Figure 3-4. It is responsible for delivering upstream frames to
* One or more downstream channels * The MSAP interface.
In Figure 3-4, the LLC sublayer and link security sublayers of the upstream and downstream channels on the cable network terminate at the MAC Forwarder. The MSAP interface user MAY be the NSI-RFI Forwarding process or the CMTS's host protocol stack.
CMTS RFI-NSI Forwarding Process Host IP Stack, incl. LLC and 802.2/DIX MAC Service Access Point (MSAP) Interface CMTS -NSI MAC Forwarder Link Security MAC
Upstream and Downstream Channels
Figure 3-4. MAC Forwarder
Delivery of frames may be based on data-link-layer (bridging) semantics, network-layer (routing) semantics, or some combination. Higher-layer semantics may also be employed (e.g., filters on UDP port numbers). The CMTS MUST provide IP connectivity between hosts attached to cable modems, and must do so in a way that meets the expectations of Ethernet-attached customer equipment. For example, the CMTS must either forward ARP packets or it must facilitate a proxy ARP service. The CMTS MAC Forwarder MAY provide service for non-IP protocols. Note that there is no requirement that all upstream and downstream channels be aggregated under one MSAP as shown above. The vendor could just as well choose to implement multiple MSAPs, each with a single upstream and downstream channel. 3.2.1 Example Rules for Data-Link-Layer Forwarding
If the MAC Forwarder is implemented using only data-link-layer semantics, then the requirements in this section apply. Delivery of frames is dependent on the Destination Address within the frame. The means of learning the location of each address is vendor-dependent, and MAY include:
* Transparent-bridging-like source-address learning and aging * Gleaning from MAC Registration Request messages
15
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
* Administrative means.
If the destination address of a frame is unicast, and that address is associated with a particular downstream channel, then the frame MUST be forwarded to that channel.1 If the destination address of a frame is unicast, and that address is known to reside on the other (upper) side of the MSAP interface, then the frame MUST be delivered to the MSAP interface. If the destination address is broadcast, multicast2, or unknown, the frame MUST BE delivered to both the MSAP and to all downstream channels. Delivery rules are similar to those for transparent bridging:
* * * *
Frames from a specific source to a particular destination MUST be delivered in order. Frames MUST NOT be duplicated. Frames that cannot be delivered in a timely fashion MUST be discarded. The Frame Check Sequence SHOULD be preserved rather than regenerated.
3.3 Network Layer
As stated above, the purpose of the data-over-cable system is to transport IP traffic transparently through the system. The Network Layer protocol is the Internet Protocol (IP) version 4, as defined in RFC-791, and migrating to IP version 6. This document imposes no requirements for reassembly of IP packets.
3.4 Above the Network Layer
The subscribers will be able to use the transparent IP capability as a bearer for higher-layer services. Use of these services will be transparent to the CM. In addition to the transport of user data, there are several network management and operation capabilities which depend upon the Network Layer. These include:
* SNMP (Simple Network Management Protocol, [RFC-1157]), for network management. * TFTP (Trivial File Transfer Protocol, [RFC-1350]), a file transfer protocol, for downloading software and
configuration information.
* DHCP (Dynamic Host Configuration Protocol, DHCP [RFC-1541]), a framework for passing configuration
information to hosts on a TCP/IP network.
* A security management protocol as defined in [MCNS2].
1. Vendors may implement extensions, similar to static addresses in 802.1d/ISO 10038 bridging, that cause such frames to be filtered or handled in some other manner. 2.The all-CMTSs multicast address (see Appendix A) is an exception. 802.1d/ISO 10038 Spanning Tree Bridge PDUs must be forwarded.
16
Radio Frequency Interface Specification
SP-RFI-I03-980202
3.5 Data Link Layer
The Data Link Layer is divided into sublayers in accordance with [IEEE802], with the addition of Link-Layer security in accordance with [MCNS2] and [MCNS8]. The sublayers, from the top, are:
* Logical Link Control (LLC) sublayer (Class 1 only) * Link-Layer Security sublayer * Media Access Control (MAC) sublayer.
3.5.1 LLC Sublayer
The LLC sublayer MUST be provided in accordance with [ISO/IEC10039]. Address resolution MUST be used as defined in [RFC-826]. The MAC-to-LLC service definition is specified in [ISO/IEC10039]. 3.5.2 Link-Layer Security Sublayer
Link-layer security MUST be provided in accordance with [MCNS2] and [MCNS8]. 3.5.3 MAC Sublayer
The definition, in detail, of the MAC sublayer and associated interfaces is provided in Section 6 of this document. The MAC sublayer defines a single transmitter for each downstream channel - the CMTS. All CMs listen to all frames transmitted on the downstream channel upon which they are registered and accept those where the destinations match the CM itself or CPEs reached via the CMCI port. CMs can communicate with other CMs only through the CMTS. The upstream channel is characterized by many transmitters (CMs) and one receiver (the CMTS). Time in the upstream channel is slotted, providing for Time Division Multiple Access at regulated time ticks. The CMTS provides the time reference and controls the allowed usage for each interval. Intervals may be granted for transmissions by particular CMs, or for contention by all CMs. CMs may contend to request transmission time. To a limited extent, CMs may also contend to transmit actual data. In both cases, collisions can occur and retries are used. Section 6 describes the MAC-sublayer messages from the CMTS which direct the behavior of the CMs on the upstream channel, as well as messaging from the CMs to the CMTS. 3.5.3.1 Overview Some of the MAC protocol highlights include:
* * * * * * * *
Bandwidth allocation controlled by CMTS A stream of mini-slots in the upstream Dynamic mix of contention- and reservation-based upstream transmit opportunities Bandwidth efficiency through support of variable-length packets Extensions provided for future support of ATM or other Data PDU Class-of-service support Extensions provided for security at the Data Link layer Support for a wide range of data rates
17
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
3.5.3.2 MAC Service Definition The MAC sublayer service definition is in Appendix D.
3.6 Physical Layer
The Physical (PHY) layer is comprised of two sublayers:
* Transmission Convergence sublayer (present in the downstream direction only) * Physical Media Dependent (PMD) sublayer.
3.6.1 Downstream Transmission Convergence Sublayer
The Downstream Transmission Convergence sublayer exists in the downstream direction only. It provides an opportunity for additional services over the physical-layer bitstream. These additional services might include, for example, digital video. Definition of any such additional services is beyond the scope of this document. This sublayer is defined as a continuous series of 188-byte MPEG [ITU-T H.222.0] packets, each consisting of a 4-byte header followed by 184 bytes of payload. The header identifies the payload as belonging to the data-overcable MAC. Other values of the header may indicate other payloads. The mixture of payloads is arbitrary and controlled by the CMTS. The Downstream Transmission Convergence sublayer is defined in Section 5 of this document. 3.6.2 PMD Sublayer
3.6.2.1 Overview The PMD sublayer involves digitally modulated RF carriers on the analog cable network. In the downstream direction, the PMD sublayer is based on [ITU J.83-B], with the exceptions called out in Section 4.3.2, and includes these features:
* 64 and 256 QAM modulation formats * 6-MHz occupied spectrum coexists with all other signals on the cable plant * Concatenation of Reed-Solomon block code and Trellis code supports operation in a higher percentage of
North American cable networks
* Variable-depth interleaver supports both latency-sensitive and -insensitive data.
The features in the upstream direction are as follows:
* * * * * * * *
Flexible and programmable CM under control of the CMTS Frequency agility Time division multiple access QPSK and 16 QAM modulation formats Support of both fixed-frame and variable-length PDU formats Multiple symbol rates Programmable Reed-Solomon block coding Programmable preambles.
18
Radio Frequency Interface Specification
SP-RFI-I03-980202
3.6.2.2 Interface Points Three RF interface points are defined at the PMD sublayer: a) Downstream output on the CMTS
b) Upstream input on the CMTS c) Cable in/out at the cable modem.
Separate downstream output and upstream input interfaces on the CMTS are required for compatibility with typical downstream and upstream signal combining and splitting arrangements in headends.
19
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
This page intentionally left blank.
20
Radio Frequency Interface Specification
SP-RFI-I03-980202
4 Physical Media Dependent Sublayer Specification
4.1 Scope
This specification defines the electrical characteristics and protocol for a cable modem (CM) and cable modem termination system (CMTS). It is the intent of this specification to define an interoperable CM and CMTS such that any implementation of a CM can work with any CMTS. It is not the intent of this specification to imply any specific implementation.
4.2 Upstream
4.2.1 Overview
The upstream Physical Media Dependent (PMD) sublayer uses a FDMA/TDMA burst modulation format, which provides five symbol rates and two modulation formats (QPSK and 16QAM). The modulation format includes pulse shaping for spectral efficiency, is carrier-frequency agile, and has selectable output power level. The PMD sublayer format includes a variable-length modulated burst with precise timing beginning at boundaries spaced at integer multiples of 6.25 sec apart (which is 16 symbols at the highest data rate). Each burst supports a flexible modulation, symbol rate, preamble, randomization of the payload, and programmable FEC encoding. All of the upstream transmission parameters associated with burst transmission outputs from the CM are configurable by the CMTS via MAC messaging. Many of the parameters are programmable on a burst-by-burst basis. The PMD sublayer can support a near-continuous mode of transmission, wherein ramp-down of one burst MAY overlap the ramp-up of the following burst, so that the transmitted envelope is never zero. The system timing of the TDMA transmissions from the various CMs MUST provide that the center of the last symbol of one burst and the center of the first symbol of the preamble of an immediately following burst are separated by at least the duration of five symbols. The guard time MUST be greater than or equal to the duration of five symbols plus the maximum timing error. Timing error is contributed by both the CM and CMTS. CM timing performance is specified in Section 4. Maximum timing error and guard time may vary with CMTSs from different vendors. The upstream modulator is part of the cable modem which interfaces with the cable network. The modulator contains the actual electrical-level modulation function and the digital signal-processing function; the latter provides the FEC, preamble prepend, symbol mapping, and other processing steps. This specification is written with the idea of buffering the bursts in the signal processing portion, and with the signal processing portion (1) accepting the information stream a burst at a time, (2) processing this stream into a complete burst of symbols for the modulator, and (3) feeding the properly-timed bursted symbol stream to a memoryless modulator at the exact burst transmit time. The memoryless portion of the modulator only performs pulse shaping and quadrature upconversion. At the Demodulator, similar to the Modulator, there are two basic functional components: the demodulation function and the signal processing function. Unlike the Modulator, the Demodulator resides in the CMTS and the specification is written with the concept that there will be one demodulation function (not necessarily an actual physical demodulator) for each carrier frequency in use. The demodulation function would receive all bursts on a given frequency.
Note: The unit design approach should be cognizant of the multiple-channel nature of the demodulation and signal processing to be carried out at the headend, and partition/share functionality appropriately to optimally leverage the multi-channel application. A Demodulator design supporting multiple channels in a Demodulator unit may be appropriate.
21
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
The demodulation function of the Demodulator accepts a varying-level signal centered around a commanded power level and performs symbol timing and carrier recovery and tracking, burst acquisition, and demodulation. Additionally, the demodulation function provides an estimate of burst timing relative to a reference edge, an estimate of received signal power, an estimate of signal-to-noise ratio, and may engage adaptive equalization to mitigate the effects of a) echoes in the cable plant, b) narrowband ingress and c) group delay. The signalprocessing function of the Demodulator performs the inverse processing of the signal-processing function of the Modulator. This includes accepting the demodulated burst data stream and decoding, etc., and possibly multiplexing the data from multiple channels into a single output stream. The signal-processing function also provides the edge-timing reference and gating-enable signal to the demodulators to activate the burst acquisition for each assigned burst slot. The signal-processing function may also provide an indication of successful decoding, decoding error, or fail-to-decode for each codeword and the number of corrected Reed-Solomon symbols in each codeword. For every upstream burst, the CMTS has a priori knowledge of the exact burst length in symbols (see Section 4.2.6, Section 4.2.10.1, and A.2). 4.2.2 Modulation Formats
The upstream modulator MUST provide both QPSK and 16QAM modulation formats. The upstream demodulator MUST support QPSK, 16QAM, or both modulation formats. 4.2.2.1 Modulation Rates The upstream modulator MUST provide QPSK at 160, 320, 640, 1,280, and 2,560 ksym/sec, and 16QAM at 160, 320, 640, 1,280, and 2,560 ksym/sec. This variety of modulation rates, and flexibility in setting upstream carrier frequencies, permits operators to position carriers in gaps in the pattern of narrowband ingress, as discussed in Appendix F. The upstream symbol rate MUST be fixed for each upstream frequency. 4.2.2.2 Symbol Mapping The modulation mode (QPSK or 16QAM) is programmable. The symbols transmitted in each mode and the mapping of the input bits to the I and Q constellation MUST be as defined in Table 4-1. In the table, I1 is the MSB of the symbol map, Q1 is the LSB for QPSK, and Q 0 is the LSB for 16QAM. Q 1 and I0 have intermediate bit positions in 16QAM. The MSB MUST be the first bit in the serial data into the symbol mapper.
Table 4-1. I/Q Mapping
QAM Mode QPSK 16QAM Input bit Definitions I1 Q1 I1 Q1 I0 Q0
22
Radio Frequency Interface Specification
SP-RFI-I03-980202
The upstream QPSK symbol mapping MUST be as shown in Figure 4-1.
Q
1
01
11 I1
00
10
Figure 4-1. QPSK Symbol Mapping
The 16QAM non-inverted (Gray-coded) symbol mapping MUST be as shown in Figure 4-2.
Q 0111 0110 0101 0100 1101 1100 1111 1110 I 0010 0011 0000 0001 1000 1001 1010 1011
Figure 4-2. 16QAM Gray-Coded Symbol Mapping
The 16QAM differential symbol mapping MUST be as shown in Figure 4-3.
Q 0111 0101 0110 0100 1101 1100 1111 1110 I 0010 0011 0000 0001 1000 1010 1001 1011
Figure 4-3. 16QAM Differential-Coded Symbol Mapping
23
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
If differential quadrant encoding is enabled, then the currently-transmitted symbol quadrant is derived from the previously transmitted symbol quadrant and the current input bits via Table 4-2.
Table 4-2. Derivation of Currently Transmitted Symbol Quadrant
Current Input Bits I(1) Q(1) 00 00 00 00 01 01 01 01 11 11 11 11 10 10 10 10
Quadrant Phase Change 0 0 0 0 90 90 90 90 180 180 180 180 270 270 270 270
MSBs of Previously Transmitted Symbol 11 01 00 10 11 01 00 10 11 01 00 10 11 01 00 10
MSBs for Currently Transmitted Symbol 11 01 00 10 01 00 10 11 00 10 11 01 10 11 01 00
4.2.2.3 Spectral Shaping The upstream PMD sublayer MUST support a 25% Nyquist square root raised cosine shaping. The occupied spectrum MUST NOT exceed the channel widths shown in Table 4-3.
Table 4-3. Maximum Channel Width
Symbol Rate (ksym/sec) 160 320 640 1,280 2,560
1.
Channel Width (kHz)1 200 400 800 1,600 3,200
Channel width is the -30 dB bandwidth.
4.2.2.4 Upstream Frequency Agility and Range The upstream PMD sublayer MUST support operation over the frequency range of 5-42 MHz edge to edge. Offset frequency resolution MUST be supported having a range of 32 kHz (increment = 1 Hz; implement within 10 Hz).
24
Radio Frequency Interface Specification
SP-RFI-I03-980202
4.2.2.5 Spectrum Format The upstream modulator MUST provide operation with the format s(t) = I(t)*cos(t) - Q(t)*sin(t), where t denotes time and denotes angular frequency. 4.2.3 FEC Encode
4.2.3.1 FEC Encode Modes The upstream modulator MUST be able to provide the following selections: Reed-Solomon codes over GF(256) with T = 1 to 10 or no FEC coding. The following Reed-Solomon generator polynomial MUST be supported: g(x) = (x+0) (x+1)...(x+2T-1) where the primitive element alpha is 0x02 hex
The following Reed-Solomon primitive polynomial MUST be supported: p(x) = x8 + x4 + x3+ x2 + 1 The upstream modulator MUST provide codewords from a minimum size of 18 bytes (16 information bytes [k] plus two parity bytes for T = 1 error correction) to a maximum size of 255 bytes (k-bytes plus parity-bytes). The uncoded word size can have a minimum of one byte. In Shortened Last Codeword mode, the CM MUST provide the last codeword of a burst shortened from the assigned length of k data bytes per codeword as described in Section 4.2.10.1.2 of this document. The value of T MUST be configured in response to the Upstream Channel Descriptor from the CMTS. 4.2.3.2 FEC Bit-to-Symbol Ordering The input to the Reed-Solomon Encoder is logically a serial bit stream from the MAC layer of the CM, and the first bit of the stream MUST be mapped into the MSB of the first Reed-Solomon symbol into the encoder. The MSB of the first symbol out of the encoder MUST be mapped into the first bit of the serial bit stream fed to the Scrambler. [Note that the MAC byte-to-serial upstream convention calls for the byte LSB to be mapped into the first bit of the serial bit stream per Section 6.2.1.3.] 4.2.4 Scrambler (Randomizer)
The upstream modulator MUST implement a scrambler (shown in Figure 4-4) where the 15-bit seed value MUST be arbitrarily programmable. At the beginning of each burst, the register is cleared and the seed value is loaded. The seed value MUST be used to calculate the scrambler bit which is combined in an XOR with the first bit of data of each burst (which is the MSB of the first symbol following the last symbol of the preamble). The scrambler seed value MUST be configured in response to the Upstream Channel Descriptor from the CMTS. The polynomial MUST be x15 + x14 + 1.
25
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
SEED LSB
SEEDLOAD / FRAME RESET
SEED MSB
N = 15 DELAY ELEMENT 1 DELAY ELEMENT 2 DELAY ELEMENT 3 DELAY ELEMENT N-2 DELAY ELEMENT N-1 DELAY ELEMENT N
XOR
RANDOMIZER DATA INPUT XOR
RANDOMIZER DATA OUTPUT
Figure 4-4. Scrambler Structure
4.2.5
Preamble Prepend
The upstream PMD sublayer MUST support a variable-length preamble field that is prepended to the data after they have been randomized and Reed-Solomon encoded. The first bit of the Preamble Pattern is the first bit into the symbol mapper (Figure 4-8), and is I1 in the first symbol of the burst (see Section 4.2.2.2). The first bit of the Preamble Pattern is designated by the Preamble Value Offset as described in Section Table 6-15., Section 6.3.2.2. The value of the preamble that is prepended MUST be programmable and the length MUST be 0, 2, 4, ..., or 1024 bits for QPSK and 0, 4, 8, ..., or 1024 bits for 16QAM. Thus, the maximum length of the preamble is 512 QPSK symbols or 256 QAM symbols. The preamble length and value MUST be configured in response to the Upstream Channel Descriptor message transmitted by the CMTS. 4.2.6 Burst Profiles
The transmission characteristics are separated into three portions: a) Channel Parameters, b) Burst Profile Attributes, and c) User Unique Parameters. The Channel Parameters include i) the symbol rate (five rates from 160 ksym/sec to 2.56 Msym/sec in octave steps), ii) the center frequency (Hz), and iii) the 1024-bit Preamble Superstring. The Channel Parameters are further described in Section 6.3.2.2 Table 6-14; these characteristics are shared by all users on a given channel. The Burst Profile Attributes are listed in Table 4-4, and are further described in Section 6.3.2.2 Table 6-15; these parameters are the shared attributes corresponding to a burst type. The User Unique Parameters may vary for each user even when using the same burst type on the same channel as another user (for example, Power Level), and are listed in Table 4-5. The CM MUST generate each burst at the appropriate time as conveyed in the mini-slot grants provided by the CMTS MAPs (Section 6.3.2.3).
26
Radio Frequency Interface Specification
SP-RFI-I03-980202
The CM MUST support all burst profiles commanded by the CMTS via the Burst Descriptors in the UCD (Section 6.3.2.2), and subsequently assigned for transmission in a MAP (Section 6.3.2.3).
Table 4-4. Burst Profile Attributes
Burst Profile Attributes Modulation Diff Enc Preamble Length Preamble Value offset FEC Error Correction (T bytes) FEC Codeword Information Bytes (k) Scrambler Seed Maximum Burst Length Guard Time Last Codeword Length Scrambler On/Off
1.
Configuration Settings QPSK, 16 QAM On/Off 0-1024 bits (Note Section 4.2.5) 0 to 1022 0 to 10 (0 implies FEC = off) Fixed: 16 to 253 (assuming FEC on) Shortened: 16 to 253 (assuming FEC on) 15 bits
(minislots)1
0 to 255 5 to 255 symbols Fixed, shortened On/Off
A burst length of 0 mini-slots in the Channel Profile means that the burst length is variable on that channel for that burst type. The burst length, while not fixed, is granted explicitly by the CMTS to the CM in the MAP.
Table 4-5. User Unique Burst Parameters
User Unique Parameter Power Level
1
Configuration Settings +8 to +55 dBmV (16QAM) +8 to +58 dBmV (QPSK) 1-dB steps Range = 32 kHz; increment = 1 Hz; implement within 10 Hz 0 to (216 - 1), increments of 6.25 sec/64 1 to 255 mini-slots Up to 64 coefficients; 4 bytes per coefficient:2 real and 2 complex
Offset Frequency Ranging Offset
1
Burst Length (mini-slots) if variable on this channel (changes burst-to-burst) Transmit Equalizer Coefficients 1(advanced modems only)
1.
Values in table apply for this given channel and symbol rate.
The CM MUST implement the Offset Frequency to within 10 Hz. Ranging Offset is the delay correction applied by the CM to the CMTS Upstream Frame Time derived at the CM, in order to synchronize the upstream transmissions in the TDMA scheme. The Ranging Offset is an advancement equal to roughly the round-trip delay of the CM from the CMTS. The CMTS MUST provide feedback correction for this offset to the CM, based on reception of one or more successfully received bursts (i.e., satisfactory result from each technique employed: error correction and/or CRC), with accuracy within 1/2 symbol and resolution of 1/64 of the frame tick increment (6.25 sec/64 = 0.09765625 sec = 1/4 the symbol duration of the highest symbol rate = 10.24 MHz-1). The CMTS sends adjustments to the CM, where a negative value implies the Ranging Offset is to be decreased, resulting in later times of transmission at the CM. CM MUST implement the correction with resolution of at most 1 symbol duration (of the symbol rate in use for a given burst), and (other than a fixed bias) with accuracy within 0.25 sec plus 1/2 symbol owing to resolution. The accuracy of CM
27
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
burst timing of 0.25 sec plus 1/2 symbol is relative to the mini-slot boundaries derivable at the CM based on an ideal processing of the timestamp signals received from the CMTS. The CM MUST be capable of switching burst profiles with no reconfiguration time required between bursts except for changes in the following parameters: 1) Output Power, 2) Modulation, 3) Symbol Rate, 4) Offset frequency, 5) Channel Frequency, and 6) Ranging Offset. For Symbol Rate, Offset frequency and Ranging Offset, the CM MUST be able to transmit consecutive bursts as long as the CMTS allocates at least 96 symbols in between the last symbol center of one burst and the first symbol center of the following burst. The maximum reconfiguration time of 96 symbols should compensate for the ramp down time of one burst and the ramp up time of the next burst as well as the overall transmittter delay time including the pipeline delay and optional pre-equalizer delay. For modulation type changes, the CM MUST be able to transmit consecutive bursts as long as the CMTS allocates at least 96 symbols in between the last symbol center of one burst and the first symbol center of the following burst. Output Power, Symbol Rate, Offset frequency, Channel Frequency and Ranging Offset MUST NOT be changed until the CM is provided sufficient time between bursts by the CMTS. Transmitted Output Power, Symbol Rate, Offset frequency, Channel Frequency and Ranging Offset MUST NOT change while more than -30 dB of any symbol's energy of the previous burst remains to be transmitted, or more than -30 dB of any symbol's energy of the next burst has been transmitted. The modulation MUST NOT change while more than -30 dB of any symbol's energy of the previous burst remains to be transmitted, or more than -30 dB of any symbol's energy of the next burst has been transmitted, EXCLUDING the effect of the transmit equalizer (if present in the CM). [This is to be verified with the transmit equalizer providing no filtering; delay only, if that. Note that if the CMTS has decision feedback in its equalizer, it may need to provide more than the 96 symbol gap between bursts of different modulation type which the same CM may use; this is a CMTS decision.] Negative ranging offset adjustments will cause the 96 symbol guard to be violated. The CMTS must assure that this does not happen by allowing extra guard time between bursts that is at least equal to the amount of negative ranging offset. If Channel Frequency is to be changed, then the CM MUST be able to implement the change between bursts as long as the CMTS allocates at least 96 symbols plus 100 msec between the last symbol center of one burst and the first symbol of the following burst. The Channel Frequency of the CM MUST be settled within the phase noise and accuracy requirements of Section 4.2.9.5 and Section 4.2.9.6 within 100 msec from the beginning of the change. If Output Power is to be changed by 1 dB or less, the the CM MUST be able to implement the change between bursts as long as the CMTS allocates at least 96 symbols plus 5 usec between the last symbol center of one burst and the first symbol center of the following burst. If Output Power is to be changed by more than 1 dB, the the CM MUST be able to implement the change between bursts as long as the CMTS allocates at least 96 symbols plus 10 usec between the last symbol center of one burst and the first symbol center of the following burst. The Output Power of the CM MUST be settled to within 0.1 dB of its final output power level a) within 5 sec from the beginning of a change of 1 dB or less, and b) within 10 sec from the beginning of a change of greater than 1 dB. The output transmit power MUST be maintained constant within a TDMA burst to within less than 0.1 dB (excluding the amount theoretically present due to pulse shaping, and amplitude modulation in the case of 16 QAM).
28
Radio Frequency Interface Specification
SP-RFI-I03-980202
4.2.7
Burst Timing Convention
Figure 4-5 illustrates the nominal burst timing.
A) Nominal Burst Profile (no timing errors); 8 symbol guard band is illustrated; 10 symbol ramp up and ramp down is illustrated. Data First Symbol Ramp Up Last FEC Parity Symbol Ramp down
Preamble First Symbol B) Timing is referenced to the symbol center of the first symbol of each burst
Preamble Last Symbol
10 Symbols
8 Symbols
Center of Preamble First Symbol = Minislot Boundary
Minislot Boundary
Burst N
Burst N+1 Preamble First Symbol
Note: Ramp down of one burst can overlap ramp up of following burst even with one transmitter assigned both bursts.
Figure 4-5. Nominal Burst Timing
29
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Figure 4-6 indicates worst-case burst timing. In this example, burst N arrives 1.5 symbols late, and burst N+1 arrives 1.5 symbols early, but separation of 5 symbols is maintained; 8-symbol guardband shown.
Worst case Burst timing input to CMTS
Burst N+1
Time equal to 5 symbols separates the first symbol center of burst N+1 and the last symbol center of burst N Burst N
Symbol center of Burst N, last symbol; 1.5 symbols late
Symbol center of Burst N+1, last symbol; 1.5 symbols early
8 symbol guard band 1.5 5 symbols 1.5
Minislot Boundary
Figure 4-6. Worst-Case Burst Timing
At a symbol rate of Rs, symbols occur at a rate of one each Ts = 1/Rs seconds. Ramp Up and Ramp Down are the spread of a symbol in the time domain beyond Ts duration owing to the symbol-shaping filter. If only one symbol were transmitted, its duration would be longer than Ts due to the shaping filter impulse response being longer than Ts. The spread of the first and last symbols of a burst transmission effectively extends the duration of the burst to longer than N * Ts, where N is the number of symbols in the burst. 4.2.8 Transmit Power Requirements
The upstream PMD sublayer MUST support varying the amount of transmit power. Requirements are presented for 1) the range of commanded transmit power, 2) the step size of the power commands, and 3) the accuracy (actual output power compared to the commanded amount) of the response to the command. The mechanism by which power adjustments are performed is defined in Section 7.2.5 of this document. Such adjustments MUST be within the ranges of tolerances described below. 4.2.8.1 Output Power Agility and Range The output transmit power in the design bandwidth MUST be variable over the range of +8 dBmV to 55 dBmV (16 QAM) or 58 dBmV (QPSK), in 1-dB steps.
30
Radio Frequency Interface Specification
SP-RFI-I03-980202
The absolute accuracy of the transmitted power MUST be 2dB, and the step size accuracy 0.4dB, with an allowance for hysteresis while switching in/out a step attenuator (e.g. 20 dB) in which case the accuracy requirement is relaxed to 1.4dB. For example, the actual power increase resulting from a command to increase the power level by 1dB in a CM's next transmitted burst MUST be between 0.6 and 1.4dB. The step resolution MUST be 1dB or less. When a CM is commanded with finer resolution than it can implement, it MUST round to the nearest supported step size. If the commanded step is half way between two supported step sizes, the CM MUST choose the smaller step. For example, with a supported step resolution of 1 dB, a command to step 0.5 dB would result in no step, while a command to step 0.75 dB would result in a 1 dB step. 4.2.9 Fidelity Requirements
4.2.9.1 Spurious Emissions The noise and spurious power MUST NOT exceed the levels given in Table 4-6, Table 4-7, and Table 4-8. In Table 4-6, Inband spurious includes noise, carrier leakage, clock lines, synthesizer spurious products, and other undesired transmitter products. It does not include ISI. The measurement bandwidth for Inband spurious is equal to the symbol rate (e.g., 160 kHz for 160 ksymbols/sec). The measurement bandwidth for the 3 (or fewer) Carrier-Related Frequency Bands (below 42 MHz) is 160 kHz, with up to 3 160 kHz bands, each with no more than -47 dBc, allowed to be excluded from the "Bands within 5 to 42 MHz Transmitting Burst" specs of Table 4-8. The measurement bandwidth is also 160 kHz for the Between Bursts specs of Table 4-6 below 42 MHz; the Transmitting Burst specs apply during the mini-slots granted to the CM (when the CM uses all or a portion of the grant), and for a minislot before and after the granted mini-slots. [Note that a minislot may be as short as 32 symbols, or 12.5 microseconds at the 2.56 Msym/sec rate, or as short as 200 microseconds at the 160 ksym/sec rate.] The Between Bursts specs apply except during a used grant of mini-slots, and the minislot before and after the used grant.
31
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Table 4-6. Spurious Emissions
Parameter Inband (Inband spurious includes noise, carrier leakage, clock lines, synthesizer spurious products, and other undesired transmitter products. It does not include Inter Symbol Intereference (ISI)). Adjacent Band 3 or Fewer Carrier-Related Frequency Bands(such as second harmonic, if < 42 MHz) Bands within 5 to 42 MHz(excluding assigned channel, adjacent channels, and carrier-related channels) CM Integrated Spurious Emissions Limits (all in 4 MHz, includes discretes)1 42 to 54 MHz 54 to 60 MHz 60 to 88 MHz 88-860 MHz CM Discrete Spurious Emissions Limits1 42 to 54 MHz 54 to 88 MHz 88 to 860 MHz
1.
Transmitting Burst -40 dBc
Between Bursts The greater of -72 dBc or -59 dBmV
See Table 4-7 -47 dBc See Table 4-8
The greater of -72 dBc or -59 dBmV The greater of -72 dBc or -59 dBmV The greater of -72 dBc or -59 dBmV
max(-40 dBc, -26 dBmV) -35 dBmV -40 dBmV -45 dBmV
-26 dBmV -40 dBmV -40 dBmV max(-45 dBmV, -40 dBc2)
-max(-50 dBc, -36 dBmV) -50 dBmV -50 dBmV
-36 dBmV -50 dBmV -50 dBmV
These spec limits exclude a single discrete spur related to the tuned received channel; this single discrete spur MUST be no greater than -40 dBmV. "dBc" is relative to the received downstream signal level. Some spurious outputs are proportional to the receive signal level.
2.
4.2.9.1.1
Adjacent Channel Spurious Emissions
Spurious emissions from a transmitted carrier may occur in an adjacent channel which could be occupied by a carrier of the same or different symbol rates. The following table lists the required adjacent channel spurious emission levels for all combinations of transmitted carrier symbol rates and adjacent channel symbol rates. The measurement is performed in an adjacent channel interval that is of appropriate bandwidth and distance from the transmitted carrier based on the symbol rates of the transmitted carrier and the carrier in the adjacent channel.
32
Radio Frequency Interface Specification
SP-RFI-I03-980202
Table 4-7. Adjacent Channel Spurious Emissions
Transmitted carrier symbol rate Specification in the interval -45 dBc -45 dBc 160 Ksym/sec -45 dBc -42 dBc -39 dBc -45 dBc -45 dBc All other symbol rates -45 dBc -44 dBc -41 dBc Measurement interval and distance from carrier edge 20 KHz to 180 KHz 40 KHz to 360 KHz 80 KHz to 720 KHz 160 KHz to 1440 KHz 320 KHz to 2880 KHz 20 KHz to 180 KHz 40 KHz to 360 KHz 80 KHz to 720 KHz 160 KHz to 1440 KHz 320 KHz to 2880 KHz Adjacent channel carrier symbol rate 160 Ksym/sec 320 Ksym/sec 640 Ksym/sec 1280 Ksym/sec 2560 Ksym/sec 160 Ksym/sec 320 Ksym/sec 640 Ksym/sec 1280 Ksym/sec 2560 Ksym/sec
4.2.9.1.2
Spurious Emissions in 5 to 42 MHz
Spurious emissions, other than those in an adjacent channel or carrier related emissions listed above, may occur in intervals that could be occupied by other carriers of the same or different symbol rates. To accommodate these different symbol rates and associated bandwidths, the spurious emissions are measured in an interval equal to the bandwidth corresponding to the symbol rate of the carrier that could be transmitted in that interval. This interval is independent of the current transmitted symbol rate. The following table lists the possible symbol rates that could be transmitted in an interval, the required spurious level in that interval, and the initial measurement interval at which to start measuring the spurious emissions. Measurements should start at the initial distance and be repeated at increasing distance from the carrier until the upstream band edge, 5 MHz or 42 MHz, is reached. Measurement intervals should not include carrier related emissions.
Table 4-8. Spurious Emissions in 5 to 42 MHz
Possible symbol rate in this interval 160 Ksym/sec 320 Ksym/sec 640 Ksym/sec 1280 Ksym/sec 2560 Ksym/sec Specification in the interval -53 dBc -50 dBc -47 dBc -44 dBc -41 dBc Initial measurement interval and distance from carrier edge 220 KHz to 380 KHz 240 KHz to 560 KHz 280 KHz to 920 KHz 360 KHz to 1640 KHz 520 KHz to 3080 KHz
4.2.9.2 Spurious Emissions During Burst On/Off Transients Each transmitter MUST control spurious emissions, prior to and during ramp up and during and following ramp down, before and after a burst in the TDMA scheme. On/off spurious emissions, such as the change in voltage at the upstream transmitter output due to enabling or disabling transmission, MUST be no more than 100 mV, and such a step MUST be dissipated no faster than 2 s of constant slewing. This requirement applies when the CM is transmitting at +55 dBmV or more; at backed-off transmit levels, the maximum change in voltage MUST decrease by a factor of 2 for each 6-dB decrease of power level from +55 dBmV, down to a maximum change of 7 mV at 31 dBmV and below. This requirement does not apply to CM power-on and power-off transients.
33
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
4.2.9.3 Symbol Error Rate (SER) Modulator performance MUST be within 0.5 dB of theoretical SER vs C/N (i.e., Es/No), for SER as low as 10-6 uncoded, for QPSK and 16 QAM. The SER degradation is determined by the cluster variance caused by the transmit waveform at the output of an ideal square-root raised-cosine receive filter. It includes the effects of ISI, spurious, phase noise, and all other transmitter degradations. Cluster SNR should be measured on a modulation analyzer using a square-root raised cosine receive filter with alpha = 0.25. The measured SNR MUST be better than 30 dB. 4.2.9.4 Filter Distortion The following requirements assume that any pre-equalization is disabled. 4.2.9.4.1 Amplitude
The spectral mask MUST be the ideal square root raised cosine spectrum with alpha = 0.25, within the ranges given below: fc - Rs/4 Hz to fc + Rs/4 Hz: -0.3 dB to +0.3 dB fc - 3Rs/8 Hz to fc - Rs/4 Hz, and fc + Rs/4 Hz to fc + 3Rs/8 Hz: -0.5 dB to 0.3 dB fc - Rs/2 Hz and fc + Rs/2 Hz: -3.5 dB to -2.5 dB fc - 5Rs/8 Hz and fc + 5Rs/8 Hz: no greater than -30 dB where fc is the center frequency, Rs is the symbol rate, and the spectral density is measured with a resolution bandwidth of 10 KHz or less. 4.2.9.4.2 Phase
fc - 5Rs/8 Hz to fc + 5Rs/8 Hz: Group Delay Variation MUST NOT be greater than 100 nsec. 4.2.9.5 Carrier Phase Noise The upstream transmitter total integrated phase noise (including discrete spurious noise) MUST be less than or equal to -43 dBc summed over the spectral regions spanning 1 kHz to 1.6 MHz above and below the carrier. 4.2.9.6 Channel Frequency Accuracy The CM MUST implement the assigned channel frequency within 50 parts per million over a temperature range of 0 to 40 degrees C up to five years from date of manufacture. 4.2.9.7 Symbol Rate Accuracy The upstream modulator MUST provide an absolute accuracy of symbol rates 50 parts per million over a temperature range of 0 to 40 degrees C up to five years from date of manufacture.
34
Radio Frequency Interface Specification
SP-RFI-I03-980202
4.2.9.8 Symbol Timing Jitter Peak-to-peak symbol jitter, referenced to the previous symbol zero-crossing, of the transmitted waveform, MUST be less than 0.02 of the nominal symbol duration over a 2-sec period. In other words, the difference between the maximum and the minimum symbol duration during the 2-sec period shall be less than 0.02 of the nominal symbol duration for each of the five upstream symbol rates. The peak-to-peak cumulative phase error, referenced to the first symbol time and with any fixed symbol frequency offset factored out, MUST be less than 0.04 of the nominal symbol duration over a 0.1-sec period. In other words, the difference between the maximum and the minimum cumulative phase error during the 0.1-sec period shall be less than 0.04 of the nominal symbol duration for each of the five upstream symbol rates. Factoring out a fixed symbol frequency offset is to be done by using the computed mean symbol duration during the 0.1 sec. 4.2.10 Frame Structure Figure 4-7 shows two examples of the frame structure: one where the packet length equals the number of information bytes in a codeword, and another where the packet length is longer than the number of information bytes in one codeword, but less than in two codewords. Example 1 illustrates the fixed codeword-length mode, and Example 2 illustrates the shortened last codeword mode. These modes are defined in Section 4.2.10.1.
Example 1. Packet length = number of information bytes in codeword = k
One Codeword
Preamble Packet Data FEC Parity Guard Time Empty up to Next Mini-Slot Boundary k + k'' 2k
Example 2. Packet length = k + remaining information bytes in 2nd codeword = k + k' Preamble Two Codewords Guard Time
mini-slot boundary
First k Bytes of Packet
FEC Parity
Last k' Bytes k''-k' bytes of of Packet zero-fill
FEC Parity
Figure 4-7. Example Frame Structures with Flexible Burst Length Mode
4.2.10.1 Codeword Length The CM operates in fixed-length codeword mode or with shortened codeword capability enabled. The minimum number of information bytes in a codeword, for fixed or shortened mode, is 16 bytes. Shortened codeword capability is available with k >= 16 bytes, where k is the number of information bytes in a codeword. With k < 16, shortened codeword capability is not available. The following descriptions apply to an allocated grant of mini-slots in both contention and non-contention regions. (Allocation of mini-slots is discussed in Section 6 of this document.) The intent of the description is to define rules and conventions such that CMs request the proper number of mini-slots and the CMTS PHY knows what to expect regarding the FEC framing in both fixed codeword length and shortened last codeword modes.
35
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
4.2.10.1.1 Fixed Codeword Length With the fixed-length codewords, after all the data are encoded, zero-fill will occur in this codeword if necessary to reach the assigned k data bytes per codeword, and zero-fill MUST continue up to the point when no additional fixed-length codewords can be inserted before the end of the last allocated min-slot in the grant, accounting for FEC parity and guard-time symbols. 4.2.10.1.2 Shortened Last Codeword As shown in Figure 4-7, let k' = the number of information bytes that remain after partitioning the information bytes of the burst into full-length (k burst data bytes) codewords. The value of k' is less than k. Given operation in a shortened last codeword mode, let k" = the number of burst data bytes plus zero-fill bytes in the shortened last codeword. In shortened codeword mode, the CM will encode the data bytes of the burst (including MAC Header) using the assigned codeword size (k information bytes per codeword) until 1) all the data are encoded, or 2) a remainder of data bytes is left over which is less than k. Shortened last codewords shall not have less than 16 information bytes, and this is to be considered when CMs make requests of mini-slots. In shortened last codeword mode, the CM will zero-fill data if necessary until the end of the mini-slot allocation, which in most cases will be the next mini-slot boundary, accounting for FEC parity and guard-time symbols. In many cases, only k" - k' zero-fill bytes are necessary to fill out a mini-slot allocation with 16 <= k" <= k and k' <= k". However, note the following. More generally, the CM is required to zero-fill data until the point when no additional fixed-length codewords can be inserted before the end of the last allocated mini-slot in the grant (accounting for FEC parity and guardtime symbols), and then, if possible, a shortened last codeword of zero-fill shall be inserted to fit into the minislot allocation. If, after zero-fill of additional codewords with k information bytes, there are less than 16 bytes remaining in the allocated grant of mini-slots, accounting for parity and guard-time symbols, then the CM shall not create this last shortened codeword. 4.2.11 Signal Processing Requirements The signal processing order for each burst packet type MUST be compatible with the sequence shown in Figure 4-8 and MUST follow the order of steps in Figure 4-9.
Burst Data In
Block the Data
FEC Encode
Scramble
+
Preamble Prepend
Symbol Map
Filter
Modulate
Transmit On/Off Power Control
Parameter Set from CMTS Transmit Now Edge
Modulator Control
Figure 4-8. Signal-Processing Sequence
36
Radio Frequency Interface Specification
SP-RFI-I03-980202
Packet Stream Input
Block the Data Separate Packet into Information Blocks(=data bytes in one codeword)
FEC Encode FEC Encode (Reed-Solomon)each Information Block, using shortened codeword for last block if needed.FEC can be turned off.
Scramble Scramble (see paragraph 0)
Preamble Prepend Preamble prepend Symbols
Symbol Map Symbol Map the Data Stream into Modulator Symbols
Filter Filter Symbol Stream for Spectral Shaping
Modulate Modulate at Precise Times(QPSK; 16 QAM)
Output RF Waveform Bursts Figure 4-9. TDMA Upstream Transmission Processing
4.2.12 Upstream Demodulator Input Power Characteristics The maximum total input power to the upstream demodulator MUST NOT exceed 35 dBmV in the 5-42 MHz frequency range of operation. The intended received power in each carrier MUST be within the values shown in Table 4-9.
Table 4-9. Maximum Range of Commanded Nominal Receive Power in Each Carrier
Symbol Rate (ksym/sec) 160 320 640 1,280 2,560 Maximum Range (dBmV) -16 to +14 -13 to +17 -10 to +20 -7 to +23 -4 to +26
The demodulator MUST operate within its defined performance specifications with received bursts within 6 dB of the nominal commanded received power.
37
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
4.2.13 Upstream Electrical Output from the CM The CM MUST output an RF modulated signal with the characteristics delineated in Table 4-10.
Table 4-10. Electrical Output from CM
Parameter Frequency Level range (one channel) Value 5 to 42 MHz edge to edge +8 to +55 dBmV (16QAM) +8 to +58 dBmV (QPSK) Modulation Type Symbol Rate (nominal) Bandwidth Output impedance Output Return Loss Connector QPSK and 16QAM 160, 320, 640, 1,280 and 2,560 ksym/sec 200, 400, 800, 1,600 and 3,200 kHz 75 ohms > 6 dB (5-42 MHz) F connector per [IPS-SP-401] (common with the input)
4.3 Downstream
4.3.1 Downstream Protocol
The downstream PMD sublayer MUST conform to ITU-T Recommendations J.83, Annex B for Low-Delay Video Applications [ITU J.83-B], with the exceptions called out in Section 4.3.2. 4.3.2 Scalable Interleaving to Support Low Latency
The downstream PMD sublayer MUST support a variable-depth interleaver with the characteristics defined in Table 4-11. The table contains a subset of interleaver modes found in [ITU J.83-B].
Table 4-11. Interleaver Characteristics
I (Number of Taps) 8 16 32 64 128 J (Increment) 16 8 4 2 1 Burst Protection 64QAM/256QAM 5.9 sec/4.1 sec 12 sec/8.2 sec 24 sec/16 sec 47 sec/33 sec 95 sec/66 sec Latency 64QAM/256QAM 0.22 msec/0.15 msec 0.48 msec/0.33 msec 0.98 msec/0.68 msec 2.0 msec/1.4 msec 4.0 msec/2.8 msec
The interleaver depth, which is coded in a 4-bit control word contained in the FEC frame synchronization trailer, always reflects the interleaving in the immediately-following frame. In addition, errors are allowed while the interleaver memory is flushed after a change in interleaving is indicated. Refer to [ITU J.83-B] for the control bit specifications required to specify which interleaving mode is used.
38
Radio Frequency Interface Specification
SP-RFI-I03-980202
4.3.3
Downstream Frequency Plan
The downstream frequency plan should comply with Harmonic Related Carrier (HRC), Incremental Related Carrier (IRC) or Standard (STD) North American frequency plans per [IS-6]. However, operation below a center frequency of 91 MHz is not required. 4.3.4 CMTS Output Electrical
The CMTS MUST output an RF modulated signal with the following characteristics defined in Table 4-12.
Table 4-12. CMTS Output
Parameter Center Frequency (fc) Level Modulation Type Symbol Rate (nominal) 64QAM 256QAM Nominal Channel Spacing Frequency response 64QAM 256QAM Total Discrete Spurious Inband (fc 3 MHz) Inband Spurious and Noise (fc 3 MHz) ~18% Square Root Raised Cosine shaping ~12% Square Root Raised Cosine shaping < -57dBc < -48dBc; where channel spurious and noise includes all discrete spurious, noise, carrier leakage, clock lines, synthesizer products, and other undesired transmitter products. Noise within +/- 50kHz of the carrier is excluded. < -58 dBc in 750 kHz < -62 dBc, in 5.25 MHz, excluding up to 3 spurs, each of which must be <-60 dBc when measured in a 10 kHz band < -65 dBc in 6MHz, excluding up to three discrete spurs. The total power in the spurs must be < -60dBc when each is measured with 10 kHz bandwidth. < -12dBmV in each 6 MHz channel, excluding up to three discrete spurs. The total power in the spurs must be < -60dBc when each is measured with 10kHz bandwidth. 1 kHz - 10 kHz: -33dBc double sided noise power 10 kHz - 50 kHz: -51dBc double sided noise power 50 kHz - 3 MHz: -51dBc double sided noise power Output Impedance Output Return Loss Connector
1.
Value 91 to 857 MHz 30 kHz
1
Adjustable over the range 50 to 61 dBmV 64QAM and 256QAM
5.056941 Msym/sec 5.360537 Msym/sec 6 MHz
Adjacent channel (fc 3.0 MHz) to (fc 3.75 MHz) Adjacent channel (fc 3.75 MHz) to (fc 9 MHz)
Next adjacent channel (fc 9 MHz) to (fc 15 MHz)
Other channels (47 MHz to 1,000 MHz)
Phase Noise
75 ohms > 14 dB within an output channel up to 750 MHz; > 13 dB in an output channel above 750 MHz F connector per [IPS-SP-401]
30 kHz includes an allowance of 25 kHz for the largest FCC frequency offset normally built into upconverters.
39
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
4.3.5
Downstream Electrical Input to CM
The CM MUST accept an RF modulated signal with the following characteristics (Table 4-13.)
Table 4-13. Electrical Input to CM
Parameter Center Frequency Level Range (one channel) Modulation Type Symbol Rate (nominal) Bandwidth Total Input Power (40-900 MHz) Input (load) Impedance Input Return Loss Connector 91 to 857 MHz 30 kHz -15 dBmV to +15 dBmV 64QAM and 256QAM 5.056941 Msym/sec (64QAM) and 5.360537 Msym/sec (256QAM) 6 MHz (18% Square Root Raised Cosine shaping for 64QAM and 12% Square Root Raised Cosine shaping for 256QAM) <30 dBmV 75 ohms > 6 dB (88-860 MHz) F connector per [IPS-SP-401] (common with the output) Value
4.3.6
CM BER Performance
The bit-error-rate performance of a CM MUST be as described in this section. The requirements apply to the I = 128, J = 1 mode of interleaving. 4.3.6.1 64QAM 4.3.6.1.1 64QAM CM BER Performance
Implementation loss of the CM MUST be such that the CM achieves a post-FEC BER less than or equal to 10-8 when operating at a carrier to noise ratio (Es/No) of 23.5 dB or greater. 4.3.6.1.2 64QAM Image Rejection Performance
Performance as described in Section 4.3.6.1.1 MUST be met with analog or digital signal at +10 dBc in any portion of the RF band other than the adjacent channels. 4.3.6.1.3 64QAM Adjacent Channel Performance
Performance as described in Section 4.3.6.1.1 MUST be met with digital signal at 0 dBc in the adjacent channels. Performance as described in Section 4.3.6.1.1 MUST be met with analog signal at +10 dBc in the adjacent channels. Performance as described in Section 4.3.6.1.1, with an additional 0.2-dB allowance, MUST be met with digital signal at +10 dBc in the adjacent channels.
40
Radio Frequency Interface Specification
SP-RFI-I03-980202
4.3.6.2 256QAM 4.3.6.2.1 256QAM CM BER Performance
Implementation loss of the CM MUST be such that the CM achieves a post-FEC BER less than or equal to 10-8 when operating at a carrier to noise ratio (Es/No) of 30 dB or greater. 4.3.6.2.2 256QAM Image Rejection Performance
Performance as described in Section 4.3.6.2.1 MUST be met with analog or digital signal at +10 dBc in any portion of the RF band other than the adjacent channels. 4.3.6.2.3 256QAM Adjacent Channel Performance
Performance as described in Section 4.3.6.2.1 MUST be met with analog or digital signal at 0 dBc in the adjacent channels. Performance as described in Section 4.3.6.2.1, with an additional 0.5-dB allowance, MUST be met with analog signal at +10 dBc in the adjacent channels. Performance as described in Section 4.3.6.2.1, with an additional 1.0-dB allowance, MUST be met with digital signal at +10 dBc in the adjacent channels. 4.3.7 CMTS Timestamp Jitter
The peak-to-peak jitter, measured at the output of the CMTS, MUST be less than 500ns. This includes jitter from both the value in the timestamp message, and time of transmission of that message. The CM is expected to meet the burst timing accuracy requirements in Section 4.2.6 when the time stamps contain this worst-case jitter.
Note: Note: Jitter is the error (i.e., measured) relative to the CMTS Master Clock. (The CMTS Master Clock is the 10.24 MHz clock used for generating the timestamps.)
The CMTS 10.24 MHz Master Clock MUST have frequency stability of 5 ppm, drift rate 10-8 per second, and edge jitter of 10 nsec peak-to-peak (5 nsec). [The drift rate and jitter requirements on the CMTS Master Clock implies that the duration of two adjacent segments of 10,240,000 cycles will be within 30 nsec, due to 10 nsec jitter on each segments' duration, and 10 nsec due to frequency drift. Durations of other counter lengths also may be deduced: adjacent 1,024,000 segments, 21 nsec; 1,024,000 length segments separated by 1 10,240,000 cycles, 30 nsec; adjacent 102,400,000 segments, 120 nsec. The CMTS Master Clock MUST meet such test limits in 99% or more measurements.]
41
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
This page intentionally left blank.
42
Radio Frequency Interface Specification
SP-RFI-I03-980202
5 Downstream Transmission Convergence Sublayer
5.1 Introduction
In order to improve demodulation robustness, facilitate common receiving hardware for both video and data, and provide an opportunity for the possible future multiplexing of video and data over the PMD sublayer bitstream defined in Section 4, a sublayer is interposed between the downstream PMD sublayer and the Data-Over-Cable MAC sublayer. The downstream bitstream is defined as a continuous series of 188-byte MPEG [ITU-T H.222.0] packets. These packets consist of a 4-byte header followed by 184 bytes of payload. The header identifies the payload as belonging to the Data-Over-Cable MAC. Other values of the header may indicate other payloads. The mixture of MAC payloads and those of other services is optional and is controlled by the CMTS. Figure 5-1 illustrates the interleaving of Data-Over-Cable (DOC) MAC bytes with other digital information (digital video in the example shown).
header=DOC header=video header=video header=DOC header=video header=DOC header=video header=video header=video
DOC MAC payload digital video payload digital video payload DOC MAC payload digital video payload DOC MAC payload digital video payload digital video payload digital video payload
Figure 5-1. Example of Interleaving MPEG Packets in Downstream
5.2 MPEG Packet Format
The format of an MPEG Packet carrying MCNS data is shown in Figure 5-2. The packet consists of a 4-byte MPEG Header, a pointer_field (not present in all packets) and the MCNS Payload.
MPEG Header (4 bytes)
pointer_field (1 byte)
MCNS Payload (183 or 184 bytes)
Figure 5-2. Format of an MPEG Packet
43
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
5.3 MPEG Header for MCNS Data-Over-Cable
The format of the MPEG Transport Stream header is defined in Section 2.4 of [ITU-T H.222.0]. The particular field values that distinguish Data-Over-Cable MAC streams are defined in Table 5-1. Field names are from the ITU specification. The MPEG Header consists of 4 bytes that begin the 188-byte MPEG Packet. The format of the header for use on an MCNS Data-Over-Cable PID is restricted to that shown in Table 5-1. The header format conforms to the MPEG standard, but its use is restricted in this specification to NOT ALLOW inclusion of an adaptation_field in the MPEG packets.
Table 5-1. MPEG Header Format for MCNS Data-Over-Cable Packets
Field sync_byte transport_error_indicator Length (bits) 8 1 Description 0x47; MPEG Packet Sync byte Indicates an error has occurred in the reception of the packet. This bit is reset to zero by the sender, and set to one whenever an error occurs in transmission of the packet A value of one indicates the presence of a pointer_field as the first byte of the payload (fifth byte of the packet) Reserved; set to zero MCNS Data-Over-Cable well-known PID (0x1FFE) Reserved, set to `00' `01'; use of the adaptation_field is NOT ALLOWED on the MCNS PID cyclic counter within this PID
payload_unit_start_indicator transport_priority PID (see Note) transport_scrambling_control adaptation_field_control continuity_counter Note:
1 1 13 2 2 4
In the future, additional PIDs MAY be assigned to a CM. See Section 9.3 of this document.
5.4 MPEG Payload for MCNS Data-Over-Cable
The MPEG payload portion of the MPEG packet will carry the MCNS MAC frames. The first byte of the MPEG payload will be a `pointer_field' if the payload_unit_start_indicator (PUSI) of the MPEG header is set. stuff_byte This standard defines a stuff_byte pattern having a value (0xFF) that is used within the MCNS payload to fill any gaps between the MCNS MAC frames. This value is chosen as an unused value for the first byte of the MCNS MAC frame. The `FC' byte of the MAC Header will be defined to never contain this value. (FC_TYPE = `11' indicates a MAC-specific frame, and FC_PARM = `11111' is not currently used and, according to this specification, is defined as an illegal value for FC_PARM.) pointer_field The pointer_field is present as the fifth byte of the MPEG packet (first byte following the MPEG header) whenever the PUSI is set to one in the MPEG header. The interpretation of the pointer_field is as follows: The pointer_field contains the number of bytes in this packet that immediately follow the pointer_field that the CM decoder must skip past before looking for the beginning of an MCNS MAC Frame. A pointer field MUST be present if it is possible to begin a Data-Over-Cable MAC Frame in the packet, and MUST point to either: 1. the beginning of the first MAC frame to start in the packet or 2. to any stuff_byte preceding the MAC frame.
44
Radio Frequency Interface Specification
SP-RFI-I03-980202
5.5 Interaction with the MAC Sublayer
MAC frames may begin anywhere within an MPEG packet, MAC frames may span MPEG packets, and several MAC frames may exist within an MPEG packet. The following figures show the format of the MPEG packets that carry MCNS MAC frames. In all cases, the PUSI flag indicates the presence of the pointer_field as the first byte of the MPEG payload. Figure 5-3 shows a MAC frame that is positioned immediately after the pointer_field byte. In this case, pointer_field is zero, and the MCNS decoder will begin searching for a valid FC byte at the byte immediately following the pointer_field.
MPEG Header (PUSI = 1)
pointer_field (= 0)
MAC Frame (up to 183 bytes)
stuff_byte(s) (0 or more)
Figure 5-3. Packet Format Where a MAC Frame Immediately Follows the pointer_field
Figure 5-4 shows the more general case where a MAC Frame is preceded by the tail of a previous MAC Frame and a sequence of stuffing bytes. In this case, the pointer_field still identifies the first byte after the tail of Frame #1 (a stuff_byte) as the position where the decoder should begin searching for a legal MAC sublayer FC value. This format allows the multiplexing operation in the CMTS to immediately insert a MAC frame that is available for transmission if that frame arrives after the MPEG header and pointer_field have been transmitted. In order to facilitate multiplexing of the MPEG packet stream carrying MCNS data with other MPEG-encoded data, the CMTS SHOULD NOT transmit MPEG packets with the MCNS PID which contain only stuff_bytes in the payload area. MPEG null packets SHOULD be transmitted instead. Note that there are timing relationships implicit in the MCNS MAC sublayer which must also be preserved by any MPEG multiplexing operation.
MPEG Header (PUSI = 1)
pointer_field (= M)
Tail of MAC Frame #1 (M bytes)
stuff_byte(s) (0 or more)
Start of MAC Frame #2
Figure 5-4. Packet Format with MAC Frame Preceded by Stuffing Bytes
Figure 5-5 shows that multiple MAC frames may be contained within the MPEG packet. The MAC frames may be concatenated one after the other or be separated by an optional sequence of stuffing bytes.
MPEG Header (PUSI = 1)
pointer_field (= 0)
MAC Frame #1
MAC Frame #2
stuff_byte(s) (0 or more)
MAC Frame #3
Figure 5-5. Packet Format Showing Multiple MAC Frames in a Single Packet
Figure 5-6 shows the case where a MAC frame spans multiple MPEG packets. In this case, the pointer_field of the succeeding frame points to the byte following the last byte of the tail of the first frame.
45
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
MPEG Header (PUSI = 1) MPEG Header (PUSI = 0) MPEG Header (PUSI = 1)
pointer_field (= 0)
stuff_bytes (0 or more)
Start of MAC Frame #1 (up to 183 bytes)
Continuation of MAC Frame #1 (184 bytes) pointer_field (= M) Tail of MAC Frame #1 (M bytes) stuff_byte(s) (0 or more) Start of MAC Frame #2 (M bytes)
Figure 5-6. Packet Format Where a MAC Frame Spans Multiple Packets
The Transmission Convergence sublayer must operate closely with the MAC sublayer in providing an accurate timestamp to be inserted into the Time Synchronization message (refer to Section 6.3.2.1 and Section 6.5).
5.6 Interaction with the Physical Layer
The MPEG-2 packet stream MUST be encoded according to [ITU-T J.83-B], including MPEG-2 transport framing using a parity checksum as described in [ITU-T J.83-B].
5.7 MPEG Header Synchronization and Recovery
The MPEG-2 packet stream SHOULD be declared "in frame" (i.e., correct packet alignment has been achieved) when five consecutive correct parity checksums, each 188 bytes from the previous one, have been received. The MPEG-2 packet stream SHOULD be declared "out of frame", and a search for correct packet alignment started, when nine consecutive incorrect parity checksums are received. The format of MAC frames is described in detail in Section 6.
46
Radio Frequency Interface Specification
SP-RFI-I03-980202
6 Media Access Control Specification
6.1 Introduction
6.1.1 Overview
This section describes version 1.0 of the MCNS MAC protocol. Some of the MAC protocol highlights include:
* * * * * * * *
Bandwidth allocation controlled by CMTS A stream of mini-slots in the upstream Dynamic mix of contention- and reservation-based upstream transmit opportunities Bandwidth efficiency through support of variable-length packets Extensions provided for future support of ATM or other Data PDU Class of service support Extensions provided for security at the Data Link layer. Support for a wide range of data rates. Definitions
6.1.2
6.1.2.1 MAC-Sublayer Domain A MAC-sublayer domain is a collection of upstream and downstream channels for which a single MAC Allocation and Management protocol operates. Its attachments include one CMTS and some number of CMs. The CMTS MUST service all of the upstream and downstream channels; each CM MAY access one or more upstream and downstream channels. 6.1.2.2 MAC Service Access Point A MAC Service Access Point (MSAP) is an attachment to a MAC-sublayer domain. 6.1.2.3 Service ID The concept of Service IDs is central to the operation of the MAC protocol. Service IDs provide both device identification and class-of-service management. In particular, they are integral to upstream bandwidth allocation. A Service ID defines a particular mapping between a CM and the CMTS. This mapping is the basis on which bandwidth is allocated to the CM by the CMTS and by which class of service is implemented. Within a MACsublayer domain, all Service IDs MUST be unique. The CMTS MAY assign one or more Service IDs (SIDs) to each CM, corresponding to the classes of service required by the CM. This mapping MUST be negotiated between the CMTS and the CM during CM registration. In a basic CM implementation, a single Service ID can be used; for example to offer best-effort IP service. However, the Service ID concept allows for more complex CMs to be developed with support for multiple service classes while supporting interoperability with more basic modems. In particular, the Service ID concept is expected to support the concept of "data flows" on which protocols such as RSVP and RTP are based.
47
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
The Service ID is unique within a single MAC-sublayer domain. The length of the Service ID is 14 bits (although the Service ID is sometimes carried in the low-order bits of a 16-bit field). 6.1.2.4 Upstream Intervals, Mini-Slots and 6.25-Microsecond Increments The upstream transmission time-line is divided into intervals by the upstream bandwidth allocation mechanism. Each interval is an integral number of mini-slots. A "mini-slot" is the unit of granularity for upstream transmission opportunities. There is no implication that any PDU can actually be transmitted in a single minislot. Each interval is labeled with a usage code which defines both the type of traffic that can be transmitted during that interval and the physical-layer modulation encoding. A mini-slot is a power-of-two multiple of 6.25s increments, i.e., 1, 2, 4, 8, 16, 32, 64, or 128 times 6.25 s. The relationship between mini-slots, bytes, and time ticks is described further in Section 6.5.4. The usage code values are defined in Table 6-16 and allowed use is defined in Section 6.3. The binding of these values to physical-layer parameters is defined in Table 6-14. 6.1.2.5 Frame A frame is a unit of data exchanged between two (or more) entities at the Data Link Layer. A MAC frame consists of a MAC Header (beginning with a Frame Control byte; see Figure 6-3), and may incorporate ATM cells or a variable-length data PDU. The variable-length PDU includes a pair of 48-bit addresses, data, and a CRC sum. In special cases, the MAC Header may encapsulate multiple MAC frames (see Section 6.2.5.4). 6.1.3 Future Use
A number of fields are defined as being "for future use" in the various MAC frames described in this document. These fields MUST NOT be interpreted or used in any manner by this version (1.0) of the MAC protocol.
6.2 MAC Frame Formats
6.2.1 Generic MAC Frame Format
A MAC frame is the basic unit of transfer between MAC sublayers at the CMTS and the cable modem. The same basic structure is used in both the upstream and downstream directions. MAC frames are variable in length. The term "frame" is used in this context to indicate a unit of information that is passed between MAC sublayer peers. This is not to be confused with the term "framing" that indicates some fixed timing relationship. There are three distinct regions to consider, as shown in Figure 6-1. Preceding the MAC frame is either PMD sublayer overhead (upstream) or an MPEG transmission convergence header (downstream). The first part of the MAC frame is the MAC Header. The MAC Header uniquely identifies the contents of the MAC frame. Following the header is the optional Data PDU region. The format of the Data PDU and whether it is even present is described in the MAC Header.
48
Radio Frequency Interface Specification
SP-RFI-I03-980202
PMD Overhead (upstream)
MAC Header
Data PDU (optional)
(see Figure 6-3)
MPEG PSI Header (downstream)
(see Figure 6-4)
(see Figure 5-1)
MAC Frame
Figure 6-1. Generic MAC Frame Format
6.2.1.1 PMD Overhead In the upstream direction, the PHY layer indicates the start of the MAC frame to the MAC sublayer. From the MAC sublayer's perspective, it only needs to know the total amount of overhead so it can account for it in the Bandwidth Allocation process. More information on this may be found in the PMD Sublayer section of this document (Section 6.4). The FEC overhead is spread throughout the MAC frame and is assumed to be transparent to the MAC data stream. The MAC sublayer does need to be able to account for the overhead when doing Bandwidth Allocation. More information on this may be found in the Upstream Bandwidth Allocation section of this document (Section 6.4). 6.2.1.2 MAC Frame Transport The transport of MAC frames by the PMD sublayer for upstream channels is shown in Figure 6-2.
Upper Layer
MAC Frame
MAC Frame
MAC Frame
MAC Sublayer
PMD Sublayer
Start of Burst at Mini-slot boundary Start of Burst at Mini-slot boundary Start of Burst at Mini-slot boundary
PMD overhead
Data
FEC
PMD overhead
Data
FEC
PMD overhead
Data
FEC
Data
FEC
Data
FEC
PMD overhead
PMD overhead
PMD overhead
Figure 6-2. Upstream MAC/PMD Convergence
49
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
The layering of MAC frames over MPEG in the downstream channel is described in Section 5. 6.2.1.3 Ordering of Bits and Octets Within an octet, the least-significant bit is the first transmitted on the wire. This follows the convention used by Ethernet and [ISO 8802-3]. This is often called bit-little-endian order1. Within the MAC layer, when numeric quantities are represented by more than one octet (i.e., 16-bit and 32-bit values), the octet containing the most-significant bits is the first transmitted on the wire. This section follows the textual convention that when bit-fields are presented in tables, the most-significant bits are topmost in the table. For example, in Table 6-2, FC_TYPE occupies the two most-significant bits and EHDR_ON occupies the leastsignificant bit. This is sometimes called byte-big-endian order. 6.2.1.3.1 Representing Negative Numbers
Signed integer values will be transmitted and received in two's complement format.
1. This applies to the upstream channel only. For the downstream channel, the MPEG transmission convergence sublayer presents an octet-wide interface to the MAC, so the MAC sublayer does not define the bit order.
50
Radio Frequency Interface Specification
SP-RFI-I03-980202
6.2.1.4 MAC Header Format The MAC Header format MUST be as shown in Figure 6-3.
FC (1 byte)
MAC_PARM (1 byte)
LEN (SID) (2 bytes)
EHDR (0-240 bytes)
HCS (2 bytes)
FC TYPE (2 bits)
FC PARM (5 bits)
EHDR_ON (1 bit)
Figure 6-3. MAC Header Format
All MAC Headers MUST have the general format as shown in Table 6-1. The Frame Control (FC) field is the first byte and uniquely identifies the rest of the contents within the MAC Header. The FC field is followed by 3 bytes of MAC control; an OPTIONAL Extended Header field (EHDR); plus a Header Check Sequence (HCS) to ensure the integrity of the MAC Header.
Table 6-1. Generic MAC Header Format
MAC Header Field FC MAC_PARM Usage Frame Control: Identifies type of MAC Header Parameter field whose use is dependent on FC: if EHDR_ON=1; used for EHDR field length (ELEN) else if for concatenated frames (see Table 6-14) used for MAC frame count else (for Requests only) indicates the number of mini-slots and/or ATM cells requested LEN (SID) The length of the MAC frame. The length is defined to be the sum of the number of bytes in the extended header (if present) and the number of bytes following the HCS field. (For a REQ Header, this field is the Service ID instead) Extended MAC Header (where present; variable size). MAC Header Check Sequence Length of a MAC Header 16 bits Size 8 bits 8 bits
EHDR HCS
0-240 bytes 2 bytes 6 bytes + EHDR
The HCS field is a 16-bit CRC that ensures the integrity of the MAC Header, even in a collision environment. The HCS field coverage MUST include the entire MAC Header, starting with the FC field and including any EHDR field that may be present. The HCS is calculated using CRC-CCITT (x 16 + x12 + x5 + 1) as defined in [ITU-T X.25]. The FC field is broken down into the FC_TYPE sub-field, FC_PARM sub-field and an EHDR_ON indication flag. The format of the FC field MUST be as shown in Table 6-2.
51
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Table 6-2. FC Field Format
FC Field FC_TYPE MAC Frame Control Type field: 00: Packet PDU MAC Header 01: ATM PDU MAC Header 10: Reserved PDU MAC Header 11: MAC Specific Header FC_PARM EHDR_ON Parameter bits, use dependent on FC_TYPE. When = 1, indicates that EHDR field is present. [Length of EHDR (ELEN) determined by MAC_PARM field] 5 bits 1 bit Usage Size 2 bits
The FC_TYPE sub-field is the two MSBs of the FC field. These bits MUST always be interpreted in the same manner to indicate one of four possible MAC frame formats. These types include: MAC Header with Packet PDU; MAC Header with ATM cells; MAC Header reserved for future PDU types; or a MAC Header used for specific MAC control purposes. These types are spelled out in more detail in the remainder of this section. The five bits following the FC_TYPE sub-field is the FC_PARM sub-field. The use of these bits are dependent on the type of MAC Header. The LSB of the FC field is the EHDR_ON indicator. If this bit is set, then an Extended Header (EHDR) is present. The EHDR provides a mechanism to allow the MAC Header to be extensible in an inter-operable manner. The Transmission Convergence Sublayer stuff-byte pattern is defined to be a value of 0xFF. This precludes the use of FC byte values which have FC_TYPE = `11' and FC_PARM = `11111'. The MAC_PARM field of the MAC Header serves several purposes depending on the FC field. If the EHDR_ON indicator is set, then the MAC_PARM field MUST be used as the Extended Header length (ELEN). The EHDR field MAY vary from 0 to 240 bytes. If this is a concatenation MAC Header, then the MAC_PARM field represents the number of MAC frames (CNT) in the concatenation (see Section 6.2.5.4). If this is a Request MAC Header (REQ) (see Section 6.2.5.3), then the MAC_PARM field represents the amount of bandwidth being requested. In all other cases, the MAC_PARM field is reserved for future use. The third field has two possible uses. In most cases, it indicates the length (LEN) of this MAC frame. In one special case, the Request MAC Header, it is used to indicate the cable modem's Service ID since no PDU follows the MAC Header. The Extended Header (EHDR) field provides extensions to the MAC frame format. It is used to implement data link security and can be extended to add support for additional functions in future releases. Initial implementations SHOULD pass this field to the processor. This will allow future software upgrades to take advantage of this capability. (Refer to Section 6.2.6, "Extended MAC Headers" for details.) 6.2.1.5 Data PDU The MAC Header MAY be followed by a Data PDU. The type and format of the Data PDU is defined in the Frame Control field of the MAC Header. The FC field explicitly defines a Packet Data PDU, an ATM Data PDU, a MAC Header only frame (no PDU) and a reserved code point (used as an escape mechanism for future extensions). All CMs MUST use the length in the MAC Header to skip over any reserved data.
52
Radio Frequency Interface Specification
SP-RFI-I03-980202
6.2.2
Packet-Based MAC Frames
6.2.2.1 Variable-Length Packets The MAC sublayer MUST support a variable-length Ethernet/[ISO8802-3]-type Packet Data PDU. The Packet PDU MUST be passed across the network in its entirety, including its original CRC. A unique Packet MAC Header is appended to the beginning. The frame format without an Extended header MUST be as shown in Figure 6-4 and Table 6-3.
FC (1 byte)
MAC_PARM (1 byte)
LEN (2 bytes)
HCS (2 bytes)
Packet PDU1 (18-1518 bytes)
FC TYPE = 00
1
FC PARM = 00000
EHDR_ON =0
DA (6 bytes)
SA (6 bytes)
Type/Len (2 bytes)
User Data 0-1500
CRC (4 bytes)
Frame size is limited to 1518 bytes in the absence of VLAN tagging. Cooperating devices which implement IEEE 802.1Q VLAN tagging MAY use a frame size up to 1522 bytes.
Figure 6-4. Ethernet/802.3 Packet PDU Format Table 6-3. Packet PDU Format
Field FC Usage FC_TYPE = 00; Packet MAC Header FC_PARM[4:0] = 00000; other values reserved for future use and ignored EHDR_ON = 0; no EHDR present this example MAC_PARM LEN EHDR HCS Packet Data Reserved, MUST be set to zero if there is no EHDR; otherwise set to length of EHDR LEN = n; length of Packet PDU in bytes Extended MAC Header not present in this example MAC Header Check Sequence Packet PDU: DA - 48 bit Destination Address SA - 48 bit Source Address Type/Len - 16 bit Ethernet Type or [ISO8802-3] Length Field User Data (variable length, 0-1500 bytes) CRC - 32-bit CRC over packet PDU (as defined in Ethernet/[ISO8802-3]) Length of Packet MAC frame 6 + n bytes 8 bits 16 bits 0 bytes 2 bytes n bytes Size 8 bits
53
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
6.2.3
ATM Cell MAC Frames
ATM transport is not defined in this specification. In order to allow current frame-based CMs to operate in a possible future downstream channel in which ATM cells and frames are mixed, a codepoint for ATM has been defined. This will allow current modems to ignore ATM cells while receiving frames. The frame format MUST be as shown in Figure 6-5 and Table 6-4.
FC (1 byte)
MAC_PARM (1 byte)
LEN (2 bytes)
HCS (2 bytes)
ATM cells (nx53 bytes)
FC TYPE = 01
FC PARM = 00000
EHDR_ON =0
Figure 6-5. ATM Cell MAC Frame Format Table 6-4. ATM Cell MAC Frame Format
Field FC Usage FC_TYPE = 01; ATM cell format MAC Header FC_PARM[4:0] = 00000; other values reserved for future use and ignored EHDR_ON = 0; no EHDR present this example MAC_PARM LEN EHDR HCS ATM Data Reserved, MUST be set to zero if there is no EHDR; otherwise set to length of EHDR LEN = nx53; length of ATM cell PDU, in bytes Extended MAC Header not present this example MAC Header Check Sequence ATM cell PDU Length of ATM cells based MAC frame 8 bits 16 bits 0 bytes 2 bytes n x 53 bytes 6 + n x 53 bytes Size 8 bits
54
Radio Frequency Interface Specification
SP-RFI-I03-980202
6.2.4
Reserved PDU MAC Frames
The MAC sublayer provides a reserved FC code point to allow for support of future (to be defined) PDU formats. The FC field of the MAC Header indicates that a Reserved PDU is present. This PDU MUST be silently discarded by MAC implementations of this version (1.0) of the specification. Compliant version 1.0 implementations MUST use the length field to skip over the Reserved PDU. The format of the Reserved PDU without an extended header MUST be as shown in Figure 6-6 and Table 6-5.
FC (1 byte)
MAC_PARM (1 byte)
LEN (2 bytes)
HCS (2 bytes)
Reserved PDU (n bytes)
FC TYPE = 10
FC PARM = RRRRR
EHDR_ON =0
Figure 6-6. Reserved PDU Format Table 6-5. Reserved PDU Format
Field FC Usage FC_TYPE = 10; Reserved PDU MAC Header FC_PARM[4:0]; reserved for future use EHDR_ON = 0; no EHDR present this example MAC_PARM LEN EHDR HCS User Data Reserved for future use LEN = n; length of Reserved PDU in bytes EHDR = 0; Extended MAC Header not present this example MAC Header Check Sequence Reserved Data PDU Length of a Reserved PDU MAC frame 8 bits 16 bits 0 bytes 2 bytes n bytes 6 + n bytes Size 8 bits
55
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
6.2.5
MAC-Specific Headers
There are several MAC Headers which are used for very specific functions. These functions include support for downstream timing and upstream ranging/power adjust, requesting bandwidth and concatenating multiple MAC frames. 6.2.5.1 Timing Header A specific MAC Header is identified to help support the timing and adjustments required. In the downstream, this MAC Header MUST be used to transport the Global Timing Reference to which all cable modems synchronize. In the upstream, this MAC Header MUST be used as part of the Ranging message needed for a cable modem's timing and power adjustments. The Timing MAC Header is followed by a Packet Data PDU. The format MUST be as shown in Figure 6-7 and Table 6-6.
FC (1 byte)
MAC_PARM (1 byte)
LEN (2 bytes)
HCS (2 bytes)
Packet PDU (various lengths)
FC TYPE = 11
FC PARM = 00000
EHDR_ON =0
Figure 6-7. Timing MAC Header Table 6-6. Timing MAC Header Format
Field FC Usage FC_TYPE = 11; MAC Specific Header FC_PARM[4:0] = 00000; Timing MAC Header EHDR_ON = 0; extended header prohibited for SYNC and RNG-REQ MAC_PARM LEN EHDR HCS Packet Data Reserved for future use LEN = n; length of Packet PDU in bytes Extended MAC Header not present MAC Header Check Sequence MAC Management message: SYNC message (downstream only) RNG-REQ (upstream only) Length of Timing Message MAC frame 6 + n bytes 8 bits 16 bits 0 bytes 2 bytes n bytes Size 8 bits
56
Radio Frequency Interface Specification
SP-RFI-I03-980202
6.2.5.2 MAC Management Header A specific MAC Header is identified to help support the MAC management messages required. This MAC Header MUST be used to transport all MAC management messages (refer to Section 6.3). The format MUST be as shown Figure 6-8 and Table 6-7.
FC (1 byte)
MAC_PARM (1 byte)
LEN (2 bytes)
HCS (2 bytes)
MAC management message
FC TYPE = 11
FC PARM = 00001
EHDR_ON
Figure 6-8. Management MAC Header Table 6-7. Management MAC Header Format
Field FC Usage FC_TYPE = 11; MAC Specific Header FC_PARM[4:0] = 00001 EHDR_ON MAC_PARM LEN EHDR HCS Packet Data Reserved for future use LEN = n; length of Packet PDU in bytes Extended MAC Header not present this example MAC Header Check Sequence MAC Management message: Length of Management MAC frame 8 bits 16 bits 0 bytes 2 bytes n bytes 6 + n bytes + EHDR Size 8 bits
57
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
6.2.5.3 Request MAC Header The Request MAC Header is the basic mechanism that a cable modem uses to request bandwidth. As such, it is only applicable in the upstream. There MUST be no Data PDUs following the Request MAC Header. The general format of the Request MUST be as shown in Figure 6-9 and Table 6-8.
FC (1 byte)
MAC_PARM (1 byte)
SID (2 bytes)
HCS (2 bytes)
FC TYPE = 11
FC PARM = R0010
EHDR_ON =0
Figure 6-9. Request MAC Header Format Table 6-8. Request MAC Header (REQ) Format
Field FC Usage FC_TYPE = 11; MAC-Specific Header FC_PARM[3:0] = 0010; MAC Header only; no data PDU following FC_PARM[4] indicates if REQ is in mini-slots or ATM cells [4] = 0; mini-slot REQ [4] = 1; ATM cell REQ EHDR_ON = 0; no EHDR allowed MAC_PARM REQ, total amount of bandwidth requested (upstream only): if FC_PARM [4] = 0; REQ is number of mini-slots if FC_PARM [4] = 1; REQ is number of ATM cells SID EHDR HCS Service ID (0 ...0x3FFF) Extended MAC Header not allowed MAC Header Check Sequence Length of a REQ MAC Header 6 bytes 16 bits 0 bytes 2 bytes 8 bits Size 8 bits
Because the Request MAC Header does not have a Data PDU following it, the LEN field is not needed. The LEN field MUST be replaced with an SID. The SID MUST uniquely identify a particular service queue within a given station. The bandwidth request, REQ, MUST be specified in either mini-slots or in ATM cells. The REQ field MUST indicate the current total amount of bandwidth requested for this service queue including appropriate allowance for the PHY overhead. 6.2.5.4 Concatenation A Specific MAC Header is defined to allow multiple MAC frames to be concatenated. This allows a single MAC "burst" to be transferred across the network. The PHY overhead and the Concatenation MAC Header only occur once. Concatenation of multiple MAC frames MUST be as shown in Figure 6-10.
58
Radio Frequency Interface Specification
SP-RFI-I03-980202
A compliant CMTS & CM MAY support concatenation.
Note: Concatenation only applies to upstream traffic. Concatenation MUST NOT be used on down stream traffic.
PHY Overhead
MAC Hdr (Concat)
MAC Frame 1 (MAC HDR + optional PDU)
MAC Frame n (MAC HDR + optional PDU)
Figure 6-10. Concatenation of Multiple MAC Frames
Only one Concatenation MAC Header MUST be present per MAC "burst." Nested concatenation MUST NOT be allowed. Immediately following the Concatenation MAC Header MUST be the MAC Header of the first MAC frame. Information within the MAC Header indicates the length of the first MAC Frame and provides a means to find the start of the next MAC Frame. Each MAC frame within a concatenation MUST be unique and MAY be of any type. This means that Packet, ATM, Reserved PDU and MAC-specific Frames MAY be mixed together. The embedded MAC frames MAY be addressed to different destinations and MUST be delivered as if they were transmitted individually. The format of the Concatenation MAC Header MUST be as shown in Figure 6-11 and Table 6-9.
FC (1 byte)
MAC_PARM (1 byte)
LEN (2 bytes)
HCS (2 bytes)
FC TYPE = 11
FC PARM = 11100
EHDR_ON =0
Figure 6-11. Concatenation MAC Header Format Table 6-9. Concatenated MAC Frame Format
Field FC Usage FC_TYPE = 11; MAC Specific Header FC_PARM[4:0] = 11100; Concatenation MAC Header EHDR_ON = 0; no EHDR with Concatenation Header MAC_PARM CNT, number of MAC frames in this concatenation CNT = 0 indicates unspecified number of MAC frames LEN EHDR HCS MAC frame 1 MAC frame n LEN = x + . . . + y; length of all following MAC frames in bytes Extended MAC Header MUST NOT be used MAC Header Check Sequence first MAC frame: MAC Header plus OPTIONAL data PDU last MAC frame: MAC Header plus OPTIONAL data PDU Length of Concatenated MAC frame 16 bits 0 bytes 2 bytes x bytes y bytes 6 + LEN bytes 8 bits Size 8 bits
The MAC_PARM field MUST be used to indicate the total count of MAC frames (CNT) in this concatenation burst. If the count equals zero, then there is an unspecified number of MAC frames. The LEN field indicates the
59
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
length of the entire concatenation. This is slightly different than the LEN field within an individual MAC Header which only indicates the length of that MAC frame. 6.2.6 Extended MAC Headers
Every MAC Header, except the Timing, Concatenation MAC Header and Request Frame, has the capability of defining an Extended Header field (EHDR). The presence of an EHDR field MUST be indicated by the EHDR_ON flag in the FC field being set. Whenever this bit is set, then the MAC_PARM field MUST be used as the EHDR length (ELEN). The minimum defined EHDR is 1 byte. The maximum EHDR length is 240 bytes. A compliant CMTS & CM MUST support extended headers. The format of a generic MAC Header with an Extended Header included MUST be as shown in Figure 6-12 and Table 6-10. Note: Extended Headers MUST NOT be used in a Concatenation MAC Header, but MAY be included as part of the MAC Headers within the concatenation. Extended Headers MUST NOT be used in Request and Timing MAC Headers.
FC (1 byte)
MAC_PARM (1 byte)
LEN (2 bytes)
EHDR (1-240 bytes)
HCS (2 bytes)
data PDU (optional)
FC TYPE = XX
FC PARM (reserved)
EHDR_ON =1
EH_TYPE (4 bits)
EH_LEN (4 bits)
EH_VALUE (0-15 bytes)
repeat
Figure 6-12. Extended MAC Format Table 6-10. Extended Header Format
Field FC Usage FC_TYPE = XX; Applies to all MAC Headers FC_PARM[4:0] = XXXXX; dependent on FC_TYPE EHDR_ON = 1; EHDR present this example MAC_PARM LEN EHDR HCS PDU ELEN = x; length of EHDR in bytes LEN = x + y; length of EHDR plus OPTIONAL data PDU in bytes Extended MAC Header present this example MAC Header Check Sequence OPTIONAL data PDU Length of MAC frame with EHDR 8 bits 16 bits x bytes 2 bytes y bytes 6 + x + y bytes Size 8 bits
Since the EHDR increases the length of the MAC frame, the LEN field MUST be increased to include both the length of the Data PDU and the length of the EHDR. The EHDR field consists of one or more EH elements. Each EH element is variable sized. The first byte of the EH element MUST contain a type and a length field. Every CM MUST use this length to skip over any unknown EH elements. The format of an EH element MUST be as shown in Table 6-11.
60
Radio Frequency Interface Specification
SP-RFI-I03-980202
Table 6-11. EH Element Format
EH Element Fields EH_TYPE EH_LEN EH_VALUE Usage EH element Type Field Length of EH_VALUE EH element data 4 bits 4 bits 0-15 bytes Size
The types of EH element defined in Table 6-12 MUST be supported. Reserved and extended types are undefined at this point and SHOULD be ignored. The first eight EH element types are intended for one-way transfer between the cable modem and the CMTS. The next seven EH element types are for end-to-end usage within a MAC-sublayer domain. Thus, the information attached to the EHDR on the upstream MUST also be attached when the information is forwarded. The final EH element type is an escape mechanism that allows for more types and longer values, and MUST be as shown in Table 6-12.
Table 6-12. EH Element Format
EH_TYPE 0 1 2 3 (= BP_UP) 4 (= BP_DOWN) 5 (= SS_UP) 6 (= SS_DOWN) 7 8 10-14 15 XX 4 0 3 2 4 4 8 or 9 8 or 9 EH_LEN EH_VALUE Null configuration setting; may be used to pad the extended header. The EH_LEN MUST be zero, but the configuration setting may be repeated. Request: mini-slots requested (1 byte); SID (2 bytes) [CM --> CMTS] Acknowledgment requested; SID (2 bytes) [CM --> CMTS] Upstream Privacy EH element [MCNS8] Downstream Privacy EH element [MCNS8] Upstream Security Header [MCNS2] Downstream Security Header [MCNS2] Reserved Reserved Reserved [CM <-> CM] Extended EH element: EHX_TYPE (1 byte), EHX_LEN (1 byte), EH_VALUE (length determined by EHX_LEN)
6.2.7
Error-Handling
The cable network is a potentially harsh environment that may cause several different error conditions to occur. This section, together with Section 7.2.17, describes the procedures that are required when an exception occurs at the MAC framing level. The most obvious type of error occurs when the HCS on the MAC Header fails. This may be a result of noise on the network or possibly by collisions in the upstream channel. Framing recovery on the downstream channel is performed by the MPEG transmission convergence sublayer. In the upstream channel, framing is recovered on each transmitted burst, such that framing on one burst is independent of framing on prior bursts. Hence, framing errors within a burst are handled by simply ignoring that burst; i.e., errors are unrecoverable until the next burst. A second exception, which applies only to the upstream, occurs when the Length field is corrupted and the MAC thinks the frame is longer than it actually is. Synchronization will recover at the next valid upstream data interval. For every MAC transmission, The HCS MUST be verified. When a bad HCS is detected, the MAC Header and any payload MUST be dropped.
61
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
For Packet PDU transmissions, a bad CRC MAY be detected. Since the CRC only covers the Data PDU and the HCS covers the MAC Header; the MAC Header is still considered valid. Thus, the Packet PDU MUST be dropped, but any pertinent information in the MAC Header (e.g., bandwidth request information) MAY be used.
6.3 MAC Management Messages
6.3.1 MAC Management Message Header
MAC management messages MUST be encapsulated in an LLC unnumbered information frame per [ISO88022], which in turn is encapsulated within the cable network MAC framing, as shown in Figure 6-13. Figure 6-13 shows the MAC Header and the MAC Management Message Header fields which are common across all MAC Management Messages.
Bit
0 FC
8 MAC PARM HCS
16
24 LEN
31
MAC header
DA DA SA msg LEN control version DSAP type SSAP RSVD SA MAC Management Message Header
Management message payload
CRC
Figure 6-13. MAC Header and MAC Management Message Header Fields
The fields MUST be as defined below. FC, MAC PARM, LEN, HCS Common MAC frame header -refer to Section 6.2.1.4 for details. All messages use a MAC-specific header. MAC management frames will be addressed to a specific CM unicast address or to the MCNS management multicast address. These MCNS MAC management addresses are described in Appendix A. The MAC address of the source CM or CMTS system.
Destination Address (DA)
Source Address (SA)
62
Radio Frequency Interface Specification
SP-RFI-I03-980202
Msg Length DSAP SSAP Control Version
Length of the MAC message from DSAP to the end of the payload. The LLC null SAP (00) as defined by [ISO8802-2]. The LLC null SAP (00) as defined by [ISO8802-2]. Unnumbered information frame (03) as defined by [ISO8802-2]. 1 octet This field defines the version of the MAC management protocol in use. Set to 1 for this version. 1 octet This field defines the type of this particular MAC management message
Table 6-13. MAC Management Message Types
Type Value 1 2 3 4 5 6 7 8 9 10 11 12 13 14-255 Message Name SYNC UCD MAP RNG-REQ RNG-RSP REG-REQ REG-RSP UCC-REQ UCC-RSP TRI-TCD TRI-TSI BPKM-REQ BPKM-RSP Message Description Timing Synchronization Upstream Channel Descriptor Upstream Bandwidth Allocation Ranging Request Ranging Response Registration Request Registration Response Upstream Channel Change Request Upstream Channel Change Response Telephony Channel Descriptor [MCNS6] Termination System Information [MCNS6] Privacy Key Management Request [MCNS8] Privacy Key Management Response [MCNS8] Reserved for future use
Type
RSVD
1 octet This field is used to align the message payload on a 32 bit boundary. Set to 0 for this version.
Management Message Payload variable length As defined for each specific management message. CRC Covers message including header fields (DA, SA,...). Polynomial defined by [ISO8802-3]. MAC Management Messages
6.3.2
A compliant CMTS or CM MUST support the following management message types.
63
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
6.3.2.1 Time Synchronization (SYNC) Time Synchronization (SYNC) MUST be transmitted by CMTS at a periodic interval to establish MAC sublayer timing. This message MUST use an FC field of type: Timing. This MUST be followed by a Packet PDU in the format shown in Figure 6-14.
Bit
0
8
16
24
31
~ ~
MAC Management Message Header
~ ~
CMTS Timestamp
Figure 6-14. Format of Packet PDU Following the Timing Header
The parameters shall be as defined below. CMTS Timestamp An incrementing 32-bit timestamp based on a timebase reference clock at the CMTS. Units are in 1/64th of a Timebase Tick (i.e., 6.25/64 s. 1). 6.3.2.2 Upstream Channel Descriptor (UCD) An Upstream Channel Descriptor MUST be transmitted by the CMTS at a periodic interval to define the characteristics of an upstream channel (Figure 6-15). A separate message MUST be transmitted for each active upstream. To provide for flexibility the message parameters following the channel ID MUST be encoded in a type/length/ value (TLV) form in which the type and length fields are each 1 octet long. Using this encoding, new parameters MAY be added which not all CMs can interpret. A CM which does not recognize a parameter type MUST skip over this parameter and MUST NOT treat the event as an error condition.
1. Since the SYNC message applies to all upstream channels within this MAC domain, units were chosen to be independent of the symbol rate of any particular upstream channel. A timebase tick represents the smallest possible mini-slot at the highest possible symbol rate. See Section 6.5.4 for time-unit relationships.
64
Radio Frequency Interface Specification
SP-RFI-I03-980202
Bit
0
8
16
24
31
~ ~
Upstream channel ID
MAC Management Message Header
Configuration Change Count
Mini-Slot Size
Downstream channel ID
TLV-encoded information for the overall channel TLV-encoded Burst Description TLV-encoded information for the subsequent burst descriptors
Figure 6-15. Upstream Channel Descriptor
A CMTS MUST generate UCDs in the format shown in Figure 6-15, including all of the following parameters: Configuration Change Count Incremented by one (modulo the field size) by the CMTS whenever any of the values of this channel descriptor change. If the value of this count in a subsequent UCD remains the same, the CM can quickly decide that the remaining fields have not changed, and may be able to disregard the remainder of the message. This value is also referenced from the MAP. The size T of the Mini-Slot for this upstream channel in units of the Timebase Tick of 6.25 s. Allowable values are T = 2M, M = 0, 1, ...7. That is, T = 1, 2, 4, 8, 16, 32, 64, or 128. The identifier of the upstream channel to which this message refers. This identifier is arbitrarily chosen by the CMTS and is only unique within the MAC-Sublayer domain. The identifier of the downstream channel on which this message has been transmitted. This identifier is arbitrarily chosen by the CMTS and is only unique within the MAC-Sublayer domain.
Mini-Slot Size
upstream channel ID
downstream channel ID
All other parameters are coded as TLV tuples. Channel-wide parameters (types 1-3 in Table 6-14) must precede burst descriptors (type 4 below).
65
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Table 6-14. Channel TLV Parameters
Type (1 byte) 1 2 3 1 4 1-128 Length (1 byte) Value (Variable length) Multiples of base rate of 160 ksym/sec. (Value is 1, 2, 4, 8, or 16.) Upstream center frequency (Hz) Preamble superstring. All burst-specific preamble values are chosen as bit-substrings of this string. The first byte of the Value field contains the first 8 bits of the superstring, with the first bit of the preamble superstring in the MSB position of the first Value field byte, the eighth bit of the preamble superstring in the LSB position of the first Value field byte; the second byte in the Value field contains the second eight bits of the superstring, with the ninth bit of the superstring in the MSB of the second byte and sixteenth bit of the preamble superstring in the LSB of the second byte, and so forth. Burst Descriptor 4 May appear more than once; described below. The length is the number of bytes in the overall object, including embedded TLV items.
Name Symbol Rate Frequency Preamble Pattern
Burst Descriptors are compound TLV encodings that define, for each type of upstream usage interval, the physical-layer characteristics that are to be used during that interval. The upstream interval usage codes are defined in the MAP message (see Section 6.3.2.3 and Table 6-16).
Type=4 burst descriptor
length 1-n
Interval Usage Code
TLV codes for PHY parameters
Figure 6-16. Top-Level Encoding for a Burst Descriptor
A Burst Descriptor MUST be included for each interval usage code that is to be used in the allocation MAP. The interval usage code above must be one of the values from Table 6-16. Within each Burst Descriptor is an unordered list of Physical-layer attributes, encoded as TLV values. These attributes are shown in Table 6-15.
66
Radio Frequency Interface Specification
SP-RFI-I03-980202
Table 6-15. Upstream Physical-Layer Burst Attributes
Type (1 byte) 1 2 3 4 Length (1 byte) 1 1 2 2 Value (Variable Length) 1 = QPSK, 2 = 16QAM 1 = on, 2 = off Up to 1024 bits. The value must be an integral number of symbols (a multiple of 2 for QPSK and 4 for 16QAM) Identifies the bits to be used for the preamble value. This is specified as a starting offset into the Preamble Pattern (see Table 6-14). That is, a value of zero means that the first bit of the preamble for this burst type is the value of the first bit of the Preamble Pattern. A value of 100 means that the preamble is to use the 101st and succeeding bits from the Preamble Pattern. This value must be a multiple of the symbol size. The first bit of the Preamble Pattern is the first bit into the symbol mapper (Figure 4-8), and is I1 in the first symbol of the burst (see Section 4.2.2.2). FEC Error Correction (T bytes) FEC Codeword Length (k) 5 6 1 1 0-10 bytes. Zero implies no Forward Error Correction. Fixed: 16 to 253 (assuming FEC on) Shortened: 16 to 253 (assuming FEC on) Scrambler Seed Maximum Burst Size 7 8 2 1 The 15-bit seed value. The maximum number of mini-slots that can be transmitted during this burst type. Absence of this configuration setting implies that the burst size is limited elsewhere. This value MUST be used when the interval type is Short Data Grant. Number of symbol times which must follow the end of this burst. (Although this value may be derivable from other network and architectural parameters, it is included here to ensure that the CMs and CMTS all use the same value.) 1 = fixed; 2 = shortened 1 = on; 2 = off
Name Modulation Type Differential Encoding Preamble Length Preamble Value Offset
Guard Time Size
9
1
Last Codeword Length Scrambler on/off
10 11
1 1
6.3.2.2.1
Example of UCD Encoded TLV Data
67
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
An example of UCD encoded TLV data is given in Figure 6-17.
Type 1 Type 2 Type 3 Type 4 Type 4 Type 4 Type 4 Length 1 Length 4 Length 1-128 Length N Length N Length N Length N Symbol Rate Frequency Preamble Superstring Preamble Superstring First Burst Descriptor Second Burst Descriptor Third Burst Descriptor Fourth Burst Descriptor
Figure 6-17. Example of UCD Encoded TLV Data
6.3.2.3 Upstream Bandwidth Allocation Map (MAP) A CMTS MUST generate MAPs in the format shown in Figure 6-18.
MAC Management Message Header Upstream Channel ID Number of elements
UCD Count
Reserved
Alloc Start Time
Ack Time Ranging Backoff Start Data Backoff Start
Ranging Backoff End
Data Backoff End
MAP Information Elements
Figure 6-18. MAP Format
The parameters MUST be as follows: Upstream Channel ID The identifier of the upstream channel to which this message refers.
68
Radio Frequency Interface Specification
SP-RFI-I03-980202
UCD Count
Matches the value of the Configuration Change Count of the UCD which describes the burst parameters which apply to this map. See Section 7.2.15. Number of information elements in the map Reserved field for alignment Effective start time from CMTS initialization (in mini-slots) for assignments within this map Latest time, from CMTS initialization, (mini-slots) processed in upstream. This time is used by the CMs for collision detection purposes. See Section 6.4.4. Initial back-off window for initial ranging contention, expressed as a power of two. Values range 0-15 (the highest order bits must be unused and set to 0). Final back-off window for initial ranging contention, expressed as a power of two. Values range 0-15 (the highest order bits must be unused and set to 0). Initial back-off window for contention data and requests, expressed as a power of two. Values range 0-15 (the highest order bits must be unused and set to 0). Final back-off window for contention data and requests, expressed as a power of two. Values range 0-15 (the highest order bits must be unused and set to 0). MUST be in the format defined in Figure 6-19 and Table 6-16. Values for IUCs are defined in Table 6-16 and are described in detail in Section 6.4.1.
Number Elements Reserved Alloc Start Time
Ack Time
Ranging Backoff Start
Ranging Backoff End
Data Backoff Start
Data Backoff End
MAP information elements
first interval second interval
SID SID
IUC IUC
offset = 0 offset
last interval end-of-list (Null IE)
SID SID=0 SID
IUC IUC=7 IUC
offset offset = map length offset = map length
Acknowledgements and Deferrals SID IUC offset =map length
Figure 6-19. MAP Information Element Structure
69
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Table 6-16. Allocation MAP Information Elements (IE)
Interval Usage Code (IUC) (4 bits) 1 2
IE Name Request REQ/Data (refer to Appendix A for multicast definition) Initial Maintenance
SID (14 bits) any multicast
Mini-slot Offset (14 bits) starting offset of REQ region starting offset of IMMEDIATE Data region well-known multicasts define start intervals
3
broadcast/ multicast
starting offset of MAINT region (used in Initial Ranging)
Station
Maintenancea
4 5
unicast unicast
starting offset of MAINT region (used in Periodic Ranging) starting offset of Data Grant assignment; if inferred length = 0, then it is a Data Grant pending.
Short Data Grantb
Long Data Grant
6
unicast
starting offset of Data Grant assignment; if inferred length = 0, then it is a Data Grant Pending
Null IE Data Ack Reserved Expansion a. b.
7 8 9-14 15
zero unicast any expanded IUC
ending offset of the previous grant. Used to bound the length of the last actual interval allocation. CMTS sets to 0 reserved # of additional 32-bit words in this IE
Although the distinction between Initial Maintenance and Station Maintenance is unambiguous from the Service ID type, separate codes are used to ease physical-layer configuration (see burst descriptor encodings, Table 6-15). The distinction between long and short data grants is related to the amount of data that can be transmitted in the grant. A short data grant interval may use FEC parameters that are appropriate to short packets while a long data grant may be able to take advantage of greater FEC coding efficiency. Each IE is a 32-bit quantity, of which the most significant 14 bits represent the SID, the middle 4 bits the IUC, and the low-order 14 bits the mini-slot offset. The SID used in the Station Maintenance IE MUST be a Temporary SID, or the first Registration SID (and maybe the only one) that was assigned in the REG-RSP message to a CM.
c. d.
6.3.2.4 Ranging Request (RNG-REQ) A Ranging Request MUST be transmitted by a CM at initialization and periodically on request from CMTS to determine network delay. This message MUST use an FC field of type: Timing. This MUST be followed by a Packet PDU in the format shown in Figure 6-20.
Bit
0
8
16
24
31
~ ~
MAC Management Message Header Downstream Channel ID Pending Till Complete
~ ~
SID
70
Radio Frequency Interface Specification
SP-RFI-I03-980202
Figure 6-20. Packet PDU Following the Timing Header
Parameters MUST be as follows: SID For RNG-REQ messages transmitted in Initial Maintenance intervals: Initialization SID if modem is attempting to join the network Initialization SID if modem has not yet registered and is changing downstream (or both downstream and upstream) channels as directed by a downloaded parameter file Temporary SID if modem has not yet registered and is changing upstream (not downstream) channels as directed by a downloaded parameter file Registration SID (previously assigned in REG-RSP) if modem is registered and is changing upstream channels
-
-
For RNG-REQ messages transmitted in Station Maintenance intervals: Assigned SID
This is a 16-bit field of which the lower 14 bits define the SID with bits 14,15 defined to be 0. Downstream channel ID The identifier of the downstream channel on which the CM received the UCD which described this upstream. This is an 8-bit field. If zero, then all previous Ranging Response attributes have been applied prior to transmittting this request. If nonzero then this is time estimated to be needed to complete assimilation of ranging parameters. Note that only equalization can be deferred. Units are in unsigned centiseconds (10 msec).
Pending Till Complete
6.3.2.5 Ranging Response (RNG-RSP) A Ranging Response MUST be transmitted by a CMTS in response to received RNG-REQ in the format shown in Figure 6-21. The state machines describing the ranging procedure appear in Section 7.2.5. In that procedure it may be noted that, from the point of view of the CM, reception of a Ranging Response is stateless. In particular, the CM MUST be prepared to receive a Ranging Response at any time, not just following a Ranging Request. To provide for flexibility, the message parameters following the Upstream Channel ID MUST be encoded in a type/length/value (TLV) form. Using this encoding, new parameters can be added which not all CMs can interpret. A CM which does not recognize a parameter type MUST simply skip over this parameter and MUST NOT treat the event as an error condition.
71
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Bit
0
8
16
24
31
~ ~
MAC Management Message Header
~ ~
SID from request
Upstream channel ID
TLV Encoded Information
Figure 6-21. Ranging Response
Parameters MUST be as follows: SID If the modem is being instructed by this response to move to a different channel, this is initialization SID. Otherwise, this is the SID from the corresponding RNG-REQ to which this response refers, except that if the corresponding RNG-REQ was an initial ranging request specifying a initialization SID, then this is the assigned temporary SID. The identifier of the upstream channel on which the CMTS received the RNGREQ to which this response refers. The time by which to offset frame transmission so that frames arrive at the expected mini-slot time at the CMTS. Specifies the relative change in transmission power level that the CM is to make in order that transmissions arrive at the CMTS at the desired power.
Upstream channel ID
Timing adjust information
Power adjust information
Frequency adjust information Specifies the relative change in transmission frequency that the CM is to make in order to better match the CMTS. (This is fine-frequency adjustment within a channel, not re-assignment to a different channel) CM transmitter equalization information Ranging status If the CM implements transmission equalization, this provides the equalization coefficients (optional). Used to indicate whether upstream messages are received within acceptable limits by CMTS An optional parameter. The downstream frequency with which the modem should redo initial ranging.
Downstream Frequency Override
Upstream Channel ID Override An optional parameter. The identifier of the upstream channel with which the modem should redo initial ranging.
72
Radio Frequency Interface Specification
SP-RFI-I03-980202
6.3.2.5.1
Encodings
The type values used MUST be those defined in Table 6-17 and Figure 6-22. These are unique within the ranging response message but not across the entire MAC message set. The type and length fields MUST each be 1 octet in length.
Table 6-17. Ranging Response Message Encodings
Type (1 byte) 1 2 3 4 5 6 7 8-255 4 1 2 n 1 4 1 n Length (1 byte) Value (Variable Length) TX timing offset adjustment (signed 32-bit, units of (6.25 microsec/64)) TX Power offset adjustment (signed 8-bit, 1/4-dB units) TX frequency offset adjustment (signed 16-bit, Hz units) TX equalization data - see details below 1 = continue, 2 = abort, 3 = success Center frequency of new downstream channel in Hz Identifier of the new upstream channel. reserved for future use
Name Timing Adjust Power Level Adjust Offset Frequency Adjust Transmit Equalization Adjust Ranging Status Downstream frequency override Upstream channel ID override Reserved
type 4 number of forward taps (N)
length
Number of taps per symbol
number of reverse taps (M)
first coefficient F 0 (real)
first coefficient F 0 (imaginary)
last coefficient F N (real)
last coefficient F N (imaginary)
first reverse coefficient D 0 (real)
first reverse coefficient D 0 (imaginary)
last reverse coefficient D M(real)
last reverse coefficient D M (imaginary)
Figure 6-22. Generalized Decision Feedback Equalization Coefficients
The total number of taps per symbol MUST be in the range 1 to 4.
73
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
The total number of taps MAY range up to 64. Each tap consists of a real and imaginary coefficient entry in the table. If more than 255 bytes are needed to represent equalization information, then several type-4 elements MAY be used. Data MUST be treated as if byte-concatenated, that is, the first byte after the length field of the second type-4 element is treated as if it immediately followed the last byte of the first type-4 element. The coefficients that are sent to the CM may be coefficients of a CMTS demodulator equalizer such as shown in Figure 6-23, which, after acquisition, will have tap values that represent the channel distortion. Other equalization methods may be devised in the future. If so, they will use a different type-value so that the element is not overlooked. This is a vendor-specific issue which is not described here. Other equalization methods may be devised in the future. If so, they will use a different type-value so that this element is not overloaded.
Equalizer Input F0
z-1
z-1
z-1
z-1
z-1
... ...
z-1 FN Equalizer Output
F1
F2
F3
F4
F5
DM
...
D5
D4
D3 z-1
D2 z-1
D1 z-1
D0 z-1 z-1
z-1
...
z-1
Figure 6-23. CMTS Demodulator Equalizer Tap Location Definition
6.3.2.5.2
Example of TLV Data
An example of TLV data is given in Figure 6-24.
Type 1 Type 2 Type 3 Type 4 Type 5
Length 4 Length 1 Length 2 Length x Length 1
Timing adjust Power adjust Frequency adjust information x bytes of CM transmitter equalization information Ranging status
Figure 6-24. Example of TLV Data
74
Radio Frequency Interface Specification
SP-RFI-I03-980202
6.3.2.5.3
Overriding Channels
The RNG-RSP message allows the CMTS to instruct the modem to move to a new downstream and/or upstream channel and to repeat initial ranging. However, the CMTS may do this only in response to an initial ranging request from a modem that is attempting to join the network, or in response to any of the unicast ranging requests that take place immediately after this initial ranging and up to the point where the modem successfully completes periodic ranging. From this point on, only the C.8.4 and UCC-REQ mechanisms are available for moving the modem to a new upstream channel, and only the C.8.3 mechanism is available for moving the modem to a new downstream channel. If a downstream frequency override is specified in the RNG-RSP, the modem MUST reinitialize its MAC and perform initial ranging using the specified downstream center frequency as the first scanned channel. For the upstream channel, the modem may select any valid channel based on received UCD messages. If an upstream channel ID override is specified in the RNG-RSP, the modem MUST reinitialize its MAC and perform initial ranging using for its first attempt the upstream channel specified in the RNG-RSP and the same downstream frequency on which the RNG-RSP was received. If both downstream frequency and upstream channel ID overrides are present in the RNG-RSP, the modem MUST reinitialize its MAC and perform initial ranging using for its first attempt the specified downstream frequency and upstream channel ID. Note that when a modem with an assigned temporary SID is instructed to move to a new downstream and/or upstream channel and to redo initial ranging, the modem MUST consider the temporary SID to be deassigned. The modem MUST redo initial ranging using the zero SID. Configuration file settings (Appendix C.3) for upstream channel ID and downstream frequency are optional, but if specified in the config file they take precedence over the ranging response parameters. 6.3.2.6 Registration Request (REG-REQ) A Registration Request, in the format shown in Figure 6-25, MUST be transmitted by a CM at initialization after receipt of a CM parameter file. To provide for flexibility, the message parameters following the SID MUST be encoded in a type/length/value form. Using this encoding, new parameters MAY be added which not all CMTSs can interpret. A CMTS which does not recognize a parameter type MUST simply skip over this parameter and MUST not treat the event as an error condition.
75
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Bit
0
8
16
24
31
~ ~
MAC Management Message Header
~ ~
SID
TLV Encoded Information
Figure 6-25. Registration Request
Parameters MUST be as follows: SID Configuration Settings for this modem Initialization SID for this CM
As defined in Appendix C
* * * * * * *
Note:
Downstream Frequency Configuration Setting Upstream Channel ID Configuration Setting Network Access Configuration Setting Class of Service Configuration Setting Modem Capabilities Configuration Setting Modem IP address Baseline Privacy Configuration Setting
The CM MUST be capable of supporting these standard configuration settings.
Vendor-specific data
As defined in Appendix C
* Vendor ID Configuration Setting (vendor ID of CM) * Vendor-specific extensions
Message Integrity Checks As defined in Appendix C
* CM MIC Configuration Setting * CMTS MIC Configuration Setting
6.3.2.6.1 Encodings
The type values used are unique within the registration request message but not across the entire MAC message set. They MUST be those defined in Appendix C.
76
Radio Frequency Interface Specification
SP-RFI-I03-980202
Note: The CM MUST forward the vendor specific configuration settings to the CMTS in the same order in which they were received in the configuration file to allow the message integrity check to be performed.
6.3.2.6.2
Example
An example of type value encodings is given in Figure 6-26.
Type 1 Type 2 Type 3 Type 4 Type 4
Length 4 Length 1 Length 1 Length 28 Length 28
Downstream Frequency Upstream channel Network access Service class definition class 1 Service class definition class 2
Type 4 Type 5 Type 12 Type 8 Type 43 Type 6 Type 7
Length 28 Length 3 Length 4 Length 3 Length n Length 16 Length 16 Modem capabilities
Service class definition class n
Modem IP address Vendor ID n bytes of vendor-specific data CM message integrity check CMTS message integrity check
Figure 6-26. Example of Registration Request Type Value Encodings
6.3.2.7 Registration Response (REG-RSP) A Registration Response, in the format shown in Figure 6-27, MUST be transmitted by CMTS in response to received REG-REQ. To provide for flexibility, the message parameters following the SID MUST be encoded in a type/length/ value form. Using this encoding, new parameters MAY be added which not all CMs can interpret. A CM which does not recognize a parameter type MUST skip over this parameter and MUST NOT treat the event as an error condition.
77
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Bit
0
8
16
24
31
~ ~
MAC Management Message Header SID from corresponding RNG-REQ
~ ~
Response
TLV Encoded Information
Figure 6-27. Registration Response Format
Parameters MUST be as follows: SID from Corresponding REG-REQ Response
SID from corresponding REG-REQ to which this response refers 0 = ok 1 = authentication failure 2 = class of service failure
Modem Capabilities Service Class Data
The CMTS response to the capabilities of the modem Returned when Response = ok Service ID / service class tuple for each class of service granted
Service Not Available
Returned when Response = class of service failure. If a service class cannot be supported, this configuration setting is returned in place of the service class data. If this is received, the entire registration request is considered to have failed and must be repeated.
Vendor-Specific Data
As defined in Appendix C
* Vendor ID Configuration Setting (vendor ID of CMTS) * Vendor-specific extensions
Note: Note: Service class IDs MUST be those requested in the corresponding REG-REQ. The initialization SID MUST no longer be used once the REG-RSP is received.
78
Radio Frequency Interface Specification
SP-RFI-I03-980202
6.3.2.7.1
Encodings
The type values used MUST be those shown below. These are unique within the registration response message but not across the entire MAC message set. The type and length fields MUST each be 1 octet. 6.3.2.7.1.1 Modem Capabilities
This field defines the CMTS response to the modem capability field in the Registration Request. The CMTS responds to the modem capabilities to indicate whether they may be used. If the CMTS does not recognize a modem capability, it must return this as "off" in the Registration Response. Only capabilities set to "on" in the REG-REQ may be set "on" in the REG-RSP as this is the handshake indicating that they have been successfully negotiated. Encodings are as defined for the Registration Request. 6.3.2.7.1.2 Service Class Data
This encoding defines the parameters associated with a requested class of service. It is somewhat complex in that it is composed from a number of encapsulated type/length/value fields. The encapsulated fields define the particular class of service parameters for the class of service in question. Note that the type fields defined are only valid within the encapsulated service class data configuration setting string. A single service class data configuration setting MUST be used to define the parameters for a single service class. Multiple class definitions MUST use multiple service class data configuration setting sets. type 1 length n value encoded service class data
Internal service class data encodings Class ID The value of the field MUST specify the identifier for the class of service to which the encapsulated string applies. This MUST be a class which was requested in the associated REG-REQ. type 1 Valid Range The class ID MUST be in the range 1 to 16. Service ID The value of the field MUST specify the SID associated with this service class. type 2 6.3.2.7.2 length 2 value SID length 1 value from REG-REQ
Registration Response Encoding Example
An example of Registration Response encoding is given in Figure 6-28.
79
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Type 1 Type 1
Length 7 Length 7
Service class definition class 1 Service class definition class 2
Type 1 Type 6
Length 7 Length 6
Service class definition class n Modem capability
Figure 6-28. Example of Registration Response Encoding
6.3.2.7.3
Sample Service Class Data Encoding
Sample service class data encodings are provided in Table 6-18.
Table 6-18. Sample Service Class Data Encoding
VALUE (sub)type
Type 1 7
Length
Length
Value
Description service class data configuration setting
1 2 1 7 1 2 1 7 1 2
1 2
1 123
service class 1 SID for this class service class data configuration setting
1 2
2 244
service class 2 SID for this class service class data configuration setting
1 2
n 345
service class n SID for this class
6.3.2.8 Upstream Channel Change Request (UCC-REQ) An Upstream Channel Change Request MAY be transmitted by a CMTS to cause a CM to change the upstream channel on which it is transmitting. The format of an UCC-REQ message is shown in Figure 6-29.
80
Radio Frequency Interface Specification
SP-RFI-I03-980202
Bit
0
8
16
24
31
~ ~
Upstream channel ID
MAC Management Message Header
~ ~
Figure 6-29. Upstream Channel Change Request
Parameters MUST be as follows: Upstream channel ID The identifier of the upstream channel to which the CM is to switch for upstream transmissions. This is an 8-bit field.
6.3.2.9 Upstream Channel Change Response (UCC-RSP) An Upstream Channel Change Response MUST be transmitted by a CM in response to a received Upstream Channel Change Request message to indicate that it has received and is complying with the UCC-REQ. The format of an UCC-RSP message is shown in Figure 6-30. Before it begins to switch to a new upstream channel, a CM MUST transmit a UCC-RSP on its existing upstream channel. A CM MAY ignore an UCC-REQ message while it is in the process of performing a channel change. When a CM receives a UCC-REQ message requesting that it switch to an upstream channel that it is already using, the CM MUST respond with a UCC-RSP message on that channel indicating that it is already using the correct channel. To switch to a new upstream channel, a CM will begin a new ranging procedure for that channel, and upon completion of ranging will proceed without re-performing registration. The full procedure for changing channels is described in Section 7.2.16.
Bit
0
8
16
24
31
~ ~
Upstream channel ID
MAC Management Message Header
~ ~
Figure 6-30. Upstream Channel Change Response
Parameters MUST be as follows: Upstream channel ID The identifier of the upstream channel to which the CM is to switch for upstream transmissions. This is the same Channel ID specified in the UCCREQ message. This is an 8-bit field.
81
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
6.4 Upstream Bandwidth Allocation
The upstream channel is modeled as a stream of mini-slots. The CMTS MUST generate the time reference for identifying these slots. It MUST also control access to these slots by the cable modems. For example, it MAY grant some number of contiguous slots to a CM for it to transmit a data PDU. The CM MUST time its transmission so that the CMTS receives it in the time reference specified. This section describes the elements of protocol used in requesting, granting, and using upstream bandwidth. The basic mechanism for assigning bandwidth management is the allocation map. Please refer to Figure 6-31. The allocation map is a MAC Management message transmitted by the CMTS on the downstream channel which describes, for some interval, the uses to which the upstream mini-slots MUST be put. A given map MAY describe some slots as grants for particular stations to transmit data in, other slots as available for contention transmission, and other slots as an opportunity for new stations to join the link. Many different scheduling algorithms MAY be implemented in the CMTS by different vendors; this specification does not mandate a particular algorithm. Instead, it describes the protocol elements by which bandwidth is requested and granted.
Map PDU
transmitted on downstream channel by the CMTS
permitted use of the upstream channel
mini-slots
CM tx opportunity
request contention area
CM tx opportunity
maintenance
previous map
current map
as-yet unmapped time
Figure 6-31. Allocation Map
The bandwidth allocation MUST include the following basic elements:
* Each CM has one or more short (14-bit) service identifiers as well as a 48-bit address. * Upstream bandwidth is divided into a stream of mini-slots. Each mini-slot is numbered relative to a master
reference maintained by the CMTS. The clocking information is distributed to the CMs by means of SYNC packets.
* CMs MAY issue requests to the CMTS for upstream bandwidth.
82
Radio Frequency Interface Specification
SP-RFI-I03-980202
The CMTS MUST transmit allocation map PDUs on the downstream channel defining the allowed usage of each mini-slot. The map is described below. 6.4.1 The Allocation Map MAC Management Message
The allocation map is a varying-length MAC Management message that is transmitted by the CMTS to define transmission opportunities on the upstream channel. It includes a fixed-length header followed by a variable number of information elements (IEs) in the format shown in Section 6.3.2.3. Each information element defines the allowed usage for a range of mini-slots. Note that it should be understood by both CM and CMTS that the lower (26-M) bits of alloc start and ack times MUST be used as the effective MAP start and ack times, where M is defined in Section 6.3.2.2. The relationship between alloc start/ack time counters and the timestamp counter is further described in Section 6.5.4. 6.4.1.1 Information Elements Each IE consists of a 14-bit Service ID, a 4-bit type code, and a 14-bit starting offset as defined in Section 6.3.2.3. Since all stations MUST scan all IEs, it is critical that IEs be short and relatively fixed format. IEs within the map are strictly ordered by starting offset. For most purposes, the duration described by the IE is inferred by the difference between the IE's starting offset and that of the following IE. For this reason, a null IE MUST terminate the list. Refer to Table 6-16. Four types of Service IDs are defined: 1. 0x3FFF - broadcast, intended for all stations 2. 0x2000-0x3FFE - multicast, purpose is defined administratively. See Appendix A. 3. 0x0001-0x1FFF - unicast, intended for a particular CM or a particular service within that CM 4. 0x0000 - null address, addressed to no station. The types of information elements which MUST be supported are defined below. 6.4.1.1.1 The Request IE
The Request IE provides an upstream interval in which requests MAY be made for bandwidth for upstream data transmission. The character of this IE changes depending on the class of Service ID. If broadcast, this is an invitation for CMs to contend for requests. Section 6.4.4 describes which contention transmit opportunity may be used. If unicast, this is an invitation for a particular CM to request bandwidth. Unicasts MAY be used as part of a class-of-service implementation (see below). Packets transmitted in this interval MUST use the Request MAC Header format (see Section 6.2.5.3). 6.4.1.1.2 The Request/Data IE
The Request/Data IE provides an upstream interval in which requests for bandwidth or short data packets MAY be transmitted. This IE is distinguished from the Request IE in that:
* It provides a means by which allocation algorithms MAY provide for "immediate" data contention under
light loads, and a means by which this opportunity can be withdrawn as network loading increases.
* Multicast Service IDs MUST be used to specify maximum data length, as well as allowed random starting
points within the interval. For example, a particular multicast ID MAY specify a maximum of 64-byte data packets, with random starting points of every fourth slot.
83
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
A small number of well-known multicast Service IDs are defined in Appendix A. Others are available for vendor-specific algorithms. Since data packets transmitted within this interval may collide, the CMTS MUST acknowledge any that are successfully received. The data packet MUST indicate in the MAC Header that a data acknowledgment is desired (see Table 6-12). 6.4.1.1.3 The Initial Maintenance IE
The Initial Maintenance IE provides an interval in which new stations may join the network. A long interval, equivalent to the maximum round-trip propagation delay plus the transmission time of the Ranging Request (RNG-REQ) message (see Section 6.3.2.4), MUST be provided to allow new stations to perform initial ranging. Packets transmitted in this interval MUST use the RNG-REQ MAC Management message format (see Section 6.3.2.4). 6.4.1.1.4 The Station Maintenance IE
The Station Maintenance IE provides an interval in which stations are expected to perform some aspect of routine network maintenance, such as ranging or power adjustment. The CMTS MAY request that a particular CM perform some task related to network maintenance, such as periodic transmit power adjustment. In this case, the Station Maintenance IE is unicast to provide upstream bandwidth in which to perform this task. Packets transmitted in this interval MUST use the RNG-REQ MAC Management message format (see Section 6.3.2.4). 6.4.1.1.5 Short and Long Data Grant IEs
The Data Grant IE provides an opportunity for a CM to transmit one or more upstream PDUs. These IEs MAY also be used with an inferred length of zero mini slots (a zero length grant), to indicate that a request has been received and is pending (a Data Grant Pending). This IE is issued either in response to a request from a station, or because of an administrative policy providing some amount of bandwidth to a particular station (see class-ofservice discussion below). Short Data Grants are used with intervals less than or equal to the maximum burst size for this usage specified in the Upstream Channel Descriptor. If Short Data bursts are defined in the UCD, then all Long Data Grants MUST be for a larger number of mini-slots than the maximum for Short Data. The distinction between Long and Short Data Grants may be exploited in physical-layer forward-error-correction coding; otherwise, it is not meaningful to the bandwidth allocation process. If this IE is a Data Grant Pending (a zero length grant), it MUST follow all actual Data Grants (non-zero length grants). This allows cable modems to process all actual allocations first, before scanning the Map for request acknowledgements and data acknowledgements. 6.4.1.1.6 Data Acknowledge IE
The Data Acknowledge IE acknowledges that a data PDU was received. The CM MUST have requested this acknowledgment within the data PDU (normally this would be done for PDUs transmitted within a contention interval in order to detect collisions). This IE MUST follow all non-null-interval IEs. This allows cable modems to process all actual interval allocations first, before scanning the Map for request acknowledgments and data acknowledgments.
84
Radio Frequency Interface Specification
SP-RFI-I03-980202
6.4.1.1.7
Expansion IE
The Expansion IE provides for extensibility, if more than 16 code points or 32 bits are needed for future IEs. 6.4.1.1.8 Null IE
A Null IE terminates all actual allocations in the IE list. It is used to infer a length for the last interval. All data acknowledgments and all null data grants follow the Null IE. 6.4.1.2 Requests Only one type of upstream request is inherent to the allocation protocol: a request for upstream bandwidth. This request MAY be transmitted any time that either a request or a data PDU is allowed from the particular station. It MAY be transmitted during an interval described by any of:
* A Request IE * A Request/Data IE * A Data Grant IE.
In addition, it MAY be piggybacked1 on a data transmission. The request includes:
* The Service ID making the request * The number of mini-slots or ATM cells requested
The number of mini-slots requested MUST be the total number that are desired by the CM at the time of the request (including any physical layer overhead)2, subject to administrative limits3. The CM MUST request a number of mini-slots corresponding to one or more complete packets. A non-concatenating CM MUST request only the necessary mini-slots for one MAC frame per request. If, for whatever reason, a previous request has not been satisfied when the CM is making a new request, it MUST include the number of slots from the old request in the new total. Note that only one request at a time (per Service ID) will be outstanding. Because the CMTS MUST continue to issue null grants for as long as a request is unsatisfied, the CM is able to unambiguously determine when its request is still pending. Administrative limits MAY be assigned, either globally or per Service ID, on the number of mini-slots that MAY be requested at once. The global limit is configured as the maximum transmission burst size. 6.4.2 Map Transmission and Timing
The allocation map MUST be transmitted in time to propagate across the physical cable and be received and handled by the receiving CMs. As such, it MAY be transmitted considerably earlier than its effective time. The components of the delay are:
* Worst-case round-trip propagation delay--may be network-specific, but on the order of hundreds of microseconds.
* Queuing delays within the CMTS--implementation-specific.
1. When piggybacked, these values are carried in the Extended Header (Section 6.2.6, EH_TYPE = 1).
2. Physical layer overhead that MUST be accounted for in a request includes: guard band, preamble, and FEC which are dependent on the burst profile. 3. The CM is limited by the Maximum Transmit Burst for the service class, as defined in Appendix C.
85
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
* Processing delays within the CMs -- MUST allow a minimum processing time by each CM as specified in
Appendix B (CM MAP Processing Time).
* PMD-layer FEC interleaving.
Within these constraints, vendors MAY wish to minimize this delay so as to minimize latency of access to the upstream channel. The number of mini-slots described MAY vary from map to map. At minimum, a map MAY describe a single mini-slot. This would be wasteful in both downstream bandwidth and in processing time within the CMs. At maximum, a map MAY stretch to tens of milliseconds. Such a map would provide poor upstream latency. Allocation algorithms MAY vary the size of the maps over time to provide a balance of network utilization and latency under varying traffic loads. At minimum, a map MUST contain two Information Elements: one to describe an interval and a null IE to terminate the list. At a maximum, a map MUST be bounded by a limit of 240 information elements. Maps are also bounded in that they MUST NOT describe more than 4096 mini-slots into the future. The latter limit is intended to bound the number of future mini-slots that each CM is required to track. Even though several maps may be outstanding, the sum of the number of mini-slots they describe MUST NOT exceed 4096. The set of all maps, taken together, MUST describe every mini-slot in the upstream channel. If a CM fails to receive a map describing a particular interval, it MUST NOT transmit during that interval. Multiple maps MAY be outstanding at once. 6.4.3 Protocol Example
This section illustrates the interchange between the CM and the CMTS when the CM has data to transmit (Figure 6-32). Suppose a given CM has a data PDU available for transmission.
slots mapped by first Map PDU
second map
CMTS
t1
Map PDU
t3
t5 t6
Request
t7
Map PDU
t9
t 11
data PDU
CM
t2
t4
t8
t 10
Figure 6-32. Protocol Example
Description 1. At time t1, the CMTS transmits a map whose effective starting time is t3. Within this map is a Request IE which will start at t5. The difference between t1 and t3 is needed to allow for:
* downstream propagation delay (including FEC interleaving) to allow all CMs to receive the Map * processing time at the CM (allows the CMs to parse the Map and translate it into transmission
opportunities)
* upstream propagation delay (to allow the CM's transmission of the first upstream data to begin in
time to arrive at the CMTS at time t3).
86
Radio Frequency Interface Specification
SP-RFI-I03-980202
2. At t2, the CM receives this map and scans it for request opportunities. In order to minimize request collisions, it calculates t6 as a random offset based on the Data Backoff Start value in the most recent Map (see Section 6.4.4, also the multicast SID definitions in Appendix, Section A.2). 3. At t4, the CM transmits a request for as many mini-slots as needed to accommodate the PDU. Time t4 is chosen based on the ranging offset (see Section ) so that the request will arrive at the CMTS at t6. 4. At t6, the CMTS receives the request and schedules it for service in the next map. (The choice of which requests to grant will vary with the class of service requested, any competing requests, and the algorithm used by the CMTS.) 5. At t7, the CMTS transmits a map whose effective starting time is t9. Within this map, a data grant for the CM will start at t11. 6. At t8, the CM receives the map and scans for its data grant. 7. At t10, the CM transmits its data PDU so that it will arrive at the CMTS at t11. Time t10 is calculated from the ranging offset as in step 3. Steps 1 and 2 need not contribute to access latency if CMs routinely maintain a list of request opportunities. At Step 3, the request may collide with requests from other CMs and be lost. The CMTS does not directly detect the collision. The CM determines that a collision (or other reception failure) occurred when the next map fails to include acknowledgment of the request. The CM MUST then perform a back-off algorithm and retry. At Step 4, the CMTS scheduler MAY fail to accommodate the request within the next map. If so, it MUST reply with a zero-length grant in that map or discard the request by giving no grant at all. It MUST continue to report this zero-length grant in all succeeding maps until the request can be granted or is discarded. This MUST signal to the CM that the request is still pending. So long as the CM is receiving a zero-length grant, it MUST NOT issue new requests for that service queue. 6.4.4 Contention Resolution
The CMTS controls assignments on the upstream channel through the MAP and determines which mini-slots are subject to collisions. The CMTS MAY allow collisions on either Requests or Data PDUs. The mandatory method of contention resolution which MUST be supported is based on a truncated binary exponential back-off, with the initial back-off window and the maximum back-off window controlled by the CMTS. The values are specified as part of the Bandwidth Allocation Map (MAP) MAC message and represent a power-of-two value. For example, a value of 4 indicates a window between 0 and 15; a value of 10 indicates a window between 0 and 1023. When a CM has information to send and wants to enter the contention resolution process, it sets its internal backoff window equal to the Data Backoff Start defined in the MAP currently in effect. The CM MUST randomly select a number within its back-off window. This random value indicates the number of contention transmit opportunities which the CM MUST defer before transmitting. A CM MUST only consider contention transmit opportunities for which this transmission would have been eligible. These are defined by either Request IEs or Request/Data IEs in the MAP. Note: Each IE can represent multiple transmission opportunities. As an example, consider a CM whose initial back-off window is 0 to 15 and it randomly selects the number 11. The CM must defer a total of 11 contention transmission opportunities. If the first available Request IE is for 6 requests, the CM does not use this and has 5 more opportunities to defer. If the next Request IE is for 2 requests,
87
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
the CM has 3 more to defer. If the third Request IE is for 8 requests, the CM transmits on the fourth request, after deferring for 3 more opportunities. After a contention transmission, the CM waits for a Data Grant (Data Grant Pending) or Acknowledgment in a subsequent MAP. Once either is received, the contention resolution is complete. The CM determines that the contention transmission was lost when it finds a MAP without a Data Grant (Data Grant Pending) or Acknowledgment for it and with an Ack time more recent than the time of transmission. The CM MUST now increase its back-off window by a factor of two, as long as it is less than the maximum back-off window. The CM MUST randomly select a number within its new back-off window and repeat the deferring process described above. This re-try process continues until the maximum number of retries (16) has been reached, at which time the PDU MUST be discarded. Note: The maximum number of retries is independent of the initial and maximum back-off windows that are defined by the CMTS. If the CM receives a unicast Request or Data Grant at any time while deferring for this SID, it MUST stop the contention resolution process and use the explicit transmit opportunity. The CMTS has much flexibility in controlling the contention resolution. At one extreme, the CMTS MAY choose to set up the Data Backoff Start and End to emulate an Ethernet-style back-off with its associated simplicity and distributed nature, but also its fairness and efficiency issues. This would be done by setting initial = 0 and max = 10 in the MAP. At the other end, the CMTS MAY make the Data Backoff Start and End identical and frequently update these values in the MAP so all cable modems are using the same, and hopefully optimal, back-off window. A Transmit Opportunity is defined as any mini-slot in which a CM may be allowed to start a transmission. Transmit Opportunities typically apply to contention opportunities and are used to calculate the proper amount to defer in the contention resolution process. The number of Transmit Opportunities associated with a particular IE in a MAP is dependent on the total size of the region as well as the allowable size of an individual transmission. As an example, assume a REQ IE defines a region of 12 mini-slots. If the UCD defines a REQ that fits into a single mini-slot then there are 12 Transmit Opportunities associated with this REQ IE, i.e., one for each mini-slot. If the UCD defines a REQ that fits in two mini-slots, then there are six Transmit Opportunities and a REQ can start on every other mini-slot. As another example, assume a REQ/Data IE that defines a 24 mini-slot region. If it is sent with an SID of 0x3FF4 (see Appendix A), then a CM can potentially start a transmit on every fourth mini-slot; so this IE contains a total of six Transmit Opportunities (TX OP). Similiarly, a SID of 0x3FF6 implies four TX OPs; 0x3FF8 implies three TX OPs; and 0x3FFC implies two TX OPs. For an Initial Maintenance IE, a CM MUST start its transmission in the first mini-slot of the region; therefore it has a single Transmit Opportunity. The remainder of the region is used to compensate for the round trip delays since the CM has not yet been ranged. Station Maintenance, Short and Long Data Grant IEs are specified for unicast and thus are NOT typically associated with contention Transmit Opportunities. They represent a single dedicated, or reservation based, Transmit Opportunity.
88
Radio Frequency Interface Specification
SP-RFI-I03-980202
In summary:
Table 6-19. Transmit Opportunity
Interval Request Request Request/Data Request/Data Request/Data Initial Maint. Initial Maint. SID Type Broadcast Multicast Broadcast Well-known Multicast Multicast Broadcast Multicast Transmit Opportunity # minislots required for a Request # minislots required for a Request Not allowed As defined by SID in Appendix A Vendor specific algorithms Entire interval is a single tx opp. Entire interval is a single tx opp.
6.4.5
CM Behavior
The following rules govern the response a CM may make when processing maps: 1. A CM MUST first use any Grants assigned to it. Next, the CM MUST use any unicast REQ for it. Finally, the CM MUST use then next available broadcast/multicast REQ or REQ/Data IEs for which it is eligible. 2. Only one Request may be outstanding at a time for a particular Service ID. 3. If a CM has a Request pending, it MUST NOT use intervening contention intervals for that Service ID. 6.4.6 Support for Multiple Channels
Vendors MAY choose to offer various combinations of upstream and downstream channels within one MAC service access point. The upstream bandwidth allocation protocol allows for multiple upstream channels to be managed via one or many downstream channels. If multiple upstream channels are associated with a single downstream channel, then the CMTS MUST send one allocation map per upstream channel. The map's channel identifier, taken with the Upstream Channel Descriptor Message (see Section 6.3.2.2), MUST specify to which channel each map applies. There is no requirement that the maps be synchronized across channels. Appendix G provides an example. If multiple downstream channels are associated with a single upstream channel, the CMTS MUST ensure that the allocation map reaches all CMs. That is, if some CMs are attached to a particular downstream channel, then the map MUST be transmitted on that channel. This MAY necessitate that multiple copies of the same map be transmitted. The slot reference in the map header MUST always relate to the SYNC reference on the downstream channel on which it is transmitted. If multiple downstream channels are associated with multiple upstream channels, the CMTS MAY need to transmit multiple copies of multiple maps to ensure both that all upstream channels are mapped and that all CMs have received their needed maps. 6.4.7 Classes of Service
This specification does not provide explicit classes of service, but provides the means for vendors to provide a variety of types of service. This section illustrates how the available mechanisms can be used to provide support for the service classes defined in [RFC-1633] "Integrated Services in the Internet Architecture: An Overview".
89
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
[RFC-1633] divides applications into elastic applications which will always wait for data to arrive and inelastic applications in which the data must arrive within a certain time to be useful. Within the inelastic category further sub divisions can be defined:
* delay-intolerant--the data must arrive within a perfectly reliable upper bound on delay * delay-tolerant--the data must arrive within a fairly reliable but not perfectly reliable delay bound.
Within the elastic category the following application types can be distinguished:
* interactive burst * interactive bulk
The service model should be able to support both types of inelastic application and to allow for lower delays for interactive elastic applications than for bulk elastic applications. Inelastic Delay-Intolerant--The CMTS provides a Data Grant of fixed size to a configured Service ID once every N mini-slots. This Service ID MAY be assigned to all traffic for a CM, or it MAY only be used for this particular service within the CM. Inelastic Delay-Tolerant--The CMTS periodically provides a unicast Request IE to a configured Service ID. It then grants the request based on the negotiated delay variation, bandwidth, and other considerations. The CM has guaranteed access in which to make requests, and the CMTS's scheduling algorithm provides the negotiated service. As an alternative, the minimum data rate of the service negotiation MAY be provided in the same way that inelastic delay-intolerant traffic is handled. Elastic Application Support--is provided by a contention/FIFO service strategy, in which CMs contend for request slots, and the CMTS services requests as they arrive. Service priorities can allow differential delays between interactive and bulk applications. 6.4.7.1 Resource-Sharing In order to support multiple end systems sharing the same upstream and downstream links, it is necessary to provide resource-sharing mechanisms for the link bandwidth. The following are some examples of this: Link-usage feedback is provided implicitly by contention and by the CMTS's scheduling algorithm, so no explicit congestion notifications are needed. Guaranteed Minimum Bit Rate can be provided in much the same manner as inelastic delay-tolerant application support. Guaranteed Maximum Bit Rate MAY be provided by a number of implementation mechanisms, including the CMTS's allocation algorithm and throttling within the CM. Service Priorities MUST be implemented by applying different service criteria to different Service IDs. It is anticipated that a particular CM MAY have several Service IDs, each corresponding to a particular service class. The particular services offered MAY vary from vendor to vendor. Contention that is limited to a service class MAY be accomplished with multicast Request IEs and Request/Data IEs. Creation of such multicast groups is vendor-specific.
90
Radio Frequency Interface Specification
SP-RFI-I03-980202
6.5 Timing and Synchronization
One of the major challenges in designing a MAC protocol for a cable network is compensating for the large delays involved. These delays are an order of magnitude larger than the transmission burst time in the upstream. To compensate for these delays, the cable modem MUST be able to time its transmissions precisely to arrive at the CMTS at the start of the assigned mini-slot. To accomplish this, two pieces of information are needed by each cable modem:
* a global timing reference sent downstream from the CMTS to all cable modems. * a timing offset, calculated during a ranging process, for each cable modem.
6.5.1 Global Timing Reference
The CMTS MUST create a global timing reference by transmitting the Time Synchronization (SYNC) MAC management message downstream at a nominal frequency. The message contains a timestamp that exactly identifies when the CMTS transmitted the message. Cable modems MUST then compare the actual time the message was received with the timestamp and adjust their local clock references accordingly. The Transmission Convergence sublayer must operate closely with the MAC sublayer to provide an accurate timestamp for the SYNC message. As mentioned in the Ranging section below (Section 6.5.3), the model assumes that the timing delays through the remainder of the PHY layer MUST be relatively constant. Any variation in the PHY delays MUST be accounted for in the guard time of the PHY overhead. It is intended that the nominal interval between SYNC messages be tens of milliseconds. This imposes very little downstream overhead while letting cable modems acquire their global timing synchronization quickly. 6.5.2 CM Channel Acquisition
Any cable modem MUST NOT use the upstream channel until it has successfully synchronized to the downstream. First, the cable modem MUST establish PMD sublayer synchronization. This implies that it has locked onto the correct frequency, equalized the downstream channel, recovered any PMD sublayer framing and the FEC is operational (refer to Section 7.2.2). At this point, a valid bit stream is being sent to the transmission convergence sublayer. The transmission convergence sublayer performs its own synchronization (see Section 5). On detecting the well-known MCNS PID, along with a payload unit start indicator per [ITU-T H.222.0], it delivers the MAC frame to the MAC sublayer. The MAC sublayer MUST now search for the Timing Synchronization (SYNC) MAC management messages. The cable modem achieves MAC synchronization once it has received at least two SYNC messages and has verified that its clock tolerances are within specified limits. A cable modem remains in "SYNC" as long as it continues to successfully receive the SYNC messages. If the Lost SYNC Interval (see Appendix B) has elapsed without a valid SYNC message, a cable modem MUST NOT use the upstream and MUST try to re-establish synchronization again. 6.5.3 Ranging
Ranging is the process of acquiring the correct timing offset such that the cable modem's transmissions are aligned to the correct mini-slot boundary. The timing delays through the PHY layer MUST be relatively
91
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
constant. Any variation in the PHY delays MUST be accounted for in the guard time of the upstream PMD overhead. First, a cable modem MUST synchronize to the downstream and learn the upstream channel characteristics through the Upstream Channel Descriptor MAC management message. At this point, the cable modem MUST scan the Bandwidth Allocation MAP message to find an Initial Maintenance Region. Refer to Section 6.4.1.1.4. The CMTS MUST make an Initial Maintenance region large enough to account for the variation in delays between any two CMs. The cable modem MUST put together a Ranging Request message to be sent in an Initial Maintenance region. The SID field MUST be set to the non-initialized CM value (zero). Ranging adjusts each CM's timing offset such that it appears to be located right next to the CMTS. The CM MUST set its initial timing offset to the amount of internal fixed delay equivalent to putting this CM next to the CMTS. This amount includes delays introduced through a particular implementation, and MUST include the downstream PHY interleaving latency. When the Initial Maintenance transmit opportunity occurs, the cable modem MUST send the Ranging Request message. Thus, the cable modem sends the message as if it was physically right at the CMTS. Once the CMTS has successfully received the Ranging Request message, it MUST return a Ranging Response message addressed to the individual cable modem. Within the Ranging Response message MUST be a temporary SID assigned to this cable modem until it has completed the registration process. The message MUST also contain information on RF power level adjustment and offset frequency adjustment as well as any timing offset corrections. The cable modem MUST now wait for an individual Station Maintenance region assigned to its temporary SID. It MUST now transmit a Ranging Request message at this time using the temporary SID along with any power level and timing offset corrections. The CMTS MUST return another Ranging Response message to the cable modem with any additional fine tuning required. The ranging request/response steps MUST be repeated until the response contains a Ranging Successful notification. At this point, the cable modem MUST join normal data traffic in the upstream. See Section 7 for complete details on the entire initialization sequence. In particular, state machines and the applicability of retry counts and timer values for the ranging process are defined in Section 7.2.5.
Note: The burst type to use for any transmission is defined by the Interval Usage Code (IUC). Each IUC is mapped to a burst type in the UCD message.
6.5.4
Timing Units and Relationships
The SYNC message conveys a time reference that is measured in 6.25-microsecond ticks. Additional resolution of 6.25/64 microseconds is also present in the SYNC message to allow the CM to track the CMTS clock with a small phase offset. These units were chosen as the greatest-common-divisor of the upstream mini-slot time across various modulations and symbol rates. As this is decoupled from particular upstream channel characteristics, a single SYNC time reference may be used for all upstream channels associated with the downstream channel. The bandwidth allocation MAP uses time units of "mini-slots." A mini-slot represents the byte-time needed for transmission of a fixed number of bytes. The mini-slot is expected to represent 16 byte-times, although other values could be chosen. The size of the mini-slot, expressed as a multiple of the SYNC time reference, is carried in the Upstream Channel Descriptor. The example in Table 6-20 relates mini-slots to the SYNC time ticks:
92
Radio Frequency Interface Specification
SP-RFI-I03-980202
Table 6-20. Example Relating Mini-Slots to Time Ticks
Parameter Time tick Bytes per mini-slot Symbols/byte Symbols/second Mini-slots/second Microseconds/mini-slot Ticks/mini-slot Example Value 6.25 microseconds 16 (nominal, when using QPSK modulation) 4 (assuming QPSK) 2,560,000 40,000 25 4
The reader is encouraged to try other symbol rates and modulations. Note that the symbols/byte is a characteristic of an individual burst transmission, not of the channel. A mini-slot in this instance could represent either 16 or 32 bytes, depending on the modulation choice. A "mini-slot" is the unit of granularity for upstream transmission opportunities. There is no implication that any PDU can actually be transmitted in a single mini-slot. The MAP counts mini-slots in a 32-bit counter that normally counts to (2 32 - 1) and then wraps back to zero. The least-significant bits (i.e., bit 0 to bit 25-M) of the mini-slot counter MUST match the most-significant bits (i.e., bit 6+M to bit 31) of the SYNC timestamp counter. That is, mini-slot N begins at timestamp reference (N*T*64), where T = 2M is the UCD multiplier that defines the mini-slot (i.e., the number of timeticks per minislot). Note: The unused upper bits of the 32-bit mini-slot counter (i.e., bit 26-M to bit 31) are not needed by the CM and MAY be ignored. Note that the constraint that the UCD multiplier be a power of two has the consequence that the number of bytes per mini-slot must also be a power of two.
6.6 Data Link Encryption Support
The procedures to support data link encryption are defined in [MCNS2], [MCNS7], and [MCNS8]. The interaction between the MAC layer and the security system is limited to the items defined below. 6.6.1 MAC Messages
MAC Management Messages (Section 6.3) MUST NOT be encrypted. 6.6.2 Framing
The following rules MUST be followed when the encryption is applied to the frame:
* Security specific header (Security Header of [MCNS2] or Privacy EH element of [MCNS8]) MUST be in the
extended header and MUST be the first EH element of the Extended Header field (EHDR).
* Encrypted data is carried as Data PDU to the Cable MAC transparently. * When Security System Specification [MCNS2] is applied, Data PDU MUST be encrypted and decrypted
using the mechanism defined in Section 6.6.2.1.
93
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
6.6.2.1 Example of Security System Encryption This example is defined for a frame received by a CM at the CMCI and transferred over the cable network to the CMTS and forwarded via an Ethernet based NSI. For frames traveling in the NSI-to-CMCI direction, the roles of CM and CMTS are reversed. 6.6.2.1.1 CMCI to RF
Please refer to Figure 6-33.
1. 2. 3. DA DA DA SA SA SA
Type/Len Type/Len Type/Len
Encrypted
User Data User Data User Data
CRC
4.
DA
SA
Type/Len
Encrypted
User Data
CRC
5.
MAC Header
DA
SA
Type/Len
Encrypted
User Data
CRC
Figure 6-33. Example of Security Framing at the CM
1. CM receives frame from Ethernet 2. Check and discard Ethernet CRC 3. Encrypt payload (DA, SA, Type/Len and User_Data) 4. Calculate new CRC over encrypted payload 5. Add MAC_Header including security header as the first EH element of the Extended Header field (EHDR) 6.6.2.1.2 RF to CMTS-NSI
Please refer to Figure 6-34.
1.
MAC Header
DA
SA
Type/Len
Encrypted
User Data
CRC
2.
DA
SA
Type/Len
Encrypted
User Data
CRC
3.
DA
SA
Type/Len
Encrypted
User Data
4. 5.
DA DA
SA SA
Type/Len Type/Len
User Data User Data
CRC
Figure 6-34. Example of Security Framing at the CMTS
94
Radio Frequency Interface Specification
SP-RFI-I03-980202
1. Receive frame from RF interface 2. Check and discard MAC Header including security header 3. Check and discard CRC 4. Decrypt Payload 5. Recalculate CRC and forward frame to CMTS-NSI
95
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
This page intentionally left blank.
96
Radio Frequency Interface Specification
SP-RFI-I03-980202
7 Cable Modem - CMTS Interaction
This section covers key requirements for interaction between the cable modem and CMTS. The interaction can be broken down into five basic categories: modem initialization, authentication, configuration, authorization, and signaling.
7.1 CMTS Initialization
The mechanism utilized for CMTS initialization (local terminal, file download, SNMP, etc.) is described in [MCNS5]. It MUST meet the following criteria for system interoperability.
* The CMTS MUST be able to reboot and operate in a stand-alone mode using configuration data retained in
non-volatile storage.
* If valid parameters are not available from non-volatile storage or via another mechanism such as the Spectrum Management System (see [SMS]), the CMTS MUST not generate any downstream messages (including SYNC). This will prevent CMs from transmitting.
* The CMTS MUST provide the information defined in Section 6 to CMs for each upstream channel.
7.2 Cable Modem Initialization
The procedure for initialization of a cable modem MUST be as shown in Figure 7-1. This figure shows the overall flow between the stages of initialization in a CM. This shows no error paths, and is simply to provide an overview of the process. The more detailed finite state machine representations of the individual sections (including error paths) are shown in the subsequent figures. Timeout values are defined in Appendix B. The procedure can be divided into the following phases:
* * * * * * * * *
Removable Security Module (RSM) Detection Scan for downstream channel and establish synchronization with the CMTS. Obtain transmit parameters (from UCD message) Perform ranging Establish IP connectivity Establish time of day Establish Security Association (if RSM is present) Transfer operational parameters Baseline Privacy initialization (if RSM is not present AND CM is provisioned to run Baseline Privacy)
Each CM contains the following information when shipped from the manufacturer:
* A unique IEEE 802 48-bit MAC address which is assigned during the manufacturing process. This is used to
identify the modem to the various provisioning servers during initialization.
* Security information as defined in [MCNS2 and MCNS8] (e.g., X.509 certificate) used to authenticate the
CM to the security server and authenticate the responses from the security and provisioning servers. The SDL (Specification and Description Language) notation used in the following figures is shown in Figure 7-2 (refer to ITU-T Recommendation Z.100 [ITU-T Z.100]).
97
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Section 7.2.1
RSM Detection No RSM Detection Complete RSM Present? Yes
Section 7.2.2
Scan for Downstream Channel
Establish Security
Section 7.2.8
Downstream Sync Established
Security Established
Section 7.2.3
Obtain Upstream Parameters
Transfer Operational Parameters
Section 7.2.9
Upstream Parameters Aquired
Transfer Complete
Section 7.2.5
Ranging & Automatic Adjustments
Register with CMTS
Section 7.2.10
Ranging & Auto Adj Complete
Registration Complete
No
Section 7.2.6
Establish IP Connectivety
*1
*1:
RSM not present and Baseline Privacy enabled
Yes
IP Complete
Baseline Privacy Initialization
Section 7.2.11
Section 7.2.7
Establish Time of Day
Baseline Privacy Initialized
Time of Day Established
Operational
Figure 7-1. CM Initialization Overview
98
Radio Frequency Interface Specification
SP-RFI-I03-980202
State symbol
Input symbols
Internal
External
Task symbol
Internal Output symbols External
Decision symbol
Figure 7-2. SDL Notation
7.2.1
RSM Detection
When a CM is turned on, the CM determines whether Removable Security Module (RSM) is present in RSM slot or not as defined in [MCNS7]. 7.2.2 Scanning and Synchronization to Downstream
On initialization or after signal loss, the cable modem MUST acquire a downstream channel. The CM MUST have non-volatile storage in which the last operational parameters are stored and MUST first try to re-acquire this downstream channel. If this fails, it MUST begin to continuously scan the 6-MHz channels of the downstream frequency band of operation until it finds a valid downstream signal. A downstream signal is considered to be valid when the modem has achieved the following steps:
* * * *
synchronization of the QAM symbol timing synchronization of the FEC framing synchronization of the MPEG packetization recognition of SYNC downstream MAC messages
While scanning, it is desirable to give an indication to the user that the CM is doing so.
99
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
7.2.3
Obtain Upstream Parameters
Refer to Figure 7-3. After synchronization, the CM MUST wait for an upstream channel descriptor message (UCD) from the CMTS in order to retrieve transmission parameters for the upstream channel. These messages are transmitted periodically from the CMTS for all available upstream channels and are addressed to the MAC broadcast address. The CM MUST determine whether it can use the upstream channel from the channel description parameters. If the channel is not suitable, then the CM MUST wait for a channel description message for a channel which it can use. If no channel can be found after a suitable timeout period, then the CM MUST continue scanning to find another downstream channel. When the cable modem finds an upstream channel with acceptable transmission parameters, it MUST extract the parameters for this upstream from the UCD. It then MUST wait for the next SYNC message1 and extract the upstream mini-slot timestamp from this message. The CM then MUST wait for a bandwidth allocation map for the selected channel. It MAY then begin transmitting upstream in accordance with the MAC operation and the bandwidth allocation mechanism.
1. Alternatively, since the SYNC message applies to all upstream channels, the CM may have already acquired a time reference from previous SYNC messages. If so, it need not wait for a new SYNC.
100
Radio Frequency Interface Specification
SP-RFI-I03-980202
It is desirable to give an indication to the user that the CM has finished searching and has detected a valid downstream signal and upstream channel.
Wait for usable UCD
Timeout T1
Good upstream descriptor
Scanning
Wait for SYNC
Sync
Extract upstream mini-slot Timing Wait for map for this channel Map for selected channel
Ranging
Figure 7-3. Obtaining Upstream Parameters
7.2.4
Message Flows During Scanning and Upstream Parameter Acquisition
The CMTS MUST generate SYNC and UCD messages on the downstream at periodic intervals within the ranges defined in Section 6. These messages are addressed to all CMs. Refer to Figure 7-4.
101
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
CMTS clock time to send SYNC clock time to send UCD clock time to send SYNC ----------------SYNC--------------------> ----------------UCD----------------------> ----------------SYNC-------------------->
CM | | | | | Example of a UCD cycle | prior to CM power-on |
clock time to send SYNC
----------------SYNC-------------------->
| | | |
clock time to send SYNC
----------------SYNC-------------------->
| | |
clock time to send SYNC clock time to send UCD
----------------SYNC--------------------> ----------------UCD---------------------->
clock time to send SYNC
----------------SYNC--------------------> power on sequence complete
clock time to send SYNC
----------------SYNC--------------------> establish PHY synchronization & wait for UCD
clock time to send SYNC
----------------SYNC-------------------->
clock time to send SYNC clock time to send UCD
----------------SYNC--------------------> ----------------UCD----------------------> obtain parameters for this upstream channel to use for initialization
clock time to send SYNC
----------------SYNC--------------------> extract slot info for upstream & wait for transmit opportunity to perform ranging
clock time to send SYNC clock time to send MAP
----------------SYNC--------------------> ----------------MAP----------------------> start ranging process
Figure 7-4. Message Flows During Scanning and Upstream Parameter Acquisition
102
Radio Frequency Interface Specification
SP-RFI-I03-980202
7.2.5
Ranging and Automatic Adjustments
The ranging and adjustment process is fully defined in Section 6 and in the following sections. The message sequence chart and the finite state machines on the following pages define the ranging and adjustment process which MUST be followed by compliant CMs and CMTSs. Refer to Figure 7-5 through Figure 7-8.
Note: MAPs are transmitted as described in Section 6. CM
CMTS [time to send the Initial Maintenance opportunity] send map containing Initial Maintenance information element with a broadcast/multicast Service ID -----------MAP------------>
<---------RNG-REQ-------
transmit ranging packet in contention mode with Service ID parameter = 0
[receive recognizable ranging packet] allocate temporary Service ID send ranging response add temporary Service ID to poll list ----------RNG-RSP-------> store temporary Service ID & adjust other parameters
[time to send the next map] send map with Station Maintenance information element to modem using temporary SID send ranging response [time to send an Initial Maintenance opportunity] send map containing Initial Maintenance information element with a broadcast/multicast Service ID send periodic transmit opportunity to broadcast address ------------MAP-----------> -----------MAP------------> recognize own temporary Service ID in map
<---------RNG-REQ----------------RNG-RSP------->
reply to Station Maintenance opportunity poll adjust local parameters
Figure 7-5. Ranging and Automatic Adjustments Procedure
Note: The CMTS MUST allow the CM sufficient time to have processed the previous RNG-RSP (i.e., to modify the transmitter parameters) before sending the CM a specific ranging opportunity. This is defined as CM Ranging Response Time in Appendix B.
103
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Wait for Initial Maintenance opportunity
Time out T2
Map with maintenance opportunity
Error Re-initialize MAC
Send RNG-REQ
Wait for RNG-RSP
Time out T3
RNG-RSP
Y
Retries exhausted ?
N
Adjust local parameters per RNG-RSP
Error Re-initialize MAC
Adjust local power
Wait for Station Maintenance opportunity
Random backoff (Note)
Wait for Initial Maintenance opportunity
Note: Timeout T3 may occur because the RNG-REQs from multiple modems collided. To avoid these modems repeating the loop in lockstep, a random backoff is required. This is a backoff over the ranging window specified in the MAP.
Figure 7-6. Initial Ranging - CM
104
Radio Frequency Interface Specification
SP-RFI-I03-980202
Wait for Station Maintenance opportunity
Timeout T4
Map with Maintenance opportunity
Error: Re-initialize MAC
Send RNG-REQ
Wait for RNG-RSP
Timeout T3
RNG-RSP
Yes Retries Exhausted?
Adjust local parameters per RNG-RSP
No
Success set from CMTS? (Note 1) No No
Yes
Error: Re-initialize MAC
Adjust local power
Enable data transfer
Abort Ranging set from CMTS? Establish IP layer Yes Error: Re-initialize MAC
Wait for Station Maintenance opportunity
Note:
Ranging Request is within the tolerance of the CMTS.
Figure 7-7. Initial Ranging - CM (continued)
105
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Wait for recognizable RNG-REQ
RNG-REQ
No SID assigned to this CM already? Yes Reset retry count in poll list for this CM Assign temporary SID
Add CM to poll list for future maps
Send RNGRSP
Map will be sent per allocation algorithm and pending till complete. (Note 2)
Wait for polled RNG-REQ
RNG-REQ not received RNG-REQ
No Retries Exhausted? No Yes
Good Enough? (Note 1)
Yes
Retries Exhausted? Yes Send RNG-RSP (abort) No Send RNG-RSP (continue)
Send RNG-RSP (success)
Remove CM from poll list
Remove CM from poll list
Wait for recognizable RNG-REQ
Wait for polled RNG-REQ
Done
1. 2.
Means ranging is within the tolerable limits of the CMTS. RNG-REQ pending-till-complete was nonzero, the CMTS SHOULD hold off the station maintenance opportunity accordingly unless needed, for example, to adjust the CM's power level. If opportunities are offered prior to the pending-tillcomplete expiry, the "good-enough" test which follows receiptof a RNG-RSP MUST NOT judge the CM's transmit equalization until pending-till-complete expires.
Figure 7-8. Initial Ranging - CMTS
106
Radio Frequency Interface Specification
SP-RFI-I03-980202
7.2.5.1 Ranging Parameter Adjustment Adjustment of local parameters (e.g., transmit power) in a CM as a result of the receipt (or non-receipt) of an RNG-RSP is considered to be implementation-dependent with the following restrictions (refer to Section 6.2.7):
* All parameters MUST be within the approved range at all times * Power adjustment MUST start from the minimum value unless a valid power is available from non-volatile
storage, in which case this MUST be used as a starting point.
* Power adjustment MUST be capable of being reduced or increased by the specified amount in response to
RNG-RSP messages.
* If power is adjusted to the maximum value it MUST wrap back to the minimum.
7.2.5.2 Periodic Ranging The CMTS MUST provide each CM a Periodic Ranging opportunity at least once every T4 seconds. The CMTS MUST send out Periodic Ranging opportunities at an interval sufficiently shorter than T4 that a MAP could be missed without the CM timing out. The size of this "subinterval" is CMTS dependent. The CM MUST reinitialize its MAC layer after T4 seconds have elapsed without receiving a Periodic Ranging opportunity. 7.2.6 Establish IP Connectivity
At this point, the CM MUST invoke DHCP mechanisms [RFC-1541] in order to obtain an IP address and any other parameters needed to establish IP connectivity (see Appendix C). The DHCP response MUST contain the name of a file which contains further configuration parameters. Refer to Figure 7-9.
CM send DHCP request to broadcast address ----------------DHCP discover------------>
DHCP
check CM MAC address & respond <--------------DHCP offer ----------------choose server ----------------DHCP request--------------> process request <--------------DHCP response-------------set up IP parameters from DHCP response
Figure 7-9. Establishing IP Connectivity
7.2.7
Establish Time of Day
The CM and CMTS need to have the current date and time. This need not be authenticated and need only be accurate to the nearest second [MCNS2]. This is required for :
107
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
* Time-stamping logged events which can be retrieved by the management system * Key management by the security system.
The protocol by which the time of day is retrieved will be as defined in [RFC-868]. Refer to Figure 7-10. The request and response will be transferred using UDP. The time retrieved from the server (UTC) will be combined with the time offset received from the DHCP response to create the current local time.
CM send request to time server ----------------time of day request------------>
Time Server
process request <--------------time of day response-------------set up / correct time of day from response
Figure 7-10. Establishing Time of Day
7.2.8
Establish Security Association
If the RSM module is detected and no security association has been established, the CM MUST establish a security association at this point. The IP address of the security server (or servers) MUST be provided as part of the DHCP response. The procedures required are fully defined in [MCNS2]. 7.2.9 Transfer Operational Parameters
After the DHCP and security association operations are successful, the modem MUST download the parameter file using TFTP, as shown in Figure 7-11. The TFTP configuration parameter server is specified by the "siaddr" field of the DHCP response. The parameter fields required in the DHCP response and the format and content of the configuration file MUST be as defined in Appendix C. Note that these fields are the minimum required for interoperability. 7.2.10 Registration A CM MUST be authorized to forward traffic into the network once it is initialized, authenticated and configured. Refer to Figure 7-11. The configuration parameters downloaded to the CM MUST include a network access control object (see Appendix C Section C.8.5). If this is set to "no forwarding", the CM MUST not forward data to the network. It MUST respond to network management requests. This allows the CM to be configured in a mode in which it is manageable but will not forward data. The CM MUST forward the operational parameters to the CMTS as part of a registration request. The CMTS MUST perform the following operations to confirm the CM authorization:
* Check the MAC and the authentication signature on the parameter list
108
Radio Frequency Interface Specification
SP-RFI-I03-980202
* Build a profile for the modem based on the standard configuration settings (see Appendix C) * Assign a Service ID based on the classes of service supported * Reply to the modem registration request.
Vendor-specific configuration settings MUST be ignored (except for inclusion in message authorization code calculation).
CM
CMTS
TFTP Server
request parameter file -----------------------<----------------------set up operational parameters inform CMTS ---REG-REQ--> provision modem <---REG-RSP-set up Service IDs ----TFTP REQ------- TFTP RSP----------------------> process request --------------------
Figure 7-11. Transferring Operational Parameters and Registration
7.2.11 Baseline Privacy Initialization Following registration, if the RSM module is NOT detected and the CM is provisioned to run Baseline Privacy, the CM MUST initialize Baseline Privacy operations, as described in [MCNS8]. A CM is provisioned to run Baseline Privacy if its configuration file includes a Baseline Privacy Configuration Setting. 7.2.12 Service IDs During CM Initialization After completion of the Registration process (Section 7.2.10), the CM will have been assigned Service IDs (SIDs) to match its class of service provisioning. However, the CM must complete a number of protocol transactions prior to that time (e.g., Ranging, DHCP, etc.), and requires a temporary Service ID in order to complete those steps. On reception of an Initial Ranging Request, the CMTS MUST allocate a temporary SID and assign it to the CM for initialization use. The CMTS MAY monitor use of this SID and restrict traffic to that needed for initialization. It MUST inform the CM of this assignment in the Ranging Response. On receiving a Ranging Response addressed to it, the CM MUST use the assigned temporary SID for further initialization transmission requests until the Registration Response is received. On receiving a Ranging Response instruction to move to a new downstream frequency and/or upstream channel ID, the CM MUST consider any previously assigned temporary SID to be deassigned, and must obtain a new temporary SID via initial ranging. It is possible that the Ranging Response may be lost after transmission by the CMTS. The CM MUST recover by timing out and re-issuing its Initial Ranging Request. Since the CM is uniquely identified by the source MAC address in the Ranging Request, the CMTS MAY immediately re-use the temporary SID previously assigned. If
109
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
the CMTS assigns a new temporary SID, it MUST make some provision for aging out the old SID that went unused (see Section 6.3.2.7). When assigning class-of-service-provisioned SIDs on receiving a Registration Request, the CMTS may re-use the temporary SID, assigning it to one of the class of service classes requested. If so, it MUST continue to allow initialization messages on that SID, since the Registration Response could be lost in transit. If the CMTS assigns all-new SIDs for class-of-service provisioning, it MUST age out the temporary SID. The aging-out MUST allow sufficient time to complete the registration process in case the Registration Response is lost in transit. 7.2.13 Multiple-Channel Support In the event that more than one downstream signal is present in the system, the CM MUST operate using the first valid downstream signal that it encounters when scanning. It will be instructed via the parameters in the configuration file (see Appendix C) to shift operation to different downstream and/or upstream frequencies if necessary. Both upstream and downstream channels MUST be identified where required in MAC management messages using channel identifiers. 7.2.14 Remote RF Signal Level Adjustment RF signal level adjustment at the CM is performed through a periodic maintenance function using the RNG-REQ and RNG-RSP MAC messages. This is similar to initial ranging and is shown in Figure 7-12 and Figure 7-13. On receiving a RNG-RSP, the CM MUST NOT transmit until the RF signal has been adjusted in accordance with the RNG-RSP and has stabilized (refer to Section 4).
110
Radio Frequency Interface Specification
SP-RFI-I03-980202
On periodic timer add CM to poll list for future maps
Map will be sent per allocation algorithm
Wait for polled RNG-REQ
RNG-REQ not received
RNG-REQ
No Retries Exhausted? No Yes
Yes Good Enough? (Note 1)
Retries Exhausted? Yes No Send RNG-RSP (abort) Send RNG-RSP (continue)
Send RNG-RSP (success)
Remove CM from poll list
Remove CM from poll list
Wait for polled RNG-REQ
Done
Destroy SIDs associated with this CM
Done
Note 1: Means Ranging Request is within the tolerance limits of the CMTS for power and transmit equalization (if supported).
Figure 7-12. Periodic Ranging - CMTS
111
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Operational
Wait for Station Maintenance opportunity
RNG-RSP
Station Maintenance opportunity
Timeout T4
Yes Send RNG-REQ
Abort ranging from CMTS?
No Error: Re-initialize MAC Adjust local parameters per RNG-RSP
Figure 7-13. Periodic Ranging - CM View
7.2.15 Changing Upstream Burst Parameters Whenever the CMTS is to change any of the upstream burst characteristics, it must provide for an orderly transition from the old values to the new values by all CMs. Whenever the CMTS is to change any of the upstream burst values, it MUST:
* Announce the new values in an Upstream Channel Descriptor message. The Configuration Change Count
field must be incremented to indicate that a value has changed. After transmitting one or more UCD messages with the new value, the CMTS transmits a MAP message with a UCD Count matching the new Configuration Change Count. The first interval in the MAP MUST be a data grant of at least 1 millisecond to the null Service ID (zero). That is, the CMTS MUST allow one millisecond for cable modems to change their PMD sublayer parameters to match the new set. This millisecond is in addition to other MAP timing constraints (see Section 6.4.2).
* The CMTS MUST NOT transmit MAPs with the old UCD Count after transmitting the new UCD.
The CM MUST use the parameters from the UCD corresponding to the MAP's "UCD Count" for any transmissions it makes in response to that MAP. If the CM has, for any reason, not received the corresponding UCD, it cannot transmit during the interval described by that MAP. 7.2.16 Changing Upstream Channels At any time after registration, the CMTS MAY direct the CM to change its upstream channel. This may be done for traffic balancing, noise avoidance, or any of a number of other reasons which are beyond the scope of this specification. Figure 7-14 shows the procedure that MUST be followed by the CMTS. Figure 7-15 shows the corresponding procedure at the CM.
112
Radio Frequency Interface Specification
SP-RFI-I03-980202
Decide to switch CM to new upstream channel
UCC-REQ
Wait for UCCRSP
Timeout T5
UCC-RSP
Done Retries Exhausted? No Yes
CM is unreachable
Figure 7-14. Changing Upstream Channels: CMTS View
Note that if the CMTS retries the UCC-REQ, the CM may have already changed channels (if the UCC-RSP was lost in transit). Consequently, the CMTS MUST listen for the UCC-RSP on both the old and the new channels.
113
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Operational
UCC-REQ
Yes
Already using this channel?
No
UCC-RSP UCC-RSP
Switch to new channel and Perform Ranging
No Re-initialize MAC
Successful Ranging?
Yes
Figure 7-15. Changing Upstream Channels: CM View
The CM MUST successfully establish initial ranging on a new channel before using that channel. It MUST NOT perform re-registration, since its provisioning and MAC domain remain valid on the new channel. If the CM has previously established ranging on the new channel, and if that ranging on that channel is still current (T4 has not elapsed since the last successful ranging), then the CM MAY use cached ranging information and may omit initial ranging. 7.2.17 Fault Detection and Recovery Fault detection and recovery occurs at multiple levels.
* At the physical level, FEC is used to correct errors where possible - refer to Section 4 for details. * The MAC protocol protects against errors through the use of checksum fields across both the MAC Header
and the data portions of the packet - refer to Section 6 for details.
* All MAC management messages are protected with a CRC covering the entire message, as defined in Section
6. Any message with a bad CRC MUST be discarded by the receiver. Table 7-1 shows the recovery process that MUST be taken following the loss of a specific type of MAC message.
114
Radio Frequency Interface Specification
SP-RFI-I03-980202
Table 7-1. Recovery Process on Loss of Specific MAC Messages
Message Name SYNC Action Following Message Loss The CM can lose SYNC messages for a period of the loss SYNC interval (see Appendix B) before it has lost synchronization with the network. When this occurs, it follows the same procedures to reacquire connectivity as during initialization A CM MUST receive a valid UCD before transmitting on the upstream. Failure to receive a valid UCD within the timeout period MUST cause the modem to reset and reinitialize its MAC connection. A CM MUST NOT transmit without a valid upstream bandwidth allocation. If a MAP is missed due to error, the CM MUST NOT transmit for the period covered by the MAP. If a CM fails to receive a valid ranging response within a defined timeout period after transmitting a request, the request MUST be retried a number of times (as defined in Appendix B). Failure to receive a valid ranging response after the requisite number of attempts MUST cause the modem to reset and reinitialize its MAC connection. If a CM fails to receive a valid registration response within a defined timeout period after transmitting a request, the request will be retried a number of times (as defined in Appendix B). Failure to receive a valid registration response after the requisite number of attempts will cause the modem to reset and reinitialize its MAC connection. If a CMTS fails to receive a valid upstream channel change response within a defined timeout period after transmitting a request, the request MUST be retried a number of times (as defined in Appendix B). Failure to receive a valid response after the requisite number of attempts MUST cause the CMTS to consider the CM as unreachable.
UCD
MAP RNG-REQ RNG-RSP
REG-REQ REG-RSP
UCC-REQ UCC-RSP
Messages at the network layer and above are considered to be data packets by the MAC Sublayer. These are protected by the CRC field of the data packet and any packets with bad CRCs are discarded. Recovery from these lost packets is in accordance with the upper layer protocol. 7.2.18 Prevention of Unauthorized Transmissions A CM SHOULD include a means for terminating RF transmission if it detects that its own carrier has been on continuously for longer than the longest possible valid transmission.
115
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
This page intentionally left blank.
116
Radio Frequency Interface Specification
SP-RFI-I03-980202
8 Supporting Future New Cable Modem Capabilities
8.1 Setting Up Communications on an Enhanced Basis
In the future, new types of CM or CMTS with enhanced characteristics may be introduced. Future-proofing is provided, in the protocols described herein, to permit these new types of CM or CMTS to set up communication on an enhanced basis. Two methods are provided to accomplish this: one for use when the downstream channel supports upstream channels of varying capability and the other for the case where enhanced downstream channels are available. 8.1.1 Upstream Enhanced / Downstream Standard
The procedure MUST be as follows. a) The enhanced CM acquires a standard downstream CMTS signal.
b) The CM receives and interprets upstream channel descriptor (UCD) messages forwarded from the CMTS until it finds one for a channel with the enhanced characteristics which it wishes to use. It joins the upstream transmission stream of this channel which has been assigned to enhanced CMs in accordance with the information in the downstream CMTS signal. 8.1.2 Downstream Enhanced / Upstream Enhanced or Standard
The procedure MUST be as follows. a) The enhanced CM acquires a standard downstream CMTS signal.
b) The CM receives and interprets upstream channel descriptor (UCD) messages forwarded from the CMTS until it finds one for a channel with the best match to the enhanced characteristics which it wishes to use. It joins the upstream transmission stream of this channel which has been assigned to enhanced CMs in accordance with the information in the downstream CMTS signal. c) The enhanced CM interacts with the provisioning server for the purposes of agreeing upon the operating frequencies, modulation, data rate and other characteristics for enhanced operation.
d) The enhanced CM changes operating frequencies and other characteristics accordingly, if necessary, and commences enhanced operation on a different downstream channel if necessary under conditions that will not interfere with the standard CMs. e) The CM acquires the new downstream CMTS signal and waits on appropriate UCD on this new channel.
8.2 Downloading Cable Modem Operating Software
A CMTS SHOULD be capable of being remotely reprogrammed in the field via a software download via the network. The cable modem device MUST be capable of being remotely reprogrammed in the field via a software download over the network. This software download capability MUST allow the functionality of the cable modem to be changed without requiring that cable system personnel physically revisit and reconfigure each unit. It is expected that this field programmability will be used to upgrade cable modem software to improve performance, accommodate new functions and features (such as enhanced class of service support), correct any
117
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
design deficiencies discovered in the software, and to allow a migration path as the Data Over Cable Interface Specification evolves. The mechanism used for download MUST be TFTP file transfer. The mechanism by which transfers are secured and authenticated is in [MCNS2]. The transfer MUST be initiated in one of two ways:
* An SNMP manager requests the CM to upgrade. * The configuration parameter file delivered to the CM from the provisioning server MUST include the desired
filename from which the desired software image can be retrieved. If the filename does not match the current software image of the CM, the CM MUST request the specified file from a TFTP server. The CM MUST write the new software image to non-volatile storage. Once the file transfer is complete, the CM MUST restart itself with the new code image. If the CM is unable to complete the file transfer for any reason, it MUST remain capable of accepting new software downloads, even if power is interrupted between attempts. The CM MUST log the failure and MAY report it asynchronously to the network manager. Following upgrade of the operational software, the CM MAY need to follow one of the procedures described above in order to change channels to use the enhanced functionality. If the CM is to continue to operate in the same upstream and downstream channels as before the upgrade, then it MUST be capable of inter-working with other CMs which MAY be running previous releases of software. Where software has been upgraded to meet a new version of the specification, then it is critical that it MUST inter-work with the previous version in order to allow a gradual transition of units on the network. The periodic SYNC message transmitted on the downstream channel MUST indicate the protocol revision at which the channel is operating.
118
Radio Frequency Interface Specification
SP-RFI-I03-980202
9 Provision for Other Future Capabilities
It is anticipated that cable modem networks will, in the future, support capabilities that cannot be adequately defined today. These capabilities may include:
* New physical-layer modulation encoding. * Improvements to, or new configuration settings within, the defined physical-layer encoding. * Differing traffic flows and classes of service (e.g., STM telephony).
It is the intent of this specification to provide for interoperability with future devices and networks to whatever extent is practical. The minimum level of interoperability is that future-capability modems and modems conforming to this specification are assigned to different frequency bands, and all modems can automatically scan to find a congenial frequency band.
9.1 Anticipated Physical-Layer Changes
Existing MAC signaling provides for optional transmitter equalization (see Figure ). Other forms of upstream transmission manipulation, such as Tomlinson-Harashima precoding, may be developed in the future. Signaling to support such can be added as optional TLV-encodings for the Ranging Response message. This configuration setting can be phased into existing networks without placing new requirements on existing devices. When developing a new network, it may be necessary to know modem capabilities before coming to rely on a feature like this. The "Modem Capabilities" mask, exchanged as part of the CM-to-CMTS registration process (see Figure 6.3.2.7) is intended to provide this information. 9.1.1 Adding Upstream Channel and Burst Configuration Settings
In future, configuration settings may be provided for new upstream channel characteristics:
* Higher-symbol-rate signaling
and new upstream burst characteristics:
* Trellis-coded modulation (2 bits/symbol and 4 bits/symbol) * Interleaving within a burst.
These are defined through new encodings of the Upstream Channel Descriptor. A CM which finds characteristics which it does not implement is required to either abstain from that burst type, or to find a different upstream channel (see Section 8.1.1). This is also controllable by administrative policy if enough commonality is present to complete the registration process. As with transmission precoding, a modem-capabilities flag may be needed if the CMTS is to choose leastcommon-denominator capability. 9.1.1.1 Channel Burst Parameters for Advanced Modems Configuration settings for channel burst parameters for advanced modems are given in Table 9-1.
119
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Table 9-1. Channel Burst Parameters for Advanced Modems
Parameter Modulation (additional configuration settings) Configuration Settings Trellis Coded Modulation available 1) 8PSK--2 bits/s (analogous to QPSK) 2) 32QAM--4 bits/s (analogous to 16QAM) 2 encoder configuration settings available for each. Interleaving N rows by M columns transmitter fills columns Tomlinson-Harashima Precoding N = 0 to 255; 0 = no interleaving M = 1 to 256 (1) TH Precoding (2) Conventional Transmit FIR Equalization (3) None
It should be possible to program these capabilities separately to users on a given channel. For example, two users should be able to be commanded to operate at a given channel frequency and symbol rate, with one user having any or all of these features: 8PSK TCM, Interleaving, and TH Precoding; while the other user employs QPSK and none of the other features (i.e., this user is not an advanced cable modem). 9.1.2 Downstream Channel Improvements
Downstream channel improvements may require additional frequencies to implement for interoperability. The modem initialization process defined herein provides that if the CM is unable to complete satisfactory exchanges with the CMTS then it will scan for a more suitable frequency (see Section 8.1.2).
9.2 New Network Service Requirements
The types of network service expected on a cable network are apt to change over the lifetime of equipment conforming to this specification. This specification anticipates use of ATM-style traffic parameters by giving the CMTS centralized control over bandwidth allocation and jitter. Future networks may include classes of data other than those explicitly provided (802-like and ATM). These may be implemented by using the Reserved code point in the MAC FC field. Because this specification does not require a particular bandwidth allocation algorithm, future algorithms may be developed which take into account policies and traffic types that are not yet well-understood. 9.2.1 Multicast Service IDs
Multicast Service IDs provide extensibility to the interval usage codes that are defined herein in the upstream bandwidth allocation map. The multicast ID reflects, not just group membership, but also the access rules that apply to whatever interval is assigned to that ID. The following examples of Request/Data IEs illustrate some of the possibilities for use of a particular ID:
* The grant is for contention space for all high-priority (as defined locally) data PDUs from a select group of
CMs.
* The grant is for ATM cells only.
It may be necessary to develop an extension to the MAC signaling protocol to distribute the definition of attributes associated with particular multicast Service IDs.
120
Radio Frequency Interface Specification
SP-RFI-I03-980202
9.2.2
RSVP Support for Upstream Traffic
The Resource ReSerVation Protocol (RSVP) is a resource reservation setup protocol currently being standardized by the Internet Engineering Task Force. RSVP provides receiver-initiated setup of resource reservations for multicast and unicast data flows. This section serves to anticipate and guide the definition of new MAC management messages to support resource reservation for upstream traffic in the Data-over-Cable context. RSVP assumes the implementation of two modules on each RSVP-capable node to forward data packets: the "packet classifier" and the "packet scheduler". The packet classifier deter-mines the route and class-of-service class for each packet, and sends the packet to the packet scheduler. The RSVP packet classifier uses a "filter spec" (which matches a particular source IP address and TCP/UDP port number) to classify and restrict traffic that consumes reservation resources. The packet scheduler makes packet forwarding decisions (e.g., queuing decisions) to achieve the promised class of service on the interface. The RSVP packet scheduler uses a "flow spec" (which identifies token bucket parameters, peak data rate, etc.) to identify the desired class of service. In the context of RSVP for upstream traffic in the data-over-cable system, it is desirable for the CM to perform the "packet classifier" function; however the CMTS should perform most of the "packet scheduler" function. The support for this split of functions suggests the future definition of three new MAC management messages: "Dynamic Service Addition", "Dynamic Service Deletion", and "Dynamic Service Response." The Dynamic Service Addition message is periodically transmitted from the CMTS to the CM to announce the allocation of a new SID. The Dynamic Service Addition message contains the new SID value, and type/length/ value fields which can encode the RSVP filter specification and RSVP "cleanup timeout" interval (to support the RSVP "soft state" approach). The CM is expected to use the new SID exclusively for upstream traffic that matches the filter specification. The CM should assume that the new SID is refreshed by the receipt of another Dynamic Service Addition message within the cleanup timeout interval; otherwise, the SID is ignored by the CM at the conclusion of the interval. The Dynamic Service Deletion message is transmitted from the CMTS to the CM to delete an unused SID immediately (to support the RSVP explicit "teardown" message). The Dynamic Service Response message is transmitted from the CM to the CMTS to acknowledge receipt of a Dynamic Service Addition or Dynamic Service Deletion message. The interaction between RSVP "Path" and "Resv" messages, and the Dynamic Service Addition and Dynamic Service Response messages, is proposed to be as follows: 1. 2. 3. 4. The data flow source-node (behind a CM) generates an RSVP Path message, and sends the message toward the data flow destination-node. The CM forwards the upstream RSVP Path message to the destination-node without processing. The CMTS intercepts the upstream RSVP Path message, stores "path state" from the message, updates the "previous hop address" in the message, and forwards the message. The data flow destination-node receives the RSVP Path message, and replies with an RSVP Resv message to request a reservation of resources for the data flow from the source-node to itself. The RSVP Resv message is sent to the "previous hop" of the Path message - toward the CMTS. The CMTS receives the downstream RSVP Resv message, and processes the message flow spec using its "admission control" and "policy control" modules (in cooperation with the CMTS upstream bandwidth scheduler). Note that the CMTS must account for available resources on the CMTS-NSI as well as the RFI. The rest of this section assumes that the reservation message is accepted by the CMTS. The CMTS sends the "Dynamic Service Addition" MAC message to the CM.The message includes a new SID and the "filter spec" from the RSVP Resv message.
5.
6.
121
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
7. 8. 9.
The CM receives the "Dynamic Service Addition" MAC message, stores the new SID and "filter spec", and sends the "Dynamic Service Response" MAC message to the CMTS. The CMTS receives the "Dynamic Service Response" MAC message, and forwards the RSVP Resv message to its "previous hop." The CM forwards the downstream RSVP Resv message to the source-node without processing.
9.3 PID Filtering Capability
This specification uses a single well-known PID for all data-over-cable traffic. CMs MAY use additional PIDs for differentiation of traffic types or to provide streams to individual CMs. PID assignments MAY be facilitated by the appropriate MAC control message extensions. As an example, this could facilitate services that use MPEG packet-level encryption. Any such services are beyond the scope of this version of the specification. An additional modem capability configuration setting could be added in the Registration Request (REG-REQ) message to indicate the number of PIDs, in addition to the well-known PID, that the CM can filter. A "0" would indicate that the CM can only filter on the well-known PID. An extension to the encodings in the Registration Response (REG-RSP) could be used to assign to a CM additional PIDs on which to filter.
122
Radio Frequency Interface Specification
SP-RFI-I03-980202
Appendix A. Well-Known Addresses
A.1 MAC Addresses
MAC addresses described here are defined using the Ethernet/ISO8802-3 convention as bit-little-endian. The following multicast address MUST be used to address the set of all CM MAC sublayers; for example, when transmitting Allocation Map PDUs. 01-E0-2F-00-00-01 The following multicast address MUST be used to address all CMTSs within the MAC-sublayer domain: 01-E0-2F-00-00-02 Note that in nearly all cases the unicast CMTS address is preferred. The address range 01-E0-2F-00-00-03 through 01-E0-2F-00-00-0F is reserved for future definition. Frames addressed to any of these addresses SHOULD NOT be forwarded out of the MAC-sublayer domain.
A.2 MAC Service IDs
The following MAC Service IDs have assigned meanings. Those not included in this table are available for assignment, either by the CMTS or administratively. 0x0000 0x3FFF 0x3FF1-0x3FFE Addressed to no CM. Addressed to all CMs. Addressed to all CMs. Available for small data PDUs, as well as requests (used only with request/data IEs). The last digit indicates the frame length and transmission opportunities as follows: Within the interval specified, a transmission may start at any mini-slot, and must fit within one mini-slot. Within the interval specified, a transmission may start at every other mini-slot, and must fit within two mini-slots (e.g., a station may start transmission on the first mini-slot within the interval, the third mini-slot, the fifth, etc.). Within the interval specified, a transmission may start at any third mini-slot, and must fit within three mini-slots (e.g., starts at first, fourth, seventh, etc.). Starts at first, fifth, ninth, etc.
0x3FF1
0x3FF2
0x3FF3
0x3FF4 ... 0x3FFD 0x3FFE
Starts at first, fourteenth (14th), twenty-seventh (27th), etc. Within the interval specified, a transmission may start at any 14th mini-slot, and must fit within 14 mini-slots.
123
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
A.3 MPEG PID
All MCNS data MUST be carried in MPEG-2 packets with the header PID field set to 0x1FFE.
124
Radio Frequency Interface Specification
SP-RFI-I03-980202
Appendix B. Parameters and Constants
System CMTS CMTS CMTS Name Sync Interval UCD Interval Max MAP Pending Time Reference Nominal time between transmission of SYNC messages (ref 6.3.2.1) Time between transmission of UCD messages (ref. 6.3.2.2) The number of mini-slots that a CMTS is allowed to map into the future (ref. 6.3.2.3) Time between transmission of broadcast Ranging requests (ref. 6.3.2.4) Time since last received Sync message before synchronization is considered lost Number of Retries on contention Ranging Requests (ref. 7.2.5) Number of Retries on inviting Ranging Requests (ref. 7.2.5) Number of retries on bandwidth allocation requests Number of retries on registration requests Number of retries on immediate data transmission Time provided between arrival of the last bit of a MAP at a CM and effectiveness of that MAP (ref. 6.4.1) Minimum time allowed for a CM following receipt of a ranging response before it is expected to reply to an invited ranging request Wait for UCD timeout 200 s 16 16 16 3 16 Minimum Value Default Value Maximum Value 200 msec 2 sec 4096 minislot times 2 sec 600 msec
CMTS CM CM CM, CMTS CM CM CM CMTS
Ranging Interval Lost Sync Interval Contention Ranging Retries Invited Ranging Retries Request Retries Registration Request Retries Data Retries CM MAP processing time CM Ranging Response processing time T1
CMTS
1 msec
CM
5 * UCD interval maximum value 5 * ranging interval 50 msec 200 msec 200 msec 30 sec
CM CM CM
T2 T3 T4
Wait for broadcast ranging timeout Wait for ranging response Wait for unicast ranging opportunity. If the pending-till-complete field was used earlier by this modem, then the value of that field must be added to this interval. Wait for Upstream Channel Change response Wait for registration response Size of mini-slot for upstream transmission. Must be a power of 2 (in units of the Timebase Tick) System timing unit 32 symbol times 6.25 sec
CMTS CM CM CMTS CM CMTS
T5 T6 Mini-slot size
2 sec 3 sec
Timebase Tick
125
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
This page intentionally left blank.
126
Radio Frequency Interface Specification
SP-RFI-I03-980202
Appendix C. CM Configuration Interface Specification
C.1 DHCP Fields Used by the CM
The following fields are required in the DHCP request from the CM.
* The hardware type SHOULD be set to Ethernet. * The hardware address of the CM (used as the key to identify the CM during the DHCP process).
The following fields are required in the DHCP response returned to the CM.
* The IP address to be used by the CM. * The subnet mask to be used by the CM. * If the DHCP server is on a different network (requiring a relay agent), then the relay agent MUST set the
gateway address field of the DHCP response.
* The name of the CM configuration file to be read from the TFTP server by the CM. * The time offset of the CM from Universal Coordinated Time (UTC) -- used by the CM to calculate the local
time to use in time-stamping error logs.
* Time-server option -- provides a list of [RFC-868] time-servers from which the current time may be
obtained.
* The IP address of the next server to use in the bootstrap process (TFTP server) is returned in the siaddr field. * The IP address of the security server SHOULD be set if security is required. This is encoded using the code
128 (which is reserved for site specific information per reference [RFC-1533]) as shown below. type 128 length 4 value ip1,ip2,ip3,ip4
C.2 CM Binary Configuration File Format
The CM-specific configuration data MUST be contained in a file which is downloaded to the CM via TFTP. This is a binary file in the same format defined for DHCP vendor extension data [RFC-1533]. It MUST consist of a number of configuration settings (1 per parameter) each of the form type: length: value
where
type is a single-octet identifier which defines the parameter length is a single octet containing the length of the value field in octets (not including type and length fields) value is from one to 254 octets containing the specific value for the parameter
The configuration settings MUST follow each other directly in the file, which is a stream of octets (no record markers). Configuration settings are divided into three types:
* Standard configuration settings which MUST be present
127
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
* Standard configuration settings which MAY be present * Vendor-specific configuration settings.
CMs MUST be capable of processing all standard configuration settings. Authentication of the provisioning information is provided by two message integrity check (MIC) configuration settings, CM MIC and CMTS MIC.
* CM MIC is a digest which ensures that the data sent from the provisioning server were not modified en route.
This is NOT an authenticated digest (it does not include any shared secret).
* CMTS MIC is a digest used to authenticate the provisioning server to the CMTS during registration. It is
taken over a number of fields one of which is a shared secret between the CMTS and the provisioning server. Use of the CM MIC allows the CMTS to authenticate the provisioning data without needing to receive the entire file. Thus the file structure is of the form shown in Figure C-1:
Configuration Configuration Setting 1 Setting 2
Configuration Setting n
CM MIC
CMTS MIC
Figure C-1. Binary Configuration File Format
Note: Not all configuration settings need to be present in a given file.
C.3 Configuration File Settings
The following configuration settings MUST be included in the configuration file and MUST be supported by all CMs.
* Network Access Configuration Setting * End Configuration Setting
The following configuration settings MAY be included in the configuration file and if present MUST be supported by all CMs.
* * * * * * * * *
Downstream Frequency Configuration Setting Upstream Channel ID Configuration Setting Class of Service Configuration Setting Vendor ID Configuration Setting Baseline Privacy Configuration Setting Software Upgrade Filename Configuration Setting SNMP Write-Access Control SNMP MIB Object Pad Configuration Setting
128
Radio Frequency Interface Specification
SP-RFI-I03-980202
The following configuration settings MAY be included in the configuration file and if present MAY be supported by a CM.
* Vendor-Specific Configuration Settings
C.4 Configuration File Creation
The sequence of operations required to create the configuration file is as shown in Figure C-1 through Figure C5. 1. Create the type/length/value entries for all the parameters required by the CM.
type, length, value for parameter 1 type, length, value for parameter 2
type, length, value for parameter n
Figure C-2. Create TLV Entries for Parameters Required by the CM
2. Calculate the CM message integrity check (MIC) configuration setting as defined in Section C.5 and add to the file following the last parameter using code and length values defined for this field.
type, length, value for parameter 1 type, length, value for parameter 2
type, length, value for parameter n type, length, value for CM MIC
Figure C-3. Add CM MIC
3. Calculate the CMTS message integrity check (MIC) configuration setting as defined in Section C.6 and add to the file following the CM MIC using code and length values defined for this field.
129
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
type, length, value for parameter 1 type, length, value for parameter 2
type, length, value for parameter n type, length, value for CM MIC type, length, value for CMTS MIC
Figure C-4. Add CMTS MIC
4. Add the end of data marker.
type, length, value for parameter 1 type, length, value for parameter 2
type, length, value for parameter n type, length, value for CM MIC type, length, value for CMTS MIC end of data marker
Figure C-5. Add End of Data Marker
C.5 CM MIC Calculation
The CM message integrity check configuration setting MUST be calculated by performing an MD5 digest over the bytes of the configuration setting fields. It is calculated over the bytes of these settings as they appear in the TFTPed image, without regard to TLV ordering or contents. There are two exceptions to this disregard of the contents of the TFTPed image: 1. The bytes of the CM MIC TLV itself are omitted from the calculation. This includes the type, length, and value fields. 2. The bytes of the CMTS MIC TLV are omitted from the calculation. This includes the type, length, and value fields. On receipt of a configuration file, the CM MUST recompute the digest and compare it to the CM MIC configuration setting in the file. If the digests do not match then the configuration file MUST be discarded.
C.6 CMTS MIC Calculation
The CMTS message integrity check configuration setting MUST be calculated by performing an MD5 digest over the following configuration setting fields, when present in the configuration file, in the order shown:
* Downstream Frequency Configuration Setting
130
Radio Frequency Interface Specification
SP-RFI-I03-980202
* * * * * * * *
Upstream Channel ID Configuration Setting Network Access Configuration Setting Class of Service Configuration Setting Vendor ID Configuration Setting Baseline Privacy Configuration Setting Vendor specific Configuration Settings CM MIC Configuration Setting Authentication string.
The configuration setting fields are treated as if they were contiguous data when calculating the MD5 digest. The digest MUST be added to the configuration file as its own configuration setting field using the CMTS MIC Configuration Setting encoding. The authentication string is a shared secret between the provisioning server (which creates the configuration files) and the CMTS. It allows the CMTS to authenticate the CM provisioning. The mechanism by which the shared secret is managed is up to the system operator. On receipt of a configuration file, the CM MUST forward the CMTS MIC as part of the registration request (REG-REQ). On receipt of a REG-REQ, the CMTS MUST recompute the digest over the included fields and the authentication string and compare it to the CMTS MIC configuration setting in the file. If the digests do not match, the registration request MUST be rejected by setting the authentication failure result in the registration response status field. C.6.1 Digest Calculation
The digest fields MUST be calculated using the mechanism defined in [RFC-2104].
C.7 Registration Configuration Settings
The following configuration settings are used in the registration messages. Refer to Section 6.3.2 for details on these messages. Registration Request
* * * * * * * * *
Downstream Frequency Configuration Setting Upstream Channel ID Configuration Setting Network Access Configuration Setting Class of Service Configuration Setting Modem Capabilities Configuration Setting Vendor ID Configuration Setting Baseline Privacy Configuration Setting Vendor specific extensions CM MIC
131
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
* CMTS MIC * Modem IP address.
Registration Response
* * * *
Class of Service Configuration Setting Modem Capabilities Configuration Setting Vendor ID Configuration Setting Vendor-Specific extensions.
C.8 Encodings
The following type/length/value encodings MUST be used in both the configuration file and in CM registration requests and CMTS responses. All multi-octet quantities are in network-byte order, i.e., the octet containing the most-significant bits is the first transmitted on the wire. The following configuration settings MUST be supported by all CMs which are compliant with this specification. C.8.1 End-of-Data Marker
This is a special marker for end of data. It has no length or value fields. type 255 C.8.2 Pad Configuration Setting
This has no length or value fields and is only used following the end of data marker to pad the file to an integral number of 32-bit words. type 0 C.8.3 Downstream Frequency Configuration Setting
The receive frequency to be used by the CM. It is an override for the channel selected during scanning. This is the center frequency of the downstream channel in Hz stored as a 32-bit binary number. type 1 Valid Range The receive frequency MUST be a multiple of 62500 Hz. length 4 rx frequency rx1 rx2 rx3 rx4
132
Radio Frequency Interface Specification
SP-RFI-I03-980202
C.8.4
Upstream Channel ID Configuration Setting
The upstream channel ID which the CM MUST use. The CM MUST listen on the defined downstream channel until an upstream channel description message with this ID is found. It is an override for the channel selected during initialization. type 2 C.8.5 length 1 value channel ID
Network Access Control Object
If the value field is a 1 this CM is allowed access to the network; if a 0 it is not. type 3 C.8.6 length 1 on / off 1 or 0
Class of Service Configuration Setting
This field defines the parameters associated with a class of service. It is somewhat complex in that is composed from a number of encapsulated type/length/value fields. The encapsulated fields define the particular class of service parameters for the class of service in question. Note that the type fields defined are only valid within the encapsulated class of service configuration setting string. A single class of service configuration setting is used to define the parameters for a single service class. Multiple class definitions use multiple class of service configuration setting sets. type 4 length n value
C.8.6.1 Internal Class of Service Encodings C.8.6.1.1 Class ID
The value of the field specifies the identifier for the class of service to which the encapsulated string applies. type 1 Valid Range The class ID MUST be in the range 1 to 16. C.8.6.1.2 Maximum Downstream Rate Configuration Setting length 1 value
The value of the field specifies the maximum data rate in bit/sec allowed from this service class on the downstream path. That is, it is the peak data rate for Packet PDU data (including destination MAC address and the CRC) over a one-second interval. This is a limit on the modem, not a guarantee that this rate is available type length value
133
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
2 C.8.6.1.3
4 Maximum Upstream Rate Configuration Setting
The value of the field specifies the maximum data rate in bit/sec allowed from this service class on the upstream channel. That is, it is the peak data rate for Packet PDU data (including destination MAC address and the CRC) over a one-second interval. This is a limit on the modem, not a guarantee that this rate is available. type 3 C.8.6.1.4 length 4 Upstream Channel Priority Configuration Setting value
The value of the field specifies the relative priority assigned to this service class for data transmission in the upstream channel. Higher numbers indicate higher priority. type 4 Valid Range 0 -> 7 C.8.6.1.5 Guaranteed Minimum Upstream Channel Data Rate Configuration Setting length 1 value
The value of the field specifies the data rate in bit/sec which will be guaranteed to this service class on the upstream channel. type 5 C.8.6.1.6 length 4 Maximum Upstream Channel Transmit Burst Configuration Setting value
The value of the field specifies the maximum transmit burst (in units of mini-slots) which this service class is allowed on the upstream channel. type 6 Valid Range 0 -> 255 for initial version.
Note: The 2-byte length field is retained to support possible future expansion of allowed burst sizes.
length 2
value 255
134
Radio Frequency Interface Specification
SP-RFI-I03-980202
Table C-1. Sample Class of Service Encoding
Value (sub)type
Type 4
|Length 28 1 2 3 4 5 6
Length
Value class of service configuration setting
1 4 4 1 4 2
1 10,000,000 2,000,000 5 64000 100
service class 1 max. forward rate of 10 Mb/sec max. return rate of 2 Mb/sec return path priority of 5 min guaranteed 64 kb/sec max. Tx burst of 100 mini-slots class of service configuration setting
4
28 1 2 3 4 5 6 1 4 4 1 4 2 2 5,000,000 1,000,000 3 32000 50
service class 2 max. forward rate of 5 Mb/sec max. return rate of 1 Mb/sec return path priority of 3 min guaranteed 32 kb/sec max. Tx burst of 50 mini-slots
C.8.6.1.7
Class-of-Service Privacy Enable
This configuration setting enables/disables Baseline Privacy on a provisioned CoS. See [MCNS8]. type 7 ( = CoS_BP_ENABLE) C.8.7 length 1 enable/disable 1 or 0
Modem Capabilities Configuration Setting
The value field describes the capabilities of a particular modem, i.e., those OPTIONAL features which the modem can support. It is composed from a number of encapsulated type/length/value fields. The encapsulated fields define the specific capabilities for the modem in question. Note that the type fields defined are only valid within the encapsulated capabilities configuration setting string. type 5 length n value
The set of possible encapsulated fields is described below. C.8.7.1 Concatenation Support If the value field is a 1 this modem can support concatenation; if a 0 it can not. type 1 length 1 on / off 1 or 0
135
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Table C-2. Sample Capability Encoding
Value (sub)type
Type 5
Length
Length
Value modem capability configuration setting
1
1
1
concatenation supported
C.8.8
CM Message Integrity Check (MIC) Configuration Setting
The value field contains the CM message integrity check code. This is used to detect unauthorized modification or corruption of the configuration file. type 6 C.8.9 length 16 value d1 d2 ....... d16
CMTS Message Integrity Check (MIC) Configuration Setting
The value field contains the CMTS message integrity check code. This is used to detect unauthorized modification or corruption of the configuration file. type 7 length 16 value d1 d2 ....... d16
C.8.10 Vendor ID Configuration Setting The value field contains the vendor identification specified by the three-byte vendor-specific Organization Unique Identifier of the CM MAC address. type 8 length 3 value v1, v2, v3
C.8.11 Software Upgrade Filename The filename of the software upgrade file for the CM. This is a filename only, not a complete path. The file should reside in the TFTP public directory. type 9
Note:
length n
alue filename
Filename length MUST be less than or equal to 64 bytes.
C.8.12 SNMP Write-Access Control This object makes it possible to disable SNMP "Set" access to individual MIB objects. Each instance of this object controls access to all of the writeable MIB objects whose Object ID (OID) prefix matches. This object may be repeated to disable access to any number of MIB objects.
136
Radio Frequency Interface Specification
SP-RFI-I03-980202
type 10
length n
value OID prefix plus control flag
where n is the size of the ASN.1 Basic Encoding Rules [ISO8025] encoding of the OID prefix plus one byte for the control flag. The control flag may take values: 0 - allow write-access 1 - disallow write-access Any OID prefix may be used. The Null OID 0.0 may be used to control access to all MIB objects. (The OID 1.3.6.1 will have the same effect.) When multiple instances of this object are present and overlap, the longest (most specific) prefix has precedence. Thus, one example might be someTable someTable.1.3 disallow write-access allow write-access
This example disallows access to all objects in someTable except for someTable.1.3. C.8.13 SNMP MIB Object This object allows arbitrary SNMP MIB objects to be Set via the TFTP-Registration process. type 11 length n value variable binding
where the value is an SNMP VarBind as defined in [RFC-1157]. The VarBind is encoded in ASN.1 Basic Encoding Rules, just as it would be if part of an SNMP Set request. The cable modem MUST treat this object as if it were part of an SNMP Set Request with the following caveats:
* It MUST treat the request as fully authorized (it cannot refuse the request for lack of privilege). * SNMP Write-Control provisions (see previous section) do not apply. * No SNMP response is generated by the CM.
This object MAY be repeated with different VarBinds to "Set" a number of MIB objects. All such Sets MUST be treated as if simultaneous. Each VarBind MUST be limited to 255 bytes. C.8.14 Vendor-Specific Information Vendor-specific information for cable modems, if present, MUST be encoded in the configuration file using the vendor-specific information code (43) following the rules defined in [RFC-1533]. The vendor identifier field MUST be present if this configuration setting is used. This configuration setting MAY appear multiple times.
137
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
type 43
length n
value per vendor definition
C.8.15 Modem IP Address This object informs the CMTS of the provisioned IP address of the cable modem. type 12 length 4 value IP Address
This object appears only in the Registration Request message. This address plays no part in the protocols defined in this specification, but is included to assist with network management. C.8.16 Service(s) Not Available Response This configuration setting MUST be included in the Registration Response message if the CMTS is unable or unwilling to grant any of the requested classes of service that appeared in the Registration Request. Although the value applies only to the failed service class, the entire Registration Request MUST be considered to have failed (none of the class-of-service configuration settings are granted). type 13 where class ID type reason is the class-of-service class from the request which is not available is the specific class-of-service object within the class which caused the request to be rejected is the reason for the rejection from the following: reason-other(1) reason-unrecognized-configuration--setting(2) reason-temporary(3) reason-permanent(4) The reason codes MUST be used in the following way. length 3 value class ID, type, reason
* Reason-other(1) is used when none of the other reason codes apply. * Reason-unrecognized-configuration setting(2) is used when a class-of-service type is not recognized or when
its value is outside of the specified range.
* Reason-temporary(3) indicates that the current loading of service IDs or traffic policies at the CMTS prevents
granting the request, but that the request might succeed at another time.
* Reason-permanent(4) indicates that, for policy, configuration, or CMTS capabilities reasons, the request
would never be granted unless the CMTS were manually reconfigured or replaced.
138
Radio Frequency Interface Specification
SP-RFI-I03-980202
C.8.17 CPE Ethernet MAC Address This object configures the CM with the Ethernet MAC address of a CPE device (see Section 3.1.2.3.1). This object may be repeated to configure any number of CPE device addresses. type 14 length 6 value Ethernet MAC Address of CPE
This object appears only in the configuration file. C.8.18 Telephone Settings Option This configuration setting describes parameters which are specific to telephone return systems. It is composed from a number of encapsulated type/length/value fields. See [MCNS6]. type 15 ( = TRI_CFG01) C.8.19 SNMP IP Address This is the IP address of the SNMP Manager. The CM uses this address to report a problem with the cable network. type 16 ( = TRI_CFG02) length 4 value Integer IPaddress length n value
C.8.20 Baseline Privacy Configuration Settings Option This configuration setting describes parameters which are specific to Baseline Privacy. It is composed from a number of encapsulated type/length/value fields. See [MCNS8]. type 17 ( = BP_CFG) length n value
139
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
This page intentionally left blank.
140
Radio Frequency Interface Specification
SP-RFI-I03-980202
Appendix D. MAC Sublayer Service Definition
The MAC sublayer will provide the following services, consistent with [ISO/IEC15802-1]. This is an internal interface within the CM and CMTS and is provided for reference purposes only.
D.1 Service at the CM
The following service primitives are provided by the MAC sublayer to the higher-layer protocol entity. These represent an abstraction of the service provided and do not imply a particular implementation. MAC_CM_802_DATA.request MAC_CM_DIX_DATA.request MAC_CM_ATM_DATA.request MAC_CM_802_DATA.indication MAC_CM_DIX_DATA.indication MAC_CM_ATM_DATA.indication MAC_CM_DATA.acknowledgment
D.2 MAC_CM_802_DATA.request
Issued by the higher-layer to request transmission from the CM on an upstream channel. Parameters:
* channel_ID - MAY be implicit if the device supports attachment to a single channel. * service_ID * contention_and_acknowledgment_constraints - specifies whether or not this request MAY be
satisfied in a contention interval. Ordinarily, the CM will request that contention data be acknowledged by the CMTS.
* * * *
destination_address source_address (OPTIONAL) - if not explicitly overwritten, the address at this MSAP is used. LLC_pdu padding (OPTIONAL) - MAY be used if the LLC PDU is less than 60 bytes and it is desired to maintain ISO8802-3 transparency. Otherwise, a 32-bit CRC sum is calculated by the MAC sublayer.
* frame_check_sequence (OPTIONAL) - MAY be supplied if ISO8802-3 transparency is desired. * length
D.3 MAC_CM_DIX_DATA.request
Issued by the higher-layer to request transmission from the CM on an upstream channel. Parameters:
* channel_ID - MAY be implicit if the device supports attachment to a single channel. * service_ID * contention_and_acknowledgment_constraints - specifies whether or not this request MAY be
satisfied in a contention interval. Ordinarily, the CM will request that contention data be acknowledged by the CMTS.
141
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
* * * * *
destination_address source_address (OPTIONAL) - if not explicitly overwritten, the address at this MSAP is used. ethernet type ethernet_dix_pdu length
D.4 MAC_CM_ATM_DATA.request
Issued by the higher-layer to request transmission from the CM on an upstream channel. Parameters:
* channel_ID - MAY be implicit if the device supports attachment to a single channel. * service_ID * contention_and_acknowledgment_constraints - specifies whether or not this request MAY be
satisfied in a contention interval. Ordinarily, the CM will request that contention data be acknowledged by the CMTS.
* one or more ATM cells. Cells need not be within the same virtual circuit or virtual path. * length
D.5 MAC_CM_802_DATA.indication
Issued by the CM MAC to indicate reception of data from the downstream channel. Parameters:
* * * * *
channel_ID - MAY be implicit if the device supports attachment to a single channel. destination_address source_address LLC_pdu padding (OPTIONAL) - MAY be present if the LLC PDU was less than 60 bytes and ISO8802-3 transparency was desired.
* frame_check_sequence * length
D.6 MAC_CM_DIX_DATA.indication
Issued by the CM MAC to indicate reception of data from the downstream channel. Parameters:
* * * * * * *
channel_ID - MAY be implicit if the device supports attachment to a single channel. destination_address source_address ethernet type ethernet_dix_pdu frame_check_sequence length
142
Radio Frequency Interface Specification
SP-RFI-I03-980202
D.7 MAC_CM_ATM_DATA.indication
Issued by the CM MAC to indicate reception of data on the downstream channel. Parameters:
* * * *
channel_ID - MAY be implicit if the device supports attachment to a single channel. service_ID one or more ATM cells. Cells need not be within the same virtual circuit or virtual path. length
D.8 MAC_CM_DATA.acknowledgment
Issued by the CM MAC to indicate reception of an acknowledgment on the downstream channel. (An acknowledgment is an information element in a MAP PDU (see Section 6.4.1.1). The CMTS MUST include this IE in response to an upstream data transmission that includes an acknowledgment request.) Parameters:
* channel_ID - The downstream channel on which the acknowledgment was received. May be
implicit if the device supports attachment to a single channel.
* service_ID * length
143
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
This page intentionally left blank.
144
Radio Frequency Interface Specification
SP-RFI-I03-980202
Appendix E. Example Burst Profiles
E.1 Introduction
Table E-1 through Table E-4 contain example Channel Burst Profiles for various modulation format and symbol rate combinations. The column labeled Column #1 in Table E-1 through Table E-4 corresponds to the Request burst type. The other columns correspond to the Communication (or Data) burst type. Table E-5 contains example Channel Burst Profiles corresponding to Power-Up burst types, or Acquisition burst types (for use on a new channel--or simply for refinement of user-unique parameters). A burst length of 0 mini-slots in the Channel Profile means that the burst length is variable on that channel for that burst type, and will be assigned by the CMTS for each burst. A programmable preamble superstring, up to 1024 bits long, is part of the channel-wide profile or attributes, common to the all burst profiles on the channel (Section 6.3.2.2, Table 6-14), but with each burst profile able to specify the start location within this sequence of bits and the length of the preamble (Section 6.3.2.2, Table 6-15). The first bit of the Preamble Pattern is designated by the Preamble Value Offset as described in Table 6-15, Section 6.3.2.2. The first bit of the Preamble Pattern is the first bit into the symbol mapper (Figure 4-8), and is I1 in the first symbol of the burst (see Section 4.2.2.2). As an example, per Table 6-15, for Preamble Offset Value = 100, the 101st bit of the preamble superstring is the first bit into the symbol mapper, and the 102nd bit is the second bit into the mapper, and is mapped to Q1, and so. An example 1024-bit-long preamble superstring is given in Section E.2. Table E-6 contains the frame formats for each of the symbol rates with QPSK modulation for the example Request burst and for three codeword lengths for the Communication bursts, with one codeword per burst. Additionally, frame formats are shown for each of the rates with two of the example codeword lengths with four codewords per burst. In each format example, the information rate of the burst is calculated and given in the table. For the Request burst, the 6 bytes of "data" are assumed to be the information, and the rest is overhead. In the Communication bursts, the preamble, spacing (guard time), FEC parity, and the example 6 bytes of MAC Header are assumed overhead for the purposes of calculating information rate. Table E-7 is structured the same as Table E-6, but with the example formats for 16QAM modulation.
E.2 Example Preamble Sequence
The following is the example 1024-bit preamble sequence for Table E-1 through Table E-5: Bits 1 through 128: 1100 1100 1111 0000 1111 1111 1100 0000 1111 0011 1111 0011 0011 0000 0000 1100 0011 0000 0011 1111 1111 1100 1100 1100 1111 0000 1111 0011 1111 0011 1100 1100 Bits 129 through 256: 0011 0000 1111 1100 0000 1100 1111 1111 0000 1100 1100 0000 1111 0000 0000 1100 0000 0000 1111 1111 1111 0011 0011 0011 1100 0011 1100 1111 1100 1111 0011 0000 Bits 257 through 384: 1100 0011 1111 0000 0011 0011 1111 1100 0011 0011 0000 0011 1100 0000 0011 0000
145
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
0000 1110 1101 0001 0001 1110 1110 0101 0010 0101 0010 0101 1110 1110 0010 1110 Bits 385 through 512: 0010 1110 1110 0010 0010 1110 1110 1110 1110 1110 0010 0010 0010 1110 1110 0010 1110 1110 1110 0010 1110 0010 1110 0010 0010 0010 0010 1110 0010 0010 1110 0010 Bits 513 through 640: 0010 0010 1110 1110 1110 1110 1110 1110 0010 1110 0010 1110 0010 1110 1110 0010 0010 1110 1110 0010 1110 1110 1110 0010 1110 1110 0010 1110 0010 0010 1110 0010 Bits 641 through 768: 0010 1110 1110 1110 0010 0010 0010 1110 0010 1110 1110 1110 1110 0010 0010 1110 0010 1110 0010 0010 0010 1110 1110 0010 0010 0010 0010 1110 0010 0010 0010 0010 Bits 769 through 896: 0010 1110 1110 1110 1110 1110 1110 0010 1110 0010 1110 0010 1110 1110 0010 0010 1110 1110 0010 1110 1110 1110 0010 1110 1110 0010 1110 0010 0010 1110 0010 0010 Bits 897 through 1024: 1110 1110 1110 0010 0010 0010 1110 0010 1110 1110 1110 1110 0010 0010 1110 0010 1110 0010 0010 0010 1110 1110 0010 0010 0010 0010 1110 0010 0010 0010 0010 1110
146
Radio Frequency Interface Specification
SP-RFI-I03-980202
E.3 Example Burst Profiles
Table E-1. Example Channel Burst Parameter Values for QPSK Operation at 160, 320, and 640 ksym/sec
Config. Settings QPSK, 16QAM On/Off 5 configuratio n settings 0, 4-1024 bits 1024 configuratio n settings 1024 programma ble bits On/Off 1 to 255
Parameter Modulation Diff Enc Symbol Rate
#1 QPSK Off 160, 320 or 640 ksym/ sec 56 bits 15
#2 QPSK Off 160, 320 or 640 ksym/ sec 64 bits 7
#3 QPSK Off 160, 320 or 640 ksym/ sec 64 bits 7
#4 QPSK Off 160, 320 or 640 ksym/ sec 64 bits 7
#5 QPSK Off 160, 320 or 640 ksym/ sec 64 bits 7
Preamble Length Preamble Start Location Preamble Values
***
***
***
***
***
FEC On/Off FEC Codeword Information Bytes (k) FEC Error Correction (T bytes) Last Codeword Length Scrambler On/Off Scrambler Seed Burst Lengthm mini-slots*
Off N/A
On 32
On 56
On 64
On 220
0 to 10
N/A
4
7
8
10
Fixed or Shortened On/Off 15 bits** 0 to 255
N/A On default 3
Fixed On default 0
Fixed On default 0
Fixed On default 0
Fixed On default 0
*A burst length of 0 mini-slots in the Channel Profile means that the burst length is variable on that channel for that burst type. **15 bits in a 16-bit field ***Refer to Section E.2.
147
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Table E-2. Example Channel Burst Parameter Values for QPSK Operation at 1.28 and 2.56 Msym/sec
Config. Settings QPSK, 16QAM On/Off 5 configuratio n settings 0, 4-1024 bits 1024 configuratio n settings 1024 programma ble bits On/Off 1 to 255
Parameter Modulation Diff Enc Symbol Rate
#1 QPSK Off 1.28 or 2.56 Msym/ s 48 bits 19
#2 QPSK Off 1.28 or 2.56 Msym/ s 96 bits 125
#3 QPSK Off 1.28 or 2.56 Msym/ s 96 bits 125
#4 QPSK Off 1.28 or 2.56 Msym/ s 96 bits 125
#5 QPSK Off 1.28 or 2.56 Msym/ s 96 bits 125
Preamble Length Preamble Start Location Preamble Values
***
***
***
***
***
FEC On/Off FEC Codeword Information Bytes (k) FEC Error Correction (T bytes) Last Codeword Length Scrambler On/Off Scrambler Seed Burst Lengthm mini-slots*
Off N/A
On 40
On 56
On 64
On 220
0 to 10
N/A
4
4
4
10
Fixed or Shortened On/Off 15 bits** 0 to 255
N/A On default 4
Fixed On default 0
Fixed On default 0
Fixed On default 0
Fixed On default 0
*A burst length of 0 mini-slots in the Channel Profile means that the burst length is variable on that channel for that burst type. **15 bits in a 16-bit field ***Refer to Section E.2.
148
Radio Frequency Interface Specification
SP-RFI-I03-980202
Table E-3. Example Channel Burst Parameter Values for 16QAM Operation at 160, 320, and 640 ksym/sec
Config. Settings QPSK, 16QAM On/Off 5 configuratio n settings 0, 4-1024 bits 1024 configuratio n settings 1024 programma ble bits On/Off 1 to 255
Parameter Modulation Diff Enc Symbol Rate
#1 16QAM Off 160, 320 or 640 ksym/ sec 80 bits 429
#2 16QAM Off 160, 320 or 640 ksym/ sec 128 bits 385
#3 16QAM Off 160, 320 or 640 ksym/ sec 128 bits 385
#4 16QAM Off 160, 320 or 640 ksym/ sec 128 bits 385
#5 16QAM Off 160, 320 or 640 ksym/ sec 128 bits 385
Preamble Length Preamble Start Location Preamble Values
***
***
***
***
***
FEC On/Off FEC Codeword Information Bytes (k) FEC Error Correction (T bytes) Last Codeword Length Scrambler On/Off Scrambler Seed Burst Lengthm mini-slots*
Off N/A
On 32
On 56
On 64
On 220
0 to 10
N/A
4
7
8
10
Fixed or Shortened On/Off 15 bits** 0 to 255
N/A On default 2
Fixed On default 0
Fixed On default 0
Fixed On default 0
Fixed On default 0
*A burst length of 0 mini-slots in the Channel Profile means that the burst length is variable on that channel for that burst type. **15 bits in a 16-bit field ***Refer to Section E.2.
149
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Table E-4. Example Channel Burst Parameter Values for 16QAM Operation at 1.28 and 2.56 Msym/sec
Config. Settings QPSK, 16QAM On/Off 5 configuratio n settings 0, 4-1024 bits 1024 configuratio n settings 1024 programma ble bits On/Off 1 to 255
Parameter Modulation Diff Enc Symbol Rate
#1 16QAM Off 1.28 or 2.56 Msym/ s 144 bits 709
#2 16QAM Off 1.28 or 2.56 Msym/ s 192 bits 621
#3 16QAM Off 1.28 or 2.56 Msym/ s 192 bits 621
#4 16QAM Off 1.28 or 2.56 Msym/ s 192 bits 621
#5 16QAM Off 1.28 or 2.56 Msym/ s 192 bits 621
Preamble Length Preamble Start Location Preamble Values
***
***
***
***
***
FEC On/Off FEC Codeword Information Bytes (k) FEC Error Correction (T bytes) Last Codeword Length Scrambler On/Off Scrambler Seed Burst Lengthm mini-slots*
Off N/A
On 40
On 56
On 64
On 220
0 to 10
N/A
4
4
4
10
Fixed or Shortened On/Off 15 bits** 0 to 255
N/A On default 4
Fixed On default 0
Fixed On default 0
Fixed On default 0
Fixed On default 0
*A burst length of 0 mini-slots in the Channel Profile means that the burst length is variable on that channel for that burst type. **15 bits in a 16-bit field ***Refer to Section E.2.
150
Radio Frequency Interface Specification
SP-RFI-I03-980202
Table E-5. Example Channel Burst Parameter Values for Power-Up and Acquisition in a New Channel
Config. Parameter Modulation Diff Enc Symbol Rate Settings QPSK, 16QAM On/Off 5 configuration settings 0, 4-1024 bits 1024 configuration settings 1024 programmab le bits On/Off 1 to 255 QPSK Off 160, 320 or 640 ksym/sec 1024 bits 1 #1 QPSK Off 1.28 or 2.56 Msym/s 1024 bits 1 #2 #3 16QAM Off 160, 320 or 640 ksym/sec 1024 bits 1 #4 16QAM Off 1.28 or 2.56 Msym/s 1024 bits 1
Preamble Length Preamble Start Location Preamble Values
***
***
***
***
FEC On/Off FEC Codeword Information Bytes (k) FEC Error Correction (T bytes) Last Codeword Length Scrambler On/Off Scrambler Seed Burst Lengthm mini-slots*
On 60
On 60
On 60
On 60
0 to 10
10
10
10
10
Fixed or Shortened On/Off 15 bits** 0 to 255
Fixed On default 42
Fixed On default 53
Fixed On default 21
Fixed On default 27
*A burst length of 0 mini-slots in the Channel Profile means that the burst length is variable on that channel for that burst type. **15 bits in a 16-bit field ***Refer to Section E.2.
151
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Table E-6. Frame Format Examples with QPSK Operation
160 ksym/ sec 320 ksym/ sec 640 ksym/ sec 1.28 Msym/ sec 2.56 Msym/ sec
Parameter Request Burst -spacing symbols (bytes) i.e., (guard time symbols 1) data symbols (bytes) preamble symbols (bytes) total symbols (bytes) total burst duration (mini-slots) total burst duration (microseconds) information rate (6 bytes per burst) Communication Burst -codewords/burst errors corrected per codeword spacing symbols (bytes) i.e., (guard time symbols 1) data symbols (bytes) parity symbols (bytes) preamble symbols (bytes) total symbols (bytes) total burst duration (mini-slots) total burst duration (microseconds) information rate (excluding MAC Header)
8 (2)
8 (2)
8 (2)
16 (4)
16 (4)
24 (6) 28 (7) 60 (15) 3 375 128 kb/s
24 (6) 28 (7) 60 (15) 3 187.5 256 kb/s
24 (6) 28 (7) 60 (15) 3 93.75 512 kb/s
24 (6) 24 (6) 64 (16) 4 50 960 kb/s
24 (6) 24 (6) 64 (16) 4 25 1.92 Mb/s
1* 4 8 (2)
1* 4 8 (2)
1* 4 8 (2)
1* 4 16 (4)
1* 4 16 (4)
128 (32) 32 (8) 32 (8) 200 (50) 2+8=10 1250 166.4 kb/sec
128 (32) 32 (8) 32 (8) 200 (50) 2+8=10 625 332.8 kb/sec
128 (32) 32 (8) 32 (8) 200 (50) 2+8=10 312.5 665.6 kb/sec
160 (40) 32 (8) 48 (12) 256 (64) 4+12=16 200 1.360 Mb/ sec
160 (40) 32 (8) 48 (12) 256 (64) 4+12=16 100 2.720 Mb/ sec
*The numbers in the table are given for a single codeword, but more codewords can be added, with the same data and parity lengths as given in the table, to create longer bursts.
152
Radio Frequency Interface Specification
SP-RFI-I03-980202
Table E-6. Frame Format Examples with QPSK Operation (continued)
160 ksym/ sec 320 ksym/ sec 640 ksym/ sec 1.28 Msym/ sec 2.56 Msym/ sec
Parameter Communication Burst -codewords/burst errors corrected per codeword spacing symbols (bytes)i.e., (guard time symbols -1) data symbols (bytes) parity symbols (bytes) preamble symbols (bytes) total symbols (bytes) total burst duration (mini-slots) total burst duration (microseconds) information rate (excluding MAC Header) Communication Burst -codewords/burst errors corrected per codeword spacing symbols (bytes) i.e., (guard time symbols 1) data symbols (bytes) parity symbols (bytes) preamble symbols (bytes) total symbols (bytes) total burst duration (mini-slots) total burst duration (microseconds) information rate (excluding MAC Header)
1* 8 8 (2)
1* 8 8 (2)
1* 8 8 (2)
1* 4 16 (4)
1* 4 16 (4)
256 (64) 64 (16) 32 (8) 360 (90) 2+16=18 2250 206.2 kb/sec
256 (64) 64 (16) 32 (8) 360 (90) 2+16=18 1125 412.4 kb/sec
256 (64) 64 (16) 32 (8) 360 (90) 2+16=18 562.5 824.9 kb/sec
256 (64) 32 (8) 48 (12) 352 (88) 4+18=22 275 1.687 Mb/ sec
256 (64) 32 (8) 48 (12) 352 (88) 4+18=22 137.5 3.375 Mb/ sec
1* 10 8 (2)
1* 10 8 (2)
1* 10 8 (2)
1* 10 16 (4)
1* 10 16 (4)
880 (220) 80 (20) 32 (8) 1000 (250) 2+48=50 6250 273.9 kb/sec
880 (220) 80 (20) 32 (8) 1000 (250) 2+48=50 3125 547.8 kb/sec
880 (220) 80 (20) 32 (8) 1000 (250) 2+48=50 1562.5 1.096 Mb/ sec
880 (220) 80 (20) 48 (12) 1024 (256) 4+60=64 800 2.140 Mb/ sec
880 (220) 80 (20) 48 (12) 1024 (256) 4+60=64 400 4.280 Mb/ sec
*The numbers in the table are given for a single codeword, but more codewords can be added, with the same data and parity lengths as given in the table, to create longer bursts.
153
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Table E-6. Frame Format Examples with QPSK Operation (continued)
160 ksym/ sec 320 ksym/ sec 640 ksym/ sec 1.28 Msym/ sec 2.56 Msym/ sec
Parameter Communication Burst -codewords/burst errors corrected per codeword spacing symbols (bytes) i.e., (guard time symbols 1) data symbols (bytes) parity symbols (bytes) preamble symbols (bytes) total symbols (bytes) total burst duration (mini-slots) total burst duration (microseconds) information rate (excluding MAC Header) Communication Burst -codewords/burst errors corrected per codeword spacing symbols (bytes) i.e., (guard time symbols 1) data symbols (bytes) parity symbols (bytes) preamble symbols (bytes) total symbols (bytes) total burst duration (mini-slots) total burst duration (microseconds) information rate (excluding MAC Header)
4* 8 8 (2)
4* 8 8 (2)
4* 8 8 (2)
4* 4 16 (4)
4* 4 16 (4)
1024 (256) 256 (64) 32 (8) 1320 (330) 2+16*4=66 8250 242.4 kb/sec
1024 (256) 256 (64) 32 (8) 1320 (330) 2+16*4=66 4125 484.8 kb/sec
1024 (256) 256 (64) 32 (8) 1320 (330) 2+16*4=66 2062.5 969.7 kb/sec
1024 (256) 128 (32) 48 (12) 1216 (304) 4+18*4=76 950 2.105 Mb/ sec
1024 (256) 128 (32) 48 (12) 1216 (304) 4+18*4=76 475 4.211 Mb/ sec
4* 10 8 (2)
4* 10 8 (2)
4* 10 8 (2)
4* 10 16 (4)
1* 10 16 (4)
3520 (880) 320 (80) 32 (8) 3880 (970) 2+48*4=194 24,250 288.3 kb/sec
3520 (880) 320 (80) 32 (8) 3880 (970) 2+48*4=194 12,125 576.7 kb/sec
3520 (880) 320 (80) 32 (8) 3880 (970) 2+48*4=194 6062.5 1.153 Mb/ sec
3520 (880) 320 (80) 48 (12) 3904 (976) 4+60*4=244 3050 2.292 Mb/ sec
3520 (880) 320 (80) 48 (12) 3904 (976) 4+60*4=244 1525 4.585 Mb/ sec
*The numbers in the table are given for four codewords per burst, but more or fewer codewords can be used, with the same data and parity lengths as given in the table.
154
Radio Frequency Interface Specification
SP-RFI-I03-980202
Table E-7. Frame Format Examples with 16QAM Operation
160 ksym/ sec 320 ksym/ sec 640 ksym/ sec 1.28 Msym/ sec 2.56 Msym/ sec
Parameter Request Burst -spacing symbols (bytes) i.e., (guard time symbols 1) data symbols (bytes) preamble symbols (bytes) total symbols (bytes) total burst duration (mini-slots) total burst duration (microseconds) information rate (6 bytes per burst) Communication Burst -codewords/burst errors corrected per codeword spacing symbols (bytes) i.e., (guard time symbols 1) data symbols (bytes) parity symbols (bytes) preamble symbols (bytes) total symbols (bytes) total burst duration (mini-slots) total burst duration (microseconds) information rate (excluding MAC Header)
8 (4)
8 (4)
8 (4)
16 (8)
16 (8)
12 (6) 20 (10) 40 (20) 2 250 192 kb/sec
12 (6) 20 (10) 40 (20) 2 125 384 kb/sec
12 (6) 20 (10) 40 (20) 2 62.5 768 kb/sec
12 (6) 36 (18) 64 (32) 4 50 960 kb/sec
12 (6) 36 (18) 64 (32) 4 25 1.920 Mb/ sec
1* 4 8 (4)
1* 4 8 (4)
1* 4 8 (4)
1* 4 16 (8)
1* 4 16 (8)
64 (32) 16 (8) 32 (16) 120 (60) 2+4=6 750 277.3 kb/sec
64 (32) 16 (8) 32 (16) 120 (60) 2+4=6 375 554.7 kb/sec
64 (32) 16 (8) 32 (16) 120 (60) 2+4=6 187.5 1.109 Mb/ sec
80 (40) 16 (8) 48 (24) 160 (80) 4+6=10 125 2.176 Mb/ sec
80 (40) 16 (8) 48 (24) 160 (80) 4+6=10 62.5 4.352 Mb/ sec
*The numbers in the table are given for a single codeword, but more codewords can be added, with the same data and parity lengths as given in the table, to create longer bursts.
155
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Table E-7. Frame Format Examples with 16QAM Operation (continued)
160 ksym/ sec 320 ksym/ sec 640 ksym/ sec 1.28 Msym/ sec 2.56 Msym/ sec
Parameter Communication Burst -codewords/burst errors corrected per codeword spacing symbols (bytes) i.e., (guard time symbols 1) data symbols (bytes) parity symbols (bytes) preamble symbols (bytes) total symbols (bytes) total burst duration (mini-slots) total burst duration (microseconds) information rate (excluding MAC Header) Communication Burst -codewords/burst errors corrected per codeword spacing symbols (bytes) i.e., (guard time symbols 1) data symbols (bytes) parity symbols (bytes) preamble symbols (bytes) total symbols (bytes) total burst duration (mini-slots) total burst duration (microseconds) information rate (excluding MAC Header)
1* 7 8 (4)
1* 7 8 (4)
1* 7 8 (4)
1* 4 16 (8)
1* 4 16 (8)
128 (64) 32 (16) 32 (16) 200 (100) 2+8=10 1250 371.2 kb/sec
128 (64) 32 (16) 32 (16) 200 (100) 2+8=10 625 742.4 kb/sec
128 (64) 32 (16) 32 (16) 200 (100) 2+8=10 312.5 1.455 Mb/ sec
128 (64) 16 (8) 48 (24) 208 (104) 4+9=13 162.5 2.855 Mb/ sec
128 (64) 16 (8) 48 (24) 208 (104) 4+9=13 81.25 5.711 Mb/ sec
1* 10 8 (4)
1* 10 8 (4)
1* 10 8 (4)
1* 10 16 (8)
1* 10 16 (8)
440 (220) 40 (20) 32 (16) 520 (260) 2+24=26 3250 526.8 kb/sec
440 (220) 40 (20) 32 (16) 520 (260) 2+24=26 1625 1.054 Mb/ sec
440 (220) 40 (20) 32 (16) 520 (260) 2+24=26 812.5 2.107 Mb/ sec
440 (220) 40 (20) 48 (24) 544 (272) 4+30=34 425 4.028 Mb/ sec
440 (220) 40 (20) 48 (24) 544 (272) 4+30=34 212.5 8.056 Mb/ sec
*The numbers in the table are given for a single codeword, but more codewords can be added, with the same data and parity lengths as given in the table, to create longer bursts.
156
Radio Frequency Interface Specification
SP-RFI-I03-980202
Table E-7. Frame Format Examples with 16QAM Operation (continued)
160 ksym/ sec 320 ksym/ sec 640 ksym/ sec 1.28 Msym/ sec 2.56 Msym/ sec
Parameter Communication Burst -codewords/burst errors corrected per codeword spacing symbols (bytes) i.e., (guard time symbols 1) data symbols (bytes) parity symbols (bytes) preamble symbols (bytes) total symbols (bytes) total burst duration (mini-slots) total burst duration (microseconds) information rate (excluding MAC Header) Communication Burst -codewords/burst errors corrected per codeword spacing symbols (bytes) i.e., (guard time symbols 1) data symbols (bytes) parity symbols (bytes) preamble symbols (bytes) total symbols (bytes) total burst duration (mini-slots) total burst duration (microseconds) information rate (excluding MAC Header)
4* 7 8 (4)
4* 7 8 (4)
4* 7 8 (4)
4* 4 16 (8)
4* 4 16 (8)
512 (256) 128 (64) 32 (16) 680 (340) 2+8*4=34 4250 470.6 kb/sec
512 (256) 128 (64) 32 (16) 680 (340) 2+8*4=34 2125 941.2 kb/sec
512 (256) 128 (64) 32 (16) 680 (340) 2+8*4=34 1062.5 1.882 Mb/ sec
512 (256) 64 (32) 48 (24) 640 (320) 4+9*4=40 500 4.000 Mb/ sec
512 (256) 64 (32) 48 (24) 640 (320) 4+9*4=40 250 8.000 Mb/ sec
4* 10 8 (4)
4* 10 8 (4)
4* 10 8 (4)
4* 10 16 (8)
4* 10 16 (8)
1760 (880) 160 (80) 32 (16) 1960 (980) 2+24*4=98 12,250 570.8 kb/sec
1760 (880) 160 (80) 32 (16) 1960 (980) 2+24*4=98 6125 1.142 Mb/ sec
1760 (880) 160 (80) 32 (16) 1960 (980) 2+24*4=98 3062.5 2.283 Mb/ sec
1760 (880) 160 (80) 48 (24) 1984 (992) 4+30*4=124 1550 4.511 Mb/ sec
1760 (880) 160 (80) 48 (24) 1984 (992) 4+30*4=124 775 9.022 Mb/ sec
*The numbers in the table are given for four codewords per burst, but more or fewer codewords can be used, with the same data and parity lengths as given in the table.
157
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
This page intentionally left blank.
158
Radio Frequency Interface Specification
SP-RFI-I03-980202
Appendix F. Upstream Modulation Rates
F.1 Introduction
The sources of ingress are not randomly distributed throughout the upstream cable network spectrum, but are grouped in frequency bands accordance with the International Radio Regulations, which is an international treaty subscribed to by most countries of the world. In some bands, higher powers are used, so ingress is more likely to be found there. The pattern of allocations can be readily recognized by examination of the upstream cable network band with a spectrum analyzer. The upstream modulation rates and flexibility in selecting upstream carrier frequencies defined in this document permit operators to position carriers in those portions of the upstream cable network spectrum which are less prone to narrowband ingress.
F.2 Sources of Narrowband Ingress
Radio transmitters in the high-frequency (HF) portion of the radio spectrum (3 to 30 MHz) are the major sources of narrowband ingress. The transmitters that can affect upstream cable network paths may be local, domestic or in other countries. F.2.1 HF Propagation
HF propagation is largely influenced by bending of radio waves in the ionosphere, which is a region between about 60 and 200 miles above the earth, so propagation distances can be very large. The bending is caused by ionization of free electrons by ultra-violet rays from the sun. There are several reflecting layers at various heights with differing characteristics, so the maximum usable frequency and distance reached depend on the time of day and solar activity. Diurnal Variation - During local daytime, the higher frequencies are propagated over long distances and the lower frequencies are absorbed. During local night-time, the lower frequencies are propagated over distances which are not quite so large, and the higher frequencies experience diminished or no propagation. Solar Cycle - Ionization is at its greatest during the peak of the 11-year sunspot cycle. At the largest sunspot peaks, strong distant signals can be heard across the HF band at most times of the day. At sunspot minima, longdistance propagation can be rare above about 15 MHz. Note that the cycle is currently at a minimum, so ingress is likely to affect cable systems on an increasing basis and at higher frequencies over the next 5 to 6 years. F.2.2 Users of the HF Radio Spectrum
The main users of the HF radio spectrum are
* * * * * * * *
Broadcasting Maritime mobile Aeronautical mobile Aeronautical navigation Fixed (i.e., point-to-point) Standard frequency and time signals Amateur Citizens Band (CB)
159
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
The service of greatest concern for ingress is the Broadcasting Service. The Amateur and Citizens Band services are also of concern. F.2.3 Broadcasting
The main ingress signals seen on typical cable networks are short-wave Broadcasting signals. The Broadcasting service is designed to provide very high field strengths in target markets so that the public can receive clear signals with simple receivers. Thus the service generally has these characteristics:
* * * *
Amplitude-modulated signals Very high transmitter powers High-gain, directive antenna arrays Simultaneous transmission on multiple frequencies in different parts of the HF spectrum, to combat HF propagation variability.
* Very large field strengths over a wide geographic area, affecting entire cable systems.
The frequencies allocated to the Broadcasting Service on a world-wide basis are shown in Table F-1.
Table F-1. Broadcasting Allocations Between 5 and 42 MHz
Frequency, kHz From 5,950 7,100 9,500 11,650 13,600 15,100 17,550 21,450 25,670 To 6,200 7,300 9,900 12,050 13,800 15,600 17,900 21,850 26,100
Note: Although 7,100-7,300 kHz is not allocated to Broadcasting in ITU Region 2 (the Americas), strong signals reach the USA and Canada from the other ITU Regions.
F.2.4
Amateur and CB
The Amateur Service is of concern, but for different reasons. Amateur transmitters operate at far lower powers than the Broadcasting Service, but are located in residential neighborhoods close to the cable plant, so they can represent potential localized sources of ingress in different bands across the HF spectrum. Radiation from the upstream cable plant may also cause interference into amateur receivers. The Citizens Band Service operates at powers which are very much lower and are less likely to be sources of ingress. However, CB receivers may be capable of picking up interference from cable plant radiation. The allocations in the USA and Canada for the Amateur and Citizens Band Services between 5 and 42 MHz are in Table F-2.
160
Radio Frequency Interface Specification
SP-RFI-I03-980202
Table F-2. Amateur and Citizens Band Allocations Between 5 and 42 MHz
Frequency, kHz From 7,000 10,100 14,000 18,068 21,000 24,890 26,960 28,000 To 7,300 10,150 14,350 18,168 21,450 24,990 27,240 29,700
F.2.5
Other Services
The other services in the HF spectrum operate at powers which are lower than Broadcasting, and are usually not located in residential areas, so they are less likely to be of concern. In the low VHF region between 30 and 42 MHz, there may be a localized effect from high-power paging in the vicinity of 35 MHz.
F.3 Fitting Data Carriers Within the Ingress Gaps
The range of modulation rates and the flexibility in setting upstream carrier frequencies defined in this document permit operators to fit data-over-cable carriers in the gaps between the short-wave Broadcasting bands, to avoid this significant source of ingress. They also permit operators to avoid the Amateur and Citizens Band bands as well. Table F-3 illustrates the quantity of data carriers that can be derived in the gaps between the Broadcasting allocations at the channel widths specified in this document, and the resulting utilization of the available spectrum. Table F-4 shows a similar illustration for the gaps between the Broadcasting, Amateur and CB allocations. A conservative upper limit of 40 MHz is used.
161
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Table F-3. Data Carriers in the Gaps Between Broadcasting Bands
Data Carrier Width, kHz Non-Broadcast Spectrum, kHz From 5,000 6,200 7,300 9,900 12,050 13,800 15,600 17,900 21,850 26,100 Least Gap, kHz Total Carriers Total Bandwidth, kHz Utilization, % 31,870 To 5,950 7,100 9,500 11,650 13,600 15,100 17,550 21,450 25,670 40,000 Gap 950 900 2,200 1,750 1,550 1,300 1,950 3,550 3,820 13,900 900 154 30,800 97 74 29,600 93 35 28,000 88 15 24,000 75 6 19,200 60 4 4 11 8 7 6 9 17 19 69 200 400 800 1,600 3,200 Data Carriers Available 2 2 5 4 3 3 4 8 9 34 1 1 2 2 1 1 2 4 4 17 0 0 1 1 0 0 1 2 2 8 0 0 0 0 0 0 0 1 1 4
Table F-4. Data Carriers in the Gaps Between Broadcasting, Amateur and CB Bands
Spectrum Other than Broadcast, Amateur, CB, kHz From 5,000 6,200 7,300 9,900 10,150 12,050 13,800 14,350 15,600 17,900 18,168 21,850 24,990 26,100 27,410 29,700 Least Gap, kHz Total Carriers Total Bandwidth, kHz Utilization, % 28,570 To 5,950 7,000 9,500 10,100 11,650 13,600 14,000 15,100 17,550 18,068 21,000 24,890 25,670 26,960 28,000 40,000 Gap 950 800 2,200 200 1,500 1,550 200 750 1,950 168 2,832 3,040 680 860 590 10,300 168 136 27,200 95 63 25,200 88 27 21,600 76 10 16,000 56 3 9,600 34 4 4 11 1 7 7 1 3 9 0 14 15 3 4 2 51 200 Data Carrier Width, kHz 400 800 1,600 3,200 Data Carriers Available 2 2 5 0 3 3 0 1 4 0 7 7 1 2 1 25 1 1 2 0 1 1 0 0 2 0 3 3 0 1 0 12 0 0 1 0 0 0 0 0 1 0 1 1 0 0 0 6 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 3
162
Radio Frequency Interface Specification
SP-RFI-I03-980202
Appendix G. Example: Multiple Upstream Channels
This appendix presents an example of several upstream channels served by a single downstream channel. This is meant to illustrate one topology and one implementation of that topology. Suppose one downstream channel is used in conjunction with four upstream channels as shown in Figure G-1. In this case, the four upstream channels are separate fibers serving four geographical communities of modems.
CMTS
CM
CM
CM CM
Figure G-1. One Downstream and Four Upstream Channels
In this topology, the CMTS transmits four Upstream Channel Descriptors (UCDs) and four MAPs. Unfortunately, each CM cannot determine to which upstream channel it is attached, because there is no way to convey the geographical information on the shared downstream channel. The CM must assume (at least at initialization) that the UCD and MAP apply to the channel to which it is attached. The CM chooses an Initial Maintenance opportunity on any of the channels and transmits a Ranging Request. The CMTS will receive the request and will redirect the CM to the appropriate upstream channel identifier. From then on, the CM will be using the MAP that is appropriate to the fiber branch to which it is connected. A number of constraints are imposed by this topology:
* All of the upstream channels must operate at the same frequency. Since the CM is choosing a channel
descriptor at random, it would be transmitting on the wrong frequency if it chose the UCD that applied to a different fiber path.
* All of the upstream channels must operate at the same symbol rate. If not, the CMTS would be unable to
demodulate the Ranging Request if transmitted at the wrong symbol rate for the particular channel.
* All Initial Maintenance opportunities across all fiber branches must be aligned. When the CM randomly
chooses a MAP to use, the CMTS must be prepared to receive a Ranging Request at that time.
* All Initial Maintenance opportunities must use the same burst characteristics so that the CMTS can demodulate the Ranging Request. Note that only the initialization intervals must be aligned. Once the CM is assigned its proper channel ID, its activities need only be aligned with other users of its fiber branch. Ordinary data transmission and requests for bandwidth may occur independently across the four upstream channels.
163
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
This page intentionally left blank.
164
Radio Frequency Interface Specification
SP-RFI-I03-980202
Appendix H. The Data-Over-Cable Spanning Tree Protocol
Section 3.1.2.1 requires the use of the spanning tree protocol on CMs that are intended for commercial use and on bridging CMTSs. This appendix describes how the 802.1d spanning tree protocol is adapted to work for data over cable systems.
H.1 Background
A spanning tree protocol is frequently employed in a bridged network in order to deactivate redundant network connections; i.e., to reduce an arbitrary network mesh topology to an active topology that is a rooted tree that spans all of the network segments. The spanning tree algorithm and protocol should not be confused with the data-forwarding function itself; data forwarding may follow transparent learning bridge rules, or may employ any of several other mechanisms. By deactivating redundant connections, the spanning tree protocol eliminates topological loops, which would otherwise cause data packets to be forwarded forever for many kinds of forwarding devices. A standard spanning tree protocol [IEEE 802.1d] is employed in most bridged local area networks. This protocol was intended for private LAN use and requires some modification for cable data use.
H.2 Public Spanning Tree
To use a spanning tree protocol in a public-access network such as data-over-cable, several modifications are needed to the basic IEEE 802.1d process. Primarily, the public spanning tree must be isolated from any private spanning tree networks to which it is connected. This is to protect both the public cable network and any attached private networks. Figure H-1 illustrates the general topology.
Bridged Private Network Cable Modem CMTS Cable Modem Cable Modem
Bridged Private Network
Figure H-1. Spanning Tree Topology
The task for the public spanning tree protocol, with reference to Figure H-1, is to:
* Isolate the private bridged networks from each other. If the two private networks merge spanning trees then
each is subject to instabilities in the other's network. Also, the combined tree may exceed the maximum allowable bridging diameter.
165
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
* Isolate the public network from the private networks' spanning trees. The public network must not be subject
to instabilities induced by customers' networks; nor should it change the spanning tree characteristics of the customers' networks.
* Disable one of the two redundant links into the cable network, so as to prevent forwarding loops. This should
occur at the cable modem, rather than at an arbitrary bridge within the customer's network. The spanning tree protocol must also serve the topology illustrated in Figure H-2:
Link-X
CMTS (bridge) Cable Modem
Switched/ Bridged Headend Network CMTS (bridge)
Bridged Private Network Cable Modem
Figure H-2. Spanning Tree Across CMTSs
In Figure H-2, in normal operation the spanning tree protocol should deactivate a link at one of the two cable modems. It should not divert traffic across the private network. Note that in some circumstances, such as deactivation of Link-X, spanning tree will divert traffic onto the private network (although limits on learned MAC addresses will probably throttle most transit traffic). If this diversion is undesirable, then it must be prevented by means external to spanning tree; for example, by using routers.
H.3 Public Spanning Tree Protocol Details
The Data over Cable Spanning Tree algorithm and protocol is identical to that defined in [IEEE 802.1d], with the following exceptions:
* When transmitting Configuration Bridge Protocol Data Units (BPDUs), the Data over Cable Spanning Tree
Multicast Address 01-E0-2F-00-00-03 is used rather rather than that defined in IEEE 802.1d. These BPDUs will be forwarded rather than recalculated by ordinary IEEE 802.1d bridges.
* When transmitting Configuration BPDUs, the SNAP header AA-AA-03-00-E0-2F-73-74 is used rather than
the LLC 42-42-03 header employed by 802.1d. This is to further differentiate these BPDUs from those used by IEEE 802.1d bridges, in the event that some of those bridges do not correctly identify multicast MAC addresses.1
* IEEE 802.1d BPDUs are ignored and silently discarded.
1. It is likely that there are a number of spanning tree bridges deployed which rely solely on the LSAPs to distinguish 802.1d packets. Such devices would not operate correctly if the data-over-cable BPDUs also used LSAP=0x42.
166
Radio Frequency Interface Specification
SP-RFI-I03-980202
* Topology Change Notification (TCN) PDUs are not transmitted (or processed). TCNs are used in IEEE networks to accelerate the aging of the learning database when the network topology may have changed. Since the learning mechanism within the cable network typically differs, this message is unnecessary and may result in unnecessary flooding.
* CMTSs operating as bridges must participate in this protocol and must be assigned higher priorities (more
likely to be root) than cable modems. The NSI interface on the CMTS SHOULD be assigned a port cost equivalent to a link speed of at least 100 Mbps. These two conditions, taken together, should ensure that (1) a CMTS is the root, and (2) any other CMTS will use the head-end network rather than a customer network to reach the root.
* The MAC Forwarder of the CMTS MUST forward BPDUs from upstream to downstream channels, whether
or not the CMTS is serving as a router or a bridge. Note that CMs with this protocol enabled will transmit BPDUs onto subscriber networks in order to identify other CMs on the same subscriber network. These public spanning tree BPDUs will be carried transparently over any bridged private subscriber network. Similarly, bridging CMTSs will transmit BPDUs on the NSI as well as on the RFI interface. The multicast address and SNAP header defined above are used on all links.
H.4 Spanning Tree Parameters and Defaults
Section 4.10.2 of [IEEE 802.1d] specifies a number of recommended parameter values. Those values should be used, with the exceptions listed below: Path Cost In [IEEE 802.1d], the following formula is used: Path_Cost = 1000 / Attached_LAN_speed_in_Mb/s For CMs, this formula is adapted as: Path_Cost = 1000 / (Upstream_symbol_rate * bits_per_symbol_for_long_data_grant) That is, the modulation type (QPSK or 16QAM) for the Long Data Grant IUC is multiplied by the raw symbol rate to determine the nominal path cost. Table H-1 provides the derived values.
Table H-1. CM Path Cost
Symbol Rate ksym/sec 160 320 640 1280 2560 Default Path Cost QPSK 3125 1563 781 391 195 16QAM 1563 781 391 195 98
For CMTSs, this formula is: Path_Cost = 1000 / (Downstream_symbol_rate * bits_per_symbol)
167
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Bridge Priority The Bridge Priority for CMs SHOULD default to 28672 (0x7000). This is to bias the network so that the root will tend to be at the CMTS. The CMTS SHOULD default to 32768, as per 802.1d. Note that both of these recommendations affect only the default settings. These parameters, as well as others defined in 802.1d, SHOULD be manageable throughout their entire range through the Bridge MIB (RFC-1493) or other means.
168
Radio Frequency Interface Specification
SP-RFI-I03-980202
Appendix I. References
[CableLabs1] Two-Way Cable Television System Characterization, Cable Television Laboratories, Inc., April 12, 1995. Digital Transmission Characterization of Cable Television Systems, Cable Television Laboratories, Inc., November, 1994. Ethernet Protocol Version 2.0, Digital, Intel, Xerox, 1982. IEEE Std 802-1990, Local and Metropolitan Area Networks: Overview and Architecture. IEEE Draft Standard 802.1Q/D4. Draft Standard for Virtual Bridged Local Area Networks. December 20, 1996. F-Connector Specification, Society of Cable Television Engineers EIA Interim Standard IS-6 (1983) - Recommended Cable TV Channel Identification Plan. ISO 8025 (December 1987) -- Information processing systems - Open Systems Interconnection - Specification of the Basic Encoding Rules for Abstract Syntax Notation One (ASN.1). ISO/IEC 8802-2: 1994 (IEEE Std 802.2: 1994) - Information technology Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 2: Logical link control ISO/IEC 8802-3: 1996 (IEEE Std 802.3: 1996) - Information technology Telecommunications and information exchange between systems - Local and metropolitan area networks - Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical sublayer specifications. ISO/IEC 10038 (ANSI/IEEE Std 802.1D): 1993, Information technology Telecommunications and information exchange between systems - Local area networks Media access control (MAC) bridges. ISO/IEC 10039:1991 Information technology - Open Systems Interconnection -Local area networks -Medium Access Control (MAC) service definition. ISO/IEC 10039:1991 Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Common specifications - Part 1: Medium Access Control (MAC) service definition. ITU-T Recommendation H.222.0 (1995) | ISO/IEC 13818-1:1996, Information technology -- generic coding of moving pictures and associated audio information systems. Appendix B to ITU-T Recommendation J.83 (10/95), Digital multi-programme systems for television sound and data services for cable distribution. ITU-T Recommendation X.25(03/93), Interface between data terminal equipment and data circuit-terminating equipment for terminals operating in the packet mode and connected to public data networks by dedicated circuit.
[CableLabs2]
[DIX] [IEEE802] [IEEE802.1Q]
[IPS-SP-401] [IS-6] [ISO8025]
[ISO8802-2]
[ISO8802-3]
[ISO/IEC10038]
[ISO/IEC10039]
[ISO/IEC15802-1]
[ITU-T H.222.0]
[ITU-T J.83-B]
[ITU-T X.25]
169
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
[ITU-T Z.100]
ITU-T Recommendation Z.100 (3/93) - CCITT Specification and description language (SDL). Data-Over-Cable Service Interface Specifications, Security System Interface Specification, SP-SSI-I01-970506. Data-Over-Cable Service Interface Specifications, Cable Modem Termination System Network Side Interface Specification, SP-CMTS-NSI-I01-960702. Data-Over-Cable Service Interface Specifications, Cable Modem to Customer Premise Equipment Interface Specification, SP-CMCI-I01-960702. Data-Over-Cable Service Interface Specifications, Operations Support System Interface Specification, SP-OSSI-I01-970403. Data-Over-Cable Service Interface Specifications, Cable Modem Telephony Return Interface Specification, SP-CMTRI-I01-970804. Data-Over-Cable Service Interface Specifications, Removable Security Module Interface Specification, SP-RSM-D02-971004 (in preparation). Data-Over-Cable Service Interface Specifications, Baseline Privacy Interface Specification, SP-BPI-I01-970609. NCTA Recommended Practices for measurement on Cable Television Systems - National Cable Television Association, Washington DC, 2nd Edition, revised October, 1993. Postel, J., Internet Protocol, IETF RFC-791 (MIL STD 1777), September, 1981. Plummer, D., Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48-bit Ethernet address for transmission on Ethernet hardware, November, 1982. Harrenstien, K., and Postel, J., Time Protocol, IETF RFC-868, May 1983. Postel, J., and Reynolds, J., A Standard for the Transmission of IP Datagrams over IEEE 802 Networks, IETF RFC-1042, February, 1988. Hedrick, C., Routing Information Protocol, IETF RFC-1058, June, 1988. Schoffstall, M., Fedor, M., Davin, J. and Case, J., A Simple Network Management Protocol (SNMP), IETF RFC-1157, May, 1990. Sollings, K., The TFTP Protocol (Revision 2), IETF RFC-1350, July, 1992. Definitions of Managed Objects for Bridges. E. Decker, P. Langille, A. Rijsinghani, & K. McCloghrie. July 1993. (Obsoletes RFC1286) Alexander, S., and Droms, R., DHCP Options and BOOTP Vendor Extensions, IETF RFC-1533, October, 1993. Droms, R., Dynamic Host Configuration Protocol, IETF RFC-1541, October, 1993.
[MCNS2]
[MCNS3]
[MCNS4]
[MCNS5]
[MCNS6]
[MCNS7]
[MCNS8]
[NCTA]
[RFC-791] [RFC-826]
[RFC-868] [RFC-1042]
[RFC-1058] [RFC-1157]
[RFC-1350] [RFC-1493]
[RFC-1533]
[RFC-1541]
170
Radio Frequency Interface Specification
SP-RFI-I03-980202
[RFC-1633]
Braden, R., Clark, D., and Shenker, S., Integrated Services in the Internet Architecture: An Overview, IETF RFC-1633, June, 1994. Baker, F., Requirements for IP Version 4 Routers, IETF RFC-1812. June, 1995. Krawczyk, H., Bellare, M., and Canetti, R., HMAC: Keyed-Hashing for Message Authentication, IETF RFC-2104, February, 1997. The Spectrum Management Application (SMA) and the Common Spectrum Management Interface (csmi), Time Warner Cable, December 24, 1995.
[RFC-1812] [RFC-2104]
[SMS]
171
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
This page intentionally left blank.
172
Radio Frequency Interface Specification
SP-RFI-I03-980202
Appendix J. Glossary
Address Resolution Protocol (ARP) A protocol of the IETF for converting network addresses to 48-bit Ethernet addresses. American National Standards Institute (ANSI) A US standards body. ANSI See American National Standards Institute. ARP See Address Resolution Protocol. Asynchronous Transfer Mode (ATM) A protocol for the transmission of a variety of digital signals using uniform 53-byte cells. ATM See Asynchronous Transfer Mode. Availability In cable television systems, availability is the long-term ratio of the actual RF channel operation time to scheduled RF channel operation time (expressed as a percent value) and is based on a bit error rate (BER) assumption. BPDU See Bridge Protocol Data Unit. Bridge Protocol Data Unit (BDU) Spanning tree protocol messages as defined in [ISO/IEC10038]. Broadcast Addresses A predefined destination address that denotes the set of all data network service access points. Burst Error Second Any Errored Second containing at least 100 errors. Cable Modem (CM) A modulator-demodulator at subscriber locations intended for use in conveying data communications on a cable television system. Cable Modem Termination System (CMTS) Cable modem termination system, located at the cable television system headend or distribution hub, which provides complementary functionality to the cable modems to enable data connectivity to a wide-area network. Cable Modem Termination System - Network Side Interface (CMTS-NSI) The interface, defined in [MCNS3], between a CMTS and the equipment on its network side. Cable Modem to CPE Interface (CMCI) The interface, defined in [MCNS4], between a CM and CPE.
173
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Carrier Hum Modulation The peak-to-peak magnitude of the amplitude distortion relative to the RF carrier signal level due to the fundamental and low-order harmonics of the power-supply frequency. Carrier-to-Noise Ratio (C/N or CNR) The square of the ratio of the root mean square (rms) of the voltage of the digitally-modulated RF carrier to the rms of the continuous random noise voltage in the defined measurement bandwidth. (If not specified explicitly, the measurement bandwidth is the symbol rate of the digital modulation; for video it is 4 MHz). CM See Cable Modem. CMCI See Cable Modem to CPE Interface. CMTS See Cable Modem Termination System. CMTS-NSI See Cable Modem Termination System - Network Side Interface. Composite Second Order Beat (CSO) The peak of the average level of distortion products due to second-order non-linearities in cable system equipment. Composite Triple Beat (CTB) The peak of the average level of distortion components due to third-order non-linearities in cable system equipment. CPE See Customer Premises Equipment. Cross-Modulation A form of television signal distortion where modulation from one or more television channels is imposed on another channel or channels. Customer See End User. Customer Premises Equipment (CPE) Equipment at the end user's premises; MAY be provided by the end user or the service provider. Data Link Layer Layer 2 in the Open System Interconnection (OSI) architecture; the layer that provides services to transfer data over the transmission link between open systems. DHCP See Dynamic Host Configuration Protocol. Distribution Hub A location in a cable television network which performs the functions of a Headend for customers in its immediate area, and which receives some or all of its television program material from a Master Headend in the same metropolitan or regional area.
174
Radio Frequency Interface Specification
SP-RFI-I03-980202
Downstream In cable television, the direction of transmission from the headend to the subscriber. Drop Cable Coaxial cable that connects to a residence or service location from a directional coupler (tap) on the nearest coaxial feeder cable. Dynamic Host Configuration Protocol (DHCP) An Internet protocol used for assigning network-layer (IP) addresses. Dynamic Range The ratio between the greatest signal power that can be transmitted over a multichannel analog transmission system without exceeding distortion or other performance limits, and the least signal power that can be utilized without exceeding noise, error rate or other performance limits. ECN Engineering Change Notice: The final step in the procedure to change specifications. ECO Engineering Change Order: The second step in the procedure to change specifications. DOCSIS posts ECO to web site EC table and ECO page (with indication of ECO Comment Deadline). DOCSIS issues ECO announcement to DOCSIS-announce and working group mail lists (with indication of ECO Comment Deadline). ECR Engineering Change Request: The first step in the procedure to change specifications. DOCSIS issues ECR number, posts to web site EC table and ECR page. DOCSIS sends ECR to subject area working group mail list (and author). Electronic Industries Association (EIA) A voluntary body of manufacturers which, among other activities, prepares and publishes standards. End User A human being, organization, or telecommunications system that accesses the network in order to communicate via the services provided by the network. Engineering Change Notice See ECN Engineering Change Order See ECO Engineering Change Request See ECR Errored Second Any 1-sec interval containing at least one bit error. Extended Subsplit A frequency division scheme that allows bidirectional traffic on a single coaxial cable. Reverse path signals come to the headend from 5 to 42 MHz. Forward path signals go from the headend from 50 or 54 MHz to the upper frequency limit. FDDI See Fiber Distributed Data Interface.
175
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Feeder Cable Coaxial cables that run along streets within the served area and connect between the individual taps which serve the customer drops. Fiber Distributed Data Interface (FDDI) A fiber-based LAN standard. Fiber Node A point of interface between a fiber trunk and the coaxial distribution. Forward Channel The direction of RF signal flow away from the headend toward the end user; equivalent to Downstream. Group Delay The difference in transmission time between the highest and lowest of several frequencies through a device, circuit or system. Guard Time Minimum time allocated between bursts in the upstream referenced from the symbol center of the last symbol of a burst to the symbol center of the first symbol of the following burst. The guard time should be at least the duration of five symbols plus the maximum system timing error. Harmonic Related Carrier (HRC) A method of spacing television channels on a cable television system in exact 6-MHz increments, with all carrier frequencies harmonically related to a common reference. Headend The central location on the cable network that is responsible for injecting broadcast video and other signals in the downstream direction. See also Master Headend, Distribution Hub. Header Protocol control information located at the beginning of a protocol data unit. HFC See Hybrid Fiber/Coax (HFC) System. High Frequency (HF) Used in this document to refer to the entire subsplit (5-30 MHz) and extended subsplit (5-42 MHz) band used in reverse channel communications over the cable television network. High Return A frequency division scheme that allows bi-directional traffic on a single coaxial cable. Reverse channel signals propagate to the headend above the downstream passband. Hum Modulation Undesired modulation of the television visual carrier by the fundamental or low-order harmonics of the power supply frequency, or other low-frequency disturbances. Hybrid Fiber/Coax (HFC) System A broadband bidirectional shared-media transmission system using fiber trunks between the headend and the fiber nodes, and coaxial distribution from the fiber nodes to the customer locations. ICMP See Internet Control Message Protocol.
176
Radio Frequency Interface Specification
SP-RFI-I03-980202
IEEE See Institute of Electrical and Electronic Engineers. IETF See Internet Engineering Task Force. Incremental Related Carriers (IRC) A method of spacing NTSC television channels on a cable television system in which all channels except 5 and 6 correspond to the standard channel plan, used to reduce composite triple beat distortions. Institute of Electrical and Electronic Engineers (IEEE) A voluntary organization which, among other things, sponsors standards committees and is accredited by the American National Standards Institute. International Electrotechnical Commission (IEC) An international standards body. International Organization for Standardization (ISO) An international standards body, commonly known as the International Standards Organization. Internet Control Message Protocol (ICMP) An Internet network-layer protocol. Internet Engineering Task Force (IETF) A body responsible, among other things, for developing standards used in the Internet. Impulse Noise Noise characterized by non-overlapping transient disturbances. Internet Protocol (IP) An Internet network-layer protocol. IP See Internet Protocol. Latency The time, expressed in quantity of symbols, taken for a signal element to pass through a device. Layer A subdivision of the Open System Interconnection (OSI) architecture, constituted by subsystems of the same rank LLC See Logical Link Control (LLC) procedure. Local Area Network (LAN) A non-public data network in which serial transmission is used for direct data communication among data stations located on the user's premises. Logical Link Control (LLC) procedure In a local area network (LAN) or a Metropolitan Area Network (MAN), that part of the protocol that governs the assembling of data link layer frames and their exchange between data stations, independent of how the transmission medium is shared.
177
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
MAC See Media Access Control (MAC) procedure. MAC Service Access Point See Section 6.1.2.1. Master Headend A headend which collects television program material from various sources by satellite, microwave, fiber and other means, and distributes this material to Distribution Hubs in the same metropolitan or regional area. A Master Headend MAY also perform the functions of a Distribution Hub for customers in its own immediate area. MCNS See Multimedia Cable Network System (MCNS) partners. Mean Time to Repair (MTTR) In cable television systems, the MTTR is the average elapsed time from the moment a loss of RF channel operation is detected up to the moment the RF channel operation is fully restored. Media Access Control (MAC) address The "built-in" hardware address of a device connected to a shared medium. Media Access Control (MAC) procedure In a subnetwork, that part of the protocol that governs access to the transmission medium independent of the physical characteristics of the medium, but taking into account the topological aspects of the subnetworks, in order to enable the exchange of data between nodes. MAC procedures include framing, error protection, and acquiring the right to use the underlying transmission medium. Media Access Control (MAC) sublayer The part of the data link layer that supports topology-dependent functions and uses the services of the Physical Layer to provide services to the logical link control (LLC) sublayer. Micro-reflections Echoes in the forward transmission path due to departures from ideal amplitude and phase characteristics. Mid Split A frequency division scheme that allows bi-directional traffic on a single coaxial cable. Reverse channel signals propagate to the headend from 5 to 108 MHz. Forward path signals go from the headend from 162 MHz to the upper frequency limit. The diplex crossover band is located from 108 to 162 MHz. Mini-Slot A "mini-slot" is an integer multiple of 6.25-microsecond increments. The relationship between mini-slots, bytes and time ticks is described in Section 6.5.4. Moving Picture Experts Group (MPEG) A voluntary body which develops standards for digital compressed moving pictures and associated audio. MPEG See Moving Picture Experts Group. MSAP See MAC Service Access Point.
178
Radio Frequency Interface Specification
SP-RFI-I03-980202
Multimedia Cable Network System (MCNS) partners A consortium of Comcast Cable Communications, Inc., Cox Communications, Tele-Communications, Inc., and Time Warner Cable, interested in deploying high-speed data communications systems on cable television systems. Multipoint Access User access in which more than one terminal equipment is supported by a single network termination. Multipoint Connection A connection among more than two data network terminations. National Cable Television Association (NCTA) A voluntary association of cable television operators which, among other things, provides guidance on measurements and objectives for cable television systems in the USA. National Television Systems Committee (NTSC) Committee which defined the analog color television broadcast standard used today in North America. Network Layer Layer 3 in the Open System Interconnection (OSI) architecture; the layer that provides services to establish a path between open systems. Network Management The functions related to the management of data link layer and physical layer resources and their stations across the data network supported by the hybrid fiber/coax system. Open Systems Interconnection (OSI) A framework of ISO standards for communication between different systems made by different vendors, in which the communications process is organized into seven different categories that are placed in a layered sequence based on their relationship to the user. Each layer uses the layer immediately below it and provides a service to the layer above. Layers 7 through 4 deal with end-to-end communication between the message source and destination, and layers 3 through 1 deal with network functions.. Organizationally Unique Identifier (OUI) A 3-octet IEEE assigned identifier that OUI can be used to generate Universal LAN MAC addresses and Protocol Identifiers per ANSI/IEEE Std 802 for use in Local and Metropolitan Area Network applications. OSI See Open Systems Interconnection. OUI See Organization Unique Identifier. Packet Identifier (PID) A unique integer value used to identify elementary streams of a program in a single- or multi-program MPEG-2 stream. PHY See Physical (PHY) Layer. Physical (PHY) Layer Layer 1 in the Open System Interconnection (OSI) architecture; the layer that provides services to transmit bits or groups of bits over a transmission link between open systems and which entails electrical, mechanical and handshaking procedures.
179
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Physical Media Dependent (PMD) Sublayer A sublayer of the Physical Layer which is concerned with transmitting bits or groups of bits over particular types of transmission link between open systems and which entails electrical, mechanical and handshaking procedures. PID See Packet Identifier. PMD See Physical Media Dependent (PMD) Sublayer. Program-Specific Information (PSI) In MPEG-2, normative data necessary for the demultiplexing of Transport Streams and the successful regeneration of programs. Program Stream In MPEG-2, a multiplex of variable-length digital video and audio packets from one or more program sources having a common time-base. Protocol A set of rules and formats that determines the communication behavior of layer entities in the performance of the layer functions. PSI See Program-Specific Information. QAM See Quadrature Amplitude Modulation. QPSK See Quadrature Phase-Shift Keying. Quadrature Amplitude Modulation (QAM) A method of modulating digital signals onto a radio-frequency carrier signal involving both amplitude and phase coding. Quadrature Phase-Shift Keying (QPSK) A method of modulating digital signals onto a radio-frequency carrier signal using four phase states to code two digital bits. Radio Frequency (RF) In cable television systems, this refers to electromagnetic signals in the range 5 to 1000 MHz. Request For Comments (RFC) A technical policy document of the IETF; these documents can be accessed on the World Wide Web at http:// ds.internic.net/ds/rfcindex.html. Return Loss The parameter describing the attenuation of a guided wave signal (e.g., via a coaxial cable) returned to a source by a device or medium resulting from reflections of the signal generated by the source. Reverse Channel The direction of signal flow towards the headend, away from the subscriber; equiva lent to Upstream.
180
Radio Frequency Interface Specification
SP-RFI-I03-980202
RFC See Request for Comments. Routing Information Protocol (RIP) A protocol of the IETF for exchanging routing information about IP networks and subnets. Service Access Point (SAP) The point at which services are provided by one layer, or sublayer to the layer immediately above it. Service Data Unit (SDU) Information that is delivered as a unit between peer service access points Service Identifier (SID) See Section 6.3. SID See Service Identifier. Simple Network Management Protocol (SNMP) A network management protocol of the IETF. SMS See Spectrum Management System. SNAP See Subnetwork Access Protocol. SNMP See Simple Network Management Protocol. Spectrum Management System (SMS) A system, defined in [SMS], for managing the RF cable spectrum. Sublayer A subdivision of a layer in the Open System Interconnection (OSI) reference model. Subnetwork Subnetworks are physically formed by connecting adjacent nodes with transmission links. Subnetwork Access Protocol (SNAP) An extension of the LLC header to accommodate the use of 802-type networks as IP networks. Subscriber See End User. Subsplit A frequency-division scheme that allows bi-directional traffic on a single cable. Reverse path signals come to the headend from 5 to 30 (up to 42 on Extended Subsplit systems) MHz. Forward path signals go from the headend from 50 or 54 MHz to the upper frequency limit of the cable network. Subsystem An element in a hierarchical division of an Open System that interacts directly with elements in the next higher division or the next lower division of that open system.
181
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
Systems Management Functions in the application layer related to the management of various open systems Interconnection (OSI) resources and their status across all layers of the OSI architecture. TFTP See Trivial File-Transfer Protocol. Tick 6.25-microsecond time intervals that are the reference for upstream mini-slot definition and upstream transmission times. Tilt Maximum difference in transmission gain of a cable television system over a given bandwidth (typically the entire forward operating frequency range). TLV See Type/Length/Value. Transit Delay The time difference between the instant at which the first bit of a PDU crosses one designated boundary, and the instant at which the last bit of the same PDU crosses a second designated boundary. Transmission Control Protocol (TCP) A transport-layer Internet protocol which ensures successful end-to-end delivery of data packets without error. Transmission Convergence Sublayer A sublayer of the Physical Layer that provides an interface between the Data Link Layer and the PMD Sublayer. Transmission Link The physical unit of a subnetwork that provides the transmission connection between adjacent nodes. Transmission Medium The material on which information signals may be carried; e.g., optical fiber, coaxial cable, and twisted-wire pairs. Transmission System The interface and transmission medium through which peer physical layer entities transfer bits. Transmit On/Off Ratio In multiple-access systems, the ratio between the signal powers sent to line when transmitting and when not transmitting. Transport Stream In MPEG-2, a packet-based method of multiplexing one or more digital video and audio streams having one or more independent time bases into a single stream. Trivial File-Transfer Protocol (TFTP) An Internet protocol for transferring files without the requirement for user names and passwords that is typically used for automatic downloads of data and software. Trunk Cable Cables that carry the signal from the headend to groups of subscribers. The cables can be either coaxial or fiber depending on the design of the system.
182
Radio Frequency Interface Specification
SP-RFI-I03-980202
Type/Length/Value (TLV) An encoding of three fields, in which the first field indicates the type of element, the second the length of the element, and the third field the value. Upstream The direction from the subscriber location toward the headend.
183
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
This page intentionally left blank.
184
Radio Frequency Interface Specification
SP-RFI-I03-980202
Appendix K. Revisions
K.1 ECNs Included In SP-RFI-I02-971008
Table K-1. ECN Revision Table
ECN rfi-n-97002 rfi-n-97003 rfi-n-97006 rfi-n-97007 rfi-n-97008 rfi-n-97009 rfi-n-97010 rfi-n-97011 rfi-n-97012 rfi-n-97013 rfi-n-97014 rfi-n-97015 rfi-n-97017 rfi-n-97018 rfi-n-97019 rfi-n-97021 rfi-n-97022 rfi-n-97023 rfi-n-97024 rfi-n-97026 rfi-n-97027 rfi-n-97030 rfi-n-97031 rfi-n-97038 rfi-n-97039 Date Accepted 6/18/97 6/18/97 7/9/97 8/22/97 7/23/97 7/23/97 9/19/97 7/23/97 9/2/97 7/23/97 8/7/97 8/22/97 9/2/97 9/2/97 9/2/97 9/19/97 8/22/97 9/2/97 9/2/97 9/2/97 9/2/97 9/2/97 9/2/97 9/22/97 9/22/97
185
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
K.2 ECNs Included In SP-RFI-I03-980202
Table K-2. ECN Revision Table
ECN rfi-n-97033 rfi-n-97034 rfi-n-97036 rfi-n-97040 rfi-n-97041 rfi-n-97042 rfi-n-97043 rfi-n-97044 Note: Definitions for ECO, ECN, and ECR are located in the Glossary Date Accepted 10/8/97 11/26/97 11/26/97 11/26/97 11/26/97 11/26/97 2/3/98 2/3/98
186
Radio Frequency Interface Specification
SP-RFI-I03-980202
Acknowledgment
John Ulm, David Unger, Wilson Sawyer and Gerry White of Bay Networks, Inc. Data Over Cable Division wrote Section 3 and Section 5 through Section 9, as well as Appendices A through D and G. Steven Anderson, Tom Kolze, Victor Hou and Clive Holborow of General Instrument Corporation wrote Section 4 and Appendix E. The MCNS partners are grateful to these individuals and organizations for their contributions.
187
SP-RFI-I03-980202
Data-Over-Cable Service Interface Specifications
This page intentionally left blank.
188


▲Up To Search▲   

 
Price & Availability of SP-RFI-I03-980202NBSP

All Rights Reserved © IC-ON-LINE 2003 - 2022  

[Add Bookmark] [Contact Us] [Link exchange] [Privacy policy]
Mirror Sites :  [www.datasheet.hk]   [www.maxim4u.com]  [www.ic-on-line.cn] [www.ic-on-line.com] [www.ic-on-line.net] [www.alldatasheet.com.cn] [www.gdcy.com]  [www.gdcy.net]


 . . . . .
  We use cookies to deliver the best possible web experience and assist with our advertising efforts. By continuing to use this site, you consent to the use of cookies. For more information on cookies, please take a look at our Privacy Policy. X