Patent classifications
H04L12/2801
Managing upstream transmission in a network
A bandwidth allocation and monitoring method may divide available bandwidth on a shared communication medium into a plurality of discrete tones that can be individually allocated to modems on an as-needed basis. The effective modulation rate that a particular modem can use for each discrete tone can be monitored over time using a schedule of pilot tones transmitted from the modems on different tones at different times. The schedule may define representative pilot tones, in which case effective modulation rates for neighboring tones may be inferred from a determined effective modulation rate of a pilot tone.
ENTRY ADAPTER FOR A CABLE TELEVISION NETWORK
An entry adapter configured to communicate cable television (CATV) signals from a CATV network to one or more network devices and to communicate Multi-Media over Coaxial Alliance (MoCA) signals with a MoCA server, the entry adapter including one or more MoCA ports, and a signal combination device configured to direct the CATV signals toward one or more access ports without substantial attenuation, to substantially attenuate the CATV signals directed toward the one or more MoCA ports, to pass the MoCA signals from the one or more MoCA ports to the one or more access ports, and to pass the MoCA signals from the one or more access ports to the one or more MoCA ports.
Automated lifecycle management with flexible scaling and dynamic resource allocation for virtualized cable data plane applications
Systems and methods to support flexible scaling and dynamic resource allocation for virtualized cable data plane applications. The system includes a head end together with a node to provide data to customer devices. A container operating that includes a data plane application that provides packets of data for transmission to the node. The data plane application is instantiated with at least one of a virtual networking function and a computing resource function.
DOWNSTREAM PLANT CAPACITY
A transmitting and/or receiving system for cable networks.
GROUPING DATA PACKETS AT A MODEM
Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a device may receive, at a modem of the device, a plurality of data packets associated with one or more connections. The device may group, at the modem of the device, data packets, of the plurality of data packets, associated with a connection, of the one or more connections, into a container based at least in part on one or more characteristics associated with the modem or the data packets. The device may transmit, from the modem to a processor of the device, the container of grouped data packets. Numerous other aspects are provided.
Full duplex expander in a full duplex network
In one embodiment, a method receives a downstream signal and an upstream signal in a same frequency band. The downstream signal and the upstream signal are separated into a first path and a second path. The downstream signal using the first path and the upstream signal using the second path are amplified in an analog domain. The method isolates the downstream signal and the upstream signal from one another and sends the downstream signal downstream to a subscriber device and sends the upstream signal towards a full duplex node.
System and method for detecting and responding to theft of service devices
Systems, methods, and devices for identifying and responding to illegitimate devices on a service provider network include computing devices that are configured to collect dynamic host configuration protocol (DHCP) information related to a device (e.g., a modem, etc.) that establishes or requests to establish an internet protocol (IP) connection to the service provider network. The computing devices may determine features based on the collected DHCP information, apply the determined features to a classification model, and predict whether the device is an illegitimate device based on a result of applying the determined features to the classification model. The computing devices may perform a responsive action (e.g., blacklist or quarantine the device, etc.) in response to predicting that the device is an illegitimate device.
Methods and system for automated ad hoc customer premise equipment bi-directional vulnerability scanning
Methods and systems for automated ad hoc customer premise equipment (CPE) bi-directional vulnerability scanning. A method includes an auto provisioning server receiving CPE information for a designated CPE to initiate a bi-directional vulnerability scan, obtaining telemetry data from a cable modem termination system (CMTS) based on the CPE information, configuring switches to form a virtual local area network channel between a LAN scanner and the designated CPE using the CPE information, provisioning the LAN scanner to obtain a LAN side Internet Protocol (IP) address from the designated CPE, initiating vulnerability scans at a wide area network (WAN) scanner and the LAN scanner using a stored WAN side IP address and a stored LAN side IP address, respectively, and generating a vulnerability scan report based on results from the WAN scanner and the LAN scanner. At least one network device can be configured based on the report.
Entry adapter for a cable television network
An entry adapter configured to communicate cable television (CATV) signals from a CATV network to one or more network devices and to communicate Multi-Media over Coaxial Alliance (MoCA) signals with a MoCA server, the entry adapter including one or more MoCA ports, and a signal combination device configured to direct the CATV signals toward one or more access ports without substantial attenuation, to substantially attenuate the CATV signals directed toward the one or more MoCA ports, to pass the MoCA signals from the one or more MoCA ports to the one or more access ports, and to pass the MoCA signals from the one or more access ports to the one or more MoCA ports.
Systems and methods to improve holdover performance in R-PHY network architectures
Systems and methods for regaining synchronization between a CMTS core and an RPD, where both the core and the RPD are configured for individual synchronization in a slave configuration to a common grandmaster clock.