CN100566228C - Realize the method and system of the high-throughput allocated bandwidth in the cable network - Google Patents

Realize the method and system of the high-throughput allocated bandwidth in the cable network Download PDF

Info

Publication number
CN100566228C
CN100566228C CNB2006100679107A CN200610067910A CN100566228C CN 100566228 C CN100566228 C CN 100566228C CN B2006100679107 A CNB2006100679107 A CN B2006100679107A CN 200610067910 A CN200610067910 A CN 200610067910A CN 100566228 C CN100566228 C CN 100566228C
Authority
CN
China
Prior art keywords
channel
bandwidth
request
cmts
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2006100679107A
Other languages
Chinese (zh)
Other versions
CN1841989A (en
Inventor
莉萨·沃伊特·丹尼
奈基·罗伯塔·潘特利斯
斯科特·A·霍洛姆斯
维克托·T·霍
约翰·丹勒特·霍顿
大卫·迈克尔·普伦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Broadcom Corp
Zyray Wireless Inc
Original Assignee
Zyray Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zyray Wireless Inc filed Critical Zyray Wireless Inc
Publication of CN1841989A publication Critical patent/CN1841989A/en
Application granted granted Critical
Publication of CN100566228C publication Critical patent/CN100566228C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of method and system of realizing the high-throughput allocated bandwidth in the cable network.Described system includes line modem terminal system and a plurality of cable modem.Described method allows cable modem to use " channel bonding " technology colleague to send data to CMTS on a plurality of up channels.By sending unique bandwidth allocation from CMTS to cable modem at each up channel in the upstream channel bonding group, can realize allocated bandwidth, the combination of wherein said unique bandwidth allocation has always distributed the bandwidth of asking on the whole bindings group.

Description

Realize the method and system of the high-throughput allocated bandwidth in the cable network
Technical field
The present invention relates to data communication system, more particularly, relate to the method for transmission data in wired communication system.
Background technology
Traditional wired communication system generally uses communicating by letter of wire line MODEM head end management and a plurality of wire line MODEMs.This head end has defined and can make wire line MODEM send the upstream operating characteristic that the carrier signal upstream data flow to head end.Upstream can comprise a plurality of channels of distributing to wire line MODEM.These channels are separated from one another by working under different frequency.
One or more wire line MODEMs use the channel of appointment to transmit the carrier signal of request of carrying and/or data to head end.Head end receives the upstream signal by the demodulator that is connected with the physics frequency spectrum, and this physics frequency spectrum makes modulator-demodulator and head end interconnection.Request that contains in the demodulator recovered carrier signal and/or permission information, and transmit this information to MAC controller (MAC) to carry out extra processing.
Wired operator wish can to each user provide higher upstream bandwidth with fiber-to-the-subscriber (FTTx) and other small-business service competition.For example, wired operator has stipulated that the upstream throughput objective to unique user or customer group is 100Mbps.But using very in upstream, the modulation technique of high-order (for example 1024QAM) and wideer channel are infeasible at present.
Therefore, need a kind of feasible method and system so that higher upstream throughput to be provided in wired communication system.
Summary of the invention
A method that realizes higher upstream throughput in the wired data communication system is that a user or customer group are transmitted on a plurality of up channels simultaneously.The technology that this upstream channel bonding with less bandwidth is set up the pipeline of big bandwidth together is called " channel bonding " technology in this application again.Introduce a kind of method and system of in wired communication system, realizing upstream channel bonding among the application.
This specification has been described one or more embodiment that are combined with feature of the present invention.The embodiment that describes and quote in this specification as " embodiment ", " embodiment ", " example " or the like, represents that this embodiment includes specific feature, structure or characteristic, but is not that each embodiment must comprise this feature, structure or characteristic.In addition, above phrase not necessarily is meant identical embodiment.In addition, when describing a certain feature, structure or characteristic in one embodiment, concerning the those of ordinary skill of ability field, obviously among other embodiment that this feature, structure or characteristic also can be used for introducing among the application or not introducing.
According to the first embodiment of the present invention, provide a kind of method that in wire line MODEM, realizes the high-throughput allocated bandwidth in the cable network in the end system (CMTS).According to described method, a plurality of up channels are bound into one group.Subsequently, receive bandwidth request from wire line MODEM.As to receiving the response of described bandwidth request, for each up channel in the described bindings group sends a unique bandwidth allocation, the combination of described unique bandwidth allocation has distributed the bandwidth of asking on the whole bindings group, is used for transmits data packets by described wire line MODEM and flow to CMTS.
According to a second embodiment of the present invention, provide a kind of method that in wire line MODEM, realizes the high-throughput transmission in the cable network.According to described method, transmission bandwidth request is to CMTS.Subsequently, receive a plurality of bandwidth allocation, wherein each bandwidth allocation is related uniquely with a up channel in the upstream channel bonding group, and described a plurality of bandwidth allocation has jointly been distributed the bandwidth of asking on the whole upstream channel bonding group.Subsequently, by described upstream channel bonding group data packet stream is transferred to CMTS according to described a plurality of bandwidth allocation.
A third embodiment in accordance with the invention provides a kind of system that realizes the high-throughput allocated bandwidth in the cable data network.Described system comprises and is used to bind the CMTS of a plurality of up channels and is used to send the wire line MODEM of bandwidth request to described CMTS.Described CMTS is further used for unique bandwidth allocation of each up channel in the described bindings group is transferred to described wire line MODEM, and the combination of wherein said unique bandwidth allocation has jointly distributed the bandwidth of asking on the whole bindings group.Described wire line MODEM is further used for according to described a plurality of bandwidth allocation, flow to described CMTS by described upstream channel bonding group transmits data packets.
According to an aspect of the present invention, provide a kind of method that realizes the high-throughput allocated bandwidth in the cable network in wire line MODEM terminal system (CMTS), described method comprises the steps:
With a plurality of upstream channel bondings is one group;
Receive bandwidth request from wire line MODEM;
Respond the reception of described bandwidth request, for each up channel in the described bindings group sends unique bandwidth allocation, the combination of wherein said unique bandwidth allocation jointly distributes the bandwidth of being asked on the whole bindings group, to flow to CMTS by described wire line MODEM transmits data packets.
Preferably, describedly, each up channel in the bindings group is included as that each up channel sends unique wire cable data, services transmission specification (DOCSIS) MAP information in the described bindings group for sending unique bandwidth allocation.
Preferably, described method further comprises:
Receive a plurality of fragments that sent by described wire line MODEM by the up channel in the described bindings group, the time of wherein said a plurality of fragments appointment in described unique bandwidth allocation transmits, and described each fragment comprises unique sequence number;
Based on described unique sequence number with the information combination in described a plurality of fragments to rebuild described data packet stream.
Preferably, described method further comprises:
Distribute one group of unique identifier to give described wire line MODEM, wherein each described unique interior up channel of the corresponding described bindings group of identifier difference;
And describedly receive the bandwidth request package from wire line MODEM and draw together the up channel in the described bindings group of message monitoring that includes a unique identifier described one group of unique identifier.
Preferably, one group of unique identifier of described distribution comprises that one group of unique identifier of distribution is to the service flow that is associated with described wire line MODEM for described wire line MODEM.
Preferably, for sending unique bandwidth allocation, the specified upstream channel in the described bindings group comprises the message of sending the mini-slot assignment information that includes a unique identifier relevant and be correlated with therewith with the specified upstream channel.
According to an aspect of the present invention, provide a kind of method that realizes the high-throughput transmission in the cable network in wire line MODEM, described method comprises the steps:
Send bandwidth request to wire line MODEM terminal system (CMTS);
Receive a plurality of bandwidth allocation, wherein each described bandwidth allocation is unique related with a up channel in the upstream channel bonding group, and described a plurality of bandwidth allocation is jointly distributed the bandwidth of being asked on the whole upstream channel bonding group;
According to described a plurality of bandwidth allocation, flow to described CMTS by described upstream channel bonding group transmits data packets.
Preferably, a plurality of bandwidth allocation of described reception comprise a plurality of DOCSIS MAP message of reception.
Preferably, a plurality of bandwidth allocation of described foundation flow to described CMTS by described upstream channel bonding group transmits data packets and comprise:
Described data packet stream is divided into a plurality of fragments;
Unique sequence number is inserted in each described fragment;
Transmit each fragment in described a plurality of fragment in time of described a plurality of bandwidth allocation appointments by the up channel in the described upstream channel bonding group.
Preferably, described method further comprises:
Receive one group of unique identifier from described CMTS, wherein each described unique identifier is distinguished a up channel in the corresponding described upstream channel bonding group;
And described transmission bandwidth request comprises by the up channel that is associated with a certain specific unique identifier to CMTS and sends the bandwidth request that includes described specific unique identifier.
Preferably, described method further comprises:
Described one group of unique identifier is associated with service flow.
Preferably, each described bandwidth allocation includes a corresponding unique identifier and relevant therewith mini-slot assignment information.
According to an aspect of the present invention, provide a kind of system that realizes the high-throughput allocated bandwidth in the cable network, comprising:
Wire line MODEM terminal system (CMTS), being used for a plurality of upstream channel bondings is one group;
Wire line MODEM is used to send bandwidth request to described CMTS;
Wherein said CMTS further is that each up channel in the described bindings group sends unique bandwidth allocation to described wire line MODEM, and the combination of described unique bandwidth allocation jointly distributes the bandwidth of being asked on the whole bindings group;
Wherein said wire line MODEM further according to described a plurality of bandwidth allocation, flow to described CMTS by described upstream channel bonding group transmits data packets.
Preferably, described CMTS is that each up channel in the described bindings group sends unique DOCSISMAP information to described wire line MODEM.
Preferably, described wire line MODEM is divided into a plurality of fragments with described data packet stream, unique sequence number is inserted in each described fragment, and transmit described each fragment to described CMTS by the up channel group in the described bindings group in the time of described a plurality of bandwidth allocation appointments.
Preferably, described CMTS further receives described a plurality of fragment from described wire line MODEM, and based on described unique sequence number with the information combination in described a plurality of fragments to rebuild described data packet stream.
Preferably, described CMTS further distributes one group of unique identifier to give described wire line MODEM, a up channel in the corresponding described bindings group of wherein said each unique identifier difference;
And described wire line MODEM sends the bandwidth request that includes described specific unique identifier by the up channel that is associated with a certain specific unique identifier.
Preferably, described CMTS distributes one group of unique identifier to give the service flow that is associated with described wire line MODEM.
Preferably, described CMTS is unique bandwidth allocation that a certain specified upstream channel sends the mini-slot assignment information that includes a unique identifier relevant with described specified upstream channel and be correlated with therewith.
Various advantage of the present invention, various aspects and character of innovation, and the details of specific embodiment will describe in detail in the following description book and accompanying drawing.It should be noted that the embodiment that the present invention is not limited to describe in this specification.The embodiment that introduces in this specification only is used for illustrative purposes.Based on the enlightenment that the application provides, other various embodiment are conspicuous for the those of ordinary skill of ability field.
Description of drawings
The invention will be further described below in conjunction with drawings and Examples, in the accompanying drawing:
Fig. 1 is a schematic diagram of realizing the voice communications versus data communications management system of upstream channel bonding according to one embodiment of the invention;
Fig. 2 is according to the high-throughput allocated bandwidth in the one embodiment of the invention realization cable network and the flow chart of transmission;
Fig. 3 is according to the high-throughput allocated bandwidth in the one embodiment of the invention realization cable network and the flow chart of transmission;
Fig. 4 is the schematic diagram of amount of information segmentation that has four up channels of different mini-slot sizes according to one embodiment of the invention;
Fig. 5 is the schematic diagram according to the fragment cascade (fragmented concatenation) of existing DOCSIS realization;
Fig. 6 is the schematic diagram of continuous according to an embodiment of the invention cascade (continuous concatenation) and segmentation (fragmentation);
Fig. 7 utilizes the continuous cascade of slice header and the schematic diagram of segmentation according to one embodiment of the invention;
Fig. 8 is the flow chart of the step of continuous according to an embodiment of the invention cascade and amount of information segmentation;
Fig. 9 is the flow chart of the step of continuous according to an embodiment of the invention cascade and amount of information segmentation;
Figure 10 is the flow chart of the additional step of the processing procedure that realizes using slice header to carry out segmentation among Fig. 8-9 according to one embodiment of the invention;
Figure 11 is the flow chart of the additional step of the processing procedure that realizes using slice header to carry out segmentation among Fig. 8-9 according to one embodiment of the invention;
Figure 12 is the flow chart of incidentally asking the step of (piggyback requesting) slice header according to an embodiment of the invention;
Figure 13 is the flow chart of step of the up channel of contention requests (contention requesting) binding according to an embodiment of the invention;
Figure 14 is the existing not segmentation forms data bag and the schematic diagram of the DOCSIS amount of information coding techniques with 12 bytes biasings of segment data packet cascade not of being used for;
Figure 15 is the existing schematic diagram that is used for the DOCSIS amount of information coding techniques of segmentation forms data bag;
Figure 16 is the existing schematic diagram that is used for the DOCSIS amount of information coding techniques of segment data packet cascade;
Figure 17 is the schematic diagram of encrypting according to the baseline privacy interface (BPI) that one embodiment of the invention is carried out single mac frame before segmentation;
Figure 18 A is the flow chart of the initialization step of the wire line MODEM (CM) of supporting upstream channel bonding according to an embodiment of the invention;
Figure 18 B is the flow chart of initialization step of supporting the CM of upstream channel bonding according to an embodiment of the invention;
Figure 19 is according to an embodiment of the invention based on the schematic diagram of the claim frame form of queue length;
Figure 20 is the schematic diagram of slice header form according to an embodiment of the invention;
Figure 21 is a schematic diagram of binding upstream channel descriptor (B-UCD) message format according to an embodiment of the invention;
Figure 22 is the flow chart that one or more embodiment use the step of the channel setting in the B-UCD message alteration upstream channel bonding group in CMTS according to the present invention.
In the above accompanying drawing, approximate label numeral identical, function parts approximate and/or structure proximate.The accompanying drawing that parts occur for the first time is by leftmost numeral in the corresponding label numeral.
Embodiment
1 general introduction
Existing C ableLabs
Figure C20061006791000111
Certified TMWire line MODEM project interface standard is called wire cable data, services transmission specification (DOCSIS again ), be called " tradition " standard (for example, DOCSIS 2.0, DOCSIS 1.1 and DOCSIS 1.0) in this manual, stipulate the interface requirement of wired communication system, but do not stipulated to realize the interface requirement of upstream channel bonding.Therefore, in one embodiment, the present invention realizes the expansion of upstream channel bonding technology as existing DOCSIS interface specification.(Cable Television Laboratories, Inc.) the DOCSIS 2.0 radio frequency interface standard SP-RFIv2.0-I04-030730 that announced in 2005 are at this reference document as the application in cable television laboratory company.
1.1 system survey
Figure 1 shows that voice communications versus data communications management system 100.Voice communications versus data communications management system 100 can be supported existing DOCSIS interface requirement, also can support the present invention to adopt the expansion of upstream channel bonding technology to existing DOCSIS interface requirement.
System 100 comprises the remote communication node 102a-102n (being referred to as " remote communication node 102 ") of supervisory communications node 106 and one or more extensive distributions.System 100 can be implemented in any multimedia distributed network.In addition, it will be appreciated that the exchange of the medium of method and system Managing speech of the present invention, data, video, audio frequency, message, figure, extended formatting and/or the combination of multimedia or above-mentioned any medium.
Supervisory communications node 106 is positioned at central authorities with order and control and remote communication node 102 and remote communication node 102 interactive operation each other.Supervisory communications node 106 stream modulation of management uplink information and arbitration remote communication node 102 bandwidth each other.Following detailed description, supervisory communications node 106 are set up the ascending time slot structure and are distributed upstream bandwidth by sending upstream channel descriptor (UCD) message and MAP message to remote communication node 102 respectively.Among the embodiment, described UCD and MAP message are defined by existing docsis specification.
Among the embodiment, supervisory communications node 106 is parts that are used for the head end controller of wireline communication network.Therefore, supervisory communications node 106 is wire line MODEM terminal system (CMTS) or one of them parts.Among the embodiment, at least one remote communication node 102 is wire line MODEM (CM) or one of them parts.Among another embodiment, supervisory communications node 106 is CMTS, and at least one remote communication node 102 is parts of television set top box.
As the parts of CM, remote communication node 102 can transmit one or more services gives the user.This service can comprise phone, television broadcasting, charge program, internet communication (for example World Wide Web (WWW)), radio broadcasting, fax, file data transmission, E-mail service (email), message, video conference, on-the-spot broadcasting or time-delay media play (as speech, debate, displaying, notice, news, competitive sports or concert) or the like.
Each remote communication node 102 is assigned one or more service identifiers (SID) coding, and supervisory communications node 106 these SID of use encode and distribute bandwidth.SID is mainly used in the customizing messages stream of identification from remote communication node 102.Yet the technical staff of ability field can also specify other identifier to distinguish each remote communication node 102 and/or from the information flow of node 102 obviously as can be known.Therefore, among the embodiment, the identifier of appointment SID or other types belongs to the special services of one or more remote communication nodes 102 with identification.Among the embodiment, distribute the identifier of SID or other types to specify special services or the service groups that has nothing to do with source remote communication node 102.Among the embodiment, the identifier that distributes SID or other types to be indicating service quality (QoS), the voice line under voice that successively decrease as priority or data, the different compression algorithm, optimum data or the like.Distribute a plurality of SID to give among the embodiment of a remote communication node at one, main SID is used to discern this remote communication node or from the general information stream of this remote communication node 102, and one or more other SID are used to discern other concrete information flow, as phone, video flowing, message, video conference or the like.
Among the embodiment, supervisory communications node 106 and remote communication node 102 are integrated to support variety of protocol, as Internet protocol (IP), transmission control protocol (TCP), User Datagram Protoco (UDP) (UDP), real-time transport protocol (rtp), resource reservation protocol (rsvp) or the like.
Communications management system 100 also comprises internode equipment (internodal infrastructure) 105.As shown in Figure 1, internode equipment 105 provides the interconnection between supervisory communications node 106 and the remote communication node 102.Internode equipment 105 is supported wired, wireless or these two kinds of transmission mediums, comprises satellite, land (for example optical fiber, copper cash, twisted-pair feeder, coaxial line, fiber-coaxial recombination line (HFC) or the like), radio, microwave, free-space optical systems and/or any other transport-type or method.
Data flow transmitted is called downstream data flow in this application on 102 the direction from supervisory communications node 106 to remote communication node.Among the embodiment, downstream data flow is divided in one or more down channels.Each down channel transmits different kinds of information and gives remote communication node 102.Described downstream data flow information comprises TV signal, packet (including but not limited to IP datagram), voice packet, control messages or the like.Among the embodiment, the form of downstream data flow is that the sublayer is concentrated in dynamic image expert group (MPEG) transmission.Yet the those of ordinary skill of ability field can also be supported other data format obviously as can be known.
Data flow transmitted is called upstream in this application on the direction from remote communication node 102 to supervisory communications node 106.Upstream is divided in one or more up channels.Each up channel transfers to supervisory communications node 106 with the packet burst from remote communication node 102.In one embodiment of the present of invention, a plurality of upstream channel bondings are become a bound channels group to increase the throughput of upstream together.In this upstream, each channel is split into a plurality of assignable time slots (for example, mini-slot), and remote communication node 102 sends pulse signal in distributed time slot.As mentioned above, the structure of time slot is defined by supervisory communications node 106 and distributes.
As shown in Figure 1, supervisory communications node 106 embodiment comprises upstream physical layer demodulator (USPHY) 108, down physical layer modulator (DS PHY) 110, MAC controller (MAC) 112, memory 114, software application 120 and master clock source 116.Physical layer interface between the up channel of US PHY 108 formation supervisory communications nodes 106 and internode equipment 105.Supervisory communications node 106 has an independent US PHY 108 at each up channel.Therefore, US PHY 108 receives and all burst from remote communication node 102 of demodulation (bursts).
Opposite, the physical layer interface between the down channel of DS PHY 110 formation supervisory communications nodes 106 and internode equipment 105.Therefore, remote communication node 102 is separately collected and transferred to voice, data (comprising TV or radio signal) and/or predetermined control messages of giving one or more remote communication nodes 102 at DS PHY 110 places.DS PHY 110 modulates and/or formats above-mentioned information so that carry out downlink transfer.
MAC 112 receives upward signal or provides downstream signal to DS PHY 110 from US PHY 108.MAC 112 is as the low sublayer of the data link layer of supervisory communications node 106.In an embodiment, MAC112 supports segmentation, cascade, payload frame head compression/extension and/or the signal that transmits by physical layer (being internode equipment 105) is carried out error-detecting.
Memory 114 and the signal of MAC 112 mutual communication with store M AC 112 processing.Memory 114 is also stored the various auxiliary datas that are used to support the processing activity.Described auxiliary data comprises security protocol, identifier, rule, strategy or the like.
MAC 112 is connected to software application 120 by data/address bus 118, and described data/address bus 118 is existing BDB Bi-directional Data Bus.Software application 120 operates in one or more processors (or hardware auxiliary equipment is as field programming gate array (FPGA) or application-specific integrated circuit (ASIC) (ASIC)) with receiving control message, voice and/or from the data of MAC 112 and carry out further and handle.As shown in the figure, software application 120 comprises grader/router one 24 and bandwidth (BW) dispensing controller 128.Allocated bandwidth controller 128 up and/or descending modulation of management and allocated bandwidth.Grader/router one 24 provides the rule of communicating by letter of classification and/or priorization and remote communication node 102 and tactful.Grader/router one 24 also will route to predetermined address from the signal of remote communication node 102 by backbone network 140.
Backbone network 140 is wired, wireless or the part of office's field net (LAN) of wire and wireless combination, wide field net (WAN) and/or optical-fiber network (as Intranet, local internet, Global Internet (comprising the World Wide Web (WWW)), VPN or the like).Therefore, supervisory communications network node 106 uses another equipment or the interapplication communications of backbone network 140 and communications management system 100 outsides.Described equipment or application program can be messaging software (as word processor, spreadsheet, fiscal administration software or the like), TV or transmitting set, another remote communication node 102, another supervisory communications nodes 106 of server, web browser, operating system, other types or the like.
According to one embodiment of present invention, when communications management system 100 was used to realize upstream channel bonding, this up channel must be synchronous with master clock source 116.To in the 8th joint, go through synchronously.
1.2 channel bonding general introduction
As mentioned above, a method that realizes higher uplink information stream throughput in wired communication system is to make unique user or customer group carry out message transmission by a plurality of up channels simultaneously.In one embodiment of the present of invention, the upstream channel bonding process allows the part of process (bandwidth grantingprocess) to control by CMTS as bandwidth.For example, CMTS can be the supervisory communications node 106 of communications management system 100, as shown in Figure 1.
When CM is a given service flow on the relative up channel when sending bandwidth request, CMTS selects whether to allow this request on given channel or a plurality of channel.CMTS is responsible for each up channel is distributed bandwidth.This centralized control can make system reach best statistical multiplexing possibility, and allows CMTS to carry out the real-time load balance of the up channel in the bindings group.Receive the bandwidth permission (bandwidth grants) of a plurality of channels as CM after, CM is cut apart its transmission according to the transmission time of each permission and the size of each permission.Place a sequence number that increases progressively in the information that CM transmits in each allows.This permission can be in time staggered on any or all up channel, and require CM to transmit simultaneously on the up channel of all bindings.Subsequently, CMTS uses the sequence number of inserting in this information to rebuild original data stream.
One embodiment of the present of invention require up channel and master clock source (master clock source 116 as shown in Figure 1) synchronously.Although needn't realize in the present invention, this requires to have simplified clock field and the timing recovery among the CM synchronously.Except this synchronous requirement, physical layer (PHY) parameter of any channel in the up bindings group is no longer included other requirements.Described each channel can be any mixing of the modulation type stipulated in DOCSIS 2.0 standards, symbol rate, TDMA (time many minutes locations) or S-CDMA (Code Division Multiple Access (CDMA) synchronously), and can be to close on or non-combination in any of closing on up channel.
Fig. 2 is the flow process Figure 200 that realizes the step of the high-throughput allocated bandwidth in the cable network according to one embodiment of the invention in CMTS.The step of flow process Figure 200, following further describing can be applicable to voice-and-data transmission and management system 100 shown in Figure 1, supervisory communications node 106 corresponding CMTS wherein, remote communication node 102 corresponding CM.
Processing procedure starts from step 205, and CMTS receives the bandwidth request from CM.The bandwidth of request will be used for transmits data packets by CM and flow to CMTS.In step 210, whether CMTS selects to allow CM to single up channel or belong to the bandwidth that several upward signal of a bindings group is asked.Shown in step 215, if CMTS selects single up channel is allowed the bandwidth of request, handle so and skip to step 230, CMTS distributes the bandwidth of being asked by with existing mode single up channel being sent one or more permissions in step 230.In the later step 235, during this allows in, CMTS receives the data packet stream that is sent with existing mode by CM.
Yet, if the bandwidth that the CMTS selection is asked all channels permissions in the binding up channel group in step 215, handle so and skip to step 220, in step 220, CMTS distributes the bandwidth of being asked by each up channel in this bindings group is sent one or more permissions.Each up channel that following detailed description, this step are related in the bindings group sends independent MAP information.In step 220 implementation, CMTS also carries out the real-time load balance relevant with a plurality of up channels described in the bindings group.Subsequently, in step 225, the sequence number that data that send by each channel in the bindings group during CMTS allows based on each or amount of information are embedded in is rebuild the described data packet stream that is sent by CM.It should be noted that with reference to Fig. 1 allocated bandwidth function described herein is carried out by the allocated bandwidth controller in the supervisory communications node 106 128.
Fig. 3 is a flow chart 300 of realizing the step of the high-throughput transmission in the cable network according to one embodiment of the invention in wire line MODEM.Step in the flow chart 300, following being described in detail can be realized in voice communications versus data communications management system 100 shown in Figure 1, wherein supervisory communications node 106 corresponding CMTS, and remote communication node 102 corresponding CM.
Processing starts from step 310, and in step 310, CM sends bandwidth request to CMTS.The bandwidth of request is used for transmits data packets by CM and flow to CMTS.In step 320, CM receives the permission of corresponding bandwidth request from CMTS, describedly allows to be applicable to a plurality of up channels that belong to a bindings group.Following detailed description is described, and each up channel that step 320 is related in the bindings group receives independent MAP information.In step 330, CM is cut apart according to the transmission of big young pathbreaker's packet of transmission time of each permission and permission.It should be noted that this permission can be in time staggered on any or all up channel, and require CM on the up channel of all bindings, to transmit simultaneously.In step 330 process, CM is embedded in the sequence number that increases progressively to information transmitted amount during allowing at each.These sequence numbers are used to rebuild original data stream by CMTS.
1.3 term
As mentioned above, among the embodiment, upstream channel bonding technology of the present invention is embodied as the expansion of existing DOCSIS interface specification.Therefore, below introduce several new terms to describe the upstream channel bonding interface specification, i.e. the extension specification of existing DOCSIS interface specification.
Employed term among the application " upstream channel descriptor of binding (B-UCD) " refers to stipulate to be contained in the downlink information of the Channel Identifier in the up bindings group.
Allocated bandwidth described in term " fragment ", and can comprise following characteristic: (1) distributes to specific SID (that is, can be clean culture, multicast or broadcasting); (2) form by continuous mini-slot; (3) use special time slot to use sign indicating number (IUC).
These new terminologies and other terms that are used for describing the extension specification of the existing DOCSIS interface specification of realizing upstream channel bonding will be described in detail at ensuing chapters and sections.
2. information segmenting (Traffic Segmentation)
2.1 segmentation general introduction
As mentioned above, upstream channel bonding is a kind of method that realizes uplink information throughput higher in the wired communication system.In one embodiment of the invention, CMTS handles a part that allows to handle as bandwidth with upstream channel bonding and controls, and how to cut apart bandwidth based on the bandwidth and the decision of the out of Memory amount on the up channel of CM request.
Up channel in bindings group can have very different physical layer characteristic.For example, a channel can be supported speed and Quadrature Phase Shift Keying (QPSK) data field and the tdma frame of 160ksps, and one other channel can be supported speed and 64QAM data field and the S-CDMA frame of 2.56Msps.Centralized control makes CMTS can carry out the real-time load balance of different up channels in the bindings group.
Fig. 4 has four up channels 405,410,415 of different mini-slot sizes and the schematic diagram of 420 amount of information segmentation according to an embodiment of the invention.405, every row is represented the bandwidth of a up channel in 410,415 and 420.Vertical line marks off the border of mini-slot.For the size of the horizontal space that minimizes Fig. 4 requirement, this example is used the packet shorter than traditional DOCSIS network.Yet the vertical line in this example also can be represented a plurality of mini-slot rather than a mini-slot.
Alphabetical A-D among Fig. 4 in the piece represents that CMTS has distributed the service flow of respective modules bandwidth.In this example, CMTS selects to allow the request of service flow A, allows service flow A only to use the bandwidth of channel 405 and channel 410.Similarly, CMTS selects to allow service flow B only to use the bandwidth of channel 415 and channel 420.CMTS selection permission service flow C uses the bandwidth on all four up channels 405,410,415 and 420.The piece representative of expression service flow E and service flow D allows a small amount of of service (UGS) stream to allow (small grant) to non-request.
Distribute to every group of adjacent block/mini-slot of the same service flow in the same channel among Fig. 4 and represent a fragment.Therefore, to service flow B allow to comprise 2 fragments 425 and 430, service flow C allowed to comprise 4 fragments 435,440,445 and 450.Owing to the permission of the service flow A on the channel 405 is made up of 2 parts that serviced stream E separates, thereby whole permissions of service flow A is made up of 3 fragments, promptly the fragment 455 in the channel 405 and 460 and channel 410 in fragment 465.From the angle of physical layer overhead (overhead), each of these fragments is counted as an existing DOCSIS and allows.Each fragment is beginning to locate to need the head sign indicating number, and the place needs guard time (guard time) at the end.The physical layer attributes of each fragment is specified by the physical parameter of channel and the IUC type of this fragment.
2.2 cascade and segmentation continuously
More than defined general bandwidth segmental structure, the mechanism of effectively filling the bandwidth that allows will be described below.In order to describe the embodiment of the bandwidth that effective filling of the present invention allows, contrast embodiments of the invention and existing method help to understand the present invention.For example, a kind of method of bandwidth of existing filling permission is following existing DOCSIS cascade and the fragmentation technique that will introduce.
2.2.1 existing DOCSIS cascade and segmentation
In the existing DOCSIS system, whether the CM decision sends a packet or one group of packet (that is, cascade) upstream in certain time, and send a request, the required amount of bandwidth of the request given amount of information of transmission.Whether CMTS determines it how to allow the bandwidth of asking and allows with one or a plurality of on the whole time period allow to distribute bandwidth.If the CMTS decision allows this request with one, CM does not make any modification and promptly transmits this information.If CMTS decision is distributed in a plurality of on the whole time period with branch and allows this request, then CM must be cut apart the cascade of this packet or packet.Existing DOCSIS segmentation method package in each fragment has slice header and fragment cyclic redundancy code (CRC), each fragment increase is add up to the expense of 16 bytes.The fragment of utilizing existing DOCSIS technology packet to obtain seems identical with unsegmented DOCSIS frame, thereby makes CMTS hardware have more compatible function.
Shake hands (handshaking) to avoid unnecessary segmentation between request of existing DOCSIS system requirements and the permission.If the permission that CMTS sends is too little for the cascade of CM trial uplink data sending bag or packet, this segmentation will take place.In order to make CM and CMTS keep alignment in request/permission process, existing DOCSIS system uses the only convention of outstanding request once of CM.Described once outstanding request rule (one request outstanding rule) can be avoided the problem of some request/permission alignment.In one example, once outstanding request rule can avoid following situation: CM to send 2 requests, and one is 100 mini-slot of packet A request, and another is 75 mini-slot of packet B request, and because competition between the two, CMTS receives only the request into packet B.In another example, once outstanding request rule can be avoided the request of following situation: CMTS reception at packet A and B, in two independent DOCSIS MAP message, allow this request, and a MAP message is because noise pulse string former thereby lose.Once outstanding request rule can be avoided some request/permission alignment problem, but can not solve all problems.
Same, the situation that always can make a mistake causes CMTS and CM situation about not lining up to occur asking/allow.A kind of error situation is that CMTS is not provided with the affirmation time in its each MAP exactly, and perhaps CMTS neglects irrelevantly request has been considered but the debatable permission of undelegated SID still.When inaccurate acknowledging time can cause CM to send the packet request among the MAP, think that because the affirmation time that receives is inaccurate request is lost, and the situation of request data package again.Simultaneously, CMTS allows initial request, and allows the request once more from CM subsequently, thinks that this is asked once more is new request to another packet.It is not requested permission that this event sequence causes for CM this to allow.CM can attempt any packet that next occurs in its formation is used this " not requested permission ", if needed, also will cut apart this packet.The time that relies on request and allow, said system will keep inconsistent (being produced by unnecessary permission) of request/permission to stop up to the information flow of described SID.
Except the bandwidth waste that causes because of fragmentation overhead, existing segmentation cascade DOCSIS package method also causes the poor efficiency of bandwidth because of the rule that sends fragment.Whether as long as CM is in the transmission fragment, and not debatable permission still among the MAP, being not related to has other packet to arrive in its sequence, and CM sends bandwidth request, and request sends the remaining needed bandwidth of packet.CM can not receive enough permissions to send remaining fragment up to CM for the outer bandwidth of new data packets amount of the claim.In addition, for a permission, any exceptional space in last fragment all can not be used for other packets, and CM must insert filling information (padding) to fill up the space of waste.
Fig. 5 is the schematic diagram of the DOCSIS package method of existing segmentation cascade.The original cascade 505 of packet has been shown among Fig. 5, and CM also shows the formation 510 of follow-up data bag waiting for transmission for this packet sends bandwidth request among the figure.CM receives 3 and allows 515,520 and 525, and original cascade 505 is partitioned in 3 transmission permissions.Each transmission 515,520 and 525 comprises slice header 535a, 535b and the 535c of corresponding segmentation.As shown in Figure 5, the shortcoming of the DOCSIS package method of fragment cascade is that CM must use filling information (padding) 540 to fill the bandwidth of waste in this permission, rather than next packet waiting for transmission is filled the 3rd permission 525 in the use formation 510.
The existing in some cases fragment sample of erect image cascade DOCSIS package method causes the waste one of bandwidth, and existing DOCSIS cascade uses the cascade head (concatenationheader) of the length information that comprises whole cascade, thereby efficient is also very low.Therefore under the situation that does not change the cascade head, can not subsequently packet be added in this cascade.If arrive enough big of the permission of CM, to such an extent as to can comprise this connection and this cascade begins the excessive data bag that the back arrives, CM can not add new packet in this cascade.
For example, as shown in Figure 5, original cascade 505 comprises the cascade head 530 of the length information that comprises cascade 505.Therefore, CM must use filling information 540 to fill the 3rd and allow 525, rather than uses from the packet next waiting for transmission of formation 510 and fill permission 525.In some situation, it is particularly useful to change the cascade structure, for example, and when a cascade is cut apart, when PHY parameter and mini-slot size interval size cause having in the burst too many untapped byte, and receive it when thinking not requested permission as CM.
2.2.2 continuous cascade of the present invention and segmentation
According to one or more embodiment of the present invention, provide a kind of when asking and allowing not match, realize the new mechanism that more effective bandwidth is used, have less sheet section overhead and permission and begin the length that the back changes this cascade in the cascade transmission.When the size that allows and packet border were inconsistent, this mechanism can realize more effective bandwidth use.A kind of such mechanism is embedded in the notion of continuous cascade and segmentation (CCF).Different with existing DOCSIS package method is that CCF adopts the method for data stream type.Packet is inserted in the bandwidth of permission under the situation of not using the cascade head.
Fig. 6 is the schematic diagram of CCF according to an embodiment of the invention.The original cascade 605 of packet has been shown among Fig. 6, and CM has sent bandwidth request for it, also shows the formation 610 of packet waiting for transmission subsequently.Different with the method shown in Fig. 5 is that CM is not using under the situation of fragment header, original cascade 605 is partitioned into 3 allows in 615,620 and 625.In this case, packet waiting for transmission is subsequently filled the 3rd and is allowed 625 in the CM use formation 610, so there is not bandwidth waste.
In existing DOCSIS method shown in Figure 5, because used the cascade head 530 of the length information that comprises cascade 505, bandwidth is wasted.CM must use filling information 540 to fill the 3rd and allow 525, does not transmit the packet of whole formation 510, rather than packet waiting for transmission is subsequently filled the 3rd permission 525 in the use formation 510.In CCF method shown in Figure 6,, there is not bandwidth waste because do not use the cascade head.CM can use packet filling permission 625 waiting for transmission subsequently in the formation 610, and it is to be transmitted only to stay packet 630, rather than uses filling information (padding).
During CCF realized as shown in Figure 6, in case the uplink burst pulse is lost because of noise, CMTS MAC layer just can't be found out the border of packet in one group of permission.In existing DOCSIS downstream data flow, use the MPEG pointer to point out the beginning of DOCSIS MAC head in the mpeg frame.In up direction, by the definition, pulse MAC border always with packet, cascade or slice header begin align.In the example that the CCF of Fig. 6 realizes, yet, if allow the data in 620 to lose, just the MAC layer can't be found out the border that allows the packet in 625 because of noise.Therefore, CCF needs an additional mechanism to distinguish the DOCSIS frame boundaries.
According to one embodiment of present invention, a kind of efficient mechanism of using CCF to fill the bandwidth that allows is to use slice header to help data reconstruction.In one embodiment, slice header includes the pointer that points to a DOCSIS head in the fragment.MPEG pointer in order to the recognition data packet boundary in described pointer and the existing DOCSIS downstream data flow is approximate.By each fragment is used fixing expense, no matter when CMTS selects to cut apart one allows for a plurality of less permissions, and CMTS can calculate it at an easy rate must allow how many extra bandwidth.
Fig. 7 is the schematic diagram that utilizes the CCF technology of slice header according to one embodiment of the invention.The original cascade 705 of packet has been shown among Fig. 7, and CM has sent bandwidth request for it, also shows the formation 710 of packet waiting for transmission subsequently.In this case, CM uses slice header 730a, 730b and 730c that the original cascade 705 of packet is divided into 3 respectively and allows 715,720 and 725 so that transmission.Allow first byte after 715 interior slice header 730a point to slice header 730a.Allow slice header 730b in 720 to point to the DOCSIS 736 of the 3rd packet 737.Allow slice header 730c in 725 to point to the DOCSIS 741 of the 6th packet 742.Therefore, if any fragment loss, CMTS still can find the packet border of remaining fragment.CMTS MAC uses the size that allows to determine to extract what MAC bytes from each allows.As long as CM do not have outgoing data, CM is the same in existing DOCSIS system with it to fill this permission.
The example of slice header form is described in detail in this specification 7.2 joints.In one embodiment, slice header contains optionally incidentally field (piggyback field), and CM can use this field to come the outer bandwidth of amount of the claim.Use the rule of optional incidentally field in this specification 3.2.1 joint, to describe in detail.
The use of slice header takies the relative less expense of each fragment, realizes allowing the best of bandwidth to use.If there is not slice header, the CCF technology will have to stop packet to generate segment boundaries, waste a large amount of upstream bandwidths potentially, perhaps, have to be received under the situation that fragment loss occurs because of CMTS and can not find out the error rate that increases greatly that the border of mac frame produces.
Fig. 8-the 9th, the flow chart of the step of the continuous cascade of one or more embodiment and amount of information segmentation according to the present invention.Figure 10-the 11st, one or more embodiment use slice header to realize the additional step of the segment processing shown in Fig. 8-9 according to the present invention.
Fig. 8 is a flow chart 800 of realizing the step of continuous cascade and amount of information segmentation in CM.In step 805, the CM bandwidth on demand is to send the packet in the upstream queue.In step 810, CM receives a plurality of permissions from CMTS.Described permission is defined as the distribution of bandwidth on demand a plurality of mini-slot on the up channel of a plurality of bindings.
In step 815, CM is with the packet cascade in the formation.In another embodiment, when the bandwidth of distributing surpasses the bandwidth of request, the packet in the continuous level Company Train of CM, like this, packet in formation and newly arrived packet cascade allow to be filled up to this multichannel.For example, Figure 7 shows that how CM allows 725 with packet in the original cascade 705 and packet cascade waiting for transmission subsequently from formation 710 to fill.In another embodiment, when formation when being empty, CM fills the bandwidth of this permission with the form of fixed byte " FF " of upstream channel bonding (for example, to).
In step 820, CM is divided into a plurality of fragments by the packet with cascade and fills a plurality of permissions.The subclass of adjacent mini-slot in the corresponding up channel of the size of each fragment.CM uses the packet of cascade to fill this permission under the situation of not using DOCSIS cascade head.In step 825, CM is sent to CMTS with above-mentioned fragment.
Figure 10 is to use the segmentation method of strap paragraph header to realize the additional step of step 820 among Fig. 8.In step 1005, CM is cut apart the packet of at least one cascade, thereby divided data are distributed in a plurality of fragments.In step 1010, CM inserts slice header to help to distinguish the packet border in the fragment in each fragment.For example, as shown in Figure 7, CM inserts in the permission 715,720 and 725 slice header 730a, 730b and 730c so that transmission respectively.In another embodiment, comprise the pointer that points to the address of a DOCSIS head in this fragment in the slice header.For example, as shown in Figure 7, slice header 730b points to a DOCSIS 736 of fragment 720.When this fragment does not have a DOCSIS (fragment in the middle of being positioned at when for example a big packet is divided into plural fragment), the pointer significance bit in the slice header is eliminated.In another embodiment, slice header includes the expense of fixed amount.
Fig. 9 is a flow chart 900 of realizing the step of continuous cascade and amount of information segmentation in CMTS.In step 905, CMTS receives the bandwidth request of the packet be used for transmitting upstream queue from CM.In step 910, CMTS sends a plurality of permissions, is a plurality of mini-slot on the up channel of a plurality of bindings with the allocated bandwidth of request.In step 915, CMTS receives a plurality of fragments from CM.Described fragment comprises the cascade of packet in the formation, and the size of each fragment is corresponding to the subclass of the adjacent mini-slot in the up channel.In step 920, CMTS data reconstruction bag formation from the fragment that receives.
Figure 11 is to use the segmentation method of strap paragraph header to realize the additional step of step 915 among Fig. 9 and 920.In step 1105, CMTS receives a plurality of fragments, and these a plurality of fragments include the packet that at least one is divided into a plurality of fragments.In step 1110, CMTS is based on the information data reconstruction bag formation in the slice header of inserting each fragment.In one embodiment, CMTS is based on the pointer data reconstruction bag formation of pointing to a DOCSIS head in the homologous segment in each slice header.
2.2.3 the not segmentation of strap paragraph header
Some service flow has unique attribute, and described attribute makes CMTS not send under the situation of request the just size of known transmission at CM.In this case, according to one embodiment of present invention, the use of slice header can use existing DOCSIS request/transmission policy to activate and forbid based on service flow among the CCF.The value of request/transmission policy will stipulate whether slice header activates or forbid for a special services stream.For the disabled service flow of slice header, CM still can use the cascade part of CCF, but bans use of part charge.Therefore all fragments of the disabled service flow of slice header only comprise complete packet or a plurality of complete packet.If a fragment loss, CMTS MAC as can be known, the border of next fragment is consistent with the border of packet, and can continue to handle the packet of reception.
Under the disabled situation of slice header, CMTS can not distribute the bandwidth of more than one up channel to service flow.The reason of this constraint is that the packet sequence on the whole channel can not be protected under the situation of slice header not having.
When regulation is carried out the slice header deactivation operation to service flow, should use existing DOCSIS baseline privacy interface extension header (BPI EHDR) or existing DOCSIS request extension header (EHDR) when incidentally asking.The EHDR field provides the expansion to the mac frame form, is used for existing DOCSIS system and cuts apart to realize data link safety and frame, but also can expand to support additional function, for example is prescribed incidentally request when carrying out the slice header deactivation operation when service flow.When slice header activates, do not need the request field in the EHDR, at this moment because the slice header form allows incidentally to ask.
It should be noted that the slice header deactivation operation is used for the data flow of amount of bandwidth of these data flow needs of CMTS known service of UGS data flow and other types.The those of ordinary skill of ability field for the fragment situation littler than request amount of handling permission, can also define other purposes (for example optimum efficiency) of slice header deactivation operation as can be known, to strengthen request/transmission policy and CM operation rules.
Slice header activation/deactivation operation is that stipulate on the basis with each data flow.The UGS service can not only be applicable to the slice header activation manipulation but also be applicable to the slice header deactivation operation.
A reason carrying out the slice header deactivation operation is the expense that minimizes UGS stream.For little packet,, with respect to the data volume that sends, also be very big expense even increase by 2 bytes.By providing the slice header deactivation operation to the UGS data flow, one embodiment of the present of invention can minimize the expense of these small data packets.
3. bandwidth on demand
In order to describe the embodiment that the present invention uses the up channel bandwidth on demand of binding, among the application described embodiment and existing method are compared to help understanding.For example, existing DOCSIS request/permission mechanism allows CM at each the upstream SID request individual data bag of CM support or the cascade of a plurality of packets.After in case CM sends bandwidth request at given SID, after CM must wait until that it receives permission (or a plurality of permission) from the distribution bandwidth of CMTS, could be at the outer bandwidth of same SID amount of the claim.These constraints (promptly once only having a request to give prominence to and a packet or cascade) can prevent that in most of the cases request/permission of CM and CMTS from occurring inconsistent.When uplink throughput is about 100Mbps, needs to revise existing DOCSIS request/permission mechanism and in given time frame, ask more substantial bandwidth to allow CM.
A kind of such modification to the system of upstream channel bonding is under the situation of the relevant qos parameter of given and specific SID, allows CM to all packet bandwidth on demand that is ready to send.Except the restriction height of restriction ratio to conventional information stream to some service flow, described method and existing foundation are maximum can to allow the DOCSIS method of cascade similar.Because, generally, CM meeting requests more bandwidth, CM wants requests more bandwidth in a request.
It is the packet bandwidth on demand that has been ready for sending that existing DOCSIS system applied load request (burdened requesting) method allows CM.The applied load request, CM is with the form bandwidth on demand of " load " mini-slot.The load request includes the estimation to the needed PHY expense of transmits data packets.In existing DOCSIS system, the calculating of PHY " load " is carried out before it sends request by CM.Load request can be simplified the calculating at CMTS place, thereby CMTS can not need to do any extra calculating and just can allow the bandwidth of asking easily.Yet because CM can be simultaneously transmit having on a plurality of up channels of different PHY parameters, and CMTS can allow bandwidth to given CM on a plurality of up channels, and the load request causes the workload of CMTS to increase.If the up channel system that the load request is used for binding, in order to estimate original payload size, CMTS must carry out backwards calculation to reduce the PHY expense.Then, CMTS must be segmented in payload on a plurality of up channels and calculate with each part and allow relevant PHY expense.
In one embodiment of the invention, the up channel system of binding uses unload request (unburdened requesting) method to allow the packet bandwidth on demand of CM for being ready for sending.Use the unload request method, CM is with the form bandwidth on demand of " unloading " byte, because CM does not know which channel CMTS can select to allow the bandwidth of request.
In one embodiment, request field is expanded the interval (granularity) with length field that comprises 2 bytes and 4 bytes, can ask the highest 256 kilobytes to allow CM in single request.If CM need the given time be special service flow request greater than 256 kilobytes, CM must wait until that first request could the outer bandwidth of amount of the claim after being identified.The big I of the largest request of 256 kilobytes realizes reaching the MAP cycle of 20ms, and if so can allow single service flow to send the data transmission rate of the highest 100Mbps.In one embodiment, can programme by binding upstream channel descriptor (B-UCD) message in the interval of request size, and be programmed for other value except that 4 bytes to obtain the largest request size of 256 kilobytes.
3.1 request mechanism
As mentioned above, a kind of mechanism that realizes bigger uplink bandwidth request is to allow CM to ask it current based on needed all upstream bandwidths of the packet of preparing up transmission.Described request mechanism allows CM to send bandwidth request to CMTS based on queue length, and this formation queue comprises the known MAC head of all upstream data bags and packet.According to one embodiment of present invention, must be used in combination with above-mentioned CCF technology,, and under the situation of not finding out the packet border, can not allow request because CMTS does not know the border of individual data bag based on the request of queue length.When sending request at queue length, CM considers that all want data packets for transmission and needed amount of bandwidth, comprises the MAC layer expense that all are known.In one embodiment, step 310 shown in Figure 3 can realize that like this, CM sends bandwidth request to CMTS based on the length of the upstream queue of packet by the request based on queue length.In another embodiment, step 310 shown in Figure 3 can realize that therefore, bandwidth request comprises the MAC layer expense required bandwidth relevant with packet in the upstream queue by the request based on queue length.
According to one embodiment of present invention, when sending request at queue length, the bandwidth of CM request does not comprise any estimated value of slice header expense, because CM does not know that what fragments CMTS can use cut apart it and allow bandwidth.On the contrary, when CMTS sends when allowing to CM, CMTS adds expense with the compensating plate paragraph header with the additional bandwidth of necessity.In one embodiment, as shown in Figure 8, when use had the segmentation method of slice header in handling process 800, CM was not a slice header expense bandwidth on demand.In this case, in step 805, CM request unloaded bandwidth amount (unburdened amount ofbandwidth) is with the packet of transmission upstream queue; In step 810, CM receives a plurality of permissions from CMTS, includes additional amount of bandwidth in this permission and thinks that the fixed overhead of each slice header provides bandwidth.Similarly, in another embodiment, as shown in Figure 9, in handling process 900, use when having the segmentation method of slice header the expense of CMTS compensating plate paragraph header.In this case, in step 910, CMTS sends a plurality of permissions that include additional bandwidth, thinks that the fixed overhead of each slice header provides bandwidth.
According to one embodiment of present invention, CM is that given service flow on the up channel that can use of any CM sends bandwidth request.In one embodiment, in the step 305 as Fig. 3, CM sends bandwidth request to CMTS on available up channel.CMTS is optional then to be received this to it and asks employed up channel to allow bandwidth, or to any other up channel relevant with CM, or to the combination permission bandwidth of any up channel relevant with CM.
In order to distribute the flexibility that provides maximum for the SID on the up channel, one group of SID that is made up of a SID of each up channel in the upstream channel bonding group of system identification organizes according to an embodiment of the invention, and from the angle of request/permission, these DIS are considered as identical.Such one group of SID is called " SID_Cluster " in this application.The example of SID_Cluster such as table 1 are described.
SID_Cluster US# 1 SID US# 2 SID US# 3 SID US#4 SID
Cluster_0 58 479 85 1001
Table 1:SID_Cluster example
SID_Cluster is flowed by the special services that CMTS distributes on the CM.After above-mentioned distribution, as long as CM uses described service flow to make request, CM just must use the SID by the SID_Cluster appointment of the up channel that is applicable to that it is used to the request that sends.For example, with reference to the SID_Cluster example shown in the table 1, when going up the transmission bandwidth request at up channel 2 (US#2), the CM that is associated with SID_Cluster0 will use SID 479.Similarly, no matter when CMTS allows the request of a CM being associated with specific SID_Cluster, all must use the SID by the SID_Cluster appointment of the up channel that is applicable to selection to allow this request.For example, still with reference to the example in the table 1, if CMTS select to use up channel 3 (US#3) to allow request from SID 479, CMTS will be provided with permission to SID 85 for up channel 3 (US#3) in MAP.
According to one embodiment of present invention, CMTS uses single MAP at each channel to send permission on all channels.If the CMTS decision does not allow all bandwidth on demand, (it is the permission of distance of zero mark degree can to send traditional DOCSIS permission unsettled (grant pending) in MAP information, represent that a request has been received and is in pending status), be filled up to all requests that receive at this SID_Cluster.Perhaps, CMTS is optional then not to be sent and allows unsettledly, and allows CM ask the remaining part of required bandwidth once more.
According to one embodiment of present invention, when CM makes bandwidth request, it must store the mini-slot count value on the channel of asking (that is, CM sends the up channel of request), and sends the next immediate mini-slot count value on other channels in the channel bonding group when asking.Subsequently, CM searches the permission to the request SID_Cluster on all channels in the bindings group.If the affirmation time in the bindings group in the MAP of all channels has surpassed the time of request, and all less than unsettled at the permission of request SID_Cluster, then CM need ask any undelegated part in this raw requests once more in any one above-mentioned MAP.When CM made this and asks once more, it included the new bandwidth on demand that is used for letter data bag to be sent.
For given SID_Cluster, CM is allowed to a plurality of outstanding requests (outstandingrequests), and when service flow is provided, can provide more than 1 SID_Cluster to this service flow.Send bandwidth request in case CM is a service flow, whether request/transmission policy control the CM that is used for this service flow can make another request at this service flow before receiving permission or allowing the affirmation of unsettled form.If request/transmission policy forbids making a plurality of outstanding contention requests, then CM can not can not amount of the claim outer competition bandwidth, receive the affirmation that expression CMTS has received bandwidth request up to it.This affirmation can be adopted and allow or allow unsettled form.After in case CM receives the confirmation, but the just outer bandwidth of amount of the claim, although the request of CMTS before not filling up as yet.Aforementioned content provides explanation in ensuing example, CM asks 16 kilobytes in this example in its initial request.In response, CMTS determines to allow with the permission form of 2 group of 8 kilobytes the request of CM, and wherein each allows to have added fragmentation overhead, and these two groups allow to separate in time and appear among the different MAP.After CM received first permission, its request was identified, and CM can be any new packet that arrives and makes request after CM makes initial request now.
As mentioned above, according to one embodiment of present invention, more than one SID_Cluster can be distributed to a service flow.The request strategy parameter of this service flow determines when CM switches between SID_Cluster.In one embodiment, need CM and CMTS to support at least 2 SID_Cluster of each service flow.CMTS is required to use all the time same SID_Cluster to allow.When following any situation took place, CM need stop at the request of making on the given SID_Cluster: (1) reaches the maximum quantity of the outstanding request of each SID_Cluster; (2) reach the maximum quantity that each SID_Cluster gives prominence to byte; (3) reach the maximum total bytes that each SID_Cluster asks; Or (4) reach the maximum time in the SID_Cluster.
According to one embodiment of present invention, can not to use more than one SID_Cluster in a time be given service flow request bandwidth to CM.CM can switch to different SID_Cluster at any time, but under above-mentioned 4 kinds of situations, need stop current SID_Cluster is made request.In case CM stops using specific SID_Cluster, just can not re-use this SID_Cluster and come bandwidth on demand, all be satisfied up to all remaining bandwidth request at this SID_Cluster.If the affirmation time period in the bindings group on all channels has surpassed request time, and in current MAP, do not occur allowing unsettled, so, if request is not filled yet, then CM uses any SID_Cluster that can be used for asking to ask still undelegated bandwidth on this SID_Cluster once more.
Because CMTS can use many groups to allow to allow the bandwidth from single request, contingent situation be CM and CMTS can because request lose and lose with MAP and temporarily inconsistent, wherein this request is lost because of up burst errors and conflict occurring and is produced, and this MAP loses because of descending mistake and produces.According to one embodiment of present invention, CM must use the affirmation time of request to determine before decision is asked once more whether CMTS has received this request.No matter when CM receives at the permission of the request SID_Cluster among the MAP on any channel in the up bindings group unsettledly, and CM can not be to SID_Cluster bandwidth on demand once more.According to the request strategy parameter of service flow, CM can ask to be used for the new bandwidth of the uplink of this service flow.In case CM receives the MAP on all channels in the bindings group, and this MAP does not comprise when the permission of given SID_Cluster is unsettled, according to the request strategy parameter, CM can use the bandwidth of chance incidentally or any not data packets for transmission of competitive opportunity request, and its request time is early than the affirmation time in the current MAP.It should be noted that request that request time is later than acknowledging time still can be in the transmission or waits for the processing of CMTS.Before determining whether to ask once more, CM need wait for that the affirmation time on all channels surpasses request time in bindings group.This requirement can realize the independent operation of CMTS channel scheduler.
In the operation in losing the MAP process, suppose that CM sends 16 kilobytes requests in its initial request.CMTS receives this request and transmission and includes one group of one group of MAP that allows (the corresponding up channel of MAP information) to this CM.A MAP is because pulse noise is damaged, so CM abandons this MAP information.Simultaneously, CM receives the unspoiled MAP at other up channel.CM is according to the permission transfer data packets among the correct MAP that receives.Because CM does not receive the MAP at one of them channel, this MAP includes the affirmation time above request time, so CM can not determine whether that all requests all are allowed at this.Next group MAP arrives, and CM notices that the affirmation time on all channels surpasses request time, and does not allow unsettled at this request SID_Cluster.Hence one can see that for CM, and CMTS does not have the outstanding request at this SID_Cluster.Yet CM still has the data from original 16 kilobytes requests to be sent.CM sends new bandwidth request at the remaining part in these 16 kilobytes and any new being ready to for the packet of the up transmission of this service flow.
3.2 incidentally request (piggyback requesting)
Incidentally request relates to the use that the unicast data that is used for asking extra bandwidth distributes bandwidth.The effect of this request is the top " incidentally " in transfer of data.In one embodiment of the invention, when CM can be rule that given service flow incidentally asks based on whether having used slice header among the CCF.The use of slice header is based on each service flow.Use the incidentally example of the rule of request of slice header and forbidding slice header to provide below.
3.2.1 use the example of the incidentally request rule of slice header
Incidentally ask to carry out, so CM only can incidentally send the bandwidth request of the same service flow request of data for it based on each service flow.
Occur in the MAP of arbitrary channel at up bindings group at the permission of request SID_Cluster when unsettled, CM can not send the requested packets bandwidth on demand for using this SID_Cluster before.CM can incidentally not use before this SID_Cluster to send the bandwidth request of requested packets.
When each channel in CM is up bindings group receives SID_Cluster at request and does not occur allowing unsettled MAP, if when the request time in the MAP of all channels is early than the time of determining in this bindings group, the bandwidth of having asked before CM can ask once more.CM also can comprise the bandwidth of any newly arrived packet in this request.
Figure 12 is the incidentally flow chart 1200 of request that uses slice header according to one embodiment of the invention in CM.Sent bandwidth request to CMTS before the hypothesis CM in this handling process at the given SID_Cluster that is associated with the specified upstream bindings group.
Flow chart 1200 starts from deciding step 1205.If in step 1205, slice header is activated, flow process 1200 proceeds to step 1210 so.In deciding step 1210, if the MAP that receives from CMTS includes the permission of a channel the up bindings group unsettled, so, in step 1215, CM uses the incidentally field (piggyback field) in the slice header only to be the outer bandwidth of newly arrived packet amount of the claim in the upstream queue.Yet, if from the MAP that CMTS receives, do not allow at each channel the up bindings group unsettled, so, in step 1220, if the request time in each MAP is early than acknowledging time, CM uses the incidentally field in the slice header to ask the bandwidth of having asked before once more.In another embodiment, in step 1220, CM also uses the incidentally field in the slice header to be any newly arrived packet bandwidth on demand in the upstream queue.
3.2.2 the example of the incidentally request rule of forbidding slice header
When the slice header that is used for a certain service flow was disabled, CM can use BPI EHDR or request EHDR to send incidentally request.When CM wished that for it initial data of the incidentally request that sends sends request, CM must use BPI EHDR or request EHDR.
Occur in the MAP of arbitrary channel at up bindings group at the permission of request SID_Cluster when unsettled, CM can not send the requested packets bandwidth on demand for using this SID_Cluster before.CM can incidentally not use before this SID_Cluster to send the bandwidth request of requested packets.
When each channel in CM is up bindings group receives SID_Cluster at request and does not occur allowing unsettled MAP, if when the request time in the MAP of all channels is early than the time of determining in this bindings group, the bandwidth of having asked before CM can ask once more.CM also can comprise the bandwidth of any newly arrived packet in this request.
Refer again to Figure 12, flow process 1200 is depicted as the step of incidentally asking in the CM when slice header is disabled.Sent bandwidth request to CMTS before the hypothesis CM in this handling process at the given SID_Cluster that is associated with the specified upstream bindings group.
Processing starts from deciding step 1205.In step 1205, if slice header is not activated, flow process 1200 proceeds to deciding step 1225.According to deciding step 1225, if include the permission of a channel in the up bindings group unsettledly from the MAP that CMTS receives, so, in step 1230, CM uses BPI EHDR or asks EHDR only to be newly arrived packet bandwidth on demand in the upstream queue.Yet, if from the MAP that CMTS receives, do not allow each channel in the up bindings group unsettled, so, in step 1235, when request time was early than acknowledging time among each MAP, CM used BPI EHDR or request EHDR to ask the bandwidth of having asked before once more.In another embodiment, in step 1235, it is any newly arrived packet bandwidth on demand that CM also uses BPI EHDR or request EHDR.
3.3 contention requests (contention requesting)
According to one embodiment of present invention, in binding up channel system, can use contention requests.Contention requests on the bound channels and traditional DOCSIS not contention requests on the bound channels are approximate.Each up channel is assigned a sequence number in one group of sequence number in the bindings group.CM counts with time sequencing the request chance on all channels (request opportunities).When the zero-time of the request chance on two or more up channels is alignd, as long as the offset (backoffvalue) that all chances are selected at random with respect to CM is counted, then choose the order of these chances by the CM decision, this offset had defined CM before making a decision, and must let slip what request chances.
According to one embodiment of present invention, CMTS must distribute to the request chance in the required institute's mini-slot of the request that sends on given channel, and is because for CM, more difficult than counting on single up channel to request chance counting on all channels.For example, if each request needs 2 mini-slot on some channels, CMTS must be assigned as 2 a plurality of mini-slot (for example, the request district of 5 mini-slot is unallowed) with the request district on this channel so.It should be noted that in existing DOCSIS system, do not forbid the incorrect request of CMTS allocated size district.
When the counting request was with modification backoff window (backoff windows) again, CM must only count the request that sends in the competition district.Therefore, do not influence the employed backoff window of CM transmission contention requests with the request of incidentally pattern transmission and the request of losing because of noise.
Figure 13 is the flow chart 1300 that uses the step of the up channel of the binding request of being at war with according to one embodiment of the invention.In step 1305, distribute a plurality of request chances on the up channel of CMTS in a plurality of binding up channels, the request chance of described a plurality of distribution is a plurality of required a plurality of mini-slot of data that send on this channel.In step 1310, receive bandwidth request from CM in CMTS at least one request chance on the binding up channel.
3.3.1 influence to tradition competition retry count (legacy contention retry accounting)
DOCSIS 2.0 regulation and stipulations reach 16 times if CM retry contention requests is unsuccessful, and CM should abandon its requested packets or cascade, and begin the next packet of this service flow or the request of cascade are handled.In one embodiment of the invention, adopt a plurality of outstanding requests and cascade and segmentation continuously, then need different definition the retry threshold value.For the CM according to embodiment of the invention work, " request retry " parameter is redefined and is " at the quantity of the continuous competition retry of the bandwidth allocation request of given service flow ".Comprise following requirements in " Contention Resolution Overview " chapters and sections of DOCSIS 2.0 standards: " this retry step continues, and up to reaching determined maximum number of retries amount (16), at this moment must abandon PDU ".In one embodiment of the invention, this requirement becomes " this retry step continues; up to reaching the maximum quantity (16) that closes on the competition retry, once is those packets of the request of service flow transmission packet after at this moment CM abandons doing from the correspondence that the stem of uplink formation begins ".
4. allow bandwidth (granting bandwidth)
In one embodiment of the invention, CMTS scheduler (scheduler) based on the available bandwidth of all up channels in the bindings group to each channel assignment bandwidth.Request on any individual channel can be assigned the bandwidth in any combination of up channel in the bindings group that should ask service flow.By this way, CMTS can carry out the real-time load balance on the up channel.Similarly, CMTS can consider the physical layer parameter on each up channel and the byte number of request, to determine the optimal distributing scheme on all channels.
In one embodiment of the invention, CMTS uses traditional DOCSIS MAP information to send permission to CM.Since different between the last line parameter of each channel is mutual, also different between the distribution zero-time of MAP is mutual.Because distribute zero-time and acknowledging time to be very different, in one embodiment of the invention, before determining whether to ask once more, CM must wait for that the affirmation time of all up channels surpasses request time.
In traditional DOCSIS system, CMTS can ignore a part or the whole request of a request.Ignore the reduction (with respect to traditional system) that can cause performance from the request that realizes CM of the present invention,, realize the request that CM of the present invention may need longer time detecting to lose because if a plurality of outstanding requests are arranged.
In one embodiment of the invention, CMTS needs and can allow bandwidth to any channel in the up bindings group, no matter bandwidth request receives on which channel.
5. the influence of baseline privacy (baseline privacy impact)
Traditional DOCSIS baseline protection interface (BPI) is one group of expansion service in the DOCSIS MAC layer, in order to the information flow between CMTS and the CM is encrypted to provide the data encryption service to the user in the RF network.In order to describe the embodiment that the present invention binds the traffic flow security on the up channel, embodiments of the invention and prior art are compared to help understanding.
5.1 existing DOCSIS traffic flow security
Whether existing DOCSIS system is divided each section according to information flow in DOCSIS MAC layer, with two kinds of diverse ways process information stream encryptions.Following Figure 14 that is described in detail-16 is depicted as existing DOCSIS traffic flow security technology.
For the transmission of not cutting apart single mac frame that needs are encrypted, described frame begins to the CRC of packet all encrypted from 12 bytes behind the DOCSIS MAC head.Described 12 bytes biasing makes the entity that receives carry out filtering in the combination (not using under the situation of pay(useful) load head compression) at destination address/source address (DA/SA) before the deciphering.The biasing of this 12 byte can also realize stronger password, because frequent destination address string and the source address string that occurs still is visual, so just can not provide the decoding prompting for the computer hacker.
For unsegmented cascade, each mac frame in the cascade is regarded as unsegmented single mac frame and treats.The mixed of unencryption and encrypted frame will appear in the cascade.As long as MAC management information (supposing unencryption) and enciphered data are included in the cascade, above-mentioned mixed phenomenon will occur.Figure 14 carries out the schematic diagram that existing DOCSIS amount of information with the biasing of 12 bytes is encrypted to undivided individual data bag 1401 and undivided cascade packet 1402.As shown in figure 14, undivided individual data bag 1401 comprise the unencryption DOCSIS MAC 1410 of the CRC by packet, from the 12 bytes biasing 1405 of this unencryption DOCSIS MAC 1410 beginnings and follow in the setover encryption payload 1415 of 1405 back of this 12 byte.Similarly, each frame of packet cascade 1402 comprises the encryption payload portions 1425,1435,1445,1455 and 1465 of following in 1405 back of setovering from unencryption DOCSIS MAC 1420,1430,1440,1450 and 1,460 12 bytes that begin of correspondence.
Processing to single frame of having cut apart and the cascade of having cut apart is different with its undivided form.Figure 15 shows that the individual data bag of having cut apart 1500 is carried out the schematic diagram that existing DOCSIS amount of information is encrypted.Raw data packets 1500 is split into 3 and allows 1501,1502 and 1503.Each fragment 1505,1510 and 1515 packages have corresponding slice header 1520,1525 and 1530 and corresponding fragment CRC1535,1540 and 1545.As shown in figure 15, each fragment 1505,1510,1515 is all encrypted to homologous segment CRC from the end of counterpiece paragraph header.
Because the segment boundaries in cascade seldom with the packet boundary alignment, therefore existing DOCSIS traffic flow security technology is considered as a big mac frame with the cascade of packet.Therefore, for the packet cascade of having cut apart, each cascade fragment package has slice header and fragment CRC.Subsequently, this fragment is encrypted from end to the fragment CRC execution of slice header.Be used for the frame that the 12 bytes biasing of undivided frame can not be used for having cut apart, because this 12 byte is that user data rather than DA/SA are right.
Figure 16 carries out the schematic diagram that existing DOCSIS amount of information is encrypted to the packet cascade of having cut apart 1600.Packet cascade 1600 is split into 3 by 3 permissions 1601,1602 and 1603 and has corresponding slice header 1606,1611 and 1616 fragment 1605,1610 and 1615.It should be noted that all packets are encrypted (that is, each fragment being encrypted from terminal the execution to corresponding fragment CRC of the slice header of correspondence) in the same way in fragment 1605,1610 and 1615.
With reference to Figure 16, if allow first packet 1620 in 1601 should be encrypted, but second packet 1625 should be not encrypted, but two packets are all with encrypted.Therefore, if cascade 1600 should include the BPI cipher key exchange message and be cut apart, this BPI cipher key exchange message will be encrypted in one or more fragments 1605 and 1610.If this cipher key exchange message is encrypted, and the key that uses is incorrect, and CMTS can not be decrypted the message that includes this new key.Because this reason, traditional DOCSIS traffic flow security technology forbids that CM comprises the BPI cipher key exchange message in cascade.
5.2 traffic flow security to the binding up channel
For binding up channel system, how the CMTS decision cuts apart the bandwidth on the up channel, and does not know that in advance CM can transmit the packet of which kind of type in given fragment.Therefore, unless add extra mechanism in the existing DOCSIS agreement that is used for binding the up channel system, otherwise can not guarantee that the BPI cipher key exchange message has its oneself fragment.
In this agreement, add other mechanism with it, not as good as making the encryption of avoiding binding BPI cipher key exchange message in the up channel system in the following method: (1) is carried out BPI based on each fragment and is encrypted, or (2) secondary service flow is exclusively used in and realizes upstream channel bonding sending each CM of BPI cipher key exchange message, or (3) are carried out BPI based on each protocol Data Unit and encrypted before segmentation.Described three kinds of methods are described in detail below.
5.2.1CM force the transmission of individual data bag
A kind of mechanism of avoiding the BPI cipher key exchange message of binding up channel system is encrypted is to be that encrypt on the basis with the fragment, and promptly always forcing the BPI cipher key exchange message is only packet in the fragment.The slice header that the method requires all to need the fragment of BPI includes the BPI head.The method also requires CM to have intelligent request broker (requesting agent), and can stop the request engine around the BPI cipher key exchange message.
For example, consider the packet sequence shown in the table 2.Suppose that table 2 is depicted as the current list of waiting in line the packet of uplink in the special services stream of CM.In order to prevent that the 5th BPI cipher key exchange message and other packet in the packet is included in the fragment, CM at first sends request for 4 packets in the formation.In case after CM received permission to these 4 packets, CM only was that the 5th packet sends request.Subsequently, CM be the 6th and the 7th and formation in other packets send bandwidth request before, wait for so that this allows to fill up the transmission of the 5th packet once more.This method efficient comparatively 7 packets in the formation shown in the table 2 to send a request efficiency lower.
Packet sequence number in the formation Type of data packet
1 User data
2 User data
3 SNMP response
4 User data (affirmation)
5 The BPI cipher key exchange message
6 User data (affirmation)
7 User data
Packet in the table 2CM formation
5.2.2 use the service-specific stream of BPI forbidding
Another avoid to the mechanism that the BPI cipher key exchange message of binding up channel system is encrypted be to each that only is used for the BPI cipher key exchange message and is used for other not needing the message of encrypting carry out upstream channel bonding CM use special secondary service flow.In described method, no matter when ask to send the bandwidth of BPI key message, CM uses the BPI-OFF service flow.Though described method is avoided the problem to the encryption of BPI cipher key exchange message, it all needs extra service flow to each CM.Increase extra service flow and for wired operator, do not want, because can increase the quantity of DOCSIS equipment like this and need to use DOCSIS machine top gateway (DSG) to carry out set-top box control.
5.2.2 encrypt based on PDU rather than fragment
In binding up channel system, encrypt based on each fragment with it or, encrypt not as good as before segmentation, carrying out BPI based on each PDU (that is, based on single mac frame) for the BPI cipher key exchange message requires special-purpose service flow.Do not bind the mixed of uplink channel information stream and binding uplink channel information stream for CMTS can be handled, rule identical with BPI Plus encryption technology with above-mentioned existing BPI and the biasing of 12 bytes are used in the encryption that each packet is carried out.
Figure 17 carries out schematic diagram that BPI encrypt based on each PDU according to one embodiment of the invention before segmentation.As shown in figure 17, the formation 1704 of raw data packets cascade 1700 and follow-up data to be transmitted bag uses existing BPI encryption technology to encrypt.Each encrypted packet 1710,1715,1720,1725,1730,1735 and 1740 is followed 12 bytes that begin at the DOCSIS head from correspondence, 1705 back of setovering.Then, encrypted data packet is partitioned in the permission 1701,1702 and 1703.
According to one embodiment of present invention, because the incidentally field in the existing BPI EHDR is too little so that can not send unload request in a plurality of 4 bytes, need make amendment to existing DOCSIS BPI EHDR, make it comprise longer incidentally field being used to not have the situation of slice header, or make it not comprise that field incidentally has been used to have the situation of slice header.These amended BPI EHDR types are described in detail in the 7.3.1 joint.
6. system initialization
Figure 18 A and 18B are used for flow chart 1800 to the step in the initialized CM of CMTS of binding up channel system according to one embodiment of the invention.After CM obtained suitable down channel, in step 1805, CM sought binding upstream channel descriptor (B-UCD) message.In step 1810, if CM can not find B-UCD message in predetermined time frame, so, in step 1815, CM returns traditional not binding up channel operation.
If CM finds B-UCD message in predetermined time frame, so, in step 1820, CM begins to be the up channel store M AP message relevant with B-UCD.In step 1825, CM also begins to store relevant upstream channel descriptor (UCD) message of each channel in the bindings group that identifies with B-UCD.
In step 1830, CM begins a up channel in the bindings group is arranged.In step 1835, in case receiving up channel, CM arranges the indication finish, CM sends on this channel based on the bandwidth request of the queue length remaining part with the realization initialization process.
In step 1840, in registration process, what up channels CM notice CMTS it can bind.In step 1845, in same registration process, it wishes what up channels CM uses CMTS notice CM.The registration message attribute is described in detail in the 7.4.3 joint.
Before finishing registration process (for example, before transmission REG-ACK information is to CMTS), CM uses extra reflector to attempt arranging the additional up channel by up bindings group appointment that is distributed by CMTS with parallel mode, shown in step 1850.This distribution can realize by DOCSIS REG-RSP message.In addition, can in REG-RSP message, specify the permutation technology of these additional channels.In one embodiment, if CM can not successfully arrange the up channel of all regulations, CM sends has the REG-ACK of failure code to CMTS.
In step 1855, CM determines whether that finally the up channel to all appointments of success arranges.If CM can use the up channel of each appointment to non-arrangement information stream so, shown in step 1865.If not, CM wherein only has the part of the up channel of appointment to be used for non-arrangement information stream, shown in step 1860 with operating part channel operation (as mentioned above) so.
In one embodiment of the invention, CMTS must continue as CM and sent and arrange that each up channel provides clean culture to arrange chance to CM in the bindings group finish indication.If CM in predetermined time frame (for example, traditional DOCSIS T4 time frame) do not receive clean culture and arrange chance, or (for example reach transmission arrangement request data package, traditional DOCSIS RNG-REQ message) threshold values, CM can not use the up channel tabulation from it and removes relevant up channel so, and continue remaining up channel is operated, such as following " local channel operation " save description.
6.1 local channel operation
If any time after entering mode of operation, CM surpasses the retry threshold values of its positional alignment or at predetermined time frame (for example, traditional DOCSIS T4 time frame) do not receive in chance is arranged in the clean culture of given up channel, CM thinks and oneself no longer this specified upstream channel arranged, and stops to transmit any information except array data bag on this up channel.CM must respond on this up channel clean culture and arrange chance, but up to receive this up channel arrange finish information before, necessarily can not transmit any non-array data bag.
At last, CMTS recognizes that CM no longer arranges on this up channel.CMTS responds with following content: (1) allows the residue channel enterprising line operate of CM continuation in this bindings group, and only distributes permission on the residue channel that CM arranges; (2) order CM moves to a different bindings group that does not comprise this problem channel by DCC; (3) if wide range of problem exists, CMTS can select to remove the problem channel by changing B-UCD from bindings group; Perhaps (4) CMTS can indicate CM to restart by suitable information.
7. detailed MAC changes
As mentioned above, in one embodiment, upstream channel bonding technology of the present invention is embodied as the expansion of traditional DOCSIS interface specification.Therefore, followingly introduce several new and the MAC forms of revising to expand traditional DOCSIS interface specification to support upstream channel bonding.
7.1 solicited message
In one embodiment of the invention, for make CMTS can distinguish traditional based on the load mini-slot the DOCSIS bandwidth request and based on the bandwidth request of the binding up channel of unloading byte, define a new request header.This new request header is ignored by traditional DOCSIS system.For example, table 3 is depicted as in the binding up channel system and includes the new traditional DOCSIS 2.0 FC_PARM fields based on queue length claim frame type after the expansion.
FC_PARM Head/frame type
00000 The sequential head
00001 MAC manages head
00010 The tradition claim frame
00011 Slice header
00100 Claim frame based on queue length
11100 The cascade head
The specific head of table 3MAC-(MAC-Specific Headers) and frame type
Figure 19 shows that schematic diagram based on the claim frame form 1900 of queue length.Except the MAC_PARM field was 2 bytes rather than 1 byte, described form and traditional DOCSIS claim frame form were approximate.As shown in figure 19, queue length comprises 4 fields for the claim frame 1900 on basis: frame control (FC) field 1905, MAC_PARM field 1910, SID field 1915 and a verification sequence (HCS) field 1920.Fc field 1905 comprises 3 fields: FC type field 1925, FC PARM field 1930 and EHDR_ON field 1935.Described queue length is described in detail for the field such as the following table 4 of the claim frame 1900 on basis.
Field Operating position Size
FC FC_TYPE=11; MAC-Specific FC_PARM[4:0]=00100; Only MAC request header free of data PDU follows EHDR_ON=0; No ENDR is allowed to 1 byte
MAC_PARM REQ2, the total amount of byte unit of request are the N byte, and wherein N specifies in binding upstream channel descriptor message 2 bytes
SID Service ID 2 bytes
EHDR Undelegated extended MAC head 0 byte
HCS MAC verification sequence 2 bytes
Queue length is the length of the request MAC head on basis 7 bytes
Table 4 queue length is the claim frame form on basis
7.2 slice header form
As mentioned above, cut apart, in each fragment, insert slice header for the binding up channel is carried out.Figure 20 is the schematic diagram of slice header form 2000 according to an embodiment of the invention.Slice header length is 8 bytes.As shown in figure 20, slice header 2000 comprises 7 fields: pointer field is (PFV) field 2005, reservation (R) field 2010, pointer field 2015, sequence number 2020, SID_Cluster (SC) field 2025, request field 2030 and MAC verification sequence (HCS) field 2035 effectively.Be described in detail in the field table 5 below of slice header 2000.
Field Operating position Size
PFV Pointer field is effective.It is effective to be made as 1 expression pointer field, and being made as in the 0 expression pointer field does not have effective pointer. 1
R Reserve, be made as 0 by CM 1
Pointer field When the PFV position is 1, the value of this field is the quantity through the byte at slice header end, and receiver must be jumped when seeking MAC of DOCSIS 14
Cross this byte.Therefore, the value of pointer field be 0 and PFV be made as 1 expression DOCSIS MAC head and after slice header, begin.
Sequence number # Based on each fragment of specific service flow, sequence number increases by 1. 13
SC The SID_Cluster relevant in the next field of slice header with request.Effectively the SID_Cluster scope is 0 to M-1, and wherein M is the quantity that is assigned to the SID_Cluster of this service flow. 3
Request Be the sum of byte of the request of unit with the N byte, wherein N specifies in binding upstream channel descriptor message. 2 bytes
HCS MAC verification sequence.Similar to the HCS that uses on all MAC heads, on all other fields of slice header, calculate. 2 bytes
Table 5 slice header field
A 7.3 form of expansion
According to one or more embodiment of the present invention, several new DOCSIS EHDR types and length can add in the existing docsis specification to be applicable to upstream channel bonding, and is as shown in table 6 below.New EHDR type comprises: EH_TYPE=1 and EH_LEN=4 and EH_TYPE=7 and EH_LEN=3 and 5.
EN_TYPE EN_LEN EH_VALUE
0 0 Empty configuration settings can be used for filling extension header.EN_LEN is necessary for 0, but configuration setting can be repeated.
1 3 Request in the mini-slot.Request (1 byte); SID (2 byte) [CM → CMTS]
1 4 The queue length of Nx byte is the request on basis; N specifies in B-UCD; Request (2 byte); SID (2 byte) [CM → CMTS]
2 2 The affirmation of request; SID (2 byte) [CM → CMTS]
3 (BP_UP) 4 Up secret EH component [DOCSIS]
5 Up secret [DOCSIS] with fragment EH component
4(BP_DOWN) 4 Descending secret EH component [DOCSIS]
5 1 Service flow EH component; A payload compressing head downstream data flow
6 1 Service flow EH component; A payload compressing head upstream
6 2 Service flow EH component; A payload compressing head downstream data flow (1 byte), not Qing Qiu permission synchronous head (1 byte)
7(BP_UP2) 3 Not incidentally the request up secret EH component
7(BP_UP2) 5 Have incidentally up secret EH component based on the request of queue length, the Nx byte, wherein N specifies in B-UCD
8-9 Reserve
10-14 Reserve [CM ← → CM]
15 XX The EH component of expansion; EHX_TYPE (1 byte), EHX_LEN (1 byte), EH_VALUE (length is determined by EHX_LEN)
A form of table 6 expansion
Table 6 in this specification and some form subsequently relate to the byte requests multiplier (note is made " N ") of appointment in the B-UCD message.Yet, it should be noted that the byte requests multiplier in fact is encoded to the service flow parameters of relaying in the wire line MODEM registration process in an optional embodiment of the present invention.
7.3.1 length is 4 request EHDR
Effective to CM when upstream channel bonding, and slice header is to given service flow when invalid, CM under the situation that does not have the baseline privacy head, the incidentally request on packet of having an opportunity.In order to handle this situation, length is that 4 second type request EHDR can be used in the embodiments of the invention, and is as shown in table 7 below.
EH component field Operating position Size
EH_TYPE EH_TYPE=1 4
EH_LEN The EH_LEN=4 of slice header deactivation operation 4
EH_VALUE Ask a plurality of N bytes (2 byte), SID (2 byte), N specifies in B-UCD 4 bytes
Table 7 length is 4 request EHDR
7.3.2BP_UP2
In one embodiment of the invention, upstream channel bonding and baseline privacy (baseline privacy) effectively can be used BP_UP2 EHDR under the situation.Effective to CM when upstream channel bonding, and slice header is effective to given SID, and any incidentally request to this SID will be used the incidentally chance in this slice header.Therefore, for this SID, do not need to use incidentally field among the BPI EHDR.CM will to slice header can with SID to use length be 3 BPI_UP2 EHDR.Length is that the field of 3 BPI_UP2 EHDR is as shown in table 8.
EH component field Operating position Size
EH_TYPE EH_TYPE=7 is used for bound channels 4
EH_LEN EH_LEN=3 is used for the slice header available action 4
EH_VALUE Key sequence (4), version (4), activation (1), triggering (1), SID (14) 3 bytes
Table 8 length is 3 BP_UP2 EHDR (slice header can be used)
Effective to CM when channel bonding, and slice header is under the disabled situation of given service flow, and BPIEHDR can realize incidentally asking chance.CM will be 5 BPI_UP2 EHDR to the disabled SID use of slice header length.Length is that the field of 5 BPI_UP2 EHDR is as shown in table 9.
EH component field Operating position Size
EH_TYPE EH_TYPE=7 is used for bound channels 4
EH_LEN EH_LEN=5 is used for the unavailable operation of slice header 4
EH_VALUE Key sequence (4), version (4), activation (1), triggering (1), SID (14), request (2 byte) 5 bytes
Table 9 length is 5 BP_UP2 EHDR (slice header forbidding)
7.4MAC administrative messag changes
According to one or more embodiment of the present invention, a plurality of MAC administrative messag attributes are modified, and have created a plurality of new MAC administrative messags to support the up channel of binding.MAC administrative messag that these have been revised and new MAC administrative messag are as shown in table 10 below.
Change Types value Version Message name Message semantic definition
Revise 6 1 REG-REQ Register requirement
Revise 7 1 REG-RSP The registration response
Revise 14 2 REG-ACK Accreditation verification
Revise 32 2 DCC-REQ Dynamic channel changes request
New 34 4 B-UCD The binding upstream channel descriptor
New 36 4 B-RNG-Abort Bound channels is arranged and is interrupted
New 37 4 B-RNG-Abort-ACK Bound channels is arranged interruption acknowledge
New and the MAC administrative messag that revised of table 10
7.4.1 binding upstream channel descriptor (B-UCD)
According to one embodiment of present invention, binding upstream channel descriptor (B-UCD) message is transmitted the characteristic of with definition binding up channel group in cycle time in the interval by CMTS.Need bind the up channel group for each and send an independent B-UCD message.The first of B-UCD form and traditional DOCSIS single channel upstream channel descriptor (UCD) message format are approximate, therefore can use the filtering of same type to come filtering channel ID and change count value.Each channel that CMTS also is necessary in every group binding up channel sends UCD message.
Figure 21 is the schematic diagram of upstream channel descriptor (B-UCD) message format 2100 according to an embodiment of the invention.B-UCD message format 2100 comprises type lengths values (tlv) set of encoded information (the tuple encoded information) 2102 of unit and the following parameter of MAC administrative messag head 2101, all binding up channels: binding up channel identifier 2105, configuration change count value 2110, requesting interval parameter 2115 and down channel identifier 2120.These four parameters 2105,2110,2115 and 2120 are defined as follows:
Binding upstream channel id: the identifier of the up bound channels that this message relates to.This identifier is at random selected by CMTS, and only unique in the media access control sublayer field.Attention: upstream channel id=0 keeps for the expression phone to return [DOCSIS6].
Configuration change count value:, increase by 1 (is mould with the field size) by CMTS as long as this channel descriptor changes.If this counting remains unchanged in UCD subsequently, CM can determine the channel operation parameter not change apace, and can ignore remaining message.
Requesting interval: this field is specified the interval N of the second class request with the form of byte.Par value is N=1,2,4,8 and 16.
Down channel ID: the identifier of the down channel that this message is transmitted.This identifier is selected arbitrarily by CMTS, and only unique in the media access control sublayer field.
Every other parameter is encoded as TLV tuple 2102.Types value such as the following table 11 used.
Title Type (1 byte) Length (1 byte) Value (variable-length)
The bindings group size 1 1 Channel quantity in the bindings group (1 to M)
Subchannel 2 1 Channel id in the bindings group.This TLV repeats each up channel in the bindings group.
Table 11 bound channels TLV parameter
CMTS can use the quantity of channel in the B-UCD message alteration bindings group.For example, CMTS can use the increase of B-UCD message or reduce the quantity of channel in the bindings group, and CMTS also can use B-UCD message with the channel in the alternative bindings group of the processing of 2 steps.Figure 22 is the flow chart 2200 that uses the step of the channel setting in the B-UCD message alteration binding up channel group according to one embodiment of the invention in CMTS.In step 2205, CMTS sends the B-UCD message that defines the bindings group characteristic in cycle time in the section.
7.4.1.1 from the upstream channel bonding group, remove channel
In step 2210, if the CMTS decision changes the quantity of channel in the bindings group, flow process 2200 proceeds to step 2215 so.In step 2215, if the CMTS decision removes the channel in the bindings group, flow process 2200 proceeds to step 2230 so.In step 2230, in order to remove up channel from bindings group, CMTS at first must stop the target up channel that will remove is stopped to shine upon the binding configuration (that is, to asking the distribution of district, alignment area, data permission or the like) that defines any time.Subsequently, in step 2235, CMTS uses the quantity of channel in the amended bindings group and the channel list after the minimizing to upgrade B-UCD, simultaneously configuration change count value field is added 1.Because there is not corresponding B-UCD to change the change count value of count value in MAP information, when CM treatments B-UCD message, the CM place can change.Therefore, CMTS must stop to send permission to the CM that binds on the destination channel before the new B-UCD of transmission.
7.4.1.2 up bindings group is added channel
In step 2215, if the CMTS decision adds channel to bindings group, flow process 2200 proceeds to step 2220 so.When CMTS wanted bindings group adding up channel, CMTS upgraded B-UCD, shown in step 2220.The CM that can add extra up channel (based on the maximum quantity of the bound channels of appointment in the registration process) will attempt arranging new up channel.Described arrangement can use the permutation technology of REG_RSP message definition to realize.
7.4.1.3 replace the channel in the up bindings group
In step 2210, if the quantity of CMTS decision change channel in the bindings group, flow process 2200 proceeds to step 2245 so.In step 2245, if the channel in the bindings group is replaced in the CMTS decision, flow process 2200 proceeds to step 2250 so.In order to substitute a channel in the up bindings group with one other channel, CMTS at first must stop the destination channel that will remove is sent permission, shown in step 2250.Subsequently, CMTS must send new B-UCD, with the old channel in the new channel replacement channel list, shown in step 2255.CMTS also must upgrade the change count value among the B-UCD.Because there is not corresponding B-UCD to change the change count value of count value in the MAP information, when CM treatments B-ucd message, the CM place can change.Therefore, CMTS must stop to send the binding CM that allows to the destination channel that will delete before the new B-UCD of transmission.When CM received the B-UCD that has replacement, it must abandon any outstanding request in replaced channel.The CM that can add extra up channel (based on the maximum quantity of the bound channels of appointment in the registration process) must attempt arranging on new up channel.Described arrangement can use the permutation technology of REG_RSP message appointment to realize.
7.4.2MAP message
In one embodiment of the invention, MAP message does not send in down channel with binding.When one embodiment of the present of invention are used old (for example, traditional DOCSIS) MAP structure, also provide the definition of having revised of acknowledging time, have better flexibility to allow CMTS.New definition is: handle in the MAP of this channel and nearest time of (by allowing or allowing unsettled) CMTS initialization (mini-slot) of reflection.
7.4.3 registration message
According to one or more embodiment of the present invention, below the registration parameter is modified or adds in traditional docsis specification to control the use of upstream channel bonding.
7.4.3.1 upstream channel bonding performance TLV
The value field of tradition DOCSIS modem performance coding has been described the performance of specific CM, for example to the restriction relevant with realization of special characteristic or the quantity of the supported feature of CM.In one embodiment of the invention, upstream channel bonding performance TLV parameter is added in traditional DOCSIS modem performance coding, and its value is represented the upstream channel bonding support of CM.This type is 5.13, and length is 1 byte.Described value is as follows: 0=does not support segmentation or upstream channel bonding; 1=only supports the segmentation on the single up channel; 2=supports the upstream channel bonding on 2 channels; M=supports the upstream channel bonding of (maximum of M is 255) on M the channel.
7.4.3.2 maximum cascade pulse (Maximum Concatenated Burst) TLV
Maximum cascade pulse TLV parameter is the part of existing Upstream-Specific Qos parameter coding, and the maximum cascade pulse train (with byte) of definition service flow permission.In one embodiment of the invention, because the notion of cascade is different with upstream channel bonding, when upstream channel bonding is in effective status, change parameter is changed the byte that can ask with definition CM in single request maximum quantity.
7.4.3.3 the largest request byte is given prominence to TLV
In one embodiment of the invention, the outstanding TLV parameter of largest request is added in the Upstream-Specific Qos parameter coding of traditional DOCSIS system to handle upstream channel bonding.Demandable amount of bandwidth when this parameter limit CM sends outstanding the request.Described type is 23.25, and length is 4.Described value is the maximum quantity that CM may give prominence to the byte of request.Combine with the maximum cascade pulse TLV parameter of above-mentioned modification, this parameter can replace the function that maximum cascade pulse provides in the traditional DOCSIS system.
7.4.3.4 request/transmission policy TLV
The characteristic that request/transmission policy TLV parameter in the Upstream-Specific Qos parameter coding has specified the request/permission to given service flow to handle.In one embodiment of the invention, this parameter is modified to include extra value, in order to the use of control strip paragraph header and outstanding request.Described type is 24.16, and length is 4.Described value bans use of slice header for the 9=service flow, and the 10=service flow bans use of the competition district to send a plurality of outstanding bandwidth request.
7.4.3.5 secondary channels permutation technology TLV
The permutation technology that CM used when secondary channels permutation technology TLV parameter had been specified secondary up channel initial arrangement, its length is 1, being worth is that 0=uses broadcasting initial arrangement district; 1=uses clean culture initial arrangement district; 2=uses broadcasting or clean culture initial arrangement district.
7.4.4 configuration file changes
Following content description configuration file according to an embodiment of the invention changes.
7.4.4.1 the restriction of the quantity of outstanding request
The quantity of the outstanding request of each SID_Cluster that the specific service flow of this parameter permission operator's restriction can have.For example, if described value is 1, CM once only can make a request to each SID_Cluster.In one embodiment of the invention, if described parameter is left in the basket in the initial DSx of CM request or REG-REQ, CMTS must specify a quantity in corresponding response.Described type is 24. (to be determined), and length is 1, and value is the maximum quantity of outstanding request (value is that 0 representative restriction is not specified).
7.4.4.2 up bindings group replacement value (override)
When occurring, this parameter provides the replacement value of up bindings group.Length is 1, is worth the channel id for up bindings group.
7.4.5DCC-REQ message
In one embodiment of the invention, the implication of dynamic channel change (DCC) message is modified to be used for the upstream channel bonding operation.In traditional DOCSIS system, CMTS can transmit DCC request (DCC-REQ) message so that CM changes the up channel that it is sending data, with and receiving the down channel of data, perhaps both.
7.4.5.1 binding upstream channel id
When occurring, binding upstream channel id TLV specifies CM to carry out the new binding upstream channel id that must use when dynamic channel changes.Binding upstream channel id TLV is the replacement value of current binding upstream channel id.CMTS must guarantee that the binding upstream channel id of new channel is different with the binding upstream channel id of old channel.
If up bindings group is changed, binding upstream channel id TLV must be included in wherein.Binding upstream channel id TLV is used for CM is moved to different up bindings group, CM is moved to from the binding up channel do not bind up channel, and CM is never bound up channel move to the binding up channel.
Its type is 9, and length is 1.Value is 0-255; The binding upstream channel id.Value is that 0 expression CM card is moved to the channel that does not have upstream channel bonding.On duty is 0 o'clock, and upstream channel id TLV is used to indicate CM where to move to.It should be noted that in CM demonstrate,proves by a bindings group and shift out, but still also have a up channel to stay under the situation of this bindings group, new upstream channel id can mate with current channel id.
7.5 transmission range ordering
Transmission range arrangement according to an embodiment of the invention is described below.
7.5.1 counting competition district (counting contention regions)
In one embodiment of the invention, CM must be according to following rule, postpones contention requests chance on the channels all in the bound channels group with time sequencing:
(1) as long as the zero-time of the TDMA of 2 or a plurality of up channels request chance is identical, CM can select to sort in these chances;
(2) although because the chance on other channel and needn't be continuous in the bindings group, the TDMA competitive opportunity on channel should be postponed on time sequencing;
(3) the S-CDMA competitive opportunity in the S-CDMA frame subsequently should not come on the same channel before the competitive opportunity of S-CDMA frame early.
7.6.2 the ordering of the information flow on all fragments
In one embodiment of the invention, CM must put into fragment with information flow based on the zero-time of each fragment.The information flow of service flow formation head must be put into the at first fragment of transmission, following situation exception:
(1) as long as the zero-time of the TDMA of 2 or a plurality of up channels request chance is identical, CM can select to sort in these chances;
It is in the segmentation of order that TDMA transmission opportunity on (2) channels was applied to time;
(3) the S-CDMA competitive opportunity should not come on the same channel before the transmission opportunity in the S-CDMA frame early in the one S-CDMA frame of back.
8. system synchronization requirement
One embodiment of the present of invention require up channel and a down channel in the bindings group or a plurality of down channels synchronized with each other to be associated.For example, as shown in Figure 1, system 100 includes master clock source 116 should be synchronously with auxiliary the realization.
This requires expression synchronously, and CM can use a recovered clock to be created on and bind on up group of interior all channel and transmit the sequential that needs.The phase place of master clock source can be changed to another up channel from a up channel, and this phase difference needs to consider when arranging.
CM will arrange on each channel in up bindings group, and may have different arrangement biasings to each channel.
9. various changes
The various changes that realize upstream channel bonding according to the traditional docsis specification of one embodiment of the invention are described below.
9.1 dynamically UCD changes
UCD for traditional DOCSIS " dynamically (on-the-fly) " changes, and CM and CMTS ignore the outstanding request of influence request/permission size.CM switches to new channel parameter and uses new parameter bandwidth on demand once more subsequently.Dynamically the operation of UCD change can be explained based on request, CCF and the multi-channel scheduling feature of byte by the present invention.Because CM sends request with byte, and does not know which channel of request meeting in bindings group is allowed to, so CM must be able to not ignore any outstanding request that UCD is changed.The request of the channel of distributing to change that CMTS can abandon having planned is perhaps revised and is distributed to the permission of this channel to mate new UCD parameter.If the CMTS discard request, CM will ask the bandwidth of needs at last once more.For channel-changing, comprise based on the change of each mini-slot or relate to the change that SCDMA activates, no longer be applicable to new up channel parameter at the CM request time that changes up channel.In these cases, CM must will be used for all outstanding requests of this channel and the request time of storage replace with the distribution zero-time that new UCD that CM uses this channel changes the MAP that counting receives.
9.2 appendix B changes
Appendix B will be modified, and make the CM MAP processing time be defined as to arrive last and this MAP time between effectively of MAP of CM.
9.3 change to CM and CMTS arrangement
According to one embodiment of present invention, the DOCSIS MAC that is used for the CM-CMTS interactive operation requires to be modified, and requiring CMTS is that all interior channels of up bindings group send unicast maintenance opportunitys to CM.Same, if having T4 on the capable channel of CM thereon, then should stop CM to be restarted.
10. be used for the discussion of other mechanism of bound channels
Be used for binding up channel to reach more other mechanism chapters and sections description below of high bandwidth " pipeline " of up channel.As mentioned above, the system that the system of the up channel of realization binding provides the data transfer rate and the throughput of increase, contrast to be unrealized the binding up channel, benefit have increased multichannel gain statistical value and ALB.
10.1 physical layer (PHY) binding
A method in the physical layer binding is to use a broad-band channel so that higher maximum throughput and bigger multichannel gain statistical value to be provided.Different with the embodiments of the invention of describing before is, the method do not allow to be unrealized CM of upstream channel bonding uses whole frequency spectrums, and the CM of the upstream channel bonding that do not allow to be unrealized and realize that the CM of upstream channel bonding shares same broadband effectively.
Second method in the binding of physical layer encodes level is to encode on a plurality of channels.This coding comprises error correction forward, relevant alternation sum scrambler (scrambling).Different with the embodiments of the invention of describing before is, occur in situation on the physical layer for channel bonding, the method realizes channel bonding to combine to the PHY coding, thereby its change coding under the situation that does not influence the upstream channel bonding realization is pretty troublesome.
10.2MAC the variation of layer binding
According to the embodiments of the invention of describing before, if upstream channel bonding occurs on the fragment stage of transmission, any channel that this fragment can be in the bound channels group, and with how to make request or on which channel, make request irrelevant.Determined this fragment on the specific channel by permission transmission from CMTS after, this fragment will be used this channel and the pulse train details parameter that defines for this channel sends in the appropriate time.
Fragment in the bound channels group on the channel can be a fragment of cascade, DOCSIS frame of a complete DOCSIS frame, DOCSIS frame or a fragment of DOCSIS frame cascade.The cascade of DOCSIS frame can be cut apart in any position, and according to the type of cutting apart, this position can be a frame boundaries, can not be frame boundaries also.Therefore, the embodiment that describes before according to the present invention, the DOCSIS MAC layer of binding at MAC synusia segment boundary place provides better flexibility, has kept the flexibility of signal processing structure and physical layer simultaneously.Two kinds of variations of the upstream channel bonding of MAC layer are as described below.
10.2.1 ask same channel parameter
A kind of variation of MAC layer binding require CMTS on all bound channels simultaneously and in the identical time period, allow the CM transmission opportunity.Different with the embodiments of the invention of describing before is that the method underaction is to adapt to the CM that does not support for the upstream channel bonding except that the UGS chance of various services on the same channel.The scheduling that the method retrains too when channel has different PHY parameters (as data transmission rate, modulation order and mini-slot size or the like) realizes.
10.2.2CM control binding
Another of MAC layer binding changes and allows CM to make a plurality of " decisions " of using what channel and how data are sorted about the bound channels group.The method allows the CM decision to use which up channel in special time, and the method becomes more complicated with system testing and authentication, and this is because the operation of CM is uncertain.Because the operation difference of each CM, this uncertain operation make the field debugging be difficult to carry out.
According to one embodiment of present invention, the CMTS scheduler is dispatched all transmission opportunitys on the channel in the bound channels group, and no matter described transmission is special-purpose, permission or competitive opportunity.Different with the uplink dispatch method of CM control is, the operation of CM be determine and stipulate by the allocated bandwidth of CMTS.Uplink scheduling by CMTS control, CMTS is unique entity of knowing the load on each up channel, and like this, CMTS uniquely can carry out the entity that load balance and decision CM should transmit exactly on which channel or which channel.
10.3 in the binding that is higher than on MAC layer more high-rise
A kind of optional method of realizing binding of MAC layer and segmentation on the MAC layer is in the segmentation of IP layer.The IP segmentation is that partition data is to be fit to a kind of optional method from the allowance of CMTS.Yet each IP fragment has the form identical with the initial IP packet.Especially, include the minimum IP head of 20 bytes in each fragment.Therefore, repeatedly long data bag need be cut apart and repeatedly IP expense can be caused.The repeatedly appearance of the DOCSIS MAC head in each allows, if the higher layer, header of each fragment repeats repeatedly, other schemes of the up channel segmentation on the higher level that is higher than the MAC layer also can cause extra expense.
According to one embodiment of present invention, carry out data sementation to adapt to allowance at the MAC layer from CMTS.The fragmentation overhead of the method is than traditional segmentation method and to carry out the efficient of method of segmentation at the layer that is higher than the MAC layer higher.
11. sum up
More than having introduced various embodiment of the present invention, it should be understood that above various embodiment only is to example explanation of the present invention, is not limitation of the present invention.Those of ordinary skill in the art can carry out the change of various forms and details and not break away from the scope that claim of the present invention defines as can be known the present invention.Therefore, scope of the present invention is not limited to disclosed specific embodiment, and is defined by claim and equivalence replacement thereof.

Claims (10)

1, a kind of method that realizes the high-throughput allocated bandwidth in the cable network in the wire line MODEM terminal system, described method comprises the steps:
With a plurality of upstream channel bondings is one group;
Receive bandwidth request from wire line MODEM;
Respond the reception of described bandwidth request, for each up channel in the described bindings group sends unique bandwidth allocation, the combination of wherein said unique bandwidth allocation jointly distributes the bandwidth of being asked on the whole bindings group, to flow to wire line MODEM terminal system CMTS by described wire line MODEM transmits data packets;
Wherein, for sending unique bandwidth allocation, the specified upstream channel in the described bindings group comprises the message of sending the mini-slot assignment information that includes a unique identifier relevant and be correlated with therewith with the specified upstream channel.
2, method according to claim 1, it is characterized in that, describedly be included as for each up channel in the bindings group sends unique bandwidth allocation that each up channel sends unique wire cable data, services transmission specification upstream bandwidth allocation map DOCSIS MAP information in the described bindings group.
3, method according to claim 1 is characterized in that, described method further comprises:
Receive a plurality of fragments that sent by described wire line MODEM by the up channel in the described bindings group, the time of wherein said a plurality of fragments appointment in described unique bandwidth allocation transmits, and described each fragment comprises unique sequence number;
Based on described unique sequence number with the information combination in described a plurality of fragments to rebuild described data packet stream.
4, method according to claim 1 is characterized in that, described method further comprises:
Distribute one group of unique identifier to give described wire line MODEM, wherein each described unique interior up channel of the corresponding described bindings group of identifier difference;
And describedly receive the bandwidth request package from wire line MODEM and draw together bandwidth request the up channel in the described bindings group of message monitoring that includes a unique identifier described one group of unique identifier.
5, method according to claim 4 is characterized in that, one group of unique identifier of described distribution comprises that one group of unique identifier of distribution is to the service flow that is associated with described wire line MODEM for described wire line MODEM.
6, a kind of method that realizes the high-throughput transmission in the cable network in wire line MODEM, described method comprises the steps:
Send bandwidth request to the wire line MODEM terminal system;
Receive a plurality of bandwidth allocation, wherein each described bandwidth allocation is unique related with a up channel in the upstream channel bonding group, and described a plurality of bandwidth allocation is jointly distributed the bandwidth of being asked on the whole upstream channel bonding group;
According to described a plurality of bandwidth allocation, flow to described wire line MODEM terminal system CMTS by described upstream channel bonding group transmits data packets;
Wherein, each described bandwidth allocation includes a corresponding unique identifier and relevant therewith mini-slot assignment information.
7, method according to claim 6 is characterized in that, a plurality of bandwidth allocation of described reception comprise a plurality of wire cable data, services transmission specification upstream bandwidth allocation map DOCSIS MAP message of reception.
8, a kind of system that realizes the high-throughput allocated bandwidth in the cable network comprises:
The wire line MODEM terminal system, being used for a plurality of upstream channel bondings is one group;
Wire line MODEM is used to send bandwidth request to described wire line MODEM terminal system CMTS;
Wherein said wire line MODEM terminal system CMTS further is that each up channel in the described bindings group sends unique bandwidth allocation to described wire line MODEM, and the combination of described unique bandwidth allocation jointly distributes the bandwidth of being asked on the whole bindings group;
Wherein said wire line MODEM further according to a plurality of bandwidth allocation, flow to described wire line MODEM terminal system CMTS by described upstream channel bonding group transmits data packets;
Wherein, described wire line MODEM terminal system CMTS is unique bandwidth allocation that a certain specified upstream channel sends the mini-slot assignment information that includes a unique identifier relevant with described specified upstream channel and be correlated with therewith.
9, system according to claim 8, it is characterized in that described wire line MODEM terminal system CMTS is that each up channel in the described bindings group sends unique wire cable data, services transmission specification upstream bandwidth allocation map DOCSIS MAP information to described wire line MODEM.
10, system according to claim 8, it is characterized in that, described wire line MODEM is divided into a plurality of fragments with described data packet stream, unique sequence number is inserted in each described fragment, and transmit described each fragment to described wire line MODEM terminal system CMTS by the up channel group in the described bindings group in the time of described a plurality of bandwidth allocation appointments.
CNB2006100679107A 2005-03-21 2006-03-21 Realize the method and system of the high-throughput allocated bandwidth in the cable network Expired - Fee Related CN100566228C (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US66357805P 2005-03-21 2005-03-21
US60/663,578 2005-03-21
US11/298,446 2005-12-12
US11/298,451 2005-12-12
US11/298,447 2005-12-12

Publications (2)

Publication Number Publication Date
CN1841989A CN1841989A (en) 2006-10-04
CN100566228C true CN100566228C (en) 2009-12-02

Family

ID=37030847

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100679107A Expired - Fee Related CN100566228C (en) 2005-03-21 2006-03-21 Realize the method and system of the high-throughput allocated bandwidth in the cable network

Country Status (1)

Country Link
CN (1) CN100566228C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495773A (en) * 2019-01-11 2019-03-19 鼎点视讯科技有限公司 Flux of multicast configuration method, device and electronic equipment

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101631027B (en) * 2008-07-18 2013-07-03 鸿富锦精密工业(深圳)有限公司 Method for balancing loads of modem
WO2013005766A1 (en) * 2011-07-04 2013-01-10 日本電信電話株式会社 Transmission system and transmission method
WO2013108676A1 (en) 2012-01-19 2013-07-25 三菱電機株式会社 Multiple gateway device, multiple line communication system, multiple line communication method and program
US20130235884A1 (en) * 2012-03-11 2013-09-12 Broadcom Corporation Mixed serial and parallel stream channel bonding architecture
CN103401809B (en) * 2013-08-13 2016-01-20 中国电子科技集团公司第二十八研究所 Multichannel dynamic allocation method in a kind of narrow-band communication system
GB2519564A (en) * 2013-10-24 2015-04-29 Shared Band Ltd Multicast transmission over bonded broadband
CN108234357B (en) * 2016-12-15 2021-07-16 鼎点视讯科技有限公司 Multicast traffic distribution method and system
WO2019080014A1 (en) * 2017-10-25 2019-05-02 Oppo广东移动通信有限公司 Bandwidth part switching method and terminal device
CN110417685B (en) * 2018-04-28 2022-04-26 华为技术有限公司 Data transmission method and related device
WO2020000407A1 (en) * 2018-06-29 2020-01-02 华为技术有限公司 Method for reducing uplink delay and related device
WO2020097793A1 (en) * 2018-11-13 2020-05-22 华为技术有限公司 Data transmission method and device
CN111246531B (en) * 2018-11-28 2021-11-30 ***通信集团浙江有限公司 Switching method and base station
CN112804181B (en) * 2021-01-27 2022-08-30 深圳市共进电子股份有限公司 Method, device, terminal and storage medium for configuring PLC channel

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109495773A (en) * 2019-01-11 2019-03-19 鼎点视讯科技有限公司 Flux of multicast configuration method, device and electronic equipment
CN109495773B (en) * 2019-01-11 2021-05-11 鼎点视讯科技有限公司 Multicast traffic configuration method and device and electronic equipment

Also Published As

Publication number Publication date
CN1841989A (en) 2006-10-04

Similar Documents

Publication Publication Date Title
CN100566228C (en) Realize the method and system of the high-throughput allocated bandwidth in the cable network
CN1830165B (en) Wideband DOCSIS on CATV systems using port-trunking
CN100593332C (en) Upstream channel bonding in a cable communications system
US8705567B2 (en) Upstream channel bonding using legacy maps in a cable communications system
CN101027862B (en) Hierarchical flow-level multi-channel communication
EP1063801B1 (en) Mixed Docsis 1.0 TDMA burst with SCDMA transmissions on the same frequency channel
US7991010B2 (en) Highly integrated media access control
CN101053208B (en) Wideband protocol
US6108314A (en) Method, subscriber device, wireless router, and communication system efficiently utilizing the receive/transmit switching time
US8018963B2 (en) Systems for flexible wireless channel association
US7990952B2 (en) Method for upstream priority lookup at physical interface within a wireless device
EP1705838B1 (en) Upstream channel bonding using legacy maps in a cable communications system
CN102474591A (en) IP video delivery using flexible channel bonding
US7577129B2 (en) Supporting multiple logical channels in a physical interface
US8254394B1 (en) Technique for providing constant bit rate (CBR) service over a time-slotted access channel
CN100473068C (en) Descending MPEG-2 form data transmission method based on DOCSIS agreement
CN101743732A (en) Data transmission and encapsulation
CN1407758A (en) Long-range central management method of digital video systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091202

Termination date: 20160321

CF01 Termination of patent right due to non-payment of annual fee