Download Mod 12 Equipment Installation(HSD)1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Power over Ethernet wikipedia , lookup

RS-232 wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

IEEE 1355 wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Transcript
HSD
SOHO
• Small Office / Home Office
– For many users the most important service
– http://en.wikipedia.org/wiki/Small_office/home_of
fice
• Many Data Providers target this market
– http://business.comcast.com/
– http://www.centurylink.com/small-business/
– http://www.wavebroadband.com/business/
http://www.sparkplugging.com/sparkplugceo/wp-content/uploads/2008/05/brad-shorrcartoon-work-at.jpg
CMTS / OSS
• Cable Modem Termination
System (headend)
• Operational Support System
(headend)
• The above manage a group
of cable modems and
provide the gateway
• See figure 12.1 pg. 12.2
– Appendix A-2, A-4 have
symbol keys for cable maps
Web Browsers
• See text
eMTA
• Embedded Multi Media
Adapter
• Provides both Voice and
Data
2 phones, if REN for
one phone is 5…
Broadband Definition
• Broadband refers to a communication bandwidth
of at least 256 Kbps.
• Each channel is 6 MHz wide and it uses an
extensive range of frequencies to effortlessly
relay and receive data between networks. [4]
• “In telecommunications, a broadband signaling
method is one that handles a wide band of
frequencies. Broadband is a relative term,
understood according to its context. The wider
(or broader) the bandwidth of a channel, the
greater the information-carrying capacity, given
the same channel quality.” Wikipedia
Qualifying the Drop
• Details of qualifying a drop were addressed in
module 10
• Forward and reverse path must be functional
– What frequencies are required to support a Cable
Modem?
– How can data only connection be configured?
PC Minimum Requirements
• See pg 12.4
– RAM
– Processor
– Browser
– Hard drive space
– USB port
Outside Only Installation
• Self install—do it yourself
– Kit in a box
• Cable Tech only completes what is necessary
outside (perhaps a filter on the tap)
• eMTA
Terminated Ethernet cable
• Means….RJ-45 connector is connected
(terminated) to cable
• How to terminate, though we won’t
– http://www.wikihow.com/Make-a-Network-Cable
Installation of Modem
pg. 12.6, Diagram on pg. 12.7
• May be required for install documentation
– Model
– Serial number
– MAC address
• GETMAC command
• ILEC (from diagram) Incumbent Local Exchange
carrier---existing phone company wiring.
• NID Network interface device
Installation Modem
• Insure Tap is tagged for proper service
• Some filters can be a problem
– Those that block return path or high freq where
HSD forward path resides.
• Sometimes high pass filters are installed to reduce
noise in return path frequencies
–
–
–
–
–
Remote control car
Hair dryers
Impulse noise frequencies
Micro-reflections
Ingress
Installation
• Verify that all HSD equipment is operational
• Confirm PC and peripherals meet minimum
requirements
• Connect AC adapter to AC outlet
• Provision to work order requirements
• “IW” inside wiring
Provisioning a Cable Modem
Physical &
MAC, OSI
Model
DHCP: auto IP
configuration
The OSS (operational
support system) uses
TFTP to configure
specific
configuration /
permissions /speed
etc.
http://blog.ikoa.in/2012/06/cablemodem.html
Provisioning a cable modem
• Provisioning is automatic once it is initiated
– Pg. 12.13
– US = Upstream
– DS = Downstream
• Required if
customer has
an alarm
system
• More to come
in voice
chapter
• Alerts security
company
through
telephony
•
http://wiki.homet
ech.com/tikiindex.php?page=
How+to+Wire+an
+RJ31X+Jack
RJ-31x
Don’t open cable modem
• It will self destruct…….?????
• In researching could only find warnings to not
modify the equipment in any way.
Keep modem away from Customer
Electronics equipment
• At least 3 inches
• Heat & ventilation
WGR
• Wireless Gateway Router
• http://customer.comcast.com/help-andsupport/internet/setup-a-wireless-network
Modem & WiFi
together
Express Card slot
• For laptop
to add LAN
access
Trap
• Allow only frequencies that pertain to data
• http://www.eaglecomtronics.com/productscabletvsat.html
– Data Only
– 2/78 blocks channels 2-78
• Allows return path and channels above 78
•
•
•
•
•
•
•
•
•
eMTA
Power
DS downstream
US upstream
Online
Link
Telephone 1 & 2
Battery 1 & 2
Standby
•
www.cisco.com/we
b/consumer/pdf/ug
-dpc-2607.pdf
• See above
pdf
– Pg 39
• 5 ren per
line, 2
lines = 10
ren
REN
IPV6
• IPV6 is natively supported by DOCSIS 3
– Firmware upgrade is required to support DOCSIS 2
• 128 bits expressed in Hex
340 undecillion ip addresses
2 128 = 340,282,366,920,938,000,000,000,000,000,000,000,000
2 32 = 4,294,967,296
Compression of IPV6 address
• Up to 3 leading zeros
• Consecutive zeros
Compression of IPV6 address
• Some types of addresses contain long sequences of
zeros.
• In IPv6 addresses, a contiguous sequence of 16-bit
blocks set to 0 in the colon-hexadecimal format can be
compressed to :: (known as double-colon).
• The following list shows examples of compressing
zeros:
– The link-local address of FE80:0:0:0:2AA:FF:FE9A:4CA2 can
be compressed to
FE80::2AA:FF:FE9A:4CA2.
– The multicast address of FF02:0:0:0:0:0:0:2 can be
compressed to
FF02::2.
IPV6 address
Customer IP address
NAT
• Network address translation
• The process of modifying IP address
information in IP packet headers while in
transit across a traffic routing device.
• Commonly used to convert a private IP to a
public IP address
MSO
• Multiple System Operators
– Multiple system operators (MSO) are operators of
multiple cable television systems. The majority of
system operators run cable systems in more than
one community and hence most of them are
multiple system operators.
• Cable companies
BPI
Not all cable companies use BPI
Function of DOCSIS
(Data Over Cable Systems Interface Specification)
• Baseline privacy interface
– "Baseline Privacy Interface", provides a data
encryption scheme that protects data sent to and
from cable modems in a data over cable network.
– BPI gives subscribers data privacy across the RF
Network between CMTS (Cable Modem Termination
System) and CM (Cable Modem).
– Quoted from http://www.birdseye.net/definition/b/bpibaseline_privacy_interface.shtml
– The secondary goal of BPI is to provide basic
protection from theft of service for cable operators.
http://www.cisco.com/c/en/us/td/docs/cable/cmts/ubr7200/co
nfiguration/guide/cr72scg/u72_bpi.pdf
DOCSIS
• http://www.cablelabs.com/news/newgeneration-of-docsis-technology/
• See above link concerning 3.1
– 10Gbps downstream
– 1Gbps upstream
Static vs. Dynamic IP
• http://business.comcast.com/SMB/services/in
ternet/ipaddress
Security
• Norton
Free for Comcast HSI users
• http://xfinity.comcast.net/constantguard/Prod
ucts/CGPS/?cid=NET_33_611
• http://constantguard.comcast.net/products/p
rotection-for-pc/?cid=Net_33_611
Home modem
accessed at
192.168.100.1
DOCSIS 2
Modem
Home modem
accessed at
192.168.100.1
DOCSIS 3
Modem
Daily
provisioned
EXTRA STUFF
Link-Local Address
• In the Internet Protocol Version 6 (IPv6), the
address block fe80::/10 has been reserved for
link-local addressing.[2]
• The actual link local addresses are assigned
with the prefix fe80::/64.[6][note 2]
– The 64 bits here is the network identification (ID)
TFTP
• Trivial file Transfer Protocol
• http://en.wikipedia.org/wiki/Trivial_File_Transfer
_Protocol
• is a file transfer protocol notable for its simplicity.
It is generally used for automated transfer of
configuration or boot files between machines in a
local environment. Compared to FTP, TFTP is
extremely limited, providing no authentication,
and is rarely used interactively by a user.
• Due to its simple design, TFTP could be
implemented using a very small amount of
memory
Static IP Address
•
•
•
•
/30
1 ip address
/29
3
/28
5
This contradicts the subnet calculator
– http://www.subnet-calculator.com/
• /30 indicates the size of the subnet mask
– 30 out of 32 bits are 1s
– 2 bits are left for hosts (one of those bits identifies the
network and broadcast which cannot be used)
– Only one bit remains which will allow for 2 static ip
addresses
Wikipedia
Prefix size
Network mask
Available
subnets
Usable hosts
per subnet
Total
usable hosts
/24
255.255.255.0
1
254
254
/25
255.255.255.128
2
126
252
/26
255.255.255.192
4
62
248
/27
255.255.255.224
8
30
240
/28
255.255.255.240
16
14
224
/29
255.255.255.248
32
6
192
/30
255.255.255.252
64
2
128