Professional Documents
Culture Documents
IRI-100
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 0
Implementing the BSR for Basic Data Services
Introduction, Page 1
Introduction
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 1
Implementing the BSR for Basic Data Services
Introduction, Page 2
Course Overview
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 2
Implementing the BSR for Basic Data Services
Introduction, Page 3
Course Objectives
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 3
Implementing the BSR for Basic Data Services
Introduction, Page 4
Prerequisites
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 4
Implementing the BSR for Basic Data Services
Introduction, Page 5
Topic Order
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 5
Implementing the BSR for Basic Data Services
Introduction, Page 6
Welcome
High bandwidth plant upgrades, digital video, interactive services, multi-megabit data networking,
Internet access, and telephony.
Today’s broadband landscape is undergoing great change, creating new opportunities. Multiple
providers will vie with each other for customers by offering new revenue-generating applications
and superior network performance. Your broadband network will have to distinguish itself in a
sophisticated environment that supports video, Internet access, information and a host of
interactive services. This is a world where quality and reliability are essential ingredients of the
services you provide.
Motorola’s technical and operational training courses prepare your staff to deliver dependable,
high quality services to your customers. As networks become more complex, your personnel will
need training on cutting-edge technology to be able to support advanced architectures.
Motorola offers many training courses with curricula in broadband network design, operations,
maintenance, testing and product specific technology. The courses are taught by instructors with
a combined experience of over 150 years in the industry.
The instructional design of our courses is focused on a 50/50 mix of lecture and hands-on
laboratory training with Motorola equipment. We emphasize real-world experiences that help
students understand the concepts necessary so they can then demonstrate their skills on actual
products in a supervised laboratory setting.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 6
Implementing the BSR for Basic Data Services
Introduction, Page 7
We use The Instructional Systems Design Model, which is a task-oriented model for
systematically developing training. While it can be used in any instructional setting, it is
typically used in business for job performance improvement.
Î
MoP Curriculum
Performance Î Course
Broad area of responsibility or expertise
Ability Î Module
Unit of work or expertise
Component Î Lesson
1st level of breakdown
Step Î Learning Interaction
2nd level of breakdown
Skill/Knowledge Î Teaching Point
What performer must know or do on the job
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 7
Implementing the BSR for Basic Data Services
Introduction, Page 8
General Information
Ô Please: Ô More:
¾ Turn off cell phones and beepers ¾ Class 9:00 – 5:00
¾ Come back from breaks on time
¾ Ask lots of questions
¾ Share your experiences
¾ Work with your teammates
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 8
Module 1, Page 0
Module 1
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 0
Implementing the BSR for Basic Data Services
Module 1, Page 1
Introduction
Lesson Overview We will look at the big picture and drill down through
the system components and architectures in use to
provide current cable services.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 1
Implementing the BSR for Basic Data Services
Module 1, Page 2
Objectives
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 2
Implementing the BSR for Basic Data Services
Module 1, Page 3
Topic Order
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 3
Implementing the BSR for Basic Data Services
Module 1, Page 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 4
Implementing the BSR for Basic Data Services
Module 1, Page 5
Our ultimate goal, when looking at the path from signal source(s) to customer
premises, is to pass multiplexed voice, video and data services. This is done in
stages, beginning with signal reception/collection/origination. These signals are
then processed (or conditioned) and multiplexed into a channel plan that may
include voice video and data. It is at this point that they are put on the
distribution plant for transmission to and reception by the customer. We will look
at each of these steps and facilities in detail (and see that they can be further
divided architecturally) as we move forward.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 5
Implementing the BSR for Basic Data Services
Module 1, Page 6
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 6
Implementing the BSR for Basic Data Services
Module 1, Page 7
System Components
SUBSCRIBER
CONTENT
SOURCES HEADEND SYSTEM SYSTEM
Locally Encoded DHEI IRT 1000 DCT-1000/1200
Analog Signals
QPSK
Digital Satellite 64QAM C6U
Multiplexes
I Mult. IRT 2000
Digital Satellite QPSK DCT-2000
Split Multiplexes C6U
64 QAM
Digital Satellite QPSK Q Mult.
Signals MPS
DS3 64/256QAM C6U DCT-5000+
Digital Transport
The
Internet NC 2000 OM 1000
NETSentryTM
PSTN Digital Domain KLS 1000
Manager
Video Server
Content DANIS/DLS HFC
Interactive
Application HCT 1000
Servers CMTS
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 7
Implementing the BSR for Basic Data Services
Module 1, Page 8
TX
Video Fiber
Signals
RX Coax
Trunk
Amp
Cable Tap
Line
Modem Extender
Splitter
Home PC or MAC
Subscriber
Television
The BSR’s transmitter is connected to the combiner and multiplexed with the
video signals. The data channels are combined with the video channels and
other services before hitting the laser.
The levels at the fiber node are critical to the correct operation of the data
services - especially important are the upstream (return) path nodes. Each node
must be characterized to ensure it will meet the requirements for passing data
on the upstream. It must be characterized for multiple upstream data channels.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 8
Implementing the BSR for Basic Data Services
Module 1, Page 9
Headend Output
The individual channels from the RF modulators and heterodyne processors are
combined using the network combiner.
The combined signals are amplified by a low distortion post amplifier to provide
the proper input signal levels to the optical transmitters.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 9
Implementing the BSR for Basic Data Services
Module 1, Page 10
The conversion from coaxial transmission to fiber in the cable industry has led
to a decrease in the amount of headends. Headends can feed their signals to
hub sites via fiber in both digital and analog formats. This increased the size of
the area being fed from a single site and at the same time reduced the amount
of processing equipment needed to provide video services. The fiber
infrastructure has also paved the way for new products and services such as
high speed data and digital telephone DOCSIS is a “last mile technology” and
the CMTS is deployed in the hub site. Today’s Headends and hubs are typically
redundant and can service a much wider area with increased reliability.
Signal is applied to the forward laser at the headend. Laser manufacturers
specify the RF input level to the laser. Typically Analog video channels are at a
higher level than digital signals at the input to the laser.
If the RF power level is too high distortions can occur (called clipping).
If the RF level is too low the C/N ratio suffers, potentially leading to degradations
in services.
Always refer to the manufacturers specifications when applying digital signals to
a laser.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 10
Implementing the BSR for Basic Data Services
Module 1, Page 11
Distribution Plant
The distribution plant consists of the cables, strands, actives and passive
devices that comprise the broadband network, delineated from the egress of the
headend to the side of the customer premises.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 11
Implementing the BSR for Basic Data Services
Module 1, Page 12
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 12
Implementing the BSR for Basic Data Services
Module 1, Page 13
Optical fibers transport data between optical node and the CMTS in the cable
headend. Different fiber is used to transport data downstream than to transport
data upstream, hence the use of optical splitters and combiners. At the
headend, the CMTS downstream output is combined with other downstream
cable signals (such as analog and digital video services), while the CMTS
upstream input is picked from the upstream cable spectrum.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 13
Implementing the BSR for Basic Data Services
Module 1, Page 14
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 14
Implementing the BSR for Basic Data Services
Module 1, Page 15
Fiber Nodes
Signals are originated at various locations throughout the plant and are
combined together at the node for transportation back to the headend. The
levels from all these locations must be at the same exact amplitude when
presented to the input of the return laser. Unlike forward amplifiers, return
amplifiers have set inputs and variable outputs depending on the losses from the
output to the input of the next active device.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 15
Implementing the BSR for Basic Data Services
Module 1, Page 16
Splitters
Splitters accept signal input in order to divide it into two or more identical
outputs. In the cable world, splitters range in size, dependant on the the size of
the coaxial cable meant to be serviced. Furthermore, splitter design will be
affected by the number of times the signal is meant to be split (you will find 2-
way, 3-way, 4-way splitters, etc.). The more splits, the greater the signal loss on
any given output as compared to the input.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 16
Implementing the BSR for Basic Data Services
Module 1, Page 17
Directional Couplers
Couplers are passive devices used in cable systems to divide and combine
signals. A directional coupler has at least three ports: line-in, line-out, and the
tap. Signal passes between line in and line out ports with loss referred to as the
insertion loss. A smaller portion of the signal power applied to the line-in passes
to the tap port. A signal applied to the tap port is passed to the line in port less
the tap attenuation value (for return signal). The tap signals are isolated from
the line out port to prevent reflections. A signal applied to the line out port
passes to the line in port and is isolated from the tap port. Some devices provide
more than one tap output line (multi-taps).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 17
Implementing the BSR for Basic Data Services
Module 1, Page 18
Subscriber Taps
Typically passive devices used in the “last mile” of the HFC. They are used to
join feeder cable to drop cable, leading to the customer home. Taps come in a
number of different varieties, including 4-port, 8-port, etc. Each port is designed
to feed signal to and from the home.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 18
Implementing the BSR for Basic Data Services
Module 1, Page 19
Amplifiers
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 19
Implementing the BSR for Basic Data Services
Module 1, Page 20
The signal flow in a basic amplifier is split by the diplex filter into two paths.
The high RF signals (50 to 750 MHz) are routed from the input (headend side) of
the amplifier, processed, amplified and recombined through a second diplex
filter.
The low RF signals (typically 5 to 40 MHz) flow in the opposite direction
(customer side to the headend).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 20
Implementing the BSR for Basic Data Services
Module 1, Page 21
The signal flow in a basic amplifier is split by the diplex filter into two paths.
The high RF signals (50 to 750 MHz) are routed from the input (headend side) of
the amplifier, processed, amplified and recombined through a second diplex
filter.
The low RF signals (typically 5 to 40 MHz) flow in the opposite direction
(customer side to the headend).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 21
Implementing the BSR for Basic Data Services
Module 1, Page 22
Customer Premises
Customer premises begins at the home and not only encompasses all customer
premises equipment that depend on delivered signal, but, all internal distribution
equipment, like cable, splitters, etc.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 22
Implementing the BSR for Basic Data Services
Module 1, Page 23
Customer Drop
House Splitter
Drop cables connect the tap ports to the customer premises. House splitters are
used to provide multiple connections at the customer premises. A bonding
screw/clamp is provided on the splitter for grounding.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 23
Implementing the BSR for Basic Data Services
Module 1, Page 24
Television
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 24
Module 2, Page 0
Module 2
Communications Models
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 0
Implementing the BSR for Basic Data Services
Module 2, Page 1
Introduction
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 1
Implementing the BSR for Basic Data Services
Module 2, Page 2
Objectives
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 2
Implementing the BSR for Basic Data Services
Module 2, Page 3
Topic Order
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 3
Implementing the BSR for Basic Data Services
Module 2, Page 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 4
Implementing the BSR for Basic Data Services
Module 2, Page 5
Components of a Conversation
Ô Unique identification of partner
Sue Ruth ÔLocal (physical)
Hello Ruth. Hello Sue.
ÔRemote (logical)
Sue
Up for Lunch?
Ruth
Sure.
ÔUsing intermediaries
Sue Ruth
Ô Shared language
Later, Ruth. Bye Sue. ÔDialect
Ô Shared media
sound waves
Ô Taking turns
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 5
Implementing the BSR for Basic Data Services
Module 2, Page 6
A Layered Approach to
Communication
Ô A parallel can be found between
CONCEPT CONCEPT
network and human Communications
Lunch Lunch Ô Human communications may be
divided into three layers
LANGUAGE LANGUAGE
English English ¾ The physical layer
MEDIUM MEDIUM » Sight
Air Air » Sound
¾ The language layer
» English
sound waves » Sign
¾ The concept layer
» Quantum Physics
» Fishing
Two communicating parties must use the same medium, typically sound waves.
A common language that will be understood by both parties must be decided
upon. Each party involved requires some idea of the content and concept of the
conversation. Each communicating party must follow a set of rules governing
each layer. These rules are called protocols.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 6
Implementing the BSR for Basic Data Services
Module 2, Page 7
Who makes the rules? There is no one source for standards. A wide variety of
organizations are involved in the development of internetworking standards.
Below is a list of some of the standards organizations and their web sites:
ITU http://www.itu.int/
ANSI http://web.ansi.org/default_js.htm
EIA http://www.eia.org/
IEEE http://www.ieee.org/
ISO http://www.iso.ch/welcome.html
IETF http://www.ietf.org/
IAB http://www.iab.org/
CableLabs http://www.cablemodem.com
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 7
Implementing the BSR for Basic Data Services
Module 2, Page 8
Models of Interoperability
ISO’s DOD’s
OSI Model TCP/IP Suite
Application T F T
D
e T F
N
Presentation
l P T
Application S
n P
e
Session IEEE t Addressing
Transport
and Transport TCP UDP
Port Number
ANSI Protocol Number
Network Standards Internet IGMP IP ICMP IP Address
802.2 SAP/Type Address
Data Link E
t
MAC Address
h
8 8 F
e Network
0 0 D
Physical r Interface
n 2 2 D
e . . I
t 3 5
Networking and internetworking are like playing games. If we all play by the same
rules, the game is fair, we can play, and we understand what is happening.
However, if we don’t play by the same rules, we have chaos and compatibility
issues. Try playing a card game and give everyone different rules and don’t allow
the people to talk. One person thinks high score wins, another is sure it is low
score, another wants to deal three cards, and yet another deals one card face up!
Networks are no different.
Interoperability between vendors is critical and more likely to occur if vendors play
by the same rules. The industry is full of communication models including various
standards and protocol stacks to assist us with standardization. After all, we
wouldn’t be driving automobiles if someone didn’t think about the overall design as
they put the individual pieces together.
Many models have been developed over the years and some are more popular
than others. Models are “guidelines” for communications in the networking world.
When a standard model is followed it becomes possible for two nodes that have
nothing in common other than physical connectivity to share information.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 8
Implementing the BSR for Basic Data Services
Module 2, Page 9
What is a Communications
Standard?
Standards are the most important issue in the communications and networking
systems industry. The one constant in this industry is change. The minute a
vendor updates their hardware or software, we need to figure out how we can talk
to it.
De jure standards are endorsed by standards organizations such as the American
National Standards Institute (ANSI) and the Institute of Electrical and Electronics
Engineers (IEEE). ANSI and IEEE have sanctioned many standards that others
have adopted. Standards that others have borrowed are referred to as de facto
standards. Some standards are proprietary in nature and others are open. DEC,
NetWare, and SNA are more proprietary in nature than TCP/IP or OSI which
promote interoperability. Non-proprietary standards are often referred to as open
standards. All of these standards are prevalent today.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 9
Implementing the BSR for Basic Data Services
Module 2, Page 10
No organization really owns the Internet, but many are responsible for its direction
and operation. The Internet Society (ISOC) and the Internet Architecture Board
(IAB) are responsible for the Internet standards process. ISOC is a global
organization responsible for standards and protocols that allow the Internet to
function. IAB is a technical advisory group responsible for actually setting
standards, publishing RFC’s, and overseeing the standards process. The Internet
Engineering Task Force (IETF), Internet Assigned Numbers Authority (IANA), and
Internet Research Task Force (IRTF) are among the groups under IAB.
Request for Comments (RFCs) are the documents that contain TCP/IP standards
that define protocols. All TCP/IP standards are always published as RFCs. In
many ways this Internet standards process is governed by consensus. If
someone wishes to propose a new standard, they submit an Internet Draft, which
can become an RFC. Documents go through maturity levels and then receive a
classification (Required, Recommended, Elective, Limited Use, or Not
Recommended). If changes are proposed to the standard, a new RFC is created;
an existing RFC is never modified after publication.
RFC’s are available online or for purchase. An excellent site for viewing RFC
information is http://www.rfc-editor.org/.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 10
Implementing the BSR for Basic Data Services
Module 2, Page 11
What is a Communications
Protocol?
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 11
Implementing the BSR for Basic Data Services
Module 2, Page 12
Application 7 7 Application
Presentation 6 6 Presentation
Session 5 5 Session
segments segments
Transport 4 4 Transport
3 packets packets 3
Network Network
frames frames
Data Link 2 2 Data Link
bits bits
Physical 1 1 Physical
Host “A” Host “B”
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 12
Implementing the BSR for Basic Data Services
Module 2, Page 13
How will you ever remember the layers? Here are a few mnemonics to assist.
Keep in mind that the layers are arranged in a vertical hierarchical manner
because tasks in the upper layers are dependent upon those performed in the
lower layers. Use the OSI model as a reference point to all networking topics. It is
a reference model or conceptual blueprint of how communications should occur.
The industry uses a layered model because it eases troubleshooting. Networking
complexity is broken into more manageable layers so developers can focus on
one layer without changing all the code. Standards do promote interoperability.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 13
Implementing the BSR for Basic Data Services
Module 2, Page 14
Layer 7, the top layer of the OSI model, provides shared services. Servers
advertise file, print, message, application, and database services. Common
Application layer services include X.400 mail services, Simple Mail Transfer
Protocol (SMTP), Post Office Protocol (POP3), Internet Messaging Access
Protocol (IMAP4), X.500 directory services, Telnet, File Transfer Protocol (FTP),
HyperText Transfer Protocol (HTTP), and Simple Network Management Protocol
(SNMP).
The Application layer is the layer that the user works with directly. It is the start of
communications. Application gateways are required if the applications are
different. For example, if my company uses Outlook and yours uses Notes, email
gateways assist in the delivery of the incompatible systems. Perhaps you have an
IBM mainframe connected on your LAN. An SNA gateway is specific to this
application. Gateways work at the upper layers of the OSI model. A gateway is a
protocol translator.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 14
Implementing the BSR for Basic Data Services
Module 2, Page 15
Ô “The Translator”
Ô Encryption
¾ Private key
¾ Public key
Ô Compression
¾ MP3
¾ MPEG, JPEG
Ô Character codes and file syntax
¾ ASCII
¾ EBCDIC
Layer 6, the Presentation layer of the OSI model, is the translator. It presents data
to the Application layer on the receiving end. The Presentation layer coverts
formats such as American Standard Code for Information Interchange (ASCII) to
Extended Binary Coded Decimal Interchange Code (EBCDIC).
Translation, encryption/decryption, and compression/decompression features are
associated with this layer. TIFF, JPEG, MIDI, and MPEG are some examples of
graphic and multimedia formats used at this layer. Public and private key
encryption schemes operate here. Secret or private key technologies use the
sender’s private key to encrypt/decrypt. Rivest-Shamir-Adleman (RSA) is an
example of this same key method where the private key is kept by the owner and
the public key is published. Public key technologies use the recipient’s public key
to encrypt and the recipient’s private key to decrypt. Data Encryption Standard
(DES) is an example of where the private key is randomly generated for each use.
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are the most
common security protocols on the Internet.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 15
Implementing the BSR for Basic Data Services
Module 2, Page 16
Ô “The Operator”
¾ Dialog
¾ Establish session
¾ Administer session
¾ Tear down session
Ô Communications
¾ Simplex
¾ Half-duplex
¾ Full-duplex
Ô NetBIOS/sockets communications
Ô Network login/drive mappings
Layer 5, the Session layer of the OSI model, is the the “dialog” layer. Think of it
as the “operator” or switchboard person who initiates, manages, and tears down
the logical communication session.
Session layer communications are concerned with dialog between network nodes
or devices. Three phases of communications include session establishment, data
transfer, and session release. Three modes of operation include simplex, half-
duplex, and full-duplex communications. Simplex is like a radio station broadcast
where one device is sending and others are receiving; simplex is a one-way
transmission. Half-duplex is like walkie-talkies. It supports the transmission of
data in both directions, but only one direction at a time. Full-duplex is two-way
communications, transmitting and receiving at the same time. Typically, one pair
of wires or frequency is used to transmit and another is used to receive with full-
duplex. A telephone conversation uses full-duplex communications.
Some examples of session layer protocols and interfaces include Network File
System (NFS), Structured Query Language (SQL), Remote Procedure Calls
(RPC), NetBIOS communications, Sockets, network login, and drive mappings.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 16
Implementing the BSR for Basic Data Services
Module 2, Page 17
Ô Delivery
¾ Connection-oriented/connectionless
¾ Reliable/unreliable
Ô End-to-end communications
¾ Error control and flow control
¾ ACKs and NAKs
¾ Sequencing
¾ Hides the lower layer intricacies
from the upper layers
Ô Application multiplexing
Ô TCP/ UDP
Layer 4, the Transport layer of the OSI model, is responsible for end-to-end
delivery and control, or accuracy. It hides lower-layer intricacies from the upper
layers by deciphering the packets to see if the data inside the packets is in the
correct format. Layer 4 assists with error detection and correction; whereas layer
2 is typically concerned with only error detection.
The Transport layer is responsible for application multiplexing. The services of
layer 4 both segment and reassemble data from upper layer applications and
unite it on to the same data stream. Client hosts can access the same applications
on a remote host through various port numbers.
Delivery can be connection-oriented or connectionless. It can also be reliable or
unreliable. Connection-oriented means establishing a connection before
communications can occur. Connectionless does not require an established
connection before communications can occur. Transmission Control Protocol
(TCP) is an example of a connection-oriented reliable protocol, and User
Datagram Protocol (UDP) is an example of a connectionless unreliable protocol.
Reliable protocols provide delivery through acknowledgments and flow control
(certified mail); whereas unreliable protocols (regular mail) rely on the upper
layers for reliability.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 17
Implementing the BSR for Basic Data Services
Module 2, Page 18
Ô Path Determination
Ô Routing
Ô Logical Addressing 192.168.0.0
Ô Routers exchange routing information
Ô Last-hop router determines the node
Ô IP
Ô ICMP
Ô ARP
Layer 3, the Network layer of the OSI model, is responsible for logical addressing
and path determination for internetworking networks. Routers examine the packet
or datagram to see where the packet is coming from and where it is going.
Packets can take different routes to reach their destination network. Routers look
at the network portion of the logical address and talk to other routers to determine
what to do with the packet. The destination router handles the local delivery to the
appropriate node.
The Network layer is like driving home. You listen to the radio, and if the route you
normally take is under construction or there is an accident, you take an alternate
route. Routers check their routing tables to find an alternate route just as humans
check maps or stop at gas stations for directions.
Internet Protocol (IP) is an example of a Network layer routed protocol. Internet
Control Message Protocol (ICMP) and Address Resolution Protocol (ARP) are
helper protocols. ICMP is for status and error reporting, and ARP is for resolving
IP addresses to MAC addresses.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 18
Implementing the BSR for Basic Data Services
Module 2, Page 19
Layer 2, the Data Link layer of the OSI model, transmits frames from node to node
depending on the hardware address. Layer 2 converts frames to bits to go out on
the wire on the sending side and packages the raw data bits into frames on the
receiving end. Frames are Protocol Data Units (PDUs) that contain control bits for
the beginning and end of the frame and a trailer for error checking. Think of
frames as picture frames and how the frame marks the edges of a picture. Bits
are 1's and 0's which ultimately are the only protocol data units that computers
understand.
The Data Link layer encompasses various LAN and WAN protocols such as
Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), Copper Distributed
Data Interface (CDDI), High Level Data Link Control (HDLC), and Frame Relay.
Bridges and switches operate here.
The IEEE 802 Project, which was named for the year and month it began, divides
the Data Link layer into two sublayers, the Logical Link Control (LLC) and Media
Access Control (MAC). LLC provides software controls to manage multiple
protocols, and the MAC layer defines how devices access the wire. An example
of an access method is Carrier Sense Multiple Access with Collision Detection
(CSMA/CD) for Ethernet.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 19
Implementing the BSR for Basic Data Services
Module 2, Page 20
Layer 1, the Physical layer of the OSI model, sends and receives bits. Bits are 1's
and 0's. Starting at the Physical Layer, the receiving computer’s NIC removes the
bits from the wire, transforms them into parallel data for the computer (Data Link
layer frames) and continues up the stack until the packets get to the Application
layer.
The Physical layer coordinates the rules for bit transmission. Cables, connectors,
hubs, and modems operate here. All devices on a network are connected through
the Physical layer. Physical topologies such as bus, ring, and star and other
mechanical and electrical specifications are defined at layer 1. Examples include:
EIA/TIA-232, V.35, Category 5 cable, and High Speed Serial Interface (HSSI).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 20
Implementing the BSR for Basic Data Services
Module 2, Page 21
Overhead
Ô Additional information
Sue Ruth
Ô In support of data transfer
Hello Ruth. Hello Sue. Ô Conversation set-up
Ô Acknowledgement
Sue Ruth
Up for Lunch? Sure.
Ô Unique identification
ÔBi-directionally
Sue Ruth
Later, Ruth. Bye Sue.
Ô Transfer of information
Ô Conversation end
Ô Some not as obvious
sound waves
Ô Indication of language
Ô Length of message
There is some amount of overhead involved in passing data, not just between
devices, but between layers of the network stack. This includes addition of
sending and receiving address to the message in the form of a header. The
inclusion and use of error checking and correction mechanisms is another
example. These additional components are required for data passing, both locally
and remotely, but, take up precious processing and bandwidth resources.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 21
Implementing the BSR for Basic Data Services
Module 2, Page 22
Encapsulation
DE-ENCAPSULATION
Data Segments
Segments Packets
Packets Frames
Frames Bits
To review the OSI model communications process, the sending computer starts at
the Application layer and works its way down to the Physical layer with each layer
adding instructions (a header) for what the peer layer is to do with the data. The
Data Link layer adds a trailer for error checking, and the data is converted to 0's
and 1's to go across the wire. Starting at the Physical layer, the receiving
computer’s NIC removes the bits from the wire, transforms them into frames for
the computer (Data Link layer) and continues up the stack until the packets get to
the Application layer. Larger chunks of data are broken into more manageable
chunks to be processed and sent to their destination.
This entire process is referred to as encapsulation. The sending computer starts
at the upper layers (Application, Presentation, Session) with user information that
is referred to as messages or data. The Transport layer encapsulates the data
into segments. The Network layer encapsulates the segments into packets or
datagrams. The Data Link layer encapsulates the datagrams into frames, and the
Physical layer requires bits to traverse the wire. After the bits get to their
destination the de-encapsulation process begins. Each layer reads the header
instructions from its peer, discards the header, and sends the protocol data units
up the stack to the destination computer.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 22
Implementing the BSR for Basic Data Services
Module 2, Page 23
Sending Receiving
DATA
App App
Physical Physical
BITS
Layer Layer
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 23
Implementing the BSR for Basic Data Services
Module 2, Page 24
OSI TCP/IP
Application 7
Presentation 6 Application
Session 5
Transport
Transport 4
(host-to-host)
Network 3 Internet
Data Link 2
Network Interface
Physical 1
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 24
Implementing the BSR for Basic Data Services
Module 2, Page 25
IP IP Data IP
The Host-to-Host’s TCP/IP model protocols work together to carry data to it’s
destination. Let’s look at a practical example using an FTP application.
A client wants to transfer a file using File Transfer Protocol (FTP). FTP is the
Application layer protocol. Notice how FTP carries the data to the Transport layer
by way of Transmission Control Protocol (TCP). TCP encapsulates FTP, adds its
own header, and sends it on to the Internet layer. At the Internet layer, the
Internet Protocol (IP) encapsulates the data, adds an IP header, and sends it to
the Network Interface layer, where the Ethernet header is added. The Ethernet
frame gets translated to 1's and 0's to go across the 10BaseT wire.
The receiving computer, an FTP server in this example, pulls the bits off the wire,
strips the peer headers, and moves the FTP request up the protocol stack.
The DOD model and its corresponding protocols will be covered in more detail
throughout the course. We have defined networking; discussed types,
components, and requirements to help us make decisions; explored standards
and protocols through industry models; and introduced TCP/IP.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 25
Implementing the BSR for Basic Data Services
Module 2, Page 26
Introduction to DOCSIS
Developed by CableLabs and approved by the ITU in March 1998, Data Over
Cable Service Interface Specification defines interface standards for cable
modems and supporting equipment.
With certification from CableLabs, manufacturers will be able to produce cable
modems for retail, so consumers no longer have to depend on leased cable
modems from their cable providers.
Other devices that recognize and support the DOCSIS standard include HDTVs
and Web enabled set-top boxes for regular televisions.
DOCSIS specifies downstream traffic transfer rates between 27 and 36 Mbps over
a radio frequency (RF) path in the 50 MHz to 750+ MHz range, and upstream
traffic transfer rates between 320 Kbps and 10 Mbps over a RF path between 5
and 42 MHz. But, because data over cable travels on a shared loop, individuals
will see transfer rates drop as more users gain access.
In 1998, there were 1.2 million cable modems installed across the United States
with an average price of $245 per unit, and by 2004, research reports predict
there will be 24.3 million units installed across the US with an average price of $50
per unit.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 26
Implementing the BSR for Basic Data Services
Module 2, Page 27
Standards effort in IEEE 802.14 were stalled and Major MSOs wanted to lower
their costs through retail cable modems and interoperability of multiple vendors’
equipment. DOCSIS 1.0 is effectively complete. Product is available and being
installed in hundreds of CATV systems. DOCSIS 1.1 cable modems are available
and CMTS are currently being tested. This will add technology that makes
possible Quality of Service (QoS) guarantees needed for newer services like
DOCSIS-based telephony over cable. Another CableLabs effort -- PacketCable --
is merging its efforts with DOCSIS to realize this.
DOCSIS is really a family of documents. These are available from the public area
of the CableLabs cable modem website at
http://www.cablemodem.com/specifications.html. DOCSIS defines a
Reference Architecture for an overall data communication system optimized to
connect consumer PCs to the internet using the DOCSIS-compliant Cable
Modems and DOCSIS-compliant Cable Modem Termination Systems. These
specifications really started as just RFI and grew into family of specifications that
have been accepted by the MCNS and IEEE.
DOCSIS 2.0, the newest standard will provide 30 megabits of upstream capacity
for each 6MHz cable TV channel over cable hybrid fiber/coax networks. Current
DOCSIS 1.0 modems provide a maximum of 4 megabits. DOCSIS 1.1 provides
10 megabits.
DOCSIS 2.0 will include two modulation techniques -- synchronous code-division
multiple access (S-CDMA) and advanced frequency agile time division multiple
access (A-TDMA). Equipment will be backward-compatible with versions 1.0 and
1.1.
Since the major changes in DOCSIS 2.0 are at the physical layer (hence the
name Advanced PHY), the impact on existing CM/CMTS implementations should
be minimal.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 27
Implementing the BSR for Basic Data Services
Module 2, Page 28
COMBINER
Modem
Termination CMTS Cable Modem
System Termination FIBER
Network Side CABLE DS = >54 MHz
MOD System
Interface TERMINATION PLANT
NETWORK
Downstream
(CMTS-NSI) F.O.
LAN
RF Interface
NODE
SPLITTER
Internet Backbone
to RF Interface CM CPE
ORx
OSS COAX
Interface Baseline Privacy CABLE
Network
Cable
(OSSI) Interface (BPI) Modem PLANT
OPERATIONS SECURITY & Termination
SUPPORT ACCESS US signals System
US = <42 MHz
SERVER CONTROLLER Upstream
RF Interface
Cable Modem to
REMOTE SERVER FACILITY CPE Interface
(CMCI)
The CPE - Customer Premise Equipment is (today) primarily the consumer’s PC.
CPE connects to the Cable Modem via an Ethernet or USB port. The Cable
Modem connects to the 2-way cable plant coax via a standard CATV drop and
jack.
A two-way coax cable transports data to/from the HFC optical node that feeds the
home, using traditional 2-way coax cable technology. This technology transports
signals higher than 54 MHz in the downstream direction, and signals lower than
42 MHz in the upstream direction, by RFI specification.
Optical fibers transport data between optical node and the CMTS in the cable
headend. Different fiber is used to transport data downstream than to transport
data upstream, hence the use of optical splitters and combiners. At the headend,
the CMTS downstream output is combined with other downstream cable signals
(such as analog and digital video services), while the CMTS upstream input is
picked from the upstream cable spectrum.
On the CMTS network side interface, a LAN in the headend connects the CMTS
to the Internet and a number of support servers required by DOCSIS specification
(i.e., DHCP,ToD and TFPT), plus (typically) data caching servers and provisioning
systems. The support servers are often physically located at another Regional
Data Center, that may be tens or hundreds of miles from the headend. Caching
servers are co-located with the CMTS at the cable headend.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 28
Implementing the BSR for Basic Data Services
Module 2, Page 29
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 29
Implementing the BSR for Basic Data Services
Module 2, Page 30
IP
Network IP IP
Data forwarding through the CMTS may be transparent bridging or may use
network layer forwarding (routing, IP switching). Data forwarding through the
cable modem is link layer transparent bridging. Forwarding of IP traffic must be
supported. DOCSIS was designed against as a CSMA shared medium with the
RFI defining layers one and two only. Layer three is handled by standard IP
technologies by definition.
Conceptually, the CMTS forwards data packets at two abstract interfaces:
between the CMTS-RFI and the CMTS-NSI, and between the upstream and
downstream channels. The CMTS MAY use any combination of link-layer
(bridging) and network-layer (routing) semantics at each of these interfaces. The
methods used at the two interfaces need not be the same.
Forwarding between the upstream and downstream channels within a MAC layer
differs from traditional LAN forwarding in that: A single channel is simplex, and
cannot be considered a complete interface for most protocol (e.g., 802.1d
spanning tree, Routing Information Protocol per RFC-1058, etc.) purposes.
Upstream channels are essentially point-to-point, whereas downstream channels
are shared-media.
For these reasons, an abstract entity called the MAC Forwarder exists within the
CMTS to provide connectivity between stations within a MAC domain.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 30
Implementing the BSR for Basic Data Services
Module 2, Page 31
Networked Components
Demand
QPSK Modulators
QPSK
FIBER TRANSPORT
DOWNSTREAM
ANALOG
HFC PLANT
QPSK
UPSTRAEM
FIBER TRANSPORT QAM64/256
Service QPSK/QAM16
Provider
Router/CMTS
REB 15-FEB-00
We can look at the components involved in providing cable data services as being
either on the HFC, in the network transport system or as parts of the WAN. Each
of these pieces act, when dealing with data transport (unique identification of
where to send data), at specific layers, as we will see in the next couple of slides.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 31
Implementing the BSR for Basic Data Services
Module 2, Page 32
Devices are attributed to specific layers in much the same way that protocol
function is. The rule of thumb for determining at what layer a network device
operates is to look at which layer it makes it’s forwarding decisions. From this
perspective, something like a hub is a Layer 1 device, since it makes no
forwarding decisions – it serves as a conduit for the data, enabling it to go from
one device (or segment) to another.
Switches and bridges use Layer 2 addressing to make their forwarding decisions,
while routers go to Layer 3.
Intelligent hubs and switches include additional features that enables an
administrator to monitor the traffic passing through the device and to configure
ports and features, typically using the Simple Network Management Protocol
(SNMP). Although assigned unique identifiers at Layer 3 (specifically I.P.
addresses), they remain Layer 1 and 2 devices respectively, due to how they still
make their forwarding decisions. Many times you will hear these devices referred
to as either Managed or Manageable devices (e.g., managed hub, manageable
switch, etc.).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 32
Implementing the BSR for Basic Data Services
Module 2, Page 33
Cable data devices are nothing more than specialized data networking devices.
As such, they too can be categorized as Layer 1, 2 or 3 devices.
What is traditionally referred to as the HFC Plant consists of Layer 1 devices,
specifically, fiber, coax, forward and reverse nodes, splitters, taps, etc.
Cable modems make their forwarding decisions at Layer 2, making them Layer 2
devices. As with switches, cable modems are manageable (by DOCSIS OSSI
specification), making them managed Layer 2 devices. Some vendors have
recently introduced home cable devices with Layer 3 path determination
functionality – which, by definition, makes them no longer cable modems.
Devices like this are called cable modem routers (or some variant), because of
this.
The DOCSIS Specification allows for cable modem termination systems (CMTS)
to act at either layer two or layer three.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 33
Module 3, Page 0
Module 3
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 0
Implementing the BSR for Basic Data Services
Module 3, Page 1
Introduction
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 1
Implementing the BSR for Basic Data Services
Module 3, Page 2
Objectives
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 2
Implementing the BSR for Basic Data Services
Module 3, Page 3
Topic Order
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 3
Implementing the BSR for Basic Data Services
Module 3, Page 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 4
Implementing the BSR for Basic Data Services
Module 3, Page 5
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 5
Implementing the BSR for Basic Data Services
Module 3, Page 6
TX
TV Fiber
Channels
RX Coax
Trunk
Amp
Personal
Home
Computer
Subscriber
Television
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 6
Implementing the BSR for Basic Data Services
Module 3, Page 7
DOWNSTREAM
Operational
HFC PLANT
Support
Systems
UPSTRAEM
FIBER TRANSPORT QAM64/256
Router/CMTS
Downstream RF
Optical Transmitter /
Receiver Upstream RF
(OC-3,
Baseband Ethernet,
Router/CMTS etc.)
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 7
Implementing the BSR for Basic Data Services
Module 3, Page 8
Physical layer networking is layer 1 of the OSI model. It sends and receives bits
and coordinates the rules for transmission. Topologies, signaling types, cables,
connectors, hubs, and modems operate here.
What the network looks like is referred to as physical topology. How it works is
called logical topology. Common physical topology types include bus, star, ring,
and mesh with star being the most popular.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 8
Implementing the BSR for Basic Data Services
Module 3, Page 9
Ô Ethernet
¾ Backbone or trunk segment
¾ Small workgroups
Ô Installation
Ô Terminators
Ô Cost
Ô Troubleshooting
Ô Data transmission
Ô Hubs
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 9
Implementing the BSR for Basic Data Services
Module 3, Page 10
ÔEthernet 10BaseT
To another Hub
ÔInstallation and cost
Hub (optional) ÔTroubleshooting
ÔWorks like a bus
topology
Workstation
Segment
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 10
Implementing the BSR for Basic Data Services
Module 3, Page 11
A ring topology joins all the nodes together to form a closed loop of point-to-point
links between stations. This is an active topology: each workstation acts as a
repeater to minimize signal degradation. Failure of any one device in a true ring
can cripple the network, and thus is not used often today.
A token is passed around the ring in one direction. If a station has the token it can
talk. The ring topology provides equal access for all computers in this respect.
Message verification is performed by each and every computer. It is a “hey, is this
for me?” approach with two outcomes. One: “if the data is for me, I will send it up
the stack for processing.” Or two: “if the data is not for me then I’ll regenerate the
signal and send it to my neighbor.” Once the originating computer receives back
the original token it sent out, that token can be released, and another one created.
Token Ring networks combine the advantages of the star and bus topologies
through use of a physical star, logical ring. A ring topology looks like a star and
the ring is built inside of the hub device to bypass problem stations. Problem
isolation and network reconfiguration are definite issues in a ring topology.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 11
Implementing the BSR for Basic Data Services
Module 3, Page 12
Mesh Topology
ÔThe mesh topology
ÔWAN topology
ÔBackbone redundancy
ÔNo single point of failure
ÔOther topology terms
¾ Point-to-point
¾ Multi-point
¾ Clouds
¾ Hybrid
The mesh topology is typically used in WANs or hybrid situations for redundancy.
There are multiple active paths in which routers can determine the best route. A
mesh topology is great for a backbone because there is no single point of failure.
However, cost and complexity make this topology impractical in most LANs,
especially those LANs with lots of devices.
Troubleshooting is more complicated in a mesh topology and fault tolerance is
maximized. However, it is difficult and expensive to install and reconfigure.
Depending upon the design, bandwidth may be wasted too.
Other topology types are point-to-point, multi-point, cloud, and hybrids of bus, star,
ring, and mesh.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 12
Implementing the BSR for Basic Data Services
Module 3, Page 13
ÔCurrently Supported
¾ Packet Over Sonet (POS)
¾ Ethernet
¾ Fast Ethernet
¾ Gigabit Ethernet
The BSR1000 currently supports a single 10/100 Ethernet interface, while the
BSR64000 supports POS and Gigabit Ethernet interfaces too.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 13
Implementing the BSR for Basic Data Services
Module 3, Page 14
Ethernet
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 14
Implementing the BSR for Basic Data Services
Module 3, Page 15
5-4-3 Rule
No Stations No Stations
R R
R R
30 Stations 30 Stations
30 Stations
185 meters x 5 segments = 925 meters
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 15
Implementing the BSR for Basic Data Services
Module 3, Page 16
Fast Ethernet
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 16
Implementing the BSR for Basic Data Services
Module 3, Page 17
100 Mbps
100 10 Mbps
Mbps
100 Mbps
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 17
Implementing the BSR for Basic Data Services
Module 3, Page 18
100 Mbps
200 Mbps
100 Mbps
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 18
Implementing the BSR for Basic Data Services
Module 3, Page 19
II am
am sending
sending data
data
10 Mbps at
at 10
10 Mbps.
Mbps.
II am
am sending
sending data
data 100 Mbps
at
at 100
100 Mbps.
Mbps.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 19
Implementing the BSR for Basic Data Services
Module 3, Page 20
Gigabit Ethernet
Mbps Copper
1000BaseCX
Baseband LX Fiber To another switch
IEEE 802.3z SX
Switch
Fast Ethernet offers a speed increase ten times that of the 10BaseT Ethernet
specification, while Gigabit Ethernet offers ten times that of 100BaseT Ethernet.
They are both based on an extension to the IEEE 802.3 specification.
Gigabit Ethernet is fast becoming a standard for campus backbones. In 1998 and
early 1999, the IEEE ratified the 802.3z standards for Gigabit Ethernet over fiber
(1000BaseLX and 1000BaseSX). The copper standard is specified in 802.3ab.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 20
Implementing the BSR for Basic Data Services
Module 3, Page 21
IEEE
IEEE 802.2
802.2 LL LC
LC IEEE 802.3z
Gigabit Ethernet
IEEE 802.3 IEEE
IEEE 802.3
802.3
Ethernet CSMA/CD
CSMA/CD IEEE
IEEE 802.2
802.2 LLC
LLC
IEEE802.3
IEEE802.3
Physical CSMA/CD
CSMA/CD or
or Full-Duplex
Full-Duplex
Physical Layer
Layer
Media
Media Access
Access Control
Control (MAC)
(MAC)
FC-4
FC-4 Upper
Upper Layer
Layer 8B/10B
8B/10B Encode/Decode
Encode/Decode
Mapping
Mapping
FC-3
FC-3 Comm
Comm Serializer/Deserializer
Serializer/Deserializer
Service
Service
ANSI X3T 11 Connector
Connector
FC-2
FC-2 Signaling
Signaling
Fibre Channel
FC-1
FC-1
Encode/Decode
Encode/Decode
FC-0
FC-0 Interface
Interface
and
and Media
Media
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 21
Implementing the BSR for Basic Data Services
Module 3, Page 22
Twisted pair cabling is used in Ethernet and Token Ring networks. The solid or
stranded twisted pairs are insulated in an outer jacket for protection. Individual
pairs are twisted to assist with reducing crosstalk and other EMI sources. The
number of twists and their spacing are specified by industry standards. The pairs
may or may not be individually shielded. The shielding or braid may just be within
the outer jacket. Plenum and PVC types are available.
Wire thickness is measured by the American Wire Gauge (AWG). As thickness of
the conductor increases, the AWG number decreases. For example, 14 AWG is
physically larger in diameter than 22 AWG. The Electronic Industries
Association/Telecommunications Industries Association (EIA/TIA) and
International Business Machines (IBM) are among the standards bodies of the
cable industry.
Twisted pair cabling is divided into two main categories:
Unshielded Twisted Pair (UTP)
Shielded Twisted Pair (STP)
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 22
Implementing the BSR for Basic Data Services
Module 3, Page 23
ÔConnectors
¾ RJ-45 (4 pr)
¾ RJ-11 (2 pr)
Ô Connectivity
¾ Patch cable to wall jack
¾ Wall jack to punch down block
¾ Punch down block to patch panel
¾ Hubs to patch panel
Ô 10BaseT, 100BaseT
The most common uses of UTP include telephone wiring and local area networks.
There are various categories of cabling with category 5 being the most popular
cable type for new installations. It is designed to reliably support more than
100Mbps over 24 AWG wire. It has more twists per foot and better insulation
material than category 3. Category 3 may already be installed for voice, but it may
only support up to 10Mbps, depending upon the installation method.
Although UTP suffers from attenuation and EMI, it is a very practical and
economic choice for today’s networks. RJ-45 connectors are used to make patch
cables that connect the node to the wall jack or hub. The wall jack is connected to
a punch down block, typically located in one or more wiring closets throughout the
facility. The punch down block is connected to a patch panel that provides
connectivity for hubs, printers, and hosts. RJ-45 connectors are typically used for
LAN connectivity, while RJ-11 connectors support phones. RJ-45 houses 8 wires
or 4-pair, and RJ-11 houses 4 wires or 2-pair. One pair is for transmitting and the
other for receiving.
Common implementations of UTP include 10BaseT and 100BaseT (Fast
Ethernet).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 23
Implementing the BSR for Basic Data Services
Module 3, Page 24
Wire Pair:
T is Tip
Pin R is Ring
1 Pair 3 T2
2 Pair 3 R2
1
3 Pair 2 T3
4 Pair 1 R1
8 5 Pair 1 T1
6 Pair 2 R3
7 Pair 4 T4
The RJ-45 Connector 8 Pair 4 R4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 24
Implementing the BSR for Basic Data Services
Module 3, Page 25
UTP Straight-Through
Cable 10BaseT/
Straight-Through Cable
100BaseTX Straight-Through
8 1
Hub/Switch Server/Router
1 8
Pin Label Pin Label
1 TD+ 1 8 1 8
1 RD+
2 RD- 2 TD-
3 TD+ 3 RD+
4 NC 4 NC
5 NC 5 NC w g w b w o w br w g w b w o w br
g o b br
g o b br
6 TD- 6 RD-
7 NC 7 NC Wires on cable ends
8 NC 8 NC
are in same order.
A straight-through cable is wired pin 1 to pin 1, pin 2 to pin 2, pin 3 to pin 3, and
pin 6 to pin 6. The other wires are typically connected for strength and future use.
Tx is for transmit and Rx is for receive.
A straight-through cable is required to connect the following:
PC to Hub
PC to Switch
Switch to Router
Typically, straight-through cables are used to connect unlike devices (e.g., a
server to a switch, a switch to a router, etc.).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 25
Implementing the BSR for Basic Data Services
Module 3, Page 26
UTP Crossover
Cable 10BaseT/
100BaseT Crossover Crossover Cable
Hub/Switch Hub/Switch 8 1
Pin Label Pin Label 1 8
1 RD+ 1 RD+ 8 1 8 1
2 RD- 2 RD-
3 TD+ 3 TD+
4 NC 4 NC
5 NC 5 NC br
w ww w b o g
br w g w b w o w
6 TD- 6 TD- br b g o g br o b
7 NC 7 NC
8 NC
Some wires on cable
8 NC
ends are crossed.
A crossover cable is wired pin 1 to pin 3, pin 2 to pin 6, pin 3 to pin 1, and pin 6 to
pin 2. The other wires are typically connected for strength and future use. Tx is
for transmit and Rx is for receive.
A crossover cable is required to connect the following:
PC to PC (or Server)
Switch to Switch
Hub to Switch
Router to Router
Hub to Hub
PC to Router
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 26
Implementing the BSR for Basic Data Services
Module 3, Page 27
Core Cladding
LEDs
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 27
Implementing the BSR for Basic Data Services
Module 3, Page 28
Loose
Configuration
Cladding Tight
Core Configuration
Plastic Strength
Sheath Wires
Special tools are required to install and test fiber optic cable to ensure it is within
certain specifications. Fiber can be run within a building or between buildings,
and must be protected accordingly. The glass or plastic conducting core is
protected by a cladding and plastic sheath that is either surrounded by kevlar
strengthening strands or a protective gel within the outer jacket.
Fiber-to-the-desktop is still not a viable solution in many environments due to the
associated costs. Many of these costs are hidden. It is not enough to just price a
roll of fiber cable. Installation, troubleshooting, and component costs must be
considered. For example, compare the cost of NICs, hubs, switches, routers, etc.
that support fiber optic cable.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 28
Implementing the BSR for Basic Data Services
Module 3, Page 29
Dielectric Insulator
Conducting
Core
Ô Familiar technology
Ô Reasonable security
Ô Voice, data, video
Ô RG-59 family of cables (RG-6)
¾ Cross section of a typical piece of 75ohm
coaxial Cable
» Used to deliver signals to the home
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 29
Implementing the BSR for Basic Data Services
Module 3, Page 30
The RF Spectrum
ÔElectronic communication is the transmission, reception and
processing of Information (voice, video, data) over media
ÔElectromagnetic energy can be oscillated at different frequencies
allowing for multiple “channels”
¾ The RF spectrum ranges from 1 cycle (Hertz) to light
¾ In the United States, the r/f spectrum is controlled by the government
(FCC)
» The FCC assigns numbers or letters to different “channels”
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 30
Implementing the BSR for Basic Data Services
Module 3, Page 31
High-Speed Data #2
High-Speed Data #1
Telephony Data #1
Telephony Data #2
¾ Radio
Telephony Data
Impulse PPV
¾ Broadcast TV
PBS
HBO
CNN
Satellite
NBC
¾
ABC
CBS
VHF TV channels are separated from the FM band and the UHF TV channels.
The FCC set up geographical boundaries for off-air broadcasters. Adjacent TV
channels are never in the same market area to prevent interference. This is
because as signals bounce off the ionosphere, they can impact other channels on
the same frequency in different locations. In fact, if conditions are right a channel
500 miles away can be picked up off an antenna.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 31
Implementing the BSR for Basic Data Services
Module 3, Page 32
Status
IPPV IPPV
Monitoring
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 32
Implementing the BSR for Basic Data Services
Module 3, Page 33
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 33
Implementing the BSR for Basic Data Services
Module 3, Page 34
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 34
Implementing the BSR for Basic Data Services
Module 3, Page 35
By definition, higher frequencies go through more cycles within the time same
period as lower frequencies.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 35
Implementing the BSR for Basic Data Services
Module 3, Page 36
Amplitude y
qu enc
F re
Tim
e
To fully understand the performance of your device/system, you will also want to
analyze the signal(s) in the frequency-domain. This is a graphical representation
of the signal's amplitude as a function of frequency The spectrum analyzer is to
the frequency domain as the oscilloscope is to the time domain.
In the time domain, all frequency components of the signal are summed together
and displayed. In the frequency domain, complex signals (signals composed of
more than one frequency) are separated into their frequency components, and the
level at each frequency is displayed.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 36
Implementing the BSR for Basic Data Services
Module 3, Page 37
Waves
ÔMeasuring Waves
¾ Period
» Shortest time a point takes to return to
initial position
λ » Represented by symbol T
¾ Frequency
» Number of vibrations per second
λ » Measured in hertz (Hz)
» Represented by symbol f
» f= 1/T
¾ Wavelength
» Shortest distance between peaks or
troughs
» Represented by symbol λ
» Velocity=λf
¾ Amplitude
» Distance from crest to equilibrium
» Used to measure energy of wave
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 37
Implementing the BSR for Basic Data Services
Module 3, Page 38
Attenuation
It takes more energy to travel the same distance at higher frequencies. The
higher the frequency the greater the loss (attenuation). A signal at 860Mhz will
lose more level than a signal at 50mHz when it is passed through an equal length
of cable.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 38
Implementing the BSR for Basic Data Services
Module 3, Page 39
Attenuation (cont.)
Higher frequencies travel along the surface of the conductor. This is called the
Skin Effect and makes the higher frequencies on a CATV system more
susceptible to imperfections and attenuation. The result of this phenomenon is
greater signal loss as the frequency increases.
For example, the signal loss for channel 116 (750 MHz) is over 4 times greater
than the loss for channel 2 (55 MHz) passed through the same coaxial cable.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 39
Implementing the BSR for Basic Data Services
Module 3, Page 40
Modulation
ÔModulation
¾ Process of imprinting carrier wave with information
» Amplitude
» Frequency
» Phase
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 40
Implementing the BSR for Basic Data Services
Module 3, Page 41
Analog Signal
Typically, an analog television signal will use amplitude modulation (varying the
amplitude of a wave to propagate information) for it’s visual information.
Frequency modulation (varying the frequency of a carrier wave to encode it with
information) is used for the aural sub-carrier. Color information is typically sent
using a combination of amplitude and phase modulation.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 41
Implementing the BSR for Basic Data Services
Module 3, Page 42
Amplitude Modulation
Baseband Signal
Although AM signals travel further distances over the air they are susceptible to
electrical interference such as poor insulators on high tension lines. AM signals
are also attenuated by terrain as encountered in the loss of signal through tunnels.
FM signals can be recovered by the receiver at much lower levels.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 42
Implementing the BSR for Basic Data Services
Module 3, Page 43
Baseband Signaling
A B C A B
B
C
There are two major types of transmission: baseband and broadband. Baseband
signaling typically uses digital signaling and broadband typically uses analog
signaling. Analog implies a continuous varying operation, in contrast with digital
which is broken up into numbers or discreet states.
Baseband transmission as used in Ethernet is bi-directional. The entire capacity of
the cable is taken up by a single transmission. Repeaters are used to regenerate
the signals.
Examples include 10Base2 and 10Base5.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 43
Implementing the BSR for Basic Data Services
Module 3, Page 44
Broadband Signaling
Ô Integrated data, voice, and video
Ô Analog signaling is common
Ô Half-duplex or unidirectional
Ô Multiple simultaneous frequencies
Ô Frequency Division Multiplexing
Ô Uses amplifiers to boost signal
Ô Examples—Cable TV
A
B
C
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 44
Implementing the BSR for Basic Data Services
Module 3, Page 45
Although AM signals travel further distances over the air they are susceptible to
electrical interference such as poor insulators on high tension lines. AM signals
are also attenuated by terrain as encountered in the loss of signal through tunnels.
FM signals can be recovered by the receiver at much lower levels.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 45
Implementing the BSR for Basic Data Services
Module 3, Page 46
Digital Signal
The more efficient the modulation type, the more susceptible it is to imperfections
in the physical plant. Factors such as modulation error rate (carrier to noise), are
critical to the success of using digital signal.
Digital signals are capable of carrying more video channels in a 6 MHZ bandwidth
than analog. Six digital channels can be transmitted in the same amount of
bandwidth it takes to send one analog channel.
FSK (Frequency Shift key) signals are robust but can only provide low bandwidth.
They are used on CATV plant for Impulse pay-per-view and status monitoring
systems.
QPSK (quaternary phase shift key) is a angle modulated constant amplitude
signal.
QPSK can function in fairly poor carrier-to-noise and carrier-to-interference
environments.
QAM (Quadrature Amplitude Modulation) is a form of modulation where the digital
information is carried in both the amplitude and phase of the transmitted carrier.
Although QAM is capable of handling higher data rates it needs a higher carrier-
to-noise and carrier-to interference ratio than QPSK signals.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 46
Implementing the BSR for Basic Data Services
Module 3, Page 47
Although r/f waves are analog in nature, by selecting set, discrete amplitude
ranges to map to digital symbols, it becomes possible to modulate an analog
carrier with digital information.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 47
Implementing the BSR for Basic Data Services
Module 3, Page 48
1 1 In Phase
Amplitude
0
180° Out
-1 0 of Phase
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 48
Implementing the BSR for Basic Data Services
Module 3, Page 49
Bits
• Symbol
Group of bits 3 [10] Symbol
(Group of Bits)
Represented by combining
amplitude and phase 1 11 In Phase
Amplitude
modulation
The more amplitude levels, the 0
higher the symbol rate -1 01 180° Out
of Phase
-3 00
A higher data rate can be achieved by adding amplitude modulation to the carrier
in addition to the phase modulation. By having multiple levels of amplitude,
groups of bits can be transmitted. A group of bits that is represented by a
particular level and phase of the carrier is called a symbol.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 49
Implementing the BSR for Basic Data Services
Module 3, Page 50
Symbol 00 10 01 11 10 01 00
Amplitude -3 +3 -1 +1 +3 -1 -3
Bits are grouped into symbols and the appropriate phase and amplitude is
modulated and transmitted.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 50
Implementing the BSR for Basic Data Services
Module 3, Page 51
Quadrature Modulation
I Channel
Carrier
Phase
+ = Carrier
Amplitude
Q Channel
Carrier
Phase 90° Carrier Phase Shift
Shifted
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 51
Implementing the BSR for Basic Data Services
Module 3, Page 52
Constellation
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 52
Implementing the BSR for Basic Data Services
Module 3, Page 53
Constellation (cont.)
• Polar display
• Provides simple way to view amplitude and phase
• Signal interpreted relative to the carrier
• Magnitude represented as the distance from the center
• Phase as the angle
e
ud
nit
ag
Phase
M
0 degrees
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 53
Implementing the BSR for Basic Data Services
Module 3, Page 54
Constellation (cont.)
• Signal changes
• AM changes the magnitude only
• PM changes the phase only
• Can be used together
e
ud
nit
Phase
ag
Phase Phase
0 degrees
M
0 degrees 0 degrees
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 54
Implementing the BSR for Basic Data Services
Module 3, Page 55
Quadrature Modulation
Constellations
Location On
Constellation
Phase of
Carrier
Amplitude
of Carrier
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 55
Implementing the BSR for Basic Data Services
Module 3, Page 56
Quadrature Modulation
Constellations (cont.)
10 11
00 01
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 56
Implementing the BSR for Basic Data Services
Module 3, Page 57
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 57
Implementing the BSR for Basic Data Services
Module 3, Page 58
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 58
Implementing the BSR for Basic Data Services
Module 3, Page 59
Decision Boundaries
-7 -5 -3 -1 1
-1
-3
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 59
Implementing the BSR for Basic Data Services
Module 3, Page 60
Constellation Display
-7 -5 -3 -1 1
-1
-3
Buildup of -5
Dots
-7
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 60
Module 4, Page 0
Module 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 0
Implementing the BSR for Basic Data Services
Module 4, Page 1
Introduction
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 1
Implementing the BSR for Basic Data Services
Module 4, Page 2
Objectives
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 2
Implementing the BSR for Basic Data Services
Module 4, Page 3
Topic Order
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 3
Implementing the BSR for Basic Data Services
Module 4, Page 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 4
Implementing the BSR for Basic Data Services
Module 4, Page 5
Installation Tasks
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 5
Implementing the BSR for Basic Data Services
Module 4, Page 6
BSR64000 Chassis
Redundant CMTS
(optional)
SRM Resource
Modules
The BSR 64000 uses a midplane design that pairs a resource module with a
matched I/O (Input/Output) module. There are 16 slots, labeled slots 0 through
15, in the BSR64000 chassis.
Resource Modules perform most of the tasks associated with processing data
while I/O modules provide physical connections to the networks (with network
interfaces – i.e., POS, r/f, etc.).
The BSR 64000 supports the following Resource Module and I/O Module pairings:
•Supervisory Resource Module (SRM) and SRM I/O module (must be placed in
slots 7 and 8)
•DOCSIS 1:4 Resource Module and I/O Module (redundant DOCSIS must be
placed in slot 6)
•OC3 POS Resource Module and I/O Module
•Gigabit Ethernet Resource Module and I/O Module
The only other existing limitation is that slot 15 has a special design consideration.
Slot 15 will accept and work fine with a CMTS module in non-redundant mode
ONLY. RF redundancy is NOT supported in slot 15. A CMTS module in that slot
will not be protected by Motorola’s leading RF redundancy solution. The RF
backplane does not support a redundant connection to this slot and the redundant
CMTS I/O housed in slot 6 does not support this slot.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 6
Implementing the BSR for Basic Data Services
Module 4, Page 7
BSR1000 Interfaces
The DOCSIS reference architecture specifies the bounds for these interfaces.
The LAN interface consists of one downstream and four upstream r/f connections.
These are connected to the HFC plant and provide the connectivity to CPE
through cable modems.
The 10/100 Ethernet port acts as the WAN/MAN interface. It provides for I.P.
connectivity to the headend, access to DHCP, provisioning and Time of Day
(ToD) servers.
Each port is given a label of a port type and port number. From example “cable
0/0.” To configure a fixed interface, you would specify the interface by type and
numbering using this convention.
A DB-9 pin RS-232 interface allows for direct console access.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 7
Implementing the BSR for Basic Data Services
Module 4, Page 8
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 8
Implementing the BSR for Basic Data Services
Module 4, Page 9
Captive Screw
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 9
Implementing the BSR for Basic Data Services
Module 4, Page 10
ESD
Wrist
Strap
Captive Screws
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 10
Implementing the BSR for Basic Data Services
Module 4, Page 11
Architecture
Supervisory
Supervisory Supervisory
Supervisory Fully redundant route calculation/
Routing
Routing Routing
Routing
Module Module switch fabric in Supervisory Routing
ModuleAA ModuleBB
Module (SRM)
1XN RF Switch
Automatic RF line switchover
The BSR 64000 features not only a distributed architecture but also dedicated
hardware IC’s (Integrated Circuits) to handle various tasks such as packet
forwarding and classification. It distributes the packet handling intelligence and
control throughout the platform. Other, conventional systems use a centralized
processor scheme where all packet handling and management must go through a
single, dedicated CPU in order to be properly managed. The BSR 64000
distributes route forwarding, classification and filtering to each module such that
most traffic never goes through a single, central processing engine.
All modules connect to the primary and secondary SRMs via redundant Ethernet-
based control buses that allow the flow of control and management information
from the SRM to the resource modules. The two central slots in the chassis are
reserved for the primary and secondary SRMs to enable 1:1 redundancy. Typical
configurations will include a Network Interface Module for upstream metropolitan
or wide area connectivity and a Network Interface Module for high-speed LAN
connectivity to server applications/caches and up to 13 CMTS Modules.
The system provides 2.1 Gbps, bi-directional, non-blocking data packet transport
between the modules in a cross-connect manner, thus offering a redundant, 64
Gbps fabric. Also, it is important to note that there is no processor involved in
normal packet forwarding, filtering or classification decisions. These processing-
intensive tasks are all done in dedicated FPGA's (Field Programmable Gate
Arrays).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 11
Implementing the BSR for Basic Data Services
Module 4, Page 12
Contains:
• NVRAM
• Non Volatile Storage
• 64MB FLASH
• Console Connection
• Stratum 3 clock
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 12
Implementing the BSR for Basic Data Services
Module 4, Page 13
FAIL
Module In Reset On On On
STATUS
Running Off On Off
(No alarms) ALARM
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 13
Implementing the BSR for Basic Data Services
Module 4, Page 14
Alarm
Input A
Input B
Console Port
10BaseT Port
Associated with the SRM is the SRM I/O module. The SRM I/O module is a
passive device that provides the interfaces to make physical network and other
external connections to the SRM. Physical connectors on the SRM I/O module
include the following:
•One female DB-25 pin connector for connecting to an external alarm panel
•Two RJ48 T1 interfaces for BITS clock inputs
•One female DB-9 pin RS-232 connector (DTE) for connecting a console monitor
to the BSR 64000
•One female RJ-45 10BaseT Ethernet connector for connecting the BSR 64000 to
a management Ethernet network
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 14
Implementing the BSR for Basic Data Services
Module 4, Page 15
Contains:
• NVRAM
• FPGAs
• One for each set of POS
ports
• LEDs
• Fail
• Status
• Alarm
• Sonet Ports
• OK – Fail Port 0
• Ethernet Port
• Link – Fault
• Critical
The OC3 POS Resource Module provides one high speed OC3 SONET interfaces
and one 10/100BaseT interface for the BSR 64000. Each module contains a
hardware assisted packet forwarding and QoS engine that processes up to 3
million packets per second using a Motorola MPC8260 PowerQUICC II
processor with a bus speed of 66 MHz, a core speed of 166 MHz and a
communication edge speed of 133 MHz leading to 140 million instructions/
second.
A set of LEDs located on the front panel of the module provide a visual indication
of the status of the module itself as well as its individual ports. LED indicators
include the following:
•Module LEDs: Fail, Status, Alarm
•Per port LEDs (SONET ports 0) Link, Fault
•Ethernet port LEDs: Link, Fault
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 15
Implementing the BSR for Basic Data Services
Module 4, Page 16
ENET
Port 0
SONET
Port 0
Matched with each OC3 POS Resource Module installed in the system is an OC3
POS I/O Module. The I/O module is a passive module providing physical network
connections for the OC3 POS Resource Module. The I/O module provides the
following physical connectors:
•One active LC optical connector
•One active female RJ-45 10/100Base-T connector
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 16
Implementing the BSR for Basic Data Services
Module 4, Page 17
Contains:
• NVRAM
Integrated • FPGAs
Upconverter •PowerPC750
•Tuners
•Upconverter
Monitor Ports
The DOCSIS 1:4 CMTS Resource Module provides the BSR 64000 with one
downstream and four upstream broadband HFC network interfaces. Combined
with its I/O module the DOCSIS 1:4 CMTS Resource Module handles all network
traffic transmitted onto the HFC cable plant and received from it using an Intel
PowerPC750 processor running at 400 MHz.
A set of LEDs located on the front panel of the module provide a visual indication
of the status of the module itself as well as its individual ports. LED indicators
include the following:
•Module LEDs: Fail, Status, Alarm
•Downstream port LEDs (Port 0) Link, Fault
•Upstream port LEDs (Ports 0 through 3) Link, Fault
•Two Type F connectors accessible on the module front panel enable RF (radio
frequency) and IF (intermediate frequency) signal monitoring.
The 1:4 DOCSIS module contains the HFC network interface for the system. The
module supports all DOCSIS modulation modes, implements per-flow packet
classification, applies QoS policies and performs distributed packet forwarding.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 17
Implementing the BSR for Basic Data Services
Module 4, Page 18
Upstream
Port 0
Port 1
Port 2
Port 3
Downstream
Port 0
Associated with each DOCSIS 1:4 CMTS Module is an I/O module. The I/O
module is a passive device that provides the physical connectors required for the
resource module. The DOCSIS 1:4 I/O module provides the following physical
connectors:
•One Type F connector for Downstream Port 0
•Four Type F connectors for Downstream Ports 0 through 3
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 18
Implementing the BSR for Basic Data Services
Module 4, Page 19
Contains:
• NVRAM
• FPGAs
• Software Upgradeable
• LEDs
• Fail
• Status
• Alarm
•Optical Interface
• Link
•Fault
The Gigabit Ethernet Resource Module features Motorola’s FPGA based Packet
Forwarding/ processing architecture, which allows feature enhancement without
change of the hardware (software upgradeable FPGAs).
It also has the MPC8260 based controller which is responsible for normal
operation of the Gigabit Ethernet Module.
The board itself has the following memory structures:
•32 MB of on-board flash memory
•64 MB of SDRAM
•128 MB of Packet Buffer
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 19
Implementing the BSR for Basic Data Services
Module 4, Page 20
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 20
Implementing the BSR for Basic Data Services
Module 4, Page 21
Processors
Ô MPC8260
¾ Next generation of the MPC860 PowerQUICC(tm) device
¾ Provides higher performance in all areas of device operation,
» Including greater flexibility, extended capabilities, and higher integration
Ô PowerPC 750
¾ Low-power 32-bit implementations of the PowerPC Reduced Instruction Set
Computer (RISC) architecture
» Features dedicated L2 cache interface with on-chip L2 tags
» Fully JTAG-compliant.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 21
Implementing the BSR for Basic Data Services
Module 4, Page 22
Ô Fan Controller PCB (PCA-0028-03) can be swapped in for Non-Controller PCB (PCA-
0023-02)
Ô Non-Controller Trays (ASM-0002-XX) can be swapped out for Controller Trays (ASM-
0003-01)
Ô Integrated handle allows for easier removal
Ô Fan Guards (Top and Bottom of tray) allow for safe removal
Ô Designed as a FRU (Field Replaceable Unit)
Top Fan Tray communicates via I2C bus to Slot7 SRM and is Master when Slot7
is Active, while the Bottom Fan Tray communicates via I2C bus with Slot8 SRM
and is Master when Slot8 is Active.
The private I2C bus between Top Fan Tray and Bottom Fan Tray allows trays to
communicate with each other and stay synchronized via on-board
Microprocessor.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 22
Implementing the BSR for Basic Data Services
Module 4, Page 23
Control Curve
X
RPM 3360RPM, 45C (113F)
X
2688RPM, 37.5C (99.5F)
X
2016RPM, 30C (86F)
Temperature
The Fan Trays go to High Speed Mode when a failure occurs (i.e. Failed Fan,
Failed Tray, Failed I2C Communication) and an alarm is sent to the SRM.
Otherwise, they follow a linear control curve within the BSR64000s operational
environmental range.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 23
Implementing the BSR for Basic Data Services
Module 4, Page 24
Rack Mounting
1. Lift and hold the BSR 64000 at its intended position in the rack and align the
BSR 64000 mounting bracket holes with the mounting holes of the equipment
rack.
2. Secure the BSR 64000 in the equipment rack using eight mounting screws.
Tighten the screws using a screwdriver.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 24
Implementing the BSR for Basic Data Services
Module 4, Page 25
Always connect the grounding cables first. The chassis has a set of two
grounding terminal posts located at the rear. These terminal posts are the primary
grounding point. To ground the BSR 64000:
•Locate the grounding terminal posts on the BSR 64000.
•Remove the KEP nuts and locking washers from the accessory bag.
•Place a grounding cable lead over the grounding terminal posts.
•Place KEP nuts and locking washers on each post, then tighten.
To connect power cables to each Power Entry Module:
•Locate the Power Entry Modules. Facing the rear of the BSR 64000
chassis, Power Entry Module A is on the left and B is on the right.
•Remove the four screws holding the clear plastic shield using a flathead
screwdriver, then remove the shield from the chassis
•Remove the nuts and washers from Module A’s terminal posts.
•Facing the terminal posts, place the positive cable lead on one of the
bottom posts of the pair labeled RTN. Replace the locking washer and
nut. Tighten the nut to secure the connection.
•Place the negative cable lead on the top post of the pair labeled -48VDC.
Replace the locking washer and nut. Tighten the nut to secure the
connection.
•Repeat Steps 2 through 6 for power unit B.
•Place the clear plastic shield over the terminal posts and secure it in
place by tightening the four screws with a flathead screwdriver.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 25
Implementing the BSR for Basic Data Services
Module 4, Page 26
BSR64000 DC Connections
48VDC
48VDC
Return
Notes:
For NEBS compliance, each -48VDC lead should split to connect to each lug.
For full -48VDC redundant power sources, connect each source to both the A&B inputs separately.
Do not install hard bridges between power lugs.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 26
Implementing the BSR for Basic Data Services
Module 4, Page 27
Console Connection
Over the course of this class, we will use a (crossed-over) db-9 adapter attached
to a (straight-through) cat-5 cable running from your p.c. to the console port of the
BSR64000. We will be using HyperTerminal as the terminal emulation program.
We will look at telnet access to the BSR64000 as well as the use of an SNMP
application to access configuration and performance information about the box.
The advantage to the local console access is that it is out-of-band. With SNMP
(or any remote management interface), there is some overhead associated
(network traffic).
In order to use HyperTerminal, ensure that your settings for console access are as
follows:
Bits per second- 9600
Data bits- 8
Parity- N
Stop bits- 1
Control Flow- none
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 27
Implementing the BSR for Basic Data Services
Module 4, Page 28
This example shows the boot of CMTS (still in boot mode) with failed attempt to
contact SRM. This is an example of normal boot-up followed by the reboot of
CMTS modules. Typically, you will see one failure for all modules (with the
exception of the SRM), because these modules must wait for the SRM to indicate
that they are allowed to go active during the boot process.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 28
Implementing the BSR for Basic Data Services
Module 4, Page 29
The nvram file system contains the operating system and the startup configuration
for the BSR1000.
Care must be taken while making configuration changes to the BSR1000 during
its operational state. Changes in the operational parameters are immediate
and may cause the modems connected to the BSR1000 to re-synchronize to
the downstream or restart the registration process (which can be quite noisy
and cause problems).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 29
Implementing the BSR for Basic Data Services
Module 4, Page 30
Version: 5.4
NVRAM:/ - Volume is OK
7
6
5
4
3
2
1
0
auto-booting...
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 30
Implementing the BSR for Basic Data Services
Module 4, Page 31
###################################################################
Starting at 0x100000...
WDB: Ready.
NVRAM:/ - Volume is OK
The application image (which includes a basic boot image) is inflated (it is stored
in a compressed format), tested and run. It will check, by default, at hardware
register 0x100000 for the start-up configuration.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 31
Implementing the BSR for Basic Data Services
Module 4, Page 32
CPU: MPC750
Format Version: 48
Assembly Type : 55
Product Number:
RDN>
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 32
Implementing the BSR for Basic Data Services
Module 4, Page 33
The nvram file system contains the operating system and the startup configuration
for the BSR64000.
Care must be taken while making configuration changes to the BSR64000 during
its operational state. Changes in the operational parameters are immediate and
may cause the modems connected to the BSR64000 to re-synchronize to the
downstream or restart the registration process (which can be quite noisy and
cause problems) as well as disrupt network connectivity.
• Find and use startup-config file stored in nvram
•Provides operational parameters
•Device configurations
• During operation it uses its running-config.
•Changes to the running-config take effect immediately.
•Changes to the running-config will be lost unless saved to startup-
config.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 33
Implementing the BSR for Basic Data Services
Module 4, Page 34
Interrupting system boot will leave you in the VxWorks real-time operating system.
Do not do this unless specifically instructed by a Global Technical Support
Engineer. If you should do this, type the “@” symbol to continue through the boot
process and load the start-up configuration.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 34
Implementing the BSR for Basic Data Services
Module 4, Page 35
When interrupted, the BSR can be configured to boot from an application image
located on an external ftp server. This is not necessary to do, since the same task
can be accomplished from the command line.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 35
Implementing the BSR for Basic Data Services
Module 4, Page 36
ICP processes are enabled and resource cards are detected and booted.
Interfaces associated with each card are “created” or made active.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 36
Implementing the BSR for Basic Data Services
Module 4, Page 37
The SRM controls the version of the application image run on all resource
modules. Should it detect that any of the cards are running and older (or newer)
version of code, it will update them so that all resource modules are running at the
same revision.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 37
Implementing the BSR for Basic Data Services
Module 4, Page 38
Show Version
ÔVersion information
¾ show version [slot #]
» Can be shortened to sh ver
RDN> sh ver
…
…
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 38
Implementing the BSR for Basic Data Services
Module 4, Page 39
Slot Number
Hardware Version
Mfg. Serial Number
By default a show version will display all slots. Several things can be found out
using this command, including the Part Number associated with firmware (cards),
the Image number (software version) and any FPGA version information (firmware
component versions).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 39
Implementing the BSR for Basic Data Services
Module 4, Page 40
The chassis version is available from within the SRM Versions portion of this
output (it will begin with part number CHS-XXXX-XX).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 40
Implementing the BSR for Basic Data Services
Module 4, Page 41
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 41
Module 5, Page 0
Implementing the BSR for Basic Data Services
Module 5
Unique Identification
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 0
Implementing the BSR for Basic Data Services
Module 5, Page 1
Introduction
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 1
Implementing the BSR for Basic Data Services
Module 5, Page 2
Objectives
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 2
Implementing the BSR for Basic Data Services
Module 5, Page 3
Topic Order
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 3
Implementing the BSR for Basic Data Services
Module 5, Page 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 4
Implementing the BSR for Basic Data Services
Module 5, Page 5
House
#3, Cool
!
4 3 2 1
It would be difficult, if not impossible to get mail where it was supposed to go, if
there wasn’t a method to uniquely identify the recipient. The post office uses a
street address, City , State, and zip code. There are similar addresses schemes
within the data communications world, which we will explore in more detail.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 5
Implementing the BSR for Basic Data Services
Module 5, Page 6
OSI TCP/IP
Application 7
Presentation 6 Application
Session 5
Transport
Transport 4
(host-to-host)
Network 3 Internet
Data Link 2
Network Interface Ethernet, RF
Physical 1 Sonet
You should recall form module two, that communication is broken up into seven
distinct layers called the OSI model. When we talk about unique addressing, the
first place we look is layer two. Here is where we find the “house number’ of the
postal address. It is called the “MAC” address at layer two. Each layer of the
model is dependent on the layer above and below it. The are committees who
work on protocols and formats for each of the layers. Layer two is the concern of
the 802 committee as detailed on the next page.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 6
Implementing the BSR for Basic Data Services
Module 5, Page 7
Ô802.1 Internetworking
Ô802.2 Logical Link Control
Ô802.3 CSMA/CD Ethernet
Ô802.5 Token Ring LAN
Ô802.6 Metropolitan Area Network
Ô802.7 Broadband
Ô802.8 Fiber-optic
Ô802.9 Integrated voice/data networks
Ô802.10 Network security
Ô802.11 Wireless networks
Ô802.12 Demand priority LANs (100 VG-AnyLAN)
The IEEE 802 Project was named for the year and month it began, 1980
February. It further defines the Physical and Data Link layers of the OSI model.
802.1 defines internetworking. It specifies the physical and data link standards
required for one network device to communicate with another network device on a
different LAN or WAN.
802.2 defines Logical Link Control (LLC). This identifies what upper layer protocol
is used inside the frame. It is used with 802.3, 802.4, 802.5, and 802.6 networks.
802.3 defines Ethernet and the Carrier Sense Multiple Access/Collision Detection
(CSMA/CD) protocol, baseband and broadband signaling, multiple media types,
physical topologies such as bus and star, and data rates.
802.4 defines Token Bus, a physical bus token passing topology that was
originally designed for factory automation.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 7
Implementing the BSR for Basic Data Services
Module 5, Page 8
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 8
Implementing the BSR for Basic Data Services
Module 5, Page 9
OSI Enhancements
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 9
Implementing the BSR for Basic Data Services
Module 5, Page 10
802.2 LLC
Data Link
802.3 MAC
Ethernet II – DIX
100BaseFX
100BaseTX
(Type field)
100BaseT
10BaseT
10BaseF
10Base2
10Base5
Physical
The Physical and Data Link layers of the OSI model coordinate the basic
hardware and software communications in networking. For example, the Ethernet
Physical layer standards previously discussed have a Data Link counterpart for
communications to occur on the physical medium.
DIX Ethernet uses an EtherType field to point to the upper layer protocol. 08 00 is
IP.
IEEE Ethernet uses a length field and LLC SAPs to point to the upper layer
protocol. 06 is IP.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 10
Implementing the BSR for Basic Data Services
Module 5, Page 11
Identifying Stations
B C
A
Media Access Control (MAC) addresses are hardware addresses. The term that is
used is “burned into the ROM.” The MAC addresses are normally not changed
once they are set into the ROM at the manufacturer. Generally speaking, it is
better to leave the assigned MAC addresses unless there is a compelling reason
to administratively change them. Regardless of the reason for changing a MAC
address, the administrator must ensure that all MAC addresses remain unique on
each local segment.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 11
Implementing the BSR for Basic Data Services
Module 5, Page 12
Organizational Unique
Unique Identifier Number
3 bytes 3 bytes
(24 bits) (24 bits)
00-00-0c-11-22-33
What vendor? What machine?
The IEEE Media Access Control address is 6 bytes or 48 bits. 3 bytes identify the
vendor, and 3 bytes uniquely identify the card. Together they make up the MAC
address for the NIC which is commonly referred to as a hardware address,
Burned In Address (BIA), or Data Link address.
Vendors pay ($1250) to the IEEE for registering a block of addresses. It is not a
requirement to register a MAC address with IEEE, however, registered addresses
can be readily recognized by protocol analyzers and aid in standardization.
Every device on the LAN must have a unique MAC address. The first part (first 24
bits) is the Organizational Unique Identifier (OUI). The last 24 bits in the MAC
address is the vendor assigned serial number, and should be unique. Serial ports
do not have MAC addresses. Serial ports only have two ends and do not require a
MAC address to function properly. Duplicate MAC addresses on the local
segment will not properly resolve and WILL cause network problems. Consider
the example of house addresses on a particular street. If two or more houses had
the same address, the post office would never be able to deliver the mail.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 12
Implementing the BSR for Basic Data Services
Module 5, Page 13
Ô 00-00-0c cisco
Ô 00-06-7c cisco
Ô 00-06-c1 cisco
Ô 00-10-1f cisco
Ô 00-00-1d Cabletron
Ô 00-00-52 Optical Data Systems
Ô 00-00-81 Synoptics
Ô 00-04-ac IBM
Ô 00-20-35 IBM mainframes, Etherjet printers
Ô 00-00-c0 SMC
Ô 00-20-85 3Com superstack
Ô 00-20-af 3com
Cisco presently owns 39 OUIs that are officially registered with the
IEEE. The highest registered value is E20C0F, which is registered
to Kingston Technologies. There are 899 OUIs listed as of March 9,
1999.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 13
Implementing the BSR for Basic Data Services
Module 5, Page 14
A frame is a way of packaging data and different network types require different
frame formats. For example, Ethernet is different than Token Ring, which is
different than Frame Relay. Even within Ethernet, there are multiple frame
formats available. We will contrast and compare Ethernet II (DIX Ethernet) to
IEEE 802.3 Ethernet over the next couple of pages.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 14
Implementing the BSR for Basic Data Services
Module 5, Page 15
# Bytes 8 6 6 2 Variable 4
Preamble Dest add Source add TYPE Data FCS
MAC Address
The framing known as Ethernet II or DIX Ethernet is that used by the original 10
Mbps Ethernet and is still the main choice for transmitting IP frames across the
network. The IEEE 802.3 Ethernet variations specify a different frame format and
in fact there is more than one possible format within the IEEE 802.3 standard.
Regardless of the format in use, the basic Ethernet header is 14 bytes long. The
transmitting station will send a series of 64 bits consisting of alternating 0’s and
1’s. The last two bits will be consecutive 1’s. This signal is called the Preamble
and is not part of the actual Ethernet frame. It is used to signal to the receiving
stations(s) that a frame is coming and allows them to synchronize their receive
circuits to the incoming bit stream. The Destination and Source Addresses are
MAC addresses. The source is always a unicast address, whereas the
destination can be unicast, multicast, or broadcast.
The next field differs in use depending on whether the frame is an Ethernet II or an
802.3 frame. If Ethernet II framing is used, the next field is a type field. Since this
same field is used as a length field with IEEE 802.3 framing, it must be some
value that is not a valid packet length to be identified as an Ethernet II frame.
DIX Ethernet uses a 2-byte EtherType field to identify the upper layer data. 0800
(hex) is an IP datagram (IP version 4), and 0806 is an ARP datagram.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 15
Implementing the BSR for Basic Data Services
Module 5, Page 16
Ô 0800 IP
Ô 0806 ARP
Ô 8137, 8138 IPX (Novell)
Ô 81D6 LANtastic
Ô 81D7 LANtastic
Ô 86DD IPv6
Ô 0BAD Banyan
Ô 0BAF Banyan
Ô 6003 DecNet
Ethernet data packets range in size from 46 bytes to 1500 bytes. Note that in the
slide above, all of the type codes are greater than 1500 decimal (5dc hex). The
type codes are usually given in hex since most software that allows you to
examine a packet will display hex values. Since the maximum packet length for
Ethernet is 0x5dc (the leading 0x denotes this is a hexadecimal number), it is easy
to distinguish between Ethernet II frames and IEEE 802.3 frames. If the value of
the third field is some value greater than 1500 Decimal (5dc hex), it is an Ethernet
II frame and the field is a type field. The value in the type field identifies the layer 3
protocol that owns the data. If the value in this field is 1500 decimal or less, then
the field is a length field and the frame is an IEEE 802.3 frame. When the 14 bit
header and 4 byte FCS (frame Check Sequence) is added, we have a minimum
Ethernet frame size of 64 bytes and a maximum of 1518 bytes. Anything below
the minimum is considered a runt, and anything above the maximum is
considered a giant in Ethernet.
Reference www.cavebear.com/CaveBear/Ethernet/type.html for a more complete
list of EtherType codes.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 16
Implementing the BSR for Basic Data Services
Module 5, Page 17
# Bytes 8 6 6 2 Variable 4
Preamble Dest add Source add Length Data FCS
MAC Address
Value ≤ 0x5dc
or 1500 Decimal
We have already stated that the third field is a length field if the framing is IEEE
802.3. The value must be between 46 and 1500. If the data is less than 64 bytes,
padding will be inserted achieve a minimum packet size. Remember also that we
stated earlier that there are different formats for framing within the IEEE 802.3
standard. Let’s take a look at a few of them.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 17
Implementing the BSR for Basic Data Services
Module 5, Page 18
The picture above is the IEEE 802.3 frame format with an 802.2 LLC header.
Reference Cisco and Novell web sites for more details on SAP numbers.
Unlike Ethernet II, IEEE 802.3 Ethernet uses the type header field as a length
field. This means that we must have some other means to identify the upper layer
protocol in use.
The 802.2 LLC (Logical Link Control) committee devised a scheme whereby a
part of the data field is borrowed and used to identify the upper layer protocol in
use. A one byte Destination SAP (Service Access Point) field and a one byte
Source SAP field are used to accomplish this. There is also a control field that has
limited use in today’s networks. The DSAP and SSAP fields fulfill the same
purpose for IEEE 802.3 frames as the type field does for Ethernet II frames. 06 is
the SAP for IP and E0 is for IPX.
To allow proprietary protocols in the 802.2 LLC Length field, IEEE defined the
SubNetwork Access Protocol (SNAP) frame format. This is kind of like putting the
type field back into the frame.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 18
Implementing the BSR for Basic Data Services
Module 5, Page 19
1 1 1 or 2 3 2 Variable
802.2 LLC
Dest SAP Source SAP Ctrl OUI
(SNAP) Type Data
AA AA 03 ID
header
It would seem that the LLC committee has solved the problem of identifying upper
layer protocols in the 802.3 frame, however you may notice that the SAP fields are
only 1 byte (8 bits) long and 2 bits of the field are used for purposes other than
protocol identification. The remaining 6 bits are just not enough to handle the
needs of modern day networks, so another LLC scheme was devised. Additional
bytes were borrowed from the data field for what is called the Sub-Network
Access Protocol (SNAP). SNAP headers can be identified by confirming that there
is a length field in the header and that the fields normally used for DSAP and
SSAP contain the value AA. In the SNAP header, the field immediately following
the SSAP field is the control field, the next field is an OUI (Organizational Unique
Identifier) and the next is the type field. The OUI and type fields together identify
the upper layer protocol in use. OUIs are assigned to vendors in the same manner
as the OUIs in MAC addresses and are registered with IEEE.
Note that in both the LLC SAP and LLC SNAP schemes, the additional fields are
borrowed from the data packet. The basic frame header is still only 14 bytes long
and the maximum frame size is still 1,518 bytes including the FCS trailer.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 19
Implementing the BSR for Basic Data Services
Module 5, Page 20
B C
A
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 20
Implementing the BSR for Basic Data Services
Module 5, Page 21
B C
A
In real world operation, all stations on the local segment will see each frame. What
is significant is how early the frame gets discarded. For all stations other than C,
the frame is discarded when the destination MAC address is read.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 21
Implementing the BSR for Basic Data Services
Module 5, Page 22
B C
A
ÔStation C sees its own MAC, looks at the EtherType and hands
the packet to the appropriate upper-layer protocol (IPV4)
In each layer of the OSI reference model, there is a pointer to the next layer in the
protocol stack. In this instance, since the EtherType is 0800, the host knows to
expect IPv4 at the Network layer and is processed accordingly.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 22
Implementing the BSR for Basic Data Services
Module 5, Page 23
B C
A
When a MAC address contains all F’s in the destination address, it is a broadcast.
All NICs receiving this special destination address pass the broadcast up the
protocol stack for processing. Broadcasts are not an uncommon occurrence on a
network.
It is a good idea to minimize broadcasts on networks because every station may
need to read each packet up to layer 4 before making a keep/discard decision.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 23
Implementing the BSR for Basic Data Services
Module 5, Page 24
A B C
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 24
Implementing the BSR for Basic Data Services
Module 5, Page 25
Network Layer
OSI TCP/IP
Application 7
Presentation 6 Application
Session 5
Transport
Transport 4
(host-to-host)
Network 3 Internet IP,
IP,ICMP,
ICMP,ARP
ARP
Data Link 2
Network Interface
Physical 1
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 25
Implementing the BSR for Basic Data Services
Module 5, Page 26
•HISTORY
•Started 1969
•Adopted 1980 official internet Std.
In the next few slides, we are going to explore the Internet Protocol
(IP)
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 26
Implementing the BSR for Basic Data Services
Module 5, Page 27
Presentation
Session
Transport Transmission Control Protocol User Datagram Protocol
Datalink
Any Physical and Datalaink Layer Protocols such as
Physical Ethernet, PPP, SONET, RF Broadband
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 27
Implementing the BSR for Basic Data Services
Module 5, Page 28
IP Datagram Format
# Bytes 8 6 6 2 Variable 4
Type
Preamble Dest add Source add Data FCS
0800
MAC Address
# Bits 0 4 8 16 31
Version Header Type of
Length Service Total Length
DATA
There are lots of things to look at inside an IP packet, but the most
significant thing for our purposes is the destination and Source IP
addresses. We know that it is an IP packet, by the type code in the
header.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 28
Implementing the BSR for Basic Data Services
Module 5, Page 29
Understanding Binary
Base2
27 26 25 24 23 22 21 20
128 64 32 16 8 4 2 1
1 1 1 1 1 1 1 1 = 255
0 1 1 0 0 1 0 0 = 100
27 26 25 24 23 22 21 20
128 64 32 16 8 4 2 1
0 1 1 0 0 1 0 0 = 100
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 29
Implementing the BSR for Basic Data Services
Module 5, Page 30
IP Address Format
32 bits
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 30
Implementing the BSR for Basic Data Services
Module 5, Page 31
Default Masks
Class A N H H H /8
255 0 0 0
Class B N N H H /16
255 255 0 0
Class C N N N H /24
255 255 255 0
N = Network
H = Host
The default mask acts like a network tape measure to identify the network portion
of the address. The term “mask” is somewhat ambiguous; tape measure is more
precise. We can actually measure off thenetwork by specifying (measuring) how
many bits are required for the network. The remaining bits will always be allocated
for host addresses. Think of the network portion of the address as the street you
live on with many houses. Each house is equivalent to a host.
Class A addresses use a default mask of 255.0.0.0 or
11111111.00000000.00000000.00000000 in binary, or /8 in bit-notation.
Class B addresses use the default subnet mask of 255.255.0.0 or
11111111.11111111.00000000.00000000 in binary, or /16 in bit-notation.
Class C addresses use the default subnet mask of 255.255.255.0 or
11111111.11111111.11111111.00000000 in binary, or /24 in bit-notation.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 31
Implementing the BSR for Basic Data Services
Module 5, Page 32
Address:
172 16 141 129 /16
Mask:
11111111.11111111 00000000.00000000
255 255 0 0
Network:
172 16 0 0
The address on the top row denotes a class B address. Since the network
number for class B addresses includes the first two octets, we say that the default
mask is 16 bits.
In decimal notation, this is expressed as 255.255.0.0.
This is expressed in binary as 11111111.11111111.00000000.00000000.
In short-hand bit-count notation, it is also expressed as /16 after the IP address.
Each expression above means the same thing. They all signify that the network
number is in the first two octets (first 16 bits) and every number to the right of the
first two octets is a host value.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 32
Implementing the BSR for Basic Data Services
Module 5, Page 33
CLASS A 00000001 1
01111111 127 (loop back)
The first byte of the IP address determines the class. To be a little more specific
there are particular bits that denotes the class. The first bit is the most significant
for class A, the second bit for class B, and the third bit position for class C. An
easy way to remember this is A-B-C … easy as 1-2-3. (Thank you Jackson 5).
There are also class D and E addresses. Class D and E addresses are not
assignable to hosts. Class D addresses start at 224.0.0.0 and are used for
multicasting. Class E addresses start at 240.0.0.0 and are reserved for
experimental purposes.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 33
Implementing the BSR for Basic Data Services
Module 5, Page 34
Classes were designed with numbers of networks and hosts in mind. Class A
networks are found in extremely large organizations with the largest number of
node requirements such as Xerox or IBM. Class C is the other extreme. It is
reserved for organizations with smaller numbers of hosts. Class B is in the middle.
There are many methods for calculating binary arithmetic including charts, tables,
memorization, or calculators. Use what works best for you.
If you are using Windows there is a calculator program that has a scientific view
that allows conversions among decimal, binary, and hexadecimal.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 34
Implementing the BSR for Basic Data Services
Module 5, Page 35
A B C
192.168.10.0 Network
•Each Network Interface Card (NIC) has a unique MAC address.
•The Ethernet segment shares the same Network Address
•Each Host Interface (Computer running the IP Protocol) has a Unique
IP address.
•The MAC address of the receiving station is needed to move the frame
across the Ethernet segment. Mapping must occur between the IP and
MAC addresses.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 35
Implementing the BSR for Basic Data Services
Module 5, Page 36
PURPOSE
•Obtain the MAC address for the Destination IP host
•MAC Frame Type code (806)
MECHANISM
•ARP Request – Source sends to broadcast address
•ARP Reply – Destination returns it’s MAC address
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 36
Implementing the BSR for Basic Data Services
Module 5, Page 37
ARP Request
A B C
My IP address
I’ll ignore that, I’ll send an ARP
Broadcast
Not my IP address response
192.168.10.0 Network
What is the
MAC address
of
192.168.10.3?
•In this example, station A needed to know what MAC address to put in the frame
for station C. Station A knew the IP address, so sent out an ARP request to get
the address needed to send the frame on it’s way.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 37
Implementing the BSR for Basic Data Services
Module 5, Page 38
ARP Reply
A B C
Unicast to 192.168.10.1
192.168.10.0 Network
My MAC address is
Thanks! 00-00-0e-33-33-33
Now I can send I learned your address
the frame from your broadcast.
Thanks!
• Here, station a receives the ARP response from station C, and can now send the
frame to station Cs MAC address.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 38
Implementing the BSR for Basic Data Services
Module 5, Page 39
Host Addresses
172.16.2.2 10.1.1.1
10.6.24.2
E1
172.16.3.10 E0 10.250.8.11
172.16.2.1
172.16.12.12 10.180.30.118
Routing Table
172.16 . 12 . 12 Network Interface
Network Host 172.16.0.0 E0
10.0.0.0 E1
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 39
Implementing the BSR for Basic Data Services
Module 5, Page 40
16
15
14
13
12
11
10
9
8
7
6
5
4
3
2
1
10101100 00010000 00000000 00000000 1
00000000 00000001 2
00000000 00000011 3
...
...
...
11111111 11111101 65534
11111111 11111110 65535
11111111 11111111 65536
– 2
2N – 2 = 216 – 2 = 65534 65534
Now that we know there is a network and host part to an IP address, let’s review
how we determine how many hosts addresses are available. Remember, there is
a default mask for each class of address (A,B,and C), so those bits that are not
part of the network are host bits. You can not use a host address of all “1’s”,
because that is considered part of the network broadcast address we will discuss
later. You can not use a host address of all “0’s, because zero in the host position
would indicate “this network”. We will look at how we figure all these things out in
the next few slides.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 40
Implementing the BSR for Basic Data Services
Module 5, Page 41
10.2.1.1
128.63.2.100
201.222.5.64
192.6.141.2
130.113.64.16
256.241.201.10
Lets take a minute, and figure out the network class, what the network number is,
and what the host is based on the exercise above. Don’t turn the page and peek!
;>)
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 41
Implementing the BSR for Basic Data Services
Module 5, Page 42
256.241.201.10 Nonexistent
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 42
Implementing the BSR for Basic Data Services
Module 5, Page 43
…...
172.16.0.0
ÔNetwork 172.16.0.0
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 43
Implementing the BSR for Basic Data Services
Module 5, Page 44
172.16.3.0
172.16.4.0
172.16.1.0 172.16.2.0
ÔNetwork 172.16.0.0
The host bits of an IP address can be subdivided into a subnetwork section and a
host section. The subnetwork section in this example is the full third octet.
A subnetted address space is like a highway with exits. A network device uses a
subnet mask to determine what part of the IP address is used for the network, the
subnet, and the host ID. A subnet mask is a 32-bit value containing a number of
one bits for the network and subnet ID, and a number of zero bits for the host ID.
Given its own IP address and subnet mask, a device can determine if an IP
packet is destined for:
1) a device on its own subnet
2) a device on a different subnet on its own network
3) a device on a different network.
A device can determine what class of address the device has been assigned from
its own IP address. The subnet mask then tells the device where the boundary is
between the subnet ID and the host ID. I know this sounds a little confusing, so
let’s take a look at it in detail in the next few pages.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 44
Implementing the BSR for Basic Data Services
Module 5, Page 45
Subnet Addressing
172.16.2.200 172.16.3.5
172.16.3.1
E1
172.16.2.2 E0 172.16.3.100
172.16.2.1
172.16.2.160 172.16.3.150
In this figure, notice that we are using the same network number on both sides of
the router. In reality, this won’t work as is, because, the router would believe that
network 172.16.0.0 was on both interfaces, and is not allowed. This is where
subnetting comes in. How could we differentiate the network on the left from the
network on the right so that the router could make a forwarding decision between
different networks?
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 45
Implementing the BSR for Basic Data Services
Module 5, Page 46
Subnet Addressing
172.16.2.200 172.16.3.5
172.16.3.1
E1
172.16.2.2 E0 172.16.3.100
172.16.2.1
172.16.2.160 172.16.3.150
By turning on more bits in the mask (extending the mask further than the default),
we then reserve some bits as network information and can use these bits to
describe subnetworks. By examining the routing table above, we can see that
the third octet was used for subnetting. Let’s take a closer look at how this was
done.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 46
Implementing the BSR for Basic Data Services
Module 5, Page 47
Subnet Mask
Network Host
IP
Address
172 16 0 0
Network Host
Default
Subnet
Mask
255 255 0 0
11111111 11111111 00000000 00000000
• Also written as “/16,” where 16 represents the number of 1s
in the mask
Network Subnet Host
8-Bit
Subnet 255 255 255 0
Mask
• Also written as “/24,” where 24 represents the number of
1s in the mask
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 47
Implementing the BSR for Basic Data Services
Module 5, Page 48
0 0 0 0 0 0 0 0 = 0
1 0 0 0 0 0 0 0 = 128
1 1 0 0 0 0 0 0 = 192
1 1 1 0 0 0 0 0 = 224
1 1 1 1 0 0 0 0 = 240
1 1 1 1 1 0 0 0 = 248
1 1 1 1 1 1 0 0 = 252
1 1 1 1 1 1 1 0 = 254
1 1 1 1 1 1 1 1 = 255
Here is a table which will help you in determining values for subnet masks, and
also will help you understand which networks/subnetworks you can use as a result
of subnetting.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 48
Implementing the BSR for Basic Data Services
Module 5, Page 49
Network Host
Network 172 16 0 0
Number
This figure illustrates how the “logical AND” function works. Although you could
use a calculator to do this, it is good to understand how networking devices
determine the network and host parts of an IP address. In this example, no
subnet mask is being used.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 49
Implementing the BSR for Basic Data Services
Module 5, Page 50
128
192
224
240
248
252
254
255
Network
Number 172 16 2 0
This example makes a Class B address space look like a collection of Class C
address spaces.
Now the logical AND allows us to extract the subnet number as well as the
assigned network number. Remember from earlier discussions, where there is a
mask of all 1s, the value above it falls through as the same value. Where the
mask is 0’s, the value falls through as zero.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 50
Implementing the BSR for Basic Data Services
Module 5, Page 51
128
192
224
240
248
252
254
255
128
192
224
240
248
252
254
255
Network
Number 172 16 2 128
In this figure, we have extended the mask even further to include 2 bits of the next
octet.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 51
Implementing the BSR for Basic Data Services
Module 5, Page 52
172.16.2.10 255.255.255.0
10.6.24.20 255.255.240.0
10.30.36.12 255.255.255.0
Based on the masks provided, complete the above exercise. Don’t turn the page
to check your answers until we review them! ;>)
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 52
Implementing the BSR for Basic Data Services
Module 5, Page 53
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 53
Implementing the BSR for Basic Data Services
Module 5, Page 54
Broadcast Addresses
172.16.3.0
172.16.4.0
172.16.1.0
172.16.3.255 172.16.2.0
(Directed Broadcast)
255.255.255.255
(Local Network Broadcast)
X
172.16.255.255
(All Subnets Broadcast)
This figure explains shows how Network layer broadcast work. There are
basically three forms of Networl layer broadcast addresses:
Directed broadcast – to another subnet
Local broadcast – this subnet only
All subnets broadcast – all subnets
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 54
Implementing the BSR for Basic Data Services
Module 5, Page 55
172 16 2 160
255.255.255.192 Mask
Subnet 4
Broadcast
First
Last
Lets take a look at how we can break this address down into hosts, broadcast
address, subnet, first and last host numbers:
Step 1 –Look at the 32 bit address
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 55
Implementing the BSR for Basic Data Services
Module 5, Page 56
172 16 2 160
Subnet
Broadcast
First
Last
Lets take a look at how we can break this address down into hosts, broadcast
address, subnet, first and last host numbers:
Step 2 – add the mask
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 56
Implementing the BSR for Basic Data Services
Module 5, Page 57
172 16 2 160
Subnet
Broadcast
First
Last 7
Lets take a look at how we can break this address down into hosts, broadcast
address, subnet, first and last host numbers:
Step 3 – Determine from the mask the number of host bits
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 57
Implementing the BSR for Basic Data Services
Module 5, Page 58
172 16 2 160
10000000 Subnet 4
Broadcast
First
Last
Lets take a look at how we can break this address down into hosts, broadcast
address, subnet, first and last host numbers:
Step 4 –Determine the subnetwork bits
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 58
Implementing the BSR for Basic Data Services
Module 5, Page 59
172 16 2 160
10000000 Subnet 4
10111111 Broadcast
5
First 6
Last
Lets take a look at how we can break this address down into hosts, broadcast
address, subnet, first and last host numbers:
Step 5 – By converting the host bits to all 1s, you have the subnet broadcast
address
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 59
Implementing the BSR for Basic Data Services
Module 5, Page 60
172 16 2 160
10000000 Subnet 4
10111111 Broadcast
5
10000001 First 6
Last
Lets take a look at how we can break this address down into hosts, broadcast
address, subnet, first and last host numbers:
Step 6 – the first host is determined by setting the least significant bit of the host
portion of the IP address
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 60
Implementing the BSR for Basic Data Services
Module 5, Page 61
172 16 2 160
10000000 Subnet 4
10111111 Broadcast
5
10000001 First 6
10111110 Last 7
Lets take a look at how we can break this address down into hosts, broadcast
address, subnet, first and last host numbers:
Step 7 – The last host is determined by setting all the host bits to one, minus the
last bit. What happens when the host bits are all 1s?
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 61
Implementing the BSR for Basic Data Services
Module 5, Page 62
172 16 2 160
Lets take a look at how we can break this address down into hosts, broadcast
address, subnet, first and last host numbers:
Step 8 –Again, do the math in binary, then determine the decimal equivilents. You
can use the handy chart from earlier in the module to help you out.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 62
Implementing the BSR for Basic Data Services
Module 5, Page 63
172 16 2 160
Lets take a look at how we can break this address down into hosts, broadcast
address, subnet, first and last host numbers:
Step 9 –Convert your binary answers to decimal, and you should come up with
the above answers!
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 63
Implementing the BSR for Basic Data Services
Module 5, Page 64
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 64
Implementing the BSR for Basic Data Services
Module 5, Page 65
Subnet Planning
20
20 Subnets
Subnets
55 Hosts
Hosts per
per Subnet
Subnet
Class C Address:
Class C Address:
192.168.5.0
192.168.5.0
192.168.5.16
Other
Subnets
192.168.5.32 192.168.5.48
This example takes a little more forethought. What mask would we use to
accomplish the task above?
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 65
Implementing the BSR for Basic Data Services
Module 5, Page 66
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 66
Implementing the BSR for Basic Data Services
Module 5, Page 67
201.222.10.60 255.255.255.248
15.16.193.6 255.255.248.0
128.16.32.13 255.255.255.252
153.50.6.27 255.255.255.128
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 67
Implementing the BSR for Basic Data Services
Module 5, Page 68
These are the answers. If you are still having difficulty, review the previous
examples, and if you are still confused, speak with the instructor.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 68
Module 6, Page 0
Module 6
Initial Configuration
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page
Copyright ©2002 0
Motorola
Implementing the BSR for Basic Data Services
Module 6, Page 1
Introduction
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 1
Implementing the BSR for Basic Data Services
Module 6, Page 2
Objectives
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 2
Implementing the BSR for Basic Data Services
Module 6, Page 3
Topic Order
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 3
Implementing the BSR for Basic Data Services
Module 6, Page 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 4
Implementing the BSR for Basic Data Services
Module 6, Page 5
Overview
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 5
Implementing the BSR for Basic Data Services
Module 6, Page 6
Overview (cont.)
The BSR 64000 from Motorola provides broadband carriers with a competitive
edge in defining, deploying, and managing broadband services. This carrier-class
switching and service provisioning solution allows cable operators to rapidly
introduce differentiated data, voice, and multimedia services for both corporate
and residential subscribers.
The BSR 64000 is fully based on Data Over Cable Service Interface Specification
(DOCSIS) 1.0, DOCSIS 1.1, and PacketCable 1.0 standards. It is a highly
integrated, carrier-class, multiservice IP switch/router with an integrated Cable
Modem Termination System (CMTS) that offers the highest density and lowest
price-per-port in the industry for Hybrid Fiber Coax (HFC) connectivity. The BSR
64000 can support up to 26 downstream transmitters and up to 104 upstream
receivers in a single, space-saving chassis.
The system includes flexible interfaces for SONET and Ethernet connectivity, and
it eliminates the need for discrete CMTS equipment, up converters, aggregation
switches, and routers – allowing for it’s use in aggregating of traffic from regional
hubs to a headend.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 6
Implementing the BSR for Basic Data Services
Module 6, Page 7
Overview (cont.)
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 7
Implementing the BSR for Basic Data Services
Module 6, Page 8
Console Connection
Over the course of this class, we will use a (crossed-over) db-9 adapter attached
to a (straight-through) cat-5 cable running from your p.c. to the console port of the
BSR1000/64000. We will be using HyperTerminal as the terminal emulation
program.
We will look at telnet access to the BSR1000/64000 as well as the use of an
SNMP application to access configuration and performance information about the
box.
The advantage to the local console access is that it is out-of-band. With SNMP
(or any remote management interface), there is some overhead associated
(network traffic).
In order to use HyperTerminal, ensure that your settings for console access are as
follows:
Bits per second- 9600
Data bits- 8
Parity- N
Stop bits- 1
Control Flow- none
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 8
Implementing the BSR for Basic Data Services
Module 6, Page 9
RDN> ?
cable
clear
cmts
…
To enter commands in this user interface, you can either type or paste them within
the console command modes.
Each mode (level) has a distinct prompt for commands.
There is a hierarchy of commands in the command-mode structure. This
hierarchy is dependant on the EXEC access levels. There are two different
access levels. We will start by looking at the User EXEC mode.
User EXEC allows for access to all but configuration commands. The ENTER key
tells the BSR1000/64000 to read and execute any commands entered.
When a User EXEC session is started, the BSR64000 will display hostname> as
it’s prompt. The greater than symbol (>) indicates that you are in User EXEC
mode.
The list of commands available can be accessed by entering a question mark (?).
This is what is called context sensitive help.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 9
Implementing the BSR for Basic Data Services
Module 6, Page 10
RDN> en
RDN# ?
copy
debug
delete
…
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 10
Implementing the BSR for Basic Data Services
Module 6, Page 11
User-Based Access
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 11
Implementing the BSR for Basic Data Services
Module 6, Page 12
Ô logout
¾ owner command to logout other users
As a user with owner rights, you are able to logout other users as follows:
BSR64000#logout session-id 2
This would be the first step to take upon discovering unauthorized access to the
BSR.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 12
Implementing the BSR for Basic Data Services
Module 6, Page 13
RDN> en
RDN# config
RDN(config)#
…
Global Configuration commands apply to features that affect the entire system.
These commands apply to system features and enable routing functions.
To enter Global Configuration mode, enter the configure command from Privileged
EXEC mode. The prompt changes to hostname(config)#. To return to Privileged
EXEC mode, enter the end or exit command or press Ctrl-Z.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 13
Implementing the BSR for Basic Data Services
Module 6, Page 14
RDN> en
RDN# config
RDN(config)# interface pos 5/0
RDN(config-if)#
…
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 14
Implementing the BSR for Basic Data Services
Module 6, Page 15
EXEC Hierarchy
User EXEC
hostname> enable
Privileged EXEC
logout | exit | ^z
hostname# config
The exit command will bring you up one level. Control-z (^z) will bring you up to
Privileged EXEC from any lower configuration level. The disable command will
bring you from the Enable EXEC to User EXEC. The logout command will bring
you up one level.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 15
Implementing the BSR for Basic Data Services
Module 6, Page 16
RDN> ?
cable Cable commands
clear Reset functions
RDN> en?
enable
RDN>en_
RDN>no ?
cable Cable commands
debug Turn on debug information
Two types of context-sensitive help are available from the command line interface.
Entering ? Will return a list of commands available. Also, entering a character
sequence followed by the question mark (e.g., en?) will provide a list of
commands that begin with those characters.
Entering the question mark after a command (with a space in between) will
provide a command syntax. Specifically, when entered in place of an argument,
the BSR64000 will provide a list of available command options (with <cr>
specifying no options, or carriage return). The <tab> key can be used to complete
long commands provided enough characters are keyed in for it to be recognized.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 16
Implementing the BSR for Basic Data Services
Module 6, Page 17
<ctrl> + p
<ctrl> + b <ctrl> + f
<ctrl> + n
<control-p> will recall commands from the history buffer and <control-n> allows
you to cycle forward through previously entered commands. <control-f> moves
one character forward; <control-b> moves one character backwards. Other
combinations include:
<control-a> - beginning of line
<control-e> - end of line
<control-z> - exit to Privileged EXEC from any Config EXEC
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 17
Implementing the BSR for Basic Data Services
Module 6, Page 18
Output Modifiers
You may use output modifiers to filter the length of the output from most show
commands. Currently, you may only provide a single output modifier per show
command.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 18
Implementing the BSR for Basic Data Services
Module 6, Page 19
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 19
Implementing the BSR for Basic Data Services
Module 6, Page 20
Running-Configuration
The nvram file system contains the operating system and the startup configuration
for the BSR64000.
Care must be taken while making configuration changes to the BSR64000 during
its operational state. Changes in the operational parameters are immediate and
may cause the modems connected to the BSR64000 to re-synchronize to the
downstream or restart the registration process (which can be quite noisy and
cause problems).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 20
Implementing the BSR for Basic Data Services
Module 6, Page 21
Running-Configuration (cont.)
Upon initial boot of the BSR64000, the running-configuration will be more or less
empty of operational parameters (other than some defaults). It will be
configurable via the console port.
Once TCP/IP and security have been configured on the BSR64000, it can be
configured remotely either through a telnet session, SNMP application or via a
plain text file available on a TFTP server.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 21
Implementing the BSR for Basic Data Services
Module 6, Page 22
Running-Configuration (cont.)
RDN# sh run
!
! Last configuration change at THU MAY 25 07:19:03 2000
!
hostname RDN
!
!
no service password-encryption
!
…
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 22
Implementing the BSR for Basic Data Services
Module 6, Page 23
Initial Configuration
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 23
Implementing the BSR for Basic Data Services
Module 6, Page 24
RDN> en
RDN# config
RDN(config)# hostname newhostname
newhostname(config)#
The hostname command can be used at any time to alter the BSR’s name.
Because you may have to access more than one BSR on the system remotely, it
is important to ensure that it’s hostname unique across your network. The prompt
will provide remote-access users an easy way to determine which device they are
accessing.
After you complete this command, the CLI prompt changes to the new hostname.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 24
Implementing the BSR for Basic Data Services
Module 6, Page 25
newhostname> en
newhostname # config
newhostname(config)# int ethernet 5/0
newhostname(config-if)# ip address 192.168.100.69 255.255.255.0
newhostname(config-if)# exit
newhostname(config)#
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 25
Implementing the BSR for Basic Data Services
Module 6, Page 26
Ô Configure security
Set Privileged EXEC password
» enable password <password>
• By default unencrypted
• Can be read as plain text in configuration files
newhostname> en
newhostname# enable password newpassword
newhostname#
There is, by default, no password protecting access to the privileged EXEC mode.
It is important to assign one to restrict configuration access to the BSR64000. It is
important to remember that the password is unencrypted in the running and start-
up configurations. Anyone with access to online or offline versions of those files
could check for the password.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 26
Implementing the BSR for Basic Data Services
Module 6, Page 27
Ô Configure security
Set remote access password
» [no] password <password>
• By default unencrypted
• Can be read as plain text in configuration files
• Must be configured in order for remote (non-console) access
– Enable password must also be set
• Starts telnetd (telnet daemon)
Stopped when password removed
Adding or removing the telnet password has no effect on existing
connections
newhostname> en
newhostname# password newpassword
newhostname#
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 27
Implementing the BSR for Basic Data Services
Module 6, Page 28
Remote Access
BSR64000(config)# access-class 10 in
BSR64000(config)# ^z
BSR64000#show running-config | include access-list
access-list 10 permit 10.10.10.0 0.0.0.255
access-list 10 deny any
BSR64000#
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 28
Implementing the BSR for Basic Data Services
Module 6, Page 29
Ô Configure security
Enabling automatic password encryption
» service-password encryption
• Disabled by default
• Encrypts all existing passwords
• Automatically encrypts all new passwords
newhostname> en
newhostname# service-password encryption
newhostname#
This adds a level of security. Even someone with physical access to the
BSR64000’s configuration files would not be able to ascertain it’s passwords.
Removing service-password encryption will leave previously encrypted passwords
as they are. To have unencrypted passwords in your configuration, you would
have to remove the encrypted password with the no password <password>
command.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 29
Implementing the BSR for Basic Data Services
Module 6, Page 30
newhostname> en
newhostname # config
newhostname(config)# int loopback 1
newhostname(config-if)# ip address 200.24.3.1 255.255.255.0
newhostname(config-if)# exit
newhostname(config)#
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 30
Implementing the BSR for Basic Data Services
Module 6, Page 31
newhostname> en
newhostname # config
newhostname(config)# snmp-server view classroom 1.3.6 included
newhostname(config)# exit
newhostname#
Creating a view allows for restriction of the mibs available to an NMS (user). This
is done by associating community strings with view names, as we will see in the
next slide.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 31
Implementing the BSR for Basic Data Services
Module 6, Page 32
newhostname> en
newhostname # config
newhostname(config)# snmp-server community river ro view classroom
newhostname(config)# snmp-server community delta rw view classroom
newhostname(config)# exit
newhostname#
Read-only community strings allow for access to mib data from an NMS with the
restrictions imposed by the associated view. Read-write community strings allow
for configuration changes via an SNMP-based application. Multiple views and
community strings may be configured and associated allowing a division of
configuration and informational access.
Remember that community strings are case sensitive.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 32
Implementing the BSR for Basic Data Services
Module 6, Page 33
newhostname> en
newhostname # config
newhostname(config)# snmp-server enable traps
newhostname(config)# snmp-server host 192.168.4.9
newhostname(config)# exit
newhostname#
Traps are defined in the BSR’s SNMP agent to be sent based on pre-defined
events, such as interface going down or reboots. An SNMP-based application
must be configured to receive and process these trapped events. Instructions for
this sort of configuration should be available in your NMS vendor’s documentation
as it varies from vendor to vendor.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 33
Implementing the BSR for Basic Data Services
Module 6, Page 34
newhostname> en
newhostname# copy run start
newhostname#
To save any modifications made in the configuration mode the copy command
must be used. Any modifications made through the CLI are immediately active on
the system, because they are written to the running-config. In order to ensure
that those changes are permanent (will survive through next boot), you must copy
the running-config to the startup-config. The shortened version of this command it
copy run start.
Once again, anytime you copy running-config to startup-config, it is considered
best practice to copy a version of the latest configuration into a text file for
archiving.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 34
Implementing the BSR for Basic Data Services
Module 6, Page 35
Troubleshooting
Ô Version information
show version
» Can be shortened to sh ver
RDN> sh ver
…
Once again, the command could be reduced to the shortest recognizable version,
or sh v. This command displays the configuration of the system hardware, etc.
We will return to this command when we address troubleshooting, as it will
provide much of the information that Motorola Networks Global Technical Support
will look for when you call. Version information can provide clues to known bugs.
It is considered a best practice to keep a copy of the output from this command for
troubleshooting purposes.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 35
Implementing the BSR for Basic Data Services
Module 6, Page 36
Troubleshooting (cont.)
This command will show configuration information (i.e., MAC address, i.p.
address, interface speed, etc.), as well as functional status (i.e., packet
information, line status, etc.). We will go into greater detail about this command
when we explore troubleshooting interfaces.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 36
Implementing the BSR for Basic Data Services
Module 6, Page 37
Troubleshooting (cont.)
RDN# sh tech
…
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 37
Module 7, Page 0
Module 7
CMTS Configuration
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 0
Implementing the BSR for Basic Data Services
Module 7, Page 1
Introduction
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 1
Implementing the BSR for Basic Data Services
Module 7, Page 2
Objectives
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 2
Implementing the BSR for Basic Data Services
Module 7, Page 3
Topic Order
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 3
Implementing the BSR for Basic Data Services
Module 7, Page 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 4
Implementing the BSR for Basic Data Services
Module 7, Page 5
One-Way Services
Phone
Internet Network
Customer Home
Analog
and/or
Digital
A/V
Broadcast
(i.e. TV) Cable
Plant
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 5
Implementing the BSR for Basic Data Services
Module 7, Page 6
Proprietary Systems
Phone
Internet Network
Customer Home
Analog
and/or
Digital
A/V
Broadcast Proprietary
(i.e. TV) Cable Cable Modem
Proprietary Plant
Cable Modem
Head End Combiner
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 6
Implementing the BSR for Basic Data Services
Module 7, Page 7
DOCSIS-Compliant Systems
Provisioning Phone
Internet Services Network
Customer Premises
Gateways
Servers Analog
and/or
Digital
A/V
Broadcast DOCSIS-Compliant
(i.e. TV) HFC Cable Modem
Plant
Combiner
Cable Company
The first two Cable Modem models built to the first round of DOCSIS
specifications (DOCSIS 1.0) became CableLabs Certified in March of 1999. The
first CMTS (DOCSIS-compliant Cable Modem Termination System) became
CableLabs Qualified soon thereafter.
The cable operator is now positioned to provide standardized cable modem
internet access nationwide, using CableLabs Certified DOCSIS CMs and
CableLabs Certified DOCSIS CMTSs.
In a CableLabs DOCSIS compliant cable modem system, any vendors’ CMTS
should be interoperable with any vendors’ CMs.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 7
Implementing the BSR for Basic Data Services
Module 7, Page 8
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 8
Implementing the BSR for Basic Data Services
Module 7, Page 9
BSR Overview
Cable
Wide-Area Modem
Network Termination
System Cable
CMTS
(CMTS) Network Cable Modem CM Customer Premises
Network Side
Interface HFC (CM) Equipment Interface
Customer
Premises
Equipment
Transparent IP Traffic Through the System
The BSR64000 and BSR1000 were developed in accordance with the DOCSIS
specifications that define CMTS data interfaces, r/f interfaces and operations
support systems interfaces (OSSI).
The intended service will allow transparent bi-directional transfer of Internet
Protocol (IP) traffic, between the cable system headend and customer locations,
over a hybrid fiber/coax (HFC) cable television system. The transmission path
over the cable system is realized at the headend by a CMTS, and at each
customer location by a cable modem. At the headend (or hub), the interface to
the data-over-cable system is called the Cable Modem Termination System -
Network-Side Interface (CMTS-NSI) and is specified in [MCNS3]. At the customer
locations, the interface is called the cable-modem-to-customer-premise-
equipment interface (CMCI) and is specified in [MCNS4]. The intent is for the
MCNS operators to transparently transfer IP traffic between these interfaces,
including but not limited to datagrams, DHCP, ICMP, and IP Group addressing
(broadcast and multicast).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 9
Implementing the BSR for Basic Data Services
Module 7, Page 10
Internet
IP Internet
IP Internet
Service Provider
Backbone Service Provider
Service Provider
Backbone DOCSIS HFC Networks
DOCSIS
HFC Networks
Edge Router Aggregation
(GSR12000) Switch Integrated Router/CMTS
(C5000)
CMTS’s
(UBR7246)
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 10
Implementing the BSR for Basic Data Services
Module 7, Page 11
Initial Configuration
Basic configuration tasks in include configuring your helper addresses and setting
up your up and downstream parameters, including your modulation-type,
interleave depth and channel-width, all of which will affect your throughput.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 11
Implementing the BSR for Basic Data Services
Module 7, Page 12
Introduction to DOCSIS
Standards effort in IEEE 802.14 were stalled and Major MSOs wanted to lower
their costs through retail cable modems and interoperability of multiple vendors’
equipment. DOCSIS 1.0 is effectively complete. Product is available and being
installed in hundreds of CATV systems. DOCSIS 1.1 cable modems are available
and CMTS are currently being tested. This will add technology that makes
possible Quality of Service (QoS) guarantees needed for newer services like
DOCSIS-based telephony over cable. Another CableLabs effort -- PacketCable --
is merging its efforts with DOCSIS to realize this.
DOCSIS is really a family of documents. These are available from the public area
of the CableLabs cable modem website at
http://www.cablemodem.com/specifications.html. DOCSIS defines a
Reference Architecture for an overall data communication system optimized to
connect consumer PCs to the internet using the DOCSIS-compliant Cable
Modems and DOCSIS-compliant Cable Modem Termination Systems. These
specifications really started as just RFI and grew into family of specifications that
have been accepted by the MCNS and IEEE.
In Summary, DOCSIS Defines:
•Interfaces
•Data (CMCI, CMTS-NSI)
•Radio frequency (RFI)
•Telephony return (CMTRI)
•Security (BPI, BPI+)
•Management & Business Support (OSSI)
•System Operation
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 12
Implementing the BSR for Basic Data Services
Module 7, Page 13
Reference Architecture
COMBINER
Modem
Termination CMTS Cable Modem
System Termination FIBER
Network Side CABLE DS = >54 MHz
MOD System
TERMINATION PLANT
NETWORK
Interface Downstream
(CMTS-NSI) RF Interface F.O.
LAN
NODE
SPLITTER
Internet Backbone
to RF Interface CM CPE
ORx
OSS COAX
Interface Baseline Privacy CABLE
Network
Cable
(OSSI) Interface (BPI) Modem PLANT
OPERATIONS SECURITY & Termination
SUPPORT ACCESS US signals System
US = <42 MHz
SERVER CONTROLLER Upstream
RF Interface
Cable Modem to
REMOTE SERVER FACILITY CPE Interface
(CMCI)
The CPE - Customer Premise Equipment is (today) primarily the consumer’s PC.
CPE connects to the Cable Modem via an Ethernet or USB port. The Cable
Modem connects to the 2-way cable plant coax via a standard CATV drop and
jack.
A two-way coax cable transports data to/from the HFC optical node that feeds the
home, using traditional 2-way coax cable technology. This technology transports
signals higher than 54 MHz in the downstream direction, and signals lower than
42 MHz in the upstream direction, by RFI specification.
Optical fibers transport data between optical node and the CMTS in the cable
headend. Different fiber is used to transport data downstream than to transport
data upstream, hence the use of optical splitters and combiners. At the headend,
the CMTS downstream output is combined with other downstream cable signals
(such as analog and digital video services), while the CMTS upstream input is
picked from the upstream cable spectrum.
On the CMTS network side interface, a LAN in the headend connects the CMTS
to the Internet and a number of support servers required by DOCSIS specification
(i.e., DHCP,ToD and TFPT), plus (typically) data caching servers and provisioning
systems. The support servers are often physically located at another Regional
Data Center, that may be tens or hundreds of miles from the headend. Caching
servers are co-located with the CMTS at the cable headend.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 13
Implementing the BSR for Basic Data Services
Module 7, Page 14
DOCSIS Yesterday
Ô DOCSIS 1.0
¾ Product Interoperability across available CMTS’s
¾ 64 and 256 QAM modulation (downstream) formats
¾ 6-MHz occupied spectrum coexists with all other signals on the cable plant
¾ Variable-depth interleaver supports both latency-sensitive and -insensitive data.
¾ The features in the upstream direction are as follows:
» Flexible and programmable CM under control of the CMTS
» Frequency agility
» Time division multiple access
» QPSK and 16 QAM modulation formats
» Support of both fixed-frame and variable-length PDU formats
» Multiple symbol rates
» Programmable Reed-Solomon block coding
» Programmable preambles
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 14
Implementing the BSR for Basic Data Services
Module 7, Page 15
DOCSIS Today
Ô DOCSIS 1.1
¾ Packet Classification, based on fields in the Ethernet, IP, and UDP/TCP headers,
into a Service Flow
¾ Service Flow association with a DOCSIS Service Identifier
¾ QoS MIBs
¾ Fragmentation
» Enhanced MAC scheduling / Unsolicited grants
» Real-time polling / Non-real time polling
¾ Payload Header Suppression (for increased bandwidth efficiency, particularly in
the case of relatively small Voice-over-IP [VoIP] packets)
¾ Priority Queuing (e.g. Weighted Fair Queuing) at the CMTS
¾ BPI+ (Base Line Privacy - Plus)
» Adds digital-certificate based CM authentication to the key management
protocol
¾ IGMP (Internet Group Management Protocol) Management
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 15
Implementing the BSR for Basic Data Services
Module 7, Page 16
DOCSIS Tomorrow
Ô DOCSIS 2.0
¾ RFI Issued (step before closed)
¾ Increased upstream channel capacity
» Symmetrical services
¾ Better noise immunity (increased robustness)
¾ Backward compatibility with DOCSIS 1.0 and 1.1
» Coexistence in the same u/s and d/s with deployed modems
Ô Potentially more robust
¾ Greater bandwidth usage
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 16
Implementing the BSR for Basic Data Services
Module 7, Page 17
DOCSIS Summary
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 17
Implementing the BSR for Basic Data Services
Module 7, Page 18
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 18
Implementing the BSR for Basic Data Services
Module 7, Page 19
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 19
Implementing the BSR for Basic Data Services
Module 7, Page 20
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 20
Implementing the BSR for Basic Data Services
Module 7, Page 21
The upstream utilizes TDMA (time division multiple access) which means all of
the opportunities for a cable modem to transmit are allocated by time.
A MAP (Media Access Protocol) is sent every 4 mille seconds providing
information for the modems.
Cable modems are directed to use mini slots for upstream transmissions, these
mini slots sent from the CMTS.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 21
Implementing the BSR for Basic Data Services
Module 7, Page 22
DOCSIS-OSI Mapping
OSI Stack Data-Over-Cable Interface Specifications
IP
Network IP IP
Data forwarding through the CMTS may be transparent bridging or may use
network layer forwarding (routing, IP switching). Data forwarding through the
cable modem is link layer transparent bridging. Forwarding of IP traffic must be
supported. DOCSIS was designed against as a CSMA shared medium with the
RFI defining layers one and two only. Layer three is handled by standard IP
technologies by definition.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 22
Implementing the BSR for Basic Data Services
Module 7, Page 23
DOCSIS/PacketCable TM
Architectures
Application Services
IP-Based Voice/Video Interactive
Telephony
Service TV
Conferencing
PACKETCABLE
PacketCable Protocols
Internet Protocol
DOCSIS
Media Access Control
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 23
Implementing the BSR for Basic Data Services
Module 7, Page 24
Downstream
• Up to 38 Mbps
+50 to +61 dBmV
• 88 - 860 MHz
• 6 MHz BW
COMBINER
CMTS
• 64 or 256 QAM OTx DS
• TDM, ADM
F.O.
• MPEG-2 format NODE
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 24
Implementing the BSR for Basic Data Services
Module 7, Page 25
Downstream (cont.)
The downstream can use either 64 or 256 QAM modulation which will produce a
rate of 27 to 38 Mbps providing the CNR is between 23.5 to 30 dB.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 25
Implementing the BSR for Basic Data Services
Module 7, Page 26
Ô64 QAM
¾ 6 bits per symbol
» 6 bits * 5.056941Msym/sec = 30.3416 Mb/s rate
• -10% with FEC on
» BER 10-8@ 23.5C/N
Ô256 QAM
¾ 8 bits per symbol
» 8 bits * 5.36Msym/sec = 43Mb/s rate
• -10% with FEC on
» BER10-8 @ 30dB C/N
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 26
Implementing the BSR for Basic Data Services
Module 7, Page 27
ÔReed Solomon
ÔEnables receiver to detect and fix errors
¾ Reduces need for retransmits
» Retransmits add to latency
• Round trip of NACK and retransmit of bit stream
ÔSegmenting of data stream into fixed-size blocks
¾ Addition of redundant bits
» Called Hamming codes
» Calculation done at receiver to detect errored bits
• Fixed when possible
» Works well when bits spread
• If too many errors close together, becomes difficult to detect errored bits
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 27
Implementing the BSR for Basic Data Services
Module 7, Page 28
Interleaving
ÔInterleaving
ÔReordering of bits
¾ Errors due to impulse noise spread over time
Burst Error
Transmission
1 2 3 4 5 6 7 8 9
Order
Interleave
1 2 3 4 5 6 7 8 9
Buffer
Apply FEC to
reorder stream 1 7 5 3 6 2 9 8 4
In the interleaving process, the bits are placed in an interleave buffer and
reordered. A burst error that would normally affect a group of adjacent bits will
now be affecting an out-of-order group. The erred bits are effectively spread out.
Forward error correction is applied in the interleave buffer.
By concatenating interleaving with Hamming code error correction, erred bits can
be reduced by factors of up to 104.
The cost here is in latency. The entire bit stream will experience a delay as the
bits are put in and taken out of the interleave buffer. This is called serialization
delay. Also, Reed Solomon calculations must be performed. The amount of
latency increases with the interleave depth, as does the robustness of the data
stream.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 28
Implementing the BSR for Basic Data Services
Module 7, Page 29
Configuring Downstream
Parameters
RDN> en
RDN# config
RDN(config)# int cable 5/0
RDN(config-if)# cable downstream 0 interleave-depth 16
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 29
Implementing the BSR for Basic Data Services
Module 7, Page 30
Configuring Downstream
Parameters (cont.)
RDN> en
RDN# config
RDN(config)# int cable 5/0
RDN(config-if)# cable downstream 0 modulation 64
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 30
Implementing the BSR for Basic Data Services
Module 7, Page 31
Configuring Downstream
Parameters (cont.)
RDN> en
RDN# config
RDN(config)# int cable 5/0
RDN(config-if)# no cable downstream 0 shut
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 31
Implementing the BSR for Basic Data Services
Module 7, Page 32
Upstream
Up To 10 Mbps FIBER
CABLE
5 - 42 MHz PLANT
CMTS
0.2 - 3.2 MHz BW US
QPSK or 16 QAM
FDM/TDM/ADM F.O.
NODE
CM
SPLITTER
CPE
ORx COAX
CABLE
PLANT
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 32
Implementing the BSR for Basic Data Services
Module 7, Page 33
The downstream signal contains the following information for the modems:
•Upstream channel descriptors
•Mapping of mini-slots
•Request region (contention)
•Transmit opportunity (reserved)
•Maintenance area (contention and reserved)
•Synchronization
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 33
Implementing the BSR for Basic Data Services
Module 7, Page 34
ÔUCDs
¾ Describe general upstream channel characteristics:
» Center frequency
» Channel width
¾ Describes each burst type:
» Initial maintenance
» Request
» Request/data
» Periodic maintenance
» Short data
» Long data
The UCD contains data that describes the characteristics of a particular upstream
channel. Within a UCD, the mini-slot size, upstream channel id, and downstream
channel id is specified. Also there are physical layer characteristics describing
each type of burst transmission ie; symbol rate, frequency, preamble length, and
burst descriptor. Burst descriptors further describe each information element
which include the amount of FEC that will be used, maximum burst size, and
guard time size.
The upstream bandwidth allocation map (MAP) contains information for the cable
modem to know where and when to transmit. MAP’s contain information elements
that are described by interval usage codes (IUC). There are six basic IUC’s.
They are Request, REQ/Data, Initial Maintenance, Station Maintenance, Short
Data Grant, and Long Data Grant. In essence there are six basic types of bursts
the cable modem will transmit to the CMTS. Each IUC as a burst descriptor
explaining it. The burst descriptor is located in the UCD.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 34
Implementing the BSR for Basic Data Services
Module 7, Page 35
Maps
Time
Maps describe the upstream timeline into the future and can be adjusted for plant
delay. Map elements specify:
•Burst type
•Request
•Maintenance
•Transmit data
•Which modem
•By SID
•Where on the time line
The upstream channel is modeled as a string of many slots. The CMTS must
generate the time and reference for identifying the slots. It must also control
access to the slots by the cable modems. For example, it may grant some
number of contiguous slots to a CM for it to transmit a data PDU.
The upstream bandwidth allocation map (MAP) notifies all modems the timing
nature of the upstream transmission opportunities of the near future. It is a MAC
management message that contains information elements. Each information
element defines the allowed usage for a range of mini slots. Maps also contain
acknowledgments for data transmitted during contention intervals.
Maps vary in length. Under light load, maps are small to allow for the best
possible access latency. Under heavy load, maps get longer as transmission
grants consume a larger portion of the upstream bandwidth. The minimum map
size is determined by (a) the minimum number of contention slots that are usefully
considered at one time, and (b) transmission overhead on the downstream
channel. The maximum map size is determined mainly by how far into the future
the modems will want to track their transmission opportunities (limited in the
DOCSIS specs to 4096 mini-slots).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 35
Implementing the BSR for Basic Data Services
Module 7, Page 36
Data Transfer
ÔUpstream
¾ Contention Data:
» Wait for Req/Data in Map, then transmit.
¾ On Request:
» Transmit a request, wait for grant
¾ Scheduled:
» Wait for a grant
Since additional services such as digital video may be provided on the same
physical layer as the Data-Over-Cable, a DOCSIS modem implements a
downstream transmission convergence sublayer between the physical layer and
the MAC sublayer. This defines the downstream bitstream as a continuous series
of 188-byte MPEG which is a 4-byte MPEG header followed by 184-bytes of
payload. The MPEG transmission convergence sublayer filters all MPEG frames
except those containing MAC payloads. It further strips the MPEG header and
any MPEG stuffing bytes prior to presenting the assembled MAC frame to the
MAC sublayer.
The modem’s MAC sublayer monitors the downstream channel for data to be
forwarded. If configured to do so, it will accept the MAC frames; otherwise, it
discards the frame. A filter/forward/process decision is made and the frame is
either discarded, forwarded to the Ethernet and/or processed by the modem itself.
It monitors its reception rate to keep it within the maximum downstream data rate
for the class of service. Broadcast packets are not included in the reception rate.
While monitoring the downstream channel for data and MAC Management
frames, the modem records indications of the quality of the signal it receives for
management reporting.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 36
Implementing the BSR for Basic Data Services
Module 7, Page 37
Downstream
29-8 20-4 14-8 11-8
Upstream
Å Higher Lower Æ
Due to attenuation
In a properly adjusted and maintained cable plant, the settled upstream level from
different CMs along a cable plant distribution line will naturally vary. This is a
result of several factors:
•CM/CMTS level adjustment - During the Cable Modem boot process, the CMTS
and a Cable Modem talk with one another to get the upstream transmit power
level adjusted so that upstream bursts arrive at the CMTS receiver at the CMTS
target level. Once a CM has completed this ranging process, its actual upstream
transmit level has settled at somewhere between 8 and 58 dBmV (by DOCSIS
RFI specification).
•Upstream plant balancing - Cable system upstream amplifiers are typically
adjusted to provide unity gain input-to-input in the return direction. Attenuation is
very low at DOCSIS upstream frequencies compared with the cable plant’s
downstream design frequency.
Downstream plant balancing - Cable plants are designed with high tap values
near a DS amplifier output (upstream amplifier inputs) and lower tap values further
downstream before the next amplifier. This is done to keep the downstream
output levels at all tap ports about the same.
The settled upstream transmit levels of Cable Modems installed along an average
coax cable distribution line will normally be on the higher end of the 8 - 58 dBmV
allowed range for Cable Modems close to a upstream amplifier input and on the
lower end of the range for Cable Modems close to a upstream amplifier output.
The 50 dB US transmit level range DOCSIS Cable Modems can provide is quite
large. It is good engineering practice to try to reserve 5 - 10 dB of the top and
bottom of this range as an operating margin.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 37
Implementing the BSR for Basic Data Services
Module 7, Page 38
RDN> en
RDN# config
RDN(config)# int cable 5/0
RDN(config-if)# cable upstream 0 channel-width 1600000
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 38
Implementing the BSR for Basic Data Services
Module 7, Page 39
RDN> en
RDN# config
RDN(config)# int cable 5/0
RDN(config-if)# cable upstream 0 frequency 32000000
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 39
Implementing the BSR for Basic Data Services
Module 7, Page 40
RDN> en
RDN# config
RDN(config)# int cable 5/0
RDN(config-if)# cable upstream 0 power-level 0
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 40
Implementing the BSR for Basic Data Services
Module 7, Page 41
RDN> en
RDN# config
RDN(config)# int cable 5/0
RDN(config-if)# cable upstream 0 modulation-profile 2
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 41
Implementing the BSR for Basic Data Services
Module 7, Page 42
RDN> en
RDN# config
RDN(config)# int cable 5/0
RDN(config-if)# no cable upstream 0 shut
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 42
Implementing the BSR for Basic Data Services
Module 7, Page 43
ÔChannel Parameters
¾ Single Center Frequency
» Expressed in MHz
¾ Single Carrier with multiple widths - width dependant on baud rate
¾ Preamble length
Symbol Rate as Channel Width in QPSK Speed in bits per 16QAM speed in bits
symbols per second Kilohertz to Megahertz second* per second**
160.000 sym/sec 200 KHz 320,000 bps 640,000 bps
320,000 sym/sec 400 KHz 640,000 bps 1,280,000 bps
640,000 sym/sec 800 KHz 1,280,000 bps 2,560,000 bps
1,280,000 sym/sec 1.6 MHz 2,560,000 bps 5,120,000 bps
2,560,000 sym/sec 3.2 MHz 5,120,000 bps 10,240,000 bps
The upstream modulator provides QPSK at 160, 320, 640, 1,280, and 2,560
ksym/sec, and 16QAM at 160, 320, 640, 1,280, and 2,560 ksym/sec. This variety
of modulation rates, and flexibility in setting upstream carrier frequencies, permits
operators to position carriers in gaps in the pattern of narrowband ingress, as
discussed later in the course
The upstream symbol rate MUST be fixed for each upstream frequency.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 43
Implementing the BSR for Basic Data Services
Module 7, Page 44
Performance
ÔClean Environment
¾ Short preamble (less latency)
¾ Less FEC
¾ Higher Symbol rates
¾ 16 QAM
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 44
Module 8, Page 0
Module 8
CM/CMTS Communication
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 0
Implementing the BSR for Basic Data Services
Module 8, Page 1
Introduction
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 1
Implementing the BSR for Basic Data Services
Module 8, Page 2
Objectives
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 2
Implementing the BSR for Basic Data Services
Module 8, Page 3
Topic Order
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 3
Implementing the BSR for Basic Data Services
Module 8, Page 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 4
Implementing the BSR for Basic Data Services
Module 8, Page 5
Initial Configuration
Remember that any modifications made through the CLI are immediately active
on the system, because they are written to the running-config. In order to
ensure that those changes are permanent (will survive through next boot), you
must copy the running-config to the startup-config. The shortened version of this
command it copy run start.
It is also necessary to configure operational support services outside of the
CMTS, including DHCP, ToD and TFPT servers. The last step is to ensure that
all cable modems have successfully ranged and registered.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 5
Implementing the BSR for Basic Data Services
Module 8, Page 6
CMTS/CM Interaction
Tuning
ÔScan for downstream channel and sync with the
CMTS
Ranging ÔObtain the transmit parameters (from UCD
message)
ÔPerform ranging
Connection ÔEstablish IP connectivity
ÔEstablish time of day
Configuration ÔTransfer operational parameters
ÔPerform registration
Registration
Maintenance
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 6
Implementing the BSR for Basic Data Services
Module 8, Page 7
RDN> en
RDN# sh cable modem
cm->mac: 0030.ebff.033
Interface Upstream Prim Connect Timing Rec Ip Address Mac Address
IfIndex Sid State Offset Power
Cable 0/0 4 1 online(pk) 1239 109 10.200.220.2 0030.ebff.f03
cm->mac: 0050.f112.2563
Cable 0/0 4 2 online(pt) 1228 116 10.200.220.3 0050.f112.2563
Total cable modems reg: 2
Total cable modems other state: 0
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 7
Implementing the BSR for Basic Data Services
Module 8, Page 8
Tuning
Ranging
Connection
CM Listens
Configuration for CMTS
downstream
transmission
Registration
ÔCM searches for a downstream data channel
ÔSynchronize with QAM
Maintenance
ÔSynchronize with FEC and MPEG
Cable modems search the downstream in 6 MHz intervals for both Standard and
HRC channel plans. The spectrum scanned is from 90 -860 MHz. The modem
stores the downstream frequency of a DOCSIS signal in flash if it completes
registration. Modems can take upwards of 1/3 second for each downstream.
Modem registration can take a very long time if multiple DOCSIS downstream
signals are present. Once a modem has locked onto a signal it will find UCDs and
mapping information. From the mapping information it knows when it will be able
to Transmit an initial ranging request. The initial ranging request is transmitted in
the contention region of the upstream signal and may collide with other signals.
The CMTS will reply with frequency, timing and level adjustments. The CM stores
the ranged power level in flash.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 8
Implementing the BSR for Basic Data Services
Module 8, Page 9
Downstream Tuning
Analog Digital TV
5 @ 1 sec 2 sec DOCSIS
7 8 9 10 11 44 101 108
When a Cable Modem boots, it begins tuning at 93 MHz, the lowest standard
channel plan DOCSIS CMTS downstream channel. It tunes to all the DOCSIS
standard channel frequencies in 6 MHz steps, then all the HRC channel
frequencies in 6 MHz steps. If it doesn’t detect a downstream carrier, it will cycle,
and start all over again.
When the Cable Modem encounters a digital downstream channel, it studies it
closely to decide if it is a DOCSIS channel . If it finds no DOCSIS SYNCs
broadcast on the digital channel, it resumes scanning.
The Cable Modem will scan across analog TV channels at a rate of about 5 per
second. Digital TV channels take about 2 seconds per channel.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 9
Implementing the BSR for Basic Data Services
Module 8, Page 10
The downstream signal contains the following information for the modems:
Upstream channel descriptors
Mapping of mini-slots
Request region (contention)
Transmit opportunity (reserved)
Maintenance area (contention and reserved)
Synchronization
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 10
Implementing the BSR for Basic Data Services
Module 8, Page 11
MAPS
MAPS Describe the upstream timeline into the future. Can be adjusted for plant
delay. Map elements specify:
Burst type
Request
Maintenance
Transmit data
Which modem
By SID
Where on the time line
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 11
Implementing the BSR for Basic Data Services
Module 8, Page 12
Ranging
Tuning
Configuration
Registration
Maintenance
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 12
Implementing the BSR for Basic Data Services
Module 8, Page 13
Downstream
29-8 20-4 14-8 11-8
Upstream
Å Higher Lower Æ
Due to attenuation
In a properly adjusted and maintained cable plant, the settled upstream level from
different CMs along a cable plant distribution line will naturally vary. This is a
result of several factors:
•CM/CMTS level adjustment
During the Cable Modem boot process, the CMTS and a Cable Modem talk with
one another to get the upstream transmit power level adjusted so that upstream
bursts arrive at the CMTS receiver at the CMTS target level. Once a CM has
completed this ranging process, its actual upstream transmit level has settled at
somewhere between 8 and 58 dBmV (by DOCSIS RFI specification).
Upstream plant balancing. Cable system upstream amplifiers are typically
adjusted to provide unity gain input-to-input in the return direction. Attenuation is
very low at DOCSIS upstream frequencies compared with the cable plant’s
downstream design frequency.
Downstream plant balancing. Cable plants are designed with high tap values near
a DS amplifier output (upstream amplifier inputs) and lower tap values further
downstream before the next amplifier. This is done to keep the downstream
output levels at all tap ports about the same.
The settled upstream transmit levels of Cable Modems installed along an average
coax cable distribution line will normally be on the higher end of the 8 - 58 dBmV
allowed range for Cable Modems close to a upstream amplifier input and on the
lower end of the range for Cable Modems close to a upstream amplifier output.
The 50 dB US transmit level range DOCSIS Cable Modems can provide is quite
large. It is good engineering practice to try to reserve 5 - 10 dB of the top and
bottom of this range as an operating margin.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 13
Implementing the BSR for Basic Data Services
Module 8, Page 14
CMTS
Tuning
UCD MAP Rng-Rsp
Ranging
Connection
Configuration
Registration Rng-Req
Maintenance CM
The allocator transmits maps which describe the allowed use of the upstream
bandwidth for some period into the future. The maps may contain:
•Descriptions of contention areas in which modems may request time in the future
for upstream data transmission (Request IEs)
•Descriptions of contention areas in which modems may transmit either small data
packets or requests for future grants (Request/Data IEs)
•Grants of time to a particular Service ID to transmit data upstream. (Short and
Long Data Grants)
•Maintenance requests to particular modems for such activities as periodic loop
delay calculation. (Station Maintenance)
•Acknowledgment of a transmission request without actually granting the request.
(null Data Grants)
•Contention maintenance areas to allow power-up of new modems. (Initial
Maintenance IEs)
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 14
Implementing the BSR for Basic Data Services
Module 8, Page 15
Connection
Registration
Maintenance
The modem makes a DHCP request. The next step varies between modems.
Typically, the modem makes a TOD request. If the TOD server information is
missing in the DHCP response, or, the ToD server is unreachable, some modems
continue the registration process, while others reboot. The modem then makes a
TFTP request for the MD5 (configuration) file specified in the DHCP response.
The MD5 file contains information for:
Network access
Bandwidth
Priority
SNMP sets
Filters
Community strings
MIC’s (Message Integrity Checks)
The CM MIC is used for file integrity
The CMTS MIC is used for theft of service prevention
Shared Secret
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 15
Implementing the BSR for Basic Data Services
Module 8, Page 16
RDN> en
RDN# config
RDN(config)# int cable 5/0
RDN(config-if)# cable helper-address 192.168.100.100 cable modem
RDN(config-if)# cable helper-address 192.168.100.100 host
This will only forward UDP traffic from cable modems if that parameter is used or
from CPE if the host parameter is used.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 16
Implementing the BSR for Basic Data Services
Module 8, Page 17
RDN> en
RDN# config
RDN(config)# int cable 5/0
RDN(config-if)# ip helper-address 192.168.100.100
IP helper addressing is a form of static addressing that cause the router to forward
UDP broadcast packets as an IP unicast to the IP helper address location. To
configure helper addressing, you must specify the ip helper-address command
on every interface on every router that receives a broadcast that needs to be
forwarded. The helper address is specified for UDP broadcast packets destined
to the following port numbers by default:
• Trivial File Transfer Protocol (TFTP) (port 69)
• Domain Naming System (port 53)
• Time service (port 37)
• NetBIOS Name Server (port 137)
• NetBIOS Datagram Server (port 138)
• Boot Protocol (BOOTP) client and server datagrams (ports 67 and 68)
The router places the IP address of the interface which received the broadcast in
the "giaddr" field (meaning Gateway IP Address). This will be the address to
which the DHCP server will send the DHCP response.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 17
Implementing the BSR for Basic Data Services
Module 8, Page 18
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 18
Implementing the BSR for Basic Data Services
Module 8, Page 19
Introduction to DHCP
In the cable modem world, hosts are added and removed daily – and are not
physically available to administrators. As such, an automated method of
configuring addressing schemes was necessary. Dynamic Host Configuration
Protocol, based on RFCs 1533, 1534, 1541 and 1542 was developed by the
Dynamic Host configuration working group of the Internet Engineering Task Force
and was subsequently adapted as a part of DOCSIS.
DHCP is based on BOOTP and maintains some backward compatibility.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 19
Implementing the BSR for Basic Data Services
Module 8, Page 20
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 20
Implementing the BSR for Basic Data Services
Module 8, Page 21
DHCP Scopes
ÔDHCP Scopes
¾ IP address pool a client leases from
¾ Managed by DHCP server
» May manage multiple scopes
¾ May contain additional parameters
» Options
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 21
Implementing the BSR for Basic Data Services
Module 8, Page 22
DHCP Server
ÔDHCP Server
¾ Assigns IP addresses to clients
Addresses are “leased” to clients for a period of time
IP addresses can be reserved for specific clients
DHCP Clients may be filtered based on their MAC addresses
Server
Address may be assigned from different scopes based on
extended options
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 22
Implementing the BSR for Basic Data Services
Module 8, Page 23
Initialization
Selection Rebinding
Request Renewing
Binding
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 23
Implementing the BSR for Basic Data Services
Module 8, Page 24
ÔInitialization
¾ DHCPDISCOVER
Message sent
¾ Broadcast
¾ Contains MAC and
hostname
DHCPDISCOVER
Broadcast MAC address
To 255.255.255.255 to
BootP UDP port 67
Initialization
Selection Selection
Request Renewing
Binding
When a DHCP client starts up, it’s TCP/IP stack initializes with an IP address of
0.0.0.0 (null IP address). With TCP/IP enabled, the DHCP client broadcasts a
DHCPDISCOVER message on the local subnet to find information about DHCP
servers. The server port for these broadcasts is the BootP UDP port 67 and the
destination address is 255.255.255.255.
With this DHCPDISCOVER message, the client sends the only information it has
that uniquely identifies it – it’s Media Access Control (MAC) address and
hostname.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 24
Implementing the BSR for Basic Data Services
Module 8, Page 25
ÔSelection
¾ DHCPOFFER
¾ Sent Broadcast DHCPOFFER
Server MAC and IP address
¾ Server MAC and IP Lease with IP address,
Subnet mask and duration
¾ Client IP, Subnet
mask, Lease duration
Initialization
Selection Selection
Request Renewing
Binding
Any DHCP server that receives the DHCPDISCOVER message and can provide
a lease sends a DHCPOFFER message to the client on BootP UDP client port 68.
Because the client is still in it’s initialized state (and has no IP address), this
message is broadcast. The DHCP server sends an IP address offer to the client,
including the subnet mask and lease duration. The server includes it’s MAC and
IP address in the message to facilitate further communication with the DHCP
client.
If no server responds with a DHCP offer message, the DHCP client will retry
several times. If it continues to not receive a response, it goes into a sleep state
for some amount of time.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 25
Implementing the BSR for Basic Data Services
Module 8, Page 26
ÔRequest
¾ DHCPREQUEST
¾ Sent to server IP
address
¾ Requests options
» Configuration file
DHCPREQUEST
» Default Gateway Server IP address
Request for options
Initialization
Selection Selection
Request Renewing
Binding
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 26
Implementing the BSR for Basic Data Services
Module 8, Page 27
ÔBinding
¾ DHCPACK
¾ DHCP lease
DHCPACK
information sent Lease information
¾ Requested options Options requested
sent
¾ Sent broadcast
Initialization
Selection Selection
Request Renewing
Binding
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 27
Implementing the BSR for Basic Data Services
Module 8, Page 28
ÔRenewing
¾ DHCPREQUEST
¾ Sent directly to server
DHCPACK
¾ DHCPACK from server Lease information
Options requested
¾ Lease renewal
¾ Updates to options DHCPREQUEST
Server IP address
Request for options
Initialization
Selection Selection
Request Renewing
Binding
Since DHCP leases are configured to expire after some amount of time, clients
need a means of renewing their leases. A DHCP client enters two states during
renewing a lease:
•Renewing – When the lease is 50% expire
•Rebinding – When the lease is 87.5% expires and renewing has failed.
The client attempts to renew it’s lease from the server that originally provided it.
The client sends a DHCPREQUEST message directly to the DHCP servers
asking to renew it’s current lease.
The DHCP server will respond with a DHCPACK message if it can renew the
lease. The message will include any updated parameters (options).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 28
Implementing the BSR for Basic Data Services
Module 8, Page 29
ÔRebinding
¾ DHCPREQUEST
¾ Broadcast
DHCPACK
¾ Listens for DHCPACK Lease information
Options requested
¾ Renewal information
DHCPREQUEST
Server IP address
Request for options
Initialization
Selection Selection
Request Renewing
Binding
If for some reason the client can’t communicate with the DHCP server it originally
obtained it’s lease from, the client enters the rebinding state at 87.5% lease
expired. In this state, the client will contact any DHCP server by broadcasting it’s
DHCPREQUEST message with it’s current lease information.
If any server can renew the lease, it will send a DHCPACK message. If, for some
reason, a DHCPNACK message (DHCP not acknowledged) is received, the client
will discontinue using the current IP address immediately. It will then re-enter it’s
initializing state and try to acquire a new lease.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 29
Implementing the BSR for Basic Data Services
Module 8, Page 30
Connection
CMTS
Configuration
The following fields are typically expected in the DHCP response returned to the
CM:
The IP address to be used by the CM (yiaddr).
The IP address of the TFTP server for use in the next phase of the bootstrap
process (siaddr).
If the DHCP server is on a different network (requiring a relay agent), then the IP
address of the relay agent (giaddr). Note: this may differ from the IP address of
the first hop router.
The name of the CM configuration file to be read from the TFTP server by the CM
(file).
The subnet mask to be used by the CM (Subnet Mask, option 1).
The time offset of the CM from Universal Coordinated Time (UTC) (Time Offset,
option 2). This is used by the CM to calculate the local time for use in time-
stamping error logs.
A list of addresses of one or more routers to be used for forwarding CM-originated
IP traffic (Router Option, option 3). The CM is not required to use more than one
router IP address for forwarding.
A list of [RFC-868] time-servers from which the current time may be obtained
(Time Server Option, option 4).
A list of SYSLOG servers to which logging information may be sent (Log Server
Option, option 7)
The CM MUST configure itself based on the DHCP response.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 30
Implementing the BSR for Basic Data Services
Module 8, Page 31
RDN> en
RDN# debug ip udp dhcp
UDP DHCP Debugging is turned on
…
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 31
Implementing the BSR for Basic Data Services
Module 8, Page 32
ÔToD Server
¾ Internet Time Protocol (ITP)
RFC 868
This protocol provides a site-independent, machine readable date and time. The
Time service sends back to the originating source the time in seconds since
midnight on January first 1900.
This protocol may be used either above the Transmission Control Protocol (TCP)
or above the User Datagram Protocol (UDP).
The Time of Day server provides a 32 bit value which contains the correct time (in
seconds) since 1/1/1900 at midnight.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 32
Implementing the BSR for Basic Data Services
Module 8, Page 33
newhostname> en
newhostname# time-of-day server 192.168.115.69
newhostname#
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 33
Implementing the BSR for Basic Data Services
Module 8, Page 34
ÔTFTP Server
¾ Trivial File Transfer Protocol
(RFC 1350)
TFTP
Server ¾ UDP port 69
The TFTP server contains the configuration file for the cable modem.
TFTP is a simple protocol (RFC1350) to transfer files, and therefore was named
the Trivial File Transfer Protocol or TFTP. It has been implemented on top of the
Internet User Datagram protocol (UDP or Datagram).
UDP port 69 is used for the transfer process. Port 69 is a software port in the
TFTP protocol.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 34
Implementing the BSR for Basic Data Services
Module 8, Page 35
TFTP Process
Only one parameter is needed for DOCSIS 1.0 and that is the Network setting.
Other parameters ( downstream, upstream, class of service) are needed for
Service Class provisioning.
SNMP parameters if SNMP will be used.
CPE MAC address for enhanced security.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 35
Implementing the BSR for Basic Data Services
Module 8, Page 36
Configuration
Configuration
Registration
Maintenance
The modem makes a DHCP request. The next step varies between modems.
Typically, the modem makes a TOD request. If the TOD server information is
missing in the DHCP response, or, the ToD server is unreachable, some modems
continue the registration process, while others reboot. The modem then makes a
TFTP request for the MD5 (configuration) file specified in the DHCP response.
The MD5 file contains information for:
Network access
Bandwidth
Priority
SNMP sets
Filters
Community strings
MIC’s (Message Integrity Checks)
The CM MIC is used for file integrity
The CMTS MIC is used for theft of service prevention
Shared Secret
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 36
Implementing the BSR for Basic Data Services
Module 8, Page 37
Registration
Tuning
Ranging
Connection
Configuration
At this point of time a modem can join in the network and transmit PDUs.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 37
Implementing the BSR for Basic Data Services
Module 8, Page 38
Registration (cont.)
REG-REQ
HFC
Cable Modem
The modem will now try to register with the CMTS via a Registration Request.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 38
Implementing the BSR for Basic Data Services
Module 8, Page 39
Registration (cont.)
ÔCMTS
¾ Checks CM’s MAC address and authentication signature
¾ Assigns a SID
¾ Provides bandwidth for CM requested Class of Service
¾ Modifies forwarding table to allow full user data if the modem
requested Network Access
¾ Sends REG-RSP to CM CMTS
» CM can pass unencrypted data
REG-RSP
HFC
Cable Modem
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 39
Implementing the BSR for Basic Data Services
Module 8, Page 40
Registration: MICs
Tuning
Things the
Ranging CMTS needs
to know about
Connection
CMTS MIC
Configuration
Registration
CM MIC
Filters, e.g.
Maintenance
The CMTS MIC allows the CMTS (and, by extension, the cable operator) to verify
that the operational parameters and class of service that the CM is asking for
were provisioned by an authorized TFTP server. Because the CMTS MIC is
calculated with a secret shared between the CMTS and the provisioning server
(TFTP file creation software), the modem or subscriber is unable to forge this
digital signature. The secret key is provisioned by the operator at both the
provisioning server and the CMTS.
The CM MIC is simply a digest over all of the parameters in the TFTP file that the
CMTS would not be interested in. Because the TFTP file could run to thousands
of bytes, it is easier to send up this 16-byte digest than to send the thousands of
bytes needed to recalculate the CMTS MIC. The purpose of the CM MIC is to
guarantee the integrity of things like filters. Without it, one could mount a denial-of-
service attack by putting a TFTP server on the network that copied the CMTS
MIC-needed fields exactly but tacked on a bogus filter-all SNMP object.
The shared secret referenced above is an MD5 file. MD5 is the result of an
algorithm that takes as input a message of arbitrary length, and produces as
output a 128-bit “fingerprint” or “message digest” of the input.
The MD5 algorithm is intended for digital signature applications, where a large file
must be “compressed” in a secure manner.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 40
Implementing the BSR for Basic Data Services
Module 8, Page 41
RDN> en
RDN# debug ip udp dhcp
UDP DHCP Debugging is turned on
…
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 41
Implementing the BSR for Basic Data Services
Module 8, Page 42
Baseline Privacy uses the Cipher Block Chaining (CBC) mode of the US Data
Encryption Standard (DES) algorithm [FIPS-46, FIPS-46-1, FIPS-74, FIPS-81] to
encrypt the Packet PDU field in both upstream and downstream RF MAC Packet
Data PDUs. The MCNS MAC headers of these Packet Data PDUs are not
encrypted. The payloads, as well as headers, of MAC management messages are
sent in the clear to facilitate registration, ranging, and normal operation of the
MAC sublayer.
The MCNS Radio Frequency Interface Specification [MCNS1] defines a Service
ID (SID) as a mapping between CM and CMTS for the purposes of upstream
bandwidth allocation and class-of-service management. When Baseline Privacy is
in operation, the SID also identifies a particular security association. The SID, in
combination with other components of the extended header element, identifies to
a modem the keying material required to decrypt the MAC PDU's Packet Data
field.
Baseline Privacy’s key management protocol runs between CM and CMTS; CMs
use the protocol to obtain authorization and traffic keying material (pertaining to a
particular SID) from the CMTS, and to support periodic reauthorization and key
refresh. The key management protocol uses the RSA [RSA, RSA1] public-key
encryption algorithm, and the Electronic Codebook (ECB) mode of DES [FIPS-81]
to secure key exchanges between CM and CMTS. CMs have RSA private/public
key pairs factory-installed in flash memory. Once a key pair is generated, it is
retained for the operational life of the CM.
A SID's keying material (DES key and CBC Initialization Vector) has a limited
lifetime. When the CMTS delivers SID keying material to a CM, it also provides
the CM with that material's remaining lifetime. It is the responsibility of the CM to
request new keying material from the CMTS before the set of keying material the
CM currently has expires at the CMTS.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 42
Implementing the BSR for Basic Data Services
Module 8, Page 43
Baseline Privacy Plus (BPI+) provides cable modem users with data privacy
across the cable network. It does this by encrypting traffic flows between CM and
CMTS.
In addition, BPI+ provides cable operators with strong protection from theft of
service. The protected DOCSIS MAC data communications services fall into three
categories:
• best-effort, high-speed, IP data services;
• QoS (e.g., constant bit rate) data services; and
• IP multicast group services.
Under BPI+, the CMTS protects against unauthorized access to these data
transport services by enforcing encryption of the associated traffic flows across
the cable network. BPI+ employs an authenticated client/server key management
protocol in which the CMTS, the server, controls distribution of keying material to
client CMs.
The original BPI specification had “weak” service protection because the
underlying key management protocol did not authenticate CMs. BPI+ strengthens
this service protection by adding digital-certificate based CM authentication to its
key management protocol.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 43
Implementing the BSR for Basic Data Services
Module 8, Page 44
BPI+ Architecture
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 44
Implementing the BSR for Basic Data Services
Module 8, Page 45
BPI+ encrypts a DOCSIS MAC Frame’s packet data; the DOCSIS MAC Frame’s
Header is not encrypted. DOCSIS MAC management messages MUST be sent in
the clear to facilitate registration, ranging, and normal operation of the DOCSIS
MAC sublayer.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 45
Implementing the BSR for Basic Data Services
Module 8, Page 46
Internet
ÔProvides CM users
CMTS with data privacy
across the RF network
Baseline Privacy provides cable modem users with data privacy across the RF
network. It provides user data privacy by encrypting traffic flows between CM and
CMTS. Baseline Privacy provides basic protection of service by insuring that a
modem, uniquely identified by its 48-bit IEEE MAC address, can only obtain
keying material for services it is authorized to access.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 46
Implementing the BSR for Basic Data Services
Module 8, Page 47
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 47
Implementing the BSR for Basic Data Services
Module 8, Page 48
Security Association
AUTH-REQ
HFC
Baseline Privacy initialization begins with the CM sending the CMTS and
authorization request, containing data identifying the CM (e.g., MAC address), the
CM's RSA public key, and a list of zero or more assigned unicast SID’s that have
been configured to run Baseline Privacy (Zero is the modem is only configured to
run privacy on multicast SID’s).
If the CMTS determines the requesting CM is authorized for these services, the
CMTS responds with an authorization reply containing a list of SID’s (both unicast
and multicast) that the CM is permitted to run Baseline Privacy on. The reply also
includes an authorization key from which CM and CMTS derive the keys needed
to secure a CM's subsequent requests for per-SID traffic encryption keys, and the
CMTS response to these requests. The authorization key is encrypted with the
receiving cable modem’s public key.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 48
Implementing the BSR for Basic Data Services
Module 8, Page 49
CMTS
KEY-REQ
HFC
Cable Modem
TEK
After successfully completing authorization with the CMTS, the cable modem
sends key requests to the CMTS, requesting traffic encryption keys to use with
each of its Baseline Privacy SID’s. A CM's traffic key requests are authenticated
using a keyed hash (the HMAC algorithm); the message authentication key is
derived from the authorization key obtained during the earlier authorization
exchange. The CMTS responds with key replies, containing the traffic encryption
keys: the keys are DES encrypted with a key encryption key derived from the
authorization key. Like the Key Requests, Key Replies are authenticated with a
keyed hash, where the message authentication key is derived from the
authorization key.
It is the responsibility of individual cable modems to insure the keys they are using
match those the CMTS is using. Cable modems do this by tracking when a
particular SID’s key is scheduled to expire and issuing a new key request for the
latest key prior to that expiration time.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 49
Implementing the BSR for Basic Data Services
Module 8, Page 50
Periodic Maintenance
Connection CMTS
Configuration
Rng-Req
Registration
HFC
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 50
Module 9, Page 0
Module 9
Path Determination
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 0
Module 9, Page 1
Introduction
Lesson Overview We will quickly review the OSI model, and contrast
switching and routing. We discuss the basics of
routing, including path selection and forwarding
mechanisms. In addition, we will see why and how
we create static routes, and their benefits and
shortcomings. We will explore dynamic routing
protocols in Modules 10 and 11.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 1
Module 9, Page 2
Objectives
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 2
Module 9, Page 3
Topic Order
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 3
Module 9, Page 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 4
Module 9, Page 5
OSI Model
Application
Presentation
Session
ATM, PPP,Ethernet
MAC Addresses Mac
Datalink Pre Src Mac Dest Mac H Source IP Destination IP
And Frames LLC
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 5
Module 9, Page 6
Application
Presentation
Session
TCP/UDP Transport
Router
Transmission
Physical Physical Physical
And timing 10101010 10101010
Ultimately, devices make their forwarding decisions at a layer that provides for
some form of unique identification. You will remember from a previous module
that MAC address allows for unique identification of physical interfaces. It is a
fixed address (burned in by manufacturer, although some devices allow for
altering of MAC addressed), which makes it useful for local unique identification
(and therefore local forwarding decisions), but not remote path determination
decisions. This is because, as networks grow in size and are segmented
(logically and physically), administrator-assigned (and designed) addressing
schemes become important. That is where Layer 3 (or IP) addresses become
important. IP addresses, because they are assigned by the administrator, can be
altered to fit changing topologies and to connect diverse networks. As such, they
are obvious choices for remote (or logical) path determination decisions.
We label a device, such as a switch, bridge or cable modem, a Layer 2 device
because it makes it’s forwarding decisions based on MAC addresses. Routers,
on the other hand, use IP addresses to make their logical path, or forwarding,
decisions – which is why we call them Layer 3 devices.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 6
Module 9, Page 7
Router
Remembering that switches act at layer 2, it is easy to remember that they are
designed, intrinsically, to connect hosts. That means that we can attach a number
of hosts to a switch, and, although each port will be considered a different collision
domain, they are still within the same broadcast domain (or network segment).
Routers, on the other hand, are intended to connect networks. They can connect
different kinds of networks, geographically disparate networks, or just logically
separate networks. As such, they both divide collision and broadcast domains by
default.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 7
Module 9, Page 8
A B
Forwarding
Forwarding Table
Table
0260.8c01.1111 0260.8c01.3333
E0 E1
C D
E2 E3
0260.8c01.2222 0260.8c01.4444
¾ Address learning
¾ Forward/Filter decision
¾ Loop Avoidance
Switches and bridges have more in common than it may seem at first glance.
Their primary functions are to learn the layer 2 addresses of the devices within
their network segment (that they connect). Based on this knowledge of
connected, local addresses, it is their job to make forwarding (and in many cases
filtering) decisions at layer 2 (based on MAC address).
Another principal function at layer 2 is to avoid network loops.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 8
Module 9, Page 9
A B
Forwarding
Forwarding Table
Table
0260.8c01.1111 0260.8c01.3333
E0 E1
C D
E2 E3
0260.8c01.2222 0260.8c01.4444
When switches and bridges are initially powered on, they do not know about the
topology of the networked devices that they are connecting. Their first job will be
to learn of these devices in order to service their data forwarding needs.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 9
Module 9, Page 10
0004.ac01.1111
0004.ac01.3333
E0 E1
C D
D
E2 E3
0004.ac01.2222 0004.ac01.4444
When a device needs to send data to another device within the same segment,
the switch or bridge that connects them will remember the MAC address of the
sending device and associate it, internally, with the port that received the data.
Assuming that switch or bridge doesn’t know the location of the destination
device, it will flood the message out all ports other than the receiving port.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 10
Module 9, Page 11
0004.ac01.1111 0004.ac01.3333
E0 E1
C D
E2 E3
0004.ac01.2222 0004.ac01.4444
As more messages are received on each of the switches or bridges ports, it builds
this table of known MAC addresses and associated ports until a time when
messages from devices are to stations whose MAC address is know – at which
time it is no longer necessary to flood messages out all ports. The switch or
bridge will continue to update and maintain this table of know addresses and
locations as a primary function.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 11
Module 9, Page 12
Here we see the culmination of the learning operations of the switch or bridge. It
knows the location of the destination host, which allows it to forward the data to
only the port on which it participates. It is essentially filtering on the non-
participating ports from the perspective of a network segment. Image the same
scenario with a hub (layer 1 device) connecting each of these hosts. If Station A
sent a message intended for only Station C, all devices would hear that message
(since hubs perpetuate shared media). This means that each of the network
interfaces at the hosts would be forced to filter messages not intended for them,
which is less efficient.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 12
Module 9, Page 13
Broadcast and multicast frames, because they are intended for all hosts within a
local network segment, are forwarded out all interfaces on switches. This means
that it is the receiving hosts’ task to examine the destination address and decide
whether the message is intended for it or not.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 13
Module 9, Page 14
OSI
Application 7
Presentation 6
Session 5
Transport 4
Network 3 IP ADDRESS
for Each Interface Router
Physical 1
Saying that routers are Layer 3 devices can be a bit misleading. Although it
makes it logical path determination decisions at layer 3, it must still forward data,
on local segments, according to its layer 2 address, and put data onto physical
media (layer 1).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 14
Module 9, Page 15
What is Routing?
Destination addresses
Sources it can learn from
Possible routes
Best route
Maintain and verify routing information
Drop or forward traffic based on policy (access-lists (filters))
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 15
Module 9, Page 16
Router
Network 1 Network 3
Network 2
Routing is the process by which an item gets from one location to another.
Examples of items that get routed:
•Trains
•Mail
•Telephone Calls
•Traffic (A router moves data traffic)
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 16
Module 9, Page 17
Routing Protocol
RIP, OSPF, or BGP
• Protocols that allow routers to
exchange information about networks.
• Routers depend on static routes or a
dynamic routing protocol to learn about
remote networks. (Not directly
connected). Routing protocols are
carried in routed protocols
Routed protocols are nothing more than protocols that actually pass user data. By
contrast, routing protocols are used to share data between routers in order to help
determine information about networks. This information is used to determine
paths through connected and remote networks, in order to pass routed (or
routable) protocols with user data.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 17
Module 9, Page 18
Static Routes
Stub Network
200.20.20.0 200.10.10.0
A B
B
192.168.1.2 192.168.1.1
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 18
Module 9, Page 19
192.168.5.2
Router (Config)# ip route 192.168.120.0 255.255.255.0
192.168.3.2
Router (Config)# ip route 192.168.130.0 255.255.255.0
192.168.130.0 192.168.5.2
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 19
Module 9, Page 20
200.20.20.0 200.10.10.0
A B
B
192.168.1.2 192.168.1.1
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 20
Module 9, Page 21
Stub Network
144.27.0.0
Other Networks 200.10.10.0
192.168.1.1 192.168.1.2
205.7.7.0
¾This route allows the stub network to reach all known networks beyond router A
With an address and subnet mask of 0.0.0.0 0.0.0.0 in the ip route statement,
packets for any network not listed in the routing table will be sent to the next hop,
192.168.1.1.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 21
Module 9, Page 22
Verifying Routes
192.168.120.2
• Ping
192.168.120.1 Ping [destination address]
192.168.3.2
• Traceroute
Traceroute [destination address]
192.168.3.1
192.168.5.1
Router# ping 192.168.120.2
192.168.5.2 Type escape sequence to abort
Sending 5, 100-byte ICMP Echos to 192.168.120.2, timeout is
2 seconds:
192.168.130.0 !!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max =
34/45/77
The ping command sends an ICMP echo request to the specified destination
address. This gives us information on reachability (out of five attempts) as
minimum, maximum and average round trip times.
Traceroute is a utility that records the route taken by packets from the BSR64000
and a specified destination host. It also calculates and displays the amount of time
each hop took. The original traceroute was a Unix utility first included in early
BSD distributions.
When you enter the traceroute command, the utility initiates the sending of a
packet (using the Internet Control Message Protocol or ICMP), including in the
packet a time limit value (known as the "time to live" (TTL) that is designed to be
exceeded by the first router that receives it, which will return a Time Exceeded
message. This enables traceroute to determine the time required for the hop to
the first router.
Increasing the time limit value, it resends the packet so that it will reach the
second router in the path to the destination, which returns another Time Exceeded
message, and so forth. Traceroute determines when the packet has reached the
destination by including a port number that is outside the normal range. When it's
received, a Port Unreachable message is returned, enabling traceroute to
measure the time length of the final hop. As the tracerouting progresses, the
records are displayed for you hop by hop.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 22
Module 9, Page 23
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 23
Module 9, Page 24
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 24
Module 9, Page 25
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 25
Module 10, Page 0
Module 10
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 0
Implementing the BSR for Basic Data Services
Module 10, Page 1
Introduction
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 1
Implementing the BSR for Basic Data Services
Module 10, Page 2
Objectives
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 2
Implementing the BSR for Basic Data Services
Module 10, Page 3
Topic Order
Topic Order What is a routing Protocol? Page 5
Interior/Exterior Routing Protocols Page 6
Interior Routing Protocol Types Page 8
Distance Vector Routing Protocols Page 9
Initial Configuration Page 10
Starting the RIP Process Page 11
Specifying Networks to Advertise Page 12
Discovering Routes with RIP Page 13
Maintaining Routing Information Page 16
Administrative Distance:
Ranking Routes Page 19
Examining Routing Information Page 20
Examine the RIP Database Page 21
Examine the Routing Table Page 22
Routing Loops Page 23
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 3
Implementing the BSR for Basic Data Services
Module 10, Page 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 4
Implementing the BSR for Basic Data Services
Module 10, Page 5
10.120.2.0
200.20.20.0
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 5
Implementing the BSR for Basic Data Services
Module 10, Page 6
Interior/Exterior Gateway
Protocols
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 6
Implementing the BSR for Basic Data Services
Module 10, Page 7
Interior/Exterior Gateway
Protocols (cont.)
IGPs: RIP, OSPF EGPs: BGP
•Interior gateway routing protocols are used within a single autonomous system
The design criteria for an interior gateway routing protocol require it to find
the best path through the network. In other words, the metric and how that
metric is used is the most important element in an interior routing
protocol.
• Exterior routing protocols are used to communicate between autonomous
systems.
Exterior gateway protocols are used to exchange routing information
between networks that do not share a common administration. IP exterior
gateway protocols require the following three sets of information before
routing can begin:
A list of neighbor (or peer) routers or access servers with which to
exchange routing information
A list of networks to advertise as directly reachable
The autonomous system number of the local router
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 7
Implementing the BSR for Basic Data Services
Module 10, Page 8
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 8
Implementing the BSR for Basic Data Services
Module 10, Page 9
Distance—How
Distance—How farfar
Vector—In
Vector—In which
which direction
direction
Routing
Routing Routing
Routing Routing
Routing Routing
Routing
Table
Table Table
Table Table
Table Table
Table
Distance vector algorithms do not allow a router to know the exact topology of an
internetwork.
Routers running a Distance Vector Protocol know where the update came from
(what interface), and the number of hops associated with the advertised networks.
This information is somewhat like the information found on signs at a highway
intersection. A sign points toward a road leading away from the intersection and
indicates the distance to the destination. Further down the highway, another sign
also points toward the destination, but now the distance to the destination is
shorter. So long as each successive point on the path shows that the distance to
the destination is successively shorter, the traffic is following the best path.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 9
Implementing the BSR for Basic Data Services
Module 10, Page 10
Initial Configuration
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 10
Implementing the BSR for Basic Data Services
Module 10, Page 11
RDN> en
RDN# config
RDN(config)# router rip
RDN(config-rip)#
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 11
Implementing the BSR for Basic Data Services
Module 10, Page 12
RDN> en
RDN# config
RDN(config)# router rip
RDN(config-rip)#network 192.168.25.0 255.255.255.0
RDN(config-rip)#exit
RDN(config)#exit
RDN#
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 12
Implementing the BSR for Basic Data Services
Module 10, Page 13
E0 P3 P4 P2 P2 E0
Routing
Routing Table
Table Routing
Routing Table
Table Routing
Routing Table
Table
10.1.0.0 E0 0 10.2.0.0 P4 0 10.3.0.0 P2 0
10.2.0.0 P3 0 10.3.0.0 P2 0 10.4.0.0 E0 0
This figure continues the concept of how a router using a distance vector protocol
generally discovers the best path to destinations from each router neighbor.
Routing tables inside each router begin with entries for the 0 distance to directly
connected networks.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 13
Implementing the BSR for Basic Data Services
Module 10, Page 14
E0 P3 P4 P2 P2 E0
Routing
Routing Table
Table Routing
Routing Table
Table Routing
Routing Table
Table
10.1.0.0 E0 0 10.2.0.0 P4 0 10.3.0.0 P2 0
10.2.0.0 P3 0 P2 0 E0 0
10.3.0.0 10.4.0.0
10.1.0.0 P4 1
10.4.0.0 P2 1
Here, router B learns about networks 10.1.0.0 from router A, and 10.4.0.0 from
router C, via RIP updates.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 14
Implementing the BSR for Basic Data Services
Module 10, Page 15
E0 P3 P4 P2 P2 E0
Routing
Routing Table
Table Routing
Routing Table
Table Routing
Routing Table
Table
10.1.0.0 E0 0 10.2.0.0 P4 0 10.3.0.0 P2 0
10.2.0.0 P3 0 P2 0 E0 0
10.3.0.0 10.4.0.0
P3 2 10.4.0.0 P2 1 10.1.0.0 P2 2
10.4.0.0
Here, router B advertises the routes it learned from routers C and A. Actually, all
routes are advertised, but the new entries are added to the routing table when
received.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 15
Implementing the BSR for Basic Data Services
Module 10, Page 16
Process
Process toto
update
update this
this
routing
routing
table
table
Topology
change
causes
routing
table
update
The next couple of slides show how a router using a distance vector protocol
generally performs its routing information update process when the network
topology changes.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 16
Implementing the BSR for Basic Data Services
Module 10, Page 17
Process
Process toto
update
update this
this
routing
routing
table
table
Router A sends Topology
out this updated change
routing table causes
after the routing
next period table
expires Router A update
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 17
Implementing the BSR for Basic Data Services
Module 10, Page 18
Process
Process toto Process
Process toto
update
update this
this update
update this
this
routing
routing routing
routing
table
table table
table
Distance vector updates occur step by step. Typically, a router sends updates by
multicasting its table on each configured port, but other methods, such as sending
the table only to reconfigured neighbors, are employed by some routing
algorithms. Multicast is used by the RIP2, and OSPF. Broadcasts are used by
RIP version 1. The routing table can be sent routinely and periodically, or
whenever a change in the topology is discovered. Updates sent when changes
occur are called triggered updates.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 18
Implementing the BSR for Basic Data Services
Module 10, Page 19
Administrative Distance:
Ranking Routes
OSPF Administrative
Distance=110
Router B
I need to send a packet to
Network F. Both router B
and D will get it there. Router C
Which route is best? Router A
RIP
Administrative
Distance=120
Network F
Router D Router E
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 19
Implementing the BSR for Basic Data Services
Module 10, Page 20
The routing table will show all directly connected networks, static routes and only
the best dynamic routes. The RIP database, on the other hand, will have
information about all directly connected interfaces participating in RIP as well as
all RIP learned routes.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 20
Implementing the BSR for Basic Data Services
Module 10, Page 21
RDN> en
RDN# sh ip rip database
192.168.24.0 255.255.255.0 directly connected 192.168.24.20 m:1 t:0
192.168.13.0 255.255.255.0 directly connected 192.168.13.20 m:1 t:0
192.168.45.0 255.255.255.0 via 192.168.24.40 m:2 t:18
192.168.45.0 255.255.255.0 via 192.168.10.40 m:2 t:18
192.168.34.0 255.255.255.0 via 192.168.24.40 m:2 t:18
192.168.10.0 255.255.255.0 directly connected 192.168.10.20 m:1 t:0
192.168.35.0 255.255.255.0 via 192.168.10.30 m:2 t:14
200.40.40.0 255.255.255.0 via 192.168.10.40 m:2 t:18
Showing the RIP database shows information on all directly connected and RIP
learned routes only. It shows metric (m:2) which is hop count, and time in
seconds (t) that the dynamic route was updated. This database is also known as
the routing information base (RIB). It is this database that is consulted by the
routing table manager (RTM) to decide which routes are actually put in the
Routing table, also known as the forwarding information base (FIB).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 21
Implementing the BSR for Basic Data Services
Module 10, Page 22
RDN> en
RDN# sh ip route
Codes: C - connected, S - static, R - RIP, B - BGP
i - IS-IS derived L1-IS-IS level-1 route, L2- IS-IS level 2 route
O - OSPF, IA - OSPF inter area, N1 - OSPF NSSA external type 1
N2 - OSPF NSSA external type 2, E1 - OSPF external type 1
E2 - OSPF external type 2, * - candidate default
C 192.168.10.0/24 is directly connected, ethernet 7/0
R 192.168.12.0/24 [120/2] via 192.168.10.10, ethernet 7/0
C 200.20.20.0/24 is directly connected, loopback 1
R 200.30.30.0/24 [120/2] via 192.168.10.30, ethernet 7/0
R 200.40.40.0/24 [120/2] via 192.168.10.40, ethernet 7/0
Showing the routing table gives you information about how forwarding decisions
are being made. This is the table that is used to route packets. In contrast, the
RIB is used to store information about all RIP learned routes, whether best route
or not. The reason for this, is a network or interface failure. By having other
routes in the database, a substitute route can be moved to the routing table, until a
better route appears in the RIB.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 22
Implementing the BSR for Basic Data Services
Module 10, Page 23
Routing Loops
E0 P3 P4 P2 P2 E0
Routing
Routing Table
Table Routing
Routing Table
Table Routing
Routing Table
Table
10.1.0.0 E0 0 10.2.0.0 P4 0 10.3.0.0 P2 0
10.2.0.0 P3 0 P2 0 E0 0
10.3.0.0 10.4.0.0
P3 2 10.4.0.0 P2 1 10.1.0.0 P2 2
10.4.0.0
ÔEach node maintains the distance from itself to each possible destination
network
The next few slides describe one of the general problems that distance vector
protocols could face without the corrective influence of some countermeasure,
such as split-horizon.
This slide shows the original state of the network and routing tables. All routers
have consistent knowledge and correct routing tables. In this example, the routing
metric is hop count, so the cost of each link is 1. Router C is directly connected to
network 10.4.0.0 with a distance of 0. Router A’s path to network 10.4.0.0 is
through router B, with a hop count of 2.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 23
Implementing the BSR for Basic Data Services
Module 10, Page 24
E0 P3 P4 P2 P2
X
E0
Routing
Routing Table
Table Routing
Routing Table
Table Routing
Routing Table
Table
10.1.0.0 E0 0 10.2.0.0 P4 0 10.3.0.0 P2 0
10.2.0.0 P3 0 P2 0 E0 Down
10.3.0.0 10.4.0.0
P3 2 10.4.0.0 P2 1 10.1.0.0 P2 2
10.4.0.0
Router C has detected the failure of network 10.4.0.0 and stops routing packets
out its E0 interface. However, router A has not yet received notification of the
failure and still believes it can access network 10.4.0.0 through router B. Router
A’s routing table still reflects a path to network 10.4.0.0 with a distance of 2.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 24
Implementing the BSR for Basic Data Services
Module 10, Page 25
E0 P3 P4 P2 P2
X
E0
Routing
Routing Table
Table Routing
Routing Table
Table Routing
Routing Table
Table
10.1.0.0 E0 0 10.2.0.0 P4 0 10.3.0.0 P2 0
10.2.0.0 P3 0 P2 0 E0 2
10.3.0.0 10.4.0.0
P3 2 10.4.0.0 P2 1 10.1.0.0 P2 2
10.4.0.0
Because router B’s routing table indicates a path to network 10.4.0.0, router C
believes it now has a viable path to 10.4.0.0 through router B. Router C updates
its routing table to reflect a path to network 10.4.0.0 with a hop count of 2.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 25
Implementing the BSR for Basic Data Services
Module 10, Page 26
E0 P3 P4 P2 P2
X
E0
Routing
Routing Table
Table Routing
Routing Table
Table Routing
Routing Table
Table
10.1.0.0 E0 0 10.2.0.0 P4 0 10.3.0.0 P2 0
10.2.0.0 P3 0 P2 0 E0 2
10.3.0.0 10.4.0.0
P3 1 10.1.0.0 P4 1 10.2.0.0 P2 1
10.3.0.0
P3 4 10.4.0.0 P2 3 10.1.0.0 P2 2
10.4.0.0
Router A receives the new routing table from router B, detects the modified
distance vector to network 10.4.0.0, and recalculates its own distance vector to
network 10.4.0.0 as 3.
If all routers in an internetwork do not have up-to-date, accurate information about
the state of the internetwork, they might use incorrect routing information to make
a routing decision.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 26
Implementing the BSR for Basic Data Services
Module 10, Page 27
E0 P3 P4 P2 P2
X
E0
Routing
Routing Table
Table Routing
Routing Table
Table Routing
Routing Table
Table
10.1.0.0 E0 0 10.2.0.0 P4 0 10.3.0.0 P2 0
10.2.0.0 P3 0 P2 0 E0 4
10.3.0.0 10.4.0.0
P3 1 10.1.0.0 P4 1 10.2.0.0 P2 1
10.3.0.0
P3 6 10.4.0.0 P2 5 10.1.0.0 P2 2
10.4.0.0
Both routers conclude that the best path to network 10.4.0.0 is through each other
and continue to bounce packets destined for network 10.4.0.0 between each
other, incrementing the distance vector by 1 each time. This condition, called
count-to-infinity, continuously loops packets around the network, despite the
fundamental fact that the destination network 10.4.0.0 is down. While the routers
are counting to infinity, the invalid information allows a routing loop to exist.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 27
Implementing the BSR for Basic Data Services
Module 10, Page 28
E0 P3 P4 P2 P2
X
E0
Routing
Routing Table
Table Routing
Routing Table
Table Routing
Routing Table
Table
10.1.0.0 E0 0 10.2.0.0 P4 0 10.3.0.0 P2 0
10.2.0.0 P3 0 P2 0 E0 16
10.3.0.0 10.4.0.0
P3 16 10.4.0.0 P2 16 10.1.0.0 P2 2
10.4.0.0
Routing loops occur only when routing knowledge being propagated has not yet
reached the entire internetwork—when the internetwork has not converged after a
change. Fast convergence minimizes the chance for a routing loop to occur, but
even the smallest interval leaves the possibility open.
With this approach, the routing protocol permits the routing loop until the metric
exceeds its maximum allowed value. This example shows this defined maximum
as 16 hops. Once the metric value exceeds the maximum, network 10.4.0.0 is
considered unreachable.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 28
Implementing the BSR for Basic Data Services
Module 10, Page 29
E0 P3 P4 P2 P2
X
E0
X X
Routing
Routing Table
Table Routing
Routing Table
Table Routing
Routing Table
Table
10.1.0.0 E0 0 10.2.0.0 P4 0 10.3.0.0 P2 0
10.2.0.0 P3 0 P2 0 E0 16
10.3.0.0 10.4.0.0
P3 3 10.4.0.0 P2 2 10.1.0.0 P2 2
10.4.0.0
The split horizon technique attempts to eliminate routing loops and speed up
convergence. The rule of split horizon is that it is never useful to send information
about a route back in the direction from which the original route was learned. In
the example:
Router C originally announced a route to network 10.4.0.0 to router B. It
makes no sense for router B to announce to router C that router B has
access to network 10.4.0.0 through router C.
In its basic form, the split horizon technique simply omits from the message any
information about destinations routed on the link. This strategy relies either on
routes never being announced or on old announcements fading away through a
timeout mechanism.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 29
Implementing the BSR for Basic Data Services
Module 10, Page 30
Configuring Split-Horizon
RDN> en
RDN# conf
RDN (config)# int c 3/0
RDN (config-if)# no ip split-horizon
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 30
Implementing the BSR for Basic Data Services
Module 10, Page 31
Route Poisoning
E0 P3 P4 P2 P2
X
E0
16
Routing
Routing Table
Table Routing
Routing Table
Table Routing
Routing Table
Table
10.1.0.0 E0 0 10.2.0.0 P4 0 10.3.0.0 P2 0
10.2.0.0 P3 0 P2 0 E0 Infinity
10.3.0.0 10.4.0.0
P3 1 10.1.0.0 P4 1 10.2.0.0 P2 1
10.3.0.0
P3 3 10.4.0.0 P2 1 10.1.0.0 P2 2
10.4.0.0
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 31
Implementing the BSR for Basic Data Services
Module 10, Page 32
Poison Reverse
E0 P3 P4 P2 P2
X
E0
16
Routing
Routing Table
Table Routing
Routing Table
Table Routing
Routing Table
Table
10.1.0.0 E0 0 10.2.0.0 P4 0 10.3.0.0 P2 0
10.2.0.0 P3 0 P2 0 E0 Infinity
10.3.0.0 10.4.0.0
P3 1 10.1.0.0 P4 1 10.2.0.0 P2 1
10.3.0.0
P3 3 10.4.0.0 P2 Down? 10.1.0.0 P2 2
10.4.0.0
When router B sees the metric for network 10.4.0.0 jump to infinity, it sends an
update called a poison reverse back to router C stating that network 10.4.0.0 is
unreachable. This update overrides split-horizon to make sure all routers on that
segment (in this case only router C) have received information about the poisoned
route.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 32
Implementing the BSR for Basic Data Services
Module 10, Page 33
Ô Version 1 Version 2
Ô Packets sent broadcast Packets sent multicast
Ô No authentication mechanisms Next hop information is stored
Ô Class based routes, no subnet
mask field Simple text Authentication
Supports CIDR (classless inter-
domain routing)
There are some distinct differences between RIP versions one and two. As such,
it is important to check what version any participating router is running in order
ensure that routing updates will be exchanged successfully.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 33
Implementing the BSR for Basic Data Services
Module 10, Page 34
RDN (config-rip)#version 1
Interface mode RIP version commands takes precedence over global version
commands:
config-if# [no] ip rip send version [0-3] :
0 version 2 compatible 1
1 version 1
2 version 2
3 don’t send
config-if# [no] ip rip receive version [0-2] :
0 versions 2 and 1
1 version 1
2 version 2
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 34
Implementing the BSR for Basic Data Services
Module 10, Page 35
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 35
Implementing the BSR for Basic Data Services
Module 10, Page 36
Route Redistribution
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 36
Implementing the BSR for Basic Data Services
Module 10, Page 37
Debugging RIP
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 37
Implementing the BSR for Basic Data Services
Module 10, Page 38
RDN> en
RDN# config
RDN(config)# no router rip
RDN(config-rip)#
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 38
Implementing the BSR for Basic Data Services
Module 10, Page 39
E0 P3 P3 P5 P5 E0
129.168.1.0 20.10.10.0
129.168.1.1 10.1.1.1 10.1.1.2 10.2.2.2 10.2.2.3 20.10.10.1
router rip
network 10.0.0.0
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 39
Implementing the BSR for Basic Data Services
Module 10, Page 40
RIP Limitations
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 40
Module 11, Page 0
Module 11
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 0
Implementing the BSR for Basic Data Services
Module 11, Page 1
Introduction
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 1
Implementing the BSR for Basic Data Services
Module 11, Page 2
Objectives
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 2
Implementing the BSR for Basic Data Services
Module 11, Page 3
Topic Order
Topic Order What is OSPF? Page 5
OSPF Routing Hierarchy Page 6
Initial Configuration Page 7
Starting the OSPF process Page 8
What does the OSPF Process do? Page 9
OSPF Initialization Page 10
OSPF Network Types Page 11
Examining Adjacencies Page 14
Neighbor States Page 15
Defining Interfaces in OSPF Page 17
Using Wildcard Masks Page 18
OSPF Areas Page 19
Multi-Area OSPF Config Page 20
OSPF Router Types Page 21
Types of Link State Advertisements Page 22
Examining Routing Info Page 23
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 3
Implementing the BSR for Basic Data Services
Module 11, Page 4
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 4
Implementing the BSR for Basic Data Services
Module 11, Page 5
What is OSPF ?
Open Shortest Path First (OSPF) is a routing protocol developed for use with IP
networks by the interior gateway protocol (IGP) working group of the Internet
Engineering Task Force (IETF).
The working group was formed in 1988 to design an IGP based on the Dijkstra
(sometimes called shortest path first [SPF]) algorithm for use in the Internet. Just
like the Interior Gateway Routing Protocol (IGRP), OSPF was created because, in
the mid-1980s, as networks grew, the Routing Information Protocol (RIP) was just
unable to serve their needs (especially in heterogeneous environments).
Version one published in RFC 1131, updated in RFC 1247 (version two), which
was deprecated with RFC 1583 (still OSPF version 2) and RFC 2328, April 1998.
The BSR64000 supports OSPF Version 2, RFC 2328 including the use of area
border routers (ABR), stub areas, Virtual Links and Transit areas, Autonomous
System border router (ASBR), Type 1 and 2 external routes, simple and MD5
authentication.
Also supported is the OSPF MIB (RFC 1850 - Nov 1995) and not-so-stubby areas
(NSSAs); RFC 1587, March 1994.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 5
Implementing the BSR for Basic Data Services
Module 11, Page 6
Area 0
Area 1 Area 2
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 6
Implementing the BSR for Basic Data Services
Module 11, Page 7
Initial Configuration
Basic configuration tasks include starting the OSPF routing process on your
BSR64000, specifying which interfaces will be included and grouping those
interfaces into areas.
It is possible to include externally discovered (i.e., RIP, BGP or static) routes in
OSPF, as well as to segregate routers into administrative areas. These two,
along with the forcing of the Router I.D. by using a Loopback Address are optional
implementation tasks that you may or may not do, based on your network
environment.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 7
Implementing the BSR for Basic Data Services
Module 11, Page 8
RDN> en
RDN# config
RDN(config)# router ospf
RDN(config-ospf)#
…
The router ospf command starts the OSPF routing process on the BSR64000.
This means that the routing daemon looks for indicators as to which networks to
advertise. If no networks (interfaces) are specified, then the router will not
advertise or listen for those advertisements.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 8
Implementing the BSR for Basic Data Services
Module 11, Page 9
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 9
Implementing the BSR for Basic Data Services
Module 11, Page 10
OSPF Initialization
After a router is assured that its interfaces are functioning, it uses the OSPF Hello
protocol to acquire neighbors, which are routers with interfaces to a common
network. The Hello Protocol is responsible for establishing and maintaining
neighbor relationships. It also ensures that communication between neighbors is
bi-directional. The router sends hello packets to its neighbors and receives their
hello packets. Bi-directional communication is indicated when the router sees
itself listed in the neighbor's Hello Packet. In addition to helping acquire
neighbors, hello packets also act as keep-alives to let routers know that other
routers are still functional.
The next step is different on broadcast networks, as compared to non-broadcast
networks, which we will see in a moment.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 10
Implementing the BSR for Basic Data Services
Module 11, Page 11
200.10.10.1 200.10.10.2
Priority 3 Priority 2
In an OSPF broadcast network, the mechanism used to control the size of the
Link state database and number of adjacencies is to elect a designated and
backup designated router. Two values are used , priority and router ID. The
highest Priority wins, and if there is a tie, then the highest router ID wins the
election. All routers on a broadcast network will form an adjacency with the
designated router. Routers discover neighbors through a protocol called the
“Hello” protocol. On a point to point link, you neighbor is at the other end, so there
is no need to have an election. After the election, all routers will have a full
adjacency to the designated router, but no to the other routers in the broadcast
network. The backup designated knows everything the designated router knows,
so if the designated router fails, the backup designated router can take over
immediately. The multicast addresses used are 224.0.0.5 (all SPF Routers) and
224.0.0.6 (All DRs and BDrs).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 11
Implementing the BSR for Basic Data Services
Module 11, Page 12
ÔPoint-to-point links
¾ No Designated Router
¾ Router with highest Router-ID controls initial exchange-process
192.168.1.0
Hello?
.1
POS
.2
POS
Hello?
Point to point networks are seen by OSPF as “transit” networks, because there
are no nodes other than the two connected routers on the link. When you have
point-to-point networks in your OSPF domain, the will show up twice in your IP
routing table. Once as a normal network with the corresponding mask, and once
as a “host route”. The host route will show up in the table with a mask of /32. An
example would be:
• 192.168.1.0/24 Network
• 192.168.1.2/32 Host Route
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 12
Implementing the BSR for Basic Data Services
Module 11, Page 13
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 13
Implementing the BSR for Basic Data Services
Module 11, Page 14
Examining Adjacencies
RDN> en
RDN# show ip ospf neighbor
…
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 14
Implementing the BSR for Basic Data Services
Module 11, Page 15
Neighbor States
¾ Down
» No information has been received from neighbor(s)
¾ Attempt
» Effort is made to contact the neighbor
• No information has yet been received from the neighbor
• Valid for neighbors on NBMA network
¾ Init
» Hello packet has been received form the neighbor
• Receiving router is not listed in that hello packet
¾ 2Way
» Bi-directional communication with the neighbor is established
» Beginning of adjacency
• DR/BDR are elected in this state
There are multiple steps towards building adjacencies. Fully adjacent routers will
have the same link state database.
Routers within non-broadcast multi-access networks, such as Frame Relay and
X.25 will reflect the Attempt State when no recent information has been received
from a neighbor. An effort will be made to contact the neighbor by sending Hello
packets at a reduced rate.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 15
Implementing the BSR for Basic Data Services
Module 11, Page 16
¾ Exstart
» Used in deciding the DBD sync, which router will be
master/slave and what will be the first sequence number for
DBD packet
¾ Exchange
» In this state the router describes the entire link state database
through the DBD packet, each DBD sequence is explicitly
acked, only one DBD packet is allowed outstanding at one
time, link state request packets are also sent to request the
newer LSA
¾ Loading
» In this state, link-state request packets are requested for the
more recent LSA that have not been received during Exchange
¾ Full
» In this state complete information has been exchanged
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 16
Implementing the BSR for Basic Data Services
Module 11, Page 17
RDN> en
RDN# config
RDN(config)# router ospf
RDN(conifg-ospf)# network 192.168.50.0 0.0.0.255 area 0
RDN(config-ospf)# network 200.20.20.1 0.0.0.0 area 0
…
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 17
Implementing the BSR for Basic Data Services
Module 11, Page 18
Wildcard masks are used to cut down the number of network statements that are
entered after enabling OSPF routing. The Wildcard masks are also called inverse
masks, as they appear to work inverse to subnet masks. They aren’t hard. Just
remember that 1’s mean “I don’t care”, and 0’s mean “oh, this is important”.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 18
Implementing the BSR for Basic Data Services
Module 11, Page 19
RDN> en
RDN# conf
RDN(config)# int loopback 1
RDN(config-if)# ip address 200.20.20.1 255.255.255.0
…
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 19
Implementing the BSR for Basic Data Services
Module 11, Page 20
OSPF Areas
Network 5
Network 3
Network 1 Router1
Router 3
OSPF allows you to break up your inter-network into Areas. Remember, an area
is collection of routers and networks that have the same area ID. The purpose of
an area is to cut down the amount of routing information that a router has to keep
in its’ routing table. Areas allow for summarization, so that many known networks
might be advertised as a single route. Additionally, flooding of LSAs is contained
within the area and does not affect other areas which saves on bandwidth. The
end result is smaller routing tables in other areas. To take advantage of this
feature, a network administrator has to give some thought to the network
addressing in each area, so that the addresses lend themselves to the
summarization process.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 20
Implementing the BSR for Basic Data Services
Module 11, Page 21
RDN> en
RDN# conf
RDN(config)# router ospf
RDN(config-ospf)# network 192.168.50.4 0.0.0.0 area 3
…
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 21
Implementing the BSR for Basic Data Services
Module 11, Page 22
Area 0
Backbone
internal
ASBR
Internal
Area 1 Area 2
External
Network
Internal routers have all their interfaces in the same area. Backbone routers that
sit on the perimeter of the backbone area. They have at least one interface
connected to area 0. Area border routers (ABRs) have interfaces connected to
multiple areas. ABRs are exit points for the area, which means routing
information destined for another area can only get there via the local areas ABR.
Autonomous System Border Routers (ASBRs) have at least one interface into an
external inter-network (autonomous system), such as a RIP based network.
These routers can import or export (called redistribution) non-OSPF network
information into the OSPF network, or advertise OSPF networks into the RIP
inter-network. As you can see from the diagram, a router can act as more than
one specific router type.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 22
Implementing the BSR for Basic Data Services
Module 11, Page 23
Type 5 ASBRs
Type 7 ABRs
A router has a separate LSDB for each area it belongs to. All routers belonging to
the same area have identical LSDBs. The LSDB is used by each router to
calculate which routes are entered into the routing table. Type 1 LSAs are
generated by each router for each area it belongs. They describe the states of the
routers links to the area, and are only flooded within an area.
Type 2 LSAs are generated by DRs (In a broadcast network), and describe the set
of routers attached to a particular network. They are flooded in the area that
contains the network.
Type 3 LSAs (called summary LSAs) are generated by Area Border Routers, and
describe inter-area routes to various networks (IA).
Type 4 LSAs (also considered summary LSAs) describe links to Autonomous
System Border (Boundary) routers and are also generated by Area Border
Routers. (IA)
Type 5 LSAs are generated by ASBRs. They describe routes to destinations to
the Autonomous System (Internetwork). They are flooded everywhere, with the
exception of Stub areas.
Type 7 LSAs are generated by ABRs. They describe routes within the Not So
Stubby Area. They can be summarized and converted to type 5 LSAs by the
ABRs. After conversion, they will be flooded to areas that can support type 5
LSAs.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 23
Implementing the BSR for Basic Data Services
Module 11, Page 24
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 24
Implementing the BSR for Basic Data Services
Module 11, Page 25
RDN> en
RDN# sh ip ospf database
…
Showing the OSPF database shows information on all directly connected and
OSPF learned routes only. This database is also known as the routing
information base (RIB). It is this database that is consulted by the routing table
manager (RTM) to decide which routes are actually put in the Routing table, also
known as the forwarding information base (FIB).
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 25
Implementing the BSR for Basic Data Services
Module 11, Page 26
RDN> en
RDN# sh ip route
Codes: C - connected, S - static, R - RIP, B - BGP
i - IS-IS derived L1-IS-IS level-1 route, L2- IS-IS level 2 route
O - OSPF, IA - OSPF inter area, N1 - OSPF NSSA external type 1
N2 - OSPF NSSA external type 2, E1 - OSPF external type 1
E2 - OSPF external type 2, * - candidate default
C 192.168.10.0/24 is directly connected, ethernet 7/0
R 192.168.12.0/24 [120/2] via 192.168.10.10, ethernet 7/0
C 200.20.20.0/24 is directly connected, loopback 1
R 200.30.30.0/24 [120/2] via 192.168.10.30, ethernet 7/0
O 200.40.40.0/24 [110/2] via 192.168.10.40, pos 4/0
Showing the routing table gives you information about how forwarding decisions
are being made. This is the table that is used to route packets. In contrast, the
RIB is used to store information about all RIP learned routes, whether best route
or not. The reason for this, is a network or interface failure. By having other
routes in the database, a substitute route can be moved to the routing table, until a
better route appears in the RIB.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 26
Implementing the BSR for Basic Data Services
Module 11, Page 27
Route Redistribution
RDN> en
RDN# conf
RDN(config)# router ospf
RDN(config-ospf)# redistribute rip
…
Type 1 metrics are comparable to the link state metrics. Link costs are added as
if it were an area route being advertised by the ABR.
Type 2 metrics are assumed to be larger than the cost of any intra-AS path.
When redistributing a rip route, you assign a metric value which is higher than any
Intra-AS path.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 27
Implementing the BSR for Basic Data Services
Module 11, Page 28
RDN> en
RDN# config
RDN(config)# no router ospf
RDN(router)#
…
The router ospf command starts the OSPF routing process on the BSR64000.
This means that the routing daemon looks for indicators as to which networks to
advertise. If no networks (interfaces) are specified, then the router will not
advertise or listen for those advertisements.
MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other
product or service names are the property of their respective owners. © Motorola, Inc. 2002.
Page 28