Highly Integrated Media Access Control

ABSTRACT

A supervisory communications device, such as a headend device within a communications network, monitors and controls communications with a plurality of remote communications devices throughout a widely distributed network. The supervisory device allocates bandwidth on the upstream channels by sending MAP messages over its downstream channel. A highly integrated media access controller integrated circuit (MAC IC) operates within the headend to provide lower level processing on signals exchanged with the remote devices. The enhanced functionality of the MAC IC relieves the processing burden on the headend CPU and increases packet throughput. The enhanced functionality includes header suppression and expansion, DES encryption and decryption, fragment reassembly, concatenation, and DMA operations.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 12/763,372, filed Apr. 20, 2010, which is a continuation of U.S. patent application Ser. No. 10/254,764, filed Sep. 26, 2002, which claims the benefit of U.S. Provisional Application No. 60/324,939, filed Sep. 27, 2001, the contents of all of which are incorporated herein by reference in their entireties.

The following United States and PCT utility patent applications have a common assignee and contain some common disclosure:

“Method and System for Flexible Channel Association,” U.S. application Ser. No. 09/963,671, by Denney et al., filed Sep. 27, 2001, incorporated herein by reference;

“Method and System for Upstream Priority Lookup at Physical Interface,” U.S. application Ser. No. 09/963,689, by Denney et al., filed Sep. 27, 2001, incorporated herein by reference;

“System and Method for Hardware Based Reassembly of Fragmented Frames,” U.S. application Ser. No. 09/960,725, by Horton et al., filed Sep. 24, 2001, incorporated herein by reference;

“Method and Apparatus for the Reduction of Upstream Request Processing Latency in a Cable Modem Termination System,” U.S. application Ser. No. 09/652,718, by Denney et al., filed Aug. 31, 2000, incorporated herein by reference;

“Hardware Filtering of Unsolicited Grant Service Extended Headers,” U.S. application Ser. No. 60/324,912, by Pantelias et al., filed Sep. 27, 2001, incorporated herein by reference;

“Packet Tag for Support of Remote Network Function/Packet Classification,” U.S. application Ser. No. 10/032,100, by Grand et al., filed Dec. 31, 2001, incorporated herein by reference; and

“Method and Apparatus for Interleaving DOCSIS Data with an MPEG Video Stream,” U.S. application Ser. No. 09/963,670, by Dworkin et al., filed Sep. 27, 2001, incorporated herein by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates generally to communications networking, and more specifically, to media access control processing within a communications network.

2. Related Art

In recent years, cable network providers have expanded the variety of services offered to their subscribers. Traditionally, cable providers, for instance, delivered local and network broadcast, premium and pay-for-view channels, and newscasts into a viewer's home. Some modern cable providers have augmented their portfolio of services to include telephony, messaging, electronic commerce, interactive gaming, and Internet services. As a result, system developers are being challenged to make available adequate bandwidth to support the timely delivery of these services.

Moreover, traditional cable broadcasts primarily require one-way communication from a cable service provider to a subscriber's home. However, as interactive or personal television services and other nontraditional cable services continue to strive, communications media used to support one-way communications must now contend with an increased demand for bi-directional communications. This results in a need for improved bandwidth arbitration among the subscribers' cable modems.

In a cable communications network, for example, a communications device (such as a modem) requests bandwidth from a headend device prior to transmitting data to its destination. Thus, the headend device serves as a centralized point of control for allocating bandwidth to the communications devices. Bandwidth allocation can be based on availability and/or competing demands from other communications devices. As intimated above, bandwidth typically is available to transmit signals downstream to the communications device. However in the upstream, bandwidth is more limited and must be arbitrated among the competing communications devices.

A cable network headend includes a cable modem termination system (CMTS) which comprises a media access controller (MAC) and central processing unit (CPU). The MAC receives upstream signals from a transceiver that communicates with remotely located cable modems. The upstream signals are delivered to the CPU for protocol processing. The protocol processing is conventionally defined by the Data Over Cable Service Interface Specification (DOCSIS™) for governing cable communications. Depending on the nature of the protocol processing, the CPU must be able to handle these operations efficiently and timely as to not impede performance. As more subscribers and/or services are added to the network, greater emphasis is placed on the MAC and CPU to sustain protocol processing with no interruption in service.

Therefore, a system and method that increase packet throughput capacity and sustain performance are needed to address the above problems.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

The accompanying drawings, which are incorporated herein and form part of the specification, illustrate the present invention and, together with the description, further serve to explain the principles of the invention and to enable a person skilled in the pertinent art to make and use the invention. In the drawings, like reference numbers indicate identical or functionally similar elements. Additionally, the leftmost digit(s) of a reference number identifies the drawing in which the reference number first appears.

FIG. 1 illustrates a voice and data communications management system according to an embodiment of the present invention.

FIG. 2 illustrates a media access controller according to an embodiment of the present invention.

FIG. 3 illustrates a media access controller according to another embodiment of the present invention.

FIG. 4 illustrates a media access controller according to another embodiment of the present invention.

FIG. 5 illustrates an egress postprocessor according to an embodiment of the present invention.

FIG. 6 illustrates an I/O arbitrator according to an embodiment of the present invention.

FIG. 7 illustrates a media access controller according to another embodiment of the present invention.

FIG. 8 illustrates an ingress processor according to an embodiment of the present invention.

FIG. 9 illustrates an ingress processor, MAP extract, and PHY MAP interface according to another embodiment of the present invention.

FIG. 10 illustrates an OOB ingress processor according to another embodiment of the present invention.

FIG. 11 illustrates a media access controller with a bypass DMA according to an embodiment of the present invention.

FIG. 12 illustrates a media access controller with FFT DMA according to an embodiment of the present invention.

FIG. 13 illustrates a media access controller according to another embodiment of the present invention.

DETAILED DESCRIPTION OF THE INVENTION I. Introduction

FIG. 1 illustrates a voice and data communications management system 100 according to an embodiment of the present invention. System 100 includes a supervisory communications node 106 and one or more widely distributed remote communications nodes 102 a-102 n (collectively referred to as “remote communications nodes 102”). System 100 can be implemented in any multimedia distribution network. Furthermore, it should be understood that the method and system of the present invention manage the exchange of voice, data, video, audio, messaging, graphics, other forms of media and/or multimedia, or any combination thereof.

Supervisory communications node 106 is centrally positioned to command and control interactions with and among remote communications nodes 102. In an embodiment, supervisory communications node 106 is a component of a headend controller, such as a cable modem termination system (CMTS) or a part thereof. In an embodiment, at least one remote communications node 102 is a cable modem or a part thereof In another embodiment, supervisory communications node 106 is a CMTS and at least one remote communications node 102 is a component of a television set-top box.

As part of a cable modem, remote communications node 102 is configurable to host one or more services to a subscriber. The services include telephony, television broadcasts, pay-for-view, Internet communications (e.g., WWW), radio broadcasts, facsimile, file data transfer, electronic mailing services (email), messaging, video conferencing, live or time-delayed media feeds (such as, speeches, debates, presentations, infomercials, news reports, sporting events, concerts, etc.), or the like.

Each remote communications node 102 is assigned one or more service identifier (SID) codes that supervisory communications node 106 uses to allocate bandwidth. A SID is used primarily to identify a specific flow from a remote communications node 102. However, as apparent to one skilled in the relevant art(s), other identifiers can be assigned to distinguish between the remote communications node 102 and/or the flow of traffic therefrom. Accordingly, in an embodiment, a SID or another type of identifier is assigned to identify a specific service affiliated with one or more remote communications nodes 102. In an embodiment, a SID or another type of identifier is assigned to designate a particular service or group of services without regard to the source remote communications node 102. In an embodiment, a SID or another type of identifier is assigned to designate a quality of service (QoS), such as voice or data at decreasing levels of priority, voice lines at different compression algorithms, best effort data, or the like. In an embodiment multiple SIDs are assigned to a single remote communications node.

In an embodiment, supervisory communications node 106 and remote communications nodes 102 are integrated to support protocols such as Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Real Time Transport Protocol (RTP), Resource Reservation Protocol (RSVP), or the like.

Communications management system 100 also includes an internodal infrastructure 105. As shown in FIG. 1, internodal infrastructure 105 provides interconnectivity among supervisory communications node 106 and remote communications nodes 102. Internodal infrastructure 105 supports wired, wireless, or both transmission media, including satellite, terrestrial (e.g., fiber optic, copper, twisted pair, coaxial, hybrid fiber-coaxial (HFC), or the like), radio, microwave, free space optics (FSO), and/or any other form or method of transmission.

All communications transmitted in the direction from supervisory communications node 106 towards remote communications nodes 102 are referred to as being in the downstream. In an embodiment, the downstream is divided into one or more downstream channels. Each downstream channel is configured to carry various types of information to remote communications nodes 102. Such downstream information includes television signals, data packets (including IP datagrams), voice packets, control messages, and/or the like. In an embodiment, the downstream is formatted with a motion picture expert group (MPEG) transmission convergence sublayer. However, the present invention can be configured to support other data formats as would be apparent to one skilled in the relevant art. In an embodiment, supervisory communications node 106 implements time division multiplexing (TDM) to transmit continuous point-to-multipoint signals in the downstream.

The upstream represents all communications from remote communications nodes 102 towards supervisory communications node 106. In an embodiment, the upstream is divided into one or more upstream channels. Each upstream channel carries bursts of packets from remote communications nodes 102 to supervisory communications node 106. In the upstream, each frequency channel is broken into multiple assignable slots, and remote communications nodes 102 send a time division multiple access (TDMA) burst signal in an assigned slot. TDM and TDMA are described herein by way of example. It should be understood that the present invention could be configured to support other transmission modulation standards, including, but not limited to, Synchronous Code Division Multiple Access (S-CDMA), as would be apparent to one skilled in the relevant art(s).

As shown in FIG. 1, an embodiment of supervisory communications node 106 includes an upstream demodulator physical layer device (US PHY) 108, a downstream modulator physical layer device (DS PHY) 110, a media access controller (MAC) 112, a memory 114 and a software application 120. US PHY 108 forms the physical layer interface between supervisory communications node 106 and the upstream channels of internodal infrastructure 105. Hence, US PHY 108 receives and demodulates all bursts from remote communications nodes 102. In an embodiment, US PHY 108 checks the FEC field in the burst to perform error correction if required.

Conversely, DS PHY 110 forms the physical layer interface between supervisory communications node 106 and the downstream channel(s) of internodal infrastructure 105. Hence, packets (containing voice, data (including television or radio signals) and/or control messages) that are destined for one or more remote communications nodes 102 are collected at DS PHY 110 and converted to a physical signal. DS PHY 110, thereafter, transmits the signal downstream.

MAC 112 receives the upstream signals from US PHY 108 or provides the downstream signals to DS PHY 110, as appropriate. MAC 112 operates as the lower sublayer of the data link layer of supervisory communications node 106. As discussed in greater detail below, MAC 112 extracts voice, data, requests, and/or the like, and supports fragmentation, concatenation, and/or error checking for signals transported over the physical layer.

Memory 114 interacts with MAC 112 to store the signals as MAC 112 processes them. Memory 114 also stores various auxiliary data used to support the processing activities. Such auxiliary data includes security protocols, identifiers, and the like, as described in greater details below.

MAC 112 interacts with software application 120 via a conventional bi-directional bus 118. Software application 120 operates on one or more processors to receive control messages, data, and/or voice from MAC 112, and implement further processing. In embodiments, an application-specific integrated circuit (ASIC), field programmable gate array (FPGA), or a similar device provides hardware assists to enable software application 120 to support the functions of MAC 112. As shown, software application 120 includes a classifier/router 124 and a bandwidth (BW) allocation controller 128. BW allocation controller 128 manages upstream and/or downstream modulation and bandwidth allocation. Classifier/router 124 provides rules and policies for classifying and/or prioritizing communications with remote communications nodes 102. Classifier/router 124 also routes signals from remote communications nodes 102 to a destined location over backbone network 140.

Backbone network 140 is part of a wired, wireless, or combination of wired and wireless local area networks (LAN) or wide area networks (WAN), such as an organization's intranet, local internets, the global-based Internet (including the World Wide Web (WWW)), private enterprise networks, or the like. As such, supervisory communications node 106 utilizes backbone network 140 to communicate with another device or application external to communications management system 100. The device or application can be a server, web browser, operating system, other types of information processing software (such as, word processing, spreadsheets, financial management, or the like), television or radio transmitter, another remote communications node 102, another supervisory communications node 106, or the like.

II Media Access Controller

In an embodiment, MAC 112 is an integrated circuit within a CMTS (shown in

FIG. 1 as supervisory communications node 106). Accordingly, MAC 112 performs a variety of protocol processes defined by the CableLabs® Certified™ Cable Modem project, formerly known as DOCSIS™ (Data Over Cable Service Interface Specification), that defines the interface requirements for cable communications. The functions performed by MAC 112 includes interfacing with US PHY 108 and DS PHY 110, encrypting and decrypting data, storing packet data in queues, and/or DMA functions to exchange data with memory 114. Although the present invention is described in reference to DOCSIS protocol processing, it should be understood that the present invention is intended to be inclusive of other types of communication protocols governing multimedia distribution networks. However, the highly integrated MAC 112 of the present invention includes several additional functions that reduces the quantity of components within a conventional CMTS, the power consumption, the processing burden on software application 120, and/or the cost of the CMTS.

FIG. 2 shows the components of a highly integrated MAC 112 according to an embodiment of the present invention. MAC 112 includes an egress preprocessor 204, an egress postprocessor 208, a fragment reassembly controller 212, an egress memory controller 216, an ingress memory controller 220, an ingress processor 224, and an input/output (I/O) arbitrator 228. The components communicate over bus 232 a and bus 232 b (referred to collectively herein as “bus 232”). In an embodiment, bus 232 is an internal-only split transaction bus with built-in arbitration to allow the components to communicate with each other and with a shared memory interface to memory 114. It should be understood that although two buses 232 (i.e., bus 232 a and bus 232 b) are shown in FIG. 2, the present invention is adaptable to support more or fewer buses.

Egress preprocessor 204 receives signals (including voice, data, and/or bandwidth requests) from US PHY 108. Egress preprocessor 204 performs preliminary signal processing that includes prioritizing the signals. An example of preliminary signal prioritizing is described in the application entitled “Method and System for Upstream Priority Lookup at Physical Interface” (U.S. application Ser. No. 09/963,689), which is incorporated herein by reference as though set forth in its entirety. Egress preprocessor 204 interacts with egress memory controller 216 that sends the signals to queues located in memory 114. In an embodiment, egress preprocessor 204 does not send the signals to a queue, but rather passes the signals to fragment reassembly controller 212.

Fragment reassembly controller 212 interacts with egress preprocessor 204 to receive the signals from this component and/or with egress memory controller 216 to receive the signals from memory 114. Fragment reassembly controller 212 identifies fragmented frames from the signals and reassembles the frames according to instructions provided in the header frames of the signals. Defragmentation is primarily performed on data packets. However, defragmentation can also be performed on voice or requests, although such signals are rarely fragmented in practice. An example of fragment reassembly is described in the application entitled “System and Method for Hardware Based Reassembly of Fragmented Frames” (U.S. application Ser. No. 09/960,725), which is incorporated herein by reference as though set forth in its entirety.

In an embodiment, fragment reassembly controller 212 is programmable to terminate reassembly operations if error conditions are detected. Such error conditions include, for example, missing or out of sequence fragments. If such errors are detected, fragment reassembly controller 212 discards the affected frames. Nonetheless, upon completion of its processing operations, fragment reassembly controller 212 interacts with egress memory controller 216 to store the defragmented signals in queues within memory 114.

Egress postprocessing 208 performs additional processing on the signals stored in the queues of memory 114. The additional processing is explained in greater detail below. The operations implemented by egress postprocessing 208 typically occur after the signals have been evaluated and/or processed by fragment reassembly controller 212. Egress postprocessor 208 also interacts with egress memory controller 216 to store the post-processed signals in priority queues within memory 114. An example of storing signals in priority queues is described in the application entitled “Method and System for Upstream Priority Lookup at Physical Interface” (U.S. application Ser. No. 09/963,689), which is incorporated herein by reference as though set forth in its entirety.

Bus 232 a supports the transfer of signals among egress preprocessor 204, fragment reassembly controller 212, egress postprocessor 208 and egress memory controller 216 prior to processing by egress postprocessor 208. Bus 232 b however supports communication with memory controller 216 upon completion of processing by egress postprocessor 208. Bus 232 b also enables signals to be delivered to I/O arbitrator 228.

I/O arbitrator 228 manages the exchange of communications between software application 120 and MAC 112. In particular, I/O arbitrator 228 interfaces with bus 118 to deliver the signals to software application 120. I/O arbitrator 228 also receives signals from software application 120. Such signals include broadcast signals and control messages to be transported downstream. These signals are typically stored in memory 114 until MAC 112 is ready to process them. As such, ingress memory controller 220 interacts, over bus 232 b, with I/O arbitrator 228 to receive signals from software application 120 and store the signals in priority queues within memory 114.

Ingress processor 224 interacts with ingress memory controller 220 to received the downstream signals from memory 114. Ingress processor 224 formats and prepares the signals for delivery to DS PHY 110, as described in greater details below.

FIG. 3 illustrates an another embodiment of MAC 112. A separate egress preprocessor 204 (shown as egress preproccessor 204 a-204 f) is provided for each upstream channel of internodal interface 105. Although hardware configuration of this embodiment supports only six upstream channels, the present invention can support greater or lesser quantities of upstream channels as would be apparent to one skilled in the relevant art(s). As such, the present invention can utilize one egress preprocessor 204 to process signals from multiple upstream channels as shown in FIG. 2, utilize a plurality of single egress preprocessors 204 with each egress preprocessor 204 processing signals from a single upstream channel as shown in FIG. 3, or a combination of both.

FIG. 4 shows the components of egress preprocessor 204 according to an embodiment of the present invention. Egress preprocessor 204 includes a PHY interface (I/F) device 404, a decryptor (decrypt) 408, an unsolicited grant synchronization (UGS) detector 412, a header (HDR) processor 416, and a burst direct memory access (DMA) 420.

PHY I/F 404 receives signals (i.e., voice, data and/or requests) from US PHY 108. In an embodiment, PHY I/F 404 prioritizes the signals based on source and/or service. This is implemented by utilizing the SID and/or some other type of node or flow identifier. In an embodiment, PHY I/F 404 checks the header checksum (HCS) field in the burst to perform error detection, if required. In another embodiment, PHY I/F 404 checks the cyclic redundancy check (CRC) field in the burst for error detection.

Decrypt 408 receives signals from PHY I/F 404 and performs decryption. In an embodiment, decrypt 408 performs data encryption standard (DES) decryption. In another embodiment, decrypt 408 performs advanced encryption standard (AES) decryption. Other decryption standards can be used, including but not limited to public-key encryption, as would be apparent to one skilled in the relevant art(s).

Depending on the security protocol that is being deployed, decrypt 408 extracts intelligence information from the signal, and processes the intelligence information for decrypting the signal. In an embodiment, a baseline privacy interface (BPI) protocol is used to encrypt upstream bursts. Similarly, a BPI protocol secures downstream bursts to restrict access to authorized subscribers. However, other security protocols can be used, including but not limited to, security system interface (SSI), removable security module interface (RSMI), or the like.

As such, in an embodiment, decrypt 408 checks a BPI field in each signal to detect whether the BPI field is enabled. If the BPI field is disabled, the signal passes to UGS detector 412 and HDR processor 416. Otherwise, decrypt 408 requests and receives key information from egress lookup controller 424. Egress lookup controller 424 queries egress memory controller 216 and, therefore, memory 114 for the key information. Upon receipt of the key information, decrypt 408 compares the BPI sequence number in the signal header with the stored key information, and decrypts the signal based on the key information Decrypt 408 then passes the signal to UGS detector 412 with information specifying whether there is a mismatch.

On receipt, UGS detector 412 checks the signal for a UGS extended header. If found, UGS detector 412 queries egress lookup controller 424 for a UGS header value retrieved with the key information requested by decrypt 408. UGS detector 412 compares the UGS extended header with the UGS header value. If the two UGS headers do not match, UGS detector 412 sends a write request to memory 114 to update the stored UGS header value. An example of a method and system for checking a UGS extended header are described in the application entitled “Hardware Filtering of Unsolicited Grant Service Extended Headers” (U.S. application Ser. No. 60/324,912), which is incorporated herein by reference as though set forth in its entirety. Irrespective, UGS detector 412 passes the signal to HDR processor 416 and informs HDR processor 416 whether the two UGS headers match.

HDR processor 416 processes headers from the signals to extract requests. An exemplary process for extracting signals for sending on an alternative path is described in the application entitled “Method and Apparatus for the Reduction of Upstream Request Processing Latency in a Cable Modem Termination System” (U.S. application Ser. No. 09/652,718), which is incorporated herein by reference as though set forth in its entirety. HDR processor 416 sends the requests to request queue DMA 428. HDR processor 416 also forwards to request queue DMA 428 any information relating to mismatches detected in the UGS extended header and/or decryption key sequence number. Request queue DMA 428 accumulates the requests, UGS extended header mismatches, and/or decryption key sequence number mismatches from all six upstream channels, and sends the information to egress memory controller 216 for delivery to a request upstream egress queue located in memory 114.

HDR processor 416 delivers the data and/or voice payloads to burst DMA 420. In an embodiment, HDR processor 416 performs deconcatenation on the payload frames prior to sending the frames to burst DMA 420. Burst DMA 420 sends the payload frames to egress memory controller 216 for delivery to queues in memory 114.

As discussed, egress lookup controller 424 performs lookup operations by querying memory 114 (via egress memory controller 216) to retrieve BPI key information, and check BPI key sequence number for mismatches. Egress lookup controller 424 also retrieves UGS extended header information, and compares the information to the UGS extended header in the current signal for mismatches.

FIG. 5 shows the components of egress postprocessor 208 according to an embodiment of the present invention. Egress postprocessor 208 includes a HDR postprocessor 504, a payload header suppression/expansion (PHS) processor 508, and packet DMA 510.

HDR postprocessor 504 evaluates the reassembled fragmented frames and performs deconcatenation, as required. PHS processor 508 fetches the relevant PHS rules to expand payload header suppressed packets. In an embodiment, PHS processor 508 expands packets suppressed according to DOCSIS Payload Header Suppression. In another embodiment, PHS processor 508 expands packets suppressed by the Propane™ PHS technology available from Broadcom Corporation of Irvine, Calif.

Packet DMA 510 receives the frame from PHS processor 508. Packet DMA 510 sends the processed frames to egress memory controller 216 for delivery to output queues in memory 114.

FIG. 6 shows the components of I/O arbitrator 228 according to an embodiment of the present invention. I/O arbitrator 228 enables signals to be exchanged over a packet port 118 a and a PCI port 118 b.

Packet port 118 a interacts with a MAC 616, packet port ingress manager 612, and a packet port egress manager 604. In an embodiment, MAC 616 is configured to support an Ethernet data interface. However, MAC 161 can be any other type of high-speed data interface for moving packets in and out of MAC 112.

Packet port egress manager 604 arbitrates among the upstream priority queues destined for packet port 118 a. More specifically, memory 114 includes packet port-destined, upstream priority queues. Packet port egress manager 604 interacts with egress memory controller 216 to retrieve packets from the upstream priority queues, and deliver the data to MAC 616. MAC 616 delivers the signal to packet port 118 a over a gigabit media independent interface (GMII interface). It should be understood that a GMII interface is provided by way of example. In alternative embodiments, MAC 616 delivers the signal over other types of interfaces.

MAC 616 also receives signals from packet port 118 a, and delivers them to packet port ingress manager 612. Packet port ingress manager 612 sends the signals to ingress memory controller 220 to store the signals in downstream priority queues in memory 114. In an embodiment, the downstream signals are stored according to a DET tag specified in the signals. An example of a method and system for packet tag processing are described in the application entitled “Packet Tag for Support of Remote Network Function/Packet Classification” (U.S. application Ser. No. 10/032,100), which is incorporated herein by reference as though set forth in its entirety.

PCI port 118 b interacts with a PCI bus interface unit (BIU) 636, a PCI DMA 632, a PCI bridge 640, a PCI egress manager 620, and a PCI ingress manager 624. PCI egress manager 620 arbitrates among the upstream priority queues destined for packet port 118 b. More specifically, memory 114 includes PCI-destined, upstream priority queues. PCI egress manager 620 interacts with egress memory controller 216 to retrieve packets from the upstream priority queues, and deliver the data to PCI DMA 632.

PCI ingress manager 624 receives downstream signals brought into MAC 112 by PCI DMA 632. PCI ingress manager 624 sends them to ingress memory controller 220 to store the signals in downstream, priority queues in memory 114. In an embodiment, the downstream signals are stored according to a PCI descriptor specified in the signals.

PCI DMA 632 acts as a PCI master to move data between MAC 112 and software application 120. PCI DMA 632 interacts with PCI BIU 636 which interfaces with the physical layer of 118 b.

PCI bridge 640 processes all PCI transactions where MAC 112 is the target of the transaction. All accesses by software application 120 to the PCI registers or PCI memories of MAC 112 pass through PCI bridge 640.

FIG. 7 shows the components of ingress processor 224 according to an embodiment of the present invention. Ingress processor 224 includes a downstream PHY I/F 702, a multiplexer (MUX) 704, a timestamp generator 706, a MPEG video input 708, a MPEG encapsulator 710, a downstream processor 712, and an in-band DMA 714.

In-band DMA 714 interfaces with bus 232 b to interact with other components of MAC 112. For instance, in-band DMA 714 interacts with ingress memory controller 220 to retrieve downstream signals from the downstream priority queues of memory 114. In-band DMA 714 also interacts with ingress memory controller 220 to fetch PHS rules and DES keys from memory 114, as needed by other components of ingress processor 224.

Downstream processor 712 receives signals from in-band DMA 714. As described in further detail below, downstream processor 712 processes and/or formats the signals to be transmitted downstream to a destined remote communications node 102.

Timestamp generator 706, MPEG encapsulator 710, and MPEG video input 708 perform DOCSIS downstream transmission convergence sublayer functions. Specifically, MPEG encapsulator 710 receives the signals from downstream processor 712, and performs MPEG encapsulation. Timestamp generator 706 provides timestamp message generation. Additionally, MPEG video input 708 receives MPEG video frames, if so configured. An example of a method and system for interleaving MPEG video frames with data are described in the application entitled “Method and Apparatus for Interleaving DOCSIS Data with an MPEG Video Stream” (U.S. application Ser. No. 09/963,670), which is incorporated herein by reference as though set forth in its entirety.

MUX 704 receives and multiplexes the MPEG-formatted signals, timestamps and MPEG video frames. MUX 704 delivers the MPEG frames to downstream PHY I/F 702. Downstream PHY I/F 702 delivers the MPEG frames to the external DS PHY 110.

As intimated, downstream processor 712 receives the downstream signals from in-band DMA 714, and processes the signals according to various DOCSIS protocols, such as header creation, header suppression, and/or encryption. FIG. 8 shows an alternative embodiment of ingress processor 224 that includes another embodiment of downstream processor 712. In this embodiment, downstream processor 712 includes an encryptor 802, a HDR processor 804, and a PHS processor 806.

PHS processor 806 receives the downstream signals and fetches the relevant PHS rules to suppress the packet headers. In an embodiment, PHS processor 806 performs DOCSIS Payload Header Suppression as specified by a downstream PCI descriptor or Packet Port DET tag from the signal.

HDR processor 804 receives the signals from PHS processor 806 and creates a DOCSIS header. The header is created according to a downstream PCI descriptor or Packet Port DET tag stored with the signal. HDR processor 804 also generates HCS and/or CRC fields for error detection. A CRC field is always generated when PHS is performed.

Encryptor 802 performs DES encryption on the signals from HDR processor 804. If a BPI security protocol is being used, encryptor 802 fetches DES keys to perform encryption.

FIG. 9 shows another embodiment of MAC 112 that includes a MAP extract 904 and an upstream PHY MAP interface 916. More specifically, FIG. 9 illustrates the interaction between ingress processor 224, MAP extract 904 and upstream PHY MAP interface 916. In an embodiment, MAP extract 904 monitors the downstream signals as they are being processed within ingress processor 224. As described above, the downstream signals include data and/or voice packets, control messages, or the like. The control messages include MAP messages intended for remote communications node(s) 102. The MAP messages, like other types of downstream signals, are delivered to MPEG encapsulator 710 for additional downstream formatting and subsequent transmission to the designated remote communications node(s) 102, as previously discussed.

If, during the monitoring operations of MAP extract 904, MAP messages are detected, MAP extract 904 receives the MAP messages from the downstream path controlled by ingress processor 224. MAP extract 904 processes and/or forwards the MAP messages according to various protocols. Primarily, the MAP messages are delivered to upstream PHY MAP interface 916. Upstream PHY MAP interface 916 interacts with timestamp generator 706 to receive timing information that is included with the MAP message. Subsequently, upstream PHY MAP interface 916 passes this information to US PHY 108. US PHY 108 uses this information, which includes slot assignments, boundaries, and timing, to plan for the arrival of upstream bursts.

MAP extract 904 is also connected to a master-slave interface that enables MAC 112 to operate in a master or slave mode. An example of a MAC capable of operating in master or slave mode is described in the application entitled “Method and System for Flexible Channel Association” (U.S. application Ser. No. 09/963,671), which is incorporated herein by reference as though set forth in its entirety.

In master mode, MAC 112 provides MAP messages to other slave devices to control their upstream channels. As such, MAP extract 904 detects MAP messages from ingress processor 224 and send to the slave devices. These MAP messages are transported out the MAP Master interface to the slave devices.

Conversely, MAC 112 is operable to function in slave mode. As such MAP extract 904 receives MAP messages from a Master MAC 112 (not shown) from the MAP Slave interface. Additionally, the MAP messages are delivered to upstream PHY MAP interface 916, so that US PHY 108 can plan for the arrival of the associated upstream bursts. Hence, MAP extract 904 parses MAP messages from both the downstream path of ingress processor 224 and the MAP Slave interface.

FIG. 10 shows another embodiment of MAC 112 that includes an outof-band (OOB) ingress processor 1002. OOB ingress processor 1002 includes an OOB PHY I/F 1004, and an OOB generator 1008.

OOB generator 1008 interacts with ingress memory controller 220 over bus 232 b to retrieve signals from a downstream OOB queue located in memory 114. On receipt of the OOB signals, OOB generator 1008 performs protocol operations as specified by a downstream PCI descriptor or Packet Port DET tag include with the signal. OOB PHY I/F 1004 receives the signal from OOB generator 1008, and delivers the signal to an external OOB PHY device (not shown) over an OOB interface.

FIG. 11 shows another en bodiment of MAC 112 that includes a bypass DMA 1104. PHY I/F 404 detects signals having a bypass field enabled and forwards the signals directly to bypass DMA 114. Bypass DMA 114 interacts with egress memory controller 216 to deliver the bypass signals, exactly as received, to bypass upstream egress queues located in memory 114. Signals delivered to the bypass upstream egress queues via this path do not undergo DOCSIS processing of any kind. Bypass DMA 114 can be used, for example, for testing and/or debugging. In an embodiment, signals are sampled and tested and/or debugged per SID at a periodically programmable rate.

FIG. 12 shows another embodiment of MAC 112 that includes a FFT DMA 1204. FFT DMA 1204 receives FFT signals from an external upstream PHY device (not shown) on a FFT interface. FFT DMA 1204 interacts with egress memory controller 216 to deliver the FFT signals to FFT upstream egress queues located in memory 114.

FIG. 13 shows another embodiment of MAC 112 that includes several components described in FIGS. 2-12 above. Reference characters “A-H” illustrate the interaction between MAC 112 and other components of supervisory communications node 106. Accordingly in FIG. 13, reference character “A” illustrates US PHY 108, “B” illustrates a SPI interface as described below, “C” illustrates an OOB interface as described above, “D” illustrates a MAP master interface as described above, “E” illustrates a MAP slave interface as described above, “F” illustrates memory 114, “G” illustrates DS PHY 110, and “H” illustrates software application 120.

Bus 232 b is shown in FIG. 13 as bus 232 b(1) and bus 232(b)(2). Bus 232 b(1) arbitrates communication of upstream signals that have been processed by egress postprocessor 208. Bus 232 b(2) arbitrates communication of downstream signals with ingress processor 224 and OOB ingress processor 1002.

Several bus bridges are provided to enable the components to use the other buses, as required. Bus 0-1 bridge 1302 provides interconnectivity between bus 232 a and bus 232 b(1). Bus 0-2 bridge 1304 provides interconnectivity between bus 232 a and bus 232 b(2). Bus 1-2 bridge 1306 provides interconnectivity between bus 232 b(1) and 232 b(2). These bridges allow communication between components on different bus segments.

Auxiliary processor 1308 is included to enable additional features, including a serial peripheral interface (SPI) processor 1310 and a clock/GPIO 1312. SPI processor 1310 receives and/or transmits signals over a SPI port that allows for enhanced inputs and outputs. Clock/GPIO 1312 supports synchronization and/or reset operations.

As discussed above, MAC 112, in embodiments, is a single integrated circuit. As such, each component of MAC 112, as described above with reference to FIGS. 2-13, is formed on or into a single microchip that is mounted on a single piece of substrate material, printed circuit board, or the like. In an embodiment, one or more components of MAC 112 are formed on or into a distinct secondary circuit chip (also referred to as a “daughter chip”), and later mounted on a primary integrated circuit chip. Thus, the primary chip is a single package containing all components of MAC 112, which includes one or more daughter chips.

Referring back to FIG. 1, US PHY 108, DS PHY 110, and MAC 112 are shown as separate components of supervisory communications node 106. However, in embodiments of the present invention (not shown), US PHY 108 and DS PHY 110 are components of MAC 112. Therefore, US PHY 108 and DS PHY 110 are integrated into the single integrated circuit containing the other components of MAC 112.

It should be understood that although only one memory 114 is shown in FIG. 1, the present invention is adaptable to support multiple memories. In an embodiment, memory 114 includes two upstream SDRAMs and one downstream SDRAMs. However, each upstream SDRAM primarily is used for distinct operations. For instance, one upstream SDRAM interfaces with egress memory controller 216 a and stores signals and/or auxiliary information to support the operations of egress preprocessor 204, fragment reassembly 212, egress postprocessor 208, bypass DMA 1104 and/or FFT DMA 1204. The second upstream SDRAM, for example, interfaces with egress memory controller 216 b and stores signals and/or auxiliary information to support the operations of request queue DMA 428, egress postprocessor 208, and/or I/O arbitrator 228.

The downstream SDRAM primarily stores downstream signals and auxiliary information to support the operations of I/O arbitrator 228, ingress processor 224, MAP extract 904, 00B ingress processor 1002, and/or auxiliary processor 1308.

As discussed, the bus bridges (1302, 1304, and 1306) allow communication between components on different bus segments. For instance, bus 0-1 bridge 1302 enables the use of a single egress memory controller 216 to access a single upstream SDRAM (i.e., memory 114). In another example, the bus bridges are used to allow the PCI target bridge 640 to access registers from components connected to bus 232 a and/or bus 232 b.

In an embodiment, memory 114 collects egress and ingress statistics to support DOCSIS OSSI Management Information Base (MIB) requirements. MAC 112 and memory 114 gather and store statistics per SID and/or on a particular channel or link. The statistics include the quantity of bits/bytes received, the quantity of packets received, the quantity of HCS errors, the quantity of CRC errors, and the like.

As discussed, memory 114 of the present invention include various distinct queues used to support the enhanced operations of MAC 112. The queues include a DOCSIS high priority queue based on SID lookup, and/or a DOCSIS low priority queue based on SID lookup. An example of SID-lookup priority queues is described in the application entitled “Method and System for Upstream Priority Lookup at Physical Interface” (U.S. application Ser. No. 09/963,689), which is incorporated herein by reference as though set forth in its entirety. Other priority queues of the present invention include a ranging messages queue, a non-ranging management messages queue, a bypass DMA queue, a requests queue, a FFT queue, and/or a pass-through queue (e.g., a PCI-to-Packet Port queue, and/or a Packet Port-to-PCI queue). The above nine queues are not intended to be exclusive. As would be apparent to one skilled in the relevant art(s), additional or fewer queues, memories, and/or memory controllers can be implemented and are considered to be within the scope of the present invention.

III. Conclusion

FIGS. 1-13 are conceptual illustrations that allow an easy explanation of the present invention. That is, the same piece of hardware or module of software can perform one or more of the blocks. It should also be understood that embodiments of the present invention can be implemented in hardware, software, or a combination thereof. In such an embodiment, the various components and steps would be implemented in hardware and/or software to perform the functions of the present invention.

While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example, and not limitation. It will be apparent to persons skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. Moreover, it should be understood that the method and system of the present invention should not be limited to transmissions between cable modems and headends. The present invention can be implemented in any multi-nodal communications environment governed by a centralized node. The nodes can include communication gateways, switches, routers, Internet access facilities, servers, personal computers, enhanced telephones, personal digital assistants (PDA), televisions, set-top boxes, or the like. Thus, the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents. 

1. An apparatus to process an ingress signal within a media access controller integrated circuit (MAC IC), comprising: an ingress processor configured to format the ingress signal for delivery of information data to a destination node, the ingress processor including: a direct memory access unit configured to receive the ingress signal from a memory; and a downstream processor configured to format the received ingress signal according to a transmission protocol associated with the destination node to provide a formatted signal, the downstream processor including: a payload header suppressor configured to receive a packet header along with the ingress signal, and to suppress the packet header based on information included in the ingress signal; and a header processor configured to create a new header based on the information.
 2. The apparatus according to claim 1, wherein the direct memory access unit is configured to receive the ingress signal from the memory based on a priority queue of signals stored in the memory.
 3. The apparatus according to claim 1, wherein the downstream processor further comprises: an encryptor configured to encrypt the new header based on an applied security protocol using encryption keys.
 4. The apparatus according to claim 1, wherein the header processor is configured to generate a header checksum (HCS) field and a cyclic redundancy check (CRC) field for error correction.
 5. The apparatus according to claim 1, wherein the header processor is configured to generate the HCS field and the CRC field every time the payload header suppressor suppresses the header packet.
 6. The apparatus according to claim 1, further comprising: an extract unit configured to detect a presence of a control message in the ingress signal, to extract the control message from the ingress signal when the presence of the control message is detected, and to transmit the extracted control message to an upstream physical interface.
 7. The apparatus according to claim 6, wherein the control message includes a message designated for the destination node.
 8. The apparatus according to claim 6, wherein the upstream physical interface is configured to receive the extracted control message and to receive timing information included in the control message from a time stamp generator, wherein the timing information is used to plan arrival of upstream bursts.
 9. The apparatus according to claim 8, wherein the timing information includes slot assignments, boundaries, and timings associated with the arrival of upstream bursts.
 10. The apparatus according to claim 1, further comprising: a multiplexer; an encapsulator configured to encapsulate the formatted signal to provide an encapsulated signal to the multiplexer; a time stamp generator configured to provide a time stamp to the multiplexer; and a data input unit configured to provide the information data to the multiplexer.
 11. An apparatus to process an ingress signal within a media access controller integrated circuit (MAC IC), comprising: means for formatting the ingress signal for delivery of information data to a destination node, the means for formatting the ingress signal including, means for receiving the ingress signal from a memory; and means for formatting the received ingress signal according to a transmission protocol associated with the destination node to provide a formatted signal, the means for formatting the received ingress signal including: means for receiving a packet header along with the ingress signal, and for suppressing the packet header based on information included in the ingress signal; and means for creating a new header based on the information included in the ingress signal.
 12. The apparatus according to claim 11, wherein the means for receiving the ingress signal receives the ingress signal from the memory based on a priority queue of signals stored in the memory.
 13. The apparatus according to claim 11, wherein the means for formatting the received ingress signal further comprises: means for encrypting the new header based on an applied security protocol using encryption keys.
 14. The apparatus according to claim 11, wherein the means for creating the new header generates a header checksum (HCS) field and a cyclic redundancy check (CRC) field for error correction.
 15. The apparatus according to claim 11, wherein the means for creating the new header generates the HCS field and the CRC field every time the means for receiving the packet header suppresses the header packet.
 16. The apparatus according to claim 11, further comprising: means for detecting a presence of a control message in the ingress signal, for extracting the control message from the ingress signal when the presence of the control message is detected, and for transmitting the extracted control message to a means for interfacing an upstream.
 17. The apparatus according to claim 16, wherein the control message includes a message designated for the destination node.
 18. The apparatus according to claim 16, wherein the means for interfacing the upstream receives the extracted control message, and receives timing information included in the control message from a time stamp means, wherein the timing information is used to plan arrival of upstream bursts.
 19. The apparatus according to claim 18, wherein the timing information includes slot assignments, boundaries, and timings associated with the arrival of upstream bursts.
 20. A method for processing process an ingress signal within a media access controller integrated circuit (MAC IC), comprising: formatting, by the MAC IC, the ingress signal for delivery of information data to a destination node, the formatting including, formatting, by the MAC IC, the ingress signal according to a transmission protocol associated with the destination node, the formatting including: receiving, by the MAC IC, a packet header along with the ingress signal, and suppressing, by the MAC IC, the packet header based on information included in the ingress signal; receiving, by the MAC IC, the suppressed packet header from the payload header suppressor, and creating a new header based on the information included in the ingress signal; and outputting, by the MAC IC, a formatted signal.
 21. The method according to claim 20, further comprising: receiving, by the MAC IC, the ingress signal from a memory based on a priority queue of signals stored in the memory.
 22. The method according to claim 21, further comprising: receiving, by the MAC IC, the new header and encrypting the new header based on an applied security protocol using encryption keys.
 23. The method according to claim 21, wherein creating the new header at the header processor comprises: generating, by the MAC IC, a header checksum (HCS) field and a cyclic redundancy check (CRC) field for error correction.
 24. The method according to claim 24, wherein generating the HCS field and the CRC field comprises: generating, by the MAC IC, the HCS field and the CRC field every time the header packet is suppressed.
 25. The method according to claim 21, further comprising: monitoring, by the MAC IC, the formatting of the ingress signal through the ingress processor to detect a presence of a control message; extracting, by the MAC IC, the control message from the ingress signal when the presence of the control message is detected; and transmitting, by the MAC IC, the extracted control message to an upstream interface unit.
 26. The method according to claim 26, wherein the control message includes a message designated for the destination node.
 27. The method according to claim 26, further comprising: receiving, by the MAC IC, the extracted control message; and receiving, by the MAC IC, the timing information included in the control message from a time stamp generator, wherein the timing information is used to plan arrival of upstream bursts.
 28. The method according to claim 26, wherein the timing information includes slot assignments, boundaries, and timings associated with the arrival of upstream bursts. 