Highly integrated media access control

Abstract
A supervisory communications device, such as a headend device within a cable communications network, monitors and controls communications with a plurality of remote communications devices, such as cable modems, throughout a widely distributed network. The supervisory device allocates bandwidth on the upstream channels by sending MAP messages over its downstream channel. A highly integrated media access controller integrated circuit (MAC IC) operates within the headend to provide lower level DOCSIS processing on signals exchanged with the remote devices. The enhanced functionality of the MAC IC relieves the processing burden on the headend CPU and increases packet throughput. The enhanced functionality includes header suppression and expansion, DES encryption and decryption, fragment reassembly, concatenation, and DMA operations.
Description


CROSS-REFERENCE TO RELATED APPLICATIONS

[0002] The following United States and PCT utility patent applications have a common assignee and contain some common disclosure:


[0003] “Method and System for Flexible Channel Association,” U.S. application Ser. No. 09/963,671, by Denney et al., filed Sep. 27, 2001, incorporated herein by reference;


[0004] “Method and System for Upstream Priority Lookup at Physical Interface,” U.S. application Ser. No. 09/963,689, by Denney et al., filed Sep. 27, 2001, incorporated herein by reference;


[0005] “System and Method for Hardware Based Reassembly of Fragmented Frames, ” U.S. application Ser. No. 09/960,725, by Horton et al., filed Sep. 24, 2001, incorporated herein by reference;


[0006] “Method and Apparatus for the Reduction of Upstream Request Processing Latency in a Cable Modem Termination System, ” U.S. application Ser. No. 09/652,718, by Denney et al., filed Aug. 31, 2000, incorporated herein by reference;


[0007] “Hardware Filtering of Unsolicited Grant Service Extended Headers,” U.S. application Ser. No. 60/324,912, by Pantelias et al., filed Sep. 27, 2001, incorporated herein by reference;


[0008] “Packet Tag for Support of Remote Network Function/Packet Classification, ” U.S. application Ser. No. 10/032,100, by Grand et al., filed Dec. 31, 2001, incorporated herein by reference; and


[0009] “Method and Apparatus for Interleaving DOCSIS Data with an MPEG Video Stream, ” U.S. application Ser. No. 09/963,670, by Dworkin et al., filed Sep. 27, 2001, incorporated herein by reference.



BACKGROUND OF THE INVENTION

[0010] 1. Field of the Invention


[0011] The present invention relates generally to communications networking, and more specifically, to media access control processing within a communications network.


[0012] 2. Related Art


[0013] In recent years, cable network providers have expanded the variety of services offered to their subscribers. Traditionally, cable providers, for instance, delivered local and network broadcast, premium and pay-for-view channels, and newscasts into a viewer's home. Some modern cable providers have augmented their portfolio of services to include telephony, messaging, electronic commerce, interactive gaming, and Internet services. As a result, system developers are being challenged to make available adequate bandwidth to support the timely delivery of these services.


[0014] Moreover, traditional cable broadcasts primarily require one-way communication from a cable service provider to a subscriber's home. However, as interactive or personal television services and other nontraditional cable services continue to strive, communications media used to support one-way communications must now contend with an increased demand for bi-directional communications. This results in a need for improved bandwidth arbitration among the subscribers' cable modems.


[0015] In a cable communications network, for example, a communications device (such as a modem) requests bandwidth from a headend device prior to transmitting data to its destination. Thus, the headend device serves as a centralized point of control for allocating bandwidth to the communications devices. Bandwidth allocation can be based on availability and/or competing demands from other communications devices. As intimated above, bandwidth typically is available to transmit signals downstream to the communications device. However in the upstream, bandwidth is more limited and must be arbitrated among the competing communications devices.


[0016] A cable network headend includes a cable modem termination system (CMTS) which comprises a media access controller (MAC) and central processing unit (CPU). The MAC receives upstream signals from a transceiver that communicates with remotely located cable modems. The upstream signals are delivered to the CPU for protocol processing. The protocol processing is conventionally defined by the Data Over Cable Service Interface Specification (DOCSIS™) for governing cable communications. Depending on the nature of the protocol processing, the CPU must be able to handle these operations efficiently and timely as to not impede performance. As more subscribers and/or services are added to the network, greater emphasis is placed on the MAC and CPU to sustain protocol processing with no interruption in service.


[0017] Therefore, a system and method that increase packet throughput capacity and sustain performance are needed to address the above problems.



SUMMARY OF THE INVENTION

[0018] The present invention solves the above problems by providing a highly integrated media access controller (MAC) configured to provide lower layer protocol processing within a headend, such as a cable modem termination system (CMTS). The enhanced functionality of the highly integrated MAC relieves the processing burden on the CMTS CPU and increases packet throughput.


[0019] The enhanced functionality in the upstream path includes error detection, DES decryption, deconcatenation, fragment reassembly, and expansion of payload header suppressed packets. Other upstream features include queuing, monitoring unsolicited grant service, and gathering statistics for DOCSIS OSSI MIB requirements.


[0020] In the downstream path, the enhanced functionality of the highly integrated MAC includes header creation, payload header suppression, DES encryption, and MPEG encapsulation. The downstream enhanced features also include DMA operations, HCS/CRC generation, and statistics gathering.







BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

[0021] The accompanying drawings, which are incorporated herein and form part of the specification, illustrate the present invention and, together with the description, further serve to explain the principles of the invention and to enable a person skilled in the pertinent art to make and use the invention. In the drawings, like reference numbers indicate identical or functionally similar elements. Additionally, the leftmost digit(s) of a reference number identifies the drawing in which the reference number first appears.


[0022]
FIG. 1 illustrates a voice and data communications management system according to an embodiment of the present invention.


[0023]
FIG. 2 illustrates a media access controller according to an embodiment of the present invention.


[0024]
FIG. 3 illustrates a media access controller according to another embodiment of the present invention.


[0025]
FIG. 4 illustrates a media access controller according to another embodiment of the present invention.


[0026]
FIG. 5 illustrates an egress postprocessor according to an embodiment of the present invention.


[0027]
FIG. 6 illustrates an I/O arbitrator according to an embodiment of the present invention.


[0028]
FIG. 7 illustrates a media access controller according to another embodiment of the present invention.


[0029]
FIG. 8 illustrates an ingress processor according to an embodiment of the present invention.


[0030]
FIG. 9 illustrates an ingress processor, MAP extract, and PHY MAP interface according to another embodiment of the present invention.


[0031]
FIG. 10 illustrates an OOB ingress processor according to another embodiment of the present invention.


[0032]
FIG. 11 illustrates a media access controller with a bypass DMA according to an embodiment of the present invention.


[0033]
FIG. 12 illustrates a media access controller with FFT DMA according to an embodiment of the present invention.


[0034]
FIG. 13 illustrates a media access controller according to another embodiment of the present invention.







DETAILED DESCRIPTION OF THE INVENTION

[0035] I. Introduction


[0036]
FIG. 1 illustrates a voice and data communications management system 100 according to an embodiment of the present invention. System 100 includes a supervisory communications node 106 and one or more widely distributed remote communications nodes 102a-102n (collectively referred to as “remote communications nodes 102”). System 100 can be implemented in any multimedia distribution network. Furthermore, it should be understood that the method and system of the present invention manage the exchange of voice, data, video, audio, messaging, graphics, other forms of media and/or multimedia, or any combination thereof.


[0037] Supervisory communications node 106 is centrally positioned to command and control interactions with and among remote communications nodes 102. In an embodiment, supervisory communications node 106 is a component of a headend controller, such as a cable modem termination system (CMTS) or a part thereof. In an embodiment, at least one remote communications node 102 is a cable modem or a part thereof. In another embodiment, supervisory communications node 106 is a CMTS and at least one remote communications node 102 is a component of a television set-top box.


[0038] As part of a cable modem, remote communications node 102 is configurable to host one or more services to a subscriber. The services include telephony, television broadcasts, pay-for-view, Internet communications (e.g., WWW), radio broadcasts, facsimile, file data transfer, electronic mailing services (email), messaging, video conferencing, live or time-delayed media feeds (such as, speeches, debates, presentations, infomercials, news reports, sporting events, concerts, etc.), or the like.


[0039] Each remote communications node 102 is assigned one or more service identifier (SID) codes that supervisory communications node 106 uses to allocate bandwidth. A SID is used primarily to identify a specific flow from a remote communications node 102. However, as apparent to one skilled in the relevant art(s), other identifiers can be assigned to distinguish between the remote communications node 102 and/or the flow of traffic therefrom. Accordingly, in an embodiment, a SID or another type of identifier is assigned to identify a specific service affiliated with one or more remote communications nodes 102. In an embodiment, a SID or another type of identifier is assigned to designate a particular service or group of services without regard to the source remote communications node 102. In an embodiment, a SID or another type of identifier is assigned to designate a quality of service (QoS), such as voice or data at decreasing levels of priority, voice lines at different compression algorithms, best effort data, or the like. In an embodiment multiple SIDs are assigned to a single remote communications node.


[0040] In an embodiment, supervisory communications node 106 and remote communications nodes 102 are integrated to support protocols such as Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Real Time Transport Protocol (RTP), Resource Reservation Protocol (RSVP), or the like.


[0041] Communications management system 100 also includes an intemodal infrastructure 105. As shown in FIG. 1, intemodal infrastructure 105 provides interconnectivity among supervisory communications node 106 and remote communications nodes 102. Intemodal infrastructure 105 supports wired, wireless, or both transmission media, including satellite, terrestrial (e.g., fiber optic, copper, twisted pair, coaxial, hybrid fiber-coaxial (HFC), or the like), radio, microwave, free space optics (FSO), and/or any other form or method of transmission.


[0042] All communications transmitted in the direction from supervisory communications node 106 towards remote communications nodes 102 are referred to as being in the downstream. In an embodiment, the downstream is divided into one or more downstream channels. Each downstream channel is configured to carry various types of information to remote communications nodes 102. Such downstream information includes television signals, data packets (including IP datagrams), voice packets, control messages, and/or the like. In an embodiment, the downstream is formatted with a motion picture expert group (MPEG) transmission convergence sublayer. However, the present invention can be configured to support other data formats as would be apparent to one skilled in the relevant art. In an embodiment, supervisory communications node 106 implements time division multiplexing (TDM) to transmit continuous point-to-multipoint signals in the downstream.


[0043] The upstream represents all communications from remote communications nodes 102 towards supervisory communications node 106. In an embodiment, the upstream is divided into one or more upstream channels. Each upstream channel carries bursts of packets from remote communications nodes 102 to supervisory communications node 106. In the upstream, each frequency channel is broken into multiple assignable slots, and remote communications nodes 102 send a time division multiple access (TDMA) burst signal in an assigned slot. TDM and TDMA are described herein by way of example. It should be understood that the present invention could be configured to support other transmission modulation standards, including, but not limited to, Synchronous Code Division Multiple Access (S-CDMA), as would be apparent to one skilled in the relevant art(s).


[0044] As shown in FIG. 1, an embodiment of supervisory communications node 106 includes an upstream demodulator physical layer device (US PHY) 108, a downstream modulator physical layer device (DS PHY) 110, a media access controller (MAC) 112, a memory 114 and a software application 120. US PHY 108 forms the physical layer interface between supervisory communications node 106 and the upstream channels of internodel infrastructure 105. Hence, US PHY 108 receives and demodulates all bursts from remote communications nodes 102. In an embodiment, US PHY 108 checks the FEC field in the burst to perform error correction if required.


[0045] Conversely, DS PHY 110 forms the physical layer interface between supervisory communications node 106 and the downstream channel(s) of internodal infrastructure 105. Hence, packets (containing voice, data (including television or radio signals) and/or control messages) that are destined for one or more remote communications nodes 102 are collected at DS PHY 110 and converted to a physical signal. DS PHY 110, thereafter, transmits the signal downstream.


[0046] MAC 112 receives the upstream signals from US PHY 108 or provides the downstream signals to DS PHY 110, as appropriate. MAC 112 operates as the lower sublayer of the data link layer of supervisory communications node 106. As discussed in greater detail below, MAC 112 extracts voice, data, requests, and/or the like, and supports fragmentation, concatenation, and/or error checking for signals transported over the physical layer.


[0047] Memory 114 interacts with MAC 112 to store the signals as MAC 112 processes them. Memory 114 also stores various auxiliary data used to support the processing activities. Such auxiliary data includes security protocols, identifiers, and the like, as described in greater details below.


[0048] MAC 112 interacts with software application 120 via a conventional bi-directional bus 118. Software application 120 operates on one or more processors to receive control messages, data, and/or voice from MAC 112, and implement further processing. In embodiments, an application-specific integrated circuit (ASIC), field programmable gate array (FPGA), or a similar device provides hardware assists to enable software application 120 to support the functions of MAC 112. As shown, software application 120 includes a classifier/router 124 and a bandwidth (BW) allocation controller 128. BW allocation controller 128 manages upstream and/or downstream modulation and bandwidth allocation. Classifier/router 124 provides rules and policies for classifying and/or prioritizing communications with remote communications nodes 102. Classifier/router 124 also routes signals from remote communications nodes 102 to a destined location over backbone network 140.


[0049] Backbone network 140 is part of a wired, wireless, or combination of wired and wireless local area networks (LAN) or wide area networks (WAN), such as an organization's intranet, local internets, the global-based Internet (including the World Wide Web (WWW)), private enterprise networks, or the like. As such, supervisory communications node 106 utilizes backbone network 140 to communicate with another device or application external to communications management system 100. The device or application can be a server, web browser, operating system, other types of information processing software (such as, word processing, spreadsheets, financial management, or the like), television or radio transmitter, another remote communications node 102, another supervisory communications node 106, or the like.


[0050] II. Media Access Controller


[0051] In an embodiment, MAC 112 is an integrated circuit within a CMTS (shown in FIG. 1 as supervisory communications node 106). Accordingly, MAC 112 performs a variety of protocol processes defined by the CableLabs® Certified™ Cable Modem project, formerly known as DOCSIS™ (Data Over Cable Service Interface Specification), that defines the interface requirements for cable communications. The functions performed by MAC 112 includes interfacing with US PHY 108 and DS PHY 110, encrypting and decrypting data, storing packet data in queues, and/or DMA functions to exchange data with memory 114. Although the present invention is described in reference to DOCSIS protocol processing, it should be understood that the present invention is intended to be inclusive of other types of communication protocols governing multimedia distribution networks. However, the highly integrated MAC 112 of the present invention includes several additional functions that reduces the quantity of components within a conventional CMTS, the power consumption, the processing burden on software application 120, and/or the cost of the CMTS.


[0052]
FIG. 2 shows the components of a highly integrated MAC 112 according to an embodiment of the present invention. MAC 112 includes an egress preprocessor 204, an egress postprocessor 208, a fragment reassembly controller 212, an egress memory controller 216, an ingress memory controller 220, an ingress processor 224, and an input/output (I/O) arbitrator 228. The components communicate over bus 232a and bus 232b (referred to collectively herein as “bus 232”). In an embodiment, bus 232 is an internal-only split transaction bus with built-in arbitration to allow the components to communicate with each other and with a shared memory interface to memory 114. It should be understood that although two buses 232 (i.e., bus 232a and bus 232b ) are shown in FIG. 2, the present invention is adaptable to support more or fewer buses.


[0053] Egress preprocessor 204 receives signals (including voice, data, and/or bandwidth requests) from US PHY 108. Egress preprocessor 204 performs preliminary signal processing that includes prioritizing the signals. An example of preliminary signal prioritizing is described in the application entitled “Method and System for Upstream Priority Lookup at Physical Interface ” (U.S. application Ser. No. 09/963,689 ), which is incorporated herein by reference as though set forth in its entirety. Egress preprocessor 204 interacts with egress memory controller 216 that sends the signals to queues located in memory 114. In an embodiment, egress preprocessor 204 does not send the signals to a queue, but rather passes the signals to fragment reassembly controller 212.


[0054] Fragment reassembly controller 212 interacts with egress preprocessor 204 to receive the signals from this component and/or with egress memory controller 216 to receive the signals from memory 114. Fragment reassembly controller 212 identifies fragmented frames from the signals and reassembles the frames according to instructions provided in the header frames of the signals. Defragmentation is primarily performed on data packets. However, defragmentation can also be performed on voice or requests, although such signals are rarely fragmented in practice. An example of fragment reassembly is described in the application entitled “System and Method for Hardware Based Reassembly of Fragmented Frames ” (U.S. application Ser. No.09/960,725), which is incorporated herein by reference as though set forth in its entirety.


[0055] In an embodiment, fragment reassembly controller 212 is programmable to terminate reassembly operations if error conditions are detected. Such error conditions include, for example, missing or out of sequence fragments. If such errors are detected, fragment reassembly controller 212 discards the affected frames. Nonetheless, upon completion of its processing operations, fragment reassembly controller 212 interacts with egress memory controller 216 to store the defragmented signals in queues within memory 114.


[0056] Egress post processing 208 performs additional processing on the signals stored in the queues of memory 114. The additional processing is explained in greater detail below. The operations implemented by egress post processing 208 typically occur after the signals have been evaluated and/or processed by fragment reassembly controller 212. Egress postprocessor 208 also interacts with egress memory controller 216 to store the postprocessed signals in priority queues within memory 114. An example of storing signals in priority queues is described in the application entitled “Method and System for Upstream Priority Lookup at Physical Interface” (U.S. application Ser. No. 09/963,689), which is incorporated herein by reference as though set forth in its entirety.


[0057] Bus 232a supports the transfer of signals among egress preprocessor 204, fragment reassembly controller 212, egress postprocessor 208 and egress memory controller 216 prior to processing by egress postprocessor 208. Bus 232b however supports communication with memory controller 216 upon completion of processing by egress postprocessor 208. Bus 232b also enables signals to be delivered to I/O arbitrator 228.


[0058] I/O arbitrator 228 manages the exchange of communications between software application 120 and MAC 112. In particular, I/O arbitrator 228 interfaces with bus 118 to deliver the signals to software application 120. I/O arbitrator 228 also receives signals from software application 120. Such signals include broadcast signals and control messages to be transported downstream. These signals are typically stored in memory 114 until MAC 112 is ready to process them. As such, ingress memory controller 220 interacts, over bus 232b, with I/O arbitrator 228 to receive signals from software application 120 and store the signals in priority queues within memory 114.


[0059] Ingress processor 224 interacts with ingress memory controller 220 to received the downstream signals from memory 114. Ingress processor 224 formats and prepares the signals for delivery to DS PHY 110, as described in greater details below.


[0060]
FIG. 3 illustrates an another embodiment of MAC 112. A separate egress preprocessor 204 (shown as egress preproccessor 204a-204f) is provided for each upstream channel of internodal interface 105. Although hardware configuration of this embodiment supports only six upstream channels, the present invention can support greater or lesser quantities of upstream channels as would be apparent to one skilled in the relevant art(s). As such, the present invention can utilize one egress preprocessor 204 to process signals from multiple upstream channels as shown in FIG. 2, utilize a plurality of single egress preprocessors 204 with each egress preprocessor 204 processing signals from a single upstream channel as shown in FIG. 3, or a combination of both.


[0061]
FIG. 4 shows the components of egress preprocessor 204 according to an embodiment of the present invention. Egress preprocessor 204 includes a PHY interface (I/F) device 404, a decrypt or (decrypt) 408, an unsolicited grant synchronization (UGS) detector 412, a header (HDR) processor 416, and a burst direct memory access (DMA) 420.


[0062] PHY I/F 404 receives signals (i.e., voice, data and/or requests) from US PHY 108. In an embodiment, PHY I/F 404 prioritizes the signals based on source and/or service. This is implemented by utilizing the SID and/or some other type of node or flow identifier. In an embodiment, PHY I/F 404 checks the header checksum (HCS) field in the burst to perform error detection, if required. In another embodiment, PHY I/F 404 checks the cyclic redundancy check (CRC) field in the burst for error detection.


[0063] Decrypt 408 receives signals from PHY I/F 404 and performs decryption. In an embodiment, decrypt 408 performs data encryption standard (DES) decryption. In another embodiment, decrypt 408 performs advanced encryption standard (AES) decryption. Other decryption standards can be used, including but not limited to public-key encryption, as would be apparent to one skilled in the relevant art(s).


[0064] Depending on the security protocol that is being deployed, decrypt 408 extracts intelligence information from the signal, and processes the intelligence information for decrypting the signal. In an embodiment, a baseline privacy interface (BPI) protocol is used to encrypt upstream bursts. Similarly, a BPI protocol secures downstream bursts to restrict access to authorized subscribers. However, other security protocols can be used, including but not limited to, security system interface (SSI), removable security module interface (RSMI), or the like.


[0065] As such, in an embodiment, decrypt 408 checks a BPI field in each signal to detect whether the BPI field is enabled. If the BPI field is disabled, the signal passes to UGS detector 412 and HDR processor 416. Otherwise, decrypt 408 requests and receives key information from egress lookup controller 424. Egress lookup controller 424 queries egress memory controller 216 and, therefore, memory 114 for the key information. Upon receipt of the key information, decrypt 408 compares the BPI sequence number in the signal header with the stored key information, and decrypts the signal based on the key information Decrypt 408 then passes the signal to UGS detector 412 with information specifying whether there is a mismatch.


[0066] On receipt, UGS detector 412 checks the signal for a UGS extended header. If found, UGS detector 412 queries egress lookup controller 424 for a UGS header value retrieved with the key information requested by decrypt 408. UGS detector 412 compares the UGS extended header with the UGS header value. If the two UGS headers do not match, UGS detector 412 sends a write request to memory 114 to update the stored UGS header value. An example of a method and system for checking a UGS extended header are described in the application entitled “Hardware Filtering of Unsolicited Grant Service Extended Headers ” (U.S. application Ser. No. 60/324,912), which is incorporated herein by reference as though set forth in its entirety. Irrespective, UGS detector 412 passes the signal to HDR processor 416 and informs HDR processor 416 whether the two UGS headers match.


[0067] HDR processor 416 processes headers from the signals to extract requests. An exemplary process for extracting signals for sending on an alternative path is described in the application entitled “Method and Apparatus for the Reduction of Upstream Request Processing Latency in a Cable Modem Termination System ” (U.S. application Ser. No. 09/652,718), which is incorporated herein by reference as though set forth in its entirety. HDR processor 416 sends the requests to request queue DMA 428. HDR processor 416 also forwards to request queue DMA 428 any information relating to mismatches detected in the UGS extended header and/or decryption key sequence number. Request queue DMA 428 accumulates the requests, UGS extended header mismatches, and/or decryption key sequence number mismatches from all six upstream channels, and sends the information to egress memory controller 216 for delivery to a request upstream egress queue located in memory 114.


[0068] HDR processor 416 delivers the data and/or voice payloads to burst DMA 420. In an embodiment, HDR processor 416 performs deconcatenation on the payload frames prior to sending the frames to burst DMA 420. Burst DMA 420 sends the payload frames to egress memory controller 216 for delivery to queues in memory 114.


[0069] As discussed, egress lookup controller 424 performs lookup operations by querying memory 114 (via egress memory controller 216) to retrieve BPI key information, and check BPI key sequence number for mismatches. Egress lookup controller 424 also retrieves UGS extended header information, and compares the information to the UGS extended header in the current signal for mismatches.


[0070]
FIG. 5 shows the components of egress postprocessor 208 according to an embodiment of the present invention. Egress postprocessor 208 includes a HDR postprocessor 504, a payload header suppression/expansion (PHS) processor 508, and packet DMA 510.


[0071] HDR postprocessor 504 evaluates the reassembled fragmented frames and performs deconcatenation, as required. PHS processor 508 fetches the relevant PHS rules to expand payload header suppressed packets. In an embodiment, PHS processor 508 expands packets suppressed according to DOCSIS Payload Header Suppression. In another embodiment, PHS processor 508 expands packets suppressed by the Propane™ PHS technology available from Broadcom Corporation of Irvine, California.


[0072] Packet DMA 510 receives the frame from PHS processor 508. Packet DMA 510 sends the processed frames to egress memory controller 216 for delivery to output queues in memory 114.


[0073]
FIG. 6 shows the components of I/O arbitrator 228 according to an embodiment of the present invention. I/O arbitrator 228 enables signals to be exchanged over a packet port 118a and a PCI port 118b.


[0074] Packet port 118a interacts with a MAC 616, packet port ingress manager 612, and a packet port egress manager 604. In an embodiment, MAC 616 is configured to support an Ethernet data interface. However, MAC 161 can be any other type of high-speed data interface for moving packets in and out of MAC 112.


[0075] Packet port egress manager 604 arbitrates among the upstream priority queues destined for packet port 118a. More specifically, memory 114 includes packet port-destined, upstream priority queues. Packet port egress manager 604 interacts with egress memory controller 216 to retrieve packets from the upstream priority queues, and deliver the data to MAC 616. MAC 616 delivers the signal to packet port 118a over a gigabit media independent interface (GMII interface). It should be understood that a GMII interface is provided by way of example. In alternative embodiments, MAC 616 delivers the signal over other types of interfaces.


[0076] MAC 616 also receives signals from packet port 118a, and delivers them to packet port ingress manager 612. Packet port ingress manager 612 sends the signals to ingress memory controller 220 to store the signals in downstream priority queues in memory 114. In an embodiment, the downstream signals are stored according to a DET tag specified in the signals. An example of a method and system for packet tag processing are described in the application entitled “Packet Tag for Support of Remote Network Function/Packet Classification ” (U.S. application Ser. No. 10/032,100), which is incorporated herein by reference as though set forth in its entirety.


[0077] PCI port 118b interacts with a PCI bus interface unit (BIU) 636, a PCI DMA 632, a PCI bridge 640, a PCI egress manager 620, and a PCI ingress manager 624. PCI egress manager 620 arbitrates among the upstream priority queues destined for packet port 118b. More specifically, memory 114 includes PCI-destined, upstream priority queues. PCI egress manager 620 interacts with egress memory controller 216 to retrieve packets from the upstream priority queues, and deliver the data to PCI DMA 632.


[0078] PCI ingress manager 624 receives downstream signals brought into MAC 112 by PCI DMA 632. PCI ingress manager 624 sends them to ingress memory controller 220 to store the signals in downstream priority queues in memory 114. In an embodiment, the downstream signals are stored according to a PCI descriptor specified in the signals.


[0079] PCI DMA 632 acts as a PCI master to move data between MAC 112 and software application 120. PCI DMA 632 interacts with PCI BIU 636 which interfaces with the physical layer of 118b.


[0080] PCI bridge 640 processes all PCI transactions where MAC 112 is the target of the transaction. All accesses by software application 120 to the PCI registers or PCI memories of MAC 112 pass through PCI bridge 640.


[0081]
FIG. 7 shows the components of ingress processor 224 according to an embodiment of the present invention. Ingress processor 224 includes a downstream PHY I/F 702, a multiplexer (MUX) 704, a timestamp generator 706, a MPEG video input 708, a MPEG encapsulator 710, a downstream processor 712, and an in-band DMA 714.


[0082] In-band DMA 714 interfaces with bus 232b to interact with other components of MAC 112. For instance, in-band DMA 714 interacts with ingress memory controller 220 to retrieve downstream signals from the downstream priority queues of memory 114. In-band DMA 714 also interacts with ingress memory controller 220 to fetch PHS rules and DES keys from memory 114, as needed by other components of ingress processor 224.


[0083] Downstream processor 712 receives signals from in-band DMA 714. As described in further detail below, downstream processor 712 processes and/or formats the signals to be transmitted downstream to a destined remote communications node 102.


[0084] Timestamp generator 706, MPEG encapsulator 710, and MPEG video input 708 perform DOCSIS downstream transmission convergence sublayer functions. Specifically, MPEG encapsulator 710 receives the signals from downstream processor 712, and performs MPEG encapsulation. Timestamp generator 706 provides timestamp message generation. Additionally, MPEG video input 708 receives MPEG video frames, if so configured. An example of a method and system for interleaving MPEG video frames with data are described in the application entitled “Method and Apparatus for Interleaving DOCSIS Data with an MPEG Video Stream ” (U.S. application Ser. No. 09/963,670), which is incorporated herein by reference as though set forth in its entirety.


[0085] MUX 704 receives and multiplexes the MPEG-formatted signals, timestamps and MPEG video frames. MUX 704 delivers the MPEG frames to downstream PHY I/F 702. Downstream PHY I/F 702 delivers the MPEG frames to the external DS PHY 110.


[0086] As intimated, downstream processor 712 receives the downstream signals from in-band DMA 714, and processes the signals according to various DOCSIS protocols, such as header creation, header suppression, and/or encryption. FIG. 8 shows an alternative embodiment of ingress processor 224 that includes another embodiment of downstream processor 712. In this embodiment, downstream processor 712 includes an encryptor 802, a HDR processor 804, and a PHS processor 806.


[0087] PHS processor 806 receives the downstream signals and fetches the relevant PHS rules to suppress the packet headers. In an embodiment, PHS processor 806 performs DOCSIS Payload Header Suppression as specified by a downstream PCI descriptor or Packet Port DET tag from the signal.


[0088] HDR processor 804 receives the signals from PHS processor 806 and creates a DOCSIS header. The header is created according to a downstream PCI descriptor or Packet Port DET tag stored with the signal. HDR processor 804 also generates HCS and/or CRC fields for error detection. A CRC field is always generated when PHS is performed.


[0089] Encryptor 802 performs DES encryption on the signals from HDR processor 804. If a BPI security protocol is being used, encryptor 802 fetches DES keys to perform encryption.


[0090]
FIG. 9 shows another embodiment of MAC 112 that includes a MAP extract 904 and an upstream PHY MAP interface 916. More specifically, FIG. 9 illustrates the interaction between ingress processor 224, MAP extract 904 and upstream PHY MAP interface 916. In an embodiment, MAP extract 904 monitors the downstream signals as they are being processed within ingress processor 224. As described above, the downstream signals include data and/or voice packets, control messages, or the like. The control messages include MAP messages intended for remote communications node(s) 102. The MAP messages, like other types of downstream signals, are delivered to MPEG encapsulator 710 for additional downstream formatting and subsequent transmission to the designated remote communications node(s) 102, as previously discussed.


[0091] If, during the monitoring operations of MAP extract 904, MAP messages are detected, MAP extract 904 receives the MAP messages from the downstream path controlled by ingress processor 224. MAP extract 904 processes and/or forwards the MAP messages according to various protocols. Primarily, the MAP messages are delivered to upstream PHY MAP interface 916. Upstream PHY MAP interface 916 interacts with timestamp generator 706 to receive timing information that is included with the MAP message. Subsequently, upstream PHY MAP interface 916 passes this information to US PHY 108. US PHY 108 uses this information, which includes slot assignments, boundaries, and timing, to plan for the arrival of upstream bursts.


[0092] MAP extract 904 is also connected to a master-slave interface that enables MAC 112 to operate in a master or slave mode. An example of a MAC capable of operating in master or slave mode is described in the application entitled “Method and System for Flexible Channel Association” (U.S. application Ser. No. 09/963,671), which is incorporated herein by reference as though set forth in its entirety.


[0093] In master mode, MAC 112 provides MAP messages to other slave devices to control their upstream channels. As such, MAP extract 904 detects MAP messages from ingress processor 224 and send to the slave devices. These MAP messages are transported out the MAP Master interface to the slave devices.


[0094] Conversely, MAC 112 is operable to function in slave mode. As such MAP extract 904 receives MAP messages from a Master MAC 112 (not shown) from the MAP Slave interface. Additionally, the MAP messages are delivered to upstream PHY MAP interface 916, so that US PHY 108 can plan for the arrival of the associated upstream bursts. Hence, MAP extract 904 parses MAP messages from both the downstream path of ingress processor 224 and the MAP Slave interface.


[0095]
FIG. 10 shows another embodiment of MAC 112 that includes an out-of-band (OOB) ingress processor 1002. OOB ingress processor 1002 includes an OOB PHY I/F 1004, and an OOB generator 1008.


[0096] OOB generator 1008 interacts with ingress memory controller 220 over bus 232b to retrieve signals from a downstream OOB queue located in memory 114. On receipt of the OOB signals, OOB generator 1008 performs protocol operations as specified by a downstream PCI descriptor or Packet Port DET tag include with the signal. OOB PHY I/F 1004 receives the signal from OOB generator 1008, and delivers the signal to an external OOB PHY device (not shown) over an OOB interface.


[0097]
FIG. 11 shows another embodiment of MAC 112 that includes a bypass DMA 1104. PHY I/F 404 detects signals having a bypass field enabled and forwards the signals directly to bypass DMA 114. Bypass DMA 114 interacts with egress memory controller 216 to deliver the bypass signals, exactly as received, to bypass upstream egress queues located in memory 114. Signals delivered to the bypass upstream egress queues via this path do not undergo DOCSIS processing of any kind. Bypass DMA 114 can be used, for example, for testing and/or debugging. In an embodiment, signals are sampled and tested and/or debugged per SID at a periodically programmable rate.


[0098]
FIG. 12 shows another embodiment of MAC 112 that includes a FFT DMA 1204. FFT DMA 1204 receives FFT signals from an external upstream PHY device (not shown) on a FFT interface. FFT DMA 1204 interacts with egress memory controller 216 to deliver the FFT signals to FFT upstream egress queues located in memory 114.


[0099]
FIG. 13 shows another embodiment of MAC 112 that includes several components described in FIGS. 2-12 above. Reference characters “A-H” illustrate the interaction between MAC 112 and other components of supervisory communications node 106. Accordingly in FIG. 13, reference character “A ” illustrates US PHY 108, “B ” illustrates a SPI interface as described below, “C ” illustrates an OOB interface as described above, “D” illustrates a MAP master interface as described above, “E ” illustrates a MAP slave interface as described above, “F ” illustrates memory 114, “G ” illustrates DS PHY 110, and “H ” illustrates software application 120.


[0100] Bus 232b is shown in FIG. 13 as bus 232b (1) and bus 232(b)(2). Bus 232b (1) arbitrates communication of upstream signals that have been processed by egress postprocessor 208. Bus 232b (2) arbitrates communication of downstream signals with ingress processor 224 and OOB ingress processor 1002.


[0101] Several bus bridges are provided to enable the components to use the other buses, as required. Bus 0-1 bridge 1302 provides interconnectivity between bus 232a and bus 232b (1). Bus 0-2 bridge 1304 provides interconnectivity between bus 232a and bus 232b (2). Bus 1-2 bridge 1306 provides interconnectivity between bus 232b (1) and 232b (2). These bridges allow communication between components on different bus segments.


[0102] Auxiliary processor 1308 is included to enable additional features, including a serial peripheral interface (SPI) processor 1310 and a clock/GPIO 1312. SPI processor 1310 receives and/or transmits signals over a SPI port that allows for enhanced inputs and outputs. Clock/GPIO 1312 supports synchronization and/or reset operations.


[0103] As discussed above, MAC 112, in embodiments, is a single integrated circuit. As such, each component of MAC 112, as described above with reference to FIGS. 2-13, is formed on or into a single microchip that is mounted on a single piece of substrate material, printed circuit board, or the like. In an embodiment, one or more components of MAC 112 are formed on or into a distinct secondary circuit chip (also referred to as a “daughter chip”), and later mounted on a primary integrated circuit chip. Thus, the primary chip is a single package containing all components of MAC 112, which includes one or more daughter chips.


[0104] Referring back to FIG. 1, US PHY 108, DS PHY 110, and MAC 112 are shown as separate components of supervisory communications node 106. However, in embodiments of the present invention (not shown), US PHY 108 and DS PHY 110 are components of MAC 112. Therefore, US PHY 108 and DS PHY 110 are integrated into the single integrated circuit containing the other components of MAC 112.


[0105] It should be understood that although only one memory 114 is shown in FIG. 1, the present invention is adaptable to support multiple memories. In an embodiment, memory 114 includes two upstream SDRAMs and one downstream SDRAMs. However, each upstream SDRAM primarily is used for distinct operations. For instance, one upstream SDRAM interfaces with egress memory controller 216a and stores signals and/or auxiliary information to support the operations of egress preprocessor 204, fragment reassembly 212, egress postprocessor 208, bypass DMA 1104 and/or FFT DMA 1204. The second upstream SDRAM, for example, interfaces with egress memory controller 216b and stores signals and/or auxiliary information to support the operations of request queue DMA 428, egress postprocessor 208, and/or I/O arbitrator 228.


[0106] The downstream SDRAM primarily stores downstream signals and auxiliary information to support the operations of I/O arbitrator 228, ingress processor 224, MAP extract 904, OOB ingress processor 1002, and/or auxiliary processor 1308.


[0107] As discussed, the bus bridges (1302, 1304, and 1306) allow communication between components on different bus segments. For instance, bus 0-1 bridge 1302 enables the use of a single egress memory controller 216 to access a single upstream SDRAM (i.e., memory 114). In another example, the bus bridges are used to allow the PCI target bridge 640 to access registers from components connected to bus 232a and/or bus 232b.


[0108] In an embodiment, memory 114 collects egress and ingress statistics to support DOCSIS OSSI Management Information Base (MIB) requirements. MAC 112 and memory 114 gather and store statistics per SID and/or on a particular channel or link. The statistics include the quantity of bits/bytes received, the quantity of packets received, the quantity of HCS errors, the quantity of CRC errors, and the like.


[0109] As discussed, memory 114 of the present invention include various distinct queues used to support the enhanced operations of MAC 112. The queues include a DOCSIS high priority queue based on SID lookup, and/or a DOCSIS low priority queue based on SID lookup. An example of SID-lookup priority queues is described in the application entitled “Method and System for Upstream Priority Lookup at Physical Interface ” (U.S. application Ser. No. 09/963,689), which is incorporated herein by reference as though set forth in its entirety. Other priority queues of the present invention include a ranging messages queue, a non-ranging management messages queue, a bypass DMA queue, a requests queue, a FFT queue, and/or a pass-through queue (e.g., a PCI-to-Packet Port queue, and/or a Packet Port-to-PCI queue). The above nine queues are not intended to be exclusive. As would be apparent to one skilled in the relevant art(s), additional or fewer queues, memories, and/or memory controllers can be implemented and are considered to be within the scope of the present invention.


[0110] III. Conclusion


[0111] FIGS. 1-13 are conceptual illustrations that allow an easy explanation of the present invention. That is, the same piece of hardware or module of software can perform one or more of the blocks. It should also be understood that embodiments of the present invention can be implemented in hardware, software, or a combination thereof. In such an embodiment, the various components and steps would be implemented in hardware and/or software to perform the functions of the present invention.


[0112] While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example, and not limitation. It will be apparent to persons skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. Moreover, it should be understood that the method and system of the present invention should not be limited to transmissions between cable modems and headends. The present invention can be implemented in any multi-nodal communications environment governed by a centralized node. The nodes can include communication gateways, switches, routers, Internet access facilities, servers, personal computers, enhanced telephones, personal digital assistants (PDA), televisions, set-top boxes, or the like. Thus, the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.


Claims
  • 1. A method for processing egress signals within a media access controller integrated circuit (MAC IC), comprising the steps of: accessing a signal from a physical device coupled to the MAC IC; pre-processing a header within said signal, said signal being prioritized or stored according to said header; detecting a fragmented voice and/or data packet from said signal; and reassembling fragmented frames to produce a reassembled voice and/or data packet in response to said detecting a fragmented voice and/or data packet.
  • 2. The method of claim 1, further comprising the step of: demodulating and/or FEC-correcting said signal at said physical device prior to said accessing step.
  • 3. The method of claim 1, further comprising the steps of: extracting a request from said signal; and forwarding said request to a requests memory.
  • 4. The method of claim 1, further comprising the step of: deconcatenating said signal.
  • 5. The method of claim 1, further comprising the steps of: extracting a voice and/or data packet from said signal; and storing said voice and/or data packet from said extracting step in an upstream memory, wherein said upstream memory includes a plurality of upstream queues.
  • 6. The method of claim 1, further comprising the step of: terminating said reassembling step in response to detecting an error condition.
  • 7. The method of claim 1, further comprising the step of: filtering and/or pre-classifying said signal, said filtering and/or pre-classifying being performed prior to said pre-processing step.
  • 8. The method of claim 1, further comprising the step of: checking said signal for errors.
  • 9. The method of claim 1, further comprising the step of: checking a key sequence number to decrypt said signal.
  • 10. The method of claim 9, further comprising the step of: retrieving a BPI key to decrypt said signal.
  • 11. The method of claim 1, further comprising the step of: detecting a need for additional or fewer unsolicited grants.
  • 12. The method of claim 11, wherein said detecting a need comprises the steps of: reading a current UGS EHDR from said signal; and comparing said current UGS EHDR to a prior UGS EHDR to detect said need for additional or fewer unsolicited grants.
  • 13. The method of claim 1, further comprising the step of: post-processing headers within said reassembled voice and/or data packet.
  • 14. The method of claim 1, further comprising the step of: deconcatenating said reassembled voice and/or data packet.
  • 15. The method of claim 1, further comprising the step of: expanding a payload header suppressed packet.
  • 16. The method of claim 15, wherein said expanding step comprises the step of: querying a PHS memory to retrieve a key to expand said payload header suppressed packet.
  • 17. The method of claim 1, further comprising the step of: storing said reassembled voice and/or data packet to an upstream memory, wherein said upstream memory includes a plurality of upstream queues.
  • 18. A method for processing ingress signals within a MAC IC, comprising the steps of: accessing a downstream signal; producing a DOCSIS header for said downstream signal, said DOCSIS header being added to said downstream signal; and delivering said downstream signal to a physical device operable to transmit said downstream signal to a remote.
  • 19. The method of claim 18, wherein said producing a DOCSIS header comprises the step of: producing at least one of a reserved EHDR, a HCS field, and a CRC field.
  • 20. The method of claim 18, wherein said producing a DOCSIS header comprises the step of: performing payload header suppression.
  • 21. The method of claim 20, wherein said performing payload header suppression comprises the step of: querying a downstream memory to fetch a PHS rule to perform said payload header suppression.
  • 22. The method of claim 18, further comprising the step of: encrypting said downstream signal.
  • 23. The method of claim 22, wherein said encrypting comprises the step of: querying a downstream memory to fetch a DES key to encrypt said downstream signal.
  • 24. The method of claim 18, wherein said accessing a downstream signal comprises the step of: accessing said downstream signal from a PCI port or a packet port.
  • 25. The method of claim 24, wherein a PCI Ingress receives said downstream signal from said PCI port or a Packet Port Ingress receives said downstream signal from said packet port.
  • 26. The method of claim 18, wherein said accessing a downstream signal comprises the step of: storing said downstream signal to one of a plurality of downstream priority queues, wherein a PCI descriptor or a DET tag is processed to specify the appropriate priority queue.
  • 27. The method of claim 18, further comprising the step of: processing said downstream signal to produce a downstream transmission convergence sublayer.
  • 28. The method of claim 18, further comprising the step of: processing said downstream signal to provide MPEG encapsulation.
  • 29. The method of claim 18, further comprising the step of: interleaving said downstream signal with a MPEG video frame.
  • 30. The method of claim 18, further comprising the step of: collecting statistics for DOCSIS OSSI MIB requirements.
  • 31. A single integrated circuit for providing media access control, comprising: an egress preprocessor for pre-processing an egress signal, wherein said egress preprocessor is configured to receive said egress signal from a physical device coupled to the single integrated circuit; and a fragment reassembly controller configured to receive a fragmented voice and/or data packet detected from said egress signal, wherein said fragment reassembly controller is operable to reassemble said fragmented voice and/or data packet to produce a reassembled voice and/or data packet.
  • 32. The single integrated circuit of claim 31, wherein said egress preprocessor comprises: a decrypt or for checking a key sequence number to decrypt said egress signal.
  • 33. The single integrated circuit of claim 31, wherein said egress preprocessor comprises: a header processor for deconcatenating said egress signal.
  • 34. The single integrated circuit of claim 31, wherein said egress preprocessor comprises: a header processor for extracting a request from said egress signal.
  • 35. The single integrated circuit of claim 31, further comprising: an egress postprocessor for post-processing a header within said reassembled voice and/or data packet.
  • 36. The single integrated circuit of claim 35, wherein said egress postprocessor comprises: a header postprocessor for deconcatenating said reassembled voice and/or data packet.
  • 37. The single integrated circuit of claim 35, wherein said egress postprocessor comprises: a PHS processor for expanding a payload header suppressed packet.
  • 38. The single integrated circuit of claim 31, further comprising: an ingress processor for processing an ingress signal.
  • 39. The single integrated circuit of claim 38, wherein said ingress processor comprises: a header processor for creating a DOCSIS header for said ingress signal.
  • 40. The single integrated circuit of claim 38, wherein said ingress processor comprises: a PHS processor for suppressing a payload header for said ingress signal.
  • 41. The single integrated circuit of claim 38, further comprising: an egress postprocessor for post-processing a header within said reassembled voice and/or data packet.
  • 42. The single integrated circuit of claim 41, further comprising: memory controller means for supporting operations of said egress preprocessor, said fragment reassembly controller, and/or said egress postprocessor.
  • 43. The single integrated circuit of claim 41, further comprising: memory controller means for supporting operations of said egress postprocessor.
  • 44. The single integrated circuit of claim 41, further comprising: memory controller means for supporting operations of said ingress processor.
  • 45. The single integrated circuit of claim 41, further comprising: memory controller means configured to exchange information with a memory coupled to the single integrated circuit, wherein said memory controller means is responsive to support operations of said egress preprocessor, said egress postprocessor and/or said ingress processor.
  • 46. A method for processing egress signals within a media access controller integrated circuit (MAC IC), comprising the steps of: accessing a signal from a physical device coupled to the MAC IC; processing a header within said signal, said signal being prioritized or stored according to said header; and expanding a payload header suppressed packet from said signal in response to detecting a suppressed header within said signal.
  • 47. The method of claim 46, further comprising the step of: querying a PHS memory to retrieve a key to expand said payload header suppressed packet.
  • 48. The method of claim 46, further comprising the step of: checking said signal for errors.
  • 49. The method of claim 46, further comprising the step of: checking a key sequence number to decrypt said signal.
  • 50. The method of claim 49, further comprising the step of: retrieving a DES key to decrypt said signal.
  • 51. The method of claim 46, further comprising the step of: deconcatenating said signal.
  • 52. The method of claim 46, further comprising the steps of: detecting a fragmented voice and/or data packet from said signal; and reassembling fragmented frames to produce a reassembled voice and/or data packet in response to said detecting a fragmented voice and/or data packet.
  • 53. The method of claim 52, further comprising the step of: terminating said reassembling step in response to detecting an error condition.
  • 54. The method of claim 52, further comprising the step of: deconcatenating said reassembled voice and/or data packet.
  • 55. The method of claim 46, further comprising the step of: demodulating and/or FEC-correcting said signal at said physical device prior to said accessing step.
  • 56. The method of claim 46, further comprising the steps of: extracting a request from said signal; and forwarding said request to a requests memory.
  • 57. The method of claim 46, further comprising the steps of: extracting a voice and/or data packet from said signal; and storing said voice and/or data packet from said extracting step in an upstream memory, wherein said upstream memory includes a plurality of upstream queues.
  • 58. The method of claim 46, further comprising the step of: detecting a need for additional or fewer unsolicited grants.
  • 59. The method of claim 58, wherein said detecting a need comprises the steps of: reading a current UGS EHDR from said signal; and comparing said current UGS EHDR to a prior UGS EHDR to detect said need for additional or fewer unsolicited grants.
  • 60. A method for processing ingress signals within a MAC IC, comprising the steps of: accessing a downstream signal; suppressing a payload header for a packet included in said downstream signal to thereby produce a suppressed header, said suppressed header being added to said downstream signal; and delivering said downstream signal to a physical device operable to transmit said downstream signal to a remote.
  • 61. The method of claim 60, wherein said suppressing step comprises the step of: querying a downstream memory to fetch a PHS rule to suppress said payload header.
  • 62. The method of claim 60, further comprising the step of: producing a DOCSIS header for said downstream signal, said DOCSIS header being added to said downstream signal.
  • 63. The method of claim 62, wherein said producing a DOCSIS header comprises the step of: producing at least one of a reserved EHDR, a HCS field, and a CRC field.
  • 64. The method of claim 60, further comprising the step of: encrypting said downstream signal.
  • 65. The method of claim 64, wherein said encrypting comprises the step of: querying a downstream memory to fetch a DES key to encrypt said downstream signal.
  • 66. The method of claim 60, further comprising the step of: processing said downstream signal to provide MPEG encapsulation.
  • 67. The method of claim 60, further comprising the step of: interleaving said downstream signal with a MPEG video frame.
  • 68. The method of claim 60, further comprising the step of: processing said downstream signal to produce a downstream transmission convergence sublayer.
  • 69. The method of claim 60, further comprising the step of: collecting statistics for DOCSIS OSSI MIB requirements.
  • 70. The method of claim 60, wherein said accessing a downstream signal comprises the step of: accessing said downstream signal from a PCI port or a packet port.
  • 71. The method of claim 70, wherein a PCI Ingress receives said downstream signal from said PCI port or a Packet Port Ingress receives said downstream signal from said packet port.
  • 72. The method of claim 60, wherein said accessing a downstream signal comprises the step of: storing said downstream signal to one of a plurality of downstream priority queues, wherein a PCI descriptor or a DET tag is processed to specify the appropriate priority queue.
  • 73. A single integrated circuit for providing media access control, comprising: an egress processor for processing an egress signal, wherein said egress processor is configured to receive said egress signal from a physical device coupled to the single integrated circuit; and a PHS processor for expanding a payload header suppressed packet detected from said egress signal.
  • 74. The single integrated circuit of claim 73, further comprising: a PHS memory for retrieving a key to expand said payload header suppressed packet in response to queries from said PHS processor.
  • 75. The single integrated circuit of claim 73, wherein said egress processor comprises: a PHY interface for checking said egress signal for errors.
  • 76. The single integrated circuit of claim 73, wherein said egress processor comprises: a decrypt or for checking a key sequence number to decrypt said egress signal.
  • 77. The single integrated circuit of claim 73, wherein said egress processor comprises: a header processor for deconcatenating said egress signal.
  • 78. The single integrated circuit of claim 73, wherein said egress processor comprises: a fragment reassembly controller configured to receive a fragmented voice and/or data packet detected from said egress signal, wherein said fragment reassembly controller is operable to reassemble said fragmented voice and/or data packet to produce a reassembled voice and/or data packet.
  • 79. The single integrated circuit of claim 73, wherein said egress processor comprises: a header processor for extracting a request from said egress signal.
  • 80. The single integrated circuit of claim 73, wherein said egress processor comprises: a detector for detecting a need for fewer or additional unsolicited grants.
  • 81. The single integrated circuit of claim 73, further comprising: an ingress processor for processing an ingress signal.
  • 82. The single integrated circuit of claim 73, further comprising: memory controller means for supporting operations of said egress processor, and/or said fragment reassembly controller.
  • 83. The single integrated circuit of claim 82, wherein said ingress processor comprises: a header processor for creating a DOCSIS header for said ingress signal.
  • 84. The single integrated circuit of claim 82, wherein said ingress processor comprises: a PHS processor for suppressing a payload header for said ingress signal.
  • 85. The single integrated circuit of claim 82, further comprising: memory controller means for supporting operations of said ingress processor.
  • 86. A single integrated circuit for providing media access control, comprising: a header processor for accessing an ingress signal and producing a DOCSIS header for said ingress signal; and a downstream PHY interface for delivering said ingress signal to a physical device operable to transmit said downstream signal to a remote.
  • 87. The single integrated circuit of claim 86, further comprising: a PHS processor for suppressing a payload header for said ingress signal.
  • 88. The single integrated circuit of claim 86, further comprising: memory controller means for supporting operations of said header processor.
  • 89. The single integrated circuit of claim 86, further comprising: MPEG encapsulator for producing a MPEG frame from said ingress signal.
  • 90. The single integrated circuit of claim 86, further comprising: encryptor for performing DES encryption on said ingress signal.
  • 91. The single integrated circuit of claim 86, further comprising: direct memory access for retrieving said ingress signal, and enabling said header processor to access said ingress signal.
  • 92. The single integrated circuit of claim 86, wherein said header processor generates HCS and/or CRC fields to enable error detection for said ingress signal.
  • 93. The single integrated circuit of claim 86, further comprising: an egress processor for processing an egress signal, wherein said egress processor is configured to receive said egress signal from a physical device coupled to the signal integrated circuit.
  • 94. The single integrated circuit of claim 93, further comprising: a fragment reassembly controller configured to receive a fragmented voice and/or data packet detected from said egress signal, wherein said fragment reassembly controller is operable to reassemble said fragmented voice and/or data packet to produce a reassembled voice and/or data packet.
  • 95. The single integrated circuit of claim 93, further comprising: a PHS processor for expanding a payload header suppressed packet in response to detecting a suppressed header in said egress signal.
  • 96. The single integrated circuit of claim 93, further comprising: a decrypt or for checking a key sequence number to decrypt said egress signal.
  • 97. The single integrated circuit of claim 93, further comprising: a header processor for deconcatenating said egress signal.
  • 98. The single integrated circuit of claim 93, further comprising: an upstream PHY interface for checking said signal for errors.
  • 99. The single integrated circuit of claim 86, wherein said physical device is operable to transmit said downstream signal over a wireless medium to said remote.
  • 100. A single integrated circuit for providing media access control, comprising: a PHS processor for accessing an ingress signal and suppressing a payload header for said ingress signal; and a downstream PHY interface for delivering said ingress signal to a physical device operable to transmit said downstream signal to a remote.
  • 101. The single integrated circuit of claim 100, further comprising: a header processor for producing a DOCSIS header for said ingress signal.
  • 102. The single integrated circuit of claim 100, further comprising: memory controller means for supporting operations of said header processor.
  • 103. The single integrated circuit of claim 100, further comprising: MPEG encapsulator for producing a MPEG frame from said ingress signal.
  • 104. The single integrated circuit of claim 100, further comprising: encryptor for performing DES encryption on said ingress signal.
  • 105. The single integrated circuit of claim 100, further comprising: direct memory access for retrieving said ingress signal, and enabling said header processor to access said ingress signal.
  • 106. The single integrated circuit of claim 100, wherein said header processor generates HCS and/or CRC fields to enable error detection for said ingress signal.
  • 107. The single integrated circuit of claim 100, further comprising: an egress processor for processing an egress signal, wherein said egress processor is configured to receive said egress signal from a physical device coupled to the signal integrated circuit.
  • 108. The single integrated circuit of claim 107, further comprising: a fragment reassembly controller configured to receive a fragmented voice and/or data packet detected from said egress signal, wherein said fragment reassembly controller is operable to reassemble said fragmented voice and/or data packet to produce a reassembled voice and/or data packet.
  • 109. The single integrated circuit of claim 107, further comprising: a PHS processor for expanding a payload header suppressed packet in response to detecting a suppressed header in said egress signal.
  • 110. The single integrated circuit of claim 107, further comprising: a decrypt or for checking a key sequence number to decrypt said egress signal.
  • 111. The single integrated circuit of claim 107, further comprising: a header processor for deconcatenating said egress signal.
  • 112. The single integrated circuit of claim 107, further comprising: an upstream PHY interface for checking said signal for errors.
  • 113. The single integrated circuit of claim 107, wherein said physical device is operable to transmit said downstream signal over a wireless medium to said remote. 114. The single integrated circuit of claim 107, wherein said physical device is operable to transmit said downstream signal via satellite to said remote.
Parent Case Info

[0001] This application claims the benefit of U.S. Provisional Application No. 60/324,939, filed Sep. 27, 2001, by Denney et al., entitled “Method and System for Highly Integrated Media Access Control in an Asynchronous Network,” incorporated herein by reference.

Provisional Applications (1)
Number Date Country
60324939 Sep 2001 US