OFDMA and Ingress
By Chris Topazi – The alternative of allowing the customer to try and blast through this ingress will result in uncorrectable FEC codewords, and hence packet loss, when trying to use those minislots that are impaired.
Read MoreBy Chris Topazi – The alternative of allowing the customer to try and blast through this ingress will result in uncorrectable FEC codewords, and hence packet loss, when trying to use those minislots that are impaired.
Read MoreBy Kraig Neese – The benefits of the new test racks continue to grow, making troubleshooting and maintaining an R-PHY environment more efficient. There is plenty more to learn as we grow our ability to monitor and troubleshoot these new DAA networks. We continue to push more functions to the remote edges of our networks and these new methods will need to adapt as we grow.
Read MoreBy Alan Skinner – Deploying extended CIN does take a bit of extra work. For example, since the CIN spans multiple sites which typically have redundant transport paths between them
Read MoreBy Robert Kuse – Today’s discussion offers a view of one cable operator’s FTTH journey. We’ll share some learnings and insights we have had on our path to 10G FTTH services via remote OLTs.
Read MoreBy Michael Garramone – Attackers who really want in may keep trying, but the goal is to convince them to give up and try that other house down the street with the open window.
Read MoreBy David Ririe – I bring up those early choices since as we move down the DAA road, there will be presented several new choices. We are looking at a second generation of nodes that will start to incorporate or align more closely with RMD functionality.
Read MoreBy Charles Allred – These small details underscore the importance of open communication between all our engineering and operational teams. No individual holds all the keys or knows the secrets of every dark corner of our network.
Read MoreCateena Powers – Each year a large-scale briefing is available to all the businesses that supply goods and services to sustain DISA’s efforts in supporting the Dept. of Defense and other government agencies. This includes those of us providing critical data and voice communications services.
Read MoreBy Alan Skinner – Cox took a two-pronged approach to this vulnerability: protocol-based filtering and network access control.
Read MoreBy David Ririe – We have spent the last several years aggressively upgrading our network capacity with DOCSIS 3.1 and more recently deploying remote PHY nodes in our new distributed access architecture (DAA). Our CTO Kevin Hart summed it up very well in a recent interview with the NCTA*
Read More