Page 26 / 98 Scroll up to view Page 21 - 25
26
HITRON CVE-30360 USER’S GUIDE
CABLE
Your Internet Service Provider
You (or your network devices)
IANA is responsible for IP address allocation on a global scale, and your ISP assigns
IP addresses to its customers. You should never attempt to define your own IP
addresses on a public network, but you are free to do so on a private network.
In the case of the CVE-30360:
The public network (Wide Area Network or WAN) is the link between the cable
(CATV) connector and your Internet Service Provider. Your CVE-30360’s IP
address on this network is assigned by your service provider.
The private network (in routing mode - see
Routing Mode
on page
28
) is your
Local Area Network (LAN) and Wireless Local Area Network (WLAN), if
enabled. You are free to assign IP addresses to computers on the LAN and
WLAN manually, or to allow the CVE-30360 to assign them automatically via
DHCP (Dynamic Host Configuration Protocol). IANA has reserved the following
blocks of IP addresses to be used for private networks only:
If you assign addresses manually, they must be within the CVE-30360’s LAN
subnet.
2.1.2.3
SUBNETS
A subnet (short for sub-network) is, as the name suggests, a separate section of a
network, distinct from the main network of which it is a part. A subnet may contain all
of the computers at one corporate local office, for example, while the main network
includes several offices.
In order to define the extent of a subnet, and to differentiate it from the main network,
a subnet mask is used. This “masks” the part of the IP address that refers to the main
network, leaving the part of the IP address that refers to the sub-network.
Each subnet mask has 32 bits (binary digits), as does each IP address:
A binary value of
1
in the subnet mask indicates that the corresponding bit in the
IP address is part of the main network.
A binary value of
0
in the subnet mask indicates that the corresponding bit in the
IP address is part of the sub-network.
TABLE 4:
Private IP Address Ranges
FROM...
...TO
10.0.0.0
10.255.255.255
172.16.0.0
172.31.255.255
192.168.0.0
192.168.255.255
Page 27 / 98
27
HITRON CVE-30360 USER’S GUIDE
CABLE
For example, the following table shows the IP address of a computer (
192.168.1.1
)
expressed in decimal and binary (each cell in the table indicates one octet):
The following table shows a subnet mask that “masks” the first twenty-four bits of the
IP address, in both its decimal and binary notation.
This shows that in this subnet, the first three octets (
192.168.1
, in the example IP
address) define the main network, and the final octet (
1
, in the example IP address)
defines the computer’s address on the subnet.
The decimal and binary notations give us the two common ways to write a subnet
mask:
Decimal: the subnet mask is written in the same fashion as the IP address:
255.255.255.0
, for example.
Binary: the subnet mask is indicated after the IP address (preceded by a forward
slash), specifying the number of binary digits that it masks. The subnet mask
255.255.255.0
masks the first twenty-four bits of the IP address, so it would be
written as follows: 192.168.1.1
/24
.
2.1.3
DHCP
The Dynamic Host Configuration Protocol, or DHCP, defines the process by which IP
addresses can be assigned to computers and other networking devices
automatically, from another device on the network. This device is known as a DHCP
server, and provides addresses to all the DHCP client devices.
In order to receive an IP address via DHCP, a computer must first request one from
the DHCP server (this is a broadcast request, meaning that it is sent out to the whole
network, rather than just one IP address). The DHCP server hears the requests, and
responds by assigning an IP address to the computer that requested it.
If a computer is not configured to request an IP address via DHCP, you must
configure an IP address manually if you want to access other computers and devices
on the network. See
IP Address Setup
on page
20
for more information.
By default, the CVE-30360 is a DHCP client on the WAN (the CATV connection). It
broadcasts an IP address over the cable network, and receives one from the service
provider. By default, the CVE-30360 is a DHCP server on the LAN; it provides IP
addresses to computers on the LAN which request them.
TABLE 5:
IP Address: Decimal and Binary
192
168
0
1
11000000
10101000
00000000
00000001
TABLE 6:
Subnet Mask: Decimal and Binary
255
255
255
0
11111111
11111111
11111111
00000000
Page 28 / 98
28
HITRON CVE-30360 USER’S GUIDE
CABLE
2.1.4
DHCP LEASE
“DHCP lease” refers to the length of time for which a DHCP server allows a DHCP
client to use an IP address. Usually, a DHCP client will request a DHCP lease
renewal before the lease time is up, and can continue to use the IP address for an
additional period. However, if the client does not request a renewal, the DHCP server
stops allowing the client to use the IP address.
This is done to prevent IP addresses from being used up by computers that no longer
require them, since the pool of available IP addresses is finite.
2.1.5
MAC ADDRESSES
Every network device possesses a Media Access Control (MAC) address. This is a
unique alphanumeric code, given to the device at the factory, which in most cases
cannot be changed (although some devices are capable of “MAC spoofing”, where
they impersonate another device’s MAC address).
MAC addresses are the most reliable way of identifying network devices, since IP
addresses tend to change over time (whether manually altered, or updated via
DHCP).
Each MAC address displays as six groups of two hexadecimal digits separated by
colons (or, occasionally, dashes) for example
00:AA:FF:1A:B5:74
.
NOTE:
Each group of two hexadecimal digits is known as an “octet”, since it
represents eight bits.
Bear in mind that a MAC address does not precisely represent a computer on your
network (or elsewhere), it represents a network device, which may be part of a
computer (or other device). For example, if a single computer has an Ethernet card
(to connect to your CVE-30360 via one of the
LAN
ports) and also has a wireless
card (to connect to your CVE-30360 over the wireless interface) the MAC addresses
of the two cards will be different. In the case of the CVE-30360, each internal module
(cable modem module, Ethernet module, wireless module, etc.) possesses its own
MAC address.
2.1.6
ROUTING MODE
When your CVE-30360 is in routing mode, it acts as a gateway for computers on the
LAN to access the Internet. The service provider assigns an IP address to the CVE-
30360 on the WAN, and all traffic for LAN computers is sent to that IP address. The
CVE-30360 assigns private IP addresses to LAN computers (when DHCP is active),
and transmits the relevant traffic to each private IP address.
NOTE:
When DHCP is not active on the CVE-30360 in routing mode, each computer
on the LAN must be assigned an IP address in the CVE-30360’s subnet
manually.
Page 29 / 98
29
HITRON CVE-30360 USER’S GUIDE
CABLE
When the CVE-30360 is not in routing mode, the service provider assigns an IP
address to each computer connected to the CVE-30360 directly. The CVE-30360
does not perform any routing operations, and traffic flows between the computers and
the service provider.
Routing mode is not user-configurable; it is specified by the service provider in the
CVE-30360’s configuration file.
2.1.7
CONFIGURATION FILES
The CVE-30360’s configuration (or config) file is a document that the CVE-30360
obtains automatically over the Internet from the service provider’s server, which
specifies the settings that the CVE-30360 should use. It contains a variety of settings
that are not present in the user-configurable Graphical User Interface (GUI) and can
be specified only by the service provider.
2.1.8
DOWNSTREAM AND UPSTREAM TRANSMISSIONS
The terms “downstream” and “upstream” refer to data traffic flows, and indicate the
direction in which the traffic is traveling. “Downstream” refers to traffic from the
service provider to the CVE-30360, and “upstream” refers to traffic from the CVE-
30360 to the service provider.
2.1.9
CABLE FREQUENCIES
Just like radio transmissions, data transmissions over the cable network must exist
on different frequencies in order to avoid interference between signals.
The data traffic band is separate from the TV band, and each data channel is
separate from other data channels.
2.1.10
MODULATION
Transmissions over the cable network are based on a strong, high frequency periodic
waveform known as the “carrier wave.” This carrier wave is so called because it
“carries” the data signal. The data signal itself is defined by variations in the carrier
wave. The process of varying the carrier wave (in order to carry data signal
information) is known as “modulation.” The data signal is thus known as the
“modulating signal.”
Cable transmissions use a variety of methods to perform modulation (and the
“decoding” of the received signal, or “demodulation”). The modulation methods
defined in DOCSIS 3 are as follows:
QPSK
: Quadrature Phase-Shift Keying
QAM
: Quadrature Amplitude Modulation
QAM TCM
: Trellis modulated Quadrature Amplitude Modulation
Page 30 / 98
30
HITRON CVE-30360 USER’S GUIDE
CABLE
In many cases, a number precedes the modulation type (for example
16 QAM
). This
number refers to the complexity of modulation. The higher the number, the more data
can be encoded in each symbol.
NOTE:
In modulated signals, each distinct modulated character (for example, each
audible tone produced by a modem for transmission over telephone lines) is
known as a symbol.
Since more information can be represented by a single character, a higher number
indicates a higher data transfer rate.
2.1.11
TDMA, FDMA AND SCDMA
Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA)
and Synchronous Code Division Multiple Access (SCDMA) are channel access
methods that allow multiple users to share the same frequency channel.
TDMA allows multiple users to share the same frequency channel by splitting
transmissions by time. Each user is allocated a number of time slots, and
transmits during those time slots.
FDMA allows multiple users to share the same frequency channel by assigning a
frequency band within the existing channel to each user.
SCDMA allows multiple users to share the same frequency channel by assigning
a unique orthogonal code to each user.
2.2
THE SYSTEM INFO SCREEN
Use this screen to see general information about your CVE-30360’s hardware, its
software, and its connection to the Internet.
NOTE:
Most of the information that displays in this screen is for troubleshooting
purposes only. However, you may need to use the MAC Address information
when setting up your network.
Click
Cable
>
System Info
. The following screen displays.

Rate

4.5 / 5 based on 2 votes.

Popular Hitron Technologies Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top