Hitron TECHNOLOGIES CVE1A User Manual

USER’S GUIDE
VERSION 1.1 AUGUST 2011
DEFAULT LOGIN DETAILS IP Address 192.168.0.1 Username admin Password password
CVE-30360

ABOUT THIS USER’S GUIDE

ABOUT THIS USER’S GUIDE
INTENDED AUDIENCE
This manual is intended for people who want to configure the CVE-30360’s features via its Graphical User Interface (GUI).
HOW TO USE THIS USER’S GUIDE
This manual contains information on each the CVE-30360’s GUI screens, and describes how to use its various features.
Use the Introduction (page 15) to see an overview of the topics covered in this
manual.
Use the Table of Contents (page 7), List of Figures (page 11) and List of Tables
(page 13) to quickly find information about a particular GUI screen or topic.
Use the Index (page 95) to find information on a specific keyword.
Use the rest of this User’s Guide to see in-depth descriptions of the CVE-
30360’s features.
RELATED DOCUMENTATION
Quick Installation Guide: see this for information on getting your CVE-30360
up and running right away. It includes information on system requirements, package contents, the installation procedure, and basic troubleshooting tips.
Online Help: each screen in the CVE-30360’s Graphical User Interface (GUI)
contains a Help button. Click this button to see additional information about configuring the screen.
DOCUMENT CONVENTIONS
This User’s Guide uses various typographic conventions and styles to indicate content type:
4
HITRON CVE-30360 USER’S GUIDE
Bulleted paragraphs are used to list items, and to indicate options.
1 Numbered paragraphs indicate procedural steps.
NOTE: Notes provide additional information on a subject.

Product labels, field labels, field choices, etc. are in bold type. For example:
A mouse click in the Graphical User Interface (GUI) is denoted by a right angle bracket ( > ). For example:
means that you should click Settings in the GUI, then Advanced settings. A key stroke is denoted by square brackets and uppercase text. For example:
Warnings provide information about actions that could harm you or your device.
Select UDP to use the User Datagram Protocol.
Click Settings > Advanced Settings.
Press [ENTER] to continue.
CUSTOMER SUPPORT
For technical assistance or other customer support issues, please consult your Hitron representative.
ABOUT THIS USER’S GUIDE
HITRON CVE-30360 USER’S GUIDE
Copyright 2011 Hitron Technologies. All rights reserved. All trademarks and registered trademarks used are the properties of their respective owners.
DISCLAIMER: The information in this User’s Guide is accurate at the time of writing. This User’s Guide is provided “as is” without express or implied warranty of any kind. Neither Hitron Technologies nor its agents assume any liability for inaccuracies in this User’s Guide, or losses incurred by use or misuse of the information in this User’s Guide.
ABOUT THIS USER’S GUIDE
6
HITRON CVE-30360 USER’S GUIDE
ABOUT THIS USER’S GUIDE

TABLE OF CONTENTS

TABLE OF CONTENTS
About This User’s Guide..................................................................3
Table of Contents..............................................................................7
List of Figures .................................................................................11
List of Tables...................................................................................13
Introduction.....................................................................................15
1.1 CVE-30360 Overview .........................................................................15
1.1.1 Key Features .............................................................................16
1.2 Hardware Connections .......................................................................16
1.3 LEDs ..................................................................................................18
1.4 IP Address Setup ...............................................................................20
1.4.1 Manual IP Address Setup ..........................................................21
1.5 Logging into the CVE-30360 ..............................................................22
1.6 GUI Overview .....................................................................................23
1.7 Resetting the CVE-30360 ..................................................................23
Cable................................................................................................25
2.1 Cable Overview ..................................................................................25
2.1.1 DOCSIS .....................................................................................25
2.1.2 IP Addresses and Subnets ........................................................25
2.1.2.1 IP Address Format ............................................................25
2.1.2.2 IP Address Assignment .....................................................25
2.1.2.3 Subnets .............................................................................26
2.1.3 DHCP .........................................................................................27
2.1.4 DHCP Lease ..............................................................................28
2.1.5 MAC Addresses .........................................................................28
8
HITRON CVE-30360 USER’S GUIDE
2.1.6 Routing Mode ............................................................................28
2.1.7 Configuration Files ....................................................................29
2.1.8 Downstream and Upstream Transmissions ..............................29
2.1.9 Cable Frequencies ....................................................................29
2.1.10 Modulation ...............................................................................29
2.1.11 TDMA, FDMA and SCDMA .....................................................30
2.2 The System Info Screen ....................................................................30
2.3 The Initialization Screen ....................................................................32
2.4 The Status Screen .............................................................................33
2.5 The Password Screen .......................................................................36
LAN .................................................................................................. 39
3.1 LAN Overview ....................................................................................39
3.1.1 Local Area Networks .................................................................39
3.1.2 LAN IP Addresses and Subnets ................................................39
3.1.3 Domain Suffix ............................................................................40
3.1.4 Debugging (Ping and Traceroute) .............................................40
3.2 The LAN IP Screen ............................................................................40
3.3 The Switch Setup Screen ..................................................................42
3.4 The Debug Screen .............................................................................43
3.5 The Backup Screen ...........................................................................44
Firewall ............................................................................................ 47
4.1 Firewall Overview ..............................................................................47
4.1.1 Firewall ......................................................................................47
4.1.2 Intrusion detection system .........................................................47
4.1.3 Ping ...........................................................................................47
4.1.4 MAC Filtering .............................................................................47
4.1.5 IP Filtering .................................................................................48
4.1.6 Port Forwarding .........................................................................48
4.1.7 Port Triggering ...........................................................................48
4.1.8 DMZ ...........................................................................................49
4.2 The Firewall Options Screen .............................................................49
4.3 The MAC Filtering Screen .................................................................50
4.4 The IP Filtering Screen ......................................................................53
4.4.1 Adding or Editing an IP Filtering Rule .......................................54
4.5 The Forwarding Screen .....................................................................56
4.5.1 Adding or Editing a Port Forwarding Rule .................................58
4.6 The Port Triggering Screen ...............................................................59
4.6.1 Adding or Editing a Port Triggering Rule ...................................61
TABLE OF CONTENTS
HITRON CVE-30360 USER’S GUIDE
Parental Control..............................................................................63
5.1 Parental Control Overview .................................................................63
5.1.1 Website Blocking .......................................................................63
5.2 The Web Site Blocking Screen ..........................................................63
5.3 The Scheduling Screen ......................................................................65
5.4 The Local Logs Screen ......................................................................67
Wireless ...........................................................................................69
6.1 Wireless Basics ..................................................................................69
6.1.1 Wireless Standards ....................................................................70
6.1.2 Service Sets and SSIDs ............................................................70
6.1.3 Basic Wireless Security .............................................................71
6.2 Wireless Tutorials ...............................................................................71
6.2.1 Choosing a Security Method ......................................................71
6.2.2 Changing the Wireless Password ..............................................72
6.2.3 Changing the Network Name (SSID) .........................................73
6.2.4 Hiding the Network ....................................................................73
6.2.5 Improving the Wireless Network’s Performance ........................73
6.3 Advanced Wireless Networking .........................................................74
6.3.1 Advanced Wireless Security ......................................................74
6.3.2 Other Wireless Concepts ...........................................................75
6.3.2.1 WPS ..................................................................................75
6.3.2.2 WMM .................................................................................76
6.4 The Wireless Screens ........................................................................76
6.4.1 The Basic Screen ......................................................................76
6.4.2 The Security Screen ..................................................................78
6.4.3 The Access Control Screen .......................................................82
6.4.4 The WiFi Site Survey Screen .....................................................84
EMTA................................................................................................87
7.1 The Status Screen .............................................................................87
7.2 The DHCP Screen .............................................................................88
Troubleshooting..............................................................................91
Index.................................................................................................95
TABLE OF CONTENTS
10
HITRON CVE-30360 USER’S GUIDE
TABLE OF CONTENTS

LIST OF FIGURES

LIST OF FIGURES
FIGURE 1: Application Overview ........................................................................15
FIGURE 2: Hardware Connections .....................................................................17
FIGURE 3: LEDs .................................................................................................19
FIGURE 4: Login .................................................................................................22
FIGURE 5: GUI Overview ...................................................................................23
FIGURE 6: The Cable > System Info Screen .....................................................31
FIGURE 7: The Cable > Initialization Screen .....................................................33
FIGURE 8: The Cable > Status Screen ..............................................................34
FIGURE 9: The Cable > Password Screen ........................................................36
FIGURE 10: The LAN > LAN IP Screen .............................................................41
FIGURE 11: The LAN > Switch Setup Screen ....................................................43
FIGURE 12: The LAN > Debug Screen ..............................................................44
FIGURE 13: The LAN > Backup Screen .............................................................44
FIGURE 14: The Firewall > Firewall Options Screen .........................................49
FIGURE 15: The Firewall > MAC Filtering Screen .............................................51
FIGURE 16: The Firewall > IP Filtering Screen ..................................................53
FIGURE 17: The Firewall > IP Filtering > Add/Edit Screen ................................55
FIGURE 18: The Firewall > Forwarding Screen .................................................56
FIGURE 19: The Firewall > Forwarding > Add/Edit Screen ................................58
FIGURE 20: The Firewall > Port Triggering Screen ...........................................60
FIGURE 21: The Firewall > Port Triggering > Add/Edit Screen ..........................61
FIGURE 22: The Parent Control > Web Site Blocking Screen ...........................64
FIGURE 23: The Parent Control > Scheduling Screen .......................................66
FIGURE 24: The Parent Control > Local Logs Screen .......................................67
FIGURE 25: Example Wireless Network ............................................................70
FIGURE 26: The Wireless > Basic Screen .........................................................76
FIGURE 27: WPS PIN ........................................................................................77
FIGURE 28: The Wireless > Security Screen .....................................................79
FIGURE 29: The Wireless > Access Control ......................................................82
FIGURE 30: The Wireless > WiFi Site Survey Screen .......................................84
FIGURE 31: The EMTA > Status Screen ...........................................................87
12
HITRON CVE-30360 USER’S GUIDE
FIGURE 32: The EMTA > DHCP Screen ...........................................................89
LIST OF FIGURES

LIST OF TABLES

LIST OF TABLES
TABLE 1: Hardware Connections ......................................................................17
TABLE 2: LEDs ..................................................................................................19
TABLE 3: GUI Overview ....................................................................................23
TABLE 4: Private IP Address Ranges ...............................................................26
TABLE 5: IP Address: Decimal and Binary ........................................................27
TABLE 6: Subnet Mask: Decimal and Binary ....................................................27
TABLE 7: The Cable > System Info Screen ......................................................31
TABLE 8: The Cable > Status Screen ...............................................................34
TABLE 9: The Cable > Password Screen ..........................................................36
TABLE 10: The LAN > LAN IP Screen ..............................................................41
TABLE 11: The LAN > Switch Setup Screen .....................................................43
TABLE 12: The LAN > Debug Screen ...............................................................44
TABLE 13: The LAN > Backup Screen ..............................................................45
TABLE 14: The Firewall > Firewall Options Screen ...........................................50
TABLE 15: The Firewall > MAC Filtering Screen ...............................................51
TABLE 16: The Firewall > IP Filtering Screen ...................................................53
TABLE 17: The Firewall > IP Filtering > Add/Edit Screen ..................................55
TABLE 18: The Firewall > Forwarding Screen ..................................................56
TABLE 19: The Firewall > Forwarding > Add/Edit Screen .................................58
TABLE 20: The Firewall > Port Triggering Screen .............................................60
TABLE 21: The Firewall > Port Triggering > Add/Edit Screen ...........................62
TABLE 22: The Parent Control > Web Site Blocking Screen ............................64
TABLE 23: The Parent Control > Scheduling Screen ........................................66
TABLE 24: The Parental Control > Local Logs Screen .....................................67
TABLE 25: The Wireless > Basic Screen ..........................................................77
TABLE 26: The Wireless > Security Screen ......................................................79
TABLE 27: The Wireless > Access Control Screen ...........................................82
TABLE 28: The Wireless > WiFi Site Survey Screen ........................................84
TABLE 29: The EMTA > Status Screen .............................................................87
TABLE 30: The EMTA > DHCP Screen .............................................................89
14
HITRON CVE-30360 USER’S GUIDE
LIST OF TABLES
1

INTRODUCTION

This chapter introduces the CVE-30360 and its GUI (Graphical User Interface).

1.1 CVE-30360 OVERVIEW

Your CVE-30360 is a voice-enabled cable modem and wireless access point that allows you to connect your computers, analog telephones, wireless devices, and other network devices to one another, and to the Internet via the cable connection.
15
Computers with a wired connection to the CVE-30360 are on the Local Area Network (LAN), computers with a wireless connection to the CVE-30360 are on the Wireless Local Area Network (WLAN) and the CVE-30360 connects to the service provider over the Wide Area Network (WAN).
FIGURE 1: Application Overview
INTRODUCTION
16
HITRON CVE-30360 USER’S GUIDE

1.1.1 KEY FEATURES

The CVE-30360 provides:
Internet connection to cable modem service via CATV port (F-type RF
connector)
Voice over IP (VoIP) connection to your voice service provider.Local Area Network connection via four 10/100/1000 Mbps (megabits per
second) Ethernet ports
Dynamic Host Configuration Protocol (DHCP) for devices on the LANLAN troubleshooting tools (Ping and Traceroute)IEEE 802.11b/g/n wireless MIMO (Multiple-In, Multiple-Out) networking, allowing
speeds of up to 300Mbps
Wireless security: WEP, WPA-PSK and WPA2-PSK encryption, Wifi Protected
Setup (WPS) push-button and PIN configuration and MAC filtering
Wired security: stateful inspection firewall with intrusion detection system, IP and
MAC filtering, port forwarding and port triggering, and De-Militarized Zone (DMZ)
Parental control: scheduled website blocking and access logsSettings backup and restoreSecure configuration interface, accessible by Web browser

1.2 HARDWARE CONNECTIONS

This section describes the CVE-30360’s physical ports and buttons.
INTRODUCTION
HITRON CVE-30360 USER’S GUIDE
FIGURE 2: Hardware Connections
17
TABLE 1: Hardware Connections
WIFI Use this button to turn the wireless network on or off,
and to begin the WiFi Protected Setup (WPS) Push­Button Configuration (PBC) procedure (see WPS on page 75 for more information.)
To turn the wireless network on or off, press the
button for between one and five seconds.
To begin the WPS PBC connection procedure, press
and hold the button for between five and ten seconds. Press the PBC button on your wireless clients in the coverage area within two minutes to enable them to join the wireless network.
Reset Use this button to reboot or reset your CVE-30360.
Press the button and hold it for less than five
seconds to reboot the CVE-30360. The CVE-30360 restarts, using your existing settings.
Press the button and hold it for more than ten
seconds to delete all user-configured settings and restart the CVE-30360 using its factory default settings.
USB Insert USB disk to share files.
INTRODUCTION
18
HITRON CVE-30360 USER’S GUIDE
TABLE 1: Hardware Connections
LAN1 Use these ports to connect your computers and other LAN2 LAN3 LAN4 LINE 1 Use these ports to connect your analog phones for VoIP LINE 2 CABLE Use this to connect to the Internet via an F-type RF
POWER Use this to connect to the 12v/2A power adapter that
network devices, using Category 5 or 6 Ethernet cables with RJ45 connectors.
services, using cables with RJ11 connectors.
cable.
came with your CVE-30360.
NEVER use another power adapter with
your CVE-30360. Doing so could harm your CVE-30360.
ON/OFF Use this button to turn your CVE-30360 on or off.
To turn the CVE-30360 on, press and hold the ON/
OFF button for less than 1 second.
To turn the CVE-30360 off, press and hold the ON/
OFF button for 1~2 seconds.

1.3 LEDS

This section describes the CVE-30360’s LEDs (lights).
INTRODUCTION
HITRON CVE-30360 USER’S GUIDE
FIGURE 3: LEDs
19
TABLE 2: LEDs
LED STATUS DESCRIPTION LINE 1
LINE 2
WIRELESS Off No data is being transmitted or received over the
USB On Valid USB connection status.
Off Your service plan does not include voice service.
NOTE: The number of LINE LEDs that light up
depends on your voice service plan.
Blinking A telephone is connected to the relevant Line port,
and is off-hook.
On Your service plan includes voice service.
NOTE: The number of LINE LEDs that light up
depends on your voice service plan.
wireless network.
Blinking Data is being transmitted or received over the
wireless network.
Off No USB is connected or invalid USB connection
status.
INTRODUCTION
20
HITRON CVE-30360 USER’S GUIDE
TABLE 2: LEDs
ETH Off No device is connected to any LAN port.
Blinking A device is connected to a LAN port via a fast
Ethernet link, and is transmitting or receiving data.
On A device is connected to a LAN port via a fast
ethernet link, but is not transmitting or receiving data.
Status Blinking The CVE-30360’s cable modem is registering with
the service provider.
On The CVE-30360’s cable modem has successfully
registered with the service provider.
US Blinking The CVE-30360 is searching for an upstream
frequency on the CATV connection.
On The CVE-30360 has successfully located and
locked onto an upstream frequency on the CATV connection.
DS Blinking The CVE-30360 is searching for a downstream
frequency on the CATV connection.
On The CVE-30360 has successfully located and
locked onto a downstream frequency on the CATV connection.
Power On The CVE-30360 is receiving power.
Off The CVE-30360 is not receiving power.
When you turn on the CVE-30360, the LEDs light up in the following order:
PowerUSDSStatusThe ETH 1~4 LEDs light up as soon as there is activity on the relevant port, the
LINE 1~2 ports light up if your service contract includes voice service (the number of LEDs that lights up depends on your service plan), USB LED lights up if your have valid USB connection, and the WIRELESS LED lights up once the wireless network is ready.

1.4 IP ADDRESS SETUP

Before you log into the CVE-30360’s GUI, your computer’s IP address must be in the same subnet as the CVE-30360. This allows your computer to communicate with the CVE-30360.
NOTE: See IP Addresses and Subnets on page 25 for background information.
INTRODUCTION
HITRON CVE-30360 USER’S GUIDE
The CVE-30360 has a built-in DHCP server that, when active, assigns IP addresses to computers on the LAN. When the DHCP server is active, you can get an IP address automatically. The DHCP server is active by default.
If your computer is configured to get an IP address automatically, or if you are not sure, try to log in to the CVE-30360 (see Logging into the CVE-30360 on page 13).
If the login screen displays, your computer is already configured correctly.If the login screen does not display, either the CVE-30360’s DHCP server is not
active or your computer is not configured correctly. Follow the procedure in
Manual IP Address Setup on page 12 and set your computer to get an IP
address automatically. Try to log in again. If you cannot log in, follow the manual IP address setup procedure again, and set a specific IP address as shown. Try to log in again.
NOTE: If you still cannot see the login screen, your CVE-30360’s IP settings may
have been changed from their defaults. If you do not know the CVE-30360’s new address, you should return it to its factory defaults. See Resetting the CVE-30360 on page 14. Bear in mind that ALL user-configured settings are lost.
21

1.4.1 MANUAL IP ADDRESS SETUP

By default, your CVE-30360’s local IP address is 192.168.0.1. If your CVE-30360 is using the default IP address, you should set your computer’s IP address to be between 192.168.0.2 and 192.168.0.254.
NOTE: If your CVE-30360 DHCP server is active, set your computer to get an IP
address automatically in step 5. The CVE-30360 assigns an IP address to your computer. The DHCP server is active by default.
Take the following steps to manually set up your computer’s IP address to connect to the CVE-30360:
NOTE: This example uses Windows XP; the procedure for your operating system
may be different.
1 Click Start, then click Control Panel. 2 In the window that displays, double-click Network Connections. 3 Right-click your network connection (usually Local Area Connection) and click
Properties.
4 In the General tab’s This connection uses the following items list, scroll
down and select Internet Protocol (TCP/IP). Click Properties.
5 You can get an IP address automatically, or specify one manually:
INTRODUCTION
22
HITRON CVE-30360 USER’S GUIDE
If your CVE-30360’s DHCP server is active, select Get an IP address
automatically.
If your CVE-30360’s DHCP server is not active, select Use the following IP
address. In the IP address field, enter a value between 192.168.0.2 and
192.168.0.254 (default). In the Subnet mask field, enter 255.255.255.0
(default).
NOTE: If your CVE-30360 is not using the default IP address, enter an IP address
and subnet mask that places your computer in the same subnet as the CVE-
30360.
6 Click OK. The Internet Protocol (TCP/IP) window closes. In the Local Area
Connection Properties window, click OK.
Your computer now obtains an IP address from the CVE-30360, or uses the IP address that you specified, and can communicate with the CVE-30360.

1.5 LOGGING INTO THE CVE-30360

Take the following steps to log into the CVE-30360’s GUI.
NOTE: You can log into the CVE-30360’s GUI via the wireless interface. However, it
is strongly recommended that you configure the CVE-30360 via a wired connection on the LAN.
1 Open a browser window. 2 Enter the CVE-30360’s IP address (default 192.168.0.1) in the URL bar. The
Login screen displays.
FIGURE 4: Login
3 Enter the Username and Password. The default login username is admin, and
the default password is password.
INTRODUCTION
HITRON CVE-30360 USER’S GUIDE
NOTE: The Username and Password are case-sensitive; “admin” is not the same as
“Admin”.
4 Click Login. The System Info screen displays (see The System Info Screen on
page 30).

1.6 GUI OVERVIEW

This section describes the CVE-30360’s GUI.
FIGURE 5: GUI Overview
23
TABLE 3: GUI Overview
Primary Navigation Bar
Secondary Navigation Bar
Main Window Use this section to read information about your CVE-30360’s
Use this section to move from one part of the GUI to another.
Use this section to move from one related screen to another.
configuration, and make configuration changes.

1.7 RESETTING THE CVE-30360

When you reset the CVE-30360 to its factory defaults, all user-configured settings are lost, and the CVE-30360 is returned to its initial configuration state.
There are two ways to reset the CVE-30360:
INTRODUCTION
24
HITRON CVE-30360 USER’S GUIDE
Press the RESET button on the CVE-30360, and hold it in for ten seconds or
longer.
Click LAN > Backup. In the screen that displays, click the Factory Reset
button.
The CVE-30360 turns off and on again, using its factory default settings.
NOTE: Depending on your CVE-30360’s previous configuration, you may need to re-
configure your computer’s IP settings; see IP Address Setup on page 11.
INTRODUCTION

CABLE

2
CABLE
This chapter describes the screens that display when you click Cable in the toolbar.

2.1 CABLE OVERVIEW

This section describes some of the concepts related to the Cable screens.

2.1.1 DOCSIS

The Data Over Cable Service Interface Specification (DOCSIS) is a telecommunications standard that defines the provision of data services) Internet access) over a traditional cable TV (CATV) network.
Your CVE-30360 supports DOCSIS version 3.0.

2.1.2 IP ADDRESSES AND SUBNETS

Every computer on the Internet must have a unique Internet Protocol (IP) address. The IP address works much like a street address, in that it identifies a specific location to which information is transmitted. No two computers on a network can have the same IP address.
2.1.2.1 IP ADDRESS FORMAT
IP addresses consist of four octets (8-bit numerical values) and are usually represented in decimal notation, for example 192.168.1.1. In decimal notation, this means that each octet has a minimum value of 0 and a maximum value of 255.
An IP address carries two basic pieces of information: the “network number” (the address of the network as a whole, analogous to a street name) and the “host ID” (analogous to a house number) which identifies the specific computer (or other network device).
2.1.2.2 IP ADDRESS ASSIGNMENT
IP addresses can come from three places:
The Internet Assigned Numbers Agency (IANA)
26
HITRON CVE-30360 USER’S GUIDE
Your Internet Service Provider
You (or your network devices)
IANA is responsible for IP address allocation on a global scale, and your ISP assigns IP addresses to its customers. You should never attempt to define your own IP addresses on a public network, but you are free to do so on a private network.
In the case of the CVE-30360:
The public network (Wide Area Network or WAN) is the link between the cable
(CATV) connector and your Internet Service Provider. Your CVE-30360’s IP address on this network is assigned by your service provider.
The private network (in routing mode - see Routing Mode on page 28) is your
Local Area Network (LAN) and Wireless Local Area Network (WLAN), if enabled. You are free to assign IP addresses to computers on the LAN and WLAN manually, or to allow the CVE-30360 to assign them automatically via DHCP (Dynamic Host Configuration Protocol). IANA has reserved the following blocks of IP addresses to be used for private networks only:
TABLE 4: Private IP Address Ranges
FROM... ...TO
10.0.0.0 10.255.255.255
172.16.0.0 172.31.255.255
192.168.0.0 192.168.255.255 If you assign addresses manually, they must be within the CVE-30360’s LAN
subnet.
2.1.2.3 SUBNETS
A subnet (short for sub-network) is, as the name suggests, a separate section of a network, distinct from the main network of which it is a part. A subnet may contain all of the computers at one corporate local office, for example, while the main network includes several offices.
In order to define the extent of a subn a subnet mask is used. This “masks” the part of the IP address that refers to the main network, leaving the part of the IP address that refers to the sub-network.
Each subnet mask has 32 bits (binary digits), as does each IP address:
et, and to differentiate it from the main network,
A binary value of 1 in the subnet mask indicates that the corresponding bit in the
IP address is part of the main network.
A binary value of 0 in the subnet mask indicates that the corresponding bit in the
IP address is part of the sub-network.
CABLE
HITRON CVE-30360 USER’S GUIDE
For example, the following table shows the IP address of a computer (192.168.1.1) expressed in decimal and binary (each cell in the table indicates one octet):
TABLE 5: IP Address: Decimal and Binary
192 168 0 1 11000000 10101000 00000000 00000001
The following table shows a subnet mask that “masks” the first twenty-four bits of the IP address, in both its decimal and binary notation.
TABLE 6: Subnet Mask: Decimal and Binary
255 255 255 0 11111111 11111111 11111111 00000000
This shows that in this subnet, the first three octets (192.168.1, in the example IP address) define the main network, and the final octet (1, in the example IP address) defines the computer’s address on the subnet.
The decimal and binary notations give us the two common ways to write a subnet mask:
Decimal: the subnet mask is written in the same fashion as the IP address:
255.255.255.0, for example.
Binary: the subnet mask is indicated after the IP address (preceded by a forward
slash), specifying the number of binary digits that it masks. The subnet mask
255.255.255.0 masks the first twenty-four bits of the IP address, so it would be written as follows: 192.168.1.1/24.

2.1.3 DHCP

The Dynamic Host Configuration Protocol, or DHCP, defines the process by which IP addresses can be assigned to computers and other networking devices automatically, from another device on the network. This device is known as a DHCP server, and provides addresses to all the DHCP client devices.
In order to receive an IP address via DHCP, a computer must first request one from the DHCP server (this is a broadcast request, meaning that it is sent out to the whole network, rather than just one IP address). The DHCP server hears the requests, and responds by assigning an IP address to the computer that requested it.
If a computer is not configured to request an IP address via DHCP, you must configure an IP address manually if you want to access other computers and devices on the network. See IP Address Setup on page 20 for more information.
By default, the CVE-30360 is a DHCP client on the WAN (the CATV connection). It broadcasts an IP address over the cable network, and receives one from the service provider. By default, the CVE-30360 is a DHCP server on the LAN; it provides IP addresses to computers on the LAN which request them.
CABLE
28
HITRON CVE-30360 USER’S GUIDE

2.1.4 DHCP LEASE

“DHCP lease” refers to the length of time for which a DHCP server allows a DHCP client to use an IP address. Usually, a DHCP client will request a DHCP lease renewal before the lease time is up, and can continue to use the IP address for an additional period. However, if the client does not request a renewal, the DHCP server stops allowing the client to use the IP address.
This is done to prevent IP addresses from being used up by computers that no longer require them, since the pool of available IP addresses is finite.

2.1.5 MAC ADDRESSES

Every network device possesses a Media Access Control (MAC) address. This is a unique alphanumeric code, given to the device at the factory, which in most cases cannot be changed (although some devices are capable of “MAC spoofing”, where they impersonate another device’s MAC address).
MAC addresses are the most reliable way of identifying network devices, since IP addresses tend to change over time (whether manually altered, or updated via DHCP).
Each MAC address displays as six groups of two hexadecimal digits separated by colons (or, occasionally, dashes) for example 00:AA:FF:1A:B5:74.
NOTE: Each group of two hexadecimal digits is known as an “octet”, since it
represents eight bits.
Bear in mind that a MAC address does not precisely represent a computer on your network (or elsewhere), it represents a network device, which may be part of a computer (or other device). For example, if a single computer has an Ethernet card (to connect to your CVE-30360 via one of the LAN ports) and also has a wireless card (to connect to your CVE-30360 over the wireless interface) the MAC addresses of the two cards will be different. In the case of the CVE-30360, each internal module (cable modem module, Ethernet module, wireless module, etc.) possesses its own MAC address.

2.1.6 ROUTING MODE

When your CVE-30360 is in routing mode, it acts as a gateway for computers on the LAN to access the Internet. The service provider assigns an IP address to the CVE­30360 on the WAN, and all traffic for LAN computers is sent to that IP address. The CVE-30360 assigns private IP addresses to LAN computers (when DHCP is active), and transmits the relevant traffic to each private IP address.
NOTE: When DHCP is not active on the CVE-30360 in routing mode, each computer
on the LAN must be assigned an IP address in the CVE-30360’s subnet manually.
CABLE
HITRON CVE-30360 USER’S GUIDE
When the CVE-30360 is not in routing mode, the service provider assigns an IP address to each computer connected to the CVE-30360 directly. The CVE-30360 does not perform any routing operations, and traffic flows between the computers and the service provider.
Routing mode is not user-configurable; it is specified by the service provider in the CVE-30360’s configuration file.

2.1.7 CONFIGURATION FILES

The CVE-30360’s configuration (or config) file is a document that the CVE-30360 obtains automatically over the Internet from the service provider’s server, which specifies the settings that the CVE-30360 should use. It contains a variety of settings that are not present in the user-configurable Graphical User Interface (GUI) and can be specified only by the service provider.

2.1.8 DOWNSTREAM AND UPSTREAM TRANSMISSIONS

The terms “downstream” and “upstream” refer to data traffic flows, and indicate the direction in which the traffic is traveling. “Downstream” refers to traffic from the service provider to the CVE-30360, and “upstream” refers to traffic from the CVE­30360 to the service provider.

2.1.9 CABLE FREQUENCIES

Just like radio transmissions, data transmissions over the cable network must exist on different frequencies in order to avoid interference between signals.
The data traffic band is separate from the TV band, and each data channel is separate from other data channels.

2.1.10 MODULATION

Transmissions over the cable network are based on a strong, high frequency periodic waveform known as the “carrier wave.” This carrier wave is so called because it “carries” the data signal. The data signal itself is defined by variations in the carrier wave. The process of varying the carrier wave (in order to carry data signal information) is known as “modulation.” The data signal is thus known as the “modulating signal.”
Cable transmissions use a variety of methods to perform modulation (and the “decoding” of the received signal, or “demodulation”). The modulation methods defined in DOCSIS 3 are as follows:
QPSK: Quadrature Phase-Shift Keying
QAM: Quadrature Amplitude Modulation
QAM TCM: Trellis modulated Quadrature Amplitude Modulation
CABLE
30
HITRON CVE-30360 USER’S GUIDE
In many cases, a number precedes the modulation type (for example 16 QAM). This number refers to the complexity of modulation. The higher the number, the more data can be encoded in each symbol.
NOTE: In modulated signals, each distinct modulated character (for example, each
audible tone produced by a modem for transmission over telephone lines) is known as a symbol.
Since more information can be represented by a single character, a higher number indicates a higher data transfer rate.

2.1.11 TDMA, FDMA AND SCDMA

Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA) and Synchronous Code Division Multiple Access (SCDMA) are channel access methods that allow multiple users to share the same frequency channel.
TDMA allows multiple users to share the same frequency channel by splitting
transmissions by time. Each user is allocated a number of time slots, and transmits during those time slots.
FDMA allows multiple users to share the same frequency channel by assigning a
frequency band within the existing channel to each user.
SCDMA allows multiple users to share the same frequency channel by assigning
a unique orthogonal code to each user.

2.2 THE SYSTEM INFO SCREEN

Use this screen to see general information about your CVE-30360’s hardware, its software, and its connection to the Internet.
NOTE: Most of the information that displays in this screen is for troubleshooting
purposes only. However, you may need to use the MAC Address information when setting up your network.
Click Cable > System Info. The following screen displays.
CABLE
Loading...
+ 68 hidden pages