X hits on this document

PDF document

  - page 36 / 70

266 views

0 shares

0 downloads

0 comments

36 / 70

Security Principles

To keep consumers from tampering with important controller functions, a "secure" section is required that allows for local or remote software/firmware updates by utility company "owners" of the RG hardware. The RG Group envisions security to consist of physical logical box and the security software.

Concept of Operation

This section reviews the principles behind the basic operation of the RG and points to the core functions that need to be standardized. In its simplest form, the RG may be viewed as a set of ports, which are connected via the internal bus of the RG. The ports are created by the installation of CPI and NIU adapters into the RG. In more advanced adapters there may be substantial computing capability on the adapter itself that may implement some high-level service, such as a security system, or a small PBX. A core part of the RG standard will be a mechanism for delivery of ATM cells from the access network via the NIU adapters to the CPI adapters and vice versa.

The purpose of the RG is to provide inter-communication among the adapters at bit rates up to some defined rate. One such rate could be the 25.6 Mbps standard defined as the lowest rate for an ATM port. For example, the access network could provide a raw outbound data rate of 25.6 Mbps (to the RG) and an in-bound rate of, say, 1.5 Mbps (to the local PSTN exchange or to the level 1 gateway of a cable TV network). The purpose of the RG is then to allocate the capacities of the outbound and inbound channels to the various end-user services attached to the RG. Note that the access network need not provide a single bearer channel; it could, for example, provide an outbound broadband channel for video services and a set of narrow-band (ISDN)

29

Document info
Document views266
Page views266
Page last viewedFri Dec 09 17:31:28 UTC 2016
Pages70
Paragraphs1218
Words14747

Comments