`
`I, Brenda Ray, being over 18 year of age and duly s·worn, depose and say as
`
`
`follows:
`
`1.I am an employee of the Auburn University Library, and specifically the Document
`
`
`
`
`
`
`
`
`
`Delivery Unit, located at Auburn University, Auburn, Alabama 36849. I am familiar with
`
`
`
`
`
`
`the policies and procedures of the Library as they relate to the receipt, cataloging, and
`
`
`
`
`tracking of books and I have personal knowledge of the facts set forth below. I am
`
`
`
`
`
`familiar with these procedures because I have been employed by the Library since 1989,
`
`
`
`
`andthen the Science then moved to Serials, where I began in Binding and Receiving,
`
`
`
`
`
`Technology Department, then the Architecture Library and finally the Document
`
`
`
`
`
`Delivery Unit. I have held my current position in the Document Delivery Unit for the last
`17 years.
`
`that when an item is received by the2.It is and has been standard operating procedure
`
`
`
`
`
`
`
`
`Library, it is recei ed, cataloged, physically processed (spine label with call number,
`
`
`
`
`
`tattle-taped, ownership stamp, etc.). The item would then be stamped with date mark. The
`
`
`
`item would be made available to patrons within a few days of the item arriving
`at the library.
`
`3.The Auburn University Library holds an original copy of lectronic Design Volume 45,
`
`
`
`
`
`
`
`
`Issue 27, December 1, 1997. I have been asked for information about Electronic Design
`
`
`
`specifically when this volume was first made publicly available by the Auburn University
`
`
`
`
`
`
`Library. From my review of the Library's records, and my knowledge of the Library s
`
`
`
`
`
`standard procedures, this issue of Electronic Design was cataloged and publicly available
`
`
`
`
`
`in the Library by no later than December 20, 1997, and was in current issues, shelved in
`
`
`
`alphabetical order within a few days after the date of December 20, 1997.
`
`4.In my opinion, the journal lectronic Design was cataloged and available at the Auburn
`
`
`
`
`
`
`
`
`University Library on December 20, 1997 based on the date stamp on a preliminary page
`
`
`
`
`inside this volume of Electronic Design. I have not seen any indication that this volume
`
`
`
`
`of Electronic Design would have been an exception to the Library's standard practice.
`
`
`
`
`
`
`The Library maintains a searchable and publicly accessible catalog of its publications.
`
`
`
`
`Therefore, as of December 31, 1997 any member of the public could have located this
`
`
`
`
`
`volume of Electronic Design by searching our catalog by the title, call number, and/or
`subject matter.
`
`table of contents,copy of the cover, is a true and accurate 5.Exhibit A to this Declaration
`
`
`
`
`
`
`
`
`preliminary page with date stamp and the article "MCNS/DOCSIS MAC Clears A Path
`
`
`
`For The Cable-Modem Invasion" by Lee Goldberg on pages 69-70, 74, 78, 80 from the
`
`
`
`
`journal Electronic Design Volume 45, Issue 27, December 1, 1997, ISSN 0013-4872
`
`
`from the Auburn University Libraries collection.
`
`MEDIATEK EX. 1010
`Page 1 of 11
`
`
`
`I declare and affirm under penalty of perjury that all statements made herein of my own
`
`
`
`
`
`
`
`
`
`knowledge are true and that all statements made on information and belief are believed to be
`
`
`
`
`true; and further that these statements were made with the knowledge that willful false
`
`
`
`
`statements and the like are punishable by fine or imprisonment, or both, under Section 1001 of
`
`
`
`
`Title 18 of the United States Code. If called to testify, I could and would competently testify
`
`
`
`
`
`in this noted, the facts and statements under oath to the facts set forth above. Unless otherwise
`
`
`
`
`Declaration are based on my personal knowledge and my review of the documents discussed
`
`
`
`herein, and I am competent to testify to these facts.
`
`May 11, 2021
`
`Auburn University Libraries
`
`231 Mell Street
`Auburn, AL 36849-5606
`
`BrendaRay �
`
`
`Library Specialist, Tech II
`
`MEDIATEK EX. 1010
`Page 2 of 11
`
`
`
`
`
`
`
`
`
`EXHIBIT A
`EXHIBIT A
`
`MEDIATEKEX.1010
`Page 3 of 11
`
`MEDIATEK EX. 1010
`Page 3 of 11
`
`
`
`TECHNOLOGY• APPLICATIONS· PRODUCTS· SOLUTIONS
`
`DECEMBER l, 1997
`
`
`APENTON PUBLICATION
`$10.00
`
`,
`
`..
`
`.
`
`,.. Cl)�
`
`...
`
`'° *
`
`'°
`
`I etp►O
`II
`;1 ... <114<
`G� i oii51-4 m:c
`� $
`< :i�
`,.. �r-I'"' M
`..... *
`� *
`114 �
`� *
`�,<
`..... ... *N
`•
`
`* �
`
`
`�
`
`0
`
`,.. 0
`
`n
`Cl)
`
`... N
`In ■
`
`CNS/DOCSIS MAC Clears Path For Cable-Modem Invasion p. 69
`
`
`
`
`
`
`
`
`p. 39 Device Developments Annual IEDM Conference Examines Leading-Edge
`
`
`
`At IEDM: Memory, Logic Power Devices, EDA, Sensors, And Displays p. 40
`
`
`
`
`Line-Driver Design For Broadband Communications Applications p. 81
`
`
`
`Parasitic Extraction Tools Aid DSM IC Designs p.97
`
`
`
`
`Harness The Power Of The ACPI/Smart Battery Standard p. 113
`
`Pick The Perfect Chassis To Ensure System
`
`MEDIATEK EX. 1010
`Page 4 of 11
`
`
`
`s,
`
`If you're charged with designing low-power applicaticn
`• <.?.
`
`this little core is a mighty big friend. Motorola's new M h'"'�
`� -cf)
`microRISC engine reduces costs, lengthens battery life and gt ti-Jou �
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`pedormance for the future. A combination of brains and brawn.
`
`
`
`
`
`
`
`A 48MIPS/50MHz RISC core design with UO intelligence
`
`
`
`
`
`
`
`and interrupt performance built in. Plus, its development
`
`
`
`
`
`
`
`tool chains are fully complete and validated to interoperate,
`
`
`
`
`
`
`
`
`
`greatly reducing design time. In other words, it's ready to fly!
`
`
`
`
`
`To find out how Motorola can help you save the day,
`
`direct your mouse to www.motorola.com/mcore
`
`or call 800.521.6274.
`
`® MOTOROLA
`
`
`
`
`
`Semiconductor Products Sector
`
`
`
`What you never thought possible."'
`
`"1!117 MOTOflOIA. INC. Al1 RIGHTS ll!'SUMD. WOTDIIDlA AND ® /Jlf. REGlSTtRED TRADEMARKS
`
`
`
`
`
`AND THE M•CORE NAME AND lDG11 ARE 1111.DEMARKS Of MOTOROIA, INC. MIG1fTY MOUSE, TM & "1991 VIACOM INT'l. INC
`
`MEDIATEK EX. 1010
`Page 5 of 11
`
`
`
`
`
`ELECTRONIC DESIGN
`
`
`
`TECHNOLOGY• APPLICATIONS• PRODUCTS• SOLUTIONS
`
`December 1, 1997 Volume 45, umber 27
`
`EDITORIAL OVERVIEW
`
`DEPARTMENTS
`
`
`
`........ 16, 18, 54
`
`•Ti,ny Engines Fuel A
`
`Revolution
`
`•Consumer Electronics'
`Potential
`
`
`
`
`
`Upcoming Meetings ... 12,
`
`
`
`Editorial ............ 22
`
`
`Technology Briefing •..• 24
`Technology
`...... 27, 30
`Newsletter
`Technology
`
`
`Breakthrough ..•..... 33
`
`
`
`
`
`■MCNS/DOCSIS MAC Clears Path For Cable-Modem Invasion 69
`
`•85-GHz 0.5-W GaAs
`
`
`■ Annual IEDM Conference Examines
`Leading-Edge Device Developments 39
`
`
`
`pHEMTpoints the way
`
`
`
`
`
`■ At IEDM: Memory, Logic Power Devices, EDA, Sensors, And Displays 40
`
`toward low-cost volume
`
`production of MOCVD
`
`
`
`
`
`■ Line-Driver Design For Broadband Communications Applications 81
`MMICs
`
`
`
`
`■ Parasitic Extraction Tools Aid DSM IC Designs 97
`• 0.1-mm electrostatic
`
`microrelays switch at up
`
`
`
`■ H arness The Power Of The ACPI/Smart-Battery Standard 113
`to100GHz
`• Development of blue
`
`
`
`
`■ Pick The Perfect Chassis To Ensure System Longevity 127
`
`phosphor spawns full
`color EL displays
`
`Info Page ........... 1 0
`
`39 Annual IEDM Conference Examines leading-Edge
`
`
`50 IEDM Focuses On Advanced Device Models
`
`
`
`
`Index of Advertisers •• 184
`Device Developments
`Reader
`
`Service Card .•.. 184A-D
`
`
`
`60 Sensors And Displays HighUghted At IEDM
`
`
`
`
`40 Memory And Logic Structures Are Getting Faster
`And Denser
`69 MCNS/DOCSIS MAC Paves The Way For A
`
`48 Rivalries Between Si1con And Exotic Semkonductors
`
`
`Cable-Modem Invasion ,
`Abound At IEDM
`•
`
`TECH INSIGHTS
`
`TECH INSIGHTS
`(how to find us)
`
`•Models offer new hope in tackling deep
`•Hear about the latest in memory and logic
`
`s ubmicron issues dealing with process
`
`/Cs, compound semiconductor devices,
`accuracy and interconnect.
`
`
`simulation tools, and sensors and displays.
`
`•Advanced device structures and new
`
`
`technologies are opening the door for emer'(Ji,ng
`
`• Designers detail advanced process tech:niques
`
`
`display and sensor-based applications.
`
`and.finer-dimension design rules at IEDM t o
`
`build next-generation memories and logic.
`
`COMMUNICATIONS TECHNOLOGY
`
`• The frrst standards-compliant chip 1 •
`•SiGe and vanilla silicon move into RF and
`
`optica l applications as compound semi
`
`means a ffordable, interoperable,
`,
`1
`conductors stake out their niches.
`cable modems, with s peed and
`security features.
`Co9.Yright 1997 by Penton Publishi� Inc. All ri!lhts reserved. The contents of this
`
`
`
`
`
`�lECTRONIC DESIGN (ISSN 0013-4872) is published twice monthly excep for 3
`
`
`
`
`
`
`issues in Mr;ry, 3 issues in August, 3 issues in October and 3 issues in November by
`
`
`
`
`publication may not be reproduced in whole or on part without the consent of the
`
`
`
`
`copyright owner. For subscriber change of address and subscription inguiries, call
`
`
`
`
`tenton Publishing Inc., 1100 Superior Ave., Cleveland, OH 44114-2543. Paid rates
`
`"" a one.year subscription are as follows: $105 U.S., $185 Canada, $210, $255
`
`
`to: Penton Publishing Subscription [216) 696-7000. Mail your subscription requests
`
`
`
`
`International. Periodicals postage poid at Cleveland, OH, and additional mailing
`
`ockbox, P.O. Box 96732, Chicago, ll 60693. POSTMASTER: Please send change
`
`
`
`
`offices. Editorial and advertising addresses: ELECTRONIC DESIGN, 611 Route #46
`
`
`
`
`of address to ELECTRONIC DESIGN. Penton Publishing Inc., 1100 Superior Ave.,
`
`Cleveland, OH 44114-2543.
`
`
`West, Hasbrouck Heights, NJ 07604. Telephone 1201) 393-0060. Facsimile 1201)
`
`
`393-0204. Printed in U.S.A. Title registered in U.S. Patent Office.
`
`MEDIATEK EX. 1010
`Page 6 of 11
`
`
`
`MCNS /DOCS IS MAC Clears A Path For
`
`
`The (Obie-Modem Invasion
`
`The First Standards-Compliant Chip Means Affordable, Interoperable,
`
`
`
`Cable Modems, With Speed And Security Features.
`
`Wt
`
`Lee Goldberg
`the IEE E's 802.14 cable data
`
`
`
`-· standards committee, a group
`
`of large cable interests formed
`
`the MCNS group. Comprised
`
`of heavyweights like Comcast
`
`and Time-Warner, MCNS
`teamed with the cable indus
`
`
`try's research consortium, Ca
`ble Labs, Louisville,
`Colo., to produce
`
`their own open standard for
`1 moving data between cable
`
`
`-"""llD:11.- network headends and sub
`
`scriber's homes.
`
`h the introduction of
`
`the BCM3220 multime
`dia cable networking
`
`
`systems/Data-Over-Cable-Ser
`
`vice Interface Specification
`
`(MCNS/DOCSIS) compliant
`
`
`media-access controller (MAC)
`chip, the cable data revolution
`has begun in earnest. By rolling
`
`out the first integrated imple
`
`mentation of the cable industry's
`
`
`recently developed DOCSIS,
`
`
`Broadcom Corporation has
`paved the way for the rapid de
`
`
`velopment of inexpensive con
`
`sumer-oriented cable dat.a appli
`Enter DOCSIS
`
`ances. This move could provide a
`The first fruit of this alliance is
`
`--·�-
`
`
`critical jump-start for the
`
`
`the DOCSIS specification, de
`
`emerging cable dat.a industry. If ,i,,s, n4 .: ',; -
`veloped by a group of manufac
`
`the next year goes according to If J_:afL.
`
`
`turers, under the direction of
`II �
`
`plan, we may see a device that • _
`MCNS and Cable Labs. Partic-
`
`
`develop-down-%�. ;iua ;•.;-.; --m.. =--=-.. h:.:. .. .,-;.-;...;. � ipants in the initial
`
`delivers multimegabit
`
`
`
`stream Internet access being
`
`ment of DOCS IS included Gen
`
`surfing began to erode cable's near-: eral Instruments,
`
`sold at K-Marts and electronic discount
`
`LAN City (now a
`
`: part of Bay etworks), and Broadcom
`
`
`stores at prices comparable to today's
`
`
`lock on passive leisure activities.
`
`
`
`
`
`After several ill-fated adventures : This spec outlines the physical layer in
`li6-kbit POTS modems.
`
`proto: terfaces, MAC and transport
`
`
`with video-on-demand, interactive
`
`
`shopping, and other attempt to die-: cols,
`
`
`security provisions, and other
`The Broadband Wars
`
`
`
`tate consumer taste, cable marketeers : specifications necessary for designing
`
`
`The development of DOC SIS and
`
`
`the introduction of the BCM3220 mark
`
`
`
`
`
`stumbled over the obvious hot applica-: interoperable cable data components.
`
`
`
`
`
`
`tion, broadband Internet access. Once : Subsequent fine-tuning was per
`
`the first hopeful chapter in the trou
`
`bled history of cable media's efforts to
`
`the eco-: formed in an open forum hosted by Ca
`
`early trials demonstrated
`maintain its dominant role in capturnomic potential, it became clear that : ble Labs and attended by most major ·
`
`
`
`
`
`
`mass : players in the cable industry. The re
`
`ing the hearts, minds, and eyes of the
`
`the only way to achieve a critical
`of users was to develop a transmission sult is a standard that meets the needs -
`
`
`
`American consumer. In the early
`
`
`
`standard that would enable the pro-of current users and anticipates the de
`
`
`nineties, the cable television industry
`
`duction of mass-produced, in ex pen-mands of future applications.
`
`
`
`faced a double threat: While saturated
`
`
`
`sive, interoperable cable modems and DOCSIS is designed to employ one
`
`
`subscriber markets yielded flattening
`
`or more unused video channels within -
`
`
`set-top boxes (Fi,g. 1).
`
`revenues, satellite television, sophisti
`
`
`cable broadcast Frustrated by the slow progress of the 54-to-860-MHz
`
`
`cated computer games, and Internet
`
`--
`
`MEDIATEK EX. 1010
`Page 7 of 11
`
`
`
`-S'l\'/WJ'!fll!/Jll'lit:W!MiHl'U'U!W :)IANUAKU:»-DA:»t:U 11.ADLt:-MUUt:M MA� J
`
`.---E
`
`L
`
`.J
`
`...
`
`=8
`
`spectrum to transmit IP-based
`
`
`
`
`data across hybrid fiber coax-
`
`ial networks. Complex
`11wn11m11
`modulation Clock p�
`Dlllstlllll
`phase/amplitude
`MAC "" � .
`..., Down• � -
`,Data I PHY I i -� header
`
`enables each 6-MHz down-BCM3116
`stream
`processing s C
` ;::;t""f'+!I
`in_te_r1a_ce
`r
`or 1,;'
`to bring data
`stream channel
`C, � -, 16
`
`into subscribers' homes at up BCM3118 Control
`� ''Data
`
`
`to 38 Mbits/s. Depending on -
`llemp,,._
`'t; �:IE
`
`the bit rate selected by the op
`MAC MAC
`Timing
`
`
`erator, the shared downstream
`header
`,. message
`recovery
`processing
`processor
`
`
`channel uses either 64-or 256-
`
`circuit (TRC)
`
`(with CRC)
`point quadrature-amplitude
`To
`
`modulation (QAM). While little
`tuner and --
`- Control
`L.__ Serial
`is known about what actual EEPRDM
`, 16
`programming
`CPU inter1ace
`
`
`bandwidth requirements will -��--SPI bus
`�1--i---..... --+1,,.,,0-ata-
`interface
`
`
`be, initial results from field tri
`(SPI) I Map parser
`t 7..__ ____ -+'=20_'Address
`l
`
`
`als suggests that a single chan
`llpltrm Management CPU bus
`1
`I
`
`nel will provide groups of 200
`alloallGII .,,....
`I f7e;l. DES infomalion
`Dual-por1
`Reference
`
`to 1000 subscribers with Inter
`
`rl i., L'"" block (MIS)
`cont�olle
`clock
`
`net access that is substantially
`DES i _ Q u,slrlllll ◄ :I Up�t;:m
`Clock :---
`
`faster than today's best POTS
`__.___. __ -,i- encrypt � � _., -
`based services.
`�S�er�ia'-1
`d-ata_,..
`� BCM3037
`
`For communication from the
`.___ __ __, ,-r
`
`T Control UpshamCIIIIDI
`
`home to headend, DOCSIS
`
`uses the 5-to-40-Hz sub-split
`
`
`band as a return path. Using '------------------ ------------ -----'
`
`QPSK today, or 16-QAM in sub
`
`
`sequent versions, the upstream
`
`
`channel has a theoretical maxi
`
`mum throughput of 10 Mbits/s
`
`businesses which need them.
`
`
`feature allows it to accommodate both
`
`
`traditional connectionless Internet
`
`
`traffic, as well as latency-sensitive
`
`
`One interesting aspect of DOCSIS
`
`
`Since DOCSIS also is intended to
`
`
`
`multimedia streams. Selectable QoS
`is that it uses MPEG II transport
`
`also will let cable companies offer
`
`
`
`support IP-based video, provisions
`
`streams to move IP data. While not es
`
`
`
`tiered services with various guaran
`
`have been made to support several
`
`
`
`sential for today's applications, the
`
`
`teed bit rates and levels of latency to
`
`
`
`
`levels of quality of service (QoS). This
`
`
`standard's developers were looking
`
`
`toward the future. Today, MPEG en
`
`
`capsulation provides DOCSIS with a
`7 upstream
`BCM303
`Low-pass
`
`
`reliable, well-defined method of set
`filler
`QPSK/16-QAM
`
`
`
`ting up multiple channels within a sin
`modulator
`
`gle data stream. In the near future,
`
`MPEG encapsulation will allow a sin
`Clock Data
`
`gle cable modem to support multiple
`BCM3220 Microcontroller
`sessions
`
`and multiple users, as well as
`
`MAC with Ethernet MAC
`
`
`
`delay-sensitive multimedia streams
`for voice or video over IP.
`
`
`Using MPEG II transport streams
`Clock Data
`ate
`also will allow DOCSIS to interoper
`
`
`with the Open Cable standard for digi
`Low-pass
`
`
`tal cable television that is currently un
`, BCM3116 10Base-T RJ45
`filler
`
`der development. Open Cable also em
`: QAM receiver transceiver
`connector
`' with FEC
`
`
`ploys MPEG II transport streams for
`
`all of its media flows. This feature
`
`
`
`should greatly simplify traffic switch
`
`
`ing and processing within tomorrow's
`cable networks
`
`
`Although it has some similarities to
`
`the carrier-sense multiple-access/colli
`sion-detect (CSMA/CD) protocol em-
`
`I.A DOCSIS-c:ompliant cable modem receives its data over unused 6-MHz video channels within
`
`
`
`
`
`
`the normal cable spectrum. Upstream traffic is carried back to the system headend in the 5-to-
`
`
`
`
`
`
`
`
`
`
`
`
`
`45-MHz sub-split band. To ensure that the modem will operate properly and not interfere with
`
`
`
`
`
`other units, both the downstream receiver and upstream modulator/transmitter operate under
`
`
`
`the control of the BCM3220, or other DOCSIS-compatible MAC.
`
`OMA
`-�
`-=
`a,
`'E
`... a,
`�
`l!! E c;i-,e i ,20
`C: ... c::, � If l:z
`-
`• C:
`C>"' C,
`=e E
`:i
`JT
`
`:e
`cc
`a::
`
`en
`
`I!!
`
`....
`
`2. The BCM3220 MAC chip incorporates all control, stream-processing, and security fundions required for a
`
`
`
`
`
`
`
`
`
`
`
`
`
`MCNS /DOCSIS-compHant cable modem. A memory-based DMA interface assures efficient data transfers to
`
`
`
`and from the host controller. Both baseHne and high-security modes also are supported.
`
`(see "Broadband To The Home: Chal
`
`
`
`lenges On the Last Mile," Electronic
`
`Desi.gn, Oct. 2, 1995,'JYP 67-83) ..
`
`MPEG Everywhere
`
`Coax Diplex
`connector
`filter
`
`54-860 MHz
`
`MEDIATEK EX. 1010
`Page 8 of 11
`
`
`
`STANDARDS-BASED CABLE-MODEM Mill
`■•iM4JIWRMM1,11u:1mic,x•
`
`I
`
`1byle
`
`2 bytes
`
`=1
`
`SID
`
`' ' '
`Request
`
`{upstream only)
`
`BP EH
`element
`
`Other EH elements
`(4 lo 5 byles)
`" .•· -'"""�..,
`
`
`Baseline Privacy
`
`DOCSIS Security:
`
`ecurity for the DOCSIS
`'
`'
`' 1byte
`
`cable modem system is
`'
`'
`'
`'
`'
`'
`'
`1 byla
`
`
`divided between an
`S
`elaborate Full-Security
`
`Type LEN KEY_SEQ Version E T
`
`Specification with remov
`= 3 or 4
`able, renewable security
`�
`
`modules, and a low-cost, siJn
`
`pler scheme called Baseline
`
`
`Privacy (BPI). BPI is based
`
`
`on full-bodied concepts, be
`ginning with the 56-bit Digi
`
`tal Encryption Standard
`I
`""
`
`(DES) Cipher Block Chain
`
`FC MAC_PARM LEN Extended header
`Packet POU
`
`p byle) (1 byle) (2 bytes) (4 to 255 bytes) (2 bytes) (18 lo 1518 bytes)
`
`ing algorithm, yet unbur
`dened by some of the more
`� flmllll
`/... c�
`
`costly and complex security
`, ...
`
`features of its heavy twin.
`�.
`OA SA TJpe,ten User dataCRC
`EHOR_ON
`All DOCSIS cable modems
`(Oto 1500(4 bytes)
`FC lype
`(6 bylesl
`(6 bytes) ( bytes)
`:00 FC PARM =1
`bytes)
`are required to support BPI,
`
`
`ensuring that basic data pri-
`
`
`
`: traffic originating from or destined to a particular modem to
`va£.y is maintained in the shared cable environment.
`
`
`
`
`Privacy is more than sufficient for Internet access appli-: identify a Traffic Encryption Key (TEK) to use. Each TEK
`on the ap-: is a pair of even and odd 56-bit keys. Each key also has a cor-
`cations because it makes a number of assumptions
`
`
`
`
`plication it serves, namely that Internet access is two way, : responding 56-bit initialization vector.
`
`
`
`
`header fields that are neverand therefore not usceptible to passive theft of service; that : All DOCS IS frames have
`
`
`
`
`
`it's not particularly valuable to anyone, but the u er; that re-: encrypted and include an optional field called an Extended
`
`
`
`
`
`
`
`ally important transactions over the Internet (like banking) : Header. Mainly for protocol expansion, this variable area in
`
`
`
`
`
`will be secured with end to end application layer security; : the DOC IS header is used to contain the Baseline Privacy
`
`
`
`
`inand that by changing keys often, individual keys are not : E ·tended H ader (s� the figure). The SID is contained
`
`worth the trouble of stealing. It also is much easier to detect : the BPI Extended Header for each frame to identify which
`
`clones and unauthoriz.ed users of cable modems because the : TEK to use.
`service is two-way.
`
`The modem system is unlike broadcast : Each DOCSIS frame that will be encrypted must contain
`
`
`
`
`pay-per-view video that can be hacked in private-done : a Privacy Extended Header. The header contains a type
`
`modems must not only listen, but speak to be useful.
`
`
`: and version field as well as the SID identifying a particular
`
`
`
`contain an enthat takes binary : encrypted data flow. The SID field also
`
`DES is a cryptographic algorithm
`
`
`
`
`coded data and applies a known algorithm using a ran-: able/di able bit that controls encryption for that particular
`
`
`
`
`domly generated 56--bit key to produce unintelligible or en-: frame and a toggle bit. The toggle bit is used to signify the
`
`
`
`
`crypted bits. The algorithm can be lmown by many but the : cur.rent epoch; that is whether the even or odd key is in use
`
`
`by both : for this frame. This toggle bit allows the protocol to set up a
`
`
`data will be unintelligible unless the key is shared
`
`
`
`
`
`parties. This mutually shared secret allows encrypted traf-: new TEK in the even key slot while actively
`using the odd
`
`: key. When the first frame to use the new key is received, the
`
`
`
`the keys. A 56-bit fie to remain private to those who have
`
`key has 70 quadrillion possible values, and the only guaran-: toggle bit indicates that the epoch has changed and that the
`
`
`
`
`
`
`
`
`teed way of cli covering a truly random key is to try all of ! other key is now in use. The toggle bit also is the 1east-sig
`
`
`them. Changing keys often reduces the likelihood of sue-: nificant bit of the 4-bit sequence
`field that is used to track
`
`
`cess even further. The challenge in this type of cryptogra-: the history of up to 16 keys by the key exchange protocol.
`
`
`
`
`
`
`data in both up and down·encrypts : Baseline Privacy phy is how to exchange the secret keys easily, yet securely.
`
`
`: stream dir ctions of the cable plant using the extended
`
`Cipher Block Chaining is a form of DES that increases
`vec-: headers to indicate
`
`the strength of the encryption by u ing an initialization
`what to do. DOCSIS MAC messages al
`
`
`
`
`
`between thetor sent down with the key to preset its ncryption hard-: low a simple key exchange protocol to operate
`
`
`
`
`
`
`ware state. For each eight-byte block encrypted, instead of : headend (or cable modem termination system) and the ca
`
`resetting or reinitializing, the circuit retains the result from : ble modems. Keys are updated frequently
`and the regil tra
`
`
`This pro
`
`
`
`
`
`
`
`the pr vious block's encryption. This chaining of results : tion databases are watched vigilantly for clones.
`
`
`
`
`from one block to the start of the next makes the cryptogra- : vides subscribers with a low-co t but vey effective "lite"
`
`
`
`
`
`for ensuring data privacy. phy stronger since a hacker would need to reconstruct the : security solution
`
`
`entire sequence to break the code instead of just one block. : Contril;ut,ed
`Baseline Privacy uses a Service ID (SID) associated with : dential Broadband Busi:n£Ss
`
`. .-�. :•
`
`.. , .
`'
`
`HCS
`
`'
`
`by Thamas J. Quigley, director of the Resi·
`Unit at Broadcom Carp.
`
`MEDIATEK EX. 1010
`Page 9 of 11
`
`
`
`sTANDARDS-BAsEo CABLE-MODEM MAcJ
`m,,w,\IWA·iH«UEIIDmMt•XN
`■
`
`
`by most other 802-flavored me-:
`scription (UCD) mes ages are
`
`
`crypt logic and a DMA-based, shared
`ployed
`used to
`:
`
`RAM host interface that has been op
`
`tell the subscriber equipment
`
`dia, DOCSIS employs a time-slotted
`what
`
`
`the headend is expecting to see.
`
`
`timized for Motorola's QUI CC series
`
`noncontention access scheme for most :
`
`of 680xx and PowerPC-ba ed con
`
`ofits communication. In order to main-:
`
`
`ta.in order on a busy cable, the MAC :
`
`
`
`trollers. To insure fast, efficient trans
`
`SPIOn Board
`Part of the BCM3220's job is to in
`
`
`
`fers, incoming and outgoing Ethernet
`
`chip in each subscriber's modem must :
`keep track of network timing, as well :
`
`
`
`
`terpret these messages and set the
`
`
`
`packets are exchanged whole-cloth in
`
`
`
`transmitter's modulation, timing, and
`a ingle operation, with no buffer
`
`
`as its place in the overall communica-:
`ly. With
`
`FEC parameters according
`
`copying or other overhead-intensive
`tions flow. In contra t to Ethernet's
`:
`
`this in mind, the MAC chip sports an
`
`intermediate steps.
`
`
`CSMA/CD protocol, this more orderly :
`:
`
`
`industry-standard serial program
`
`The down tream section of the
`
`
`access scheme allows cable operators
`
`ming interface (SPI) bus master inter
`
`
`BCM3220 interfaces directly with the
`
`to fill their pipeline at up to 75% of :
`face which can be used to configur e
`
`BCM3116 QAM receiver. Since DOC
`
`
`
`their theoretical capacity. This factor :
`
`and control both the QAM receiver
`
`
`SIS requires that data be encapsu
`
`
`is critical when subscribers are shar-:
`
`and Burst modulator chips on the fly.
`lated within MPEG II transport
`
`ing bandwidth with 200+ neighbors.
`:
`
`
`If SPI-capable components are used
`
`
`
`streams, the MAC is responsible for
`To satisfy even the t rminally para-
`
`noid, two layers of security are pro-:
`
`
`elsewhere in the modem' design,
`
`extracting it before passing IP frames
`
`the
`
`
`to the host system. Broadcom's de
`
`BCM3220 also can be programmed to
`
`
`
`vided within DOCSIS, plus the poten-:
`
`set their operating value , such as
`
`
`signers went the spec one better and
`
`
`tial for a completely shielded :
`
`tuner frequencie and amplifier
`
`
`included an MPEG II filter port in
`
`
`
`"tunneling'' protocol for sensitive data '
`gains.
`
`The chip's up tream proce ing sec
`
`
`transfers such as personal records or
`
`tion is responsible for passing
`
`credit card numbers.
`data to
`
`To S�tisiy Even The Ter-·
`
`
`the headend. Interfacing directly to
`If DOCS IS seems a bit complicated,
`the BCM3037 QAM/QPSK modulator,
`
`it's because it really is. The standard's
`
`
`� minally Paranoid, Two
`
`it transmits MPEG-encapsulated data
`
`
`
`rich feature set and traffic control
`
`a series of time slots that it
`within
`
`scheme require approximately
`
`
`·Layers Of ,security Are
`
`shares with the other modems in the
`
`
`100,000 gates (plus RAM) to imple
`
`network. To accompli h this task
`
`
`ment, yielding an effective processing
`
`ifroviaed. Within• DOCS IS,
`
`smoothly, it places requests to the
`
`power of 30 to 40 MIPS. In practice,
`
`
`headend during specially designated
`
`you'd probably need a much faster
`-�us A Fully_ Sh�e�ed_
`time periods.
`
`
`CPU to make sure it was available for
`The BCM3220 MAC keep these
`
`
`all the demanding real-time opera
`
`"Tunneling'"' Protocol.
`
`
`time period traight by referring to
`
`
`
`tions. Despite the complexity, Broad
`
`
`the upstream bandwidth availability
`
`com was able to follow the evolution of
`
`map that the head end routinely broad
`
`the standard and deliver a product
`
`
`
`casts. Stored in on-chip registers, this
`
`
`
`their device. This feature allows the
`
`
`
`within nine months of its finalization, :
`map tells the modem whei;i it can re
`
`
`thanks to its close participation in the
`BCM3220 to be programmed to pass
`
`quest an upstream time slot, transmit
`
`through selected MPEG video ,
`
`development committee.
`
`its data, or perform network mainte
`
`streams to an external decode
`
`Another factor that gave Broadcom
`
`nance and management functions. For
`
`circuit-a handy feature when de
`
`
`an inside edge on delivering the MAC
`extended data transfers involving
`
`signing a combination cable
`
`
`chip is its proprietary silicon compiler
`more than one block of data, the
`
`modem/set-top box.
`
`
`technology. Their specially developed
`
`In addition to recovering and pro
`
`BCM3220 automatically reque ts a se
`
`
`
`
`software can translate algorithms di
`
`
`ries of prescheduled piggyback time
`
`
`
`rectly to gate layouts optimized for
`ces ing data, the downstream proces
`
`
`slots. Thi technique allows it to use a
`
`
`
`minimal cro -talk, propagation delay,
`
`
`sor must perform decryption func
`single
`
`transfer r que t to move niulti
`
`tions and receive synchronization and
`
`
`and other critical parameters. While it
`
`
`is primarily used to implement blind-
`
`control mes ages from the headend.
`
`
`block files, increasing throughput and
`
`
`reducing access latency.
`
`
`These messages enable the head end to
`
`
`ingly fast digital filtering and correlat-:
`tell the modem to adjust its data rates
`
`ing algorithms in CMOS logic arrays, :
`and other paramete1 to match chang
`
`the same software also has been em-:
`Pretty Dam Good Privacy
`
`
`Of course, whenever you're using a
`ing line conditions.
`
`
`ployed to lay out Fast Ethemet MA Cs
`e
`
`
`broadcast media to transmit ensitiv
`
`To avoid conflicts in a shared-media
`
`
`and other control logic requiring com
`
`data, the issue of security alway
`
`environment, the MAC uses several
`
`plex signal paths and tight timing.
`
`comes up. According to Tom Quigley,
`tools to keep the modem synchronized
`
`
`product manager at Broadcom, DOC
`
`
`with its neighbors and headend. First,
`A Peek Inside
`
`
`
`SIS provides two grades of s curity at
`
`
`
`Examining the block diagram of the
`
`
`the time-ba e recovery (TRC) func-
`
`
`tion detects and interprets broadcast :
`
`BCM3220 reveals the basic function
`
`
`the hardware level. Both employ the
`
`
`date encryption standard (DES) algo
`
`timing information. Since MCNS
`
`
`requir d to support full-duplex com
`
`rithm and Rivest, Shamir, and Adel
`
`modems can be programmed for a va
`
`munication using the MCNS protocol
`:
`riety of data rates and transmission
`
`
`(Fig. 2). Many complex functions have :
`
`man (RSA) key exchange. The real
`
`
`difference between the ha eline and
`
`
`been implemented plus encrypt/de-:
`
`
`parameters, up tream channel de-
`
`' -
`
`MEDIATEK EX. 1010
`Page 10 of 11
`
`
`
`�-)I
`-==-1;]
`
`MAC J
`«-u,niiWA·OMl'1
`
`full security is the use of a highly
`
`se
`cure, removable hardware key for
`, full
`
`
`sensitive applications. In addition
`security uses the full authentic
`ation
`key to encrypt
`
`protocol and a 1024-bit
`
`the exchange of traffic keys.
`
`The BCM3220 supports both levels
`
`
`of security. It performs the DES elec
`(ECB) and cipher-
`tronic-code-book
`block-chaining (CBC) functio
`ns in
`
`hardware, along with residual
`block
`(RBT). Normally, a 56-bit
`termination
`, although it can be
`key is employed
`programmed to run with a crippled 40-
`
`
`bit key for export applications.
`If de
`
`sired, the MAC chip also lets design .
`
`
`ers include application-based security
`
`measures for a third layer of end-to
`end protection (see "DOCSIS Secu◄
`
`
`
`rity: Baseline Aivacy,"p. 74).
`The advent of the DOCSIS stan
`
`dard may prove to be a crucial turning
`
`point in the broadband wars between
`
`telephone and cable networks. While a
`
`shared-media system like cable will al
`
`
`ways be a less than optimal way to de
`
`liver data to homes, MCNS has done a
`very good job in making cable media
`
`
`
`as efficient, reliable, and secure as pos
`
`
`sible. For more information, contact
`the MCNS group at: Cable Labs, 400
`
`
`
`Centennial Parkway, Louisville, CO
`
`
`80027;phone (303) 661-9100;jax (303)
`661-9199.
`
`Tum your excess inventory into a
`
`
`
`substantial tax break and help
`send needy kids to college as well.
`
`Rambo's Uzi
`
`Broadcom's first silicon
`,implemen
`
`
`tation of the DOCSIS standard will
`
`
`surely give rise to a first generation of
`Call for your free guide to learn how
`interoperable cable modems.
`low-cost,
`
`
`
`Telco and xDSL advocates should not
`
`donating your slow moving inventory can
`
`
`take this news lightly. Given the ag
`
`mean a generous tax write off for your company.
`
`
`gressive nature of the cable industry,
`
`providing them with a standards-com
`
`pliant MAC chip like the BCM3220 will
`
`
`be like handing Rambo a loaded Uzi.
`
`Call (708) 690-0010
`Peter Roskam
`PRICE AND AVAILABILl'IY
`Executive Director
`now, (he
`
`Available in sample quantities
`durin{J
`BCM3220 will be in full production
`for the par/,
`of 1998. Pricing
`
`the first quarter
`is $30 each, in quantities
`of 10,000.
`Broadcom Corp., 16251 Laguna Canyon,
`
`(714) 450-8700;
`f(M:
`Rd., Irvine, CA 92618;
`(714) 450-8710;
`Internet: www.broadcom.com
`
`CIRCLE 55
`
`1,
`
`P.O. Box 3021. Glen Ellyn, IL 60138
`
`
`FAX (708) 690-0565
`
`
`
`Excess inventory today ... student opponuniry tomorrow
`
`
`
`CIRCLE
`How VALUABLE
`552
`HIGHLY
`553
`MODERATELY
`554
`SLIGHTLY
`
`MEDIATEK EX. 1010
`Page 11 of 11
`
`