Network as a Service
Driving the Future of Network APIs: CableLabs’ Role in CAMARA’s Fall ’25 Meta-Release
Key Points
- Highlights from CAMARA’s fall 2025 meta-release delivered 60 standardized network APIs, moving the industry closer to delivering network functions that are as accessible as cloud services.
- Through its contributions to CAMARA, CableLabs is helping transform networks into programmable platforms that reduce integration complexity and accelerate innovation for members.
Open network APIs are changing the way innovation happens — turning networks into programmable platforms that applications can build on. The fall 2025 meta-release of CAMARA APIs represents a major milestone in open-source network innovation, and CableLabs is proud to be a key contributor.
From Quality on Demand to Simple Edge Discovery to the upcoming Session Insights and Network Access Management APIs, CableLabs continues to shape the foundation for the next generation of programmable networks.
CAMARA APIs in the Fall '25 Meta-Release
The CAMARA Project — supported by GSMA’s Open Gateway initiative — issued its latest meta-release on Oct. 7, 2025, marking another step toward API standardization and global interoperability. Read the press release to learn more.
Highlights include:
- 60 total APIs, including:
- 10 production-ready/stable APIs
- 27 updated since the spring ’25 release
- 23 brand-new initial APIs
- Expanded alignment with GSMA Open Gateway and TM Forum frameworks, helping developers “build once, deploy everywhere”
- New stable APIs such as Quality on Demand with Quality of Service (QoS) Profiles and Simple Edge Discovery
This CAMARA API release brings the network operator and developer communities closer to a world where network capabilities are as accessible as cloud services.
CableLabs’ Contributions to CAMARA APIs
Quality on Demand (QoD): Through our work on Quality on Demand, CableLabs helped further the efforts for application Quality of Experience for latency-sensitive use cases like AR/VR, gaming, telemedicine and industrial Internet of Things (IoT) — where predictable performance is essential.
Simple Edge Discovery: Route workloads to the nearest edge zone for improved response time and lower latency with Simple Edge Discovery.
Connectivity Insights: CableLabs contributed directly to Connectivity Insights, enabling application developers to get insights into the network connection quality.
Session Insights: While not part of the official meta-release, CableLabs’ Session Insights API has been published to CAMARA’s GitHub and will be available soon in an alpha release. It allows an application to provide real-time session-level analytics and telemetry to the network operator, giving applications real-time feedback on performance and network behavior — an important step toward data-driven service optimization.
Network Access Management: Similarly, Network Access Management is working to provide standardized methods to manage network access for both devices and users. It’s another foundational piece in making networks more programmable, secure and interoperable.
Why This Matters for CableLabs Members
Reducing Integration Complexity: By contributing to CAMARA’s open-source community, CableLabs helps member operators access solutions that scale across the broader connectivity ecosystem. This standardization of APIs reduces integration complexity and eliminates one-off builds, cutting both development time and cost.
Accelerating innovation: With open network APIs, members can prototype and deploy new services faster.
Ensuring global interoperability: CAMARA’s collaboration with GSMA Open Gateway ensures that implementations work across operators and borders.
Enhancing user experiences: Applications can now leverage network context to deliver smarter, more responsive and reliable services.
Differentiated Services: Members can leverage these APIs to create unique context-aware services through API-driven, interoperable architectures that enable seamless user experiences and introduce new revenue opportunities for operators.
Looking Ahead
CableLabs will continue advancing open API standards through our work in CAMARA and related initiatives. Upcoming milestones include:
- Preparing Session Insights and Network Access Management for alpha releases.
- Engaging with member operators and vendors to pilot CAMARA APIs in real-world environments.
- Contributing to future meta-releases that expand network capabilities for developers globally.
Join the Conversation
If you’re a CableLabs member or ecosystem partner, now is the time to explore these new APIs and their potential in your networks and services.
Read more about the CAMARA open-source project on its website and join the project on GitHub. If you are a CableLabs member or part of our vendor community, you can join the Network as a Service working group. Member operators can also learn more by visiting our Member Portal, which requires a CableLabs account to log in. Employees of member companies can register for an account here.
Together, we’re building the foundation for the next generation of programmable networks.
Security
A Unified Approach to AI Security in the Broadband Industry
Key Points
- AI has the potential to transform networks to be smarter, more adaptable and more reliable; however, this rapid evolution introduces new and complex security challenges.
- CableLabs is launching the AI Security Working Group to bring well-understood security principles into AI R&D, promoting best practices and practical security guidance for AI development to secure the cable broadband industry’s critical infrastructure.
AI is turning the vision of pervasively intelligent networks into reality. It’s becoming the driving force behind networks that are smarter, more adaptable, more reliable and more secure than ever. No longer limited to generating text, AI is evolving into an active operational agent within cable networks. It’s an evolution that unlocks unprecedented opportunities for innovation and new subscriber experiences.
However, this transformation also introduces new and complex security challenges.
Managing the Challenges of AI
Many of AI’s challenges stem from the relentless pace of innovation. New protocols, tools and methods are adopted soon after they emerge, leaving security as an afterthought. For instance, some AI agents are capable of autonomously interacting with data, using tools and calling APIs. All of this adds new layers of complexity, dependencies and attack surfaces. These risks should be carefully managed and addressed as early as possible in the design and development stages.
A key element in any risk management framework is grounding this innovation in a secure foundation that spans the entire AI stack, from the large language models (LLMs) at the core, to the AI agents and their prompts, to the tools and APIs they use, and finally to the AI protocols that connect and coordinate them.
CableLabs is investigating cable-specific elements where we can bring well-understood security principles into AI R&D, laying the foundation of protecting cable’s critical infrastructure from tampering and subversion. Just like any other software, the AI stack would benefit from provenance guarantees, integrity, identity assertions and transitive credentialing.
The AI Security Working Group
Because AI architectures interact directly with critical systems and sensitive data, securing the entire ecosystem — from clients and servers to the protocols that link them — isn’t just a technical best practice; it’s a strategic imperative for the industry. A unified focus on AI security will enable trusted communications and accelerate innovation across both business and technical domains.
To foster collaborative input and discussion, CableLabs is launching the AI Security Working Group (AISWG), a CableLabs member initiative focused on developing and promoting best common practices and practical security guidance for AI deployment relevant to the cable broadband industry. By bringing our members together in this forum, we can help our industry harness the transformative power of AI confidently, responsibly and securely.
CableLabs is also actively engaged in two other non-cable groups working on securing AI:
- The Messaging Malware Mobile Anti-Abuse Working Group (M3AAWG) is working on preventing abuse of and abuse from AI systems.
- The Open Worldwide Application Security Project (OWASP) is working on a broad range of threats to AI.
How You Can Help
There are a few ways CableLabs members can be part of this essential initiative:
- Maximize your membership: Register for a CableLabs account to explore exclusive, member-only resources and content.
- Join the working group: Request to join the AI Security Working Group, and help us define the future of AI security. (A CableLabs account is required to log in.)
- Connect with us: Introduce us to the people in your organization who are focused on AI security, governance and agent protocol implementation.
Wired
Thinking Outside the Box: Serving MTUs With Fiber
Key Points
- CableLabs’ FTTP Operators Forum brings together industry experts to tackle fiber deployment challenges and accelerate network progress through collaborative problem-solving.
- In a recent meeting, member operators from around the world discussed their approaches to connecting complex, multi-tenant buildings — highlighting regional differences and practical deployment considerations.
When we chartered the FTTP Operators Forum, our goal was to create a space where technology experts, engineers, business leaders and operations professionals could share real-world insights, compare strategies and discuss fiber to the premises (FTTP) challenges. The goal is simple: promote industry collaboration and accelerate progress toward more interoperable, efficient fiber networks.
In our most recent meeting, we saw just how consistently deployments in multi-tenant units (MTUs) pose the same technical and logistical challenges around the world. While these buildings share many similarities, local regulations, construction standards and even cultural factors can shape how operators approach each project. Regardless of geography, the goals remain the same: simplify deployment, improve scalability and deliver reliable, high-speed service.
Beyond Strategy: Practical Realities
In this meeting, North American and European operators discussed their strategies for connecting fiber to units in multi-tenant buildings. Discussions included shared infrastructure designs and the role of coax in hybrid deployments. As an American, I found the European perspective particularly enlightening, highlighting how construction rules in some regions make full-fiber builds more difficult, and how hybrid approaches like mini-Remote PHY Device (RPD) and some new-to-market products are providing practical alternatives.
What stood out was a recurring theme of practicality — how to design and deploy networks that balance performance, cost and ease of installation. Even seemingly small details such as equipment weight, who is responsible for electrical grounding and bonding, and the difficulties of placement in small spaces can have a huge impact on long-term reliability and supportability. These operational insights often get lost in high-level strategy conversations, but they’re essential for successful network rollouts.
As we look ahead to our next session in December — where we’ll dive into passive optical network (PON) evolution and migration paths to 10G, 25G, 50G and even 100G — we’re eager to continue the momentum we’ve built. CableLabs looks forward to continuing these conversations with our member operators to identify not only the technical gaps that need to be addressed, but also the shared priorities that unite them worldwide.
Join Us in Shaping the Future
Every meeting like this reinforces why I stay engaged: to listen, to learn and to help solve the technical and operational challenges that operators face every day. Innovation in this space continues to accelerate, and it’s exciting to be part of a community working together to make fiber networks better for everyone.
CableLabs remains committed to fostering collaboration across the industry, uniting diverse operator perspectives to accelerate progress toward interoperable, high-performing fiber networks.
Feeling left out? We invite you to bring your fiber expertise to the table and help drive real-world innovation in next-generation FTTP networks — join the FTTP Operators Forum!
Wireless
Starlink, LEO Direct-to-Device and the Future of MNO Partnerships
Key Points
- SpaceX/Starlink’s recent acquisition of EchoStar’s terrestrial spectrum licenses for its Direct-to-Device (DTD) services has the industry wondering if it is aiming to compete as a full MNO.
- While bringing its own spectrum will allow Starlink more flexibility in choosing partners, it seems a long shot to establish operations fully equivalent to an MNO.
- The spectrum deal is, however, a case in point for the emerging convergence of different access types into a seamless connectivity fabric, highlighting the need for all industry players to form ecosystems that enable converged user experiences.
Low Earth orbit (LEO) satellite constellations are on the rise, making broadband speeds available anywhere on the globe, beginning to disrupt broadband markets and changing the way we think about connectivity. This year, LEO Direct-to-Device (DTD) has matured from a concept to first commercial services.
DTD denotes the principle of connecting your everyday smartphone directly to satellites, without extra hardware in between. That’s a big deal for closing the last coverage gaps of our terrestrial networks and could make “always connected” finally mean everywhere. Players such as SpaceX’s Starlink, AST SpaceMobile and Skylo are already shaping DTD ecosystems.
The Starlink Question: From Partner to Competitor?
So far, Starlink has acted as a partner, working with mobile operators and using its licensed spectrum for DTD services. However, by acquiring EchoStar’s mobile assets (the AWS-4 and H-Block licenses in the United States, plus global Mobile Satellite Service [MSS] priority rights), SpaceX seems to have opened the door to taking on a broader role. Elon Musk even hinted at launching a mobile DTD service with indoor coverage within two years.
That development is causing industry concern. Is Starlink gearing up to become a mobile operator in its own right? Becoming a full MNO without a terrestrial network already in place would be a challenging and daunting endeavor. It would mean building terrestrial sites, deploying a mobile core, and handling billing, customer support and regulatory compliance across dozens of markets. That’s a heavy lift, even for Starlink.
Instead, this spectrum deal looks more like a strategic enabler than an all-out move into retail mobile. It gives Starlink more flexibility in its wholesale and partnership business. And realistically, it will take two to three years before we see any market impact, as both satellite constellations and handsets evolve.
Starlink’s spectrum move isn’t a declaration of war. Rather, it’s a signal. It tells us that the boundaries between satellite and terrestrial networks are dissolving, and the next chapter of connectivity will be written through collaboration, not competition.
The bigger story here isn’t about who “wins.” It’s about how everything connects. LEO DTD is becoming a key convergence layer in a world where fixed and mobile, terrestrial and satellite networks work together to keep users seamlessly connected. No single network type can cover it all, but together, they can, and partnerships are crucial to make that happen. The real opportunity lies in building converged user experiences rather than competing over who owns the access layer.
CableLabs Shapes the Connected Future
For CableLabs members, that’s an opportunity, and we’re deeply engaged in helping them understand and shape this new reality. We’re building the foundation for members to adopt, partner and innovate confidently in tomorrow’s world. Our experts are working on:
- Seamless connectivity frameworks that unify terrestrial and non-terrestrial networks.
- Simulations and techno-economic models to analyze LEO DTD and broadband capacity, performance and cost structures.
- Integration architectures that show how DTD can fit into existing cores, backends and traffic steering systems.
- Regulatory engagement to ensure that our industry’s voice is heard in spectrum and interoperability discussions.
- General Seamless Connectivity Services (SCS) to provide a ubiquitous, reliable, adaptive connectivity fabric irrespective of access type
If you’re an operator or technology partner looking to make sense of how DTD fits into your roadmap, now is the time to connect with CableLabs experts. The earlier we align on architectures, interoperability and business models, the stronger the ecosystem we can build together.
To explore the broader topic of Seamless Connectivity Services, check out the recent blog post. If you’re a member, get involved in our working group or watch the recent Seamless Connectivity Services/Mobile Optionality webinar on the Member Portal (login is required).
Wired
Coherent Optics in 2025: Scaling Speed, Efficiency and Reliability for Emerging Applications
Key Points
- Coherent optics is expanding beyond traditional long-haul networks into metro, data center interconnect, fiber access and even space-based satellite communications, driven by AI workloads and bandwidth demand.
- CableLabs has helped pioneer the next frontier of optical communications with specifications for interoperable coherent optics in access networks and the industry's first coherent passive optical network architecture and technologies.
The optical communications industry is undergoing a profound transformation. As bandwidth demands surge — driven by AI workloads, cloud-scale data centers and global satellite connectivity — coherent optics has emerged as the foundational technology enabling this next wave of innovation. From long-haul networks to metro, access, data center and even space-based links, coherent optics is redefining how we transmit data optically.
CableLabs has been instrumental in shaping this revolution, pioneering advancements in point-to-point and point-to-multipoint coherent architectures that enable greater efficiency and scalability in the optical access networks.
About a decade and a half ago, long-haul optical networks relied on Intensity Modulation and Direct Detection (IM-DD), effectively constrained to 10 Gbps, or 10G, per wavelength. Dispersion and polarization effects required complex compensation, and scaling was difficult.
The first real-world deployments of coherent optics around 2010 changed everything. By leveraging amplitude, phase and polarization — alongside powerful coherent detection and digital signal processing (DSP) — coherent systems unlocked 100G, 400G, 800G and now 1.6 Tbps transmission rates per carrier, with dramatically improved reach, spectral efficiency and capacity.
Coherent optics delivers transformative advantages across multiple dimensions:
- Spectral efficiency: Maximizes data throughput over a given spectrum, increasing overall network capacity.
- Power efficiency: Reduces energy consumption per bit transmitted, making networks more sustainable.
- Architectural efficiency: Supports flexible and scalable network designs, accommodating diverse deployment scenarios.
- Operational efficiency: Simplifies network management and provisioning, enabling easier scaling and maintenance.
The Building Blocks of Coherent Optics
What began as bulky 100G embedded modules consuming 80 watts have evolved into thumb-sized quad small form-factor pluggable (QSFP) transceivers consuming as little as 5 watts for 100G coherent in access applications. This miniaturization enables direct integration into routers and switches, transforming deployment models across network segments.
Modern coherent optical transceivers achieve unprecedented performance and efficiency through deep integration of electronics and photonics. The key building blocks are included in the diagram below.
At the core, complementary metal-oxide semiconductor (CMOS)-based Application-Specific Integrated Circuits (ASICs) and DSP enable high-speed signal processing and advanced modulation formats. These are paired with high-speed analog-to-digital converters (ADCs) and digital-to-analog converters (DACs) — now sampling at rates exceeding 300 gigasamples per second (GS/s) — to support ultra-high-capacity links such as 1.6T ZR.
Optical and electronic components are increasingly co-packaged, combining modulators, photodiodes (PD), drivers and transimpedance amplifiers (TIAs) into compact assemblies that reduce footprint and power consumption. Stable and tunable laser sources in the C- and O-bands provide multi-channel transmission capability, while advanced packaging techniques — such as wafer-level integration and liquid cooling — preserve signal integrity and thermal stability.
This holistic approach to integration not only minimizes size and cost but also enables scalable architectures for next-generation optical networks.
Technology Trends Shaping the Future
Several trends are accelerating coherent optics innovation:
- Baud and data rates: The industry surpassed 1 Tbps per carrier in 2022, with multi-carrier architectures pushing toward 3.2 Tbps.
- CMOS Moore’s Law: Continued CMOS scaling drives higher integration and lower power, with 3 nanometer (nm) nodes today and 2 nm on the horizon.
- DSP advancements: Techniques like probabilistic constellation shaping (PCS), equalization-enhanced phase noise (EEPN) equalization, digital subcarriers and advanced forward error correction (FEC) bring performance closer to Shannon’s limit (i.e., the maximum theoretical capacity at which data can be transmitted).
- Optical materials: Thin-film lithium niobate (TFLN), polymers, silicon-organic and plasmonic-organic hybrids (SOH/POH), and barium titanate (BTO) are enabling next-generation modulators for higher bandwidth and lower power consumption with compact integration compatibility.
- Laser innovation: Recent advances in laser technology are driving a shift toward low-phase-noise, high-output and cost-effective tunable and fixed lasers.
Expanding Applications: From Core to Edge — and Beyond
Coherent optics was first deployed in long-haul networks because it solved critical challenges that IM-DD could not. Today, it’s everywhere due to technology maturation, bandwidth demand and the whole ecosystem support:
- Regional and metro networks: Supporting regional connectivity with high capacity and flexibility.
- Data center interconnect (DCI): AI-driven workloads demand massive bandwidth; pluggable modules like 400ZR and 800ZR are now standard.
- Access networks: Coherent optics is now deployed at the edge, with interoperable 100G and 200G P2P transceivers reducing cost, power and complexity in fiber access environments.
- Free space optics: Coherent transceivers now enable high-speed laser links between low-earth orbit (LEO) satellites, supporting global broadband coverage.
What’s Next?
Innovation isn’t slowing down. Coherent optics is poised to move deeper into the network:
- Coherent Lite: Low-power, short-reach solutions are ideal for campus and urban deployments (up to 20 km).
- Inside the data center: As speeds climb, coherent optics may be co-packaged with switch silicon to overcome optical loss and scale bandwidth.
- Next-gen passive optical networking (PON): Coherent optics is redefining passive optical networks with higher speeds, longer reach and new architectures that support both P2MP and legacy coexistence.
CableLabs Is Leading the Coherent Frontier
While coherent optics continues to expand across the network, CableLabs is leading the charge to define what’s next. Our specifications for P2P coherent optics have enabled interoperable 100G and 200G transceivers optimized for access networks — already deployed by major operators to extend fiber reach and reduce cost, power and complexity.
We also introduced the industry’s first architecture and technologies for coherent passive optical networks (CPON), supporting 100G per wavelength with up to 512-way splits or 80 km reach. CPON enables seamless coexistence with legacy PON and P2P coherent systems, unlocking new possibilities for residential, enterprise and wireless transport.
As coherent optics moves deeper into the network, we invite the industry to collaborate with CableLabs on specifications, interoperability and deployment strategies that will shape the next decade of optical innovation.
Security
Securing Smart Homes: Protecting Networks in a Connected World
Key Points
- Advancements in smart home security standards have improved device security markedly over the last decade.
- Adapting and improving pre-existing security tools for the proliferation of smart home devices will be critical to satisfying consumers’ needs in the Experience Era.
- A CableLabs working group explores potential challenges and solutions for continuing to evolve security tool to meet the changing and surging demand of new smart devices.
Have you ever turned the car around just to make sure you turned off your oven or unplugged your iron? That same anxious instinct contrasts with the whimsical possibility of lights switching on and off as we enter or leave a room.
Imagine if, instead of being one more burden to manage, a building — and everything inside of it — could become an active assistant in consumers’ hectic lives. As we realize the Technology Vision for the industry and grow into the Experience Era of broadband innovation, these once-fantastical concepts are no longer outlandish ideas or the one-off creations of hobbyists.
Now, thanks to new advancements in smart home technology and Internet of Things (IoT) devices, it actually is possible for consumers to connect everyday appliances — ovens, irons, dishwashers, mirrors, toothbrushes… the list goes on and on — to their smart home ecosystems.
Over the last several years, smart home devices have proliferated in nearly every store you may enter or visit online. In some cases, it is now more difficult to find a “non-smart” version of a device than just a few years ago, when it was difficult to find the smart version. Just try to find a television without apps built in.
While smart home devices enhance convenience and control within consumer’s homes, concerns about their security persist. Are these smart devices truly secure? What steps can consumers take to keep their smart homes safe ?
The Hidden Complexity of Smart Devices
Smart home devices are often small and sometimes battery powered, which can make them appear simple at first glance. In some ways, using them can be as straightforward as turning a lightbulb on or off. Yet behind that simplicity lies significant complexity: connecting these devices to a network, managing software and firmware updates, handling interactions with other devices and even navigating the challenges of the initial physical installation.
For example, a smart garage door opener might be purchased and installed but onboarding frustrations may have prevented the customer from actually connecting it to the home network. Despite it not being connected to the user’s network, the device’s wireless interface may still be turned on — which can allow anyone within radio signal range to connect and potentially control it.
Recent advancements in device security have helped transform this landscape. These complexities have been redesigned with security integrated from the ground up, allowing devices to be easily and confidently onboarded to a consumer’s home network.
Standardization Has Made Smart Home Security Easier
Many smart home device manufacturers have worked hard to standardize and simplify installation and onboarding activities — which means consumers don’t need to be professional IT experts to bring a smart device into their home networks. Through these standardization processes, smart home devices enable security settings by default.
One of the more prominent smart home standards organizations is the Connectivity Standards Alliance (CSA). Matter, one specification developed within CSA, is an industry-wide initiative designed to simplify setup, interoperability and security. A Matter-certified device must meet strict requirements, so consumers can trust that essential protections are in place.
Network operators along with us here at CableLabs have been a part of these conversations within CSA, helping ensure that smart homes are not just functional, but also secure.
Practical Security With Today’s Smart Home
With smart home specifications and standards such as Matter, smart home device security is standard and user-friendly. For instance, many of the most common security recommendations are enabled by default:
- Automatic updates: Over-the-air device update capabilities are required for certification.
- Network segmentation: Devices are placed on a virtual network called a fabric, where only authenticated and authorized devices can communicate and send commands.
- Authenticity: The authentication and authorization mechanisms in place in Matter utilize the same foundational PKI technologies that ensure authenticity and enable strong encryption of home network traffic as it leaves the cable modem.
Baseline security settings on devices are now the standard in most instances. When paired with a network operator’s Wi-Fi access points and apps, it’s even easier to observe and maintain the continued security settings of these devices.
What Can Consumers Do?
Below are just a few routines that can assist users with the continued security of their smart home devices:
- Control guest access of smart home devices: If guest access is needed, guest accounts should be created through the main administrator account.
- Watch for unusual behavior: Identify when a device isn’t behaving normally. Smart home devices have much lower network bandwidth consumption. From a network provider’s app, customers can view spikes in bandwidth usage, which may signal security issues. Consumers can then take appropriate actions to ensure security.
- Retire or isolate old devices: If a device has stopped receiving automatic updates, it’s standard operating procedure to replace it.
Working to Make the Internet Safer and More Secure
Smart homes are making progress; it is much easier now than it was years ago to bring a smart home device onto a consumer’s home network. CableLabs continues to work to improve the onboarding process for these devices and make consumers’ connectivity experiences more secure — and more seamless.
When smart home devices have been certified to conform to a smart home standard, consumers can feel confident that their household devices have security controls built in.
Here at CableLabs, working alongside our member operators in our IoT Security working group, we continue to advance our secure network solutions so that smart home devices can safely and securely connect to smart homes. If you’re an employee of a CableLabs member operator and want to help shape these smarter, more secure solutions, consider joining the working group (member login required).
This work is foundational as we build networks that intelligently respond to user and device needs in the moment. By prioritizing connectivity that understands context and adapts automatically, CableLabs, our members and our industry partners are transforming how people experience their connected environment.
To learn more about the Experience Era and how it is redefining what connectivity means for consumers, read about the Technology Vision for the future of the industry.
DOCSIS
Beyond Single-Modem Speed: DOCSIS 4.0 Interop Doubles Aggregate Capacity
Key Points
- Participants in CableLabs’ October Interop·Labs event successfully verified interoperability, again proving DOCSIS 4.0 technology is ready to scale across the industry with seamless multi-vendor deployment.
- The event moved operators closer to delivering multi-gigabit services today with DOCSIS 3.1+ devices while preparing infrastructure for full DOCSIS 4.0 deployment.
CableLabs’ latest DOCSIS® 4.0 Interop·Labs event marked a major milestone for broadband technology — one that pushes the limits of aggregate downstream capacity and demonstrates the collaborative strength of the DOCSIS ecosystem.
The interop followed closely on the heels of a highly successful SCTE TechExpo25 in Washington, D.C., where suppliers showcased early demonstrations of DOCSIS 4.0 technology in action. Some of those same demos were shipped straight from the TechExpo show floor to CableLabs headquarters in Colorado for the interop event, ensuring continuity and real-world validation.
Leading suppliers convened Oct. 20–23 for the 14th DOCSIS 4.0 interop, working to verify equipment interoperability and expand the focus beyond modem performance. This time, attention turned to increasing aggregate capacity — the total bandwidth shared among groups of homes — far beyond what any single modem can achieve.
Increasing Aggregate Capacity: Beyond a Single Modem
The latest advances showcased a critical leap: the capability to boost aggregate speed. This wasn’t about the performance of a single modem but, instead, the collective capacity available to a group of homes served by a single fiber node.
A 2x2 Remote PHY Device (RPD) allows one physical fiber node to behave like two virtual nodes. A 2x2 RPD is capable of providing full spectrum service to up to two downstream service groups and 2 upstream service groups. In practice, this means an operator can effectively double the capacity of a traditional 1x1 node.
To handle this increased throughput, suppliers demonstrated 25 Gigabit Ethernet (GbE) links connecting fiber nodes to the CCAP-Core — a substantial upgrade from the standard 10 GbE links. The result: the increased DOCSIS 4.0 bandwidth is available to be shared across smaller service groups, enabling better performance and a foundation for next-generation multi-gigabit service tiers.
Innovation Through Collaboration
While the technology took center stage, the underlying story was one of collaboration. The event’s strong turnout underscored the excitement and commitment of industry stakeholders, which included many CableLabs member companies.
Nine modem suppliers — competitors in the marketplace — worked side by side to ensure that when DOCSIS 4.0 technology is deployed, it will perform reliably across the ecosystem. Each supplier brought its own hardware, firmware and feature optimizations — a combination of approaches that drove rich discussions and technical progress.
The supplier participation was impressive:
- CCAP-Cores: CommScope, Harmonic and Vecima
- Remote PHY Devices (RPDs): Calian, CommScope, Harmonic and Vecima
- Cable modems: Arcadyan, Askey, Gemtek, Hitron, Sagemcom, Sercomm, Ubee, Vantiva and WNC each brought multiple models.
- Chipmakers: Broadcom and MaxLinear provided engineering support.
With three cores in play, participants dived deep into DOCSIS 4.0’s multi-channel management — the real-time coordination of upstream and downstream channels across different parts of the RF spectrum. Each supplier’s goal was the same: to fine-tune performance and differentiate in a competitive market while ensuring seamless interoperability across all vendor combinations.
This breadth of representation reinforced that DOCSIS 4.0 is not just a specification — it’s a fully functioning, multi-vendor ecosystem.
DOCSIS 3.1 Plus: Bridging the Path to DOCSIS 4.0 Networks
The event also featured several DOCSIS 3.1+ modems — a key stepping-stone technology in the evolution of DOCSIS technology.
DOCSIS 3.1+ technology expands support for additional Orthogonal Frequency-Division Multiplexing (OFDM) channels, unlocking higher downstream speeds while maximizing the value of existing plant investments.
These aren’t theoretical gains — they were tested and verified in real time during the interop. Operators are already exploring how DOCSIS 3.1+ fits into their near-term deployment strategies, offering a cost-effective way to deliver multi-gigabit services today, while preparing for DOCSIS 4.0 networks tomorrow.
This spirit of cooperation is shaping the next phase of broadband evolution. By solving interoperability challenges together, suppliers are accelerating deployment timelines, simplifying operator adoption and ultimately delivering better experiences for consumers.
Looking Ahead: From Lab to Live Network
With this interop’s success, the message was clear: the DOCSIS community is uniting to deliver faster, higher-capacity broadband experiences to customers everywhere.
The event was another benchmark for the broadband industry’s future, offering further proof that multi-vendor DOCSIS 4.0 systems can deliver at scale. The next steps include refining firmware for even greater efficiency, expanding field trials and building the migration path toward commercial deployment.
With diverse vendor participation and clear proof of the technology’s capabilities, the path to multi-gigabit broadband has never been clearer.
CableLabs will host another DOCSIS 4.0 Interop·Labs event the week of Dec. 9, and we invite our member operators and the vendor community to join us and witness the next wave of innovation firsthand.
And don’t forget — registration is now open for the upcoming CableLabs Tech Summit, happening April 27–30, 2026, in Colorado. Built around the Technology Vision, Tech Summit is where the broadband industry comes together to align on the most critical areas shaping the future of connectivity — from strategic direction to technical execution, vendor collaboration and peer exchange.
Join us as we build a faster, smarter future of connectivity — together.
Technology Vision
Seamless Connectivity Service and Mobile Optionality: A New Era of Innovation
Key Points
- CableLabs is advancing broadband innovation with two new initiatives — Seamless Connectivity Service and Mobile Optionality — that are designed to move networks from speed-focused to adaptive, intelligent systems.
- Together, they position CableLabs member operators to deliver smarter, more resilient broadband experiences for their customers.
- CableLabs members are invited to register for a live webinar on Thursday, Oct. 30, to learn how these initiatives can revolutionize the connectivity experiences of their subscribers.
The broadband industry is evolving. Speed is no longer the only measure of value — users now expect connectivity that is seamless, secure, responsive and adaptive. CableLabs is leading this transformation through its Technology Vision and Eras of Broadband Innovation, which illustrate the network’s evolution from raw speed to intelligent, adaptive services.
To realize this vision, the industry must deliver practical solutions that leverage today’s infrastructure while paving the way for tomorrow’s innovations. Two new CableLabs initiatives — Seamless Connectivity Service (SCS) and Mobile Optionality (MO) — are doing just that.
Seamless Connectivity Service: Connectivity That Just Works
Imagine a world where you never have to think about your network connection — at home, at work or on the go. That’s the promise of Seamless Connectivity Service. This groundbreaking concept enables subscribers to enjoy a single connectivity experience across all access types — Wi-Fi, cellular, fiber, satellite or fixed wireless — without manually switching networks or managing multiple services.
SCS makes connectivity simple and transparent, ensuring applications perform reliably wherever users are. By unifying access technologies under one service, operators can deliver best-in-class reliability, security and performance — all while strengthening customer loyalty and unlocking new revenue opportunities.
What Makes SCS Unique
- Seamless Experience: Always-on connectivity across all devices and locations with no user action required.
- Integrated Security: Consistent protection and automatic failover across all network types.
- User Satisfaction: A truly effortless “it just works” experience for subscribers.
Mobile Optionality: Smarter, More Efficient Mobile Networks
While SCS redefines user experience, Mobile Optionality reimagines how operators build and scale mobile networks. By using existing hybrid fiber coax (HFC) infrastructure and unused spectrum above 2–3 GHz, MO supports 5G New Radio (NR) distribution efficiently and affordably.
With MO, operators can deploy 5G solutions that transmit over their HFC networks — achieving greater mobile densification at lower cost than traditional methods. The result is a stronger mobile experience and a competitive advantage in an increasingly crowded market.
What Sets MO Apart
- Enhanced Mobile Experience: Improved mobile performance and coverage with lower deployment costs.
- Service Differentiation: Ability for operators to deliver unique, value-driven mobile services.
- Smart Spectrum Use: Maximizing scarce spectrum resources through dense spatial reuse.
A Unified Future of Connectivity
Together, SCS and MO lay the foundation for a unified, intelligent network ecosystem. SCS simplifies and automates connectivity through unified provisioning, intelligent routing and seamless network handoffs. MO enhances this foundation by extending mobile reach and performance through innovative 5G integration with existing HFC networks.
The combination creates a reliable, adaptive connectivity fabric that moves effortlessly with users — from their living rooms to the open road.
Join CableLabs in Transforming Connectivity
CableLabs is leading the next era of broadband innovation — where seamless, intelligent networks adapt in real time to users’ needs. We invite members and vendors to collaborate with us on Seamless Connectivity Service and Mobile Optionality initiatives.
Join our CableLabs members-only webinar on Thursday, Oct. 30, to learn more about this revolutionary, industry-first offering and how it enables operators to launch new, differentiated services with strong revenue growth potential.
Register for the webinar, and learn more about joining our working groups.
Security
Addressing Emerging Cryptographic Threats in the Age of Quantum Computing
Key Points
- Threats against cryptography are evolving; among them, the threat of quantum computing is increasingly putting critical infrastructure and the data that traverses it at risk.
- Enabling cryptographic agility and leveraging it to migrate to quantum-safe cryptography are approaches that can mitigate these emerging threats.
- Through CableLabs’ Future of Cryptography Working Group, we collaborate with operators and vendors to help the industry navigate the migration to new cryptographic paradigms.
Cryptography is a foundational security technology used to protect digital information by providing the underpinnings for confidentiality, authentication and integrity. Today’s cryptographic algorithms may soon be undermined by emerging attacks, including the realization of a cryptographically relevant quantum computer (CRQC). Such attacks pose a very real and increasingly urgent threat across virtually all industries and their technologies, including broadband network infrastructure.
With cryptography and public key infrastructure being foundational to the security of cable networks, the broadband industry is uniquely positioned to rise to this challenge and seize the opportunity to future-proof networks to be robust, flexible and responsive to any cryptographic threat — quantum or otherwise. In this blog, we’ll review the threats against cryptography on the horizon, the solution to mitigate those threats and actions to start migration to new cryptographic paradigms. Many organizations, including network operators, have started taking action to plan for and execute cryptographic migrations.
The Threat: Attacks Against Cryptography
So, what exactly is the risk? To put it simply, quantum computers will one day be powerful enough to crack the asymmetric cryptography that is the basis of confidentiality, authenticity and integrity of data at all layers for virtually all devices deployed today. The current timeline for the potential development of a CRQC is 10–30 years — with increasing probability. That estimate isn’t certain, and recent research advancements suggest that it could be sooner.
While that time frame is wide, the risk of compromise is relevant today, thanks to the “harvest now, decrypt later” style of attack. In this scenario, adversaries may capture encrypted data today and retain it, planning to decrypt it once they have access to a CRQC. Any sensitive data generated today that will remain sensitive in the future (such as health records) is therefore at risk today.
The Solution: Cryptographic Agility and Post-Quantum Cryptography
So, how can the industry future-proof itself against these threats? The solution is twofold:
- Enabling cryptographic agility: Cryptographic agility is the ability to switch cryptographic systems quickly and efficiently. It’s a forward-looking design principle and capability that helps security interfaces stay flexible and adaptable in the face of all future threats.
- Post-quantum cryptography (PQC): Also called quantum-safe cryptography, these new encryption algorithms are designed to resist attacks from quantum computers. Their standardization, primarily driven by the National Institute of Standards and Technology in the United States, is a global effort that’s been ongoing for the last decade.
PQC aims to be the replacement for today’s vulnerable cryptography. Cryptographic agility is the framework by which systems will be migrated to PQC (and future iterations of cryptographic algorithms). Together, these strategies offer a path forward.
Migrating to PQC and Leveraging Existing Guidance
From existing guidance on cryptographic migrations, the CableLabs Future of Cryptography Working Group — a collaborative initiative bringing together operators, vendors and security experts to prepare for and to navigate changes to evolving cryptography — has identified certain “no-regret” actions, which can benefit network security posture regardless of whether or when the threat of a CRQC is realized. Some of these no-regret actions include:
- Establishing a cryptographic inventory: A comprehensive inventory of what cryptography is deployed is a critical artifact for any organization to compile as a first step towards cryptographic migrations.
- Assessing and estimating cryptographic agility enablement: Cryptographic agility is a deceptively simple concept; effectively enabling it begins with quantifying how cryptographically agile security interfaces are today. Tools exist today to aid in that effort.
- Discussions with vendors: Vendors play a critical role in cryptographic migrations, providing the implementation of security interfaces and concretely enabling cryptographic agility. Therefore, early and ongoing engagement with vendors on their roadmaps for enabling cryptographic agility and migrations to new cryptographic paradigms is key.
- Risk assessments and defining risk tolerance: Migration of cryptography at full organization scale is an optimization problem; undertaking risk assessment activities to identify the devices, services and interfaces that are at highest risk and should be prioritized for migration is crucial.
Taking Action Through Collaboration
Over the next decade, regulatory bodies around the world expect critical infrastructure — including broadband networks — to adopt quantum-safe cryptography. That makes the next five years crucial for operators looking to future-proof their networks and enable cryptographic agility as a key security capability. Reaching that goal will require deep collaboration, not just between network operators, but across the entire ecosystem of equipment manufacturers, software developers and standards organizations.
To ensure a smoother transition, the CableLabs Future of Cryptography Working Group is continuing to drive the foundational work to adapt current crypto migration and agility guidance to cable networks, identifying gaps therein and developing strategies to address those gaps. The working group’s mission is to develop practical, industry-specific guidance for enabling cryptographic agility as a new capability and migrating operator networks to post-quantum cryptography.
The threat may be complex, but the goal for the cable broadband industry is simple: Keep our networks — and the people who rely on them — secure for the future. To learn more or if you’re interested in contributing, the Future of Cryptography Working Group is open to CableLabs members and our vendor community. Join us here.
Security
The Malicious Economy: What Happens If Your Defenses Are Insufficient?
Key Points
- Law enforcement is dedicating greater attention to incident reporting and active threat monitoring, an encouraging trend in the fight against ransomware. Still, threat actors continue to evolve their tactics, leading to rising numbers of victims and ransomware variants.
- CableLabs collaborates with several cybersecurity organizations, including M3AAWG, with which we helped develop and maintain best practices for responding to ransomware attacks.
Ransomware has changed a lot in the past few years. The term refers to a form of malicious software loaded by attackers to restrict access to files and other data with the intention of extracting payment from the owners of that data.
CableLabs has been working to make sure that residential and business subscribers have the tools they need not only for preparedness and prevention, but also in the event that ransomware actors target them.
Let’s take a look at how the ransomware landscape has evolved, how law enforcement has changed its approach and how one important document can alter the course of your network’s future.
The Law Enforcement Front
The global climate on the regulatory, legislative and law enforcement front has changed, as you can see in the table below.
|
Technical Developments
|
Policy Involvement
|
|
Threat Actors & Threat Evolution
|
Cyber Insurance Market
|
|
Law Enforcement
|
National Security Implications
|
Evolving Threat Actor Behavior
We’re also seeing changes in threat actor behavior. There’s been a sharp increase in both the number of victims (over 200 percent) and the number of ransomware variants (over 30 percent) in 2025 — a deviation from last year’s trends.
The increased use of ransomware-as-a-service (RaaS), the open availability of threat tools and malicious actor communication all continue to evolve. No longer does the threat actor have to find a way to access systems, they can now buy opened systems and immediately move to the ransom phase. The horizontal disaggregation of the marketplace has enabled more threat actors to engage against more victims, with less technical know-how. Exploited vulnerabilities are now the primary method of malicious access, followed by compromised credentials and email/phishing.
Collaborating to Combat Threat Actors
CableLabs engages with several Information Sharing and Analysis Centers (ISACs) and anti-abuse groups. One of the more focused groups is the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG), where we’re proud to have helped to both originally build (and then shepherd updates to) the “M3AAWG Ransomware Active Attack Response Best Common Practices” document.
We do this work because — although the dogma of cybersecurity defense is to prepare, prepare, prepare — the reality is that no matter how good a network’s defenses are, they can always be stronger.
The Best Common Practices document starts with advice from victims who were previously infected, moves on to steps to follow, lists numerous resources, provides a high-level view of what to expect and finally offers decision guideposts about who to involve and when. The document helps with detection, analysis and response activities; demonstrates how to communicate; and enumerates the deliverables necessary for each stage.
This document doesn’t prescribe specific behaviors, but it helps to make sure the reader is equipped with the right questions to ask, as well as the considered order of approach to tackling a problem.
There will be decisions to make about when to declare an event, whether you have reporting requirement, what law enforcement’s role will be, which disclosures are necessary, whether you pay a ransom (or whether that is legally permissible in your situation), when and how to engage on cybersecurity insurance, and what your potential negotiation options are.
There are always collateral victims in attacks like these, and there may be actions possible or preferable on those fronts that will need to be evaluated. That process is one of many that will involve others within the organization. This document helps lay out who should be considered in each step.
The Importance of Having a Plan
Everyone hopes that this aspect of the global economy will come to a decisive end but, in reality, that’s neither the trend nor the expectation. In a dangerous world, it’s best to have a plan for how your company will act in a multitude of situations — even the unpleasant ones.
The Best Common Practices document is a tool for checking existing policies, technologies and the people involved in the prevention plans, but it can also be a cheat sheet for those who have had to balance other needs against external threats and suddenly find themselves in a difficult situation.
Read the “M3AAWG Ransomware Active Attack Response Best Common Practices” document to learn more about the options that are available for victims of ransomware attacks. The document is one resource in a broader cross-sector toolkit that helps defend against and manage the risk of ransomware threats. For more, check out:
- A Cybersecurity Framework 2.0 Community Profile from the National Institute of Standards and Technology (NIST)
- StopRansomware.gov from CISA
Winston Churchill famously said, “If you’re going through hell, keep going.”
These resources can show you how.


