This document provides implementation guidelines for the DVB Simulcrypt standard. It describes the architecture and protocols involved in simulcrypt systems, including the ECMG protocol between the security client system and conditional access modules, and the EMMG/PDG protocol between conditional access modules and multiplex equipment. The document outlines differences between version 1 and 2 of the standards, and provides recommendations for compliance. It also includes detailed state diagrams and descriptions of the protocols involved.
The document provides technical specifications for the Digital Video Broadcasting (DVB) SimulCrypt system, including its head-end architecture and synchronization. It defines the system components, their functions, and the interfaces between them. The goal is to specify the requirements for interoperability between two or more Conditional Access (CA) systems at a head-end.
This document provides specifications for Service Information (SI) in Digital Video Broadcasting (DVB) systems. It defines the SI table mechanisms and tables used to describe services, events and other data in DVB transport streams. Section 5 describes the SI table system, including the mapping of sections into transport stream packets and coding of table identifiers. Section 6 defines various descriptors used to provide additional information about services, components, events, etc. The document contains specifications for Network Information Table, Bouquet Association Table, Service Description Table, Event Information Table and other tables.
This document provides a European standard for a second generation digital transmission system for cable systems, known as DVB-C2. It defines the system architecture, input processing, bit-interleaved coding and modulation, data slice packet generation, layer 1 part 2 signalling generation and coding, frame builder functions, and OFDM generation for the DVB-C2 system. The standard specifies the frame structure, coding, modulation, and other technical aspects to enable digital video and audio broadcasting over cable networks.
This document provides specifications for using video and audio coding in digital broadcasting applications based on the MPEG-2 Transport Stream. It covers systems layer aspects like transport streams, transport stream packets, adaptation fields, and packetized elementary stream packets. The document defines requirements for baseline IRDs (integrated receiver decoders) and specifies fields in the transport packet and PES packet headers.
This document provides a summary of the Digital Video Broadcasting (DVB) second generation framing structure, channel coding and modulation systems for broadcasting and other broadband satellite applications. It describes the transmission system including the system definition, architecture and configurations. It then specifies the subsystems for mode adaptation, stream adaptation, forward error correction encoding, bit mapping into constellations, and physical layer framing.
The document provides implementation guidelines for using the DVB Simulcrypt standard, including describing the architecture and protocols, clarifying differences between protocol versions, explaining state diagrams and processes, and providing recommendations for error handling, redundancy management, and custom signaling. It aims to facilitate reliable implementation of the Simulcrypt model and interfaces between broadcasters, network operators, and manufacturers.
This document provides specifications for service information (SI) in digital video broadcasting (DVB) systems, including:
- It defines SI as data tables for identifying services, events, and other information in DVB signal streams.
- SI tables are divided into network information tables, service description tables, event information tables, and other tables for time/date, running status, etc.
- Descriptors are also defined to provide additional information about services, components, parental ratings, etc. within the tables.
This document provides specifications for a digital video broadcasting (DVB) interaction channel for cable TV distribution systems. It defines a reference model for the system architecture and protocol stack for narrowband interaction channels to support asymmetric interactive services. It then specifies the DVB interaction channel for CATV networks, including the system concept with out-of-band/in-band principles, spectrum allocation, and FDM/TDMA multiple access. It also defines the lower physical layer specifications for the forward and return interaction paths, including modulation, framing, and other channel coding parameters.
The document provides technical specifications for the Digital Video Broadcasting (DVB) SimulCrypt system, including its head-end architecture and synchronization. It defines the system components, their functions, and the interfaces between them. The goal is to specify the requirements for interoperability between two or more Conditional Access (CA) systems at a head-end.
This document provides specifications for Service Information (SI) in Digital Video Broadcasting (DVB) systems. It defines the SI table mechanisms and tables used to describe services, events and other data in DVB transport streams. Section 5 describes the SI table system, including the mapping of sections into transport stream packets and coding of table identifiers. Section 6 defines various descriptors used to provide additional information about services, components, events, etc. The document contains specifications for Network Information Table, Bouquet Association Table, Service Description Table, Event Information Table and other tables.
This document provides a European standard for a second generation digital transmission system for cable systems, known as DVB-C2. It defines the system architecture, input processing, bit-interleaved coding and modulation, data slice packet generation, layer 1 part 2 signalling generation and coding, frame builder functions, and OFDM generation for the DVB-C2 system. The standard specifies the frame structure, coding, modulation, and other technical aspects to enable digital video and audio broadcasting over cable networks.
This document provides specifications for using video and audio coding in digital broadcasting applications based on the MPEG-2 Transport Stream. It covers systems layer aspects like transport streams, transport stream packets, adaptation fields, and packetized elementary stream packets. The document defines requirements for baseline IRDs (integrated receiver decoders) and specifies fields in the transport packet and PES packet headers.
This document provides a summary of the Digital Video Broadcasting (DVB) second generation framing structure, channel coding and modulation systems for broadcasting and other broadband satellite applications. It describes the transmission system including the system definition, architecture and configurations. It then specifies the subsystems for mode adaptation, stream adaptation, forward error correction encoding, bit mapping into constellations, and physical layer framing.
The document provides implementation guidelines for using the DVB Simulcrypt standard, including describing the architecture and protocols, clarifying differences between protocol versions, explaining state diagrams and processes, and providing recommendations for error handling, redundancy management, and custom signaling. It aims to facilitate reliable implementation of the Simulcrypt model and interfaces between broadcasters, network operators, and manufacturers.
This document provides specifications for service information (SI) in digital video broadcasting (DVB) systems, including:
- It defines SI as data tables for identifying services, events, and other information in DVB signal streams.
- SI tables are divided into network information tables, service description tables, event information tables, and other tables for time/date, running status, etc.
- Descriptors are also defined to provide additional information about services, components, parental ratings, etc. within the tables.
This document provides specifications for a digital video broadcasting (DVB) interaction channel for cable TV distribution systems. It defines a reference model for the system architecture and protocol stack for narrowband interaction channels to support asymmetric interactive services. It then specifies the DVB interaction channel for CATV networks, including the system concept with out-of-band/in-band principles, spectrum allocation, and FDM/TDMA multiple access. It also defines the lower physical layer specifications for the forward and return interaction paths, including modulation, framing, and other channel coding parameters.
1) The document describes a modification to the Huffman coding used in JPEG image compression. It proposes pairing each non-zero DCT coefficient with the run-length of subsequent (rather than preceding) zero coefficients.
2) This allows using separate optimized Huffman code tables for each DCT coefficient position, improving compression by 10-15% over standard JPEG coding.
3) The decoding procedure is not changed and no end-of-block marker is needed, providing advantages with no increase in complexity.
This document provides an overview of service information (SI) in digital video broadcasting (DVB) systems, including sections like the network information section (NIT), service description section (SDT), bouquet association section (BAT), program association section (PAT), conditional access section (CAT), transport stream description section (TSDT), event information section (EIT), and running status section (RST). It includes syntax diagrams and details for each section, such as table IDs, section lengths, descriptors, and other fields. It also provides the PID and refresh interval requirements for each table type.
The document provides implementation guidelines for using the DVB Simulcrypt standard, including describing the architecture and protocols, clarifying differences between protocol versions, explaining state diagrams and behaviors, and providing recommendations for error handling, redundancy management, and custom signaling profiles to facilitate reliable and efficient Simulcrypt headend implementation.
DVB-S2 is the second-generation specification for satellite broadcasting developed by DVB in 2003. It uses more advanced channel coding (LDPC codes) and modulation formats (QPSK, 8PSK, 16APSK, 32APSK) for a 30% increase in transmission capacity over DVB-S. DVB-S2 allows for adaptive coding and modulation to optimize transmission for each user. It is designed for broadcast, interactive, and professional applications with flexibility to handle different transponder characteristics and content formats.
This document discusses image compression using the discrete cosine transform (DCT). It develops simple Mathematica functions to compute the 1D and 2D DCT. The 1D DCT transforms a list of real numbers into elementary frequency components. It is computed via matrix multiplication or using the discrete Fourier transform with twiddle factors. The 2D DCT applies the 1D DCT to rows and then columns of an image, making it separable. These functions illustrate how Mathematica can be used to prototype image processing algorithms.
This document provides an overview of Codan's 6700/6900 series block up converter (BUC) systems and components. It describes the BUC, low-noise block converter (LNB), and redundancy systems. It also covers installation, operation, and troubleshooting of the systems. The document contains information on frequency bands, conversion plans, interfaces, cable connections, monitor/control, commands, maintenance procedures, and compliance standards.
1) The document discusses quantization and pulse code modulation (PCM) in voice signal encoding. PCM assigns 256 possible values to digitally represent analog voice samples, divided into chords and steps on a linear scale.
2) A logarithmic quantization scale is better than a linear one for voice signals, as it allocates more quantization steps to lower amplitudes prevalent in speech. This "compressed encoding" improves fidelity.
3) Quantization error occurs when samples with different amplitudes are assigned the same digital value, distorting the reconstructed waveform. Compression helps maintain a higher signal-to-noise ratio especially for low amplitudes.
This document discusses the basics of BISS scrambling. It describes BISS mode 1, which uses a session word, and BISS mode E, which encrypts the session word using an identifier and encryption algorithm. BISS mode E provides an additional layer of protection for transmitting the session word. The document also covers calculating the encrypted session word, using buried and injected identifiers, and how to operate scramblers in the different BISS modes.
The STi7167 is an integrated system-on-chip that combines a configurable DVB-T or DVB-C demodulator with STB decoding and display functions. It provides advanced HD and SD video decoding, audio decoding, graphics processing, and connectivity options. The chip's integrated features allow for low cost and small size STB designs for cable or terrestrial networks.
1) Reed-Solomon codes are a type of error-correcting code invented in 1960 that can detect and correct multiple symbol errors. They work by encoding data into redundant symbols that can be used to detect and locate errors.
2) Reed-Solomon codes are particularly good at correcting burst errors, where a block of symbols are corrupted together by noise. Even if an entire block of bits is corrupted, the code can still correct the errors by replacing the corrupted symbol.
3) The error correction capability of Reed-Solomon codes increases with larger block sizes, as noise is averaged over more symbols. However, implementing Reed-Solomon codes also becomes more complex with higher redundancy.
Dani Pedrosa won the MotoGP race at Laguna Seca, finishing just 0.344 seconds ahead of Valentino Rossi in second and 1.926 seconds ahead of Jorge Lorenzo in third. Casey Stoner finished fourth, over 12 seconds behind Pedrosa. There were several crashes during the race, with Andrea Dovizioso, Sete Gibernau, and Gabor Talmacsi all falling out of contention. James Toseland received a ride through penalty for a jump start.
This document describes the head-end architecture and synchronization for digital video broadcasting using SimulCrypt. It outlines the system components including an event information scheduler, SimulCrypt synchronizer, entitlement control message generator, entitlement management message generator, and multiplexer. It also describes the interfaces between these components, covering processes like channel and stream establishment and closure, as well as bandwidth allocation and status reporting.
The document discusses DCT/IDCT concepts and applications. It provides an introduction to DCT and IDCT, explaining that they are used widely in video and audio compression. It describes the DCT and IDCT functions and how they work to transform signals between spatial and frequency domains. Examples of one-dimensional and two-dimensional DCT/IDCT equations are also given. Finally, common applications of DCT/IDCT compression techniques are listed, such as in DVD players, cable TV, graphics cards, and medical imaging systems.
This document discusses digital set-top boxes (STBs) and related standards. It covers:
1) The DVB standards for digital TV broadcasting via different transmission media, including DVB-T for terrestrial, DVB-S for satellite, and DVB-C for cable. These share source coding/compression and service multiplexing standards.
2) STBs will be needed until integrated digital TVs are cheaper. Affordable STBs are key for digital TV adoption. Common standards help lower STB costs through economies of scale.
3) "Open architecture" and "interoperability" mean the STB functionality is defined by public standards and can receive services across networks, respectively. The
The RSA cryptosystem document discusses:
1) The RSA cryptosystem uses a public and private key to encrypt and decrypt messages based on large prime number factorization.
2) An example is provided where a message is encrypted with a public key and decrypted with a private key.
3) The security of RSA relies on the difficulty of factoring large numbers, as factorization algorithms take exponential time relative to the number of bits.
The document provides an overview of MPEG-4, a standard that offers both advanced audio and video codecs as well as tools for combining multimedia such as audio, video, graphics and interactivity. It was developed through an open international process to select the best technologies. MPEG-4 codecs like AVC and AAC provide high compression efficiency, having been adopted for HDTV, mobile video, and digital music. Its rich media tools allow interactive experiences combining different media types.
DVB-S2 is the second-generation specification for satellite broadcasting developed by DVB in 2003. It uses more advanced channel coding (LDPC codes) and modulation formats (QPSK, 8PSK, 16APSK, 32APSK) for improved transmission performance, achieving up to a 30% increase in capacity over DVB-S. DVB-S2 allows for backwards compatibility with DVB-S receivers and uses adaptive coding and modulation to optimize transmission for different users and conditions. It provides high flexibility to work with different input streams, modulation schemes, and satellite transponder characteristics.
This document discusses service information (SI) in DVB systems, specifically the discontinuity information section. It provides packet syntax diagrams for an MPEG-2 transport stream, the network information section, service description section, and bouquet association section, which are used to deliver metadata about available TV and radio channels and services. It also includes the syntax for a discontinuity information section, which is used to signal discontinuities in MPEG program streams that are caused by operations like splicing.
This document provides an overview of satellite communications fundamentals. It discusses how satellites provide capabilities not available through landlines, such as mobility and quick implementation. However, satellites are not always the most cost effective solution due to limited frequency spectrum and spatial capacity. The document describes different types of satellite services and configurations, including geostationary and non-geostationary satellites. It also covers topics like frequency reuse, earth station antennas, and satellite link delays.
ATI Courses Satellite Communications Systems Engineering Professional Develop...Jim Jenkins
ATI Courses Satellite Communications Systems Engineering course sampler. This three-day course is designed for satellite communications engineers, spacecraft engineers, and managers who want to obtain an understanding of the "big picture" of satellite communications. Each topic is illustrated by detailed worked numerical examples, using published data for actual satellite communications systems. The course is technically oriented and includes mathematical derivations of the fundamental equations. It will enable the participants to perform their own satellite link budget calculations. The course will especially appeal to those whose objective is to develop quantitative computational skills in addition to obtaining a qualitative familiarity with the basic concepts.
This document provides specifications for Service Information (SI) in Digital Video Broadcasting (DVB) systems. It defines the SI table mechanisms and tables used to describe services, events and other data in DVB transport streams. Section 5 describes the SI table system, including the mapping of sections into transport stream packets and coding of table identifiers. Section 6 defines various descriptors used within the SI tables to provide metadata about services, components, events and other data elements in DVB systems.
This document provides specifications for Service Information (SI) in Digital Video Broadcasting (DVB) systems. It defines the SI table mechanisms and tables used to describe services, events and other data in DVB transport streams. Section 5 describes the SI table system, including the mapping of sections into transport stream packets and coding of table identifiers. Section 6 defines various descriptors used within the SI tables to provide metadata about services, components, events and other data elements in DVB systems.
1) The document describes a modification to the Huffman coding used in JPEG image compression. It proposes pairing each non-zero DCT coefficient with the run-length of subsequent (rather than preceding) zero coefficients.
2) This allows using separate optimized Huffman code tables for each DCT coefficient position, improving compression by 10-15% over standard JPEG coding.
3) The decoding procedure is not changed and no end-of-block marker is needed, providing advantages with no increase in complexity.
This document provides an overview of service information (SI) in digital video broadcasting (DVB) systems, including sections like the network information section (NIT), service description section (SDT), bouquet association section (BAT), program association section (PAT), conditional access section (CAT), transport stream description section (TSDT), event information section (EIT), and running status section (RST). It includes syntax diagrams and details for each section, such as table IDs, section lengths, descriptors, and other fields. It also provides the PID and refresh interval requirements for each table type.
The document provides implementation guidelines for using the DVB Simulcrypt standard, including describing the architecture and protocols, clarifying differences between protocol versions, explaining state diagrams and behaviors, and providing recommendations for error handling, redundancy management, and custom signaling profiles to facilitate reliable and efficient Simulcrypt headend implementation.
DVB-S2 is the second-generation specification for satellite broadcasting developed by DVB in 2003. It uses more advanced channel coding (LDPC codes) and modulation formats (QPSK, 8PSK, 16APSK, 32APSK) for a 30% increase in transmission capacity over DVB-S. DVB-S2 allows for adaptive coding and modulation to optimize transmission for each user. It is designed for broadcast, interactive, and professional applications with flexibility to handle different transponder characteristics and content formats.
This document discusses image compression using the discrete cosine transform (DCT). It develops simple Mathematica functions to compute the 1D and 2D DCT. The 1D DCT transforms a list of real numbers into elementary frequency components. It is computed via matrix multiplication or using the discrete Fourier transform with twiddle factors. The 2D DCT applies the 1D DCT to rows and then columns of an image, making it separable. These functions illustrate how Mathematica can be used to prototype image processing algorithms.
This document provides an overview of Codan's 6700/6900 series block up converter (BUC) systems and components. It describes the BUC, low-noise block converter (LNB), and redundancy systems. It also covers installation, operation, and troubleshooting of the systems. The document contains information on frequency bands, conversion plans, interfaces, cable connections, monitor/control, commands, maintenance procedures, and compliance standards.
1) The document discusses quantization and pulse code modulation (PCM) in voice signal encoding. PCM assigns 256 possible values to digitally represent analog voice samples, divided into chords and steps on a linear scale.
2) A logarithmic quantization scale is better than a linear one for voice signals, as it allocates more quantization steps to lower amplitudes prevalent in speech. This "compressed encoding" improves fidelity.
3) Quantization error occurs when samples with different amplitudes are assigned the same digital value, distorting the reconstructed waveform. Compression helps maintain a higher signal-to-noise ratio especially for low amplitudes.
This document discusses the basics of BISS scrambling. It describes BISS mode 1, which uses a session word, and BISS mode E, which encrypts the session word using an identifier and encryption algorithm. BISS mode E provides an additional layer of protection for transmitting the session word. The document also covers calculating the encrypted session word, using buried and injected identifiers, and how to operate scramblers in the different BISS modes.
The STi7167 is an integrated system-on-chip that combines a configurable DVB-T or DVB-C demodulator with STB decoding and display functions. It provides advanced HD and SD video decoding, audio decoding, graphics processing, and connectivity options. The chip's integrated features allow for low cost and small size STB designs for cable or terrestrial networks.
1) Reed-Solomon codes are a type of error-correcting code invented in 1960 that can detect and correct multiple symbol errors. They work by encoding data into redundant symbols that can be used to detect and locate errors.
2) Reed-Solomon codes are particularly good at correcting burst errors, where a block of symbols are corrupted together by noise. Even if an entire block of bits is corrupted, the code can still correct the errors by replacing the corrupted symbol.
3) The error correction capability of Reed-Solomon codes increases with larger block sizes, as noise is averaged over more symbols. However, implementing Reed-Solomon codes also becomes more complex with higher redundancy.
Dani Pedrosa won the MotoGP race at Laguna Seca, finishing just 0.344 seconds ahead of Valentino Rossi in second and 1.926 seconds ahead of Jorge Lorenzo in third. Casey Stoner finished fourth, over 12 seconds behind Pedrosa. There were several crashes during the race, with Andrea Dovizioso, Sete Gibernau, and Gabor Talmacsi all falling out of contention. James Toseland received a ride through penalty for a jump start.
This document describes the head-end architecture and synchronization for digital video broadcasting using SimulCrypt. It outlines the system components including an event information scheduler, SimulCrypt synchronizer, entitlement control message generator, entitlement management message generator, and multiplexer. It also describes the interfaces between these components, covering processes like channel and stream establishment and closure, as well as bandwidth allocation and status reporting.
The document discusses DCT/IDCT concepts and applications. It provides an introduction to DCT and IDCT, explaining that they are used widely in video and audio compression. It describes the DCT and IDCT functions and how they work to transform signals between spatial and frequency domains. Examples of one-dimensional and two-dimensional DCT/IDCT equations are also given. Finally, common applications of DCT/IDCT compression techniques are listed, such as in DVD players, cable TV, graphics cards, and medical imaging systems.
This document discusses digital set-top boxes (STBs) and related standards. It covers:
1) The DVB standards for digital TV broadcasting via different transmission media, including DVB-T for terrestrial, DVB-S for satellite, and DVB-C for cable. These share source coding/compression and service multiplexing standards.
2) STBs will be needed until integrated digital TVs are cheaper. Affordable STBs are key for digital TV adoption. Common standards help lower STB costs through economies of scale.
3) "Open architecture" and "interoperability" mean the STB functionality is defined by public standards and can receive services across networks, respectively. The
The RSA cryptosystem document discusses:
1) The RSA cryptosystem uses a public and private key to encrypt and decrypt messages based on large prime number factorization.
2) An example is provided where a message is encrypted with a public key and decrypted with a private key.
3) The security of RSA relies on the difficulty of factoring large numbers, as factorization algorithms take exponential time relative to the number of bits.
The document provides an overview of MPEG-4, a standard that offers both advanced audio and video codecs as well as tools for combining multimedia such as audio, video, graphics and interactivity. It was developed through an open international process to select the best technologies. MPEG-4 codecs like AVC and AAC provide high compression efficiency, having been adopted for HDTV, mobile video, and digital music. Its rich media tools allow interactive experiences combining different media types.
DVB-S2 is the second-generation specification for satellite broadcasting developed by DVB in 2003. It uses more advanced channel coding (LDPC codes) and modulation formats (QPSK, 8PSK, 16APSK, 32APSK) for improved transmission performance, achieving up to a 30% increase in capacity over DVB-S. DVB-S2 allows for backwards compatibility with DVB-S receivers and uses adaptive coding and modulation to optimize transmission for different users and conditions. It provides high flexibility to work with different input streams, modulation schemes, and satellite transponder characteristics.
This document discusses service information (SI) in DVB systems, specifically the discontinuity information section. It provides packet syntax diagrams for an MPEG-2 transport stream, the network information section, service description section, and bouquet association section, which are used to deliver metadata about available TV and radio channels and services. It also includes the syntax for a discontinuity information section, which is used to signal discontinuities in MPEG program streams that are caused by operations like splicing.
This document provides an overview of satellite communications fundamentals. It discusses how satellites provide capabilities not available through landlines, such as mobility and quick implementation. However, satellites are not always the most cost effective solution due to limited frequency spectrum and spatial capacity. The document describes different types of satellite services and configurations, including geostationary and non-geostationary satellites. It also covers topics like frequency reuse, earth station antennas, and satellite link delays.
ATI Courses Satellite Communications Systems Engineering Professional Develop...Jim Jenkins
ATI Courses Satellite Communications Systems Engineering course sampler. This three-day course is designed for satellite communications engineers, spacecraft engineers, and managers who want to obtain an understanding of the "big picture" of satellite communications. Each topic is illustrated by detailed worked numerical examples, using published data for actual satellite communications systems. The course is technically oriented and includes mathematical derivations of the fundamental equations. It will enable the participants to perform their own satellite link budget calculations. The course will especially appeal to those whose objective is to develop quantitative computational skills in addition to obtaining a qualitative familiarity with the basic concepts.
This document provides specifications for Service Information (SI) in Digital Video Broadcasting (DVB) systems. It defines the SI table mechanisms and tables used to describe services, events and other data in DVB transport streams. Section 5 describes the SI table system, including the mapping of sections into transport stream packets and coding of table identifiers. Section 6 defines various descriptors used within the SI tables to provide metadata about services, components, events and other data elements in DVB systems.
This document provides specifications for Service Information (SI) in Digital Video Broadcasting (DVB) systems. It defines the SI table mechanisms and tables used to describe services, events and other data in DVB transport streams. Section 5 describes the SI table system, including the mapping of sections into transport stream packets and coding of table identifiers. Section 6 defines various descriptors used within the SI tables to provide metadata about services, components, events and other data elements in DVB systems.
This document provides a specification for Service Information (SI) in Digital Video Broadcasting (DVB) systems. It defines the SI data tables and descriptors that are used to describe DVB services, events, and other data elements. The SI tables include the Network Information Table (NIT), Bouquet Association Table (BAT), Service Description Table (SDT), Event Information Table (EIT), Time and Date Table (TDT), Time Offset Table (TOT), Running Status Table (RST), Stuffing Table (ST), and Discontinuity Information Table (DIT). The document also specifies over 50 descriptors that provide additional metadata about services, components, events, content, ratings, and other attributes.
This document provides a specification for Service Information (SI) in Digital Video Broadcasting (DVB) systems. It defines the SI data tables and descriptors that are used to describe content, events, and services in DVB systems. The document specifies the SI table mechanism, table definitions, descriptor identification and coding. It also defines Storage Media Interoperability measures for SI implementation on removable storage media.
This document provides specifications for Service Information (SI) in Digital Video Broadcasting (DVB) systems. It defines the SI table mechanisms and tables used to describe services, events and other data in DVB transport streams. Section 5 describes the SI table system, including the mapping of sections into transport stream packets and coding of table identifiers. Section 6 defines various descriptors used within the SI tables to provide metadata about services, components, events and other data elements in DVB systems.
This document defines DVB-S.2, a second generation digital video broadcasting system for satellite transmission. DVB-S.2 offers improvements over existing standards like DVB-S, including more powerful error correction, variable coding and modulation, and adaptive coding and modulation. It provides a flexible system suitable for digital television broadcasting, interactive services, news gathering, and other broadband satellite applications. DVB-S.2 is designed to achieve close to channel capacity while maintaining backwards compatibility with DVB-S for some modes during a migration period.
This document defines DVB-S.2, a second generation digital video broadcasting system for satellite transmission. Key features include more powerful error correction coding, variable coding and modulation to provide differentiated protection, and adaptive coding and modulation to dynamically adapt to channel conditions. DVB-S.2 supports both broadcast services for television as well as interactive applications using return channels. It provides backwards compatibility with the existing DVB-S standard to ease migration to the new system. The flexible design allows DVB-S.2 to be used across different satellite applications ranging from digital TV broadcasting to satellite news gathering.
This document provides the European standard for the frame structure, channel coding, and modulation for a second generation digital transmission system for cable systems (DVB-C2). It defines the system architecture and target performance, as well as the input processing including mode adaptation, stream adaptation, and bit-interleaved coding and modulation for DVB-C2. The standard specifies the input formats, outer encoding using BCH, inner encoding using LDPC, bit interleaving, and mapping of bits onto constellations.
This document provides the European standard for the frame structure, channel coding and modulation for a second generation digital transmission system for cable systems (DVB-C2). It defines the system architecture and specifications for input processing, bit-interleaved coding and modulation, data slice packet generation, layer 1 part 2 signalling, frame building, and OFDM generation. The standard aims to provide improved performance for cable systems over the existing DVB-C standard.
This document provides the European standard for the frame structure, channel coding and modulation for a second generation digital transmission system for cable systems (DVB-C2). It defines the system architecture and specifications for input processing, bit-interleaved coding and modulation, data slice packet generation, layer 1 part 2 signalling, frame building, and OFDM generation. The standard aims to provide improved performance for cable systems over the existing DVB-C standard.
This document provides the European standard for the frame structure, channel coding, and modulation for a second generation digital transmission system for cable systems (DVB-C2). It defines the system architecture and target performance, as well as the input processing including mode adaptation, stream adaptation, and bit-interleaved coding and modulation for DVB-C2. The standard specifies the input formats, outer encoding using BCH, inner encoding using LDPC, bit interleaving, and mapping of bits onto constellations.
This document provides the European standard for the frame structure, channel coding and modulation for a second generation digital transmission system for cable systems (DVB-C2). It defines the system architecture and specifications for input processing, bit-interleaved coding and modulation, data slice packet generation, layer 1 part 2 signalling, frame building, and OFDM generation. The standard aims to provide improved performance for cable systems over the existing DVB-C standard.
This document provides specifications for digital video and audio coding in broadcasting applications using MPEG-2 and H.264/AVC video coding and MPEG-1 Layer 2, MPEG-1 Layer 3 (MP3), MPEG-4, AC-3, Enhanced AC-3, DTS, AAC, and MPEG HEAAC audio coding based on the MPEG-2 transport stream. It defines requirements for IRDs and bitstreams for standard and high definition television at frame rates of 25 Hz, 30 Hz and 50 Hz. The document covers systems layer, video, audio, and synchronization specifications that are common to all IRDs and bitstreams.
This document provides specifications for using video and audio coding in digital broadcasting applications based on the MPEG-2 Transport Stream. It covers systems layer aspects of the MPEG-2 standards including transport streams, transport stream packets, adaptation fields, and packetized elementary stream packets. The document contains definitions and abbreviations and specifies requirements for baseline IRDs related to these MPEG-2 systems layer aspects.
This document provides specifications for a digital video broadcasting (DVB) interaction channel for cable TV distribution systems (CATV). It defines a reference model and protocol stack for narrowband interaction channels to support asymmetric interactive services. The specification defines the physical layer, framing, medium access control (MAC) functionality, and mid-layer protocols for the interaction channel. Key aspects include the use of out-of-band and in-band signaling, TDMA multiple access, MAC messages for initialization, connection establishment, and link management, and optional security measures. The specification aims to enable interactive services for cable TV networks using DVB technology.
This document provides specifications for a digital video broadcasting (DVB) interaction channel for cable TV distribution systems (CATV). It defines a reference model and protocol stack for narrowband interaction channels to support asymmetric interactive services. The specification defines the physical layer, framing, medium access control (MAC) functionality, and mid-layer protocols for the interaction channel. Key aspects include the use of out-of-band and in-band signaling, TDMA multiple access, MAC messages for initialization, connection establishment, and link management, and optional security measures. The specification aims to enable interactive services for cable TV networks using DVB technology.
This document defines an extension to the Multimedia Home Platform (MHP) specification to support personal video recording (PVR) functionality. It specifies how digital television content and MHP applications can be scheduled for recording, how recordings are managed, and how recorded content and applications can be played back. It also describes how metadata and content referencing defined by the TV-Anytime standard can be used. The extension is compatible with MHP 1.0 and 1.1, and aims to encourage implementations of receivers, middleware, applications, and conformance tests supporting PVR/PDR functionality within the MHP framework.
This document defines an extension to the Multimedia Home Platform (MHP) specification to support personal video recording (PVR) functionality. It specifies how digital television content and MHP applications can be scheduled for recording, how recordings are managed, and how recorded content and applications can be played back. It also describes how metadata and content referencing defined by the TV-Anytime standard can be used. The extension is compatible with MHP 1.0 and 1.1 while adding new APIs, application signaling extensions, and system integration aspects related to PVR/PDR functionality.
This document defines an extension to the Multimedia Home Platform (MHP) specification to support personal video recording (PVR) functionality. It specifies how digital television content and MHP applications can be scheduled for recording, how recordings are managed, and how recorded content and applications can be played back. It also describes how metadata and content referencing defined by the TV-Anytime standard can be used. The extension is compatible with MHP 1.0 and 1.1, and aims to encourage implementations of receivers, middleware, applications, and conformance tests supporting PVR/PDR functionality within the MHP framework.
This document is a technical specification from ETSI that defines the radio resource control protocol for LTE cellular networks. It specifies aspects of the protocol such as system information acquisition, services provided to upper layers, UE states and transitions, and general requirements for procedures. The document is 3GPP TS 36.331 version 10.2.0 Release 10.
The Event Logger monitors and logs Digital Program Insertion (DPI) messages to verify correct transmission of signals via satellite. It watches for configured GPI state changes that indicate an expected DPI message. If the message is received on time, it is logged as a matched event. If not received on time, it is flagged as missed. The Event Logger also decodes DPI messages to help diagnose issues, and is compatible with various encoding systems. It has 6 ASI inputs, 108 GPI sensors, and logs data in real-time and for archiving.
Euler's theorem states that for any plane graph, the number of vertices (v) minus the number of edges (e) plus the number of faces (f) equals 2. The document proves this theorem by considering a minimal tree (T) within the graph and its dual tree (D), showing that the number of edges of T and D sum to the total edges (e) of the original graph. Some applications of the theorem are that any plane graph contains an edge of degree 5 or higher and any finite set of points not all on a line contains a line with exactly two points.
This document provides an overview of satellite communications fundamentals. It discusses how satellites provide capabilities not available through landlines, such as mobility and quick implementation. However, satellites are not always the most cost effective solution due to limited frequency spectrum and spatial capacity. The document describes different types of satellite services and configurations, including geostationary and non-geostationary satellites. It also covers topics like frequency reuse, earth station antennas, and satellite link delays.
The document discusses quantization in analog-to-digital conversion. It describes the three processes of A/D conversion as sampling, quantization, and binary encoding. Quantization involves mapping amplitude values into a set of discrete values using a quantization interval or step size. The document discusses uniform quantization and how the quantization levels are determined. It also covers non-uniform quantization and provides examples and MATLAB code demonstrations of audio signal quantization.
This document discusses Euler's formula, which relates the number of vertices (V), edges (E), and faces (P) of a polyhedron. Through experimenting with attaching polygons and bending shapes, students derive the formula V - E + P = 2 for polyhedra. Removing a face shows the formula still holds, revealing why it is true for any polyhedron. Students learn the formula can distinguish polyhedra from other 3D shapes by calculating the Euler characteristic V - E + P.
This document provides an introduction to Reed-Solomon codes, which are word-oriented, non-binary BCH codes that are simple, robust, and perform well for burst errors. Reed-Solomon codes use Galois field techniques to encode data into blocks of length 2^m - 1 by adding 2t parity check words, allowing the correction of t errors. The encoding and decoding procedures make use of a generator polynomial, Berlekamp-Massey algorithm, Chien search, and Forney algorithm. Future work may include more flexible generator polynomials or converting C54x codes to C55x codes.
This document provides a 3-sentence summary of the given document on video compression:
The document discusses video compression algorithms used in standards like MPEG, explaining how video compression works through motion estimation, discrete cosine transformation, quantization, and entropy coding to reduce file sizes. It analyzes the tradeoff between compression ratio and quality, and provides details on common video compression standards and their applications. The MPEG standards are described in particular detail, outlining the different frame types and compression steps used to remove spatial and temporal redundancies from video for more efficient storage and transmission.
This document provides an overview of the Linux operating system and fundamentals for learning Linux, including:
- Details on Linux distributions like Debian, Red Hat, and SUSE and their licensing models.
- A brief history of open source software development and benefits of the open source model.
- How to log into a Linux system, basics of the shell, command line navigation, and file management.
- Key topics covered include files/directories, permissions, and redirection.
- Information on Linux certification programs.
- Setup instructions for a Linux emulator for the fundamentals course.
This document discusses three methods for reducing bitrates in digital video transmission: time-shifting MPEG-2 packets, open loop transrating, and closed loop transrating. Time-shifting involves advancing or delaying packets to smooth out variable bitrates, while open loop transrating re-quantizes video frames without feedback. Closed loop transrating also re-quantizes but uses error detection and feedback loops to learn from previous frames and optimize re-quantization levels, allowing for greater bitrate reductions than open loop. These methods aim to more efficiently use bandwidth and enable network operators to provide more video services over existing infrastructure.
This document provides a beginner's guide to learning Linux. It covers topics such as what Linux is, understanding files and folders, users and permissions, the root user, opening a terminal, basic commands like ls, cd, pwd, and tar for archiving files. The guide explains important Linux concepts and provides examples of common commands to get started using the Linux command line.
The RS-232 interface is a standard for serial binary data interchange between devices. It allows up to 20 signals but only requires 3 wires: send data, receive data, and signal ground. Communication uses asynchronous transmission of start bits, data bits, optional parity bits, and stop bits. The standard connector has 25 pins but many signals are unnecessary for direct computer-terminal connections. RS-232 specifies voltage levels for logic 1 and 0 signals and establishes compatibility but not communication between compliant devices.
The document discusses digital set-top boxes (STBs) and open architecture/interoperability issues. It provides details on:
1) International digital TV standards DVB-T, DVB-S, DVB-C and how STBs can receive all three signals with switchable front ends.
2) The DVB Common Interface standard which allows a STB to be interoperable across different networks using different conditional access systems via external modules.
3) The Multimedia Home Platform standard which seeks to create an open middleware based on Java, allowing for interoperable applications across networks.
This document specifies how to encapsulate MPEG-2 Transport Stream data within DAB MSC stream data sub-channels, including adding error protection. It describes using Reed-Solomon coding and interleaving to provide outer coding and error protection. The document references ETSI EN 300 401 for information on the DAB radio broadcasting system.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
ECMG & EMMG protocol
1. ETSI TR 102 035 V1.1.1 (2002-04)
Technical Report
Digital Video Broadcasting (DVB);
Implementation Guidelines of the DVB
Simulcrypt Standard
European Broadcasting Union Union Européenne de Radio-Télévision
EBU·UER
3. 3 ETSI TR 102 035 V1.1.1 (2002-04)
Contents
Intellectual Property Rights ................................................................................................................................5
Foreword.............................................................................................................................................................5
Introduction ........................................................................................................................................................6
1 Scope ........................................................................................................................................................6
2 References ................................................................................................................................................7
3 Definitions and abbreviations...................................................................................................................7
3.1 Definitions..........................................................................................................................................................7
3.2 Abbreviations .....................................................................................................................................................9
4 Architecture............................................................................................................................................10
5 Compliance between version 1 and version 2 of the standard ...............................................................11
5.1 ECMG protocol ................................................................................................................................................11
5.1.1 Differences between Version 1 and Version 2............................................................................................11
5.1.2 Recommendation for ECMG protocol compliance.....................................................................................12
5.2 EMMG/PDG protocol ......................................................................................................................................12
5.2.1 Differences between Version 1 and Version 2............................................................................................12
5.2.2 Recommendation for EMMG/PDG protocol compliance...........................................................................13
6 ECMG (SCS Protocol) ...........................................................................................................................14
6.1 State diagram....................................................................................................................................................14
6.1.1 Channel state machine ................................................................................................................................14
6.1.1.1 Channel Not Open.................................................................................................................................14
6.1.1.2 Channel Setting Up ...............................................................................................................................15
6.1.1.3 Channel Open........................................................................................................................................15
6.1.1.4 Channel In Error....................................................................................................................................15
6.1.2 Stream state machine ..................................................................................................................................15
6.1.2.1 Stream Not Open...................................................................................................................................17
6.1.2.2 Stream Setting Up .................................................................................................................................17
6.1.2.3 Stream Open..........................................................................................................................................17
6.1.2.4 Stream In Error......................................................................................................................................17
6.1.2.5 Stream Closing ......................................................................................................................................18
6.1.3 Summary of messages permissible in each state.........................................................................................18
6.2 Network delay ..................................................................................................................................................18
7 EMMG/PDG(MUX protocol) ................................................................................................................19
7.1 State diagram....................................................................................................................................................19
7.1.1 Channel state machine ................................................................................................................................19
7.1.1.1 Channel Not Open.................................................................................................................................19
7.1.1.2 Channel Setting Up ...............................................................................................................................19
7.1.1.3 Channel Open........................................................................................................................................20
7.1.1.4 Channel In Error....................................................................................................................................20
7.1.2 Stream state machine ..................................................................................................................................20
7.1.2.1 Stream Not Open...................................................................................................................................21
7.1.2.2 Stream Setting Up .................................................................................................................................22
7.1.2.3 Stream Open..........................................................................................................................................22
7.1.2.4 Stream In Error......................................................................................................................................22
7.1.2.5 Stream Closing ......................................................................................................................................23
7.1.3 Summary of messages permissible in each state.........................................................................................23
7.2 Datagram insertion timing................................................................................................................................23
7.2.1 Bandwidth definition ..................................................................................................................................23
7.2.2 EMM/Private Data datagram insertion .......................................................................................................24
7.3 UDP provision without TCP control layer .......................................................................................................24
7.4 Datagram packetization ....................................................................................................................................24
8 C(P)SIG (P)SIG ..................................................................................................................................25
ETSI
4. 4 ETSI TR 102 035 V1.1.1 (2002-04)
8.1 C(P)SIG protocol profiles ................................................................................................................................25
8.2 Low-LEVEL profile definition.........................................................................................................................25
8.2.1 CA-descriptor for ECM streams .................................................................................................................25
8.2.1.1 Messages ...............................................................................................................................................25
8.2.1.2 Trigger transaction type (see TS 103 197 [6], clause 8.2.3)..................................................................26
8.2.1.3 Descriptor Insertion transaction type (see TS 103 197 [6], clause 8.2.5)..............................................26
8.2.2 CA-descriptor for EMM streams ................................................................................................................27
8.2.2.1 Messages ...............................................................................................................................................27
8.2.2.2 Trigger transaction type (see TS 103 197 [6], clause 8.2.3)..................................................................27
8.2.2.3 Descriptor Insertion transaction type (see TS 103 197 [6], clause 8.2.5)..............................................28
8.2.2.4 Flow PID Provisioning transaction type (see TS 103 197 [6], clause 8.2.7).........................................28
8.3 High-level profile definition.............................................................................................................................28
9 SIMF based protocols - Role of NMS....................................................................................................28
9.1 MIB use for monitoring only............................................................................................................................28
10 Error management ..................................................................................................................................29
10.1 Error processing in all connection-oriented protocols......................................................................................29
10.2 Specific inconsistencies in ECMG protocol.....................................................................................................29
10.3 Specific inconsistencies in EMMG protocol ....................................................................................................30
10.4 Specific inconsistencies in C(P)SIG protocol...................................................................................................30
11 Redundancy management.......................................................................................................................30
11.1 Uniqueness concept..........................................................................................................................................30
11.1.1 ECMG protocol ..........................................................................................................................................30
11.1.2 EMMG/PDG protocol.................................................................................................................................31
11.2 Basic redundancy scenarios..............................................................................................................................32
11.2.1 Definitions ..................................................................................................................................................32
11.2.2 ECMG ⇔ SCS ...........................................................................................................................................32
11.2.2.1 SCS redundancy ....................................................................................................................................32
11.2.2.2 ECMG redundancy................................................................................................................................32
11.2.3 EMMG ⇔ MUX ........................................................................................................................................32
11.2.3.1 EMMG redundancy...............................................................................................................................32
11.2.3.2 MUX redundancy..................................................................................................................................33
History ..............................................................................................................................................................35
ETSI
5. 5 ETSI TR 102 035 V1.1.1 (2002-04)
Intellectual Property Rights
IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (http://webapp.etsi.org/IPR/home.asp).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This Technical Report (TR) has been produced by Joint Technical Committee (JTC) of the European Broadcasting
Union (EBU), Comité Européen de Normalisation ELECtrotechnique (CENELEC) and the European
Telecommunications Standards Institute (ETSI).
NOTE: The EBU/ETSI JTC Broadcast was established in 1990 to co-ordinate the drafting of standards in the
specific field of broadcasting and related fields. Since 1995 the JTC Broadcast became a tripartite body
by including in the Memorandum of Understanding also CENELEC, which is responsible for the
standardization of radio and television receivers. The EBU is a professional association of broadcasting
organizations whose work includes the co-ordination of its members' activities in the technical, legal,
programme-making and programme-exchange domains. The EBU has active members in about 60
countries in the European broadcasting area; its headquarters is in Geneva.
European Broadcasting Union
CH-1218 GRAND SACONNEX (Geneva)
Switzerland
Tel: +41 22 717 21 11
Fax: +41 22 717 24 81
Founded in September 1993, the DVB Project is a market-led consortium of public and private sector organizations in
the television industry. Its aim is to establish the framework for the introduction of MPEG-2 based digital television
services. Now comprising over 200 organizations from more than 25 countries around the world, DVB fosters
market-led systems, which meet the real needs, and economic circumstances, of the consumer electronics and the
broadcast industry.
ETSI
6. 6 ETSI TR 102 035 V1.1.1 (2002-04)
Introduction
From now on, the DVB Simulcrypt standard is a broadly implemented specification. This situation is due in particular
to a significant property of the Simulcrypt solution, offering the option to use in the same head-end multiple CA
systems simultaneously with the same content.
Actually the standard proposes, first, the definition of a head-end architecture reference model identifying logically each
of its components. But above all, it specifies interoperable interfaces with those of these components supplied by the
CA systems.
Language
The word "shall" is used in a normative statement that can be verified and is mandatory. The word "should" is used in
the context of a recommendation or a statement that cannot be verified or is not mandatory (it can be optional).
1 Scope
The present document provides implementation guidelines for the use and implementation of the DVB Simulcrypt
standard.
It first tries to draw attention to the technical questions that need to be answered in setting up a DVB Simulcrypt head-
end. It also provides guidelines which are intended to be highly recommended rules and as such, aims to facilitate the
efficient and reliable implementation of the Simulcrypt model and of its interfaces.
The rules apply to broadcasters, network operators as well as manufacturers.
Clause 4 "Architecture" presents the DVB Simulcrypt Architecture Model as described in TS 103 197 [6].
Clause 5 "Compliance between version 1 and version 2 of the standard" explains how to support compliance between
both versions 1 and 2 of ECMG and EMMG/PDG protocols.
Clause 6 "ECMG SCS Protocol" fulfils the ECMG protocol description mainly by giving the state diagram.
Clause 7 "EMMG/PDG MUX protocol" fulfils the EMMG/PDG protocol description by giving the state diagram and
by clarifying the bandwidth concept, UDP behaviour and datagram packetization rules.
Clause 8 "C(P)SIG (P)SIG" describes profiles for adapting the C(P)SIG protocol implementation to real and simple
needs.
Clause 9 "SIMF based protocols - Role of NMS" allows for reducing the use of the MIB for monitoring only.
Clause 10 "Error management" clarifies error management in DVB Simulcrypt protocols.
Clause 11 "Redundancy management" sums up uniqueness aspects of protocol parameters and describes basic
redundancy policies for functions of the DVB Simulcrypt architecture model.
The present document uses the terminology defined in TS 103 197 [6] and should be read in conjunction with that
document.
ETSI
7. 7 ETSI TR 102 035 V1.1.1 (2002-04)
2 References
For the purposes of this Technical Report (TR) the following references apply:
[1] ISO/IEC 13818-1 (1994): "Information technology - Generic coding of moving pictures and
associated audio information: Systems".
[2] ETSI EN 300 468: "Digital Video Broadcasting (DVB); Specification for Service Information (SI)
in DVB systems".
[3] ETSI ETR 162: "Digital Video Broadcasting (DVB); Allocation of Service Information (SI) codes
for DVB systems".
[4] ETSI ETR 289: "Digital Video Broadcasting (DVB); Support for use of scrambling and
Conditional Access (CA) within digital broadcasting systems".
[5] ETSI TS 101 197: "Digital Video Broadcasting (DVB); DVB SimulCrypt: Head-end architecture
and synchronization".
[6] ETSI TS 103 197: "Digital Video Broadcasting (DVB); Head-end implementation of DVB
SimulCrypt".
3 Definitions and abbreviations
3.1 Definitions
For the purposes of the present document, the following terms and definitions apply:
broadcaster (service provider): organization which assembles a sequence of events or services to be delivered to the
viewer based upon a schedule
CA_system_id: uniquely and globally identifies a particular CA provider, as registered in table 3 'CA_system_ID' of
ETR 162
CA_subsystem_ID: Defined in TS 103 197 to handle multiple connections to ECMGs with the same CA_system_ID
value. The combination of CA_system_ID and CA_subsystem_ID is called Super_CAS_ID.
CA components: components brought by a CA provider for integration into a host head-end system
conditional access descriptor: used to signal either, one particular EMM stream, if found in the CAT, or one ECM
stream needed to descramble one or several elementary streams of a particular service if found in a PMT, for one
specific CA System identified by its CA_System_id.
NOTE: This CA descriptor can also contains private data whose format is proprietary to the CA System. The
syntax of the CA_descriptor is specified in ISO/IEC 13818-1.
channel: application specific representation of an open TCP connection, allowing the association of application specific
parameters with such a connection
NOTE: Channels correspond on a one to one basis to TCP connections.
client: software entity on a host making use of one or more resources offered by a server
Custom (P)SI Generator (C(P)SIG): Component responsible for generating private PSI descriptors and/or private SI
descriptors. It interfaces to the (P)SI Generator.
NOTE: The generic term C(P)SIG refers to a head-end process that serves as a CPSIG, a CSIG, or both
(CPSISIG).
Conditional Access (CA) system: system to control subscriber access to broadcast services and events
Control Word (CW): data object used for scrambling
ETSI
8. 8 ETSI TR 102 035 V1.1.1 (2002-04)
Control Word Generator (CWG): component receiving a CW request from the SCS and returning a CW
Crypto Period (CP): period when a particular Control Word is being used by the scrambler
Entitlement Control Message (ECM): Private Conditional Access information which carries the control word in a
secure manner and private entitlement information
Entitlement Control Message Generator (ECMG): ECM messages but does not support ECM repetition, as defined
in TS 103 197
Entitlement Management Message (EMM): Private Conditional Access information which, for example, specifies the
authorization levels of subscribers or groups of subscribers for services or events
Entitlement Management Message Generator (EMMG): produces the EMM messages and repeatedly plays them
out at the appropriate times
generator: component producing data
host: computer system uniquely identified by its IP address, and as such addressable in a computer network.
NOTE: It may take both client and server roles.
host head-end: system which is composed of those components required before a CA provider can be introduced into
the head-end
MPEG-2: Refers to ISO/IEC 13818-1.
NOTE: Systems coding is defined in part 1. Video coding is defined in part 2. Audio coding is defined in part 3.
multiplex: stream of all the digital data within a single physical channel carrying one or more services or events
MUltipleXer (MUX): the role of this head-end component is to perform time multiplexing of input data (AV streams,
CA data, private data…) and to output an MPEG-2 transport stream
Network Management System (NMS): component responsible for monitoring and control of SIMF agents
NOTE: The exact nature of this function depends on the type of host component the agent is situated in,
i.e. ECMG, EMMG, PDG, etc, and the type of management function the NMS component is performing,
i.e. fault, configuration, accounting, performance and security management.
Private Data Generator (PDG): component shown in the DVB-Simulcrypt System Architecture diagram to highlight
the fact that the EMMG to MUX interface can be used for EMMs but also for any other private data
reserved: when used in the clause defining the coded bit stream, indicates that the value may be used in the future for
ISO defined extensions
NOTE: Unless otherwise specified within the present document all "reserved" bits shall be set to "1".
reserved future use: when used in the clause defining the coded bit stream, indicates that the value may be used in the
future for ETSI defined extensions
NOTE: Unless otherwise specified within the present document all "reserved_future_use" bits shall be set to "1".
resource: set of coherent functions, accessible through a server
NOTE: More than one resource can reside on a single host.
simulcrypt (part 1): Refers to the DVB standard: "Head-end architecture and synchronization" TS 101 197-1.
simulcrypt (final): Refers to the DVB standard: "Head-end implementation of DVB SimulCrypt" TS 103 197.
SCRambler (SCR): component responsible for scrambling data in the MPEG2 Transport stream using the Control
Words received from the SCS
server: software entity exporting a resource
ETSI
9. 9 ETSI TR 102 035 V1.1.1 (2002-04)
NOTE: More than one server may reside on a single host. A server is uniquely identified by an IP address and
TCP port number.
service: sequence of events under the control of a broadcaster which can be broadcast as part of a schedule
Service Information (SI): information that is transmitted in the transport stream to aid navigation and event selection,
as defined in EN 300 468
(P)SI Generator ((P)SIG): component responsible for generating the PSI (ISO/IEC 13818-1) and/or the SI
(EN 300 468) for the system
NOTE: The generic term (P)SIG refers to a head-end process that serves as a PSI Generator (PSIG), an SI
Generator(SIG), or both PSI and SI Generator (PSISIG).
SimulCrypt Synchronizer (SCS): logical component that acquires Control Words, ECMs and synchronizes their
play-out for all the Conditional Access Systems connected
stream: independent bi-directional data flow across a channel
NOTE: Multiple streams may flow on a single channel. Stream_IDs (e.g. ECM_stream_ID,
Data_stream_ID, etc.) are used to tag messages belonging to a particular stream.
Super_CAS_id: 32-bit identifier formed by the concatenation of the CA_system_id and the CA_subsystem_id
(see TS 101 197-1 and TS 103 197)
Transport Stream: Data structure defined in ISO/IEC 13818-1.
NOTE: It is the basis of the ETSI Digital Video Broadcasting (DVB) standards.
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply:
AC Access Criteria
bslbf bit string, left bit first
C(P)SIG Custom PSI/SI Generator
CA Conditional Access
CAS Conditional Access System
CAT Conditional Access Table
CP Crypto Period
CW Control Word
CWG Control Word Generator
DVB Digital Video Broadcasting
EBU European Broadcasting Union
ECM Entitlement Control Message
ECMG Entitlement Control Message Generator
EIS Event Info Scheduler
EMM Entitlement Management Message
EMMG Entitlement Management Message Generator
IP Internet Protocol
ISO International Organization for Standardization
MIB Management Information Base
MPEG Moving Pictures Expert Group
Mux MUltipleX (multiplexer)
MUX MUltipleXer
NMS Network Management System
PD Private Data
PDG Private Data Generator
PID Packet IDentifier
PMT Program Map Table
(P)SI PSI and or SI
PSI Program Specific Information
SCR DVB compliant SCRambler
ETSI
10. 10 ETSI TR 102 035 V1.1.1 (2002-04)
SCS SimulCrypt Synchronizer
SI Service Information
SIG Service Information Generator
SIM Simulcrypt Identification Module
SIMF Simulcrypt Integrated Management Framework
SMS Short Message Service (GSM)
STB Set Top Box
TCP Transport Control Protocol
TS Transport Stream
UDP User Datagram Protocol
4 Architecture
The system architecture, in figure 1, shows the logical relationships between the components and which
component-to-component interfaces are defined by the DVB Simulcrypt standard. Other components exist in a
head-end which are not illustrated i.e. SMS.
SIMF EMMs
Agent EMMG
SIMF Private Data
Agent PDG
Mux Config
M
Scrambler
E Monitoring
&
Monitoring
& U
I
Control
NMS Control
X
S
SIMF
SIMF C(P)SI Agent (P)SI (P)SI
Agent C(P)SIG Data
Generator Tables
AC
ECMs Simulcrypt ECMs
SIMF Synchroniser
Agent ECMG CW
CW/AC Defined in this specification
C W Proprietary; not defined
EIS = Event Information Scheduler AC = Access Criteria
PDG = Private Data Generator EMMG = EMM Generator Simulcrypt CA components
C(P)SIG= Custom PSI/SI Generator
CWG = Control Word Generator
NMS = Network Mgmt System
ECMG = ECM Generator
CWG Host head-end components
SIMF = Simulcrypt Integrated Management Framework NMS
Figure 1: System architecture
The DVB-Simulcrypt system architecture illustrated above is divided into two areas:
• Host Head-end components: Those that will need to exist before Simulcrypt CA components can be introduced
into a DVB-Simulcrypt head-end;
• Simulcrypt CA components: Those typical components which are brought by a new CA provider to introduce
his CA into a DVB-Simulcrypt head-end. It must be noted that the EMMGs, PDGs and Custom SI generators are
not necessarily required in a DVB-Simulcrypt system.
• The description of the role of these different components can be found in TS 101 197 [5] and in TS 103 197 [6].
ETSI
11. 11 ETSI TR 102 035 V1.1.1 (2002-04)
5 Compliance between version 1 and version 2 of the
standard
Two standards define the head-end implementation of DVB Simulcrypt: Simulcrypt (Part 1) TS 101 197 [5] and
Simulcrypt (Final) TS 103 197 [6]. Both documents describe connection-oriented protocols.
According to the protocol_version parameter in each message:
• simulcrypt (Part 1) describes the ECMG protocol and the EMMG protocol in version 1 ("V1");
• simulcrypt (Final) describes the ECMG protocol, the EMMG protocol and the new C(P)SIG protocol in
version 2 ("V2").
There is no compliance issue in a C(P)SIG protocol implementation nor in a SIMF implementation because these
protocols are described only in the last standard Simulcrypt (final).
However, compliance issues can occur in a SCS/ECMG pair, or in a Mux/EMMG pair, according to their respective
protocol versions.
5.1 ECMG protocol
5.1.1 Differences between Version 1 and Version 2
There are four differences between version 1 and version 2 of the ECMG protocol:
• CW length (cf. CP_CW_combination parameter): in V1, CW are 8 byte long; in V2, the CW length is variable;
• ECM_id: this parameter does not exist in V1 and is mandatory in V2;
• CW_Encryption: this parameter does not exist in version 1 and is optional in V2;
• the ECMG protocol error values are not strictly the same; in (Part 1), the protocol error value table is erroneous
with two 0x000D codes; codes 0x000F, 0x0010 and 0x0011 in (Final) have different meanings as in (Part 1); in
(Final) additional error codes are given.
A V1-SCS cannot connect a V2-ECMG:
• the protocol_version parameter in message header is wrong in messages received by the V2-ECMG and in
messages received by the V1-SCS;
• for the V2-ECMG, the ECM_id parameter is missing;
• misunderstanding can occur for some error messages (0x000F to 0x0011) or the V2-ECMG can generate error
messages unknown by the V1-SCS (0x0011 to 0x0015).
A V2-SCS cannot connect a V1-ECMG:
• the protocol_version parameter in message header is wrong in messages received by the V1-ECMG and in
messages received by the V2-SCS;
• misunderstanding can occur for some error messages (0x000F to 0x0011) or the V2-SCS can generate error
messages unknown by the V1-ECMG (0x0011, 0x0012);
• the ECM_id parameter is ignored by the V1-ECMG but is missing in messages received by the V2-SCS;
• if the CW are encrypted by the V2-SCS, the V1-ECMG ignores the CW_Encryption parameter (as an unknown
parameter) but the V1-ECMG would process wrong values of CW (it could not decrypt them).
ETSI
12. 12 ETSI TR 102 035 V1.1.1 (2002-04)
5.1.2 Recommendation for ECMG protocol compliance
A V1 + V2 configuration in a SCS/ECMG pair shall be avoided because it cannot work.
A V1 + V1 configuration or a V2 + V2 configuration in a SCS/ECMG pair is recommended.
If the SCS is compliant with V1 and V2, the SCS connects the ECMG in V2 mode. If the ECMG is V1-compliant, the
following policy is recommended:
• such a V1-ECMG shall generate a V1 error message ("Unsupported protocol version");
• then the SCS disconnects, and connects again the ECMG in V1 mode.
If the ECMG is compliant with V1 and V2, whatever the version (1 or 2) of the SCS it is connected by, the following
policy is recommended:
• such a V1 and V2 compliant ECMG selects its current version according to the version detected in the
channel_setup message received from the SCS;
• this selection shall be performed for each channel, to allow a V1-SCS and a V2-SCS to connect the same
ECMG.
V1-SCS V2-SCS V1/V2-SCS
V1-ECMG OK SCS V1 Protocol version switch
by SCS if error on
V2-ECMG OK SCS V2
Channel_Setup
V1/V2-ECMG ECMG V1 ECMG V2 V1 or V2
Protocol version is detected by ECMG at
(same as )
Channel_Setup
Figure 2: version 1/version 2 ECMG compliance
5.2 EMMG/PDG protocol
5.2.1 Differences between Version 1 and Version 2
There are four differences between version 1 and version 2 of the EMMG/PDG protocol:
• Data_id: this parameter does not exist in V1 and is mandatory in V2;
• Data_provision message: in V2 the data_channel_id parameter and the data_stream_id parameter are optional,
according to the data part protocol TCP or UDP;
• Data_provision message are sent on the same TCP connection as other messages in V1; in V2 they can be sent
on a separate UDP link; moreover one UDP link can connect several Muxes in broadcast mode, but associated
with several TCP connections;
• the EMMG/PDG protocol error value list has been extended in [Final] (new codes 0x000E to 0x0014).
A V1-EMMG/PDG cannot connect a V2-Mux:
• the protocol_version parameter in message header is wrong in messages received by the V1-EMMG/PDG and in
messages received by the V2-Mux;
• for the V2-Mux, the Data_id parameter is missing;
• the V2-Mux can generate error messages unknown by the V1-EMMG/PDG (0x000E to 0x0014).
ETSI
13. 13 ETSI TR 102 035 V1.1.1 (2002-04)
A V2-EMMG/PDG cannot connect a V1-Mux:
• the protocol_version parameter in message header is wrong in messages received by the V2-EMMG/PDG and in
messages received by the V1-Mux;
• the Data_id parameter is ignored by the V1-Mux but is missing in messages received by the V2-EMMG/PDG;
• the V2-EMMG/PDG can generate error messages unknown by the V1-Mux (0x000E, 0x000F);
• if the V2-EMMG/PDG send them over an UDP link, EMM datagram cannot be caught by the V1-Mux.
5.2.2 Recommendation for EMMG/PDG protocol compliance
A V1 + V2 configuration in a EMMG/PDG/Mux pair shall be avoided because it cannot work.
A V1 + V1 configuration or a V2 + V2 configuration in a EMMG/PDG/Mux pair is recommended.
If the EMMG/PDG is compliant with V1 and V2, the EMMG/PDG connects the Mux in V2 mode. If the Mux is V1
compliant, the following policy is recommended:
• such a V1-Mux shall generate an V1 error message ("Unsupported protocol version");
• then the EMMG/PDG disconnects, and connects again the Mux in V1 mode.
If the Mux is compliant with V1 and V2, whatever is the version 1 or 2 of the EMMG/PDG it is connected by; the
following policy is recommended:
• such a V1 and V2 compliant Mux selects its current version according to the version detected in the
channel_setup message received from the EMMG/PDG;
• this selection shall be performed for each channel, to allow a V1-EMMG/PDG and a V2-EMMG/PDG to
connect the same Mux.
V1-EMMG/PDG V2-EMMG/PDG V1/V2-EMMG/PDG
V1-MUX OK EMMG/PDG V1 Protocol version
switch by EMMG/PDG
V2-MUX OK EMMG/PDG V2 if error on
Channel_Setup
V1/V2-MUX MUX V1 MUX V2 V1 or V2
Protocol version is detected by Mux at
(same as )
Channel_Setup
Figure 3: version 1/version 2 EMMG/PDG compliance
ETSI
14. 14 ETSI TR 102 035 V1.1.1 (2002-04)
6 ECMG (SCS Protocol)
6.1 State diagram
6.1.1 Channel state machine
This clause presents the channel state machine, which defines the sequence of channel-level messages that shall be used
to establish and maintain one channel on one TCP connection.
The channel state machine is found in figure 4. Each state found in this state machine is defined in clauses 6.1.1.1 to
6.1.1.4.
Channel channel_setup Channel
Not Open SCS ⇒ ECMG Setting
Up
channel_error
SCS ⇐ ECMG channel_status
channel_close
channel_close SCS ⇐ ECMG
SCS ⇒ ECMG
SCS ⇒ ECMG
Channel
Channel channel_error Open
in Error
SCS ⇐ ECMG Stream
channel_test Management
channel_error SCS ⇔ ECMG
SCS ⇔ ECMG
channel_status
SCS ⇔ ECMG
Figure 4 - ECMG SCS channel state machine
6.1.1.1 Channel Not Open
This state represents the initialization of the channel state machine. At this point, a TCP connection is assumed to be
established and the channel has either not been initialized, or has been closed.
The SCS initializes a channel by sending a channel_setup message to the ECMG on the other end of the channel.
Channel_setup is the only permissible message in the Channel Not Open state. Transmission and receipt of
channel_setup move the state machine to the Channel Setting Up state.
ETSI
15. 15 ETSI TR 102 035 V1.1.1 (2002-04)
6.1.1.2 Channel Setting Up
From this state, the ECMG shall respond with either a channel_status or a channel_error message.
The channel_status message acknowledges successful channel establishment, and that the channel is open. The ECMG
also indicates, via this message, several CAS specific parameters, particularly the maximum number of streams that can
be supported on the new channel. Transmission and receipt of channel_status move the state machine to the Channel
Open state.
The channel_error message acknowledges that the ECMG could not open the channel; one or more error codes explain
the failure. The channel shall be considered by the SCS and by the ECMG as not open. Transmission and receipt of
channel_error move the state machine to the Channel Not Open state.
6.1.1.3 Channel Open
This state represents the steady-state operation of the channel state machine. As long as the channel is open and
error-free, streams may be opened, used and closed, per the stream state machine defined in clause 3.1.2: the stream
state machine defines the stream-level and data-level messages that can be sent on a stream within the channel, per the
state of that stream.
Four kinds of channel-level messages can be sent while in Channel Open state:
• Either the SCS or the ECMG can send a channel_test message, in order to verify the error-free operation of the
channel. This does not change the state of the channel state machine.
• If the channel is in an error-free situation, the receiver of the channel_test message shall reply with a
channel_status message. This does not change the state of the channel state machine. Channel_status may be
sent only in response to channel_test.
• If the ECMG encounters an unrecoverable channel error at any other time, it shall send the SCS a channel_error
message. If the stream has unrecoverable errors, the receiver of the channel_test message shall reply with a
channel_error message. One or more error codes explain the failure. Transmission and receipt of
channel_error move the state machine to the Channel In Error state. Channel_error may be sent at any time
from the Channel Open state.
• If the SCS wants to close the channel for any reason, it shall send the ECMG a channel_close message. Receipt
of channel_close moves the state machine to the Channel Not Open state. Channel_close may be sent at any
time from the Channel Open state.
Channel_close also causes the immediate closure of all streams open in the channel.
6.1.1.4 Channel In Error
This temporary and short-lived state is used only to represent the fact that the ECMG has encountered and reported an
unrecoverable channel error. The SCS shall close the channel.
The SCS sends a channel_close message to the ECMG. Transmission and receipt of channel_close move the state
machine to the Channel Not Open state.
Channel_close also causes the immediate closure of all streams open in the channel.
6.1.2 Stream state machine
The head-end can establish one or more streams within a channel. This clause presents the stream state machine, which
defines the sequence of stream-level messages that shall be used to establish, maintain and use a single stream within a
channel.
Streams may be established in any order (within a given channel, or globally). In addition, a SCS needs not wait for the
establishment of one stream to be complete, before commencing the establishment of another stream. Such
considerations are out of the scope of the present document.
ETSI
16. 16 ETSI TR 102 035 V1.1.1 (2002-04)
The channel shall be in the Channel Open state (see clause 6.1.1.3) for a SCS to initiate a stream state machine. The
channel state machine, as defined in clause 6.1.1, continues to operate in Channel Open state during the operation of
the stream state machine. Accordingly, both ECMG and SCS processes shall properly handle any and all channel-level
messages valid in Channel Open state (these messages are not shown in the stream state machine).
Closure of a channel (Channel Not Open state) causes the immediate closure of all streams open in the channel (reset
of the stream state machine to Stream Not Open state).
The stream state machine is found in figure 5. Each state found in this state machine is defined in clauses 6.1.2.1 to
6.1.2.5.
Stream stream_setup Stream
Not Open SCS ⇒ ECMG Setting
Up
stream_status
SCS ⇐ ECMG
CW_provision
SCS ⇒ ECMG
stream_close_response
SCS ⇐ ECMG Stream
Open
ECM_response
Stream
SCS ⇐ ECMG Open
Stream stream_close_request
closing
SCS ⇒ ECMG
stream_close_request
SCS ⇒ ECMG stream_error
stream_test
SCS ⇐ ECMG
SCS ⇔ ECMG stream_error
Stream in SCS ⇐ ECMG
Error stream_status
stream_error
SCS ⇔ ECMG
SCS ⇔ ECMG
Figure 5: ECMG ⇔ SCS stream state machine
ETSI
17. 17 ETSI TR 102 035 V1.1.1 (2002-04)
6.1.2.1 Stream Not Open
This state represents the initialization of the stream state machine. At this point, the stream has either not been
initialized, or has been closed. The channel in which the stream is found shall be in the Channel Open state in order to
proceed.
The SCS initializes a stream by sending a stream_setup message to the ECMG on the other end of the stream.
Stream_setup is the only permissible message in the Stream Not Open state. Transmission and receipt of
stream_setup move the state machine to the Stream Setting Up state.
6.1.2.2 Stream Setting Up
From this temporary and short-lived state, the ECMG shall respond with either a stream_status or a stream_error
message.
The stream_status message acknowledges successful stream establishment, and that the stream is open. Transmission
and receipt of stream_status move the state machine to the Stream Open state.
The stream_error message acknowledges that the ECMG could not open the stream, and that the stream shall be
closed by the SCS. One or more error codes explain the failure. Transmission and receipt of stream_error move the
state machine to the Stream In Error state.
6.1.2.3 Stream Open
The stream is open and operational. Five kinds of stream-level messages can be sent while in Stream Open state:
• The SCS sends a CW_provision message to request the ECMG an ECM. This message carries control word(s),
access criteria and cryptoperiod numbers. The ECMG shall respond to each CW_provision message with an
ECM_response message.
• If the SCS wants to close the stream for any reason, it sends a stream_close_request message. Transmission and
receipt of stream_close_request move the state machine to the Stream Closing state. Stream_close_request
may be sent at any time from this state.
• Either the SCS or the ECMG can send a stream_test message, in order to verify the error-free operation of the
stream. This does not change the state of the stream state machine. Stream_test may be sent at any time from
this state.
• If the stream is in an error-free situation, the receiver of the stream_test message shall reply with a
stream_status message. This does not change the state of the stream state machine. Stream_status may be sent
only in response to stream_test.
• If the stream has unrecoverable errors, the receiver of the stream_test message shall reply with a stream_error
message. One or more error codes explain the failure. Transmission and receipt of stream_error move the state
machine to the Stream In Error state
6.1.2.4 Stream In Error
This temporary and short-lived state is used only to represent the fact that the SCS or the ECMG has encountered and
reported an unrecoverable stream error.
The SCS sends a stream_close_request message to the ECMG. Transmission and receipt of stream_close_request
move the state machine to the Stream Closing state.
ETSI
18. 18 ETSI TR 102 035 V1.1.1 (2002-04)
6.1.2.5 Stream Closing
This temporary and short-lived state is used only to represent the fact that the SCS has requested closure of the stream.
The ECMG sends a stream_close_response message to the SCS, to confirm closure of the stream. Transmission and
receipt of stream_close_response move the state machine to the Stream Not Open state.
The normal and recommended stream closing procedure is the one defined in this clause. However if the ECMG closes
the TCP connection, the error management described in clause 10.1 "TCP connection closure by the server" has to be
applied.
6.1.3 Summary of messages permissible in each state
Table 1 provides a listing of the channel-level and stream-level messages that may be generated in each of the states of
both state machines.
Table 1: message/state cross-reference for the SCS ⇔ ECMG state machines
Channel states Stream states (if Channel Open)
Not open Setting Open In error Not open Setting Open Closing In error
Messages
up up
channel_setup X
channel_status X X X X X X
channel_test X X X X X X
channel_close X X X X X X X
channel_error X X X X X X X
stream_setup X
stream_status X X
stream_test X
stream_close_request X X
stream_close_response X
stream_error X X
CW_provision X
ECM_response X
6.2 Network delay
In any head-end architecture there is the option of connecting CA systems to scramblers at remote sites over a wide area
network. In this situation, in order to be more meaningful to the remote scramblers, the max_comp_time parameter
should take network delay into consideration in addition to the time required to compute the ECM. That is, this
parameter should be configured on the CA system to be the sum of the actual time required to compute an ECM plus
the worst case network delay expected.
ETSI
19. 19 ETSI TR 102 035 V1.1.1 (2002-04)
7 EMMG/PDG(MUX protocol)
7.1 State diagram
7.1.1 Channel state machine
This clause presents the channel state machine, which defines the sequence of channel-level messages that shall be used
to establish and maintain one channel on one TCP connection.
The channel state machine is found in figure 6. Each state found in this state machine is defined in clauses 7.1.1.1 to
7.1.1.4.
Channel channel_setup Channel
Not Open EMMG ⇒ MUX Setting
Up
channel_error
EMMG ⇐ MUX channel_status
channel_close
channel_close EMMG ⇐ MUX
EMMG ⇒ MUX
EMMG ⇒ MUX
Channel
Channel channel_error Open
in Error
EMMG ⇐ MUX Stream
channel_test Management
channel_error EMMG ⇔ MUX
EMMG ⇔ MUX
channel_status
EMMG ⇔ MUX
Figure 6: EMMG MUX channel state machine
7.1.1.1 Channel Not Open
This state represents the initialization of the channel state machine. At this point, a TCP connection is assumed to be
established and the channel has either not been initialized, or has been closed.
The EMMG initializes a channel by sending a channel_setup message to the MUX on the other end of the channel.
Channel_setup is the only permissible message in the Channel Not Open state. Transmission and receipt of
channel_setup move the state machine to the Channel Setting Up state.
7.1.1.2 Channel Setting Up
From this state, the MUX shall respond with either a channel_status or a channel_error message.
The channel_status message acknowledges successful channel establishment, and that the channel is open.
Transmission and receipt of channel_status move the state machine to the Channel Open state.
The channel_error message acknowledges that the MUX could not open the channel; one or more error codes explain
the failure. The channel shall be considered by the EMMG and by the MUX as not open. Transmission and receipt of
channel_error move the state machine to the Channel Not Open state.
ETSI
20. 20 ETSI TR 102 035 V1.1.1 (2002-04)
7.1.1.3 Channel Open
This state represents the steady-state operation of the channel state machine. As long as the channel is open and
error-free, streams may be opened, used and closed, per the stream state machine defined in clause 7.1.2: the stream
state machine defines the stream-level and data-level messages that can be sent on a stream within the channel, per the
state of that stream.
Four kinds of channel-level messages can be sent while in Channel Open state:
• Either the EMMG or the MUX can send a channel_test message, in order to verify the error-free operation of
the channel. This does not change the state of the channel state machine.
• If the channel is in an error-free situation, the receiver of the channel_test message shall reply with a
channel_status message. This does not change the state of the channel state machine. Channel_status may be
sent only in response to channel_test.
• If the MUX encounters an unrecoverable channel error at any other time, it shall send the EMMG a
channel_error message. If the stream has unrecoverable errors, the receiver of the channel_test message shall
reply with a channel_error message. One or more error codes explain the failure. Transmission and receipt of
channel_error move the state machine to the Channel In Error state. Channel_error may be sent at any time
from the Channel Open state.
• If the EMMG wants to close the channel for any reason, it shall send the MUX a channel_close message.
Receipt of channel_close moves the state machine to the Channel Not Open state. Channel_close may be sent
at any time from the Channel Open state.
Channel_close also causes the immediate closure of all streams open in the channel.
7.1.1.4 Channel In Error
This temporary and short-lived state is used only to represent the fact that the MUX has encountered and reported an
unrecoverable channel error. The EMMG shall close the channel.
The EMMG sends a channel_close message to the MUX. Transmission and receipt of channel_close move the state
machine to the Channel Not Open state.
Channel_close also causes the immediate closure of all streams open in the channel.
7.1.2 Stream state machine
The head-end can establish one or more streams within a channel. This clause presents the stream state machine, which
defines the sequence of stream-level messages that shall be used to establish, maintain and use a single stream within a
channel.
Streams may be established in any order (within a given channel, or globally). In addition, a EMMG needs not wait for
the establishment of one stream to be complete, before commencing the establishment of another stream. Such
considerations are out of the scope of the present document.
The channel shall be in the Channel Open state (see clause 7.1.1.3) for a EMMG to initiate a stream state machine. The
channel state machine, as defined in clause 7.1.1, continues to operate in Channel Open state during the operation of
the stream state machine. Accordingly, both MUX and EMMG processes shall properly handle any and all
channel-level messages valid in Channel Open state (these messages are not shown in the stream state machine).
Closure of a channel (Channel Not Open state) causes the immediate closure of all streams open in the channel (reset
of the stream state machine to Stream Not Open state).
ETSI
21. 21 ETSI TR 102 035 V1.1.1 (2002-04)
The stream state machine is found in figure 7. Each state found in this state machine is defined in clauses 7.1.2.1 to
7.1.2.5.
Stream stream_setup Stream
Not Open EMMG ⇒ MUX Setting
Up
stream_status
⇐
Data_provision
EMMG MUX
⇒
(TCP or UDP)
stream_close_response
EMMG ⇐ MUX Stream_BW_Request
Stream
EMMG MUX⇒ Open
Stream
Stream_BW_Allocation Open
EMMG ⇐ MUX
Stream_BW_Allocation
EMMG ⇐ MUX
Stream
closing
stream_close_request
EMMG ⇒ MUX
stream_close_request
stream_error
EMMG ⇒ MUX
EMMG ⇐ MUX stream_test
EMMG ⇔ MUX stream_error
Stream in EMMG ⇐ MUX
Error stream_status
stream_error
EMMG ⇔ MUX
EMMG ⇔ MUX
Figure 7: EMMG ⇔ MUX stream state machine
7.1.2.1 Stream Not Open
This state represents the initialization of the stream state machine. At this point, the stream has either not been
initialized, or has been closed. The channel in which the stream is found shall be in the Channel Open state in order to
proceed.
The EMMG initializes a stream by sending a stream_setup message to the MUX on the other end of the stream.
Stream_setup is the only permissible message in the Stream Not Open state. Transmission and receipt of
stream_setup move the state machine to the Stream Setting Up state.
ETSI
22. 22 ETSI TR 102 035 V1.1.1 (2002-04)
7.1.2.2 Stream Setting Up
From this temporary and short-lived state, the MUX shall respond with either a stream_status or a stream_error
message.
The stream_status message acknowledges successful stream establishment, and that the stream is open. Transmission
and receipt of stream_status move the state machine to the Stream Open state.
The stream_error message acknowledges that the MUX could not open the stream, and that the stream shall be closed
by the EMMG. One or more error codes explain the failure. Transmission and receipt of stream_error move the state
machine to the Stream In Error state.
7.1.2.3 Stream Open
The stream is open and operational. Seven kinds of stream-level messages can be sent while in Stream Open state:
• The EMMG sends a data_provision message to the MUX. This message is not acknowledged by the MUX.
This message can be sent in the current stream on the same TCP connection or over an UDP link.
• The EMMG may send a stream_BW_request message to the MUX, in order to be allocated a bandwidth in
transport stream for the EMMs. In this message the EMMG gives the requested bandwidth. The MUX shall
respond to each stream_BW_request message with a stream_BW_allocation message in which the allocated
bandwidth is given. This does not change the state of the stream state machine. Stream_BW_request may be
sent at any time from this state.
• The MUX may send a stream_BW_allocation message to the EMMG, in order to allocate a bandwidth to the
EMMG. In this message the MUX gives the allocated bandwidth. This message is not acknowledged by the
EMMG. Stream_BW_allocation may be sent at any time from this state or as response to a
stream_BW_request message. This does not change the state of the stream state machine.
• If the EMMG wants to close the stream for any reason, it sends a stream_close_request message. Transmission
and receipt of stream_close_request move the state machine to the Stream Closing state.
Stream_close_request may be sent at any time from this state.
• Either the EMMG or the MUX can send a stream_test message, in order to verify the error-free operation of the
stream. This does not change the state of the stream state machine. Stream_test may be sent at any time from
this state.
• If the stream is in an error-free situation, the receiver of the stream_test message shall reply with a
stream_status message. This does not change the state of the stream state machine. Stream_status may be sent
only in response to stream_test.
• If the stream has unrecoverable errors, the receiver of the stream_test message shall reply with a stream_error
message. One or more error codes explain the failure. Transmission and receipt of stream_error move the state
machine to the Stream In Error state
7.1.2.4 Stream In Error
This temporary and short-lived state is used only to represent the fact that the EMMG or the MUX has encountered and
reported an unrecoverable stream error.
The EMMG sends a stream_close_request message to the MUX. Transmission and receipt of stream_close_request
move the state machine to the Stream Closing state.
ETSI
23. 23 ETSI TR 102 035 V1.1.1 (2002-04)
7.1.2.5 Stream Closing
This temporary and short-lived state is used only to represent the fact that the EMMG has requested closure of the
stream.
The MUX sends a stream_close_response message to the EMMG, to confirm closure of the stream. Transmission and
receipt of stream_close_response move the state machine to the Stream Not Open state.
The normal and recommended stream closing procedure is the one defined in this clause. However if the MUX closes
the TCP connection, the error management described in clause 10.1 "TCP connection closure by the server" has to be
applied.
7.1.3 Summary of messages permissible in each state
Table 2 provides a listing of the channel-level and stream-level messages that may be generated in each of the states of
both state machines.
Table 2: message/state cross-reference for the EMMG ⇔ MUX state machines
Channel states Stream states (if Channel Open)
Not open Setting Open In error Not open Setting Open Closing In error
Messages
up up
channel_setup X
channel_status X X X X X X
channel_test X X X X X X
channel_close X X X X X X X
channel_error X X X X X X X
stream_setup X
stream_status X X
stream_test X
stream_close_request X X
stream_close_response X
stream_error X X
stream_BW_request X
stream_BW_allocation X
data _provision X
7.2 Datagram insertion timing
7.2.1 Bandwidth definition
The EMMG/PDG protocol includes a bandwidth negotiation mechanism between the CAS and the head-end
(see TS 103 197 [6], clause 6.2.1.4). According to this mechanism, on CAS request or on its own initiative, the head-
end allocates the bandwidth. The bandwidth parameter is given in kbit/s (see TS 103 197 [6], clause 6.2.2).
Whatever the datagram format is (TS packet or section), the bandwidth parameter in the EMMG/PDG protocol is the
bandwidth occupied in the transport stream by EMM/Private Data datagrams, considering 188 byte TS packets
(i.e. including header, = 1 504 bits per packet).
The EMMG/PDG protocol bandwidth is evaluated in a X second window applied to the transport stream. The origin of
these "bandwidth windows" is arbitrary. The window length X shall be proposed by the Mux vendor and agreed by
CAS vendor.
X seconds Time
The exceeded bandwidth error is generated according to a sliding average over some bandwidth windows.
ETSI
24. 24 ETSI TR 102 035 V1.1.1 (2002-04)
7.2.2 EMM/Private Data datagram insertion
When it receives a data_provision message the Mux shall insert the datagrams in the TS according to the following
rules:
• For the same stream datagrams shall be inserted in TS in the order of their arrival at the Mux.
• Processing of content datagrams in the Mux can introduce a constant delay between their arrival at the Mux and
their insertion into the TS. This constant delay should be lower than 250 ms.
• For the same stream, by referring to the relative time position of datagrams at the input of the Mux, the jitter
generated by the Mux in TS shall be lower than 5 ms.
These rules are depicted in figure 8.
< 5 ms
TS
constant delay
MUX
EMMG / PDG
Figure 8: Timing of datagram insertion into TS
7.3 UDP provision without TCP control layer
According to TS 103 197 [6], when EMMG/PDG datagram provision is performed over UDP, the TCP control layer is
mandatory between each MUX and the EMMG/PDG.
In particular, a MUX is not allowed to process any datagrams received when a valid TCP control layer connection was
not previously established with the EMMG/PDG whose client_id is given in these datagrams.
However if one or several TCP control links are broken or missing the EMMG/PDG shall continue to send data as long
as there is at least one valid control path. In the same time the EMMG/PDG can try to re-establish the broken TCP
control link(s), possibly in applying specific procedure of Mux redundancy.
7.4 Datagram packetization
Datagram packetization shall comply with packetization rules defined in relevant MPEG2 and DVB standards.
When multiple EMM/PD sections are sent by the EMMG/PDG in a single data_provision message (i.e. in section
format) the MUX shall use as many TS packets and shall pack as many sections into each TS packet as possible.
If a CAS needs particular section packetization rules, for STB constraints compliance, the EMMG/PDG shall perform
the section packetization prior to providing the MUX with datagrams in TS packet format.
The use of a proprietary protocol between the EMMG/PDG and the MUX for defining section packetization rules does
not comply with TS 103 197 [6].
ETSI
25. 25 ETSI TR 102 035 V1.1.1 (2002-04)
8 C(P)SIG (P)SIG
8.1 C(P)SIG protocol profiles
The C(P)SIG protocol allows a CAS for providing descriptors to a head-end. The CAS is responsible for deciding
whether a descriptor has to be inserted or deleted, for defining what this descriptor is, for indicating where and when
this descriptor has to be inserted. The head-end is responsible for inserting the descriptor in PSI or SI tables, for
providing the CAS with (P)SI table contents and for warning the CAS about events occurring in services, in ECM
streams or in EMM/PD streams.
Any CAS-related descriptor (CA-descriptors or private descriptors) can be provided by the CAS to the head-end and
any PSI or SI table can be addressed as target of descriptor insertion. To allow this the C(P)SIG protocol combines five
transaction types between head-end and CAS: trigger, (P)SI table provisioning, service change, flow PID provisioning,
custom (P)SI descriptor insert.
To make easier the implementation of the C(P)SIG protocol, some profiles are defined allowing a CAS and a head-end
for using a subset of C(P)SIG protocol features:
• low-level profile: CA-descriptors in PMT and in CAT;
• high-level profile: all C(P)SIG protocol features.
8.2 Low-LEVEL profile definition
In this low-level profile:
• only CA_descriptors for ECM in PMT and for EMM in CAT are addressed by a CAS and by a head-end;
• only the connection-oriented protocol is supported;
• only CPSIG and PSIG functional boxes are implemented.
8.2.1 CA-descriptor for ECM streams
In the low-level profile two transaction types are used:
• trigger transaction type: the CAS is warned about the existence of ECM streams, about access condition change
and about PID change (ECM setup, ECM closure, AC Change, PID Change);
• descriptor Insertion transaction type: the CAS provides the head-end with CA-descriptors for PMT.
8.2.1.1 Messages
The following messages in TS 103 197 [6], clause 8.3 are not used:
• table_request, table_response for Table Provisioning transaction type (see TS 103 197 [6], clause 8.2.4);
• stream_service_change for Service Change transaction type (see TS 103 197 [6], clause 8.2.6);
• PID_provision_request, PID_provision_response for PID Provisioning transaction type (see TS 103 197 [6],
clause 8.2.7).
ETSI
26. 26 ETSI TR 102 035 V1.1.1 (2002-04)
8.2.1.2 Trigger transaction type (see TS 103 197 [6], clause 8.2.3)
ECM stream setup, ECM stream closure, flow PID change, access criteria change triggers are used, corresponding to
the following values of trigger types:
From Table 30 of TS 103 197 [6]: Trigger types
trigger cause trigger_list bit # trigger type
ECM stream set up 2 0x00000004
access criteria change 3 0x00000008
ECM stream closure 4 0x00000010
flow PID change 5 0x00000020
combination of any previous 3 and 5 0x00000028
In trigger message (see TS 103 197 [6], clause 8.3.4.11), the parameter table becomes:
Parameter Number of Number of
instances in instances in
message message
ECM related event PID change
(all cases)
transaction_id 1 1
custom_channel_id 1 1
custom_stream_id 1 1
service_id 1 1
trigger_id 1 1
trigger_type 1 1
ECM_related_data 1 0
flow_PID_change_related_data 0 1
The head-end shall triggers the CPSIG:
• for ECM setup: each time a stream is opened on the ECMG protocol;
• for ECM closure: each time a stream is closed on the ECMG protocol;
• for ECM setup: for each already active ECM stream when it connects the C(P)SIG.
8.2.1.3 Descriptor Insertion transaction type (see TS 103 197 [6], clause 8.2.5)
The descriptor Insertion transaction type is limited as follows:
• only PMT 1st loop and PMT 2nd loop are addressed: in table 32 of TS 103 197 [6] only location_id values 0x02
and 0x03 are used;
• only CA_Descriptors are provided/inserted (no private_data_specifier parameter in TS 103 197 [6],
clause 8.3.4.14);
• both values of CA_descriptor_insertion_mode are allowed (see TS 103 197 [6], clause 8.3.3.2);
• both insertion delay type (immediate and synchronized) are allowed (see TS 103 197 [6], clause 8.3.4.14).
ETSI
27. 27 ETSI TR 102 035 V1.1.1 (2002-04)
In descriptor_insert_request message (see TS 103 197 [6], clause 8.3.4.14), the parameter table becomes:
Parameter Number of instances in message
transaction_id 1
custom_channel_id 1
custom_stream_id 1
trigger_id 0 or 1
insertion_delay_type 1
insertion_delay 0 or 1
location_id 1 (= 0x02 or 0x03)
service_id 1 (see table 32)
ES_id 0 or 1 (see table 32)
descriptor 0 to n
8.2.2 CA-descriptor for EMM streams
In the low-level profile three transaction types are used:
• trigger transaction type: the CAS is warned about PID change;
• flow PID Provisioning transaction type: the CAS requests for the PID allocated to an EMM flow;
• descriptor Insertion transaction type: the CAS provides the head-end with CA-descriptors for CAT.
8.2.2.1 Messages
In TS 103 197 [6], clause 8.3 the following messages are not used:
• table_request, table_response for Table Provisioning transaction type (see TS 103 197 [6], clause 8.2.4);
• stream_service_change for Service Change transaction type (see TS 103 197 [6], clause 8.2.6).
8.2.2.2 Trigger transaction type (see TS 103 197 [6], clause 8.2.3)
Only flow PID change trigger is used. Accordingly only the following value of trigger type is used:
From Table 30 of TS 103 197 [6]: Trigger types
trigger cause trigger_list bit # trigger type
flow PID change 5 0x00000020
In trigger message (see TS 103 197 [6], clause 8.3.4.11), the parameter table becomes:
Parameter Number of
instances in
message
PID change
transaction_id 1
custom_channel_id 1
custom_stream_id 1
trigger_id 1
trigger_type 1
flow_PID_change_related_data 1
ETSI
28. 28 ETSI TR 102 035 V1.1.1 (2002-04)
8.2.2.3 Descriptor Insertion transaction type (see TS 103 197 [6], clause 8.2.5)
The descriptor Insertion transaction type is limited as follows:
• only CAT is addressed: in table 32 of TS 103 197 [6] only location_id value 0x01 is used;
• only CA_Descriptors are provided/inserted (no private_data_specifier parameter in TS 103 197 [6],
clause 8.3.4.14);
• both values of CA_descriptor_insertion_mode are allowed (see TS 103 197 [6], clause 8.3.3.2);
• both insertion delay type (immediate and synchronized) are allowed (see TS 103 197 [6], clause 8.3.4.14).
In descriptor_insert_request message (see TS 103 197 [6], clause 8.3.4.14), the parameter table becomes:
Parameter Number of instances in message
transaction_id 1
custom_channel_id 1
custom_stream_id 1
trigger_id 0 or 1
insertion_delay_type 1
insertion_delay 0 or 1
location_id 1 (= 0x01 for CAT)
descriptor 0 to n
8.2.2.4 Flow PID Provisioning transaction type (see TS 103 197 [6], clause 8.2.7)
The flow_type shall be 0x00 for EMM (see TS 103 197 [6], clauses 8.3.4.16 and 8.3.4.17).
8.3 High-level profile definition
In this high-level profile, all features of the C(P)SIG protocol as described in the specification TS 103 197[6] are
available.
9 SIMF based protocols - Role of NMS
9.1 MIB use for monitoring only
The SIM module (see TS 103 197 [6], clause 7.3) is defined to allow a NMS for configuring and monitoring a CAS
device considering the Simulcrypt specific parameters.
One can meet real operational cases where a CAS device (ECMG, EMMG, CPSIG) is directly configured by the CAS
provider independently from any NMS, but where the current status of the CAS device is wanted to be displayed by
NMS.
According to TS 103 197 [6], clause 7.3, all access rights in SIM can be further restricted by individual MIB views if so
desired in particular implementations.
In particular, a CAS device may restrict access to all its parameters to read-only mode, for allowing the NMS to access
only to the current status of the CAS device.
ETSI
29. 29 ETSI TR 102 035 V1.1.1 (2002-04)
10 Error management
10.1 Error processing in all connection-oriented protocols
Some error processing are described in TS 103 197 [6], the others are recommended below.
Error case Condition Processing
"unknown command" A message_type value is not defined in the "Unknown message types shall be ignored
See message_type protocol. by the receiving entity".
definition in A message_type value use does not comply
TS 103 197 [6], with the state diagram of the protocol.
clause 4.4.1
"unknown parameter" A parameter_type value is not defined in the "The data associated with that parameter
See parameter_type protocol. is discarded and the remaining message
definition in F.i.: parameter 0x000F in ECMG protocol. is processed".
TS 103 197 [6], A parameter_type value does not comply with
clause 4.4.1 the current protocol version.
F.i.: ECM_id in V1-ECMG protocol.
A parameter_type value use does not comply
with the message.
"inconsistencies" A parameter value, which should remain fixed Recommended: The receiving entity
during the current protocol phase, has changed. sends an error message and the client
Particularly: (SCS, EMMG, (P)SIG) closes the channel
The protocol_version has changed after and the connection.
channel_setup. Other behaviour: The receiving entity
The channel_id value is not the same as the sends an error message and processes
one in channel_setup on the current TCP the message with the previous value of
connection (except in channel_setup message). the concerned parameter.
The stream_id value in a message is unknown To be avoided: The receiving entity
on the current channel (except in stream_setup ignores the value change and processes
message). the message with the new value of the
This condition is also applicable to parameters concerned parameter.
specific to each protocol (see clause 10.2, 10.3
and 10.4).
"unknown channel_id A channel_id value is not known by the Recommended: the receiving entity sends
value" receiving entity (except in a channel_setup an error message on the received
message). channel_id.
Other behaviour: the message is ignored.
"TCP connection closure The server closes the TCP connection. The client closes the TCP connection on
by the server" its side and considers that all current
channels and streams are closed. Then
the client shall connect again the server or
its backup.
"missing mandatory DVB A mandatory DVB parameter is missing in a The message is rejected by the receiver
parameter" message sent by a server or by a client. and the receiver sends an error message.
10.2 Specific inconsistencies in ECMG protocol
ECM_id parameter value in a stream_status message is different from the one given in the stream_setup message for
the same stream_id (V2 only).
In a channel_status message the parameter values relative to the ECMG are not the same as those given by the ECMG
in the channel_status message as response to the channel_setup message: section_TSPkt_flag, delay_start, delay_stop,
AC_delay_start, AC_delay_stop, transition_delay_start, transition_delay_stop, ECM_rep_period, max_streams,
min_CP_duration, lead_CW, CW_per_msg, max_comp_time.
In a stream_status message the access_criteria_transfer_mode parameter value is not the same as the one given by the
ECMG in the stream_status message as response to the stream_setup message.
The value of CP_number parameter in a ECM_response message is not the same as the one in the associated
CW_provision message.
ETSI