ImageVerifierCode 换一换
格式:PDF , 页数:176 ,大小:1.24MB ,
资源ID:735467      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-735467.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TR 101 790-2009 Digital Video Broadcasting (DVB) Interaction channel for Satellite Distribution Systems Guidelines for the use of EN 301 790 (V1 4 1)《数字视频广播(DVB) 卫星分布系统的交互信道 E.pdf)为本站会员(registerpick115)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TR 101 790-2009 Digital Video Broadcasting (DVB) Interaction channel for Satellite Distribution Systems Guidelines for the use of EN 301 790 (V1 4 1)《数字视频广播(DVB) 卫星分布系统的交互信道 E.pdf

1、 ETSI TR 101 790 V1.4.1 (2009-07)Technical Report Digital Video Broadcasting (DVB);Interaction channel for Satellite Distribution Systems;Guidelines for the use of EN 301 790European Broadcasting Union Union Europenne de Radio-Tlvision EBUUER ETSI ETSI TR 101 790 V1.4.1 (2009-07) 2 Reference RTR/JTC

2、-DVB-239 Keywords broadcast, digital, DVB, satellite, TV ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Importa

3、nt notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the P

4、ortable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Informa

5、tion on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part

6、 may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2009. European Broadcasting Union 2009. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM, TIPHONTM, the TIPH

7、ON logo and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. LTE is a Trade Mark of ETSI currently being registered for the benefit of its Members and of

8、the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 101 790 V1.4.1 (2009-07) 3 Contents Intellectual Property Rights9 Foreword.10 Introduction 10 1 Scope 12 2 References 12 2.1 Normative references .13 2.2 Informative refer

9、ences13 3 Definitions, symbols and abbreviations .16 3.1 Definitions16 3.2 Symbols17 3.3 Abbreviations .17 4 Reference models .20 4.1 Architecture with co-located NCC, Gateway and Feeder.20 4.2 Architecture with multiple feeders .21 4.3 Architecture with transparent mesh connectivity .21 4.4 Archite

10、cture with regenerative satellites 22 4.4.1 On board switching requirements .25 4.4.2 RSMS Network Architecture25 5 Forward link .26 5.1 Assignment and selection of FL elementary streams .27 5.2 Specific use of FL tables and formats 28 5.2.1 FL service specification in PMT.28 5.2.1 Optional use of S

11、DT .28 5.2.2 Assumptions concerning IP encapsulation .28 5.3 Applicability of SI Tables in RSMS systems .29 6 Return link29 6.1 RCST synchronization .29 6.1.1 RCST internal delay compensation 30 6.1.2 NCR interpretation for DVB-S2 .30 6.1.3 DVB-S2 TX implementation aspects31 6.1.4 DVB-S2 RX implemen

12、tation aspects .32 6.1.5 VCM/ACM aspects and Multiple TS aspects.32 6.1.6 Combining TS and GS32 6.2 Burst format33 6.2.1 Contention access .33 6.2.2 Acquisition Bursts 33 6.2.3 Determination of the implicit number of MPEG2 packets in a burst33 6.2.4 Application of MPE in the return link 34 6.3 Rando

13、mization for energy dispersal.34 6.4 Coding 34 6.4.1 CRC error detection code .34 6.4.1.1 CRC coding example 34 6.4.2 Reed Solomon outer coding35 6.4.3 Convolutional inner coding 35 6.4.4 Turbo code35 6.4.4.1 General principles of coding and decoding.35 6.4.4.2 Puncturing examples for DVB-RCS Turbo

14、Code .37 6.4.4.3 Implementation trade-offs.40 6.4.4.4 Implementation feasibility 41 6.4.5 Preferred coding combinations .41 6.4.5.1 Concatenated coding scheme 41 6.4.5.2 Turbo coded systems.42 ETSI ETSI TR 101 790 V1.4.1 (2009-07) 4 6.5 Modulation .42 6.5.1 BURST-TO-BURST interference control 43 6.5

15、.2 Control of EIRP, OBO and interference to adjacent channels43 6.6 MAC messages.44 6.6.1 Methods based on the Satellite Access Control (SAC) field 44 6.6.1.1 SAC field composition44 6.6.2 Data Unit Labelling Method (DULM)45 6.7 Multiple access.45 6.7.1 Example for segmentation of return link capaci

16、ty 46 6.7.1.1 ATM traffic time slots.46 6.7.1.2 Optional MPEG traffic time slots47 6.8 Capacity categories.49 6.8.1 Request Classes and DS Behaviour Aggregates .49 6.8.2 Request Classes and Capacity Categories.50 6.8.3 Request Classes and Admission Control 51 6.8.4 Guidelines for the Capacity Catego

17、ries 51 6.8.4.1 Continuous Rate Assignment51 6.8.4.2 Rate-Based Dynamic Capacity51 6.8.4.3 Volume-Based Dynamic Capacity52 6.8.4.4 Absolute Volume Based Dynamic Capacity .52 6.9 Queuing and packet dispatching strategy .53 6.9.1 Guidelines for DS-compliant queueing and dispatching.53 6.9.2 A two-stag

18、e traffic queueing DS architecture.53 6.10 Guidelines for the requesting strategy55 6.10.1 BoD queue synchronization method.55 6.11 Assignment/allocation56 6.12 Procedure for contention resolution .56 7 Synchronization procedures .56 7.1 Overall events sequencing56 7.2 Initial synchronization proced

19、ure .56 7.3 Logon procedure 56 7.3.1 Multiple correction message descriptors in TIM 57 7.4 Coarse synchronization procedure (optional).57 7.5 Fine synchronization procedure (optional).58 7.6 Synchronization maintenance procedure58 7.7 Logoff procedure58 8 Control and management58 8.1 Protocol stack

20、.58 8.1.1 Transparent system .58 8.1.2 Regenerative system .58 8.2 RCST addressing58 8.3 Forward link signalling 59 8.3.1 Repetition rates .60 8.3.2 DVB RCS SI table updates.60 8.3.3 Logon response TIM.61 8.3.4 Multicast Mapping Table61 8.3.4.1 MMT for MPE 61 8.3.4.2 MMT for VC-MUX 62 8.3.5 Other FL

21、 messages for network management (optional)63 8.4 Return Link Signalling .63 8.4.1 Typically use of Return Link Signalling.63 8.4.2 On board processing of Return Link Signalling .63 8.4.3 Other RL messages for network management (optional)63 8.5 Coding of SI for forward link signalling 64 8.5.1 Tabl

22、e definition.64 8.5.1.1 Timeslot Composition Table (TCT)64 8.5.1.2 Terminal Burst Time Plan (TBTP)64 8.5.2 DSM-CC Private Section Header .64 8.6 SNMP (optional) 64 9 Security, identity and encryption65 ETSI ETSI TR 101 790 V1.4.1 (2009-07) 5 10 RCST implementation guidelines 65 10.1 Architecture65 1

23、0.2 System performance .66 10.2.1 RF/IF performance66 10.2.2 Code performance in an AWGN channel .68 10.2.2.1 Concatenated coding performance 68 10.2.2.2 Turbo code performance .68 10.3 Interfaces 69 10.3.1 RX IFL69 10.3.2 TX IFL70 10.3.3 ODU control signal.71 10.3.3.1 Concept of the 22 kHz Pulse Wi

24、dth Keying (PWK) Bus72 10.3.4 Control functions from the IDU74 10.3.5 Monitoring functions (from ODU on request)74 10.3.6 Control and Monitoring protocol description .75 10.4 ODU environmental conditions75 10.4.1 Operational environment 75 10.4.2 Survival conditions .75 11 User network guidelines.76

25、 11.1 RCST interaction with cable and non-transparent SMATV.76 11.2 Transparent SMATV76 11.2.1 Interactive “one cable“ SMATV-IF installation77 11.2.2 Interactive “multiswitches equipped“ SMATV-IF installation.78 11.3 RCST interaction with local area networks81 11.4 RCST interaction with In-Home Digi

26、tal Network84 Annex A: Examples of incorporation of satellite based return channel into a digital television platform .85 Annex B: RCST IDU/ODU IFL protocol description.87 B.1 Command and request processing87 B.2 Alarms 87 B.3 Dynamic behaviour 87 B.4 Error recovery mechanism .87 B.5 Message level d

27、escription 88 B.5.1 Framing field description .89 B.5.2 Address field description90 B.5.3 Command field description (IDU ODU) .90 B.5.4 Password (optional)91 B.5.5 Extended message format.92 B.5.5.1 Extended messages for commands (IDU ODU) 92 B.5.5.2 Simplified structure for short fixed length exten

28、ded messages (IDU ODU) .93 B.5.5.3 Extended messages for replies (ODU IDU).93 B.5.6 CRC definition .93 B.5.7 General implementation of functions .93 B.5.7.1 Reset status and parameter request .94 B.5.7.1.1 ODU reset (0x0A) (optional) 94 B.5.7.1.2 ODU Status (0x12)94 B.5.7.1.2.1 aa byte status descri

29、ption: Alarms .95 B.5.7.1.2.2 bb byte status description: ODU state .95 B.5.7.1.2.3 cc byte status description: Reserved for future use95 B.5.7.1.3 ODU Identification (0x54, 0x55, 0x56, 0xD5) .95 B.5.7.2 Operational commands .97 B.5.7.2.1 SSPA ON (0xC6) 97 B.5.7.2.2 SSPA OFF (0xC7) 97 B.5.7.2.3 Tran

30、smitter disable (0xCE) .98 B.5.7.2.4 Transmitter enable (0xCF) 98 B.5.7.2.5 Set Power level (0xC8) (optional).98 ETSI ETSI TR 101 790 V1.4.1 (2009-07) 6 B.5.7.2.6 Mod ON (0xC9) (optional) .99 B.5.7.2.7 Mod OFF (0xCA) (optional).99 B.5.7.2.8 Set Rx Freq(0xD7) (optional) .99 B.5.7.2.9 Set Beacon Freq(

31、0xD8) (optional) 99 B.5.7.2.10 Set Tx Freq(0xD9) (optional)100 B.5.7.2.11 Set Satellite_ID(0xDA) (optional) 100 B.5.7.2.12 Track OFF(0xDB) (optional) 100 B.5.7.2.13 Track ON(0xDC) (optional)101 B.5.7.3 Download commands .101 B.5.7.3.1 Download start (0xC1) (optional) .101 B.5.7.3.2 Download data (0x

32、C2) (optional) .101 B.5.7.3.3 Download abort (0xC3) (optional)102 B.5.7.3.4 Download validate (0xC4) (optional) .102 B.5.7.3.5 Download toggle (0xC5) (optional) 103 B.5.7.4 Password commands (optional) 104 B.5.7.4.1 Change password (0xCB) (optional).104 B.5.7.4.2 Validate password (0xCC) (optional)

33、.104 B.5.7.4.3 Reset ODU locked (0xCD) (optional).105 B.5.7.5 Other functions (optional).105 B.5.7.5.1 ODU calibration table (0xD0) (optional) 105 B.5.7.5.2 ODU measured temperature (0xD1) (optional).106 B.5.7.5.3 ODU output power level (0xD2) (optional) 106 B.5.7.5.4 ODU location (0xD3) (optional).

34、106 B.5.7.5.5 Set ODU location (0xD4) (optional).107 B.5.8 Command compatibility when SSPA ON 107 B.5.9 Use of extended message structures .108 Annex C: Link budgets110 C.1 EIRP realization: implementation example110 C.2 DVB-RCS return link-budget.110 Annex D: Deriving Eb/N0from ES/N0- an example113

35、 D.1 Reed-Solomon/Convolutional Codes.113 D.2 Turbo Codes .113 Annex E: Example of used frequency bands.114 Annex F: MIB definition.115 Annex G: Example for a security and authentication concept.116 G.1 User authentication using RADIUS .116 G.1.1 User authentication process116 G.1.2 User authenticat

36、ion message flow and steps 117 G.1.2.1 User authentication accept message flow and steps117 G.1.2.2 User authentication reject message flow and steps .118 G.1.2.3 User authentication service provider challenge message flow and steps119 G.1.3 User authentication message format.120 G.1.3.1 Access_Requ

37、est for user.120 G.1.3.2 Access_ Reject120 G.1.3.3 Access_ Accept.121 G.1.4 User Authentication Table121 G.1.5 CHAP password crypto engine 124 G.2 IPSec solution and definition .124 G.2.1 SA negotiation and secure tunnel setup125 G.2.2 RCST SA re-negotiation 125 G.2.3 RCST Wake Up SA negotiation.126

38、 G.2.3.1 RCST interfaces126 G.2.4 Redundancy126 ETSI ETSI TR 101 790 V1.4.1 (2009-07) 7 G.3 RCST security requirements 126 G.3.1 Architecture overview 126 G.3.2 Protection against violation 127 G.3.3 Containment of violation127 G.3.4 Recovery from violation.127 Annex H: Void 128 Annex I: Example for

39、 procedures and operations providing additional functionality 129 I.1 RCST software download 129 I.2 Installation and commissioning129 I.3 RCST system processes129 I.3.1 RCST Power On.130 I.3.2 RCST Reset130 I.3.3 RCST Login .130 I.3.4 RCST Re-login.130 I.3.5 RCST Logoff131 I.3.6 RCST Wake Up131 I.3

40、.6.1 Traffic initiated RCST Wake Up 131 I.3.6.2 OAM RCST Wake Up132 I.3.7 RCST Disable.132 I.3.8 RCST Enable132 I.3.9 User Login132 I.3.10 User Logoff 132 I.4 State transition processes132 I.4.1 Name of transition in state machine .133 I.4.2 RCST operations state machine133 I.4.2.1 Forward Link Acqu

41、isition.133 I.4.2.2 OAM Acquisition .134 I.4.2.3 Traffic Acquisition135 I.4.2.4 Traffic Release136 I.4.2.5 OAM Release137 I.4.2.6 Return Link Release138 I.4.2.7 Return Link Disable139 I.4.2.8 Return Link Enable.139 I.4.3 RCST configurations state machine .140 I.4.3.1 Encryption.140 I.4.3.1.1 Phase 1

42、 SA Acquisition.140 I.4.3.1.2 Phase 2 SA Acquisition.140 I.4.3.1.3 Phase 2 SA Release.141 I.4.3.1.4 Phase 1 SA Release.141 I.4.3.1.5 Full Encrypt Release .141 I.4.3.1.6 Full Encrypt and Negotiate Release 142 I.4.3.1.7 Phase 2 SA Re-negotiation142 I.4.3.1.8 Phase 2 SA Renewed 143 I.4.3.2 RCST transmi

43、ssion .143 I.4.3.2.1 Transmission Enable .143 I.4.3.2.2 Transmission Disable143 I.4.3.3 User authentication state machine.144 I.4.3.3.1 Normal user login to RCST.144 I.4.3.3.2 Static user login to RCST144 I.4.3.3.3 RCST Re-login to NCC 145 I.4.3.3.4 Authentication successful145 I.4.3.3.5 Authenticat

44、ion failure - normal user .145 I.4.3.3.6 Static user authentication failure.146 I.4.3.3.7 Logoff from RCST - Not authenticated 146 I.4.3.3.8 Logoff from RCST - authentication requested147 I.4.3.3.9 Logoff from RCST - authenticated .148 I.4.3.3.10 RCST transition to INITIALIZED state148 ETSI ETSI TR

45、101 790 V1.4.1 (2009-07) 8 I.5 RCST Power Control148 I.6 Multicast Handling.149 I.6.1 Invoking a Multicast Session from RCST-side 149 I.6.2 Revoking a Multicast Session from RCST-side .149 I.6.3 Multicast Source Transmission 150 Annex J: Example Connection Control Protocol .151 Annex K: Example info

46、rmation exchange method between OBP and NCC for RSMS systems152 Annex L: Applicability of DVB-RCS to mobile services 155 L.1 Introduction 155 L.2 Applicability of DVB-RCS forward and return synchronisation .155 L.2.1 Doppler shift and time drift 156 L.2.2 Forward Link Synchronisation.157 L.2.2.1 NCR

47、-based synchronization .157 L.2.2.2 Impact of Doppler shift and delay variation on physical layer synchronisation .158 L.2.3 Return link physical layer synchronization 158 L.2.3.1 Frequency accuracy 158 L.2.3.2 Frequency and timing drift within the burst163 L.2.4 Time Accuracy .164 L.2.4.1 Synchroni

48、zation acquisition164 L.2.4.2 Synchronization maintenance .165 L.2.5 DVB-RCS synchronisation in mobile environments: Examples165 L.3 Frequency ranges and regulatory constraints envelope167 L.3.1 Regulatory constraints applicable to the Ku-band allocations167 L.3.1.1 Off-axis EIRP limits .168 L.3.1.2

49、 Particular constraints applicable to MMSS.168 L.3.1.3 Particular constraints applicable to AMSS .169 L.3.1.4 Illustration of the impact of the off-axis EIRP constraint: 169 L.3.2 Regulatory constraints applicable to the Ka-band allocations171 L.4 DVB-RCS coverage of mobility management.172 L.4.1 Access to forward link signalling .172 L.4.2 Handover detection and preparation.172 L.4.3 Handover execution and associated signalling.172 L.5 Additional considerations for mobile applications.173 L.5.1 Signalling table transmission in mobile environments - practical case

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1