1、 International Telecommunication Union ITU-T J.290TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2006) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS Cable modems Next generation set-top box core architecture ITU-T Recommendation J.290 ITU-
2、T Rec. J.290 (11/2006) i ITU-T Recommendation J.290 Next generation set-top box core architecture Summary This Recommendation describes a core architecture functionality of next-generation STB that operators and equipment vendors MAY elect to follow in making network and product investment decisions
3、. This architecture defines a cost-efficient platform with capacity and flexibility to support growth of on-demand video, high definition digital TV, managed in-home networks connecting a wide range of consumer-provided devices, and future IP multimedia services including IP voice, video telephony,
4、and multiplayer gaming. The goal of this Recommendation is to provide core functionalities and can serve as foundations for network specific environments. It SHOULD be noted that home networking portion of this architecture is based upon ITU-T Rec. J.190. In actual implementation of NG-STB-A functio
5、nalities, this Recommendation MUST be used with either ITU-T Rec. J.292 or ITU-T Rec. J.291 based on access network availability. Source ITU-T Recommendation J.290 was approved on 29 November 2006 by ITU-T Study Group 9 (2005-2008) under the ITU-T Recommendation A.8 procedure. ii ITU-T Rec. J.290 (1
6、1/2006) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questi
7、ons and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations
8、on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, th
9、e expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g., interoperability or app
10、licability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with
11、 the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applic
12、ability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implem
13、ent this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2007 All rights reserved. No part of this publication may be reproduced, by any mea
14、ns whatsoever, without the prior written permission of ITU. ITU-T Rec. J.290 (11/2006) iii CONTENTS Page 1 Scope 1 2 References. 1 3 Definitions 1 4 Abbreviations and acronyms 2 5 Conventions 5 6 Integrated multimedia architecture. 5 6.1 Reference architecture description . 6 6.2 Attributes of an in
15、tegrated multimedia architecture. 7 6.3 Video services architecture. 9 6.4 IP multimedia services architecture 17 6.5 In-home network architecture. 20 6.6 Advanced digital advertizing 28 7 Customer premises 28 7.1 Overview 28 7.2 Subscriber video devices (SVDs). 29 7.3 Other CPE devices 33 8 Securit
16、y. 34 8.1 Security hardware element . 34 8.2 Authentication 34 8.3 Key encryption keys. 34 8.4 Unit address 34 8.5 Tamper resistance. 35 8.6 Key management 35 8.7 Copy protection 36 9 Head-end network architecture. 36 9.1 Head-end network delivery architecture 37 9.2 Session and resource management
17、architecture . 38 10 Quality of service 39 10.1 IntServ and DiffServ. 40 10.2 End-to-end QoS and service applications. 40 10.3 Requirements for QoS bridge. 41 Appendix I Relationship between MI and cable type services and QoS type 45 Bibliography. 46 ITU-T Rec. J.290 (11/2006) 1 ITU-T Recommendation
18、 J.290 Next generation set-top box core architecture 1 Scope This Recommendation describes a core architecture functionality of next-generation STB that operators and equipment vendors MAY elect to follow in making network and product investment decisions. This architecture defines a cost-efficient
19、platform with capacity and flexibility to support growth of on-demand video, high definition digital TV, managed in-home networks connecting a wide range of consumer-provided devices, and future IP multimedia services including IP voice, video telephony, and multiplayer gaming. The goal of this Reco
20、mmendation is to provide core functionalities and can serve as foundations for network specific environments. It SHOULD be noted that home networking portion of this architecture is based upon ITU-T Rec. J.190. In actual implementation of NG-STB-A functionalities, this Recommendation MUST be used wi
21、th either ITU-T Rec. J.292 or ITU-T Rec. J.291 based on access network availability. 2 References None. 3 Definitions This Recommendation defines the following terms: 3.1 authorized service domain (ASD): The devices in this domain are able to authenticate themselves and support content usage rights
22、as defined by the network operator. 3.2 application ID: This is a field indicating a numeric ID for an application running on the set-top device. 3.3 authorized output domain (AOD): The devices in this domain are connected to the ASD using operator-approved output interfaces. 3.4 best effort domain
23、(BED): Devices and physical layer segments not conforming to the requirements of ASD, AOD, GSD. The devices in this domain do not require content protection or guaranteed quality of service. 3.5 CA_system_ID: This is a field indicating the type of CA system applicable for either the associated ECM a
24、nd/or EMM streams. The CA_system_ID may be used as a DSG client ID in DSG advanced mode. 3.6 DSG client: The DSG (DOCSIS set-top gateway) client terminates the DSG tunnel and receives content from the DSG server. 3.7 entitlement control messages (ECMs): An ECM is an encrypted message that contains a
25、ccess criteria to various service tiers and a control word (CW). 3.8 embedded PS: A portal services element that does not use a stand-alone interface to connect to a set-top box device. 3.9 embedded set-top box: An embedded set-top box is an embedded service application functional entity. It include
26、s the DSG client(s), a DSG client controller, an embedded processor for an application environment, and either an embedded or removable module for conditional access. 3.10 entitlement management messages (EMMs): The EMM contains the actual authorization data and shall be sent in a secure method to e
27、ach CPE device. 2 ITU-T Rec. J.290 (11/2006) 3.11 guaranteed service domain (GSD): Devices in the GSD will be able to receive QoS-sensitive content services such as VoIP, multiplayer interactive gaming, and IP video-phone. 3.12 home access (HA) device: A grouping of logical elements used to achieve
28、HFC access for IPCable2Home network(s). 3.13 home bridge (HB) device: A group of logical elements used to bridge IPCable2Home networks together. 3.14 home client (HC) device: A group of logical elements used to provide functionality to client applications. 3.15 LAN IP device: A LAN IP device is repr
29、esentative of a typical IP device expected to reside on home networks, and is assumed to contain a TCP/IP stack as well as a DHCP client. 3.16 portal services (PS): A functional element that provides management and translation functions between the HFC and home network. 3.17 one-way: This expression
30、 infers that the downstream path (from the network to the subscriber) is operational, and that the upstream path (from the subscriber to the network) is not operational. This may occur because the upstream path is not available, the set-top device is not registered, or the set-top device does not su
31、pport a two-way mode of operation. 3.18 QoS parameter set: The set of service flow encodings that describe the quality of service attributes of a service flow or a service class. 3.19 residential gateway: The device that provides interconnection functionalities between access network and home networ
32、k as described in ITU-T Rec. J.190. NOTE How to apply J.190 residential gateway functionality to various networks SHOULD be considered in the near future. 3.20 service class: A set of queuing and scheduling attributes that is named and that is configured at the head-end equipment. A service class is
33、 identified by a service class name. A service class has an associated QoS parameter set. 3.21 set-top controller: This is the computer system responsible for managing the set-top devices within a cable system. It manages set-top devices through control and information messages sent via the out-of-b
34、and channel. 3.22 set-top device: A receiver that contains an embedded PS function for home network connectivity and an embedded set-top box. 3.23 two-way: This expression infers that the downstream path and the upstream path are operational. 3.24 well-known MAC address: This refers to the MAC addre
35、ss of the client within the set-top device. This MAC address has been assigned by the manufacturer of the conditional access system within the set-top device. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: AES Advanced Encryption Standard API Applicat
36、ion Programming Interface ASD Authorized Service Domain BED Best Effort Domain BP (IPCable2Home) Boundary Point ITU-T Rec. J.290 (11/2006) 3 CA Conditional Access CAS Conditional Access System CBC Cipher Block Chaining CE Consumer Electronics CMTS Cable Modem Termination System Codec Coder/Decoder C
37、PE Customer Premises Equipment CSA Common Scrambling Algorithm CSP Configurable Security Processor CW Control Word DES Data Encryption Standard DHCP Dynamic Host Configuration Protocol DiffServ Differentiated Services Architecture for Network Traffic DLNA Digital Living Network Alliance DRM Digital
38、Rights Management DSCP DiffServ Code Point DSL Digital Subscriber Line DTCP Digital Transmission Content Protection DTV Digital TV DVB Digital Video Broadcast DVI Digital Video Interface DVR Digital Video Recording ECB Electronic Code Book ECM Entitlement Control Message EMM Entitlement Management M
39、essage EPG Electronic Program Guide FIPS Federal Information Processing Standards FTTH Fibre to the Home GigE Gigabit Ethernet GSD Guaranteed Service Domain HDCP High-bandwidth Digital Content Protection HDMI High Definition Multimedia Interface HDTV High Definition TV HFC Hybrid Fibre Coaxial ID Id
40、entifier IP Internet Protocol Layer 3 Network layer in OSI stack; Layer in firewall in which routing is based on IP address 4 ITU-T Rec. J.290 (11/2006) MAC Media Access Control MGCP Media Gateway Control Protocol MIB Management Information Base MPEG Moving Picture Experts Group MPTS Multiple Progra
41、m Transport Stream MTA Multimedia Terminal Adapter NAT Network Address Translation NCS Network Call Signalling NE Network Element NG-STB-A Next Generation STB Architecture NIU Network Interface Unit OCAP OpenCable Applications Platform OEM Original Equipment Manufacturer OSS Operations Support Syste
42、m PC Personal Computer PHY Physical layer PID Packet Identifier PS Portal Services QAM Quadrature Amplitude Modulation QoS Quality of Service QPSK Quadrature Phase Shift Keying RAN Regional Area Network RMS Rights Management System RSA Public key cryptosystem developed by Rivest, Shamir, Adleman; al
43、so company by same name marketing public key technology RSVP Resource reSerVation Protocol RTP Real Time Protocol RTSP Real Time Streaming Protocol SCTE Society of Cable Telecommunications Engineers SD Secure Digital SHA-1 Secure Hash Algorithm 1 SNMP Simple Network Management Protocol SOC System-on
44、-Chip SPTS Single Program Transport Stream STB Set-Top Box SVD Subscriber Video Device TCP Transmission Control Protocol ITU-T Rec. J.290 (11/2006) 5 TOS Type of Service (also DiffServ Code Point, DSCP) TS Transport Stream UDP User Datagram Protocol UI User Interface UPnP Universal Plug and Play USB
45、 Universal Serial Bus VLAN Virtual Local Area Network VoD Video-on-Demand VoIP Voice over IP XML eXtensible Markup Language 5 Conventions Throughout this Recommendation, words that are used to define the significance of particular requirements are capitalized. These words are: “MUST“ This word or th
46、e adjective “REQUIRED“ means that the item is an absolute requirement of this Recommendation. “MUST NOT“ This phrase means that the item is an absolute prohibition of this Recommendation. “SHOULD“ This word or the adjective “RECOMMENDED“ means that there may exist valid reasons in particular circums
47、tances to ignore this item, but the full implications should be understood and the case carefully weighed before choosing a different course. “SHOULD NOT“ This phrase means that there may exist valid reasons in particular circumstances when the listed behaviour is acceptable or even useful, but the
48、full implications should be understood and the case carefully weighed before implementing any behaviour described with this label. “MAY“ This word or the adjective “OPTIONAL“ means that this item is truly optional. One vendor may choose to include the item because a particular marketplace requires i
49、t or because it enhances the product; for example, another vendor may omit the same item. 6 Integrated multimedia architecture The following are key attributes of the NG-STB-A for an Integrated Multimedia Architecture: Expanded capacity: Provides expanded capacity that will be non-limiting to the introduction of new services. Enables cable operator options to use spectrum more efficiently through use of: converting analog channels to digitally-compressed video services; advanced compression algorithms; more advanced modulation schemes; integrated spectrum resource management at the h