Designed to incorporate the possibility of producing lower cost options for the Return Channel Satellite terminal equipment.

Digitalna videoradiodifuzija (DVB) – Povratni kanal za satelitske distribucijske sisteme

General Information

Status
Published
Publication Date
30-Nov-2003
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
01-Dec-2003
Due Date
01-Dec-2003
Completion Date
01-Dec-2003

Buy Standard

Standard
SIST EN 301 790 V1.3.1:2003
English language
110 pages
sale - 10%
Preview
sale - 10%
Preview

Standards Content (sample)

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.Digitalna videoradiodifuzija (DVB) – Povratni kanal za satelitske distribucijske sistemeDigital Video Broadcasting (DVB); Interaction channel for satellite distribution systems33.170Televizijska in radijska difuzijaTelevision and radio broadcasting33.070.40SatelitSatelliteICS:Ta slovenski standard je istoveten z:EN 301 790 Version 1.3.1SIST EN 301 790 V1.3.1:2003en01-december-2003SIST EN 301 790 V1.3.1:2003SLOVENSKI

STANDARD
SIST EN 301 790 V1.3.1:2003

ETSI EN 301 790 V1.3.1 (2003-03)European Standard (Telecommunications series) Digital Video Broadcasting (DVB);Interaction channel for satellite distribution systems European Broadcasting Union Union Européenne de Radio-Télévision EBU·UER

SIST EN 301 790 V1.3.1:2003
ETSI ETSI EN 301 790 V1.3.1 (2003-03)2

Reference REN/JTC-DVB-138 Keywords broadcasting, DVB, interaction, satellite ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00
Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88

Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, send your comment to: editor@etsi.org Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2003. © European Broadcasting Union 2003. All rights reserved.

DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTM and the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. SIST EN 301 790 V1.3.1:2003

ETSI ETSI EN 301 790 V1.3.1 (2003-03)3

Contents Intellectual Property Rights................................................................................................................................7 Foreword.............................................................................................................................................................7 1 Scope........................................................................................................................................................8 2 References................................................................................................................................................8 3 Definitions, symbols and abbreviations...................................................................................................9 3.1 Definitions..........................................................................................................................................................9 3.2 Symbols..............................................................................................................................................................9 3.3 Abbreviations...................................................................................................................................................10 4 Reference models for satellite interactive networks in DVB.................................................................11 4.1 Protocol stack model........................................................................................................................................11 4.2 System model...................................................................................................................................................12 4.3 Reference model of the Satellite Interactive Network......................................................................................13 5 Forward link...........................................................................................................................................14 6 Return link base-band physical layer specification and multiple access definition...............................15 6.1 RCST synchronization.....................................................................................................................................15 6.1.1 Timing control............................................................................................................................................15 6.1.2 Carrier synchronization...............................................................................................................................15 6.1.3 Burst synchronization.................................................................................................................................16 6.1.4 Symbol clock synchronization....................................................................................................................16 6.2 Burst format......................................................................................................................................................16 6.2.1 Traffic (TRF) burst formats........................................................................................................................16 6.2.1.1 ATM TRF burst....................................................................................................................................17 6.2.1.2 Optional MPEG2-TS TRF burst...........................................................................................................17 6.2.2 Synchronization and acquisition burst formats...........................................................................................17 6.2.2.1 Synchronization (SYNC) burst format..................................................................................................18 6.2.2.2 Acquisition (ACQ) burst.......................................................................................................................18 6.2.3 Common Signalling Channel (CSC) burst format......................................................................................19 6.2.4 Bit numbering and interpretation................................................................................................................20 6.2.5 Transmission order.....................................................................................................................................20 6.3 Randomization for energy dispersal.................................................................................................................21 6.4 Coding..............................................................................................................................................................21 6.4.1 CRC error detection code...........................................................................................................................21 6.4.2 Reed-Solomon outer coding.......................................................................................................................22 6.4.3 Convolutional inner coding........................................................................................................................22 6.4.4 Turbo code..................................................................................................................................................23 6.4.4.1 Description of the turbo code permutation............................................................................................24 6.4.4.2 Determination of the circulation states..................................................................................................25 6.4.4.3 Rates and puncturing map.....................................................................................................................25 6.4.4.4 Order of transmission and mapping to QPSK constellation..................................................................26 6.5 Modulation.......................................................................................................................................................27 6.5.1 Bit mapping to QPSK constellation............................................................................................................27 6.5.2 Baseband shaping and quadrature modulation............................................................................................27 6.5.3 EIRP control...............................................................................................................................................28 6.5.4 Guard time..................................................................................................................................................28 6.6 MAC messages.................................................................................................................................................28 6.6.1 Methods based on the Satellite Access Control (SAC) field......................................................................28 6.6.1.1 SAC field composition..........................................................................................................................28 6.6.1.2 Prefix method mechanism.....................................................................................................................29 6.6.1.3 Mini-slot method...................................................................................................................................29 6.6.1.4 Contention based mini-slot method.......................................................................................................29 6.6.2 Data Unit Labelling Method (DULM)........................................................................................................30 6.6.2.1 DULM with ATM-formatting...............................................................................................................30 6.6.2.2 DULM with MPEG-formatting.............................................................................................................32 SIST EN 301 790 V1.3.1:2003

ETSI ETSI EN 301 790 V1.3.1 (2003-03)4

6.6.3 Mini-slot method........................................................................................................................................33 6.6.4 Contention based mini-slot method............................................................................................................34 6.7 Multiple access.................................................................................................................................................34 6.7.1 MF-TDMA.................................................................................................................................................34 6.7.1.1 Fixed MF-TDMA..................................................................................................................................34 6.7.1.2 Dynamic MF-TDMA (Optional)...........................................................................................................34 6.7.1.3 Frequency range....................................................................................................................................35 6.7.2 Segmentation of the return link capacity....................................................................................................35 6.7.2.1 Superframes..........................................................................................................................................35 6.7.2.2 Frames...................................................................................................................................................36 6.7.2.3 Timeslots...............................................................................................................................................37 6.8 Capacity request categories..............................................................................................................................37 6.8.1 Continuous Rate Assignment (CRA)..........................................................................................................37 6.8.2 Rate Based Dynamic Capacity (RBDC).....................................................................................................37 6.8.3 Volume Based Dynamic Capacity (VBDC)...............................................................................................38 6.8.4 Absolute Volume Based Dynamic Capacity (AVBDC).............................................................................38 6.8.5 Free Capacity Assignment (FCA)...............................................................................................................38 7 Synchronization procedures...................................................................................................................38 7.1 Overall events sequencing................................................................................................................................38 7.2 Initial synchronization procedure.....................................................................................................................40 7.3 Logon procedure..............................................................................................................................................41 7.4 Coarse synchronization procedure (optional)...................................................................................................42 7.5 Fine synchronization procedure (optional).......................................................................................................43 7.6 Synchronization maintenance procedure..........................................................................................................44 7.7 Logoff procedure..............................................................................................................................................44 7.7.1 General........................................................................................................................................................44 7.7.2 Normal........................................................................................................................................................44 7.7.3 Abnormal....................................................................................................................................................44 8 Control and management........................................................................................................................45 8.1 Protocol stack...................................................................................................................................................45 8.1.1 RCST Type A (IP)......................................................................................................................................45 8.1.2 Optional RCST Type B (Native ATM).......................................................................................................48 8.2 RCST addressing..............................................................................................................................................48 8.3 Forward link signalling....................................................................................................................................48 8.3.1 General SI tables.........................................................................................................................................48 8.3.1.1 Superframe Composition Table (SCT)..................................................................................................49 8.3.1.2 Frame Composition Table (FCT)..........................................................................................................49 8.3.1.3 Time-Slot Composition Table (TCT)....................................................................................................49 8.3.1.4 Satellite Position Table (SPT)...............................................................................................................49 8.3.1.5 Correction Message Table (CMT)........................................................................................................49 8.3.1.6 Terminal Burst Time Plan (TBTP)........................................................................................................49 8.3.2 Terminal Information Message (TIM)........................................................................................................49 8.3.3 PCR Insertion TS Packet............................................................................................................................49 8.3.4 Summary.....................................................................................................................................................50 8.3.5 Repetition rates...........................................................................................................................................50 8.4 Return link signalling.......................................................................................................................................50 8.4.1 RCST synchronization and Identification messages...................................................................................50 8.4.2 Configuration parameters between RCST and NCC (optional)..................................................................51 8.4.3 Other messages for network management (optional)..................................................................................51 8.4.4 Burst time plan exchange............................................................................................................................52 8.5 Coding of SI for forward link signalling..........................................................................................................52 8.5.1 Introduction.................................................................................................................................................52 8.5.2 SI table mechanism.....................................................................................................................................52 8.5.3 DSM-CC section mechanism......................................................................................................................53 8.5.4 Coding of PID and table_id fields..............................................................................................................53 8.5.5 Table definitions.........................................................................................................................................53 8.5.5.1 Standard section headers.......................................................................................................................53 8.5.5.1.1 SI section header..............................................................................................................................54 8.5.5.1.2 DSM-CC private section header......................................................................................................55 8.5.5.2 Superframe Composition Table (SCT)..................................................................................................56 SIST EN 301 790 V1.3.1:2003

ETSI ETSI EN 301 790 V1.3.1 (2003-03)5

8.5.5.3 Frame Composition Table (FCT)..........................................................................................................58 8.5.5.4 Timeslot Composition Table (TCT)......................................................................................................60 8.5.5.5 Satellite Position Table (SPT)...............................................................................................................63 8.5.5.6 PCR Insertion Transport Stream packet................................................................................................63 8.5.5.6.1 TS packet format.............................................................................................................................64 8.5.5.6.2 Adaptation field...............................................................................................................................64 8.5.5.6.3 Optional payload field.....................................................................................................................65 8.5.5.7 Terminal Burst Time Plan (TBTP)........................................................................................................66 8.5.5.8 Terminal Information Message (TIM)..................................................................................................67 8.5.5.9 Correction Message Table (CMT)........................................................................................................69 8.5.5.10 descriptor coding...................................................................................................................................71 8.5.5.10.1 descriptor identification and location..............................................................................................71 8.5.5.10.2 Network Layer Info descriptor (optional)........................................................................................71 8.5.5.10.3 Correction Message descriptor........................................................................................................72 8.5.5.10.4 Logon Initialize descriptor...............................................................................................................74 8.5.5.10.5 ACQ Assign descriptor....................................................................................................................75 8.5.5.10.6 SYNC Assign descriptor.................................................................................................................76 8.5.5.10.7 Encrypted Logon ID descriptor.......................................................................................................77 8.5.5.10.8 Echo Value descriptor.....................................................................................................................78 8.5.5.10.9 Linkage descriptor (private data).....................................................................................................78 8.5.5.10.10 RCS content descriptor....................................................................................................................80 8.5.5.10.11 Satellite forward link descriptor......................................................................................................81 8.5.5.10.12 Satellite return link descriptor.........................................................................................................83 8.5.5.10.13 Table Update descriptor...................................................................................................................84 8.5.5.10.14 Contention control descriptor..........................................................................................................85 8.5.5.10.15 Correction COntrol descriptor.........................................................................................................85 8.5.5.10.16 Forward Interaction Path descriptor................................................................................................86 8.5.5.10.17 Return Interaction Path descriptor...................................................................................................87 8.5.5.10.18 Connection Control descriptor (optional)........................................................................................89 8.5.5.11 Accessing of the forward link signalling...............................................................................................89 8.5.5.12 RCS Map Table.....................................................................................................................................93 9 Security, identity, encryption.................................................................................................................94 9.1 Authentication..................................................................................................................................................95 9.2 Forward link.....................................................................................................................................................95 9.3 Return link........................................................................................................................................................95 9.4 Security (optional)............................................................................................................................................95 9.4.1 Cryptographic primitives............................................................................................................................96 9.4.1.1 Public key exchange..............................................................................................................................96 9.4.1.2 Hashing.................................................................................................................................................97 9.4.1.3 Encryption.............................................................................................................................................97 9.4.1.4 Pseudo-random numbers.......................................................................................................................97 9.4.2 Main Key Exchange (MKE).......................................................................................................................98 9.4.3 Quick Key Exchange (QKE)......................................................................................................................99 9.4.4 Explicit Key Exchange (EKE)....................................................................................................................99 9.4.5 Key derivation............................................................................................................................................99 9.4.6 Data stream processing.............................................................................................................................100 9.4.6.1 Payload streams...................................................................................................................................100 9.4.6.2 Data encryption...................................................................................................................................100 9.4.6.3 Encryption flags..................................................................................................................................100 9.4.6.4 Chaining and initialization vector.......................................................................................................101 9.4.7 Security establishment..............................................................................................................................101 9.4.8 Persistent state variables...........................................................................................................................102 9.4.8.1 Guaranteed delivery............................................................................................................................102 9.4.9 Security MAC messages...........................................................................................................................102 9.4.9.1 Security Sign-On...................................................................................................................102 9.4.9.2 Security Sign-On Response...................................................................................................103 9.4.9.3 Main Key Exchange..............................................................................................................104 9.4.9.4 Main Key Exchange Response..............................................................................................104 9.4.9.5 Quick Key Exchange.............................................................................................................105 9.4.9.6 Quick Key Exchange Response.............................................................................................105 9.4.9.7 Explicit Key Exchange..........................................................................................................106 SIST EN 301 790 V1.3.1:2003

ETSI ETSI EN 301 790 V1.3.1 (2003-03)6

9.4.9.8 Explicit Key Exchange Response..........................................................................................106 9.4.9.9 Wait.......................................................................................................................................107 Annex A (informative): Compliance table..........................................................................................108 Annex B (informative): Bibli

...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.