Digital Content Manager (DCM) DCM Supercrypt
|
|
|
- Nickolas McCarthy
- 9 years ago
- Views:
Transcription
1 Rev D Digital Content Manager (DCM) DCM Supercrypt Configuration Guide Software Package 3.0
2
3 Safe Operations For Your Safety Explanation of Warning and Caution Icons Avoid personal injury and product damage! Do not proceed beyond any symbol until you fully understand the indicated conditions. The following warning and caution icons alert you to important information about the safe operation of this product: You may find this symbol in the document that accompanies this product. This symbol indicates important operating or maintenance instructions. You may find this symbol affixed to the product. This symbol indicates a live terminal where a dangerous voltage may be present; the tip of the flash points to the terminal device. You may find this symbol affixed to the product. This symbol indicates a protective ground terminal. You may find this symbol affixed to the product. This symbol indicates a chassis terminal (normally used for equipotential bonding). You may find this symbol affixed to the product. This symbol warns of a potentially hot surface. You may find this symbol affixed to the product and in this document. This symbol indicates an infrared laser that transmits intensity-modulated light and emits invisible laser radiation or an LED that transmits intensitymodulated light. Important Please read this entire guide. If this guide provides installation or operation instructions, give particular attention to all safety statements included in this guide Rev D iii
4
5 Safe Operations Notices Trademark Acknowledgments Cisco, Cisco Systems, and the Cisco Systems logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Scientific Atlanta and the Scientific Atlanta logo are registered trademarks of Scientific-Atlanta, Inc. SciCare is a trademark of Scientific-Atlanta Inc. ROSA and Copernicus are trademarks of Scientific-Atlanta Europe NV. All other trademarks shown are trademarks of their respective owners. Publication Disclaimer Copyright Scientific-Atlanta Europe NV assumes no responsibility for errors or omissions that may appear in this publication. Scientific Atlanta reserves the right to change this publication at any time without notice. This document is not to be construed as conferring by implication, estoppel, or otherwise any license or right under any copyright or patent, whether or not the use of any information in this document employs an invention claimed in any existing or later issued patent Scientific-Atlanta Europe NV. All rights reserved. Information in this publication is subject to change without notice. No part of this publication may be reproduced or transmitted in any form, by photocopy, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, for any purpose, without the express permission of Scientific-Atlanta Europe NV. Comments About This Document If you have comments about your experience with this documentation, please visit the Scientific Atlanta web site and complete the user documentation satisfaction survey at the following address: Your completed survey will be forwarded to the documentation manager directly responsible for publishing this document Rev D v
6
7 Contents Safe Operations Preface ix xi Chapter 1 Introduction 1 Introducing the DCM Supercrypt... 2 General... 2 Modular Concept... 3 Principle... 4 Introducing Conditional Access System... 5 Introduction... 5 Scrambling, Control Word, and Cryptoperiod... 6 Access Criteria and Access Rights... 6 Entitlement Control Messages... 7 Event Information Scheduler... 9 Scrambling levels Simulcrypt Scrambling Timing Parameters Introducing the Web Browser User Interface About the Web Browser User Interface Using the Web Browser User Interface Web Browser User Interface Security Introduction Logging On or Off the Web Browser User Interface Configuring the Security Checking the Version Information Introduction To check the Version Information Importing and Exporting Device Settings Introduction Exporting Configuration Settings Importing Configuration Settings Restarting the System Introduction To Restart the DCM Supercrypt System Rev D iii
8 Contents Chapter 2 Configuration 31 Device Configuration Changing the Device Name Adding or Removing SNMP Trap Destinations Setting the Device Clock Card Configuration Changing the Name of an Interface Card GbE Port Configuration Configuring the Interface Parameters of a GbE Port GbE Port Backup Adding or Deleting Static ARP Table Entries Adapting the Static Route Table Checking the Routes to Destination Devices Joining or Leaving GbE Ports to IGMP Multicast Groups Checking the GbE Statistics General Configuration Changing Default Values for Settings of Incoming Transport Streams Changing Default Values for Settings of Outgoing Transport Streams Changing the Display Mode Chapter 3 Service Routing 73 Description Creating Service Routing Files Introduction Creating a Service Routing File Uploading and Downloading Service Routings Uploading a Service Routing File Downloading the Service Routings Changing Service Routing Settings Adding a Service Routing Removing Service Routings Changing the Standard of an Incoming Transport Stream Changing Settings of Outgoing Transport Streams Changing Settings of Incoming Services Changing the SID of an Outgoing Service iv Rev D
9 Contents Chapter 4 Scrambling Configuration 95 Introduction General About the SCS Configuration GUI Changing the Scrambling Properties Introduction To Change the Scrambling Properties Entitlement Control Message Generators Introduction To Assign an ECMG Interface Changing the ECMG Specific Parameters Removing an ECMG Interface Overruling the ECMG Channel Status Message Parameter Values Adding, Changing, or Removing ECMG Descriptor Rules Event Information Schedulers Introduction To Assign an EIS Interface Changing the EIS Interface Connection Parameters Removing an EIS Interface Chapter 5 Alarm Monitoring 113 Configuring the Alarms Introduction Enabling or Disabling Alarm Message Reporting for all Alarms Generating Test Messages Configuring the Settings of the Device Alarms Configuring the Settings of the Interface Alarms Checking the Alarms Introduction Alarms Related to Incoming Transport Streams Alarms Details Related to Incoming Transport Streams Alarms Related to Incoming Services Alarms Details Related to Incoming Services Alarms Related to Outgoing Services Alarms Details Related to Incoming Services To Check the Device Status Overview Table Alarm Overview Interface Card Related Alarms Device Related Alarms Rev D v
10 Contents Chapter 6 Checking Bit Rates 131 Checking the Bit Rates Overview Tables Introduction Checking the Input Bit Rates Checking the Output Bit Rates Restarting the Bit Rate Measurement Chapter 7 Software Upgrade 147 Introduction About the Upgrade Software System Requirements Installing the Upgrade-It Software Package Upgrading the DCM Software Appendix A Customer Information 157 Product Support Obtaining Support Support Telephone Numbers Return Products for Repair Introduction Obtaining an RMA Number and Shipping Address Packing and Shipping the Product Appendix B Integrating a DCM Supercrypt into ROSA NMS 163 Introduction About ROSA NMS Installing the ROSA 3.0 Drivers Introduction To Install the ROSA Drivers Making Task Instances Introduction To Make a Task Instance Mapping a DCM Supercrypt into ROSA NMS Introduction To Map a DCM into ROSA NMS Working with the Graphical User Interfaces Opening the Web Browser User Interface Opening the Graphical User Interface of a Task or Component vi Rev D
11 Contents Appendix C Configuring the Access Criteria 179 Introduction General About the AC Manager Component GUI General Settings To Change the Number Format Setting up the Transport Stream Model Introduction To Set up the TS Model by Uploading the TS Model from the DCM Supercrypt Device(s) To Set up the TS Model Manually Defining Access Criteria Configuration Dialog Conditional Access System Information Access Criteria Information Assigning Access Criteria Appendix D Scrambling Control 201 Introduction About the Scrambling Control Task Communication Setup Starting and Stopping Scrambling General Settings Starting the Task Automatic Start Stopping the Task Synchronizing the Task with the AC Manager Component To Change the Number Format Changing the ECM ID Mode Introduction To Change the ECM ID Mode Checking the DCM Devices to which a Transport Stream Belongs Starting and Stopping Scrambling Starting Scrambling Stopping Scrambling Event Logging Advanced Settings Restoring Communication Overruling the Scrambling Control Configuration Rev D vii
12 Contents Appendix E Extended Operations 219 Downloading MIBs from the DCM Introduction To Download MIB files Viewing Trace Logs Introduction Filtering the Card Trace Logs Changing the ORB Trace Level Checking the Trace Logs Downloading Trace Logs Glossary 227 Index 235 viii Rev D
13 Safe Operations Safe Operations The software described in this guide is used to monitor and / or manage Scientific Atlanta equipment. Certain safety precautions should be observed when operating equipment of this nature. For product specific safety requirements refer to the appropriate section of the documentation accompanying your product Rev D ix
14
15 Preface Preface Introduction Audience This configuration guide provides the necessary information to configure and to operate the Digital Content Manager (DCM) DCM Supercrypt using the web browser user interface of the device. In this configuration guide the Digital Content Manager (DCM) Supercrypt is further indicated by DCM Supercrypt. The audience of this configuration guide includes authorized and trained personnel who are responsible for the configuration and operation of the DCM Supercrypt. Required Knowledge To use this configuration guide, the personnel should have a basic knowledge about the technology used in relation to this product. Related Publication Refer to the following Scientific Atlanta publications for more information concerning the DCM Supercrypt: Digital Content Manager (DCM) Model D System Guide, part number This guide is shipped with the DCM Supercrypt. Digital Content Manager (DCM) Model D Data Sheet, this data sheet can be found on the Scientific Atlanta web site at the following location: ROSA Network Management System - User's Guide, part number IIOP Protocol Driver - User's Guide, part number Document Version This is the fourth release of this configuration guide Rev D xi
16
17 1 Chapter 1 Introduction Introduction This chapter provides information concerning the DCM Supercrypt and gives an introduction of Conditional Access Systems. In This Chapter Introducing the DCM Supercrypt... 2 Introducing Conditional Access System... 5 Introducing the Web Browser User Interface Web Browser User Interface Security Checking the Version Information Importing and Exporting Device Settings Restarting the System Rev D 1
18 Chapter 1 Introduction Introducing the DCM Supercrypt General The Digital Content Manager (DCM) Supercrypt is a bulk-encryptor that can be used into Switched Digital Video (SDV) applications, Video on Demand (VOD) applications, etc... The DCM Supercrypt is a compact 2 RU device configurable with up to four GbE Interface Card/Co-Processor modules. The following illustration depicts a DCM Supercrypt. Scientific Atlanta Alarm PS 1 Model D9900 Digital Content Manager (DCM) PS 2 The DCM Supercrypt supports hot swappable and redundant power supplies and hot swappable cooling fans. The DCM Supercrypt is controlled via a simple and intuitive Graphical User Interface. Routing of the incoming services to the output of the DCM Supercrypt can be done using the web browser user interface or can be done in advanced using a service routing file editable by means of a standard text editor or Microsoft Excel Rev D
19 I/O GbE 10/ Modular Concept Introducing the DCM Supercrypt The DCM Supercrypt is a fully modular concept build around a 2 RU high housing. The flexible modular concept ensures easy system capability upgrades. The following illustration shows the modular concept of the DCM Supercrypt. PS 1 PS 2 The following DCM Supercrypt equipment is available: Housing V dc Power Supply Unit (PSU) V ac PSU GbE Interface Card/Co-Processor Card module PSU slot cover plate Interface card slot cover plate When the DCM Supercrypt leaves Scientific Atlanta's assembly line, the device is configured as ordered. When the device is not fully populated, meaning not populated with four GbE Interface Cards/Co-Processor Card modules, the device can always be upgraded at a later date by adding GbE Interface Card/Co-Processor Card modules Rev D 3
20 Chapter 1 Introduction Principle The DCM Supercrypt contains the following functional blocks: PSUs Main Card GbE Interface Card/Co-Processor Card module Mains Mains PSU PSU Power Distribution Card Co-Processor Card GbE 10/100/BaseT 4 GbE Interfaces GbE Interface Card Main Card I/O Contacts Co-Processor Card Front Panel Status LEDs 4 GbE Interfaces GbE Interface Card Co-Processor Card 4 GbE Interfaces GbE Interface Card Co-Processor Card Data 4 GbE Interfaces GbE Interface Card Control Power Supply Status Rev D
21 Introducing Conditional Access System Introducing Conditional Access System Introduction A Conditional Access System (CAS) is the basis in a Pay TV system to prevent unauthorized reception of services (picture, sound, or data) and to secure the charge of the subscribing remuneration. The following illustration depicts DCM Supercrypt integration into a Conditional Access System. Access Criteria Scheduler Event Information Scheduler Database ECM Generator Subscriber Management System Control Word Access Criteria ECMs SCGs Control Word Generator Control Word Simulcrypt Synchronizer (P)SI Generator DCM Supercrypt Control Word (P)SI Tables ECMs MUX TS Scrambler TS Transport Stream A CAS system combines scrambling of picture, sound, or data services with a specific Scrambling/Descrambling key management system. Scrambling is the process that uses a cryptographic algorithm to make services unintelligible for nonauthorized subscribers Rev D 5
22 Chapter 1 Introduction Scrambling, Control Word, and Cryptoperiod At the transmission site of a Condition Access System (CAS), services multiplexed into a Transport Stream can be scrambled using a particular scrambling algorithm (also called DVB Common Scrambling Algorithm) with a scrambling/descrambling key (named Control Word). At the receiver site the scrambled services can then be descrambled by an appropriate descrambling algorithm using the same Control Word (CW). Transport Stream Scrambler Transport Stream with Scrambled Services Descrambler Transport Stream CW CW To increase the security of a CA System the Control Word used to scramble and descramble services changes periodically (typically every 10 seconds). The duration of scrambling by one Control Word is named Crypto Period. Control Words, which are typically 64 bits long, are generated by a Control Word Generator (CWG) and requested by the Simulcrypt Synchronizer (SCS). Transport Stream Scrambler Transport Stream with Scrambled Services Descrambler Transport Stream CW CWG? CW SCS Control Words cannot be delivered from the transmitter to the receiver site in the clear, they need to be encrypted. The algorithm used to encrypt the Control Word is unique to each CA System and implemented in a secure device of the descrambler and uses the smart card of the customer s Conditional Access Module (CAM). Access Criteria and Access Rights When a subscriber is only interested in particular services like sport and nature, he only wants to pay for these services. Services, for which the subscriber doesn t pay, have to remain unintelligible. Therefore two parameters are defined, namely Access Criteria and Access Rights: Access Criteria is Conditional Access vendor specified information and specifies service-related criteria that are applied to a package of services or elementary streams. These subscriptions (also called theme or product) are encapsulated into Entitlement Control Messages (ECMs). More information concerning ECMs can be found in topic Entitlement Control Messages on page Rev D
23 Introducing Conditional Access System Access Rights are stored on the smart card of the descrambler and determines which services the subscriber can access. These Access Rights are periodically reconfirmed using Entitlement Management Messages (EMMs). When the Access Rights for a particular subscriber should be changed, EMMs are sent to the descrambler containing the new Access Rights. Example: AC criteria 1, subscription = Football ECM1 AC criteria 2, subscription = Tennis ECM2 AC criteria 3, subscription = Snooker ECM3 A subscriber pays to view football and snooker programs. His set top box receives all ECM packets that contain the appropriate control words. Besides that, the set top box also receives EMM packets that contain the access rights for this set top box. These rights are compared with the access criteria and the set top box is only allowed to decipher the ciphered Control Words of the ECMs for which the subscriber has Access Rights (ECM1 and ECM3). Entitlement Control Messages The Simulcrypt Synchronizer (SCS) triggered from the Event Information Scheduler (EIS) to start a Conditional Access event, will get every Crypto Period a Control Word (CW) for this event from the Control Word Generator (CWG). Incoming Transport Stream ECMs MUX Scrambler Outgoing Transport Stream? CWG CW SCS CW (...,AC,...) CW/AC ECMs DCM EIS ECMG Note: For more information concerning the Event Information Scheduler, please refer to topic Event Information Scheduler on page Rev D 7
24 Chapter 1 Introduction The Simulcrypt Synchronizer extracts the Access Criteria from the information (named Scrambling Control Group) received from the Event Information Scheduler. The synchronizer sends this Access Criteria together with the Control Word for the corresponding Crypto Period to the Entitlement Control Message Generator (ECMG). The Entitlement Control Message Generator encrypts both the Access Criteria and the Control Word using a particular cryptographic algorithm with a specific Service Key. This encrypted data is encapsulated into an Entitlement Control Message (ECM) and sent to the Simulcrypt Synchronizer. Incoming Transport Stream ECMs MUX Scrambler Outgoing Transport Stream? CWG CW SCS CW DCM (...,AC,...) CW/AC ECMs EIS ECMG A certain time before the first Crypto Period for this event begins, the Simulcrypt Synchronizer starts sending ECMs for this event at regular times to the multiplexer (typically every 200 msec). This start time is necessary to give the descrambler time to decrypt the encrypted Control Word and Access Criteria. The multiplexer multiplexes this stream of ECMs with the outgoing Transport Stream. When the event begins, the Simulcrypt Synchronizer sends the Control Word to the scrambler, which starts scrambling the service(s) associated with this event. Incoming Transport Stream ECMs MUX Scrambler Outgoing Transport Stream? CWG CW SCS CW DCM (...,AC,...) CW/AC ECMs EIS ECMG Rev D
25 Introducing Conditional Access System Before the end of the Crypto Period, the Simulcrypt Synchronizer requests a new Control Word from the Control Word Generator, sends this new Control Word together with the Access Criteria to the ECMG, and receives a new ECM for this event from the ECM Generator. This new generated ECM is multiplexed in the outgoing Transport Stream. When the Crypto Period is ended, the new Control Word is sent to the scrambler, which starts scrambling the service(s) using the new Control Word. This reiterates for every Crypto Period until the end of the event. Incoming Transport Stream ECMs MUX Scrambler Outgoing Transport Stream? CWG CW SCS CW DCM (...,AC,...) CW/AC ECMs EIS ECMG Event Information Scheduler The Event Information Scheduler (EIS) is the functional unit in the Conditional Access System that holds the schedule information, the configuration, and the Conditional Access Information required for the complete Conditional Access System. Incoming Transport Stream ECMs MUX Scrambler Outgoing Transport Stream? CWG CW SCS CW (...,AC,...) CW/AC ECMs DCM EIS ECMG Rev D 9
26 Chapter 1 Introduction To start a scrambling event the Event Information Scheduler provides the Simulcrypt Synchronizer with a Scrambling Control Group (SCG) provisioning message. A SCG provisioning message contains a list of services and/or Elementary Streams that must be scrambled at the same time with the same Control Word and a list with ECM Groups for which ECMs must be generated. An ECM Group contains the necessary information, like Super_Cas_ID 1, ECM_ID 2, and Access Criteria, to bind an ECM stream to a Conditional Access Provider. To stop a scrambling event the EIS sends a SCG provisioning message update to the Simulcrypt Synchronizer. The ECM Group for the event of which scrambling must be stopped is removed from the SCG provisioning message. The following illustration shows a SCG provisioning message. SCG Provisioning Message ECM Groups Service ID xxx.. SCG ID. Components ID xxx Activation Time Supercas ID x Access Criteria xx 2 Supercas ID x Access Criteria xx 3 Supercas ID x Access Criteria xx 4 Supercas ID x Access Criteria xx 5 Supercas ID x Access Criteria xx 6 Supercas ID x Access Criteria xx y Supercas ID x.. Access Criteria xx ECM ID 1 The Super_Cas_ID is the concatenation of the CA_system_ID and the CA_Subsystem_ID and is used to identify the ECM Generator within the Contitional Access System. 2 The ECM_ID identifies an ECM stream within the Conditional Access System Rev D
27 Introducing Conditional Access System Scrambling levels Scrambling can be done on two different levels, namely: Elementary Stream Level scrambling and Service Level scrambling. The following list describes these scrambling levels: Elementary Stream Level Scrambling: Each component of a service may be scrambled by a separate Control Word. For example, video and audio may be scrambled with a separated Control Word. This is useful in multilingual systems where a premium is charged for a second audio in a different language. In this case, each component or elementary stream is associated with its own stream of ECM messages. Input TS Output TS PMT Video PID Audio PID Transport Stream (P)SI Tables PSIG ECMs MUX Scrambler PMT Video PID CA Descriptor ES Video ES Audio CW CWG EIS (...,AC,...) SCS CW/AC ECMs CW DCM ECM PID Audio PID ES Video (scrambled) ES Audio ECM PID EMM PID ECMG When scrambling at the elementary stream level, all Elementary Streams within the service are scrambled using different Control Words. One ECM is required for each Elementary Stream. The CA descriptors are inserted after each elementary stream within the PMT. Service Level Scrambling: The alternative to elementary stream level scrambling is to scramble all components that make up a service with the same Control Word. In this case, there is only one stream of ECM messages associated with the service as a whole. Input TS Output TS PMT Video PID Transport Stream ECMs MUX Scrambler PMT CA Descriptor Audio PID ES Video ES Audio CW CWG EIS (...,AC,...) SCS CW/AC ECMs CW DCM ECM PID Video PID Audio PID ES Video (scrambled) ES Audio (scrambled) ECM PID ECMG EMM PID Rev D 11
28 Chapter 1 Introduction When scrambling at the service level, all Elementary Streams within the service are scrambled using the same Control Word. Only one ECM is required for each service. The CA descriptor is inserted near the top of the PMT. Note: Elementary Stream Level Scrambling and Service Level Scrambling can be mixed within the scrambler but not within the same service. Simulcrypt Scrambling Simulcrypt scrambling is a scrambling method whereby a single Transport Stream contains ECMs from different Conditional Access systems. This enables different CA decoder populations to receive and correctly decode the same video and audio streams. Input TS Output TS PMT Video PID Audio PID Transport Stream ECMs MUX Scrambler PMT CA Descriptor ECM 1 PID ES Video ES Audio CWG CW SCS CW ECM 2 PID ECM n PID Video PID (..., ECMgrp1(...,AC1), ECMgrp2(...,AC2),...,ECMgrpn(...,ACn),...) CW/AC1 ECM1s ECMG1 CW/AC2 ECMs ECMG2 CW/ACn ECMn ECMGn Audio PID CSA(ES Video, CW) CSA(ES Audio, CW) ECM 1 PID ECM 2 PID EIS ECM n PID Timing Parameters When the Event Information Scheduler (EIS) triggers the Simulcrypt Synchronizer the start of a new Conditional Access (CA) event using a Scrambling Control Group (SCG ID 1) provisioning message, the Simulcrypt Synchronizer request a Control Word (CW 1) from the Control Word Generator. Once the Simulcrypt Synchronizer has received the Control Word from the CW Generator, the Simulcrypt Synchronizer sends the Control Word together with the Access Criteria and ECM ID extracted from the Scrambling Control Group provisioning message to the ECM Generator. The ECM Generator encrypts the Control Word and Access Criteria and encapsulates this data into an ECM. The ECM Generator sends this ECM to the Simulcrypt Synchronizer. A certain time before (t1-t2) starting the CA event (Activation Time) the Simulcrypt Synchronizer start sending ECMs for the first Crypto Period at regular times to the Multiplexer Rev D
29 Introducing Conditional Access System Transition Start Delay 3 (t1-t2): represents the amount of time between the start of the first Crypto Period following a clear to scrambled transition, and the start of the broadcasting of the ECM attached to this period. The multiplexer multiplexes these ECMs directly into the outgoing Transport Stream. At the same time a CA descriptor containing the ECM PID is inserted into the Program Map Table (PMT) of the Transport stream. SCG ID 1 SCG ID 1 SCG Transmission ECM Transmission ECM (CW 1) t1 ECM (CW 2) t3 t4 ECM (CW 3) ECM (CW L) tl+1 Crypto Period t2 CP 1 t5 CP 2 CP L tl Service Status Clear Scrambled using CW 1 Scrambled using CW 2 Scrambled using CW L Clear Activation Time from the SCG provisioning message Activation Time from the SCG de-provisioning message The Transition Start Delay must match the time the descrambler needs to decapsulate the ECM PID from the PMT and to decrypt the Control Word and Access Criteria. At the begin (t2) of the first Crypto Period (CP 1) the set top box starts descrambling the scrambled service using CW 1. A certain time (t3-t5) before the end of the running Crypto Period (CP 1) the SCS stops transmitting ECMs attached to this CP and a certain time (t4-t5) before the next Crypto Period (CP 2) the SCS starts transmitting ECMs for CP 2. Stop Delay 4 (t3-t5): represents the amount of time between the end of a Crypto Period, and the end of the broadcasting of the ECM attached to this period. Start Delay 5 (t4-t5): represents the amount of time between the start of a Crypto Period, and the start of the broadcasting of the ECM attached to this period. 3 A positive start delay parameter means that the ECM shall be delayed with respect to the start of thecrypto Period. A negative delay parameter it means that the ECM shall be broadcast ahead of this time. Only a negative Transition Start Delay can be used. 4 A positive stop delay parameter means that the end of the ECM broadcast shall be delayed with respect to the end of the Crypto Period. A negative stop delay parameter means that the ECM broadcast shall be ended ahead of time. 5 A positive start delay parameter means that the ECM shall be delayed with respect to the start of the Crypto Period. A negative delay parameter it means that the ECM shall be broadcast ahead of this time Rev D 13
30 Chapter 1 Introduction When the Simulcrypt Synchronizer receives a SCG provisioning message update from the Event Information Scheduler indicating the end of the running CA event, the synchronizer extend the last Crypto Period until the end of the period match the end of the activation time extract from the SCG provisioning message update. Once the activation time (tl) is reached the set top box stops descrambling the service. The Simulcrypt Synchronizer stops transmitting ECMs attached to this last Crypto Period at time (tl+1). Transition Stop Delay (tl-tl+1): this parameter represents the amount of time between the end of last Crypto Period preceding a scrambled to clear transition, and the end of the broadcasting of the ECM attached to this period. When the Simulcrypt Synchronizer receives a SCG provisioning message containing another Access Criteria for the service(s), the synchronizer stops sending ECMs containing the previous Access Criteria at time t6 in the last Crypto Period and starts sending ECMs with the new Access Criteria at time (t7). SCG ID 2 SCG Transmission ECM Transmission ECM (CW L) ECM (CW L+1) t6 t7 ECM (CW L+2) ECM (CW L+3) Crypto Period CP L-1 CP L CP L+1 CP L+2 t8 Service Status Scrambled using CW L-1 Scrambled using CW L Scrambled using CW L+1 Scrambled using CW L+2 Activation Time SCG ID 2 AC Start Delay 6 (t7-t8): represents the amount of time between the start of the first Crypto Period following a change in the Access Criteria and the start of the broadcasting of the ECM attached to this period. AC Stop Delay 7 (t6-t8): represents the amount of time between the end of the lastcrypto Period preceding a change in Access Criteria, and the end of the broadcasting of the ECM attached to this period. 6 A positive start delay parameter means that the ECM shall be delayed with respect to the start of the Crypto Period. A negative delay parameter it means that the ECM shall be broadcast ahead of this time. 7 A positive stop delay parameter means that the end of the ECM broadcast shall be delayed with respect to the end of the Crypto Period. A negative stop delay parameter means that the ECM broadcast shall be ended ahead of time Rev D
31 Introducing Conditional Access System During the connection setup between the Simulcrypt Synchronizer and the Entitlement Control Message Generator, the Simulcrypt Synchronizer receives a Channel Status Message containing particular timing parameters. When timing parameters are missing or inaccurate, ROSA s SCS Configurator allows overruling these parameters. When a subscriber tunes into a scrambled service in a particular Crypto Period, the scrambler is not able to scramble the service during the rest of this Crypto period because he has only the Control Word for the next period. To solve this problem, an Entitlement Control Message (ECM) can be provided with more than one Control Word. The most Conditional Access Systems allow 1 or 2 Control Words in an ECM, viz. the Control Word of the current Crypto Period and the Control Word of the next period. SCG Transmission ECM Transmission SCG ID 1 ECM (CW 1-2) ECM (CW 2-3) ECM (CW 3-4) Crypto Period CP 1 CP 2 CP 3 Service Status Clear Scrambled using CW 1 Scrambled using CW 2 Scrambled using CW 3 Activation Time Rev D 15
32 Chapter 1 Introduction Introducing the Web Browser User Interface About the Web Browser User Interface The web browser user interface of the DCM Supercrypt is a pure HTML based Graphical User Interface (GUI) that can be opened using Microsoft Internet Explorer 6.0 or higher. By entering the IP Address of the DCM Supercrypt in the address box of Internet Explorer web browser, the web browser user interface of the device will be opened. The following illustration shows the opening page of the DCM Supercrypt GUI. Note: The procedure to log on the web browser user interface can be found in topic Web Browser User Interface Security on page Rev D
33 Introducing the Web Browser User Interface Using the Web Browser User Interface Browsing through a Tree The incoming and outgoing services of the DCM Supercrypt as well as the DCM Supercrypt configuration are represented using trees. You can browse through a tree by collapsing or expanding branches. A branch that can be expanded is indicated by a + sign and an expanded leave is indicated by a - sign. To expand a branch, point to the + sign in front of the branch. To collapse a branch, point to the - sign in front of the branch. Using the Apply and Reload Command Button Particular pages and sub pages of the web browser user interface of the DCM Supercrypt can be provided with a Reload command button and an Apply command button. When changes are made to settings on a certain page or sub page, clicking on the Apply command button will send these new settings to the DCM Supercrypt. Note: When settings are changed on multiple pages or sub pages, only the settings on the page or sub page for which the Apply command button is pressed, are sent to the DCM Supercrypt. When settings are accidentally changed on a certain page or sub page, clicking on the Reload command button restores these settings to the previous settings as long as the Apply command button on this page or sub page is not pressed. The Reload command button can also be used to update readouts on the page or sub page the command button belongs to Rev D 17
34 Chapter 1 Introduction Image Legend A description of the icons used by the web browser user interface of the DCM Supercrypt can be found on the help - Legend sub page. The following procedure explains how to display the help - Legend sub page. 1 On the web browser user interface of the DCM Supercrypt, point to the Legend link that appears after clicking on the Help link. Result: The help - Legend sub page is displayed Rev D
35 Introducing the Web Browser User Interface Using Popup Windows Particular information is given by the DCM Supercrypt using popup windows. When popup blocking software is active on your PC, these popup windows might be blocked. In this case a message box is displayed. Deactivate this popup blocking software if you use the web browser user interface of the DCM Supercrypt. About Web Browser Toolbars Some toolbars for web browsers (e.g. Google Toolbar) offer an automated form fill in option. This option tries to fill in some fields in forms on web pages that were already visited once in the past (e.g. to automatically fill in name and address if possible). Because the embedded user interface of the DCM Supercrypt consists of pages with large forms this feature can slow down your page considerably. Therefore it is recommended to disable this option when you work with the DCM Supercrypt GUI. Checking the Version of the Web Browser User Interface The software version of the embedded web browser user interface of the DCM Supercrypt can be found on the help - About sub page of the user interface. The following procedure explains how to check the version of the embedded web browser user interface. 1 On the web browser user interface of the DCM Supercrypt, point to the About link that appears after clicking on the Help link. Result: The help - About sub page containing the version information of the web browser user interface is displayed Rev D 19
36 Chapter 1 Introduction Web Browser User Interface Security Introduction To prevent people from gaining access to the DCM Supercrypt, the web browser user interface of the DCM Supercrypt is provided with a security feature. This security feature confirms the identity of the users who are attempting to access the device, protects the device configuration from inappropriate access by users, and provides a simple and efficient way to set up and maintain the security of the DCM Supercrypt. To configure the DCM Supercrypt security, Security Accounts should be defined. A Security Account consists of a unique user name with password. By adding Security Accounts to Security Groups, particular access permissions and rights can be given to users. Three Security Groups are defined each having a different access level, viz.: Guests: read-only access Users: read-write access (without security configuration) Administrators: full control (with security configuration) The security of the DCM Supercrypt is provided with three pre-defined User Accounts. The table below shows these pre-defined accounts. User Name Password Security Groups Guest Guest Guests (read-only access) User User Users (read-write access, without security configuration) Administrator Administrator Administrators (full control) Notes: Both the User Name and Password are case-sensitive. Similar user names cannot be used, even when uppercase and lowercase characters are combined, e.g. user and User. For security reason each action done to the DCM Supercrypt using the web browser user interface will be logged into the Security Log or Action Log. More information concerning these logs can be found in topic Viewing Trace Logs on page Rev D
37 Web Browser User Interface Security Logging On or Off the Web Browser User Interface To Log On Perform the following steps to log on the DCM Supercrypt web browser user interface. Note: When the web browser user interface of the DCM Supercrypt is uploaded from the device after entering the IP address in the Address box of the web browser, the Login page of the web browser user interface is displayed. 1 On the Login page of the DCM Supercrypt web browser user interface, enter the user name in the User Name box and the password in the Password box. Note: Both parameters are case sensitive. 2 Press the Login command button to confirm. Result: You are logged on to the web browser user interface and the Service page is displayed. The user name of the security account that is logged on appears in the Login link. Note: After 30 minutes user interface inactivity, the web browser user interface of the DCM Supercrypt will automatically be logged out. To Log Off The following step explains how to log off the DCM Supercrypt web browser user interface. 1 On the web browser user interface of the DCM Supercrypt, point to the Logout link. Result: The web browser user interface is logged off and the Login page is displayed Rev D 21
38 Chapter 1 Introduction Configuring the Security Adding Security Accounts Perform the following steps to add Security Accounts. 1 Log on to the DCM Supercrypt using a Security Account belonging to the Administrators Security Group. 2 Point to the Security link. Result: The Security page is displayed. Tip: The rows in the Security Accounts table can be re-ordered using a particular parameter by pointing to the table header of this parameter. You can toggle between ascending and descending order by pointing to the parameter header. 3 In the User Name box of the Add New User table, enter a name for the new account. 4 In the Security Group drop down box, select the Security Group to which the new account has to belong. 5 In the Password and Re-enter Password box, enter the password for the new account. 6 Press the Add command button. Result: The new Security Account is added to the Security Accounts table Rev D
39 Web Browser User Interface Security Changing Security Account Settings Perform the following steps to change the settings of a Security Account. 1 Log on to the DCM Supercrypt using a Security Account belonging to the Administrators Security Group. 2 Point to the Security link. Result: The Security page is displayed. Note: When a user is logged on using a Security Account that belongs to the Users or Guests Security Group, the Security link is not applicable. 3 In the Security Accounts table, adapt the following parameters of the Security Account for which settings should be changed: When the name of the Security Account should be changed, enter the new name in the corresponding User Name box. When the Security Account has to belong to another Security Group, select the desired group in the Security Group drop down box. When the password should be changed, tick the corresponding check box and enter the new password in both password boxes. 4 Press the Apply command button to confirm or the Reload command button to abort the operation. Tip: The rows in the Security Accounts table can be re-ordered using a particular parameter by pointing to the table header of this parameter. You can toggle between ascending and descending order by pointing the parameter header. Deleting Security Accounts The following procedure explains how to delete security accounts. 1 Log on to the DCM Supercrypt using a Security Account belonging to the Administrators Security Group. 2 Point to the Security link. Result: The Security page is displayed. Note: When a user is logged on using a Security Account that belongs to the Users or Guests Security Group, the Security page is not applicable. 3 In the Security Accounts table, tick the check box(es) in front of the row(s) of the Security Account that must be removed. Tips: To set the check boxes of consecutive rows in the Security Accounts table, tick the check box of the first row, press and hold down the [SHIFT] key, and tick the check box of the last row. The rows in the Security Accounts table can be re-ordered using a particular parameter by pointing to the table header of this parameter. You can toggle between ascending and descending order by clicking on the parameter header Rev D 23
40 Chapter 1 Introduction 4 Press the Remove Checked Items command button to confirm or the Reload command button to abort the operation. Result: After pressing the Remove Checked Items command button, the selected Security Accounts are removed from the Security Accounts table. Notes: At least one Security Account belonging to the Administrators Security Group must be present in the Security Accounts table. When a Security Account is deleted from a Security Group while a user is logged on to the DCM Supercrypt using this Security Account, the user has access to the DCM Supercrypt as long as he is logged on Rev D
41 Checking the Version Information Checking the Version Information Introduction The Configuration - Version Info sub page of the web browser user interface of the DCM Supercrypt represents the version numbers of the software, hardware, and firmware of the different DCM Supercrypt components. The following picture shows the Configuration - Version Info sub page of a DCM Supercrypt populated with two GbE Interface Card / Co-Processor modules. Note: By pointing to the parameter header in a version table, an ascending or descending order of the rows can be chosen. To check the Version Information Perform the following steps to check the version information of the DCM Supercrypt. 1 On the web browser user interface of the DCM Supercrypt, point to the Version Info link that appears after clicking on the Configuration link. Result: The Configuration - Version Info sub page is displayed Rev D 25
42 Chapter 1 Introduction Importing and Exporting Device Settings Introduction The web browser user interface of the DCM Supercrypt allows exporting and importing of the configuration setting files. This feature is useful for backup or (re- )configuration purposes. Exporting Configuration Settings The following procedure explains how to export the configuration setting files of the DCM Supercrypt. 1 On the web browser user interface of the DCM Supercrypt, point to the Backup link that appears after clicking on the Configuration link. Result: The Configuration - Backup sub page is displayed. 2 Press the Export command button. Result: The File Download dialog is displayed. 3 Click on the Save command button. Result: The Save As dialog is displayed. Note: If the file should be saved in a different folder, locate and open the folder. 4 In the File Name box, enter a name for the file. 5 Click the Save command button to confirm or the Cancel command button to abort the operation Rev D
43 Importing Configuration Settings Importing and Exporting Device Settings The procedure below describes how to import the configuration setting files. 1 On the web browser user interface of the DCM Supercrypt, point to the Backup link that appears after clicking on the Configuration link. Result: The Configuration - Backup sub page is displayed. 2 Point to the Browse command button. Result: The Choose file dialog is displayed. 3 Browse to the configuration file and select this file. 4 Click on the Open command button. Result: The Choose file dialog is closed and the path and the file name appear in the Import Device Settings from File box. 5 Click on the Import command button. Result: A confirmation popup window is displayed. 6 Press the OK command button to confirm or the Cancel command button to abort the operation. Result: After pressing the OK command button, the DCM will be rebooted. WARNING: During booting the DCM, the outgoing services will be interrupted. Note: Booting the DCM can take some time depending on the configuration and the features of the device Rev D 27
44 Chapter 1 Introduction Restarting the System Introduction The DCM Supercrypt can be restarted from a remote location using its web browser user interface. A device restart can be performed with its previous settings (called Warm Restart) or with factory setting (called Cold Restart). When a cold restart is performed, all previous configuration settings will be lost except the IP settings of the 10/100 and 10/100/1000Base-T port of the device. After restarting the device remains accessible by the embedded graphical user interface. Note: Performing a cold restart can only be done when you are logged on to the DCM Supercrypt with a security account belonging to the Administrators security group. To Restart the DCM Supercrypt System The following steps explain how to restart a DCM Supercrypt. 1 On the web browser user interface of the DCM Supercrypt, point to the Maintenance link that appears after clicking on the Help link. Result: The Help - Maintenance sub page is displayed. 2 Click on the Warm or Cold selection button. WARNING: After restarting the DCM Supercrypt using a Cold Restart, all configuration settings will be lost. After restarting the DCM Supercrypt using a Warm Restart, the outgoing services will be interrupted. 3 Press the Reboot command button. Result: A confirmation popup window is displayed. - Warm Restart confirmation popup window Rev D
45 Restarting the System - Cold Restart confirmation popup window 4 Press the OK command button to confirm or the Cancel command button to abort the operation. Notes: Booting the DCM Supercrypt can take some time depending on the configuration and the features of the device. After changing settings using the web browser user interface, it takes at most 5 minutes before these settings are stored in non-volatile memory. When the DCM Supercrypt is powered down during this time, these settings will be lost. To deal with this, wait 5 minutes before power down the DCM Supercrypt or trigger a Warm Restart and wait 20 seconds before powering down the DCM Supercrypt by unplugging he power cord Rev D 29
46
47 2 Chapter 2 Configuration Introduction This chapter covers the configuration of the DCM Supercrypt. This chapter provides the device configuration procedures, card configuration procedures as well as port configuration procedures. In This Chapter Device Configuration Card Configuration GbE Port Configuration General Configuration Rev D 31
48 Chapter 2 Configuration Device Configuration Changing the Device Name Introduction To facilitate the identification of the DCM Supercrypt in an application, a name with maximum 40 characters can be given to the device. Note: The name of the DCM Supercrypt appears in the title bar of the web browser. Tips: The hardware configuration of the DCM Supercrypt is depicted in the Hardware configuration box. Clicking on an interface card in the hardware configuration picture opens the Configuration - Interface configuration sub page of the corresponding interface card Rev D
49 Device Configuration To Change the Device Name The following procedure explains how to change the device name. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page with System sub page is displayed. 2 In the System Settings table, enter a name in the Name box. 3 Click on the Apply command button to confirm or the Reload command button to reload the previous setting. Note: The System Settings table also contains the DCM Supercrypt model to which the web browser user interface belongs Rev D 33
50 Chapter 2 Configuration Adding or Removing SNMP Trap Destinations Introduction The Simple Network Management Protocol (SNMP) is a protocol used to manage remote devices. This protocol was designed for managing all kinds of devices such as routers, switches, and also broadcast equipment from companies like Scientific Atlanta. More information concerning SNMP can be found in RFC The DCM Supercrypt is able to generate SNMP Traps, containing information about an error/informational condition, and to send these Traps to particular Trap destinations. The SNMP Trap Destinations table on the SNMP page represents to which IP address(es) the traps are sent and the community string for these destinations. All SNMP settings of the DCM Supercrypt are accommodated on the Configuration - SNMP sub page. The following picture depicts the Configuration - SNMP sub page. The DCM Supercrypt is also accessible using a standard MIB browser. To provide authentication, privacy, and authorization, the standard community-based security is used. A Read Community string (default: public) has to be used for retrieval SNMP operations and a Write Community string (default: private) for modification SNMP operations. The procedure to change these community strings can be found in topic Changing the Read and Write Community Strings on page Rev D
51 Device Configuration The MIB files available on the DCM Supercrypt can be downloaded to the hard disk of a PC. These MIB files can then be used to create for instance an applicationspecific user interface. The procedure to download the MIBs from the DCM Supercrypt to the hard disk of a PC can be found in appendix Downloading MIBs on page 219. Defining SNMP Trap Destinations The following explains how to define a SNMP Trap destination. 1 On the web browser user interface of the DCM Supercrypt, point to the SNMP link that appears after clicking on the Configuration link. Result: The Configuration - SNMP sub page is displayed. 2 In the IP Address box of the Add New SNMP Trap Destination table, enter the IP address of the trap destination. Note: The octets of the IP address must be separated by dots. 3 In the Community String box, enter a community string for this trap destination. 4 Click on the Apply command button to confirm or the Reload command button to reload the previous setting. Result: After pressing the Apply command button, the new Trap destination is added to the SNMP Trap Destination Settings table. Tip: To sort the SNMP Trap Destination Settings table by a particular parameter, point to the table header of the parameter. You can toggle between the ascending and descending order by clicking on the parameter header. Changing the SNMP Trap Format The following procedure explains how to change the SNMP Trap format. 1 On the web browser user interface of the DCM Supercrypt, point to the SNMP link that appears after clicking on the Configuration link. Result: The Configuration - SNMP sub page is displayed. 2 In the SNMP Trap - Format drop down box, select one of the formats, viz.: - Standard: standard SNMP handling (default) - Standard + Mystro: SNMP handling as defined by the mystro-videoport MIB 3 Press the Apply command button to confirm or the Reload command button to abort the operation Rev D 35
52 Chapter 2 Configuration Removing Trap Destinations Perform the following steps to remove Trap Destinations. 1 On the web browser user interface of the DCM Supercrypt, point to the SNMP link that appears after clicking on the Configuration link. Result: The Configuration - SNMP sub page is displayed. 2 In the SNMP Trap Destination Settings table, set the check box(es) in front of the Trap destination row(s) that should be removed. Tip: To set the check boxes of consecutive rows in the SNMP Trap Destination Settings table, point to the check box of the first row, press and hold down the [SHIFT] key, and point to the check box of the last row. 3 Press the Remove Checked Items command button to confirm. Result: After pressing the Remove Checked Items command button, the Trap destinations are removed from the SNMP Trap Destination Settings table. Changing the Read and Write Community Strings The following procedure explains how to change the Read Community and Write Community strings. 1 On the web browser user interface of the DCM Supercrypt, point to the SNMP link that appears after clicking on the Configuration link. Result: The Configuration - SNMP sub page is displayed. 2 In the Read Community box, enter the community string for the retrieval SNMP operations. 3 In the Write Community box, enter the community string for the modification SNMP operations 4 Press the Apply command button to confirm or the Reload command button to abort the operation Rev D
53 Device Configuration Setting the Device Clock Introduction The internal clock of the DCM Supercrypt can be set manually or can be synchronized at regular time with an external device (e.g. Time Server...) by using the Network Time Protocol (NTP). When the settings on the Configuration - Clock sub page of the DCM Supercrypt are properly configured and after pressing the Apply command button, the synchronization cycles are started by executing a time synchronization action. The illustration below depicts the Configuration - Clock sub page. Changing the Device Time Perform the following steps to change the current time of the DCM Supercrypt. 1 On the web browser user interface of the DCM Supercrypt, point to the Clock link that appears after clicking on the Configuration link. Result: The Configuration - Clock sub page is displayed. 2 In the Synchronization drop down box, select Disabled. Result: The User Time setting is displayed Rev D 37
54 Chapter 2 Configuration 3 In the User Time box, enter the time and date using the following notation: YYYY/MM/DD hh:mm:ss with: YYYY: year MM: month DD: day hh: hour mm: minutes ss: seconds 4 In the Time Zone Selection drop down box, select the desired time zone. 5 Click on the Apply command button to confirm or the Reload command button to reload the previous setting. Synchronizing with a NTP Server The following steps explain how to synchronize the DCM Supercrypt with a Time- Server using NTP. 1 On the web browser user interface of the DCM Supercrypt, point to the Clock link that appears after clicking on the Configuration link. Result: The Clock sub page is displayed. 2 In the Synchronization Type drop down box, select NTP. Result: The NTP Server Configuration settings are displayed. 3 In the Time Zone Selection drop down box, select the desired time zone. 4 In the NTP Server IP Address box, enter the IP Address of the Time-Server and press the Add Server To List command button. The octets of the IP address must be separated by dots. Result: The IP address of the Time-Server is added to the NTP Servers table. Repeat this step for all Time-Servers that should be used for time synchronization Rev D
55 Device Configuration 5 Click on the Apply command button to confirm or the Reload command button to reload the previous setting. Note: Time-Servers can be removed from the NTP Servers table by ticking the check box(es) in front of the corresponding IP Address(es) and pressing the Removed Checked Items command button. To set the check boxes of consecutive rows in the NTP Servers table, tick the check box of the first row, press and hold down the SHIFT key, and tick the check box of the last row. Checking NTP Statistics The NTP statistics table gives the list of NTP servers each accompanied by their current states. Each row in the NTP statistics table also provides a summary of the remote peer associated with the NTP server. The following procedure explains how to check the NTP statistics. 1 On the web browser user interface of the DCM Supercrypt, point to the Clock link that appears after clicking on the Configuration link. Result: The Configuration - Clock sub page is displayed. 2 Click on the NTP Statistics command button. Result: The Configuration - Clock - NTP Statistics sub page is displayed. The following parameters are displayed: IP Address: represents the IP address of the NTP server Tally: represents the status of the NTP server selection for time synchronization. The following values are used: space: the NTP server is not reachable. x : the NTP server is a false ticker.. : the NTP server is not a member of the ten closest NTP servers. - : the NTP server is an outlier + : the NTP server is a candidate for time synchronization. # : the NTP server is almost used for time synchronization. * : the NTP server is used for time synchronization. Ref ID: identifies the time source to which the NTP server is synchronized..init. means that no response has been received so far Rev D 39
56 Chapter 2 Configuration Stratum: represents the level defining the distance from the reference clock. A stratus 1 NTP server is directly linked to the reference clock. A stratus 2 NTP server is linked to a stratus 1 NTP server. A stratus 3 NTP server is linked to a stratus 3 NTP server, etc... If a NTP server is not responding, the value 16 is displayed. REF Type: represents the NTP server type. The following values are used: l : local u : unicast m : multicast b : broadcast Last Poll: represents the time that elapsed since the last poll attempt, expressed in seconds. Poll Int: represents the polling interval, expressed in seconds. Reach: represents the reachability status of the NTP server. This is an 8-bit octal number representing whether the NTP server responded during the last eight poll attempts. When the value differs from 377, check the IP network. Delay (ms): represents the packet roundtrip delay, expressed in milliseconds. Offset (ms): the time offset expressed in milliseconds between the clock of the DCM Supercrypt and the NTP server. Jitter (ms): represents the time variation expressed in milliseconds between the NTP servers and the DCM Supercrypt Rev D
57 Card Configuration Card Configuration Changing the Name of an Interface Card Introduction Each interface card of the DCM Supercrypt can be labeled with a name. A logical card name will facilitate the identification of the card in the web browser user interface. To Change the Card Name Perform the following procedure to change the name of an interface card. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the interface card that must be renamed. Result: The Configuration - Interface sub page of the interface card is displayed. 3 Enter a name in the Name box of the Card Settings table. 4 Click on the Apply command button to confirm or the Reload command button to reload the previous setting Rev D 41
58 Chapter 2 Configuration GbE Port Configuration Configuring the Interface Parameters of a GbE Port Introduction A GbE Interface Card of the DCM Supercrypt is provided with four Gigabit Ethernet (GbE) ports making 2 GbE port pairs. Since both GbE ports of a port pair are considered as one virtual port, particular settings are configurable per individual port and particular settings configurable per port pair. The illustration below shows the input pairs of a GbE Interface Card GbE 1 GbE 2 GbE 3 GbE 4 Port Pair 1-2 Port Pair 3-4 Note: The GbE ports within a port pair can be configured in such a way that they can participate into GbE port backup applications. More information concerning GbE port backup can be found in topic Configuring the GbE Port Backup Parameters on page 47. The interface parameters of the GbE ports can be found on the Configuration - Interface sub page of the corresponding interface card Rev D
59 To Configure the Interface Parameters of a GbE Port GbE Port Configuration The following procedure explains how to change the interface parameters of a GbE port. WARNING: After changing network settings of a GbE port, the routes will be removed and should be reapplied. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the GbE Interface Card for which GbE port interface parameters must be changed. Result: The Configuration - Interface sub page of the GbE Interface Card is displayed. 3 In the Name box of the port in question, enter a name of maximum 40 characters. A logical port name facilitates the identification of the GbE port in the application. 4 In the IP Address box of the port in question, enter the IP address that should be assigned to this port. The octets of the IP Address must be separated by dots. Note: The IP addresses in the following ranges are not allowed: (reserved by IANA) (reserved by IANA) (multicast addresses) 5 In the Subnet Mask box of the port in question, enter the mask that determines the subnet to which the IP Address belongs. The octets of the Subnet Mask must be separated by dots. 6 Switch on or off auto-negotiation by selecting On or Off in the Auto Negotiation drop down box of the port in question. Auto-Negotiation is a function where a device learns the capabilities of the device at the other end of the link and configures itself to the highest common set of capabilities. This setting must be equal to the auto-negotiation setting on the connected system. Keep in mind that disabling auto-negotiation is not allowed if the GbE port is equipped with an electrical (copper) type SFP transceiver. More information concerning SFP transceivers can be found in the System Guide shipped with your DCM Supercrypt Rev D 43
60 Chapter 2 Configuration 7 Click on the Apply command button to confirm or the Reload command button to reload the previous setting. Enabling or Disabling a GbE Port Pair The following procedure explains how to enable or disable a GbE Port Pair. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the GbE Interface Card for which GbE port interface parameters must be changed. Result: The Configuration - Interface sub page of the GbE Interface Card is displayed. 3 In the GbE Enable Settings table, select one of the following items in the Enable drop down box of the port pair in question: - Enabled: the GbE port pair is enabled. - Port Only Disabled: the GbE port pair is disabled. - Full Link Disabled: the GbE port pair is disabled in such a way that the device connected to this port pair detects link loss. This setting is useful in case of device backup with ROSA's Digital Headend Backup Task. 4 Press the Apply command button to confirm or the Reload command button to abort the operation. Settings the GbE UDP Boundary The GbE UDP boundary setting acts as a filter for the incoming traffic. All traffic with UDP port above this setting will be considered and processed by the DCM Supercrypt as MPEG data. All traffic below this setting will be processed as non MPEG data. The Boundary parameter can be set between 0 (default) and for each GbE Interface Card. The following procedure explains how to set the GbE UDP boundary setting. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the GbE Interface Card for which the boundary setting must be changed. Result: The Configuration - Interface sub page of the GbE Interface Card is displayed Rev D
61 GbE Port Configuration 3 In the Boundary box, enter the UDP Port value for the GbE UDP boundary setting. 4 Press the Apply command button to confirm or the Reload command button to abort the operation. Checking the Interface Parameters of a GbE Port The interface parameters of a GbE port together with a graphical representation of the port location on the rear panel of the DCM Supercrypt can be found in the Info table on the Configuration sub page of the port. The following illustration depicts a port Configuration sub page. Perform the following steps to view the Info sub page of a particular GbE port. 1 On the web browser user browser interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, expand the interface card branch for which a port must be checked. 3 Double click on this port Rev D 45
62 Chapter 2 Configuration Tips: Result: The Configuration page of the port in question is displayed with the following interface parameters: Number: port number Name: port name Type State: state of the port pair to which this port belongs MAC Address: MAC address of the port IP Address: IP address of the port Subnet Mask: Subnet Mask of the subnet to which this port belongs Auto-Negotiation: the auto-negotiation state of the port Note: More information concerning the interface parameters of a GbE port can be found in topic To Configure the Interface Parameters of a GbE Port on page 43. The hardware configuration of the DCM Supercrypt is depicted in the Hardware configuration box. The corresponding GbE port is highlighted. Clicking on an interface card in the hardware configuration picture opens the Configuration - Interface sub page of the corresponding interface card. The Configuration - Interface sub page of the GbE Interface Card to which the port belongs can be accessed by pressing the Configure Port command button. The Configuration page of a particular port can also be displayed by rightclicking on the port in the DCM Inputs or DCM Outputs tree and pointing to View Configuration in the short-cut menu Rev D
63 GbE Port Configuration GbE Port Backup Introduction For port backup purposes the GbE ports of a GbE Interface Card can be configured in such a way that an inactive port (backup port) takes over an active port (main port) when the GbE link on this active port disappears. Since the GbE Interface Card is provided with four GbE ports, GbE port 2 can be used to backup GbE port 1 or vise versa (port pair 1-2) and GbE port 4 to backup GbE port 3 or vice versa (port pair 3-4). In the DCM Configuration tree on the Configuration page, an active port is indicated by a black colored port name and an inactive port by a gray colored port name see illustration below. Active port Inactive port The active/inactive state of a GbE port can also be checked in the GbE Name and Network Settings table on the Interface sub page of a GbE Interface Card. The DCM Supercrypt supports the following GbE port backup scenarios: The main GbE port switches to its backup GbE port when a backup transitiontrigger-alarm-occurs on the main GbE port and the backup GbE port is backuptransition-trigger-alarm free. The backup GbE port remains active until a backup-transition-trigger-alarm arises on backup GbE port and the main GbE port is backup-transition-trigger alarm free again (revertive mode: inactive). The main GbE port switches to its backup GbE port when a backup-transitiontrigger-alarm occurs on the main GbE port and the backup GbE port is backuptransition-trigger-alarm free. The backup GbE port remains active until the main GbE port becomes backup-transition-trigger-alarm free (revertive mode: active). Note: A backup transition can be triggered when a Link Loss alarm or UDP Loss alarm occurs. To configure these backup scenarios, the following parameters can be adapted: Backup Mode parameter: this parameter determines the backup trigger and the Main and Backup port. The following values can be selected: - Manual x (with x the GbE port number): the GbE port in question is main port and remains active until the Backup Mode parameter is changed. - Auto x (with x the GbE port number): the GbE port in question is main port and remains active as long as the links on this port is up Rev D 47
64 Chapter 2 Configuration Revertive parameter: this parameter determines the revertive mode. This parameter is only applicable if the Backup Mode parameter is set to Auto x. - Active: the backup port remains active until the link on the main port is up again. - Inactive: the backup port remains active until the link on backup port disappears and the link on the main port is up again. Revert Delay (s) parameter: the time the GbE link on the backup port must be down before the main port becomes active again. This parameter is only applicable if the Backup Mode parameter is set to Auto x. Trigger Alarm parameter: this parameter determines when a backup transition has to be executed: - Link Loss: a backup transition will be triggered when a Link Loss alarm occurs. - Link Loss and UDP Loss: a backup transition will be triggered when a Link Loss or UDP Loss alarm occurs. Changing the GbE Port Backup Parameters Perform the following steps to change the GbE port backup parameters of a GbE Interface Card. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the GbE Interface Card for which GbE port backup parameters must be changed. Result: The Interface sub page is displayed. 3 Select the Configuration - Backup link. Result: The Configuration - Backup sub page is displayed. 4 In the Backup Mode drop down box of the port set in question, select the desired backup mode. 5 In the Revertive drop down box, select the desired revertive mode Rev D
65 Scientific Atlanta Alarm PS 1 PS 2 Model D9900 Digital Content Manager (DCM) Scientific Atlanta Alarm PS 1 PS 2 Model D9900 Digital Content Manager (DCM) GbE Port Configuration 6 In the Revert Delay (s) box, enter the time the GbE link on the backup port must be down before the main port becomes active again. A delay can be entered between 0 and 60 seconds. 7 In the Trigger Alarm drop down box, select the desired backup-transitiontrigger-alarm. 8 Press the Apply command button to confirm or the Reload command button to abort the operation. Adding or Deleting Static ARP Table Entries Introduction For unicast IP streaming (1 sender and 1 receiver) within a particular LAN the DCM Supercrypt needs the knowledge of the MAC address of the device to which must be streamed. LAN Before the DCM Supercrypt starts streaming to a device with a particular IP address, it starts the Address Resolution Protocol (ARP) to identify the MAC address of this device by broadcasting an ARP request message and receiving an ARP reply message, which contains the MAC address, from the device. When a DCM Supercrypt is integrated into a unidirectional application, the system is not able to receive ARP reply messages after broadcasting ARP request messages. To deal with this the MAC address can manually be mapped to the IP address by adding a static ARP table entry. The ARP settings for the DCM Supercrypt are accommodated on the Configuration - ARP sub page Rev D 49
66 Chapter 2 Configuration To Add a Static ARP Table Entry The following procedure explains how to add a static ARP entry to the ARP table. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the GbE Interface Card for which static ARP entries should be added to the ARP table. Result: The Configuration - Interface sub page is displayed. 3 Point to the ARP link. Result: The Configuration - ARP sub page is displayed. 4 In the Add New Static ARP Entry table, tick the Port check box(s) of the port(s) for which a static ARP entry must be added. 5 In the IP Address box, enter the IP address. The octets of the IP address must be separated by dots. 6 In the MAC address box, enter the MAC address associated with the entered IP address. The octets of the MAC address must be separated by colons. 7 Click on the Add command button to confirm or the Reload command button to abort the operation. Result: After pressing the Add command button, the new Static ARP entry is added to the Static ARP Settings table. Deleting Static ARP Entries The following procedure explains how to delete Static ARP entries from the ARP table. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the GbE Interface card for which static ARP entries should be removed from the ARP table. Result: The Configuration - Interface sub page is displayed. 3 Click on the ARP link. Result: The Configuration - ARP sub page is displayed Rev D
67 GbE Port Configuration 4 Tick the check box(es) in front of the Static ARP entry (entries) that must be removed. Tip: To set the check boxes of consecutive rows in the Static ARP Settings table, tick the check box of the first row, press and hold down the SHIFT key, and tick the check box of the last row. 5 Press the Remove Checked Items command button to confirm or the Reload command button to abort the operation. Result: The selected entry (entries) is (are) removed from the Static ARP Settings table Rev D 51
68 Scientific Atlanta Alarm PS 1 PS 2 Digital Content Manager (DCM) Scientific Atlanta Alarm PS 1 PS 2 Digital Content Manager (DCM) Chapter 2 Configuration Adapting the Static Route Table Introduction When the DCM Supercrypt has to stream to a device situated outside the subnet the DCM Supercrypt belongs to, the Address Resolution Protocol is inadequate. To deal with this a Static Route Table must be setup containing the necessary information about the routes to that second network. Router LAN 1 LAN 2 Model D9900 Model D9900 DCM device A DCM device B In the illustration above DCM Supercrypt A requires the knowledge of the router port that participates into the subnet of the DCM Supercrypt and the IP settings of LAN 2 or DCM Supercrypt B. The static route settings can be found on the Configuration - Routes sub page Rev D
69 GbE Port Configuration To Add a New Static Route Entry The procedure below explains how to add a new static route entry to the static route table. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the GbE Interface Card for which static route entries should be added to the Static Route table. Result: The Configuration - Interface sub page is displayed. 3 Point to the Routes link. Result: The Configuration - Routes sub page is displayed. 4 In the Add New Static Route table, tick the Port check box(es) of the port(s) for which a static route entry must be created. 5 Tick the Default Gateway check box if a direct reachable IP router is used. Note: When the Default Gateway check box is set, both the IP address and the Subnet Mask parameter are not applicable. 6 In the IP Address box, enter the IP address of the destination network or destination host. The octets of the IP address must be separated by dots. 7 In the Subnet Mask box, enter the Subnet Mask of the destination network (when a host IP address is entered, this parameter is not relevant). The octets of the Subnet Mask must be separated by dots. 8 In the Gateway box, enter the IP address of the port of the router to the destination port. The octets of the Gateway must be separated by dots. 9 Press the Add command button to confirm or the Reload command button to abort the operation. Result: After pressing the Add command button, the new Static Route entry is added to the Static Route Settings table Rev D 53
70 Chapter 2 Configuration To Remove a Static Route Entry Perform the following steps to remove a static route entry from the static route entry table. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the icon of the GbE Interface card for which static route entries should be removed from the Static Route table. Result: The Configuration - Interface sub page is displayed. 3 Select the Routes link. Result: The Configuration - Routes sub page is displayed. 4 Tick the check box(es) in front of the entry (entries) that must be removed from the Static Route Settings table. Tip: To set the check boxes of consecutive rows in the Static Route Settings table, point to the check box of the first row that must be removed, press and hold down the [SHIFT] key, and point to the check box of the last row that must be removed. 5 Press the Remove Checked Items command button to confirm or the Reload command button to abort the operation. Result: After pressing the Remove Checked Items command button, the selected route entry (entries) will be removed from the Static Route Setting table Rev D
71 GbE Port Configuration Checking the Routes to Destination Devices Introduction Particular status parameters of the routes to destination devices to which should be streamed are categorized on the Status - Destinations sub page of the web browser user interface. The following picture shows an example of a Status - Destinations sub page. Tip: To sort the Destinations Overview table by a particular parameter, point to the table header of the parameter. You can toggle between ascending and descending order by pointing to the parameter header. The route parameters that can be found on the Status - Destinations sub page are. Port: represents the port number for the route. IP Address: represents the IP Address of the destination device. Routing: represents the status of the route to the destination device, possible values: Not Routable: no route to the destination device Routable (via Gateway): a route to the destination device exists, the destination device is situated in another sub net of the DCM Supercrypt port and the connection is established using a router. Routable (Destination in LAN): a route to the destination device exists. The destination device is situated in the same sub net of the DCM Supercrypt port. Not Applicable Rev D 55
72 Chapter 2 Configuration ARP: represents the result of ARP; possible values: Destination Resolved: the DCM Supercrypt received an ARP reply message from the destination device that is situated in the same sub net. Destination Unresolved: the DCM Supercrypt doesn't receive an ARP reply message from the destination device in the same sub net after broadcasting ARP request messages. Gateway Resolved: the destination device is situated in another sub net and the DCM Supercrypt receive an ARP reply message from the router to this sub net. Gateway Unresolved: the destination device is situated in another sub net and the DCM Supercrypt doesn't receive an ARP reply message from the router after broadcasting ARP request messages. Destination has Static ARP: the static ARP entry is used for the route to the destination device (same sub net) or to the router (different sub net). Multicast Not Applicable To Check the Routes to Destination Devices The following steps explain how to check the connection parameters of destination devices. 1 On the web browser user interface of the DCM Supercrypt, point to the Destinations link after clicking on the Status link. Result: The Status - Destinations sub page is displayed. 2 In the drop down box, select the interface card for which status parameters of the routes to destination devices must be checked. Result: The Destinations Overview table of the selected interface card is displayed Rev D
73 GbE Port Configuration Joining or Leaving GbE Ports to IGMP Multicast Groups Introduction The Internet Group Multicast Protocol (IGMP) is a dynamic protocol to register hosts in a Multicast Group on a particular LAN by exchanging IGMP messages. The DCM Supercrypt is compatible with IGMP version 1, 2, and 3. The IGMP settings of the DCM can be found on the Configuration - IGMP sub page. Joining a GbE Port to a Multicast Group Perform the following steps to join one or more GbE ports of a GbE Interface Card to a Multicast Group. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the GbE Interface card for which GbE port pair(s) must be added to a Multicast Group. Result: The Configuration - Interface sub page is displayed. 3 Point to the IGMP link. Result: The IGMP sub page is displayed. 4 In the Join or Modify Multicast Group table, tick the Port Pair check box(es) of the GbE port pair(s) that should be added to the Multicast Group Rev D 57
74 Chapter 2 Configuration 5 In the Multicast IP Address box enter the IP Address of the Multicast Group. The octets of the Multicast IP Address must be separated by dots. 6 In the Filter drop down box, select the source filtering: - Include: adds the IP address(es) to the include list of sources. An Include source list contains the IP addresses from which multicast reception is allowed. - Exclude: adds the IP address(es) to exclude list of sources. An Exclude source list contains the IP addresses from which multicast reception is not allowed. 7 In the Source IP Address box, enter the IP Address that must be added to the Include or Exclude source list. Notes: - When multiple IP addresses must be added to the source list, point to the Insert Row command button to enlarge the Join or Modify Multicast Group table and enter the IP Address in the corresponding Source IP Address box. - Successive IP addresses can be added to the source list by inserting a range. The following steps explain how to insert a range: Tick the Insert IP Address Range check box. In the First Source IP Address box, enter the first IP address of the range. In the Count box, enter the number of successive IP addresses. Point to the Insert Range command button. Result: The IP addresses are added to the Join or Modify Multicast Group table. 8 Click on the Join command button. Result: The IP addresses are added to the source list and appear in the IGMP Settings table. Notes: The source filtering can always be adapted by changing the filter parameters and pressing the Join command button. When no source IP addresses must be specified, select Exclude in the Filter drop down box without specifying source IP addresses. In a SNMPv2 environment the Filter parameter must be set to Exclude. When the network between a router and the DCM Supercrypt (using IGMPv3) is populated with snooping switches supporting IGMPv2, the Unsolicited IGMP Message parameter must be set to IGMPv Rev D
75 GbE Port Configuration Leaving the Multicast Group Membership of a GbE Port The following steps explain how to cancel a Multicast Group membership of a GbE port. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the GbE Interface card for which GbE ports must be removed from a Multicast Group. Result: The Interface sub page is displayed. 3 Point to the IGMP link. Result: The IGMP sub page is displayed. 4 In the IGMP Settings table, tick the check box(es) in front of the entry (entries) that must be removed. Tip: To set the check boxes of consecutive rows in the IGMP Settings table, point to the check box of the first row, press and hold down the SHIFT key, and point to the check box of the last row. 5 Press the Leave Checked Items command button to confirm or the Reload command button to abort the operation. Result: After pressing the Leave Checked Items command button, the entries are removed from the IGMP Settings table Rev D 59
76 Chapter 2 Configuration Checking the GbE Statistics Introduction The Status - GbE Statistics sub page represents more information concerning the overall statistics on traffic passing through each GbE port of the DCM Supercrypt. The values displayed are accumulated since the last start-up or the last reset. These figures can be refreshed by pressing the Reload command button. The counters on the Status - GbE Statistics sub page can also be shown in rate representation mode (number of frames per second). These figures are refreshed every 10 seconds. For some reasons it can be useful to switch off this automatic refresh action. Therefore if the representation mode is set to Rate, the Status - GbE Statistics sub page is provided with a Refresh drop down box that can be used to switch on (10 sec) or off (stop) the automatically refresh action. The following list describes the counters shown on the Status - GbE Statistics sub page. Frames Received OK - Total frames received: the total number of error-free frames received by the corresponding port - Broadcast frames: the number of frames successfully received by the corresponding port and which were directed to the broadcast address - Multicast frames: the number of frames successfully received by the corresponding port and which are directed to a multicast address - Control frames: the number of error-free frames received by the corresponding port, of which the Length/Type field was provided with the special Control Frame ID - VLAN tagged frames: then number of error-free VLAN frames received by the corresponding port - Pause frames: the number of pause frames received by the corresponding port - 64 byte frames: the number of error-free frames received by the corresponding port, which had a length of 64 bytes byte frames: the number of error-free frames received by the corresponding port, which had a length between 65 and 127 bytes byte frames: the number of error-free frames received by the corresponding port, which had a length between 128 and 255 bytes byte frames: the number of error-free frames received by the corresponding port, which had a length between 256 and 511 bytes Rev D
77 GbE Port Configuration byte frames: the number of error-free frames received by the corresponding port, which had a length between 512 and 1023 bytes max byte frames: the number of error-free frames received by the corresponding port, which were between 1024 bytes and the maximum length as specified by IEEE Oversized frames: the number of frames received by the corresponding port, of which the length exceeds the maximum length as specified by IEEE Reception Errors (Counters) - FCS/CRC error: the total number of packets received by the corresponding port, which had a length between 64 and 1518 bytes, but had either a bad Frame Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error) - Length/Type out of range: the number of frames received by the corresponding port, which had a length of at least 64 bytes and where the length/type field contained a length value that did not match the number of MAC client data bytes received - Invalid Opcode: the number of error-free frames received by the corresponding port, of which the Length/Type field was provided with MAC Control type identifier but with opcode other than the PAUSE opcode - Undersized frames: the number of error-free, well-formed frames received by the corresponding port, which had a length less then 64 bytes - Fragments: the number of frames received by the corresponding port, which had a length less than 64 byte and with a bad Frame Check Sequence field Tx Counters - Total frames transmitted: the total number of error-free frames transmitted by the corresponding port - Broadcast frames: the number of error-free frames transmitted by the corresponding port to a broadcast address - Multicast frames: the number of error-free frames transmitted by the corresponding port to a multicast address - Control frames: the number of error-free frames transmitted by the corresponding port, of which the Length/Type field were provided with the MAC Control Frame type identifier byte frames: the number of error-free frames transmitted by the corresponding port, which had a length of 64 bytes Rev D 61
78 Chapter 2 Configuration byte frames: the number of error-free frames transmitted by the corresponding port, which had a length between 65 and 127 bytes byte frames: the number of error-free frames transmitted by the corresponding port, which had a length between 128 and 255 bytes byte frames: the number of error-free frames transmitted by the corresponding port, which had a length between 256 and 511 bytes byte frames: the number of error-free frames transmitted by the corresponding port, which had a length between 512 and 1023 bytes max byte frames: the number of error-free frames transmitted by the corresponding port, which were between 1024 bytes and the maximum length as specified by IEEE VLAN tagged frames: then number of error-free VLAN frames transmitted by the corresponding port - Pause frames: the number of pause frames transmitted by the corresponding port Transmission errors (Counters) - Oversized frames: the number of frames transmitted by the corresponding port, of which the length exceeds the maximum length as specified by IEEE Buffer underrun: the number of frames discarded because the transmit buffer became empty during frame transmission Global (Counters) - Total Bytes received: the total number of bytes received by the corresponding port - Total Bytes transmitted: the total number of bytes transmitted by the corresponding port Rev D
79 GbE Port Configuration Checking the GbE Statistics The following procedure explains how to check the GbE statistics. 1 On the web browser user interface of the DCM Supercrypt, point to GbE Statistics link after clicking on the Status link. Result: GbE statistics are displayed. Tip: To sort the Rx and Tx Counters tables by a particular parameter, point to the table header of the parameter. Toggle between ascending and descending order by pointing to the parameter header. 2 In the Card drop down box, select the card for which GbE statistics should be checked. 3 In the Mode drop down box, select Rates or Counters. 4 In the Refresh drop down box, select 10 sec or Stop Rev D 63
80 Chapter 2 Configuration General Configuration Changing Default Values for Settings of Incoming Transport Streams Introduction About the Input Standard The type of a component in a service is indicated using the stream_type parameter in the Program Map Table (PMT). Depending on the standard, the association between the component type and the stream_type number differs, see table below. Stream Type Mode\PID 0x01 (1) 0x02 (2) 0x03 (3) 0x04 (4) 0x06 (6) 0x80 (128) 0x81 (129) DVB Video Video Audio Audio Res Res ATSC Video Video Audio Audio Audio Res (Video) Audio DC-II Video Video Audio Audio Video AC-3 For particular digital processes, the DCM Supercrypt requires the knowledge of this component type - stream_type association, therefore the standard must be given for each incoming Transport Stream. The standard of an incoming Transport Stream is default set to DVB. When most of the incoming Transport Streams belong to another standard, it can be useful to change this default value. About the Default Service Loss Trigger Parameters For each incoming service, one or more alarms can be defined to trigger a service loss alarm. When incoming services must be defined with the same service loss trigger alarms, the configuration can be simplified by using default settings. Each new incoming service and each incoming service for witch the Service Loss - Mode is set to Default will be configured with these settings. Note: The Default Service Loss Trigger parameters are dynamic, meaning when these default parameters are changed, all incoming services for which the Service Loss mode is set to Default will get these new settings. Changing the Default Values for Settings of Incoming Transport Streams The following procedure explains how to change default values for the settings of incoming transport stream. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the interface card for which default settings should be changed. Result: The Configuration - Interface sub page of the selected interface card is displayed. 3 Point to the Default Settings link Rev D
81 Result: The Configuration - Default Settings sub page is displayed. General Configuration 4 In the Input Standard drop down box, select the desired value. 5 In the Default Service Loss Trigger table, perform the following steps to configure the default settings for service loss trigger: a In the Mode drop down box, select the desired service loss trigger mode: Disabled: service loss alarm trigger is disabled Specific: the alarms to activate a service loss alarm are selectable b When the Mode parameter is set to Specific, set the check boxes for the alarms that have to activate a service loss alarm: TS Sync Loss (ASI Interface Card only), UDP Stream Loss (GbE Interface Card only) Missing in PAT, PMT Error, and/or PID Error. 6 Press the Apply command button to confirm or the Reload command button to abort the operation Rev D 65
82 Chapter 2 Configuration Changing Default Values for Settings of Outgoing Transport Streams Introduction Each time an outgoing Transport Stream is added to a port, certain parameters are configured using default values. To reduce the number of parameter adaptations during configuring outgoing Transport Streams, particular default settings can be changed. These parameters are: The bit rate for the Transport Stream The playout interval for the Service Information (SI) tables The IP settings of the destination device to which the outgoing Transport Stream should be streamed When a Transport Stream is added to a port, the IP settings to which should be streamed are adapted using one of the following increment schemes: - IP Address: the default IP address for the new created Transport Stream is equal to the IP address of the previous created outgoing Transport Stream increased by one. - UDP Port + 1: the UDP port for the new created Transport Stream is equal to the UDP port of the previous created Transport Stream increased by one. - UDP Port + 2: the UDP port for the new created Transport Stream is equal to the UDP port of the previous created Transport Stream increased by two. The Output Protocol Determines the presence of an RTP header in the header of the IP packets in which the outgoing Transport Stream is encapsulated. RTP stands for real time transport protocol and is the protocol standard for streaming media (video conferencing, audio conferencing, video streaming over the internet etc...). The Output Rate Defined outgoing Transport Streams with fixed bit rates of variable bit rates. The Output Standard The service type coding used by particular set top boxes differs according to the standard. Therefore the DCM Supercrypt allows remapping of the PMT Elementary Stream_Type by changing the Output Standard mode. The following table gives the PMT Elementary Stream_Type remapping possibilities. Output Standard Mode Video 1st Audio 2nd Audio 3rd Audio 4th Audio Transparent pass pass pass pass pass Force Video force 0x2 pass pass pass pass Force Uplink force 0x2 force 0x3 force 0x81 pass pass Force Audio 3 force 0x2 pass pass force 0x6 pass Rev D
83 General Configuration The VLAN settings Determines the presence of VLAN Tags in the header of the IP packets in which the outgoing Transport Stream is encapsulated. Changing the Default Settings for Outgoing Transport Streams The following procedure explains how to change the default settings for outgoing Transport Streams. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the icon of the Interface card for which the default setting must be changed. Result: The Configuration - Interface sub page is displayed. 3 Select the Default Settings link. Result: The Configuration - Default Settings sub page is displayed. Note: The picture above shows the Default Settings page for a GbE Interface card Rev D 67
84 Chapter 2 Configuration 4 In the TS Default Settings table, perform the following steps to define the default Transport Stream settings. a In the Start IP Address box, enter the default IP address. The octets of the IP address must be separated by dots. Note: IP Address is not allowed. When the IP Address increment scheme is used, this IP address will be the IP Address of the first added Transport Stream for this port. When the UDP Port + 1 or UDP Port + 2 increment scheme is used, this IP address is the default IP address for all new created Transport Streams. b In the Start UDP Port box, enter the default UDP Port number. Note: When the UDP Port + 1 or UDP Port + 2 increment scheme is used, this number is the UDP port number of the first added Transport Stream. When the IP Address increment scheme is used, this number is the default UDP port number for all new created Transport Streams. When IP packets are enlarged by an RTP Header (Output Protocol parameter set to RTP), the Start UDP Port number must be even and the UDP Port + 1 increment scheme can't be used. c In the Bit Rate (Mbps) box, enter the default maximum bit rate for all new created Transport Stream. Note: This parameter is not applicable when the Output Rate parameter is set to VBR. d In the Increment Scheme drop down box, select the desired increment scheme. Note: When IP packets are enlarged by an RTP Header (Output Protocol parameter set to RTP) UDP Port + 1 increment scheme can't be used. e In the Output Protocol drop down box, select the desired protocol: RTP: the IP packets are enlarged with RTP Header. UDP: the IP packets are not enlarged with RTP header. f In the Output Rate drop down box, select CBR to define Transport Streams with constant bit rate or VBR to define Transport Streams with variable bit rate. g In the Output Standard drop down box, select the desired output standard mode. 5 In the Default SI Table Playout table, enter a playout interval for the PAT, CAT, PMT, and/or SDTA. 6 In the Default VLAN Settings table, perform the following steps to configure the default VLAN settings. a Tick the VLAN On check box to switch on VLAN Tagging. b In the ID box, enter the VLAN identifier Rev D
85 c In the Priority box, enter the VLAN priority. General Configuration 7 Press the Apply command button to confirm or the Reload command button to abort the operation. Changing the Display Mode Introduction In the web browser user interface of the DCM Supercrypt, the display mode for the following parameters can be set to decimal or to hexadecimal: Original Network Identifier (ON ID) Transport Stream Identifier (TS ID) Service Identifier (SID) Packet Identifier (PID) Private Data Packet Identifier (PD PID) Generated Entitlement Management Message Packet Identifier (EMM PID) The value of a parameter for which the display mode is set to hexadecimal is prefixed by 0x. The display mode for the Private Data and generated EMM PIDS is configurable for the complete device and the display mode for the ON IDs, TS IDs, SIDs, and PIDs per interface card. To Change the Display Mode of ON IDs, TS IDs, SIDs, and/or PIDs The following procedure explains how to change the display mode for ON IDs, TS IDs, SIDs, and/or PIDs. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the interface card for which the display mode for ON ID, TS ID, SID, or PID should be changed. Result: The Configuration - Interface sub page is displayed. 3 Point to the Defaults Settings link. Result: The Configuration - Default Settings sub page is displayed Rev D 69
86 Chapter 2 Configuration 4 In the Display Mode box, select Decimal or Hex in the drop down box of the identifier in question. 5 Press the Apply command button to confirm or the Reload command button to abort the operation. To Change the Display Mode of Private Data and Generated EMM PIDs The following procedure explains how to change the display mode for Private Data and generated EMMs 8. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 Point to the Defaults Settings link. Result: The Configuration - Default Settings sub page is displayed. 8 Generated Entitlement Management Messages (EMMs) are messages received from an Entitlement Management Message Generator via the EMMG to MUX interface and passed to an outgoing Transport Stream Rev D
87 General Configuration 3 In the Input Gen. EMM and Private Data PIDs drop down box, select Decimal or Hex. 4 Point to the Apply command button to confirm or the Reload command button to abort the operation Rev D 71
88
89 3 Chapter 3 Service Routing Introduction This chapter outlines the procedures to set up and to change service routing using the web browser user interface and how to create and to upload a service routing file. In This Chapter Description Creating Service Routing Files Uploading and Downloading Service Routings Changing Service Routing Settings Rev D 73
90 Chapter 3 Service Routing Description The routings of services from incoming Transport Streams to outgoing Transport Streams are categorized in the Service Grooming table on the Service - Table view sub page of the DCM Supercrypt web browser user interface. The following picture depicts a Service Grooming table populated with service routings. The Service Grooming table can be populated by adding individual service routings using the web browser user interface or by uploading a service routing file. When a service routing file is uploaded to the DCM Supercrypt the service routings of the device will be replaced by the service routings in the file. Due to the huge number of services (4 x 500 services) that can be processed by the DCM Supercrypt, it is recommended to populate the Service Grooming table by uploading a service grooming file. More information about service routings files can be found in topic Creating Service Routing Files on page 76. Once the Service Grooming table is populated with service routings, this table can always be adapted by adding or removing service routings using the web browser user interface. For more information concerning adapting the Service Grooming table using the web browser interface, please refer to topic Changing Service Routing Settings on page Rev D
91 Description For service routing adaptation purposes the Service Grooming table can also be exported to a PC. The procedure to export a Service Grooming table to a PC is described in topic Downloading the Service Routings on page 80. WARNING: After uploading a service routing file, all service routings of the DCM Supercrypt will be removed and replaced by the service routings of the file. During this action the services at the outputs disappear for a while. When a discrete number of changes must be done to the service routings of a DCM Supercrypt it is recommended to do this using the web browser user interface instead of uploading a new service routing file Rev D 75
92 Chapter 3 Service Routing Creating Service Routing Files Introduction As described in the previous topic, the Service Grooming table of the DCM Supercrypt can be populated with service routings by uploading a service routing file. Such service routing file can be created using a standard text editor like Notepad or using Microsoft Excel. The illustrations below show a service routing file opened with Notepad and a service routing file opened with Microsoft Excel. Note: The DCM Supercrypt is provided with a sample routing file. This sample routing file can be downloaded from the DCM Supercrypt by pressing the Download command button on the Service - Table View sub page Rev D
93 Creating a Service Routing File Creating Service Routing Files A service routing file is build up in two parts, viz.: an Identification part and a Service Routings part (see illustration below). Title Service Routings Both lines in the Identification part of the service routing file are mandatory and have the following syntax: DCM_ROUTING_FILE VERSION,1 Note: Version and 1 must be separated by a comma. A row in the Service Routings part consist of a number of parameters each separated by a comma. These parameters are: Input - Card: the slot position of the interface card that enters the service that must be routed 2 Input - Port: the number of the port that enters the service that must be routed 3 Input - IP Address: the IP Address to which the source device streams. The octets of the IP address must be separated by dots. 4 Input - UDP Port: the UDP port number of the input port that enters the Transport Stream 5 Input - SID: the service identifier of the service that must be routed 6 Output - Card: the slot position of the card that streams the outgoing Transport Stream to which the service should be routed 7 Output - Port: the number of the port that streams this Transport Stream 8 Output - IP Address: the IP Address of the destination device to which this Transport Stream streams. The octets of the IP address must be separated by dots. 9 Output - UDP Port: the number of the UDP port of the destination device to which this Transport Stream streams 10 Output - ON ID: the Original Network Identifier for this Transport Stream 11 Output - TS ID: the Transport Stream Identifier for this Transport Stream Rev D 77
94 Chapter 3 Service Routing 12 Output - TS Bit Rate (Mbps): the maximum bit rate for this Transport Stream 13 Output - SID: the Service Identifier for the routed service 14 Output - Name: the name for the routed service To enhance the readability of the service routing file or to provide additional information, comment lines can be added. A comment line should be prefixed by a hash mark (#). The following picture depicts a service routing file with comments. Since Microsoft Excel is able to import and to create comma-delimited text files, a service routing file can be created and/or adapted using this spreadsheet application. Once the service routing file is ready, this file should be saves as a comma-delimited file (CSV extension) Rev D
95 Uploading and Downloading Service Routings Uploading and Downloading Service Routings Uploading a Service Routing File The following procedure describes how to upload a service routing file to a DCM Supercrypt. WARNING: After uploading a service routing file, all service routings of the DCM Supercrypt will be removed and replaced by the service routings of the file. During this action the services at the outputs disappear for a while. When a discrete number of changes must be done to the service routings of a DCM Supercrypt it is recommended to do this using the web browser user interface instead of uploading a new service routing file. For more information about changing service routings via the web browser user interface, please refer to topic Changing Service Routing Settings on page 81. Note: During the service routing uploading process particular parameters get default values. Therefore these default values should be configured properly before the service routing uploading process can be started. The procedure to configure the default values can be found in topic Changing Default Values for Settings of Outgoing Transport Streams on page On the web browser user interface of the DCM Supercrypt, click on the Table View link after pointing to the Service link. Result: The Service - Table View sub page is displayed. 2 Point to the Browse command button. Result: The Choose file dialog is displayed. 3 Browse to the service routing file and select this file. 4 Click on the Open command button. Result: The Choose file dialog is closed and the name of the path and the file name appear in the Install Routing File: box Rev D 79
96 Chapter 3 Service Routing 5 Point to the Start command button. Result: A confirmation popup window is displayed. 6 Press the OK command button to confirm or the Cancel command button to abort the operation. Result: The Routing Status indicator is displayed. Note: When the DCM Supercrypt is not properly configured or when the service routing file contains errors, error messages appear in the Routing Status table. The following picture shows a Routing Status table containing an error message. Downloading the Service Routings The web browser user interface of DCM Supercrypt allows downloading the file containing the service routings to a PC. The following procedure explains how to download the service routings. 1 On the web browser user interface of the DCM Supercrypt, click on the Table View link after pointing to the Service link. Result: The Service - Table View sub page is displayed. 2 Click on the Export command button. Result: The File Download dialog is displayed. 3 Point to the Save command button. Result: The Save As dialog is displayed. Note: If the file should be saved in a different folder, locate and open the folder. 4 In the File Name box, enter a name for the file. 5 Click on the Save command button to confirm or the Cancel command button to abort the operation Rev D
97 Changing Service Routing Settings Changing Service Routing Settings Adding a Service Routing Perform the following steps to add service routings. 1 On the web browser user interface of the DCM Supercrypt, click on the Table View link after pointing to the Service link. Result: The Service - Table View sub page is displayed. 2 Click on the Add command button at the bottom of the page. Result: The Add New Routing table is displayed. 3 In the Input - Card drop down box, select the name of the interface card that enters the service that must be routed. 4 In the Input - Port drop down box, select the name of the port that enters the service that must be routed. 5 In the Input - Type drop down box, select the input port type, viz.: - GbE Unicast: for an GbE Unicast input port - GbE Multicast: for a GbE Multicast input port When a router is used between the streaming device and the DCM, the GbE port receiving the stream must be joined to the multicast group. 6 In the Input - IP Address box, enter the multicast IP address to which the source device streams. The octets must be separated by dots. Note: The Input IP Address box is only applicable if the Input Type drop down box is set to GbE Multicast Rev D 81
98 Chapter 3 Service Routing 7 In the Input - UDP Port box, enter the UDP port number of the input port that enters the Transport Stream. 8 In the Input - SID box, enter the service identifier of the service that must be routed. 9 In the Output - Card drop down box, select the name of the interface card that streams the outgoing Transport Stream to which the service should be routed. 10 In the Output - Port drop down box, select the name of the port that streams this outgoing Transport Stream. 11 In the Output - Type drop down box, select the port type, viz.: - GbE Unicast: for an GbE Unicast port - GbE Multicast: for a GbE Multicast port 12 In the Output - IP Address box, enter the IP address of the destination device to which this Transport Stream streams. The octets must be separated by dots. 13 In the Output - UDP Port box, enter the number of the UDP port of the destination device to which this Transport Stream streams. 14 In the Output - ON ID box, enter an Original Network Identifier for this Transport Stream. 15 In the Output - TS ID box, enter a Transport Stream Identifier for this Transport Stream. 16 In the Output - TS Bit Rate (Mbps) box, enter the maximum bit rate for this Transport Stream. 17 In the Output - SID box, enter a service identifier for routed service. 18 In the Output - Name box, enter a name for the routed service. 19 Press the Add command button to confirm Rev D
99 Changing Service Routing Settings Removing Service Routings The following steps explain how to remove service routings. 1 On the web browser user interface of the DCM Supercrypt, point to the Table View link that appears after clicking on the Service link. Result: The Service - Table View sub page is displayed. 2 In the Service Grooming table, tick the check box(es) in front of the routing(s) that should be removed. Tips: - To tick the check boxes of consecutive rows in the Service Grooming table, tick the check box of the first row, press and hold down the [SHIFT] key, and point to the check box of the last row. - When the Service Grooming table is populated with a large number of service routings, the rows in this table can be filtered by defining a filter in the View table. A filter is defined by selecting a particular value in the Input/Output, Card, and Active drop down box. - To sort the Service Grooming table by a particular parameter, click on the table header of the parameter. Toggle between ascending and descending order by pointing to the header. 3 Press the Remove Checked Items command button to confirm. Result: After pressing the Remove Checked Items command button, the service routing rows are removed from the Service Grooming table Rev D 83
100 Chapter 3 Service Routing Changing the Standard of an Incoming Transport Stream Introduction The type of a component in a service is indicated using the stream_type parameter in the Program Map Table (PMT). Depending on the standard, the association between the component type and the stream_type number differs, see table below. Stream Type Mode\ PID 0x01 (1) 0x02 (2) 0x03 (3) 0x04 (4) 0x06 (6) 0x80 (128) 0x81 (129) DVB Video Video Audio Audio Res Res ATSC Video Video Audio Audio Audio Res (Video) Audio DC-II Video Video Audio Audio Video AC-3 For particular digital processes, the DCM Supercrypt requires the knowledge of this component type - stream_type association, therefore the standard must be given for each incoming Transport Stream. The Input Standard mode of an incoming Transport Stream is default set to DVB. When most of the incoming Transport Streams are compliant with another standard, it is useful to change this default value. For more information about changing this default value, please refer to topic Default Values for Settings of Incoming Transport Streams on page 64. Changing the Input Standard The following procedure describes how to change the standard of an incoming Transport Stream. 1 On the web browser user interface of the DCM Supercrypt, point to the Table View link that appears after clicking on the Service link. Result: The Service - Table View sub page is displayed. Tips: - When the Service Grooming table is populated with a large number of service routings, the rows in this table can be filtered by defining a filter in the View table. A filter is defined by selecting a particular value in the Input/Output, Card, and Active drop down box. - To sort the Service Grooming table by a particular parameter, click on the table header of the parameter. Toggle between ascending and descending order by pointing to the header. 2 Point to the Input Services - TS ID parameter of the Service Routing row for which the service name should be changed Rev D
101 Result: The TS Settings and Service Settings table are displayed. Changing Service Routing Settings 3 In the Input Standard drop down box, select the desired input standard mode. 4 Press the Apply command button to confirm or the Reload command button to abort the operation. Changing Settings of Outgoing Transport Streams Introduction For each outgoing Transport Stream the DCM Supercrypt needs the knowledge of the following Transport Stream parameters: IP Address: IP Address of the destination port to which the outgoing Transport Stream must stream UDP Port: UDP port number of the destination port to which the outgoing Transport Stream must stream ON ID: the Original Network Identifier (ON ID) labels the outgoing Transport Stream with the source network of the Transport Stream. TS ID: the Transport Stream Identifier (TS ID) is used to identify the outgoing Transport Stream from other Transport Streams in the application. Total Bit Rate (Mbps): The maximum bit rate that can be used by the corresponding Transport Stream. This parameter is not applicable if the Output Rate parameter is set to VBR Rev D 85
102 Chapter 3 Service Routing Output Standard: the service type coding used by particular set top boxes differs according to the standard. Therefore the DCM Supercrypt allows remapping of the PMT elementary stream_type by changing the Output Standard mode. The following table gives the PMT Elementary Stream_Type remapping possibilities. Output Standard Mode Video 1st Audio 2nd Audio 3rd Audio 4th Audio Transparent pass pass pass pass pass Force Video force 0x2 pass pass pass pass Force Uplink force 0x2 force 0x3 force 0x81 pass pass Force Audio 3 force 0x2 pass pass force 0x6 pass Output Protocol: The IP packets in which an outgoing Transport Stream is encapsulated can be enlarged with an RTP header (RTP streaming). RTP stands for real time transport protocol and is the protocol standard for streaming media (video conferencing, audio conferencing, video streaming over the internet etc.). - RTP: the IP packets are enlarged with RTP Header. - UDP: the IP packets are not enlarged with RTP header. Note: The UDP port number may never be an odd number when the IP packets are enlarged with an RTP header. Streaming: For backup or configuration purposes it can be useful to enable or disable streaming of the Transport Stream through the output port. Stopped: streaming of the Transport Stream is disabled. Active: streaming of the Transport Stream is enabled. (Output) Rate: The bit rate of an outgoing Transport stream can be fixed or variable. Set the Output Rate mode to CBR to define a constant bit rate Transport Stream or VBR to define a variable bit rate Transport Stream. VLAN Settings: The IP packets in which an outgoing Transport Stream is encapsulated can be enlarged with a VLAN header including VLAN Identifier (VLAN ID) and VLAN Priority. The VLAN ID parameter ranges from 0 to 4094 and the VLAN Priority parameter from 0 to 7. Note: During the Outgoing Transport Stream creation process certain TS settings are automatically filled by default values. The procedure to change these default values is described in topic Changing Default Values for Settings of Outgoing Transport Streams on page Rev D
103 Changing Service Routing Settings To Change the Parameters of an Outgoing Transport Stream The following procedure explains how to change settings of an outgoing Transport Stream. 1 On the web browser user interface of the DCM Supercrypt, point to the Table View link that appears after clicking on the Service link. Result: The Table View sub page is displayed. Tips: - When the Service Grooming table is populated with a large number of service routings, the rows in this table can be filtered by defining a filter in the View table. A filter is defined by selecting a particular value in the Input/Output, Card, and Active drop down box. - To sort the Service Grooming table by a particular parameter, click on the table header of the parameter. Toggle between ascending and descending order by pointing to the header. 2 In the Service Grooming table, point to the Output Services - Port parameter containing the outgoing Transport Stream for which settings must be changed. Result: The Service - TS Output sub page is displayed containing the settings of the outgoing Transport Streams on the selected port. Tip: The TS Output sub page of an individual Transport Stream can be opened by clicking on the TS ID of the corresponding Transport Stream in the Service Grooming table. 3 In the TS Settings table, modify the parameters. 4 Press the Apply command button to confirm or the Reload command button to abort the operation Rev D 87
104 Chapter 3 Service Routing Tip: When particular parameters of all Transport Streams on a port must be changed to similar values, the Update all TS function of the web browser user interface can be used. The following procedure explains how to use this function. 1 In the Update all TS table, enter the desired value in the box or select the desired value in the drop down of the parameter that should be changed for all Transport Streams on the selected port. 2 Press the Update command button. Result: The settings are changed in the TS Settings table. Note: Particular values in the TS Settings table can still be changed if necessary. 3 Press the Apply command button to confirm or the Reload command button to abort the operation. To Change VLAN Settings The following procedure describes how to change VLAN settings for multiple Transport Streams of a particular port. 1 On the web browser user interface of the DCM Supercrypt, point to the Tree View link after clicking on the Service link. Result: The Service - Tree View sub page is displayed. 2 In the DCM Outputs tree, browse to the output port containing the Transport Streams for which VLAN settings must be changed. 3 Double-click on the port or right-click on the port and point to View Port Settings in the short-cut menu. Result: The Service - TS Output page of the selected port is displayed. 4 Point to the TS Advanced link. Result: The Service - TS Advanced sub page is displayed. 5 In the VLAN Settings table, modify the parameters. 6 Press the Apply command button to confirm or the Reload command button to abort the operation Rev D
105 Changing Service Routing Settings Tip: When particular VLAN parameters for all Transport Streams on a port must be changed to similar values, the Update all TS function of the web browser user interface can be used. The following procedure describes how to use this function. 1 In the Update all TS table, enter the desired value in the corresponding box or set or clear the VLAN Enable check box. 2 Press the Update command button. Result: The settings are changed in the TS Settings table for all Transport Streams. Press the Apply command button to confirm or the Reload command button to abort the operation. Changing Settings of Incoming Services User Name Parameter When no SDTa is available, a user name can be used by the web browser user interface to identify the service. A name with maximum 255 characters can be given, double-quotes in the name are not allowed. Service Loss Alarm Triggers The triggers to activate a service loss alarm are configurable. The following list describes the triggers that can be used to activate a service loss alarm: UDP Stream Loss: a service loss alarm will be activated when the port of the incoming Transport Stream to which the service belongs no longer detects packets at the corresponding UDP port. Missing in PAT: a service loss alarm will be activated when the PMT reference in the PAT for the service is missing. A trigger will also be given when the PAT of the incoming Transport Stream to which the service belongs is missing after a device reboot action. PMT Error: a backup transition will be triggered when the PMT for the service is not available within a particular time interval or contains errors. PID Error: a backup transition will be triggered when components with PMT reference are not found within a particular time interval. When PID Error is selected, a trigger can be given for each missing component in the service (PID Type parameter: Any) or a list can be entered (PID List parameter) containing the PIDs of the components (PID type parameter: List) for which a trigger must be given. The PID Error / PID List combination act as a filter for the generated PID Errors. PIDs for components which have no reference in the PMT of the service will be ignored (also PMT PIDs or other SI PIDs) Rev D 89
106 Chapter 3 Service Routing The DCM Supercrypt handles a particular alarm hierarchy. E.g. if a UDP Stream Loss is detected, Missing in PAT, PMT Error, an PID Error will not be triggered. This means that the DCM will not activate a service loss alarm when a TS Sync Loss is detected and TS Sync Loss is not defined as Service Loss trigger even if other alarms are defined to activate a service loss alarm. The following table shows this alarm hierarchy. Hierarchy Alarm 1 UDP Stream Loss 2 Missing in PAT 3 PMT Error 4 PID Error Note: Depending on the setting of the Generate Alarms parameter, alarms can be generated for all incoming services or only for groomed services. For more information concerning the Generate Alarms parameter, please refer to topic Configuring the Settings of the Interface Alarms on page 118. Perform the following procedure to change settings of incoming services. 1 On the web browser user interface of the DCM Supercrypt, point to the Table View link that appears after clicking on the Service link. Result: The Service - Table View sub page is displayed. Tips: - When the Service Grooming table is populated with a large number of service routings, the rows in this table can be filtered by defining a filter in the View table. A filter is defined by selecting a particular value in the Input/Output, Card, and Active drop down box. - To sort the Service Grooming table by a particular parameter, click on the table header of the parameter. Toggle between ascending and descending order by pointing to the header. 2 Point to the Input Services - TS ID parameter of the Service Routing row for which the service settings should be changed. Result: The TS Settings and Service Settings table are displayed Rev D
107 Changing Service Routing Settings 3 Enter a name for the service in the User Name box. 4 In the Service Loss - Mode drop down box, select the desired service loss trigger mode: Disabled: service loss alarm trigger is disabled Specific: the alarms activating a service loss alarm are selectable 5 When the Service Loss - Mode parameter is set to Specific, set the check boxes for the alarms that have to activate a service loss alarm: UDP Stream Loss, Missing in PAT, PMT Error, and/or PID Error. 6 When Service Loss - PID Error is set as trigger, select one of the following settings in the Service Loss - PID Type drop down box: Any: a trigger will be given when one of the components within the incoming service is missing. List: a trigger will be given when one of the components as specified in the PID list box is missing. 7 When List is selected in the Service Loss - PID Type drop down box, enter the PID of the components(s) for which a trigger must be given when missing. Multiple PIDs must be separated by commas. 8 Click on the Apply command button to confirm or the Reload command button to abort the operation Rev D 91
108 Chapter 3 Service Routing Changing the SID of an Outgoing Service Perform the following steps to change the Service Identifier (SID) of an outgoing service. 1 On the web browser user interface of the DCM Supercrypt, point to the Table View link that appears after clicking on the Service link. Result: The Table View sub page is displayed. Tips: - When the Service Grooming table is populated with a large number of service routings, the rows in this table can be filtered by defining a filter in the View table. A filter is defined by selecting a particular value in the Input/Output, Card, and Active drop down box. - To sort the Service Grooming table by a particular parameter, click on the table header of the parameter. Toggle between ascending and descending order by pointing to the header. 2 In the Service Grooming table, point to the Output Services - TS ID value of the Transport Stream for which the SID of services belonging to this Transport Stream must be changed. Result: The Service - TS Output sub page is displayed. 3 Point to the Service link. Result: The Service Settings table is displayed. 4 Tick the Forced SID check box in the row of the service for which the ID must be changed. 5 In the Forced SID box, enter a unique service identifier. Note: The new SID can be entered using the decimal or hexadecimal notation, independent of the display mode. A hexadecimal value must be prefixed by 0x. For more information concerning the display mode, please refer to topic Changing the Display Mode on page Rev D
109 Changing Service Routing Settings 6 Press the Apply command button to confirm or the Reload command button to abort the operation. Notes: After clearing the Forced SID box, the service will not be remapped to its original value, you have to change the SID manually as described in the procedure above. In the Service Settings table, a service is identified using the following parameters: Input - Card: the interface card of the incoming Transport Stream to which the service belongs - Port: the port of the incoming Transport Stream to which the service belongs - IP Address: the IP address of the destination device - UDP port: the UDP port number of the destination device - ON ID: the Original Network Identifier of the incoming Transport Stream to which the service belongs - TS ID: the Transport Stream Identifier of the incoming Transport Stream to which the service belongs - SID: Service Identifier of the incoming service - Name: Name of the incoming service Output - SID: the Service Identifier of the outgoing service. - Forced SID: the Service Identifier of the outgoing service used SID changing purposes (see procedure above) - Name: the name of the outgoing service When services must be removed from the outgoing Transport Stream, tick the check box(es) of the service(s) that must be removed and point to the Remove Checked Items command button Rev D 93
110
111 4 Chapter 4 Scrambling Configuration Introduction This chapter outlines the integration of a DCM Supercrypt into a scrambling application. In This Chapter Introduction Changing the Scrambling Properties Entitlement Control Message Generators Event Information Schedulers Rev D 95
112 Chapter 4 Scrambling Configuration Introduction General The scrambling-specific configuration parameters of the DCM Supercrypt, which are connected to the computer running the ROSA software, can be adapted using ROSA s SCS Configurator. Note: In applications wherein the DCM Supercrypt participates, the Event Information Scheduler functionality is performed by a third party EIS. For test purposes this functionality can be taken over by Scientific Atlanta's AC Manager Component and Scrambling Control Task. More information concerning the AC Manager Component can be found in appendix Configuring the Access Criteria on page 179 and more information about Scrambling Control Task in appendix Scrambling Control on page 201. About the SCS Configuration GUI After opening the SCS Configurator user interface, all DCM Supercrypt devices that are mapped into the Server Explorer of ROSA NMS can be found on the Configuration tab of the GUI Rev D
113 Introduction The SCS Configurator allows configuring the scrambling specific parameters and assigning the following CA interfaces: Entitlement Control Message Generator (ECMG) interfaces Event Information Scheduler (EIS) interfaces Note: The number of CA interfaces that can be assigned to a DCM Supercrypt using the SCS Configurator is restricted to 20. Icons indicate the status of the connection between the interfaces and the DCM Supercrypt. The following table describes the connection status icons. Status Icon Description The connection between the DCM Supercrypt and the ECM Generator is closed. The ECM Generator tries to connect to the DCM Supercrypt. The connection between the ECM Generator and the DCM Supercrypt is in channel establishing state. The channel between the ECM Generator and the DCM Supercrypt is open Rev D 97
114 Chapter 4 Scrambling Configuration Changing the Scrambling Properties Introduction The SCS Configurator allows changing the following scrambler properties: Check Scrambling Control Group at Provisioning Time Option When the Check SCG at Provisioning Time function is switched on and the Simulcrypt Synchronizer receives a Scrambling Control Group provisioning message from the Event Information Scheduler, the DCM Supercrypt will check the presence of the Elementary Streams/service(s) in the incoming Transport Stream with the service(s) listed in the Scrambling Control Group provisioning message. If the incoming Transport Stream contains the service(s) the Simulcrypt Synchronizer will accept the Scrambling Control Group. Otherwise the Simulcrypt Synchronizer will refuse the Scrambling Control Group and returns a Scrambling Control Group error message to the Event Information Scheduler. When the Check SCG at Provisioning Time function is switched off, the DCM Supercrypt checks the Transport Stream on service(s) presence at the moment (activation time) the scrambler starts the scrambling process for this (these) service(s). Scrambling Control Group Accept Delay After powering up the DCM Supercrypt the multiplexer starts analyzing the incoming Transport Stream if the Check Elements at Provisioning Time function is switched on. During this Transport Stream analyzing process the Simulcrypt Synchronizer answers on received Scrambling Control Group provisioning messages with Scrambling Control Group error messages and the Scrambling Control Groups are refused. Defining a Scrambling Control Group Accept Delay can solve this problem. Scramble only Audio/Video The DCM Supercrypt can scramble all components of a service or only the video and audio component of a service (in case of service level scrambling) Rev D
115 Changing the Scrambling Properties To Change the Scrambling Properties Perform the following steps to change scrambler properties. 1 Under Additional Components in the Server Explorer of the ROSA system, right-click on the SCS Configurator and select Properties in the short-cut menu. Result: The SCS Configurator dialog is displayed. 2 On the Configuration tab, right-click on the DCM Supercrypt in question and select Properties in the short cut menu. Note: The Scrambler Properties dialog is displayed. 3 Set or clear the Check SCG at Provision Time check box parameter. 4 In the SCG Accept Delay box, enter the amount of time that is used after powering the device before accepting Scrambling Control Groups. A delay time between 0 and 120 seconds can be entered. Note: The SCG Accept Delay box is only applicable if the Check SCG at Provision Time check box is set. 5 Set or clear the Scramble only Audio/Video check box. 6 Press the OK command button to confirm Rev D 99
116 Chapter 4 Scrambling Configuration Entitlement Control Message Generators Introduction To establish communication between the Simulcrypt Synchronizer of the DCM Supercrypt and an ECM Generator a TCP connection has to be made followed with a channel set up. During the connection making process the Simulcrypt Synchronizer requires the IP address and port number of the ECM Generator to establish the TCP connection and needs a channel identifier to set up a channel. The operator can determine this channel identifier or the Simulcrypt Synchronizer can pick a channel identifier from the free channel identification pool. CW/AC TS EMMs DCM TS + ECMs ECM Generator The Simulcrypt Synchronizer also requires the knowledge of the mapping between the Super CAS ID, which is a concatenation of the CA System identifier and the CA Subsystem identifier, and the communication parameters. Once the channel is established and the Event Information Scheduler (EIS) triggers the Simulcrypt Synchronizer to request ECMs from the ECM Generator, an ECM stream is set up. The number of ECM streams that can be set up between the Simulcrypt Synchronizer and the ECM Generator within one channel is limited and depends on the CA System. For backup and/or load sharing purposes several ECM Generators can be assigned to a DCM Supercrypt. The priority assigned to the communication channel determines the working mode of the ECM Generators. When the channel priorities of the ECM Generators are equal, the ECM Generators will work in load sharing mode and the ECM generation load is spread over the generators. When the priority differs, the ECM Generator with the highest priority (= lowest number) acts as Main ECM Generator and the one with the lowest priority as backup. When the load of the main ECM Generator exceeds the stream limit, the backup ECM Generator will assist the Main ECMG in creating ECMs. If the main ECM Generator fails, the backup generator will cover the main generator. The ECMG working modes can be combined, for instance two generators with the same priority (load sharing mode) and one with a lower priority (backup mode) Rev D
117 To Assign an ECMG Interface Entitlement Control Message Generators The following procedure explains how to add an Entitlement Control Message Generator interface to a DCM Supercrypt. 1 Under Additional Components in the Server Explorer of the ROSA system, right-click on the SCS Configurator and select Properties in the short cut menu. Result: The SCS Configurator dialog is displayed. 2 On the Configuration tab, right-click on the DCM Supercrypt in question and select Add ECMG in the short-cut menu. Note: The Add ECMG dialog is displayed. 3 In ECMG Name box, enter the name of the ECM Generator. This name acts as a label to facilitate the identification of the ECM Generator in the CA system. A name of max 20 characters can be given to an ECM Generator. 4 In the ECMG Type drop down box, select one of the following items: - Standard: DVB Simulcrypt - Irdeto M_Crypt: (DVB Simulcrypt) creates streams even if no ECMs are requested and overrules the Access Criteria with a fixed format containing the Original Network Identifier (ON_ID), the Transport Stream Identifier (TS_ID), and the Service Identifier (SID). - Nagra NagraVision: (DVB Simulcrypt) overrules the Access Criteria with the ECM identifier Rev D 101
118 Chapter 4 Scrambling Configuration 5 In the ECM PID Source drop down box, select the desired ECM PID source, viz.: - ECM ID: the ECM Identifier from the ECM Group in the SCG Provisioning message is used to determine the ECM Packet Identifier. - Auto: the multiplexer of the DCM Supercrypt chooses the ECM packet identifier (PID) from the list of free PIDs. Note: The list of free PIDs, from which the multiplexer the ECM PID determines, can be limited by defining limits (ECM PID Lower Limit and ECM PID Upper Limit). 6 In the CA SystemID box, enter the Conditional Access System identifier. This identifier is defined in table 3 CA_system_ID of ETR 162 and used to indicate the type of CA system applicable for the associated ECM stream. Contact your CA vendor for more information. 7 In the CA SubsystemID box, enter the identifier of the Conditional Access sub system. This parameter is used to differentiate multiple ECM Generators from the same CA vender in the CA application. Contact your CA vendor for more information. 8 Click on the Add command button to add a connection entry in the Connections table. Result: A table entry is added. 9 In the Priority box of this entry, enter a channel priority number to determine the ECMG working mode. More information concerning the ECMG working mode can be found in topic Introduction. 10 In the IP Address box, enter the IP address of the ECM Generator. The octets of the IP address must be separated by dots. 11 In the Port box, enter the port number of the ECM Generator used for this channel. 12 When the Simulcrypt Synchronizer should determine the channel identifier for this channel, the Automatic Channel ID Selection check box must be set. Otherwise clear this check box and enter the channel identifier in the Channel ID box. A number between 0 and is allowed. Notes: - When several ECMG connections should be established, repeat step 8 up to 12 until all these connections are made Rev D
119 - Not all CA vendors support Automatic ChannelID Selection. Entitlement Control Message Generators 13 Point to the OK command button to confirm or the Cancel command button to abort the operation. Note: A connection entry can always be deleted by pressing the Remove command button after selecting the entry. Changing the ECMG Specific Parameters Perform the following steps to change the properties of an ECM Generator. 1 Under Additional Components in the Server Explorer of the ROSA system, right-click on the SCS Configurator and select Properties in the short-cut menu. Result: The SCS Configurator dialog is displayed. 2 On the Configuration tab, right-click on the ECM Generator of which parameters must be changed and select Properties in the short-cut menu. Result: The Properties dialog for the selected ECMG is displayed. 3 Adapt the parameters and press the OK command button to confirm or the Cancel command button to abort the operation. Note: More information concerning the ECMG parameters can be found in topic To Assign an ECMG Interface. Removing an ECMG Interface Perform the following steps to remove an ECM Generator. 1 Under Additional Components in the Server Explorer of the ROSA system, right-click on the SCS Configurator and select Properties in the short-cut menu. Result: The SCS Configurator dialog is displayed. 2 On the Configuration tab, right-click on the ECM Generator in question and select Remove in the short-cut menu. Result: A confirmation box dialog is displayed. 3 Press the Yes command button to confirm or the No command button to abort the operation. Overruling the ECMG Channel Status Message Parameter Values In normal circumstances the values in the Channel Status Message generated by the ECM Generator are used by the Simulcrypt Synchronizer to determine the ECM transmit timings. When particular values are missing or inaccurate, these values can be overruled using the SCS Configuration GUI. The list below describes the parameters that can be overruled. Maximum Compute Time: this parameter represents the worst-case time needed by an ECM Generator to compute an ECM when all the streams in a channel are in use. This parameter determines the ECM Request Interval parameter used by Rev D 103
120 Chapter 4 Scrambling Configuration the Simulcrypt Synchronizer. This parameter should be changed if the ECM Generator complains about ECMG out of computational resources. Minimum Crypto Period Duration: this parameter indicates the minimum amount of time a control word shall be active before it can be changed. Transition Start Delay: this parameter represents the amount of time between the start of the first Crypto Period following a clear to scrambled transition, and the start of the broadcasting of the ECM attached to this period. Transition Stop Delay: this parameter represents the amount of time between the end of last Crypto Period preceding a scrambled to clear transition, and the end of broadcasting the ECM attached to this period. Start Delay: this parameter represents the amount of time between the start of a Crypto Period, and the start of broadcasting the ECM attached to this period. Stop Delay: this parameter represents the amount of time between the end of a Crypto Period, and the end of broadcasting the ECM attached to this period. AC Start Delay: this parameter represents the amount of time between the start of the first Crypto Period following a change in the Access Criteria and the start of broadcasting the ECM attached to this period. AC Stop Delay: this parameter represents the amount of time between the end of the last Crypto Period preceding a change in Access Criteria, and the end of broadcasting the ECM attached to this period. The following table shows the minimum, maximum, and default values of these parameters: Parameter Minimum Value Maximum Value Default Value Maximum Compute Time (msec) 0 60,000 5,000 Minimum Crypto Period Duration (msec) 1, ,000 10,000 Transition Start Delay (msec) -30, ,000 Transition Stop Delay (msec) 0 30,000 2,000 Start Delay (msec) -30,000 30,000-2,000 Stop Delay (msec) -30,000 30,000-2,100 AC Start Delay (msec) -30,000 30,000-2,000 AC Stop Delay (msec) -30,000 30,000-2, Rev D
121 Entitlement Control Message Generators The following steps explain how to overrule Channel Status Message parameter values. 1 Under Additional Components in the Server Explorer of the ROSA software, right-click on the SCS Configurator and select Properties in the short-cut menu. Result: The SCS Configurator dialog is displayed. 2 On the Configuration tab right-click on the ECM Generator for which values must be overruled. Result: The ECMG Properties dialog is displayed. 3 Select the Advanced tab. Result: The Advanced tab is displayed. 4 Set the check box of the parameter that must be overruled. Result: The parameter box becomes editable. 5 Adapt the value and press the OK command button to confirm or the Cancel command button to abort the operation. Adding, Changing, or Removing ECMG Descriptor Rules Introduction Conditional Access (CA) descriptors are data structures used to carry CA specific information for services or Elementary Streams. The DCM Supercrypt devices are able to update PMTs with CA descriptors according to the user configurable CA descriptor rules. The SCS Configurator allows configuring CA descriptor rules and applying these rules to descriptors. Note: When the DCM Supercrypt scrambles a service or components within a service, CA descriptors in the PMT are sorted using the values of the ECM PIDs to which the CA descriptors apply, CA descriptors with lowest value come first. When a scrambled service is passed from input to output of the DCM Supercrypt, the CA descriptor order is not changed Rev D 105
122 Chapter 4 Scrambling Configuration Adding a Descriptor Rule The following procedure explains how to add an ECMG descriptor rule. 1 Under Additional Components in the Server Explorer of the ROSA software, right-click on the SCS Configurator and select Properties in the short-cut menu. Result: The SCS Configurator dialog is displayed. 2 On the Configuration tab right-click on the ECM Generator for which descriptor rules must be created. Result: The ECMG Properties dialog is displayed. 3 Select the Descriptor Rules tab. Result: The Descriptor Rules tab is displayed. 4 Press the Add command button. Result: The Add Descriptor Rule dialog is displayed. 5 In the Name box, enter a name to facilitate the identification of the descriptor rule in the application Rev D
123 6 In the Type drop down box, select the rule type: Entitlement Control Message Generators - Add Private Data rule type: add private data to the standard descriptor. - Do Not Insert rule type: no standard descriptor insertion. This setting prevents updating the CA descriptors in the PMT by the DCM Supercrypt if the PSI/SI information is generated by an external connected PSIG. Notes: - Both the Insert drop down box and Private Data [Hex] box are grayed, if the rule type is set to Do Not Insert. - Private data is CA Vendor proprietary. 7 In the Insert drop down box, select the insertion level mode for the private data part. - According to EIS: the Event Information Scheduler determines the insertion level. - At ES Level: the insertion is performed at Elementary Stream level (even if Service Level Scrambling is defined by the Event Information Scheduler). 8 In the Private data box, enter the private date. Note: The number of characters entered in the Private Data [hex] box must be even. 9 In the Applies to ECM ID(s) box, point to the Add command button. Result: The Add ID dialog displays. 10 In the Enter ID box enter the ECM ID to which the CA descriptor rule must be applied. 11 Press the OK command button to confirm. 12 Repeat step 9 up to 11 until all ECM IDs are added. 13 Press the Add command button to confirm or the Close command button to abort the operation. Result: The descriptor rule is displayed on the Descriptor Rules tab of the GUI. Notes: A DCM Supercrypt adds a standard CA descriptor to the PMTs of scrambled services or Elementary Streams Rev D 107
124 Chapter 4 Scrambling Configuration When no IDs are added into the Applies to ECM ID(s) box, the descriptor rule is applied to all ECMs. Since only one rule with empty Applies to ECM ID(s) box is allowed, this rule will overrule the standard CA descriptor. When IDs are added, the rule is only applied to the ECM IDs appearing in the Applies to ECM ID(s) box. Only one rule can be effective for a certain ECM ID. ECM IDs added to the Applies to ECM ID(s) box must be unique over all descriptor rules for a certain ECM Generator. Changing Descriptor Rules Properties The following steps explain how to change descriptor rule properties. 1 Under Additional Components in the Server Explorer of the ROSA software, right-click on the SCS Configurator and select Properties in the short-cut menu. Result: The SCS Configurator dialog is displayed. 2 On the Configuration tab right-click on the ECM Generator of which descriptor rules must be changed. Result: The ECMG Properties dialog is displayed. 3 Select the Descriptor Rules tab. Result: The Descriptor Rules tab is displayed. 4 Select the CA description rule that should be changed and click on the Properties command button. Note: Double-clicking on the CA description rule also opens the Properties dialog of the rule. 5 The Descriptor Rule Properties dialog is displayed. 6 Adapt the descriptor rule parameters and press the OK command button to confirm or the Cancel command button to abort the operation. Note: - ECM IDs can be removed by selecting the IDs and pointing to the Remove command button. To select consecutive rules, click on the first rule, press and hold down the [SHIFT] key, and then click on the last rule. To select rules that are not consecutive, press and hold down [CTRL] key, and then click on each rule. - Deselecting an ID can be done by holding down the [CTRL] key and pointing to the ID Rev D
125 Entitlement Control Message Generators Removing Descriptor Rules The following procedure explains how to remove a descriptor rule. 1 Under Additional Components in the Server Explorer of the ROSA software, right-click on the SCS Configurator and select Properties in the short-cut menu. Result: The SCS Configurator dialog is displayed. 2 On the Configuration tab right-click on the ECM Generator of which descriptor rules must be removed. Result: The ECMG Properties dialog is displayed. 3 Select the Descriptor Rules tab. Result: The Descriptor Rules tab is displayed. 4 Select the CA Description rule(s) that should be removed. - To select consecutive rules, click on the first rule, press and hold down the [SHIFT] key, and then click the last rule. - To select rules that are not consecutive, press and hold down [CTRL] key, and then click each rule. 5 Press the Remove command button Rev D 109
126 Chapter 4 Scrambling Configuration Event Information Schedulers Introduction The Event Information Scheduler (EIS) provides the Simulcrypt Synchronizer with Scrambling Control Groups (SCGs) containing the relevant information to scramble services. To establish communication between the EIS and the Simulcrypt Synchronizer a TCP connection should be made followed by a channel set up. Once the connection is made the Simulcrypt Synchronizer of the DCM Supercrypt receives Scrambling Control Groups from the Event Information Scheduler. TS SCGs DCM TS Event Information Scheduler To set up a TCP connection between the Event Information Scheduler and the DCM Supercrypt, the EIS requires the knowledge of the IP address and TCP port of the DCM Supercrypt used to establish the connection. Note: ROSA NMS, Scientific Atlanta s Network Management System, can serve as Event Information Scheduler if both the AC Management Component and Scrambling Control Task are installed. The computer running the ROSA software obtains the required knowledge during the device mapping process. To Assign an EIS Interface The following procedure explains how to assign an Event Information Scheduler interface to a DCM Supercrypt. 1 Under Additional Components in the Server Explorer of the ROSA system, right-click on the SCS Configurator and select Properties in the short-cut menu. Result: The SCS Configurator dialog is displayed. 2 On the Configuration tab right-click on the DCM Supercrypt in question and select Add Standard EIS in the short-cut menu. Result: The Add Standard EIS dialog is displayed Rev D
127 Event Information Schedulers 3 In the EIS Name box, enter a name for the Event Information Scheduler. This name acts as a label to identify the Event Information Scheduler in the CA System. 4 In the TCP Port box, enter the number of the listening port used by the DCM Supercrypt to establish the TCP connection with the Event Information Scheduler. Note: The TCP listening port number must be unique and cannot be used by an EMM Generator or a PSI Generator. 5 In the EIS Type drop down box, select on of the following items: - SA Specific: the Event Information Scheduler of ROSA NMS - General: a third party Event Information Scheduler Note: Only one Scientific Atlanta EIS can be assigned to a DCM Supercrypt. 6 When the Crypto Period parameter encapsulated into Scrambling Control Groups are missing or inaccurate, this parameter can be overruled by setting the Overrule Recommended CP Duration check box. In the box that becomes editable after setting the check box, enter the desired Crypto Period. 7 Press the OK command button to confirm. Changing the EIS Interface Connection Parameters The following steps explain how to change the parameters of the EIS interface connection. 1 Under Additional Components in the Server Explorer of the ROSA system, right-click on the SCS Configurator and select Properties in the short-cut menu. Result: The SCS Configurator dialog is displayed. 2 On the Configuration tab right-click on the EIS interface that must be adapted and select Properties in the short-cut menu. Result: The Standard EIS Properties dialog is displayed. 3 Adapt the parameters and press the OK command button to confirm or the Cancel command button to abort the operation Rev D 111
128 Chapter 4 Scrambling Configuration Note: More information concerning the ECMG parameters can be found in subtopic To Assign an EIS Interface earlier in this topic. Removing an EIS Interface Perform the following steps to remove an EIS interface from the DCM Supercrypt. 1 Under Additional Components in the Server Explorer of the ROSA system, right-click on the SCS Configurator and select Properties in the short-cut menu. Result: The SCS Configurator dialog is displayed. 2 On the Configuration tab right-click on the EIS interface that should be removed and select Remove in the short-cut menu. Result: A confirmation box is displayed. 3 Click on the OK Command button to confirm or the Cancel command button to abort the operation Rev D
129 5 Chapter 5 Alarm Monitoring Introduction This chapter provides the procedures to configure the alarms and to check the alarms generated by the DCM Supercrypt. Next to these procedures this chapter also contains a description of each alarm that can be generated by the DCM Supercrypt. In This Chapter Configuring the Alarms Checking the Alarms Alarm Overview Rev D 113
130 Chapter 5 Alarm Monitoring Configuring the Alarms Introduction When an alarm becomes active on the DCM Supercrypt, the alarm is added to the Status page of the web browser user interface and an alarm message is generated for reporting ROSA messages or SNMP traps. The alarm messages coming from the DCM Supercrypt are logged on the ROSA Message Viewer or SNMP TRAP receiver. Note: The communication between the DCM Supercrypt and ROSA NMS or SNMP TRAP receivers can be checked by generating test messages. More information concerning generating test messages can be found in topic Generating Test Messages on page 116. The alarm message reporting by DCM Supercrypt can be enabled or disabled for all alarms or for individual alarms. The procedure to enable or disable the alarms message reporting for all alarms can be found in topic Enabling or Disabling Alarm Message Reporting for all Alarms on page 115 and for individual alarms in topic Configuring the Settings of the Device Alarms on page 116 or Configuring the Settings of the Interface Alarms on page 118. Each alarm is accompanied with a colored bullet indicating the severity level of the alarms. The severity of an alarm can be changed using the web browser user interface. The following list shows the severity levels used by the DCM Supercrypt: Colored Bullet Severity Level Description (magenta) Indeterminate Critical the severity level cannot be determined the service is affected and a urgent corrective action is required (red) Major the service is affected and a corrective action is required (yellow) Minor a non-service affecting error occurred and action is required to prevent more errors (blue) Warning a potential service affecting error is detected (white) Information information message For more information about changing the severity level of an alarm, please refer to sub topic Configuring the Settings of the Device Alarms on page 116 or sub topic Configuring the Settings of the Interface Alarms on page 118 further in this topic Rev D
131 Configuring the Alarms Enabling or Disabling Alarm Message Reporting for all Alarms The following procedure explains how to enable or disable alarm message reporting for all alarms. 1 On the web browser user interface of the DCM Supercrypt, point to the Alarms link that appears after clicking on the Configuration link. Result: The Configuration - Alarms sub page for the device is displayed. 2 In the Enabled drop down box in the Global Alarms Settings table, select Yes to enable or No to disable alarm message reporting for all alarms (device and interface alarms). 3 Press the Apply command button to confirm or the Reload command button to abort the operation. Note: The presence and status of both power supply units are represented using LEDs on the front panel of the DCM. When a PSU slot is empty, the corresponding LED illuminates red. By disabling the corresponding alarm, this LED can be extinguished Rev D 115
132 Chapter 5 Alarm Monitoring Generating Test Messages The communication between the DCM Supercrypt and ROSA NMS or SNMP TRAP receivers can be checked by generating a test message. Note: Before ROSA NMS is able to receive test messages, the DCM Supercrypt must be mapped into ROSA NMS. The procedure to map a DCM Supercrypt into ROSA NMS can be found in appendix Integrating a DCM Supercrypt into ROSA NMS on page 163. The following procedure explains how to generate a test message. 1 On the web browser user interface of the DCM Supercrypt, point to the Alarms link after clicking on the Configuration link. Result: The Configuration - Alarms sub page for the device is displayed. 2 Press the Generate Test Message command button. Result: A test message is sent to ROSA NMS and/or SNMP TRAP receivers. Note: For some reasons it can be useful to change the severity level of a test message. The procedure to change the severity level can be found in topic Configuring the Settings of the Device Alarms on page 116 or topic Configuring the Settings of the Interface Alarms on page 118. Configuring the Settings of the Device Alarms Perform the following steps to configure the device alarms settings. 1 On the web browser user interface of the DCM Supercrypt, point to the Alarms link after pointing to the Configuration link. Result: The device Configuration - Alarms sub page for the device is displayed. 2 In the Global Alarm Settings table, enable or disable the alarm message reporting by selecting Yes or No in the Enabled drop down box of the alarm in question. 3 In the (Major) Severity drop down box of the alarm, select the severity. 4 Press the Apply command button to confirm or the Reload command button to abort the operation Rev D
133 Configuring the Alarms Configuring the Settings of the Interface Alarms The following procedure explains how to configure the interface alarm settings. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page is displayed. 2 In the DCM Configuration tree, double-click on the Interface Card for which alarm setting must be configured. Result: The Configuration - Interface sub page for the interface card in question is displayed. 3 Select the Alarms link. Result: The Configuration - Alarms sub page is displayed. 4 In the General Alarms drop down box, select For All Services to generate a service alarm for all services missing at the input or select Only for Groomed Services for services only passed to the output Rev D 117
134 Chapter 5 Alarm Monitoring 5 In the Global Alarm Settings table, enable or disable the alarm message reporting by selecting Yes or No in the Enabled drop down box of the alarm in question. 6 In the (Major) Severity drop down box of the alarm, select the desired severity. 7 In the Error Intervals (ms) table, change the following error intervals if required: PAT Error: the time that the PAT is allowed to be not present in the Transport Stream before a PAT error will be generated PMT Error: the time that the PMT is allowed to be not present in the Transport Stream before a PMT error will be generated PID Error (Audio/Video): the time that a particular Audio or video component is allowed to be not present in the Transport Stream before a PID error will be generated. PID Error (Data): the time that a particular data component is allowed to be not present in the Transport Stream before a PID error will be generated. 8 Press the Apply command button to confirm or the Reload command button to abort the operation Rev D
135 Checking the Alarms Checking the Alarms Introduction The details of the generated alarms of the DCM Supercrypt can be found on the Status page of the web browser user interface of the DCM Supercrypt. These alarms are categorized in a number of tables, viz.: Input TS Status Overview table: this table represents the alarms related to the incoming Transport Streams. Input Service Status Overview table: this table contains the incoming service related alarms. Output Service Status Overview table: this table represents the outgoing service related alarms. Detailed TS Status Overview table: this table contains the details of the alarms related to the incoming Transport Streams. Detailed Service Status Overview table: this table contains the details of the alarms related to the incoming or outgoing services. Device Status Overview table: this table shows the alarms related to the device, cards and ports. Note: After loading a status overview table from the DCM Supercrypt, the table is refreshed at regular time, meaning no command button should be pressed to reload the table. For some reasons it can be useful to switch of these automatic refresh actions. Therefore the Status sub pages are provided with a Refresh drop down box that can be used to switch on (10 sec) or off (stop) the automatically refresh actions Rev D 119
136 Chapter 5 Alarm Monitoring Alarms Related to Incoming Transport Streams The following procedure explains how to check the Input TS Status Overview table. 1 On the web browser user interface of the DCM Supercrypt, point to the Status link. Result: The Status - Input sub page containing the Input TS Status Overview table is displayed. Tip: To sort the Input TS Status Overview table by a particular parameter, click on the table header of the parameter. Toggle between ascending and descending order by pointing repeatedly to the header. The following information can be found on the Input TS Status Overview table: Status: graphical representation of the severity level of the alarm with highest severity. For more information concerning the severity, please refer to topic Introduction on page 114. Card: the name of the interface card that enters the Transport Stream in question Port: the name of the input port that enters the Transport Stream in question IP Address: the multicast IP Address of the IP stream containing the incoming Transport Stream in question. UDP Port: represents the UDP port number of the GbE port, which enters the incoming Transport Stream in question. ON ID: the Original Network identifier of the incoming Transport Stream in question TS ID: the Transport Stream identifier of the incoming Transport Stream in question Alarmed States: the number of active alarms on the Transport Stream in question Detail: link to the detailed transport stream status overview Rev D
137 Alarms Details Related to Incoming Transport Streams Checking the Alarms Perform the following steps to check the Detailed TS Status Overview table. 1 On the web browser user interface of the DCM Supercrypt, point to the Status link. Result: The Status - Input sub page containing the Input TS Status Overview table is displayed. 2 In the row of the alarm for which details must be checked, click on the arrow. Result: The Detailed TS Status Overview table of the TS alarm in question is displayed. Tips: - The Detailed TS Status Overview table can also be opened in a popup window by right-clicking on the corresponding Transport Stream in the DCM Inputs tree on the Service sub page and pointing to View Status in the short-cut menu. - To sort the Detailed TS Status Overview table by a particular parameter, click on the table header of the parameter. Toggle between ascending and descending order by pointing to the header. The following information can be found on the Detailed TS Status Overview table: Status: graphical representation of the severity level of the alarm. For more information concerning the severity, please refer to topic Introduction on page 114. Measurement: the alarm name SID: the Service Identifier of the failing service (if applicable) Name: the name of the failing service (if applicable) Value(s): the details of an alarm - Active - Not active Rev D 121
138 Chapter 5 Alarm Monitoring Alarms Related to Incoming Services The following procedure explains how to check the Input Service Status Overview table. 1 On the web browser user interface of the DCM Supercrypt, point to the Status link. Result: The Status - Input sub page containing the Input TS Status Overview table is displayed. 2 In the Filter drop down box select Service. Result: The Input Service Status Overview table is displayed. Tip: To sort the Input Service Status Overview table by a particular parameter, click on the header of the parameter. Toggle between ascending and descending order by pointing repeatedly to the header. In the Input Service Status Overview table each alarm is accompanied with the following information: Status: graphical representation of the severity level of the alarm with highest severity. For more information concerning the severity, please refer to topic Introduction on page 114. Card: the name of the interface card that enters the Transport Stream to which the service in question belongs Port: the name of the input port that enters the Transport Stream to which the service in question belongs IP Address: the multicast IP Address of the IP stream containing the incoming Transport Stream to which the service in question belongs UDP Port: represents the UDP port number of the GbE port, which enters the incoming Transport Stream to which the service in question belongs Rev D
139 Checking the Alarms ON ID: the Original Network identifier of the incoming Transport Stream to which the service in question belongs TS ID: the Transport Stream identifier of the incoming Transport Stream to which the service in question belongs SID: the Service Identifier of the corresponding incoming service Name: the name of corresponding incoming service Alarmed States: the number of active alarms on the corresponding incoming service Detail: link to the Detailed Service Status Overview table containing the alarm details of the corresponding incoming service Alarms Details Related to Incoming Services Perform the following steps to check the Detailed Service Status Overview table. 1 On the web browser user interface of the DCM Supercrypt, point to the Status link. Result: The Status - Input sub page containing the Input TS Status Overview table is displayed. 2 In the Filter drop down box select Service. 3 Result: The Input Service Status Overview table is displayed. 4 In the row of the alarm for which details must be checked, click on the arrow in the Detail column. Result: The Detailed Service Status Overview table of the service alarm in question is displayed. Tip: To sort the Detailed Service Status Overview table by a particular parameter, click on the table header of the parameter. Toggle between ascending and descending order by pointing to the header. The following information can be found on the Detailed Service Status Overview table: Status: graphical representation of the severity level of the alarm. For more information concerning the severity, please refer to topic Introduction on page Rev D 123
140 Chapter 5 Alarm Monitoring Measurement: the alarm name Value(s): the details of an alarm - Active - Not active Detail: alarm details Note: IP address in the detail of an alarm generated on a GBE port indicates that the alarm is generated on a Transport Stream with the same IP address as the IP address of the port. Alarms Related to Outgoing Services The following procedure explains how to check the Output Service Status Overview table. 1 On the web browser user interface of the DCM Supercrypt, point to the Output link after clicking on the Status link. Result: The Status - Output sub page containing the Output Service Status Overview table is displayed. Tip: To sort the Output Service Status Overview table by a particular parameter, click on the header of the parameter. Toggle between ascending and descending order by pointing repeatedly to the header. In the Output Service Status Overview table each alarm is accompanied with the following information: Status: graphical representation of the severity level of the alarm with highest severity. For more information concerning the severity, please refer to topic Introduction on page 114. Card: the name of the interface card that streams the Transport Stream to which the service in question belongs Port: the name of the input port that streams the Transport Stream to which the service in question belongs IP Address: the destination multicast IP Address of the IP stream containing the outgoing Transport Stream to which the service in question belongs Rev D
141 Checking the Alarms UDP Port: the destination UDP port number of the IP stream containing the outgoing Transport Stream to which the service in question belongs ON ID: the Original Network identifier of the outgoing Transport Stream to which the service in question belongs TS ID: the Transport Stream identifier of the outgoing Transport Stream to which the service in question belongs SID: the Service Identifier of the corresponding outgoing service Name: the name of corresponding outgoing service Alarmed States: the number of active alarms on the corresponding outgoing service Detail: link to the Detailed Service Status Overview table containing the alarm details of the corresponding outgoing service Alarms Details Related to Incoming Services Perform the following steps to check the Detailed Service Status Overview table. 1 On the web browser user interface of the DCM Supercrypt, point to the Output link after clicking on the Status link. Result: The Status - Output sub page containing the Output Service Status Overview table is displayed. 2 In the row of the alarm for which details must be checked, click on the arrow in the Detail column. Result: The Detailed Service Status Overview table of the outgoing service alarm in question is displayed. Tip: To sort the Detailed Service Status Overview table by a particular parameter, click on the table header of the parameter. Toggle between ascending and descending order by pointing to the header. The following information can be found on the Detailed Service Status Overview table: Status: graphical representation of the severity level of the alarm. For more information concerning the severity, please refer to topic Introduction on page Rev D 125
142 Chapter 5 Alarm Monitoring Measurement: the alarm name Value(s): the details of an alarm - Active - Not active Detail: alarm details To Check the Device Status Overview Table Perform the following procedure to check the Device Status Overview table. 1 On the web browser user interface of the DCM Supercrypt, point to the Device link that appears after clicking on the Status link. Result: The Device Status Overview table is displayed. Each row in the Device Status Overview table is provided with the following information: Status: graphical representation of the severity level of the alarm. For more information concerning the severity, please refer to topic Introduction on page 114. Card: the card name of the interface card on which an alarm arises Port: the name of the port on which an alarm arises Measurement: the alarm name Detail: the alarm details (if applicable) Rev D
143 Alarm Overview Alarm Overview Interface Card Related Alarms ETR 290, 1st Priority Alarms The following list gives an explanation of the priority 1 errors. TS Sync Loss: The first byte of a Transport Stream packet header is the synchronization byte (0x47). In a MPEG-2 decoder, the synchronization byte serves for synchronization with the packetized Transport Stream. A TS Sync Loss error arises when the synchronization byte in a sequence of at least two Transport Stream packets are not detected. Sync Byte Error: The first byte of the Transport Stream packet header is the synchronization byte (0x47). In the MPEG-2 decoder the synchronization byte serves for synchronization with the packetized transport stream. When the synchronization byte is missing or contains errors too often, a MPEG-2 decoder will not be able to synchronize to the transport stream. A Sync Byte Error is generated when the synchronization byte in a TS packet is not detected. PAT Error: The Program Association Table (PAT) contains a list of all programs and Packet Identifiers (PIDs) contained in the transport stream and of associated Program Map Tables (PMTs), which contain detailed program descriptions. If the PAT is not available within a particular time interval 9 or contains an error, a MPEG-2 decoder will not be able to select and decode a program from the TS. CC Error: Packets with a particular PID value were lost, appeared in an incorrect order, or appeared more than twice. The PID value appears in the Detail column of the status overview table. PMT Error: The PMT (Program Map Table) is a table for detailed program descriptions referenced in the PAT. As essential information for the MPEG-2 decoder, it contains the PIDs of all packets of the elementary streams as well as the PIDs of packets serving for the transmission of PCR values associated with the program. The PMT is of key importance for decoding TV and audio programs. If the PMT is not available within a particular time interval or contains an error, a MPEG-2 decoder will not be able to select and decode a program from the transport stream. 9 The time that a PAT, PMT, or component is not available in the Transport Stream before a alarm will be generated is adjustable. The procedure to change these time intervals can be found in topic Configuring the Settings of the Interface Alarms Rev D 127
144 Chapter 5 Alarm Monitoring PID error: The packet with a particular PID and referred to in the PMT is not found within the specified time interval 10. Other Alarms The following list explains the other Transport Stream related alarms. Active ECMG Removed: This alarm is generated when the active TCP connection with the Entitlement Control Message Generator (ECMG) has been removed. Active EIS Removed: This alarm is generated when the active TCP connection with the Event Information Scheduler (EIS) has been removed. Active EMMG Removed: This alarm is generated when the active TCP connection with the Entitlement Management Message Generator (EMMG) has been removed. Active PSIG Removed: This alarm is generated when the active TCP connection with the PSI Generator (PSIG) has been removed. Bandwidth Exceeded: The sum of the services and components within a Transport Stream has exceeded the bit rate that is assigned to the Transport Stream. Channel closed by CA System: The channel between the DCM Supercrypt and the Conditional Access System (CAS) is closed by the CAS. Connection with CA System lost: The TCP connection with the Conditional Access System is interrupted. Link Status: The GbE link is down between the source device and the DCM Supercrypt or between the DCM Supercrypt and the destination device. No Components to Scramble: CP Extension: There are no components available for scrambling. No ECMG Connection Available: This alarm is generated when there is no link with the Entitlement Control Message Generator (ECMG) or when there is no channel capacity available. No ECM's available: CP Extension: this alarm arises when the DCM Supercrypt no longer receives ECMs for a scrambled service. 10 The time that a PAT, PMT, or component is not available in the Transport Stream before a alarm will be generated is adjustable. The procedure to change these time intervals can be found in topic Configuring the Settings of the Interface Alarms Rev D
145 Alarm Overview No EMM resources available: The maximum number of generated EMM 11 s that can be passed is 64. This alarm occurs if the number of generated EMMs passed to the output exceeds 64. PID could no be allocated: A particular component for scrambling purposes could no be allocated, e.g. the PID is already in use, another free PID is automatically allocated. Received Channel Error Message: The DCM Supercrypt received a channel error message from the Conditional Access System. PMT section exceeds 1K: the PMT section is limited to 1 K Byte, this alarm occurs if the MPT section exceeds this limit. Scrambling not started: Scrambling is not started because there are no components or no Entitlement Control Message Generator (ECMG) settings. SD/HD Mismatch: This alarm is generated when a High Definition (HD) service of which the SD/HD parameter is set to SD is added to a Transrating Group. The corresponding HD service will be blocked. Service Loss: The alarms to trigger a Service Loss alarm are configurable. More information concerning the configuration of Service Loss triggers can be found in topic Changing Settings of Outgoing Transport Streams on page 88. UDP Stream Loss: The Transport Stream of which services are passed to the output is not longer detected at the corresponding UDP Port. Possible causes: The corresponding Transport Stream is played out to another UDP port. The corresponding Transport Stream is not longer present at the input. The UDP Port to which the Transport Stream is played out is lower than the GbE UDP Boundary setting. UDP Loss: This alarm is generated if a particular port no longer receives UDP packets. Unreferenced Pid Error: The Transport Stream is permitted to contain only packets with program-specific information (PSI and SI tables), packets with certain PIDs that are reserved in the MPEG-2 standard, and packets that are identified in a Program Map Table (PMT). 11 Generated Entitlement Management Messages (EMMs) are messages received from an Entitlement Management Message Generator via the EMMG to MUX interface and passed to an outgoing Transport Stream Rev D 129
146 Chapter 5 Alarm Monitoring Notes: - The alarm message reporting for this alarm is default disabled, meaning ROSA NMS and/or SNMP TRAP receivers will not be informed when such alarm arises. The procedure to enabling alarm message reporting can be found in topic Enabling or Disabling Alarm Message Reporting for all Alarms on page With the exception of Transport Streams with missing PAT, this alarm will only be generated for components with PID higher than 32. Unreferenced Pids Maximum Number Reached: The DCM Supercrypt is able to handle 500 incoming unreferenced components per second and per interface card. The alarm is generated when the number of incoming unreferenced components exceeds 500. Device Related Alarms Power Up: A power up alarm is generated after powering up or rebooting the DCM Supercrypt. Temperature: This alarm is generated when the device temperature exceeds 65 C (149 F). Fan Failure: A fan failure alarm is arisen when a fan is malfunctioning. The alarm detail indicates the fan number of the failing fan. The procedure to replace a fan can be found in the Digital Content Manager (DCM) Model D9900 System Guide shipped with the device. Keep in mind that only authorized and trained service personnel are allowed to maintain and service the DCM after reading the Important Safety Instructions in the system guide. PS 1 Failure: This alarm is generated when the power supply unit in slot PS1 is failing. The procedures to remove and to install a PSU can be found in the Digital Content Manager (DCM) Model D9900 System Guide shipped with the device. Keep in mind that only authorized and trained service personnel are allowed to maintain and to service the DCM Supercrypt after reading the Important Safety Instructions in the system guide. PS 2 Failure: This alarm is generated when the power supply unit in slot PS2 is failing. The procedures to remove and to install a PSU can be found in the Digital Content Manager (DCM) Model D9900 System Guide shipped with the device. Keep in mind that only authorized and trained service personnel are allowed to maintain and to service the DCM Supercrypt after reading the Important Safety Instructions in the system guide Rev D
147 6 Chapter 6 Checking Bit Rates Introduction This chapter describes the procedures to check the bit rates of the incoming and outgoing Transport Streams. Next to these procedures, this chapter also contains a description of the parameters accompanied with the bit rate figures. In This Chapter Checking the Bit Rates Overview Tables Rev D 131
148 Chapter 6 Checking Bit Rates Checking the Bit Rates Overview Tables Introduction The bit rates of the incoming Transport Streams as well as the bit rates of the outgoing Transport Streams are categorized in a number of tables. The following overview lists the bit rates overview tables that can be checked using the web browser user interface of the DCM Supercrypt. Input bit rates tables - Service Bit Rates Overview table: shows the bit rates of all incoming services. - Detailed Service Bit Rates Overview table: represents the bit rates of the components within an incoming service. - TS Bit Rates Overview table: represents the bit rates of the incoming Transport Streams. - Detailed TS Bit Rates Overview table: represents the bit rates of the services within an incoming Transport Stream. - Detailed TS Component Bit Rates Overview table: represents the bit rates of the components within an incoming Transport Stream. Output bit rates table - Service Bit Rates Overview table: represents the bit rates of all outgoing services. - Detailed Service Bit Rates Overview table: represents the bit rates of the components within an outgoing Service. - TS Bit Rates Overview table: shows the bit rates of all outgoing Transport Streams. - Detailed TS Bit Rates Overview table: represents the bit rates of the services within an outgoing Transport Stream. - Detailed TS Component Bit Rates Overview table: represents the bit rates of the components within an outgoing Transport Stream. After loading a table from the DCM Supercrypt, the bit rate figures are refreshed at regular time, meaning no command button should be pressed to reload the figures. For some reasons it can be useful to switch of these automatically refresh actions. Therefore each bit rate sub page is provided with a Refresh drop down box that can be used to switch on (10 sec) or off (stop) the automatically refresh actions Rev D
149 Checking the Bit Rates Overview Tables Checking the Input Bit Rates Checking the Bit Rates Overview of the Incoming Services The bit rates overview of all incoming services are categorized in the Service Bit Rates Overview table. The following picture depicts an example of a Service Bit Rates Overview table. Each row in the table represents an incoming service containing the following information: Card: the slot name of the interface card that enters the Transport Stream to which the service belongs Port: the name of the input port that enters the Transport Stream to which the service belongs IP Address: the multicast IP address of the IP stream containing the Transport Stream to which the service belongs (if applicable) UDP Port: the UDP port number of the GbE port, which enters the Transport Stream to which the service belongs (if applicable) ON ID: the Original Network Identifier of the Transport Stream the service belongs to TS ID: the Transport Stream Identifier of the Transport Stream the service belongs to SID: the Service Identifier of the service Name: the name of the service Rev D 133
150 Chapter 6 Checking Bit Rates Current (Mbps): the actual bit rate of the service Avg (Mbps): the average bit rate of the service since reset Min (Mbps): the minimum bit rate of the service since reset Peak (Mbps): the maximum bit rate of the service since reset Detail: link to the Detailed Service Bit Rates Overview table Perform the following steps to check the bit rates overview of the incoming services. 1 On the web browser user interface of the DCM Supercrypt, click on the Input link that appears after pointing to the Bit Rates link. 2 In the Filter drop down box, select Service. Result: The Service Bit Rates Overview table is displayed. Tip: To sort the Service Bit Rates Overview table by a particular parameter, point to the table header of the parameter. Toggle between ascending and descending order by pointing repeatedly to the parameter header. Checking the Bit Rates Overview of the Components within an Incoming Service The bit rates overview of the components within an incoming service can be found in the Detailed Service Bit Rates Overview table. The following picture depicts an example of a Detailed Service Bit Rates Overview table. Tip: The identification parameters of the service to which the components belong are shown above the table. Each row in the table represents a component containing the following information: PID: the packet identifier of the component Name: the name of the component ES Type: the component type Current (Mbps): the actual bit rate of the component Avg (Mbps): the average bit rate of the component since reset Rev D
151 Min (Mbps): the minimum bit rate of the component since reset Checking the Bit Rates Overview Tables Peak (Mbps): the maximum bit rate of the component since reset Perform the following steps to check the bit rates overview of the incoming services. 1 On the web browser user interface of the DCM Supercrypt, click on the Input link that appears after pointing to the Bit Rates link. 2 In the Filter drop down box, select Service. Result: The Service Bit Rates Overview table is displayed. 3 In the row of the service for which component bit rates must be checked, point to the arrow in the Detail column. Result: The Detailed Service Bit Rates Overview table of the selected service is displayed Tip: To sort the Detailed Service Bit Rates Overview table by a particular parameter, point to the table header of the parameter. Toggle between ascending and descending order by pointing repeatedly to the parameter header. Checking the Bit Rates Overview of the Incoming Transport Streams The bit rates of the incoming Transport Streams are categorized in the TS Bit Rates Overview table. The following picture depicts a TS Bit Rates Overview table. Each row represents an incoming Transport Stream containing the following information. Card: the slot name of the interface card that enters the Transport Stream Port: the name of the port that enters the Transport Stream IP Address: the Multicast IP address of the IP stream containing the incoming Transport Stream (if applicable) UDP Port: the UDP port number of the GbE port that enters the Transport Stream (if applicable) Rev D 135
152 Chapter 6 Checking Bit Rates ON ID: the Original Network Identifier of the Transport Stream TS ID: the Transport Stream Identifier of the Transport Stream Total (Mbps): the bit rates of the incoming Transport Stream (with null packets) Current: the actual bit rate Avg: the average bit rate since reset Min: the minimum bit rate since reset Peak: the maximum bit rate since reset Stuffing (Mbps): the bit rates of the null packets in the incoming Transport Stream Current: the actual bit rate Avg: the average bit rate since reset Min: the minimum bit rate since reset Peak: the maximum bit rate since reset Detail: link to the Detailed TS Bit Rates Overview and Detailed TS Component Bit Rates Overview table Tip: Pressing the TS ID value opens the Service sub page of the corresponding Transport Stream. The following steps explain how to check the bit rates overview of the incoming Transport Streams. 1 On the web browser user interface of the DCM Supercrypt, click on the Input link that appears after pointing to the Bit Rates link. Result: The Service Bit Rates Overview table is displayed. 2 In the Filter drop down box, select TS. Result: The TS Bit Rates Overview table is displayed. Tip: To sort the TS Bit Rates Overview table by a particular parameter, point to the table header of the parameter. Toggle between ascending and descending order by pointing repeatedly to the parameter header Rev D
153 Checking the Bit Rates Overview Tables Checking the Bit Rates Overview of the Services within an Incoming Transport Stream A bit rates overview of all services within a particular incoming Transport Stream can be found in the Detailed TS Bit Rates Overview table. The following picture shows an example of a Detailed TS Bit Rates Overview table. Tip: The identification parameters of the Transport Stream to which the services belong are shown above the table. Each row in the table represents a service containing the following information: SID: the service identifier (SID) of the incoming service Name: the name of the incoming service Current (Mbps): the actual bit rate of the service Avg (Mbps): the average bit rate of the service since reset Min (Mbps): the minimum bit rate of the service since reset Peak (Mbps): the maximum bit rate of the service since reset Detail: link to the Detailed Service Bit Rates Overview table, more information concerning this table can be found in topic Checking the Bit Rates Overview of the Components within an Incoming Services on page Rev D 137
154 Chapter 6 Checking Bit Rates The following procedure explains how check the bit rates overview of the services within a particular incoming Transport Stream. 1 On the web browser user interface of the DCM Supercrypt, click on the Input link that appears after pointing to the Bit Rates link. Result: The Service Bit Rates Overview table is displayed. 2 In the Filter drop down box, select TS. Result: The TS Bit Rates Overview table is displayed. 3 In the row of the incoming Transport Stream of which the service bit rates must be checked, point to the arrow. Result: The Detailed TS Bit Rates Overview table of the Transport Stream in question is displayed. Tip: To sort the Detailed TS Bit Rates Overview table by a particular parameter, point to the table header of the parameter. Toggle between ascending and descending order by pointing repeatedly to the parameter header. Note: The bit rates of the services within a particular incoming Transport Stream can be opened in a popup window by right-clicking on the Transport Stream in the DCM Inputs tree on the Service page and pointing to View Bit Rates in the shortcut menu. Checking the Bit Rates Overview of the Components within a Transport Stream The bit rates of the components within a Transport Stream are categorized in the Detailed TS Component Bit Rates Overview table. The following picture depicts such table. Tip: The identification parameters of the Transport Stream to which the components belong are shown above the Detailed TS Component Bit Rates Overview table. Each row in the table represents a component containing the following information: PID: the packet identifier of the table Type: the table type Current (Mbps): the actual bit rate of the table Avg (Mbps): the average bit rate of the table since reset Min (Mbps): the minimum bit rate of the table since reset Peak (Mbps): the maximum bit rate of the table since reset Rev D
155 Checking the Bit Rates Overview Tables The following procedure explains how to check the bit rates of the components within a Transport Stream. 1 On the web browser user interface of the DCM Supercrypt, click on the Input link that appears after pointing to the Bit Rates link. 2 In the Filter drop down box, select TS. Result: The TS Bit Rates Overview table is displayed. 3 In the row of the Transport Stream for which component bit rates must be checked, point to the arrow in the Detail column. 4 Result: The Detailed TS Component Bit Rates Overview table of the selected Transport Stream is displayed. Tip: To sort the Detailed TS Component Bit Rates Overview table by a particular parameter, point to the table header of the parameter. Toggle between ascending and descending order by pointing repeatedly to the parameter header. Note: The bit rates of the components within a particular incoming Transport Stream can be opened in a popup window by right-clicking on the Transport Stream in the DCM Inputs tree on the Service page and pointing to View Bit Rates in the shortcut menu Rev D 139
156 Chapter 6 Checking Bit Rates Checking the Output Bit Rates Checking the Bit Rates Overview of the Outgoing Transport Streams The bit rates of the outgoing Transport Streams are categorized in the TS Bit Rates Overview table. The following picture shows a TS Bit Rates Overview table. Each row represents an outgoing Transport Stream containing the following information. Card: the interface card used to stream the outgoing Transport Stream Port: the number of the port used to stream the outgoing Transport Stream IP Address: the IP address of the destination device for the outgoing Transport Stream UDP Port: the UDP port number of the destination device for the outgoing Transport Stream ON ID: the Original Network Identifier of the outgoing Transport Stream TS ID: the Transport Stream Identifier of the outgoing Transport Stream Payload (Mbps): bit rates of the payload in the outgoing Transport Stream Current: the actual bit rate Avg: the average bit rate since reset Min: the minimum bit rate since reset Peak: the maximum bit rate since reset Rev D
157 Checking the Bit Rates Overview Tables Stuffing (Mbps): bit rates of the stuffing in the outgoing Transport Stream Current: the actual bit rate Avg: the average bit rate since reset Min: the minimum bit rate since reset Peak: the maximum bit rate since reset Detail: link to the Detailed TS Bit Rates Overview and Detailed TS Component Bit Rates Overview table Tip: Pressing the TS ID value opens the TS Outputs sub page of the corresponding Transport Stream. Perform the following steps to check the bit rate overview of outgoing Transport Streams. 1 On the web browser user interface of the DCM Supercrypt, click on the Output link that appears after pointing to the Bit Rates link. Result: The Service Bit Rates Overview table is displayed. 2 In the Filter drop down box, select TS. Result: The TS Bit Rates Overview table is displayed. Tip: To sort the TS Bit Rates Overview table by a particular parameter, point to the table header of the parameter. Toggle between ascending and descending order by pointing repeatedly to the parameter header. Checking the Bit Rates Overview of the Services within an Outgoing Transport Stream The bit rates of the services within a particular outgoing Transport Stream are categorized in the Detailed TS Bit Rates Overview table. The following picture depicts such table Rev D 141
158 Chapter 6 Checking Bit Rates Tip: The identification parameters of the Transport Stream to which the services belong are displayed above the table. Each row in the table represents a service containing the following information: SID: the service identifier of the outgoing service Name: the name of the outgoing service Current (Mbps): the actual bit rate of the outgoing service Avg (Mbps): the average bit rate of the outgoing service since reset Min (Mbps): the minimum bit rate of the outgoing service since reset Peak (Mbps): the maximum bit rate of the outgoing service since reset Detail: link to the Detailed Service Bit Rates Overview table. Perform the following steps to check the bit rates of the services within a particular outgoing Transport Stream. 1 On the web browser user interface of the DCM Supercrypt, click on the Output link that appears after pointing to the Bit Rates link. Result: The Service Bit Rates Overview table is displayed. 2 In the Filter drop down box, select TS. Result: The TS Bit Rates Overview table is displayed. 3 In the detail column, point to the arrow of the Transport Stream for which the service bit rates must be checked. Result: The Detailed TS Bit Rates Overview table is displayed. Tip: To sort the Detailed TS Bit Rates Overview table by a particular parameter, point to the table header of the parameter. Toggle between ascending and descending order by pointing repeatedly to the parameter header. Note: The bit rates of the services within a particular outgoing Transport Stream can be opened in a popup window by right-clicking on the Transport Stream in the DCM Outputs tree on the Service page and pointing to View Bit Rates in the shortcut menu Rev D
159 Checking the Bit Rates Overview Tables Checking the Bit Rates Overview of the Components within an Outgoing Service The bit rates overview of the components within an outgoing service can be found in the Detailed Service Bit Rates Overview table. The following picture depicts an example of a Detailed Service Bit Rates Overview table. Tip: The identification parameters of the service to which the components belong are shown above the table. Each row in the table represents a component containing the following information: PID: the packet identifier of the component Name: the name of the component ES Type: the component type Current (Mbps): the actual bit rate of the component Avg (Mbps): the average bit rate of the component since reset Min (Mbps): the minimum bit rate of the component since reset Peak (Mbps): the maximum bit rate of the component since reset Perform the following steps to check the bit rates overview of the incoming services. 1 On the web browser user interface of the DCM Supercrypt, click on the Output link that appears after pointing to the Bit Rates link. 2 In the Filter drop down box, select Service. Result: The Service Bit Rates Overview table is displayed. 3 In the row of the service for which component bit rates must be checked, point to the arrow in the Detail column. Result: The Detailed Service Bit Rates Overview table of the selected service is displayed Tip: To sort the Detailed Service Bit Rates Overview table by a particular parameter, point to the table header of the parameter. Toggle between ascending and descending order by pointing repeatedly to the parameter header Rev D 143
160 Chapter 6 Checking Bit Rates Checking the Bit Rates Overview of the Components within an Outgoing Transport Stream The bit rates of the components within an outgoing Transport Stream are categorized in the Detailed TS Component Bit Rates Overview table. The following picture depicts such table. Tip: The identification parameters of the Transport Stream to which the tables belong are displayed above the Detailed TS Component Bit Rates Overview table. Each row in the table represents a table containing the following information: PID: the packet identifier of the table Type: the table type Current (Mbps): the actual bit rate of the table Avg (Mbps): the average bit rate of the table since reset Min (Mbps): the minimum bit rate of the table since reset Peak (Mbps): the maximum bit rate of the table since reset Perform the following steps to check the bit rates of the components within a particular outgoing Transport Stream. 1 On the web browser user interface of the DCM Supercrypt, click on the Output link that appears after pointing to the Bit Rates link. Result: The Service Bit Rates Overview table is displayed. 2 In the Filter drop down box, select TS. Result: The TS Bit Rates Overview table is displayed. 3 In the detail column, point to the arrow of the Transport Stream for which the component bit rates must be checked. Result: The Detailed TS Component Bit Rates Overview table is displayed. Tip: To sort the Detailed TS Component Bit Rates Overview table by a particular parameter, point to the table header of the parameter. Toggle between ascending and descending order by pointing to the parameter header Rev D
161 Checking the Bit Rates Overview Tables Checking the Bit Rates Overview of the Outgoing Services The Service Bit Rates Overview table on the Bit Rates - Output sub page provides a bit rates overview of all outgoing services. The following picture shows a Service Bit Rates Overview table. Each row in this table represents an outgoing service containing the following information: Card: the interface card used to stream the outgoing Transport Stream the service belongs to Port: the port name used to stream the outgoing Transport Stream to which the service belongs IP Address: the IP address of the destination device for the outgoing Transport Stream the service belongs to (if applicable) UDP Port: the UDP port number of the destination device for the outgoing Transport Stream the service belongs to (if applicable) ON ID: the Original Network Identifier of the outgoing Transport Stream to which the service belongs TS ID: the Transport Stream Identifier of the outgoing Transport Stream the service belongs to SID: the Service Identifier of the outgoing service Name: the name of the outgoing service Current (Mbps): the actual bit rate of the outgoing service Avg (Mbps): the average bit rate of the outgoing service since reset Min (Mbps): the minimum bit rate of the outgoing service since reset Peak (Mbps): the maximum bit rate of the outgoing service since reset Detail: link to the Detailed Service Bit Rates Overview table Rev D 145
162 Chapter 6 Checking Bit Rates Tip: Pressing the TS ID value opens the TS Output sub page of the corresponding Transport Stream. The following procedure explains how to check the bit rates overview of the outgoing services. 1 On the web browser user interface of the DCM Supercrypt, click on the Output link that appears after clicking on the Bit Rates link. Result: The Service Bit Rates Overview table is displayed. Tip: To sort the Service Bit Rates Overview table by a particular parameter, point to the table header of the parameter. Toggle between ascending and descending order by pointing repeatedly to the parameter header. Restarting the Bit Rate Measurement Introduction The bit rates measurements can be restarted for each individual Interface Card. Restarting can be done on both the Input sub page and Output sup page of the Bit Rates page. To Restart the Bit Rate Measurement The following procedure explains how to restart the bit rate measurements. 1 On the Input or Output sub page of the Bit Rates page, tick the check box(es) in the Reset Board Bit Rates table for the Interface Card(s) for which the bit rate measurement must be restarted. 2 Point to the Reset command button. Result: The bit rate measurement of the selected Interface Card(s) is restarted Rev D
163 7 Chapter 7 Software Upgrade Introduction This chapter outlines the guidelines to upgrade the software of the DCM Supercrypt. In This Chapter Introduction Installing the Upgrade-It Software Package Upgrading the DCM Software Rev D 147
164 Chapter 7 Software Upgrade Introduction About the Upgrade Software To facilitate the software upgrade of a DCM Supercrypt, Scientific Atlanta has developed the Upgrade-It software package. The Upgrade-It software package runs as a stand-alone application on a remote PC, which is connected to the same LAN as the 10/100Base-T or GbE port of the DCM Supercrypt. System Requirements To install the Upgrade-It software package and to run the application, the PC should meet the following minimum requirements. Pentium processor, minimum 166 MHz. 128Mb of RAM SVGA Graphics Adapter with minimum 800x600 resolution Windows compatible mouse Operating system Windows 98 or Me Windows NT 4.0 Windows 2000 Windows XP Rev D
165 Installing the Upgrade-It Software Package Installing the Upgrade-It Software Package The following procedure explains how to install the Upgrade-It software package. 1 Double-click on the Setup.exe file of the Upgrade-It installation software or right-click on the file and select Open. The necessary installation information will be collected. Result: The InstallShield Wizard dialog is opened. 2 Click on the Next command button to confirm or the Cancel command button to abort the installation. Result: The Choose Destination Location page of the InstallShield Wizard is displayed. 3 Click on the Browse command button to choose another destination folder to install Upgrade-IT Rev D 149
166 Chapter 7 Software Upgrade Note: By default, Upgrade-It is installed in the Program Files\Scientific-Atlanta\ Upgrade-It folder on your system hard disk. 4 Point to the Next command button. Result: The dialog shows the program folders available on your system. 5 Choose a program folder or enter a new one and click on the Next command button. Result: The installation is started and the setup progress is displayed. Result: After a while the dialog shows that the installation is completed Rev D
167 Installing the Upgrade-It Software Package 6 Click on the Finish command button to end the installation procedure. Result: Now you can run the Upgrade-It software. Note: When the Upgrade-It software is already installed, restarting the installation procedure will result in a dialog with other options. The options allow you to modify, repair or remove the installation. If you want to upgrade with a new software version, choose the Repair option Rev D 151
168 Chapter 7 Software Upgrade Upgrading the DCM Software Opening the Upgrade-It Tool Perform the following steps to open the Upgrade-It tool. 1 In the start menu, click on the Start button and browse to the Upgrade-It application. Result: The Upgrade-It dialog is displayed. Notes: The Upgrade-It tool is provided with a Reboot after Upgrade function that gives an additional and unnecessary reboot command to the DCM Supercrypt after the upgrading-process when enabled. WARNING: For DCM Supercrypt devices with software package lower than version 2.5, this additional reboot action will clear all configuration settings stored on the device. Make sure this Reboot after Upgrade function is disabled. Disabling this function can be done by pointing to the Settings menu and unchecking the Reboot after Upgrade menu item Rev D
169 Upgrading the DCM Software The Upgrade-It tool is provided with an option that removes installation files after flashing. When this option is enabled during a DCM Supercrypt upgrade a number of error messages will be displayed. These errors have no effect on the upgrading process. Disabling this function can be done by pointing to the Settings menu and unchecking the Delete Files after Flashing menu item. Selecting the Software Module Perform the following steps to select a software module to upgrade the DCM Supercrypt software. 1 In the Available Modules box, click on the Open... command button. Result: The Open dialog is displayed. 2 Browse to the folder containing the software module (*.txt). 3 Select the file and point to the Open command button. Result: The software module is displayed in the Available Modules box. 4 In the Available Modules box, check the software module that must be used to upgrade the DCM Supercrypt Rev D 153
170 Chapter 7 Software Upgrade Selecting the Device The following procedure explains how to select the DCM Supercrypt that should be upgraded. 1 In the Target box, click on the Add... command button. Result: The Add Target IP dialog is displayed. 2 Select IP Address or IP Address Range in the drop down box. 3 Enter the IP address of the DCM Supercrypt or the beginning address of the IP address range in the From box. 4 If IP Address Range is selected in the drop down box, enter the ending address of the IP address range in the To box. 5 Press the Add command button to confirm or the Cancel command button to abort the operation. Result: The devices corresponding the entered IP address or IP address range are reflected in the Targets box. Note: The Type parameter in the Targets box originates from the target. 6 In the Targets box, check the device that should be upgraded Rev D
171 Upgrading the DCM Software 7 Click on the Refresh command button to refresh the Slot Details of the selected targets. 8 Select the file to be upgraded by selecting the check box manually in the Slot Details list or by pressing the Select command button. Flashing the Software The following procedure explains how to flash the software. 1 When Available Modules, Targets, and Slot Details are configured correctly, press the Flash command button to start the upgrading process. Result: The Flash Status dialog box with the status of the software upgrade process is displayed. Notes: After upgrading the software the device will automatically reboot, which takes several minutes. Clicking on the Refresh command button will refresh the Slot Details box. When the web browser user interface was open during the software upgrading process, you have to restart the web browser because the browser's cache may contain erroneous data Rev D 155
172
173 A Appx auto letter Customer Information Appendix A Introduction This chapter contains information on obtaining product support and returning products to Scientific Atlanta. In This Appendix Product Support Return Products for Repair Rev D 157
174 Appendix A Customer Information Product Support Obtaining Support IF... you have general questions about this product you have technical questions about this product you have customer service questions or need a return material authorization (RMA) number Then... contact your distributor or sales agent for product information or refer to product data sheets on call the nearest Technical Support center or Scientific Atlanta office. call the nearest Customer Service center or Scientific Atlanta office. Support Telephone Numbers This table lists the Technical Support and Customer Service numbers for your area. Region Centers Telephone and Fax Numbers North America SciCare For Technical Support, call: Broadband Toll-free: Services Local: (Press 2 at the prompt) Atlanta, Georgia United States For Customer Service or to request an RMA number, call: Toll-free: Local: (Press 3 at the prompt) Fax: [email protected] Europe, Belgium For Technical Support, call: Middle East, Telephone: or Africa Fax: For Customer Service or to request an RMA number, call: Telephone: or Fax: [email protected] Japan Japan Telephone: or Fax: [email protected] Korea Korea Telephone: Fax: [email protected] China (mainland) China Telephone: Fax: [email protected] Rev D
175 Product Support Region Centers Telephone and Fax Numbers All other Asia-Pacific countries & Australia Hong Kong Telephone: Fax: Brazil Brazil For Technical Support, call: Telephone: ext 230 Fax: For Customer Service or to request an RMA number, call: Telephone: , ext 109 Fax: Mexico, Mexico For Technical Support, call: Central Telephone: America, Fax: Caribbean For Customer Service or to request an RMA number, call: Telephone: Fax: All other Argentina For Technical Support, call: Latin America Telephone: ext 109 countries Fax: ext 103 For Customer Service or to request an RMA number, call: Telephone: Fax: Rev D 159
176 Appendix A Customer Information Return Products for Repair Introduction You must have a return material authorization (RMA) number to return a product. Contact the nearest customer service center and follow their instructions. Returning a product to Scientific Atlanta for repair includes the following steps: Obtaining a RMA number Obtaining a customer service center shipping address Packing and shipping the product Obtaining an RMA Number and Shipping Address You must have an RMA number to return products. RMA numbers are valid for 60 days. If you already have a number, but it is older than 60 days, you must contact a customer service representative to revalidate the number. You can return the product after the RMA number is revalidated. Follow these steps to obtain an RMA number and shipping address. 1 Contact a customer service representative to request a new RMA number or revalidate an existing one. Refer to the earlier section titled Support Telephone Numbers to find a customer service telephone number in your area. 2 Provide the following information to the customer service representative: Product name, model number, part number, serial number (if applicable) Quantity of products to return A reason for returning the product Your company name, contact, telephone number, address, and fax number Any service contract details Purchase order number of repair disposition authority, if available Result: The customer service representative issues the RMA number and provides the shipping address. Notes: If you cannot provide a purchase order number: A proforma invoice listing all costs incurred will be sent to you at the completion of product repair Rev D
177 Return Products for Repair Customer service must receive a purchase order number within 15 days after you receive the proforma invoice. Products can accrue costs through damage or misuse, or if no problem is found. Products incurring costs will not be returned to you without a valid purchase order number. Proceed to Packing and Shipping the Product. Packing and Shipping the Product Follow these instructions to pack the product and ship it to Scientific Atlanta. 1 Are the product s original container and packing material available? If yes, pack the product in the container using the packing material. If no, pack the product in a sturdy, corrugated box, and cushion it with packing material. Important: You are responsible for delivering the returned product to Scientific Atlanta safely and undamaged. Shipments damaged due to improper packaging may be refused and returned to you at your expense. Do not return any power cords or accessories. 2 Write the following information on the outside of the container: Your name Your complete address Your telephone number RMA number Problem description Note: Absence of the RMA number may delay processing of product repair and/or result in the equipment being returned unrepaired. Include the RMA number in all correspondence. 3 Ship the product to the address provided by the customer service representative. Note: Scientific Atlanta does not accept freight collect. Be sure to prepay and insure all shipments Rev D 161
178
179 B Appx auto letter Integrating a DCM Supercrypt Appendix B into ROSA NMS Introduction This appendix describes how to integrate a DCM Supercrypt into the ROSA Network Management System (NMS). In This Appendix Introduction Installing the ROSA 3.0 Drivers Making Task Instances Mapping a DCM Supercrypt into ROSA NMS Working with the Graphical User Interfaces Rev D 163
180 Appendix B Integrating a DCM Supercrypt into ROSA NMS Introduction About ROSA NMS ROSA, Scientific Atlanta's Network Management System (NMS), is a complete solution to manage the Scientific Atlanta equipment in the most efficient, costeffective manner possible. The ROSA platform supports a wide range of broadcast and broadband networks with a complete set of protocol and device drivers, automation tasks, and service description models. This network management system also contains a complete toolbox to integrate third-party equipment. The ROSA NMS allows creating customized views like geographical views, rack layout views, equipment interconnection views to make the diagnostic process easier. The ROSA NMS automation tasks help the user to build self-healing systems by using a wide palette of tasks for backup equipment, transmission links or services. The ROSA NMS Notification task can send pager, SMS and messages to service technicians when certain alarm conditions occur. This task is highly configurable, different rules and schedules can be defined for each scenario and service technician Rev D
181 Installing the ROSA 3.0 Drivers Installing the ROSA 3.0 Drivers Introduction Before the DCM Supercrypt can be integrated into ROSA NMS, a number of ROSA NMS drivers should be installed. The following list shows these drivers: IIOP Protocol Driver The IIOP Protocol driver is a protocol driver that is used to establish communication with IIOP devices. The driver scans for IIOP devices and allows mapping of IIOP devices to ROSA resources. DCM Device Driver The DCM Device Driver allows integrating the embedded GUI of the DCM Supercrypt into ROSA NMS. SCS Configurator The SCS Configurator is used to configure the scrambling-specific parameters of the DCM Supercrypt. AC Manager Component The AC Management Component can be used to create, edit, and delete access criteria and services. SI Distributor A part of the SI Distributor functionality is used by the AC Manager component. Scrambling Control Task Driver The Scrambling Control Task Driver acts as a scrambling/descrambling switch. Notes: When the ROSA system is used for management or configuration purposes, both the IIOP Protocol Driver and DCM Device driver are required. When the ROSA NMS system and DCM Supercrypt(s) participate into CA systems, with the exception of the Macro Component driver all drivers mentioned above must be installed. The AC Manager Component driver and the Scrambling Control Task Driver should not be installed when the Event Information Scheduler (EIS) functionality is performed by a third party device. Pay attention to the following remarks before installing the drivers into the ROSA software: You cannot install drivers with a lower product version. To upgrade a driver, simply install the newer driver. The old driver will be replaced automatically. Do NOT uninstall the old driver first! Rev D 165
182 Appendix B Integrating a DCM Supercrypt into ROSA NMS Downgrading drivers within the same product version is not possible unless you uninstall the drivers first. Uninstalling a driver results in the loss of all configurations because all resources using the driver are removed from the Server Explorer tree. If you install drivers that require a server software version higher than the current installed version, the server software will be upgraded automatically. For detailed information concerning the installation of drivers, please refer to the User s Guide of the ROSA software. To Install the ROSA Drivers The following procedure explains how to install the drivers into the ROSA Software. 1 In the Server Explorer tree of the ROSA system, select the server in which the DCM Supercrypt must be integrated. 2 In the Config menu, point to Drivers. Result: The Installed Drivers dialog is displayed. 3 Press the Install command button. Result: The Open dialog is displayed. 4 Browse to the folder containing the driver files. These driver files can be found on the ROSA Installation CD-Rom or on the following location: ROSA Device Configuration Shell: in the folder \ Program Files \ Scientific-Atlanta \ ROSADevConfShell \ Copernicus \ Drivers\ on the hard disk of the PC running the ROSA software. ROSA Single User: in the folder \ Program Files \ Scientific-Atlanta \ ROSASingleUser \ Copernicus \ Drivers \ on the hard disk of the PC running the ROSA software Rev D
183 Installing the ROSA 3.0 Drivers ROSA Client: on the server s hard disk in the shared folder \ Copernicus \ Drivers Notes: If the \ Drivers folder on the server s hard disk is no longer shared, you can download all driver files to the hard disk of your client computer. On the Installed Drivers dialog, click on the Get Drivers from Server command button. The files are then copied into the folder \ ROSA3 \ Copernicus \ drivers on your local hard disk. When the drivers are downloaded from Scientific Atlanta's FTP server, browse to the location where you stored these files. 5 Select the driver files required for your application. The following table lists the driver files. ROSA NMS Driver IIOP Protocol Driver DCM Device Driver AC Manager Component Scrambling Control Task Driver DVB SI Distributor File Name IIOP Protocol.rsd DCM.rsd AC Manager Component.rsd Scrambling Control Task.rsd SI Distributor.rsd SCS Configurator SCS Configurator.rsd To select multiple drivers, press and hold down the CTRL key, and point to each file. 6 Press the Open command button. Result: After successful installation, the names of the drivers are added to the Installed Drivers dialog. 7 Press the Close command button to close the dialog Rev D 167
184 Appendix B Integrating a DCM Supercrypt into ROSA NMS Note: After selecting the driver files and pressing the Open command button, it may be possible that the server must be rebooted, in this case the following message box is displayed. The following procedure describes how to reboot the server. Close the Please, reboot server (via ROSA)! message box by pointing to the OK command button. On the Installed Drivers dialog, click on the Close command button to close the dialog. In the Server menu, select Manage and point to Reboot Server... Result: The following confirmation box is displayed. Click on the Yes command button to reboot the server. Result: The server starts rebooting Rev D
185 Making Task Instances Making Task Instances Introduction After the installation of the Scrambling Control Task driver and SI Distributor Task driver, task instances for these tasks must be created. Note: As long as no task instance is created for a task, the task will not appear in the Explorer Tree. To Make a Task Instance The following procedure explains how to create a task instance for the Scrambling Control Task. The procedure to make a task instance for the SI Distributor Task is similar. 1 In the Server Explorer tree of ROSA, select the server that participates into the CAS system. 2 In the Config menu, point to Drivers. Result: The Installed Drivers dialog is displayed. 3 Select Scrambling Control Task and click on the Make Task command button. Result: The Make Task dialog is displayed Rev D 169
186 Appendix B Integrating a DCM Supercrypt into ROSA NMS 4 Press the OK command button to confirm. Result: The Scrambling Control Task is added to the Explorer Tree. 5 Click on the Close command button to close the Installed Drivers dialog Rev D
187 Mapping a DCM Supercrypt into ROSA NMS Mapping a DCM Supercrypt into ROSA NMS Introduction Before a DCM Supercrypt can be mapped into the ROSA software, a scan operation must be executed to detect the device. If the scan operation is successfully performed and the device is mapped, the unit will be displayed into the Server Explorer tree of the ROSA system. The procedure to scan and to map a DCM Supercrypt using the IIOP Protocol Driver can be found in following subtopic. To Map a DCM into ROSA NMS The following procedure is designed to be used as step-by-step instructions for mapping a DCM Supercrypt using the IIOP Protocol driver. Note: More detailed information concerning the IIOP Protocol drive can be found in the IIOP Protocol Driver User s Guide. 1 In the Server Explorer tree of the ROSA system, right-click on the IIOP Protocol node and point to Properties in the short-cut menu. Result: The user interface of the IIOP Protocol driver is displayed. 2 Click on the Add... command button Rev D 171
188 Appendix B Integrating a DCM Supercrypt into ROSA NMS Result: The Add devices to scan dialog is displayed. 3 In Identify device by drop down box, select how to identify the device. 4 If IP address is selected, then type the IP address in the From box. If 'IP address range' is selected, then type the IP address range values in the From and To box. 5 In the Time Out box, type a timeout value between 10 and ms. 6 In the Retry Count box, type a retry value between 1 and 5. 7 Click on the OK command button to confirm and to close the dialog. 8 Point to the Apply command button. 9 Select the Map Resources tab on the user interface of the IIOP Protocol driver. Result: The Map Resources tab is displayed Rev D
189 Mapping a DCM Supercrypt into ROSA NMS 10 Select the DCM Supercrypt that must be mapped and click on the New Resource... command button. Result: The New Resource dialog is displayed. 11 Enter a resource name in the Name box and press the OK command button to confirm. Result: The new DCM Supercrypt will be added to the Server Explorer tree Rev D 173
190 Appendix B Integrating a DCM Supercrypt into ROSA NMS Working with the Graphical User Interfaces Opening the Web Browser User Interface Perform the following steps to open the web browser user interface of the DCM Supercrypt via ROSA NMS. 1 In the Server Explorer or Group Explorer tree of the ROSA system, right-click on the DCM Supercrypt resources for which the web browser user interface must be opened and point to Properties in the short-cut menu. Result: The web browser user interface of the selected DCM Supercrypt resource will be opened. Note: The User Interface can also be opened by on the unit in a map. The following picture depicts a DCM Supercrypt Rev D
191 Working with the Graphical User Interfaces Opening the Graphical User Interface of a Task or Component The following steps explain how to open the AC Manager Component. The procedures to open the SCS Configurator and the Scrambling Control Task are similar. Note: Since only a part of the SI Distributor Task functionality is used for DVB Scrambling, an empty GUI will be displayed with the message SI Distributor Control Panel not available due to missing License after opening the task. 1 In the Explorer Tree of the server that participates in the Conditional Access System, right-click on AC Manager Component and point to Properties in the short-cut menu. Result: The AC Manager Component with the Access Criteria dialog is displayed. To Resize the Graphical User Interface The size of the user interface of a task or component can be increased or decreased by dragging the lower right corner of the dialog. Note: The user interface of a task or component cannot be made smaller than the size it was opened Rev D 175
192 Appendix B Integrating a DCM Supercrypt into ROSA NMS To Maximize the Graphical User Interface The user interface of a task or component can be maximized by clicking on the maximize button in the upper right corner of the window. To Close the Graphical User Interface The user interface of a task or component can be closed in one of the following ways: - On the File menu, click on Exit. - Press [Alt] + [F4] - Click on the close button in the upper right corner of the window. The Apply command button When changes are made to settings on the user interface, the new settings must be sent to the device by clicking on the Apply command button. When settings are made on different tabs of the user interface, these settings can be activated all at once by clicking on the Apply command button. The Reload command button When settings are accidentally changed, the previous settings can be restored by clicking on the Reload command button. Note: This reload function works only before the Apply command button has been pressed. Checking the Driver Version There are three different ways to check the user interface of a task or component. - In the Installed Drivers dialog, check the Driver Version column Rev D
193 Working with the Graphical User Interfaces - In the Installed Drivers dialog, select the line of the driver and click on the Details command button. - On the user interface of a task or component, click on About in the Help menu Rev D 177
194
195 C Appx auto letter Configuring the Access Appendix Criteria Introduction This appendix describes how to use the AC Manager Component, which is a part of Scientific Atlanta's Event Information Scheduler. This component is only used for test purposes of applications in which the DCM Supercrypt participates. In This Appendix Introduction General Settings Setting up the Transport Stream Model Defining Access Criteria Rev D 179
196 Appendix C Configuring the Access Criteria Introduction General The ROSA AC Manager Component allows the following actions: Specification of transport streams, services, and components Assignment of services to transport streams Defining the CA System and the necessary access criteria Assignment of access criteria to services and components About the AC Manager Component GUI After opening the AC Manager Component user interface, the main window gives an overview of the services, the corresponding transport stream and the assigned access criteria. A pop-up dialog allows you to configure the access criteria and assign them to services or components Rev D
197 General Settings General Settings To Change the Number Format This allows you to change the number format. You can change the number format from decimal to hexadecimal or vice versa. 1 In the Settings menu, move to NumberFormat. 2 Select the Hex or Dec NumberFormat. - Hex: to view the values as hexadecimal values. - Dec: to view the values as decimal values Rev D 181
198 Appendix C Configuring the Access Criteria Setting up the Transport Stream Model Introduction Before Access Criteria can be assigned to services or components, the Transport Stream model must be setup in the AC Manager Component. This setup can be performed by loading the Transport Stream model from the DCM Supercrypt device(s) or by defining the Transport Stream, services, and components manually. The AC Manager Component supports two different upload scenarios, viz.: The Clear & Reload TS Model upload: this upload scenario replaces the Transport Stream model of the AC Manager Component by the Transport Stream model uploaded from the DCM Supercrypt device(s). This action can be executed for a single Transport Stream or for multiple Transport Streams. The Check for New Service ID upload: this upload scenario performs a synchronization action between the AC Manager Component and the DCM Supercrypt device(s). New services in the Transport Stream of the device(s), of which the service IDs are not present in the Transport Streams of the AC Manager Component, will be added to the Transport Stream tree. Services removed from the Transport Stream of the device(s) remain in the Transport Stream tree of the AC Manager Component. WARNING: After executing a Clear & Reload TS Model upload, services or components with Access Criteria assignments loose these assignments, meaning scrambled services or components become clear. Note: During an upload action only the Transport Stream model is uploaded with: - the Transport Streams containing services for which scrambling is allowed - the services for which scrambling is allowed The corresponding Access Criteria, Access Criteria assignments, and Scrambling Control Groups (scrambling configuration) are not uploaded Rev D
199 Setting up the Transport Stream Model To Set up the TS Model by Uploading the TS Model from the DCM Supercrypt Device(s) The following steps explain how to upload the Transport Stream model from the DCM Supercrypt device(s). 1 Select the TransportStreams - Services tab of the AC Manager Component user interface. Result: The TransportStreams - Services tab page is displayed. 2 Select TransportStreams to upload the model for multiple Transport Streams or a particular Transport Stream to upload the model for this single Transport Stream. 3 Right-click and point to Load Model From Device(s). Result: The Load Model from Devices dialog is displayed. 4 Set the Overwrite the Database Model check box to perform a Clear & Reload TS Model upload or clear the check box to perform a Check for New Service ID upload. 5 Set the Load Components check box to load services with components (for Elementary Stream Level scrambling) or clear the check box to load the services without components (for Service Level scrambling). 6 In the list box, select the Transport Stream(s) for which the TS model must be uploaded. Notes: - You can select a range of devices by holding down the [Shift] key or a number of devices by holding down the [Ctrl] key Rev D 183
200 Appendix C Configuring the Access Criteria - On the Load Model from Devices dialog, a Transport stream is indicated using the following parameters: Device Name: the device name to which the Transport Stream belongs ON ID: the Original Network Identifier of the Transport Stream TS ID: the Transport Stream Identifier of the Transport Stream Additional TS Info: additional information of the Transport Stream like: board number, port number, IP Address, and UDP Port number. 7 Point to the Select command button. Note: A selected Transport Stream (indicated by a ) can be deselected by pointing to the corresponding Transport Stream and clicking on the Deselect command button. 8 Click on the Start command button to start uploading the selected Transport Stream model(s). Note: The Transport Stream Upload process can be checked on the Log tab of GUI. 9 Point to the Close command button to close the Load Model from Device dialog. Note: Once the Transport Stream model is uploaded, the model can always be modified using the procedures described in topic To Set Up the TS Model Manually Rev D
201 Setting up the Transport Stream Model To Set up the TS Model Manually To Add a Transport Stream First you have to configure the Transport Streams by adding them to the Transport Streams tree. The following procedure explains how to add a Transport Stream. 1 Select the TransportStreams - Services tab of the AC Manager Component user interface. Result: The TransportStreams - Services tab page is displayed. 2 Under TransportStreams, click on the Add command button to add a new Transport Stream. Result: The Add TransportStream dialog is displayed. 3 Type the Transport Stream ID in the TS ID box and the Original Network ID in the ON ID box. Note: You can change the number format of ID values from hexadecimal to decimal and vice versa. For more information, see topic General Settings on page Rev D 185
202 Appendix C Configuring the Access Criteria 4 Click on the Add command button. Result: The Transport Stream is added to the TransportStreams tree. 5 Close the dialog box or continue adding more Transport Streams. To Add a Service to the Services List Secondly you have to define services to which you want to assign access criteria. The following steps explain how to add services to a Services list. 1 Select the TransportStreams - Services tab of the AC Manager Component user interface. Result: The TransportStreams - Services tab page is displayed. 2 Under Services, click on the Add command button. Result: The Add Service dialog is displayed. 3 Type the service name in the Service Name box. 4 Type the service provider in the Service Provider box. 5 Click on the Add command button. Result: The service is added to the Services list. 6 Close the dialog box or continue adding more services. To Assign a Service to a Transport Stream Once the services are defined, you can assign them to one or more Transport Streams. The following procedure explains how to assign services to a Transport Stream. 1 Select the TransportStreams - Services tab of the AC Manager Component user interface. Result: The TransportStreams - Services tab page is displayed. 2 Under TransportStreams, select the Transport Stream to which you want to add a service. 3 Under Services, select the service(s) that you want to add to the Transport Stream. Note: You can select a range of services by holding down the [Shift] key or a number of services by holding down the [Ctrl] key. 4 Click on the >> command button. Result: The ID for <service name> dialog appears where <servicename> is replaced by the name of the service you want to add Rev D
203 Setting up the Transport Stream Model Note: If you already assigned the service to another Transport Stream before, then the service ID that was chosen at that time appears in the dialog box. 5 Type the service ID in the Service ID box. Note: You can change the number format of ID values from hexadecimal to decimal and vice versa. For info, see topic General Settings on page Click on the OK command button to confirm. To Add Components to a Service Finally you have to add components (Elementary Streams) to services. The following procedure explains how to add components to a service. 1 Select the TransportStreams - Services tab of the AC Manager Component GUI. Result: The TransportStreams - Services tab is displayed. 2 In the TransportStream box, select the service (prg) to which you want to add a component and right-click on Add Component in the short-cut menu. Result: The Add Component dialog is displayed. 3 Enter the Packet Identifier of the component in the PID box. 4 In the Type drop down box, select the component type. Notes: - If Reserved or User Private is selected, a value can be selected in the drop down box beside the Type drop down box. - If MPEG-1 Audio or MPEG-2 Audio is selected, the language of the audio can be selected in the Language drop down box. 5 Press the Add command button. Result: The component is added to the service. 6 Repeat step 2 up to 5 until all components are added to the service. 7 Point to the Close command button to close the dialog Rev D 187
204 Appendix C Configuring the Access Criteria To Change Transport Stream Properties The following procedure explains how to change Transport Stream properties. 1 Select the TransportStreams - Services tab of the AC Manager Component user interface. Result: The TransportStreams - Services tab page is displayed. 2 Under TransportStreams, select the Transport Stream of which you want to change the properties. 3 Click on the Properties command button. Result: The Transport Stream Properties dialog is displayed. Note: You can change the number format of ID values from hexadecimal to decimal and vice versa. For more information, see topic General Settings on page Change the Transport Stream ID in the TS ID box. 5 Change the Original Network ID in the ON ID box. 6 Click on the OK command button to confirm. To Change Service Properties The following steps explain how to change service properties. 1 Select the TransportStreams - Services tab of the AC Manager Component user interface. Result: The TransportStreams - Services tab page is displayed. 2 Under Services, select the service of which you want to change the properties. 3 Click on the Properties button. Result: The Service Properties dialog is displayed. 4 Type the service name in the Service Name box. 5 Type the service provider in the Service Provider box. 6 Click on the OK command button to confirm or the Cancel command button to abort Rev D
205 To Remove a Transport Stream The following steps explain how to remove a Transport Stream. Setting up the Transport Stream Model Important: If you remove a Transport Stream, only the Transport Stream is removed and not the associated services. 1 Select the TransportStreams - Services tab of the AC Manager Component user interface. Result: The TransportStreams - Services tab is displayed. 2 Under TransportStreams, select the Transport Stream you want to remove. 3 Click on the Remove button. Result: A confirmation box appears. 4 Click on the Yes command button to confirm or the No command button to abort. To Remove a Service from the Service List The following steps explain how to remove a service from the Services list. 1 Select the TransportStreams - Services tab of the AC Manager Component user interface. Result: The TransportStreams - Services tab page is displayed. 2 Under Services, select the service you want to remove. Note: You can select a range of services by holding down the [Shift] key or a number of services by holding down the [Ctrl] key. 3 Click on the Remove button. Result: A confirmation box appears. 4 Click on the Yes command button to confirm or the No command button to abort Rev D 189
206 Appendix C Configuring the Access Criteria To Remove a Service from a Transport Stream The following steps explain how to remove a service from a Transport Stream. 1 Select the TransportStreams - Services tab of the AC Manager Component user interface. Result: The TransportStreams - Services tab page is displayed. 2 Under TransportStreams, select the service that you want to remove. 3 Click on the << command button. Result: The service is removed from the TS. To Remove a Component from a Service The following procedure explains how to remove a component from a service. 1 Select the TransportStreams - Services tab of the AC Manager Component GUI. Result: The TransportStreams - Services tab is displayed. 2 In the TransportStream box, right-click on the component that should be removed and point to Remove in the short-cut menu. Result: A confirmation dialog is displayed. 3 Point to the Yes command button to remove the component or the Cancel command button to abort the operation Rev D
207 Defining Access Criteria Defining Access Criteria Configuration Dialog When you open the AC Manager Component user interface or when you select the Access Criteria tab on the AC Manager Component user interface, the Access Criteria Configuration dialog is automatically displayed. If the Access Criteria Configuration dialog does not appear or is previously closed, you can also right-click on the Access Criteria tab page of the AC Manager Component user interface and click on the Access Criteria Configuration command button Rev D 191
208 Appendix C Configuring the Access Criteria Conditional Access System Information Adding Conditional Access System The following procedure explains how to add a Conditional Access (CA) system to the Access Criteria list. 1 On the Access Criteria Configuration dialog right-click on Access Criteria. Result: A menu appears. 2 Select Add CA System. Result: The Add CA System dialog is displayed. 3 Type the CA system name in the Name box. 4 Type the CA system ID in the CA SystemID box. 5 Type the CA sub system ID in the CA SubSystemID box. 6 Click on the Add command button. Result: The CA system is added to the Access Criteria list. 7 Close the Add CA System dialog box or continue adding more CA systems. To Remove a Conditional Access System from the Access Criteria List The following steps show how to remove a CA system from the Access Criteria list. 1 On the Access Criteria Configuration dialog, right-click on the CA system you want to remove. Result: A menu appears. 2 Select Remove. Result: The selected CA system is removed from the Access Criteria list. Important: A CA system cannot always be removed. - When Access Criteria information is specified for a CA system and the Access Criteria information is also assigned to one or more services or components, the Remove option for the CA system will be disabled. - When Access Criteria information is specified for a CA system but the Access Criteria is not assigned to any service, the Remove option for the CA system is enabled. In case of a remove operation the CA system will be removed together with the corresponding Access Criteria information Rev D
209 Defining Access Criteria Note: More information about Access Criteria information and assigning Access Criteria to services or components can be found in topic Access Criteria Information and Assigning Access Criteria. To Change Conditional Access System Properties The following steps explain how to change the CA system properties. 1 On the Access Criteria Configuration dialog, right-click on the CA system of which you want to change the properties. Result: A menu appears. 2 Select Properties. Result: The CA System Properties dialog is displayed. Important: When Access Criteria information is specified for the CA system and the Access Criteria information is also assigned to one or more services or components, the CA system properties are in read-only mode and cannot be changed. 3 Make the necessary changes on the CA System Properties dialog. 4 Click the OK command button to confirm the changes or the Cancel command button to abort Rev D 193
210 Appendix C Configuring the Access Criteria Access Criteria Information Adding Access Criteria Information The following procedure explains how to add Access Criteria information. 1 On the Access Criteria Configuration dialog right-click on the CA System where you want to add Access Criteria. Result: A menu appears. 2 Select Add Access Criteria. Result: The Add Access Criteria dialog is displayed. 3 Type the name in the Name box. 4 Type the data in the Data box. Note: Data has to be entered in hexadecimal format. 5 Click on the Add command button. Result: The Access Criteria is added to the CA system in the Access Criteria list. 6 Close the Add Access Criteria dialog box or continue adding more Access Criteria information. To Remove Access Criteria Information The following steps show how to remove Access Criteria from a CA system in the Access Criteria list. 1 On the Access Criteria Configuration dialog, right-click on the Access Criteria you want to remove. Result: A menu appears. 2 Select Remove. Result: The selected Access Criteria is removed from the Access Criteria list. Important: When Access Criteria information is specified for a CA system and the Access Criteria information is also assigned to one or more services or components, the Remove option for the Access Criteria will be disabled Rev D
211 Defining Access Criteria Note: More information about assigning Access Criteria to services or components can be found in topic Adding Access Criteria. To Change Access Criteria Properties The following steps explain how to change the Access Criteria properties. 1 On the Access Criteria Configuration dialog, right-click on the Access Criteria of which you want to change the properties. Result: A menu appears. 2 Select Properties. Result: The Access Criteria Properties dialog is displayed. Important: When Access Criteria information is specified for the CA system and the Access Criteria information is also assigned to one or more services or components, the CA system properties are in read-only mode and cannot be changed. 3 Make the necessary changes on the Access Criteria Properties dialog. 4 Click on the OK command button to confirm the changes or the Cancel command button to abort Rev D 195
212 Appendix C Configuring the Access Criteria Assigning Access Criteria Introduction The Entitlement Control Message identifier (ECM ID) labeling a ECM group in a Scrambling Control Group (SCG) provisioning message coming from the Event Information Scheduler (IES) can automatically be generated by the EIS or can be defined by the user. The following illustration shows a representation of a SCG provisioning message. SCG Provisioning Message ECM Groups Service ID xxx.. SCG ID. Components ID xxx Activation Time Supercas ID x Access Criteria xx 2 Supercas ID x Access Criteria xx 3 Supercas ID x Access Criteria xx 4 Supercas ID x Access Criteria xx 5 Supercas ID x Access Criteria xx 6 Supercas ID x Access Criteria xx y Supercas ID x.. Access Criteria xx ECM ID When the ECM ID Mode is set to fixed, what means that the ECM IDs must be defined by the user, an unique ECM identifier must be given during the Access Criteria assignment. More information concerning the ECM ID Mode can be found in topic Changing the ECM ID Mode Rev D
213 Defining Access Criteria Note: The ECM ID Mode is shown in the lower left corner of the Access Criteria Configuration dialog. The Access Criteria assignment has a number of restrictions. The following list describes the Access Criteria assignment restrictions for automatic ECM ID Mode: It is not allowed to assign access criteria to a service if access criteria are already assigned to one or more components belonging to the service. The following list describes the Access Criteria assignment restrictions for fixed ECM ID Mode: The ECM ID must be unique. An ECM ID that is already in use or still pending for removal can not be used. It is not allowed to assign access criteria to a service if access criteria are already assigned to one or more components belonging to the service. The assignment of multiple Access Criteria to a service or component must be done in one assignment operation. Changing the access criteria for a service or component can only be done after removal of all Access Criteria assignments for that service or component. The assignment of Access Criteria using the same ECM ID for several services or components must be done in one assigning operation Rev D 197
214 Appendix C Configuring the Access Criteria Assigning Access Criteria to Services or Components The following procedure explains how to assign Access Criteria to services or components. 1 On the Access Criteria Configuration dialog select one or more Access Criteria from the Access Criteria list. Note: When you hold the [Control] key you can select multiple Access Criteria in the Access Criteria list or when you hold the [Shift] key you can make a selection of multiple consecutive Access Criteria. 2 Select one or more service(s) or component(s) from the TransportStreams list. Note: When you hold the [Control] key you can select multiple services or components in the TransportStream list or when you hold the [Shift] key you can make a selection of multiple consecutive services or components. Result: The >> command button becomes enabled. 3 Click on the >> command button to assign the selected access criteria to the selected service or component. Result: The new assignment appears in the Services to Access Criteria list on the Access Criteria tab page of the AC Manager Component user interface. Note: When the ECM ID Mode is set to fixed, the Set ECM ID for < > dialog is displayed asking a valid ECM ID. Enter a valid ECM identifier in the ECM ID box and point to the OK command button to confirm. 4 Click on the Apply command button of the AC Manager Component user interface to confirm the new assignment or click on the Reload command button to return to the previous status. Removing Assignments The following steps explain how to remove assignments. 1 Select one or more assignments in the Services to Access Criteria list on the Access Criteria tab page of the AC Manager Component user interface. Note: When you hold the [Control] key you can select multiple assignments in the Services to Access Criteria list or when you hold the [Shift] key you can make a selection of multiple consecutive assignments. 2 Click on the Remove command button of the Access Criteria tab. Result: A confirmation message is displayed. 3 Click on the Yes command button to remove the selected assignment(s) or click on the No command button to leave without changes. Result: In case of Yes the selected assignment(s) is (are) removed. 4 Click on the Apply command button to confirm the changes. Note: When Access Criteria is removed from a service or component that contains multiple Access Criteria assignments and the ECM ID Mode is set to fixed, all Access Criteria assignments will be removed from this service or component. The service or component will no longer be scrambled Rev D
215 Defining Access Criteria Rev D 199
216
217 D Appx auto letter Scrambling Control Appendix D Introduction This appendix describes how to use the Scrambling Control Task, which is a part of Scientific Atlanta's Event Information Scheduler. This task is only used for test purposes of applications in which the DCM Supercrypt participates. In This Appendix Introduction General Settings Changing the ECM ID Mode Checking the DCM Devices to which a Transport Stream Belongs Starting and Stopping Scrambling Event Logging Advanced Settings Rev D 201
218 Appendix D Scrambling Control Introduction About the Scrambling Control Task The Scrambling Control Task is a part of Scientific Atlanta s Event Information Scheduler integrated into ROSA NMS and allows configuring the scrambling of service(s) and/or components (Elementary Streams). Next to this scrambling configuration the Scrambling Control Task also logs the events during the connection making process with the DCM Supercrypt device(s) and the events during the scrambling status alteration of service(s) and/or components. The following picture depicts the Scrambling Control Task graphical user interface. The Configuration tab of the Scrambling Control Task represents the Transports Streams, services, and components (Elementary Streams) as configured in the AC Manager Component. A Transport Stream is identified by its Original Network identifier (ON_ID) and Transport Stream Identifier (TS_ID). The program (or service) within a Transport Stream is identified using its Service Identifier (Service_ID) and Service Name. In the TransportStream Services column on the Configuration tab, a Transport Stream represents all DCM Supercrypt devices of which the ON_ID and TS_ID of the outgoing Transport Stream match the indicated IDs Rev D
219 Introduction When a clear to scrambled transition or visa versa is requested for service(s) or component(s), all DCM Supercrypt devices of which the ON_ID and TS_ID of the outgoing Transport Stream match the IDs of the Transport Stream containing the service(s) or components will receive this transition request. Notes: The Scrambling Configuration column on the Configuration tab represents the scrambling made by the task and not the scrambling status of the service(s) and or Elementary Streams in the outgoing Transport Stream on the DCM Supercrypt. Since the connection between the computer running the Scrambling Control Task and a DCM Supercrypt is not synchronized, only one computer running this task can be used to maintain the scrambling control configuration of the DCM Supercrypt devices. Communication Setup During the device-mapping process into ROSA NMS, the communication between the DCM Supercrypt devices and the computer running the ROSA NMS software is established using the IIOP protocol. The DCM Supercrypt devices of which the Original Network Identifier (ON_ID) and the Transport Stream Identifier (TS_ID) of the outgoing Transport Stream match the identifiers of the Transport Streams configured using the AC Manager Component, are connected using the TCP protocol followed by a channel setup. When errors arisen in the communication between the computer running the Scrambling Control Task and the DCM Supercrypt device(s) or during rebooting a DCM Supercrypt or the computer, different communication status messages can be displayed in the Communication Status column on the Configuration tab of the GUI. The following table describes these communication status messages. Communication Message TransportStream Initialization Error Description An error is arisen during the device-getting process of a DCM Supercrypt of which the ON_ID and the TS_ID of the outgoing TS match the IDs of the TS configured using the AC Manager Component. The IP settings could not be retrieved for one of the DCM Supercrypt devices. This error may occur when no EIS interface is configured or the DCM Supercrypt device is not yet responding on IIOP level Rev D 203
220 Appendix D Scrambling Control Communication Message No scramblers Description The Scrambling Control Task can t find DCM Supercrypt devices, of which the ON_ID and TS_ID of the outgoing TS match the configured TS IDs. Possible causes: The DCM Supercrypt device(s) is (are) not responding. The DCM Supercrypt device(s) of which the outgoing TS IDs match the configured TS IDs is (are) not yet mapped into ROSA NMS Note: When the task is running and the DCM Supercrypt becomes responding the device will automatically be included in the communication. Communication started Communication stopped When the TCP connection is made between the computer running the Scrambling Control Task and the DCM Supercrypt the channel setup is started. This message is displayed during the channel setup process. The TCP connection between the computer running the Scrambling Control Task and a DCM Supercrypt device is closed. Possible causes: A DCM Supercrypt no longer reachable An error in the communication An error in the DCM Supercrypt Note: When the device is reachable again the connection will be reestablished (as long as the device is reachable but not yet responding an initialization error may be visible). When the device becomes responding on IIOP level, the driver will try to re-establish the connection again if it did not succeeded the first time. Note: The communication states are combined for all DCM Supercrypt devices of which the outgoing TS IDs match the configured TS IDs. When one DCM Supercrypt fails and the other DCM Supercrypt devices work fine, a communication status message is given for the device that fails. More information concerning the failed device can be found in the Log tab of the GUI. When the communication between the computer running the Scrambling Control Task and a DCM Supercrypt fails the computer will check the communication periodically via ping actions. When the DCM Supercrypt replies within a certain time the computer supposes that the communication is restored and starts establishing the TCP connection followed with a channel set up. If the computer doesn t receives a reply within this time the computer supposes a failed communication and continues the communication check. Particular parameters concerning this restoration action can be configured. More information concerning this configuration can be found in topic Restoring Communication Rev D
221 Starting and Stopping Scrambling Introduction When service(s) or component(s) should be scrambled the computer running the Scrambling Control Task sends Scrambling Control Group provisioning messages with ECM Group(s) to the DCM Supercrypt devices the service(s) or component(s) belongs to. The DCM Supercrypt devices, which receive such a provisioning message, reply with a Scrambling Control Group status message or with a Scrambling Control Group error message. When all DCM Supercrypt devices response with a Scrambling Group Control status message the Scrambling Control Task supposes scrambling is started and the message Provisioning OK appears in the Communication Status column on the Configuration tab of the GUI. At the activation time extracted from the SCG provisioning message the DCM Supercrypt devices start scrambling the service(s) or component(s). In case a DCM Supercrypt replies with a Scrambling Control Group error message the message Provisioning Failed appears in the Communication Status column Rev D 205
222 Appendix D Scrambling Control If a scrambling event must be stopped the computer running the Scrambling Control Task sends a Scrambling Control Group provisioning message without ECM groups to the DCM Supercrypt devices scrambling the service(s) or component(s) belongs to. When the DCM Supercrypt devices reply with a Scrambling Control Group status message the Scrambling Control Task supposes the service(s) or component(s) are clear and the message Deprovisioning OK appears in the Communication Status column. When a DCM Supercrypt replies with a Scrambling Control Group error message, the Deprovisioning Failed message appears. Note: The messages logged by the Scrambling Control Task can be found on the Log page of the task. This Log tab is very useful for troubleshooting purposes when errors arise during scrambling/clear transitions. For more information concerning the Log tab, please refer to topic Event logging further in this chapter. The following table gives an overview of the messages that can be displayed during starting and stopping scrambling. Message Provisioning succeeded Provisioning failed Deprovisioning succeeded Deprovisioning failed No scramblers Description After sending a Scrambling Control Group Provisioning Message (clear/scrambling transition request) the computer running the Scrambling Control Task has received Scrambling Control Group Status Messages from all DCM Supercrypt devices. After sending a Scrambling Control Group Provisioning Message (clear/scrambling transition request) the computer running the Scrambling Control Task has received a Scrambling Control Group Error Message from a DCM Supercrypt. After sending a Scrambling Control Group Provisioning Message without ECM Groups (scrambling/clear transition request) the computer running the Scrambling Control Task has received Scrambling Control Group Status Messages from all DCM Supercrypt devices. After sending a Scrambling Control Group Provisioning Message without ECM Groups (scrambling/clear transition request) the computer running the Scrambling Control Task has received a Scrambling Control Group Error Message from a DCM Supercrypt. The Scrambling Control Task can t find DCM Supercrypt devices, of which the ON_ID and TS_ID of the outgoing TS the service or components belong to, match the configured TS IDs. Possible causes: The DCM Supercrypt device(s) is (are) not responding. The DCM Supercrypt device(s) of which the outgoing TS IDs match the configured TS IDs is (are) not yet mapped into ROSA NMS Note: When the task is running and the DCM Supercrypt becomes responding the device will automatically be included in the communication Rev D
223 Introduction Note: The states are combined for all DCM Supercrypt devices of which the outgoing TS_IDs match the configured TS_IDs. When one DCM Supercrypt fails and the other DCM Supercrypt devices work fine, a status message is given for the device that fails. More information concerning the failed transition can be found in the Log tab of the GUI Rev D 207
224 Appendix D Scrambling Control General Settings Starting the Task The following steps describe how to start the Scrambling Control Task. 1 On the Scrambling Control Task GUI, select the Control tab. Result: The Control tab is displayed. 2 Press the Start command button Automatic Start When the Automatic Start feature of the Scrambling Control Task is enabled, the task will restart automatically after starting up the computer running the task. The following procedure explains how to enable or disable the Automatic Start feature of the task. 1 On the Scrambling Control Task GUI, select the Control tab. Result: The Control tab is displayed. 2 In the Task Configuration box, set the Automatic Start check box to enable the feature or clear the check box to disable the feature Rev D
225 General Settings Stopping the Task The following steps explain how to stop the task. 1 On the Scrambling Control Task GUI, select the Control tab. Result: The Control tab is displayed. 2 Press the Stop command button. Synchronizing the Task with the AC Manager Component The synchronization between the AC Manager Component and the Scrambling Control Task is automatically performed when the task is running. The following procedure explains how to synchronize the Scrambling Control Task with the AC Manager Component when the task is stopped. 1 On the Scrambling Control Task GUI, select the Control tab. Result: The Control tab is displayed. 2 Press the Init command button. To Change the Number Format The read out of some parameters on the Scrambling Control Task can be changed from decimal to hexadecimal or visa versa. Perform the following procedure to change the parameter read out. 1 On the Scrambling Control Task GUI, select NumberFormat in the Settings menu and point to Hex or Dec. - Hex: to view the values as hexadecimal values. - Dec: to view the values as decimal values Rev D 209
226 Appendix D Scrambling Control Changing the ECM ID Mode Introduction The Entitlement Control Message Identifiers (ECM IDs) labeling ECM groups in SCG provisioning messages can automatically be generated by the EIS (ECM ID mode = automatic) or can be defined by the user (ECM ID mode = fixed). These user-defined ECM IDs can then be used to determine the ECM Packet Identifiers (ECM PIDs). When private date should be added to a particular ECM, the ID of that ECM must be used to identify the correct ECM. Note: The ECM ID Mode can only be changed when scrambling of all scrambled services or components is stopped. When Scientific Atlanta s Event Information Scheduler (AC Manager Component and Scrambling Control Task) is used in combination with fixed ECM ID mode, the ECM identifiers must be defined during the Access Criteria assignment process. More information concerning the ECM identifier definition can be found in Assigning Access Criteria. To Change the ECM ID Mode The following procedure explains how to change the ECM ID mode. 1 Open the Scrambling Control Task GUI Rev D
227 Changing the ECM ID Mode 2 Click to the Settings menu, point to ECM ID Mode and select automatic or fixed Rev D 211
228 Appendix D Scrambling Control Checking the DCM Devices to which a Transport Stream Belongs The following procedure explains how to check the DCM Supercrypt devices that correspond with a particular Transport Stream. 1 On the Configuration tab of the Scrambling Control Task user interface, rightclick on the Transport Stream for which the DCM Supercrypt devices must be checked and point to Show Corresponding Scramblers... in the short-cut menu. Result: The Scramblers corresponding with ON ID=X : TS ID=Y dialog is displayed with the DCM Supercrypt devices that correspond with the selected Transport Stream. Note: Press the Close command button to close the dialog Rev D
229 Starting and Stopping Scrambling Starting and Stopping Scrambling Starting Scrambling The following procedure explains how to start a scrambling event. 1 On the Configuration tab of the user interface, right-click on the service(s) or the service(s) containing components that must be scrambled. Notes: - To select consecutive services, click on the first service, press and hold down the SHIFT key, and then click on the last service. To select services that are not consecutive, press and hold down CTRL key, and then click on each service. - When in a multiple select a collapsed transport stream is selected, all services of this transport stream are also selected. 2 Select Start Scrambling in the short-cut menu. Result: The DCM Supercrypt devices with outgoing Transport Stream containing the service/components in question start scrambling. Note: Scrambling can be done on two different levels, namely Component Level scrambling and Service Level Scrambling. Stopping Scrambling Perform the following steps to stop descrambling a service or the components within a service. 1 On the Configuration tab of the user interface, right-click on the service(s) of which scrambling should be ended. Notes: - To select consecutive services, click on the first service, press and hold down the [SHIFT] key, and then click on the last service. To select services that are not consecutive, press and hold down [CTRL] key, and then click on each service. - When in a multiple select a collapsed transport stream is selected, all services of this transport stream are also selected. 2 Select Stop Scrambling in the short-cut menu. Result: The DCM Supercrypt devices with outgoing Transport Stream containing the service/components in question stops scrambling Rev D 213
230 Appendix D Scrambling Control Event Logging The Scrambling Control Task is provided with a powerful event logging system useful for troubleshooting purposes. The list with logging messages is represented on the Log tab of the task user interface. The following picture depicts a list with logging messages. Each message is accompanied by its generation time and date and the messages are arranged in chronological order Rev D
231 Advanced Settings Advanced Settings Restoring Communication Setting the Communication Timeout Parameters The time between two consecutive ping actions (TS Check TimeOut) can be adapted just like the time that the DCM Supercrypt has to reply after a ping action (TS ping TimeOut). The following procedure explains how the change these timeout parameters. 1 On the Scrambling Control Task GUI, select Advanced Settings in the Settings menu. Result: The Advanced Settings dialog is displayed. 2 Change the timeout parameters. Note: The TS Check TimeOut parameter is default set to 5 seconds and the TS Ping TimeOut parameter to 2 seconds. 3 Press the OK command button to confirm or the Cancel command button to abort the operation. Performing a Manual Communication Restoration For particular reasons it can be necessary to start a communication restore attempt manually. The following steps explain how to perform a manual communication restoration. 1 On the Scrambling Control Task GUI, select the Configuration tab. Result: The Configuration tab is displayed. 2 In the TransportStreams Services box, select the Transport Stream with bad communication(s) and point to Retry Communication for Bad Scramblers in the short-cut menu. Result: The computer running the Scrambling Control Task attempts a communication restoration with the DCM Supercrypt device(s). After restoration the current scrambling configuration made by the Scrambling Control Task is sent to the DCM Supercrypt devices of which the outgoing Transport Stream matches the selected Transport Stream Rev D 215
232 Appendix D Scrambling Control Overruling the Scrambling Control Configuration Introduction For certain purposes it can be necessary to overrule the scrambling control configuration of the DCM Supercrypt devices with the configuration made by the Scrambling Control Task. This overruling can be done for a particular Transport Stream, for a DCM Supercrypt, or for all devices controlled by the Scrambling Control Task. WARNING: During an overruling action all scrambled services and elementary stream become clear for a while. Overruling the Scrambling Control Configuration of a Transport Stream The procedure below describes how to overrule the scrambling control configuration of a particular Transport Stream. 1 On the Scrambling Control Task user interface, select the Configuration tab. Result: The Configuration tab is displayed. 2 In the TransportStreams Services box, right-click on the Transport Stream for which the scrambling control configuration must be overruled and select Reset Scrambling in the short-cut menu. WARNING: During the overruling action all scrambled services and elementary streams of the Transport Stream of all devices corresponding with this Transport Stream become clear for a while Rev D
233 Advanced Settings Overruling the Scrambling Control Configuration of a Device Perform the following procedure to overrule the scrambling control configuration of a particular DCM Supercrypt. 1 On the Scrambling Control Task user interface, click on the Tools menu and point to Device Reset Scrambling... Result: The Device Reset Scrambling dialog is displayed. 2 Right-click on the DCM Supercrypt device for which the scrambling control configuration should be overruled and point to Reset Scrambling in the shortcut menu. Result: A confirmation box is displayed. 3 Press the Yes command button to confirm or the No command button to abort the operation. WARNING: During the overruling action all scrambled services and elementary streams of the Transport Streams of the selected DCM Supercrypt device become clear for a while Rev D 217
234 Appendix D Scrambling Control Overruling the Scrambling Control Configuration of all Devices The following procedure explains how to overrule the scrambling control configuration of all devices with the configuration made by the Scrambling Control Task. 1 On the Scrambling Control Task GUI, select the Control tab. Result: The Control tab is displayed. 2 In the Task Configuration box, set the Re-apply the Database Model at Startup check box. 3 Press successively the Stop and Start command button. 4 Clear the Re-apply the Database Model at Startup check box. WARNING: During an overruling action all scrambled services and elementary streams become clear for a while Rev D
235 E Appx auto letter Extended Operations Appendix C Introduction This appendix describes how to download MIBs and traces from the DCM Supercrypt. In This Appendix Downloading MIBs from the DCM Viewing Trace Logs Rev D 219
236 Appendix E Extended Operations Downloading MIBs from the DCM Introduction In order to build your own GUI, the MIB files used by the DCM Supercrypt can be downloaded from the DCM Supercrypt to the hard disk of your PC using the File Transfer Protocol (FTP). To Download MIB files The procedure below describes how a MIB file can be downloaded from a DCM Supercrypt to the hard disk of a PC using FTP. 1 Open a Command Prompt. - Windows NT, 95, 98: point to Start, Programs, and Command Prompt. - Windows 2000: point to Start, Programs, Accessories, and Command Prompt. Result: The Command Prompt dialog is displayed. 2 Change the drive and directory to which you want to copy the MIB file using Dos commands. 3 Type FTP followed by the IP address of the DCM Supercrypt at the command prompt. Result: The system asks a user. 4 Enter guest next to the User <*>: prompt. Result: The system asks the user password. 5 Enter guest next to the Password: prompt. Result: The FTP> prompt is displayed Rev D
237 6 Enter case-sensitive CD mibs at the FTP> prompt. Downloading MIBs from the DCM 7 Enter case-sensitive LS to show the available MIB files on the DCM Supercrypt. 8 Enter case-sensitive get <mib> at the FTP> prompt. with <mib> the name of the MIB file. 9 Press the [ENTER] key Result: The MIB file is copied to the hard disk of PC Rev D 221
238 Appendix E Extended Operations Viewing Trace Logs Introduction The DCM Supercrypt keeps a number of trace logs containing data of particular events. These trace logs are useful for trouble shooting purposes and can directly be opened using the web browser user interface of the DCM Supercrypt or can be downloaded to the hard disk of your PC. The web browser user interface of the DCM allows consulting the following trace logs: Security Log GUI Trace Action Log ORB Trace ORB Timings Mainboard Trace Board 1-4 Trace Transrater Trace DPI Trace The following illustration shows an example of a GUI trace log: Rev D
239 Viewing Trace Logs Note: For certain reasons it can be useful to filter the trace logs. The trace logs of the Main Board (Mainboard Trace) and the trace logs of the interface cards (Board 1-4 Trace) can be filtered by assigning particular filter values. The ORB Trace logs can be filtered by changing the ORB Trace Level. The ORB Trace Level value as well as the filter values will be passed by your Scientific Atlanta representative. Filtering the Card Trace Logs The following procedure explains how to change the trace logs filtering parameters. 1 On the web browser user interface of the DCM Supercrypt, point to the Traces link that appears after clicking on the Help link. Result: The Help - Traces sub page is displayed. 2 In the Device Trace Settings table, enter the values you received from your Scientific Atlanta representative. 3 Point to the Apply command button. Changing the ORB Trace Level The following steps explain how to change the ORB Trace level. 1 On the web browser user interface of the DCM Supercrypt, point to the Traces link that appears after clicking on the Help link. Result: The Help - Traces sub page is displayed. 2 In the ORB Trace Level drop down box, select the ORB Trace level received from your Scientific Atlanta representative Rev D 223
240 Appendix E Extended Operations Checking the Trace Logs The following procedure explains how to view a trace log. 1 On the web browser user interface of the DCM Supercrypt, point to the Traces link that appears after clicking on the Help link. Result: The Help - Traces sub page is displayed. 2 In the Trace Logs table, press the desired trace link. Result: The selected trace log opens. Downloading Trace Logs Introduction The web browser user interface of the DCM Supercrypt allows downloading individual trace log files or exporting of all trace log files compressed into one file. Downloading a Single Trace Log File The procedure below explains how to download a single trace log file. 1 On the web browser user interface of the DCM Supercrypt, point to the Traces link that appears after clicking on the Help link. Result: The Traces sub page is displayed. 2 In the Trace Logs table, right-click on the desired trace link and point to Save Target As... in the short-cut menu Rev D
241 Result: The Save As dialog is displayed. Viewing Trace Logs 3 In the Save in: drop down box, browse to the folder in which the file should be saved. 4 In the File name drop down box, enter the file name. 5 Press the Save command button to save the file. Exporting the Trace Log Files The export function of the web browser user interface of the DCM Supercrypt compresses all trace log files into a single file and exports this file to the hard disk of your PC. This file can also include the Core files of the DCM Supercrypt. Note: A file containing the core files is very large. The following procedure explains how to download the trace log files using the export function. 1 On the web browser user interface of the DCM Supercrypt, point to the Traces link that appears after clicking on the Help link. Result: The Traces sub page is displayed. 2 Tick the Include Core Files check box if the Core files of the DCM Supercrypt must be included. Result: After ticking the Include Core Files check box, the following message box appears. 3 Press the Export command button. Result: The File Download dialog appears after a while. 4 Point to the Save command button. Result: The Save As dialog is displayed. Note: If the file should be saved in a different folder, locate and open the folder. 5 In the File Name box, enter a name for the file. 6 Click on the Save command button to confirm or the Cancel command button to abort the operation Rev D 225
242
243 Glossary AC access criteria. ARP address resolution protocol. Internet protocol used to map an IP addresses to physical (hardware) addresses on local area networks. ATSC Advanced Television Systems Committee of the USA. CA conditional access. The system, software, and components necessary to provide or deny subscribers selective access to specific services. CAM conditional access module. CAS conditional access system. CAT conditional access table. CP crypto period. CW control word. CWG control word generator Rev D
244 Glossary DCM digital content manager. DVB A standard developed by the Digital Video Broadcasting (DVB) Group, which is a European organization that has authored many specifications for satellite and cable broadcasting of digital signals. Part of the DVB work has been focused specifically on conditional access. ECM entitlement control message. ECMG entitlement control message generator. EIS event information scheduler. EMM entitlement management message. EMMG entitlement management message generator. ES elementary stream. GbE or GigE gigabit Ethernet. A LAN transmission standard that provides a data rate of 1 billion bits per second. Gigabit Ethernet is defined in the IEEE 802.3z standard. Gigabit Ethernet is carried primarily on optical fiber. GUI graphical user interface. A program interface that takes advantage of a computer graphics capabilities to make the program visually easier to use. HD or HDTV high definition. A digital television format providing picture quality similar to 35 mm movies with sound quality similar to compact disk (CD) Rev D 228
245 Glossary IANA Internet assigned number authority. IGMP Internet group management protocol. A protocol used to established host memberships in particular multicast groups on a single network. IIOP Internet inter-orb protocol. A protocol developed to implement CORBA solutions over the web. It enables browsers and servers to exchange integers, arrays, and more complex objects. It is a protocol for communication between an application programming interface (API) and an external client. IP Internet protocol. A standard that was originally developed by the United States Department of Defense to support the internetworking of dissimilar computers across a network. IP is perhaps the most important of the protocols on which the Internet is based. It is the standard that describes software that keeps track of the internetwork addresses for different nodes, routes, and outgoing/incoming messages on a network. Some examples of IP applications include , chat, and Web browsers. IP address Internet protocol address. A 32-bit sequence of numbers used for routing IP data. Each IP address identifies a specific component on a specific network. The address contains a network address identifier and a host identifier. LAN local area network. A communications link between two or more points within a small geographical area, such as between buildings. Typically permits data rates up to 100 Mbps. Smaller than a metropolitan area network (MAN) or a wide area network (WAN). LED light-emitting diode. An electronic device that lights up when electricity passes through it. MAC media access control. The layer in the OSI model above the physical layer. It defines media access control methods and parameters for access to the physical media Rev D
246 Glossary MIB management information base. SNMP collects management information from devices on the network and records the information in a management information base. The MIB information includes device features, data throughput statistics, traffic overloads, and errors. MPEG Motion Picture Experts Group. A joint committee of the International Standards Organization (ISO) and the International Electrotechnical Commission (EG). This committee develops and maintains the MPEG specification for a series of hardware and software standards designed to reduce the storage requirements of digital video and audio. The common goal of MPEG compression is to convert the equivalent of about 7.7 MB down to under 150 K, which represents a compression ratio of approximately 52 to 1. Current standards are MPEG-1, MPEG-2, and MPEG-4. mux multiplexer. A device that combines two or more signals into one output. NMS network management system. A software system designed specifically to monitor a network and to facilitate troubleshooting. NTP network time protocol. ON ID original network identifier. ORB object request broker. PAT program association table. PDG private date generator. PID packet identifier or program identifier Rev D 230
247 Glossary PMT program map table. Identifies and indicates the locations of the streams that make up each service, and the location of the Program Clock Reference fields for a service. PSI program specific information. PSIG program specific information/service information generator. PSU power supply unit. RCDS remote control and diagnostics system. RFC request for comments. RMA return material authorization. A form used to return products. ROSA RCDS open system architecture. RU rack unit. RU is the measuring unit of vertical space in a standard equipment rack. One RU equals 1.75" (44.5 mm). SCG scrambling control group. SCS simulcrypt synchronizer Rev D
248 Glossary SD or SDTV standard definition. A digital television format providing picture quality similar to digital versatile disk (DVD). SDT service description table. SDV switched digital video. A technology that allows cable system operators to recover bandwidth from infrequently-viewed channels, by making these channels on-demand. Instead of sending all channels to the set-top boxes, lightly viewed channels are put into a switching pool and only sent to the set-top boxes when viewers tune to them. SFP small form-factor pluggable. SI system or service information. Tuning information sent from the DNCS to DHCTs which provides the information that DHCTs need to be able to tune to a particular service. SID service identifier. SNMP simple network management protocol. A protocol that governs network management and the monitoring of network devices and their functions. TCP transmission control protocol. One of the main protocols in TCP/IP networks. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and packets, and will be delivered in the same order in which they were sent. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet. TS transport stream Rev D 232
249 Glossary TS ID transport stream identifier. TV television. UDP user datagram protocol. A connectionless protocol, like TCP, that runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very few error recovery services, offering instead a direct way to send and receive datagrams over an IP network without acknowledgements for guaranteed delivery. VOD video-on-demand. A service that allows a subscriber to use the remote control to select, purchase, and view an event. Once purchased, the viewer can then forward, reverse, pause, and play the event just as he or she would with a VCR Rev D
250
251 Index ( (Major) Severity parameter 116, max byte counter max byte frames counter byte frames counter 61, byte frames counter 61, byte frames counter 62, byte frames counter 61, byte frames counter 61, 63 A About sub page 19 AC 6, 12 AC Manager Component 165 About 180 Synchronizing with task 209 AC start delay 14 AC Start Delay parameter 104 AC stop delay 14 AC Stop Delay parameter 104 Access Criteria 6, 12 Adding information 194 Assigning 196 Assigning to components 198 Assigning to services 198 Changing properties 195 Removing information 194 Access Criteria Configuration 179 Access Criteria Configuration dialog 191, 192, 194 Access Criteria information 194 Access Criteria list 194, 198 Removing CA system 192 Access Criteria Properties dialog 195 Access Rights 7 Action Log 222 Active ECMG Removed alarm 128 Active EIS Removed alarm 128 Active EMMG Removed alarm 128 Active parameter 83 Active PSIG Removed alarm 128 Add Access Criteria dialog 194 Add CA System dialog 192 Add Component dialog 187 Add Descriptor Rule dialog 106 Add devices to scan dialog 172 Add ECMG dialog 101 Add ID dialog 107 Add New Routing table 81 Add New SNMP Trap Destination table 35 Add New Static ARP Entry table 51 Add New Static Route table 54 Add New User table 22 Add Service dialog 186 Add Standard EIS dialog 110 Add TransportStream dialog 185 Adding CA System 192 Adding components to services 187 Adding Conditional Access System 192 Adding services to service list 186 Adding services to Transport Streams 186 Adding Transport Streams 185 Administrators security group 20 Advanced Settings 214 Advanced Settings dialog 214 Advanced tab page 105 Alarm checking Detailed Service Status Overview table 125 Detailed TS Status Overview table 121 Device Status Overview table 126 Input Service Status Overview table 122 Input TS Status Overview table 120 Output Service Status Overview table 124 Alarm configuration Rev D 235
252 Index Alarm link 115, 116, 117 Alarm message reporting 115 Alarm sub page 115, 116, 117 Alarmed State parameter 120 Alarmed States parameter 123, 125 Applies to ECM ID(s) parameter 108 Apply command button 17, 176 ARP link 51 ARP parameter 57 ARP sub page 50, 51 Assigning Access Criteria 196 Assignments Removing 198 ATSC mode 65, 84 Auto Negotiation parameter 43, 46 Automatic Channel ID Selection parameter 102 B Backup link 26, 27, 48 Backup Mode parameter 47, 48 Backup sub page 26, 27, 48 Bandwidth Exceeded alarm 128 Bit Rate (Mbps) parameter 69 Bit Rates Overview Detailed Service Bit Rates Overview 143 Detailed Service Bit Rates Overview table 132, 134 Detailed TS Bit Rates Overview table 132, 137, 144 Detailed TS Bitrate Overview table 141 Detailed TS Component Bit Rates Overview table 132, 138 Introduction 132 Restarting Measurement 146 Service Bit Rates Overview table 132, 133, 145 TS Bit Rates Overview table 140 Board 1 4 Trace 222 Boundary parameter 45 Broadcast frames counter 61, 62 Browsing through a tree 17 Buffer underrun counter 63 C CA SubsystemID parameter 102 CA SubSystemID parameter 192 CA System Adding 192 CA System Properties dialog 193 CA SystemID parameter 102, 192 CAM 6 Card parameter 64, 83, 120, 122, 124, 126 Card Settings table 41 Card Trace Logs 223 CAS Introduction 5 CC Error alarm 127 Changing Access Criteria Properties 195 Changing card name) 41 Changing default settings 68 Changing default values 65 Changing incoming service settings 89 Changing Number Format 181 Changing service properties 188 Changing SID 92 Changing Transport Stream properties 188 Channel closed by CA System alarm 128 Check for New Service ID upload scenario 182 Check SCG at Provision Time parameter 99 Check Scrambling Control Group at Provisioning Time Option 98 Checking driver version 176 Choose File dialog 27, 79 Clear & Reload TS Model upload scenario 182 Clock link 37, 39 Clock sub page 37, 39 Cold restart 28 Command buttons 176 Communication messages 203 Communication Restoration 214 Communication setup 203 Communication started message 204 Communication stopped message 204 Communication timeout parameters 214 Community String parameter 35 Conditional Access Module 6 Conditional Access System Adding 192 Changing properties 193 Introduction 5 Conditional Access System information 192 Configuration page 46 Configuration settings Exporting 26 Importing 27 Introduction 26 Connection status icons 97 Connection table 102 Connection with CA System lost alarm 128 Control frames counter 61, 62 Control Word 6, 12 Control Word Generator 6, 7, Rev D
253 Index Count parameter 59 Critical alarm 114 Cryptoperiod 12 CW 6, 12 CWG 6, 7 D Data parameter 194 DC-II 65, 84 DCM Device Driver 165 DCM Supercrypt Integrating into ROSA NMS 163 Introduction 2 Modular Concept 3 Principle 4 DCM Supercrypts to which Transport Streams belongs to 211 Default Gateway parameter 54 Default Service Loss Trigger parameters 65 Default Service Loss Trigger table 66 Default Settings link 65, 68, 70, 71 Default Settings sub page 66, 68, 70, 71 Default SI Table Playout table 69 Default values 65, 67, 70 Default VLAN Settings table 69 Delay (ms) parameter 40 Deprovisioning failed message 206 Deprovisioning succeeded message 206 Descriptor Rule Properties dialog 108 Descriptor Rules tab 106, 108, 109 Destination Overview table 56 Destinations link 57 Destinations sub page 56, 57 Detail parameter 120, 123, 124, 125, 126 Detailed Service Bit Rates Overview 143 Detailed Service Bit Rates Overview table 132, 134 Detailed Service Status Overview table 119, 123, 125 Detailed TS Bit Rates Overview table 132, 137, 144 Detailed TS Bitrate Overview table 141 Detailed TS Component Bit Rates Overview table 132, 138 Detailed TS Status Overview table 119, 121 Device clock Changing current time 37 Introduction 37 Device Mapping 171 Device name Changing 33 Introduction 32 Device related alarms 130 Device Reset Scrambling dialog 216 Device Status Overview table 119, 126 Device Trace Settings table 223 Disabling alarm message reporting 115 Display mode Changing 70 Introduction 70 Display Mode parameter 71 Downloading a Service Routing File 80 Downloading MIB files 220 DPI Trace 222 Driver Installation 165 Driver version Checking 176 DVB mode 65, 84 E ECM 8, 13 ECM ID 12 ECM ID Mode Changing 210 Introduction 210 ECM ID Mode parameter 210 ECM PID Source parameter 102 ECMG 8, 12 Changing parameters 103 ECMG Channel Status Message Parameter Values 103 ECMG descriptor rules Adding 106 Changing properties 108 Introduction 105 Removing 109 ECMG interface Assigning 101 Removing 103 ECMG Name parameter 101 ECMG Properties 109 ECMG Properties dialog 105, 106 ECMG Type parameter 101 ECMP Properties dialog 108 EIS 7, 9, 12, 110 EIS Interface Assigning 110 Changing properties 111 Introduction 110 Removing 112 EIS Name parameter Rev D 237
254 Index EIS Type parameter 111 Elementary stream level scrambling 11 EMM 7 Enable parameter 44 Enabling alarm message reporting 115 Enter ID parameter 107 Entitlement Control Message 8, 12 Entitlement Control Message Generator 8, 12, 100 Entitlement Management Messages 7 Error Intervals (ms) parameters 118 ETR 290, 1st Priority Alarms 127 Event Information Scheduler 7, 9, 12, 110 Event Logging 213 Exporting configuration settings 26 F Fan Failure alarm 130 FCS/CRC error counter 62 File Name parameter 26 Filter parameter 59 First Source IP Address parameter 59 Force Audio 3 67, 86 Force Uplink mode 67, 86 Force Video mode 67, 86 Forced SID parameter 92 Fragments counter 62 Frames Received counters 61 G Gateway parameter 54 GbE Enable Settings table 44 GbE port backup 47 Changing 48 GbE port interface parameters Checking 45 Configuring 43 Introduction 42 GbE port pair 44 GbE Statistics Checking 64 Introduction 61 GbE UDP Boundary 44 General Alarms parameter 117 General Settings 208 Generate Test Message 116 Global Alarm Setting table 115, 116, 118 Global counters 63 Guest security group 20 GUI Closing 176 Maximizing 176 Resizing 175 GUI Trace 222 H Hardware Configuration box 46 I ID for<service name> dialog 186 IGMP link 58, 60 IGMP Multicast Groups Introduction 58 Joining a GbE port 58 Leaving a GbE port 60 IGMP Settings table 60 IGMP sub page 58, 60 IIOP Protocol driver 171 IIOP Protocol Driver 165 Image legend 18 Import Device Settings from File parameter 27 Importing configuration settings 27 Incoming Services Changing settings 89 Increment Scheme parameter 69 Indeterminate alarm 114 Info sub page 45 Information alarm 114 Input - Card parameter 77, 93 Input Card parameter 81 Input - IP Address parameter 77 Input IP Address parameter 81 Input IP Address parameter 93 Input Name parameter 93 Input ON ID parameter 93 Input - Port parameter 77, 93 Input Port parameter 81 Input - SID parameter 77, 93 Input SID parameter 82 Input TS ID parameter 93 Input Type parameter 81 Input - UDP Port parameter 77 Input UDP Port parameter 82 Input UDP Port parameter 93 Input Gen. EMM and Private PIDs parameter 72 Input Service Status Overview table 119, 122 Input Services - TS ID parameter 84 Input standard Rev D
255 Index Changing 84 Introduction 84 Input Standard parameter 66, 85 Input TS Status Overview table 119, 120 Input/Output parameter 83 Insert IP Address Range parameter 59 Insert parameter 107 Insert Range parameter 59 Installed Drivers dialog 166, 167, 169 Interface alarms settings 117 Interface card name 41 Interface card related alarms 127 Interface sub page 41, 42, 43, 44 Introducing Trace Logs 222 Invalid Opcode counter 62 IP Address parameter 35, 39, 43, 46, 51, 54, 56, 85, 102, 120, 122, 124 J Jitter (ms) parameter 40 Join or Modify Multicast Group table 58 L Language parameter 187 Last Poll parameter 40 Legend 18 Length/Type out of range counter 62 Link Status 128 Load Components parameter 183 Load Model from Devices dialog 183, 184 Logging off 21 Logging on 21 Login page 21 Logout link 21 M MAC Address parameter 46, 51 Mainboard Trace 222 Major alarm 114 Make Task dialog 169 Making task instances 169 Map Resource tab 172 Maximum Compute Time parameter 103 Measurement parameter 121, 124, 126 MIB files Downloading 220 Introduction 220 Minimum Crypto Period Duration parameter 104 Minor alarm 114 Missing in PAT alarm 89 Mode parameter 64, 66 Modular Concept 3 Multicast frames counter 61, 62 Multicast IP Address parameter 59 N Name parameter 33, 41, 43, 46, 106, 121, 123, 125, 173, 192, 194 New Resource dialog 173 No Components to Scramble CP Extension alarm 128 No ECMG Connection Available alarm 128 No ECM's available CP Extension 128 No EMM resources available 129 No scramblers error 204 No scrambling message 206 NTP Server Configuration settings 38 NTP Server IP Address parameter 38 NTP Servers table 39 NTP Statistics 39 NTP Statistics sub page 39 Number Format Changing 181, 209 Number parameter 46 NumberFormat parameter 181 O Offset (ms) parameter 40 ON ID parameter 85, 120, 123, 125, 185, 188 ORB Timings 222 ORB Trace 222 ORB trace level Changing 223 ORB Trace Level parameter 223 Outgoing Transport Stream Settings 85, 87 Output - Card 77 Output Card parameter 82 Output - Forced SID parameter 93 Output - IP Address parameter 77 Output IP Address parameter 82 Output - Name parameter 78, 93 Output Name parameter 82 Output - ON ID parameter 77 Output ON ID parameter 82 Output - Port parameter 77 Output Port parameter 82 Output - SID parameter 78 Output SID parameter 82 Output - TS Bit Rate (Mbps) parameter 78 Output TS Bit Rate (Mbps) parameter Rev D 239
256 Index Output - TS ID parameter 77 Output TS ID parameter 82 Output Type parameter 82 Output - UDP port parameter 77 Output UDP Port parameter 82 Output Protocol parameter 67, 69, 86 Output Rate parameter 67, 69, 86 Output Service - TS ID parameter 92 Output Service Status Overview table 119, 124 Output SID parameter 93 Output Standard parameter 67, 69, 86 Overrule Recommended CP Duration parameter 111 Oversized frames counter 62, 63 Overwrite the Database Model parameter 183 P Password parameter 21, 22 PAT Error 127 Pause frames counter 61, 63 PID could not be allocated alarm 129 PID Error alarm 89 PID parameter 128, 187 PMT Error 127 PMT Error alarm 89 PMT section exceeds 1K 129 Poll Int parameter 40 Popup windows 19 Port Nr. parameter 56 Port parameter 51, 102, 120, 122, 124, 126 Power up alarm 130 Principle 4 Priority parameter 70, 102 Private Data parameter 107 Properties dialog 103, 108 Provisioning failed message 206 Provisioning succeeded message 206 PS 1 Failure alarm 130 PS 2 Failure alarm 130 R Rate parameter 86 Reach parameter 40 Read Community parameter 36 Read community string Changing 36 Introduction 34 Received Channel Error Message alarm 129 Reception Errors counters 62 Re-enter Password parameter 22 Ref ID parameter 39 REF Type parameter 40 Reload command button 17, 176 Removing AC System from Access Criteria list 192 Removing Access Criteria information 194 Removing assignments 198 Removing components from services 190 Removing services from service list 189 Removing services from Transport Stream 190 Removing SNMP Trap Destinations 36 Removing Transport Streams 189 Reset Scrambling 216 Restarting 28 Restoring Communication 214 Retry Communication for Bad Scramblers 214 Revert Delay (s) parameter 48, 49 Revertive parameter 48 ROSA Client 167 ROSA Device Configuration Shell 166 ROSA NMS 163 Device Mapping 171 Driver Installation 165 Graphical User Interface 174 Introduction 164 Making task instances 169 ROSA Single User 166 Routes link 54, 55 Routes sub page 53, 54, 55 Routes to Destinations Checking 57 Introduction 56 Routing parameter 56 Routing Status table 80 Rx Counters 62 S SCG 8, 10, 14 SCG Accept Delay parameter 99 SCG provisioning message 196 Scramble only Audio/Video parameter 99 Scramble only Audio/Video parameter 98 Scrambling 6 Starting 205, 212 Stopping 205, 212 Scrambling Configuration ECMG 100 EIS 110 Introduction 96 Scrambling parameters 98 Scrambling Control Configuration Rev D
257 Index Introduction 215 Overruling 215, 216, 217 Scrambling Control Group 8, 10, 14 Scrambling Control Group Accept Delay parameter 98 Scrambling Control Task Introduction 202 Scrambling Control Task Driver 165 Scrambling levels 11 Scrambling not started alarm 129 Scrambling properties Changing 99 Introduction 98 Scrambling Properties dialog 99 Scrambling/descrambling key 6 SCS 6, 7, 12 SCS Configurator 96, 165 SCS Configurator dialog 101, 103, 105, 106 SD/HD Mismath alarm 129 SDV 2 Security 20 Security accounts 20 Adding 22 Changing properties 23 Deleting 23 Security Accounts table 22, 23 Security Group parameter 22, 23 Security groups 20 Security link 22, 23 Security Log 222 Security page 22, 23 Service Adding components 187 Service Bit Rates Overview table 132, 133, 145 Service Grooming table 74, 76, 83, 84, 87, 90, 92 Service ID parameter 187 Service level scrambling 11 Service link 79, 83, 87, 92 Service List Adding services 186 Service Loss Mode parameter 91 Service Loss PID Error parameter 91 Service Loss PID Type parameter 91 Service Loss alarm 129 Service Loss Alarm triggers 89 Service Loss parameter 65 Service Loss Trigger Parameters 65 Service Name parameter 186, 188 Service properties Changing 188 Service Properties dialog 188 Service Provider parameter 186, 188 Service Routing Adding 81 Creating 76 Introduction 74 Manipulating 81 Removing 83 Service Routing Files Creating 77 Downloading 80 Introduction 76 Uploading 79 Service Settings table 85, 90, 92 Service to Access Criteria list 198 Services to Access Criteria list 198 Setup Communication 203 Show Corresponding Srcamblers 211 SI Distributor 165 SID changing 92 SID parameter 121, 123, 125 Simulcrypt scrambling 12 Simulcrypt Synchronizer 6, 7, 12 SNMP link 35, 36 SNMP sub page 35, 36 SNMP Trap - Format parameter 35 SNMP Trap Destination Settings table 35, 36 SNMP trap destinations Adding 35 Introduction 34 Removing 34 SNMP Trap Format 35 Software Upgrade Introduction 148 System Requirements 148 Upgrade-It 149 Upgrading 152 Source IP Address parameter 59 Standard EIS Properties dialog 111 Start delay 13 Start Delay parameter 104 Start IP Address parameter 69 Start UDP Port parameter 69 Starting scrambling 212 Starting Scrambling 205 Starting the task 208 State parameter 46 Static ARP Settings table 51, 52 Static ARP table entries Rev D 241
258 Index Adding entries 51 Deleting entries 51 Introduction 50 Static Route Settings table 54, 55 Static route table Adding entries 54 Introduction 53 Removing entries 55 Static Route table 55 Status link 64 Status parameter 120, 121, 122, 123, 124, 125, 126 Stop delay 13 Stop Delay parameter 104 Stopping scrambling 205 Stopping the task 209 Stratum parameter 40 Stream Type 65, 84 Streaming parameter 86 Subnet Mask parameter 43, 46, 54 Switched Digital Video 2 Sync Byte Error 127 Synchronization parameter 37 Synchronization Type parameter 38 Synchronizing with NTP server 38 System Settings table 33 System sub page 33 T Table View sub page 79, 81, 83, 92 Tally parameter 39 Task Automatic start 208 Stopping 209 TCP Port parameter 111 Temperature alarm 130 Test Messages 116 Time Zone Selection parameter 38 Timing parameters 12 Toolbars 19 Total Bit Rate (Mbps) parameter 85 Total Bytes received counter 63 Total Bytes transmitted counter 62, 63 Total frames received counter 61 Trace Logs Checking 224 Introduction 222 Trace Logs table 224 Traces link 223, 224 Traces sub page 223, 224 Transition start delay 13 Transition Start Delay parameter 104 Transition stop delay 14 Transition Stop Delay parameter 104 Transmission errors counters 63 Transparent mode 67, 86 Transport Stream Adding services 186 Changing properties 188 Transport Stream list 198 Transport Stream Model Introduction 182 Transport Stream Properties dialog 188 Transport Streams Adding 185 TransportStream initialization error 203 Transrating Trace 222 Trigger Alarm parameter 48, 49 TS Advanced 88 TS Bit Rates Overview table 140 TS Bitrate Overview table 132, 135 TS Check Timeout parameter 214 TS Default Settings table 69 TS ID parameter 85, 120, 123, 125, 185, 188 TS Model Setup 182 Uploading 183 TS Model set up 185 TS Output sub page 87, 92 TS Ping Timeout parameter 214 TS Settings table 85, 87, 90 TS Sync Loss alarm 127 Type parameter 46, 107, 187 U UDP Loss 129 UDP Port parameter 85, 120, 122, 125 UDP Stream Loss alarm 129 UDP Stream Moss alarm 89 Undersized frames counters 62 Unreferenced Pid Error 129 Unsolicited IGMP Message parameter 59 Update all TS table 88, 89 Upgrade IT Tool 152 Upgrade-It 149 Upgrade-It dialog 152 Uploading TS Model 183 User Name parameter 21, 22, 23, 89, 91 User Time parameter 38 Users security group Rev D
259 Index V Value(s) parameter 121, 124, 126 Version Info link 25 Version Info sub page 25 Version information 25 Video on Demand 2 View parameter 83 VLAN ID parameter 69, 86 VLAN Priorities parameter 86 VLAN settings 68, 86 VLAN Settings 88 VLAN Settings table 88 VLAN tagged frames counter 61, 63 VOD 2 W Warm restart 28 Warning alarm 114 Web browser toolbars 19 Web browser user interface Introduction 17 Logging off 21 Logging on 21 Security 20 Toolbars 19 Version 19 Write Community parameter 36 Write Community String Changing 36 Introduction Rev D 243
260 Scientific-Atlanta Europe NV Luipaardstraat 12 B-8500 Kortrijk, Belgium This document includes various trademarks of Scientific-Atlanta, Inc. Please see the Notices section of this document for a list of Scientific Atlanta trademarks used in this document. All other trademarks shown are trademarks of their respective owners. Product and service availability subject to change without notice Scientific-Atlanta Europe NV. All rights reserved. April 2007 Printed in Belgium Part Number Rev D
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
4029541 Rev B. Cisco RF Gateway 1 Remote Management Utility (RMU) User Guide
4029541 Rev B Cisco RF Gateway 1 Remote Management Utility (RMU) User Guide For Your Safety Explanation of Warning and Caution Icons Avoid personal injury and product damage! Do not proceed beyond any
NEC Express5800 Series NEC ESMPRO AlertManager User's Guide
NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
Ross Video Limited. DashBoard Server and User Rights Management User Manual
Ross Video Limited DashBoard Server and User Rights Management User Manual DashBoard Server and User Rights Management User Manual Ross Part Number: 8351DR-004A-01 Release Date: March 22, 2011. Printed
Prisma II Software Upgrade Program (SOUP) Installation Guide
Prisma II Software Upgrade Program (SOUP) Installation Guide Overview The Prisma II Software Upgrade Program (SOUP) is a user-friendly utility that allows users to perform firmware upgrades on Prisma II
Using RAID Admin and Disk Utility
Using RAID Admin and Disk Utility Xserve RAID Includes instructions for creating RAID arrays and monitoring Xserve RAID systems K Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. Under
Personal Call Manager User Guide. BCM Business Communications Manager
Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008
Cisco RF Gateway 1 Software Release Notes, Release 1.03.17
Cisco RF Gateway 1 Software Release Notes, Release 1.03.17 Overview Introduction Software Release 1.03.17 is an SDV capable release for the RF Gateway 1 which supports Motorola DigiCipher streams (C0/C1
Gigabyte Content Management System Console User s Guide. Version: 0.1
Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
Compuprint 4247 Serial Matrix Printers
Compuprint 4247 Serial Matrix Printers Remote Printer Management Utility for Serial Matrix Printers MAN10300-00.00 First edition (October 2011) This edition applies to the Compuprint 4247 printers and
Configuration Backup Restore
Configuration Backup Restore June 2010 2010 Avaya Inc. All Rights Reserved. States and other countries. Adobe and Flash are either trademarks or registered trademarks in the United States and/or other
SonicOS Enhanced 3.8.0.6 Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007
SonicOS Enhanced 3.8.0.6 TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007 CONTENTS PLATFORM COMPATIBILITY SONICWALL RECOMMENDATIONS KNOWN ISSUES RESOLVED KNOWN ISSUES UPGRADING
InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers
InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices
Digital Video Broadcasting Conditional Access Architecture
Digital Video Broadcasting Conditional Access Architecture Introduction Digital Video Broadcasting (DVB) is a standard defining a one-to-many unidirectional data network for sending digital TV programs
How To Check If Your Router Is Working Properly
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the
Foglight Experience Monitor and Foglight Experience Viewer
Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C
USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces
Intel Active Management Technology with System Defense Feature Quick Start Guide
Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine
Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business
Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for
TDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module
Panduit Corp. 2010 TDP43ME NetPS PA26306A01 Rev. 01 11-2010 Network Printer Server Control Center for Ethernet Module NOTE: In the interest of higher quality and value, Panduit products are continually
Quick Start Guide. Cisco SPA232D Mobility Enhanced ATA
Quick Start Guide Cisco SPA232D Mobility Enhanced ATA Package Contents Analog Telephone Adapter Ethernet Cable Phone Cable Power Adapter Quick Start Guide Product CD-ROM Welcome Thank you for choosing
Monitoring Conditional Access Systems
Monitoring Conditional Access Systems Introduction A Conditional Access system is a key component for most digital TV operations. They secure the operators investments by encrypting the signals and ensures
AT-GS950/8. AT-GS950/8 Web Users Guide AT-S107 [1.00.043] Gigabit Ethernet Smart Switch. 613-001484 Rev A
AT-GS950/8 Gigabit Ethernet Smart Switch AT-GS950/8 Web Users Guide AT-S107 [1.00.043] 613-001484 Rev A Copyright 2011 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced
Chapter 4 Management. Viewing the Activity Log
Chapter 4 Management This chapter describes how to use the management features of your NETGEAR WG102 ProSafe 802.11g Wireless Access Point. To get to these features, connect to the WG102 as described in
MULTIFUNCTIONAL DIGITAL SYSTEMS. TopAccess Guide
MULTIFUNCTIONAL DIGITAL SYSTEMS TopAccess Guide 0 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in any form without prior written permission of
MultiScreen 4. Hardware and software system for real time monitoring of multiple sources of video and audio signals. User s Manual
MultiScreen 4 Hardware and software system for real time monitoring of multiple sources of video and audio signals. User s Manual Contents Chapter 1. Components and installation for the system..................................3
Chapter 3 Management. Remote Management
Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described
Access to remote DVR from IE USER S MANUAL CONTENT
Access to remote DVR from IE CONTENT... 2 Preface... 2 1. Introduction... 2 2. System requirement and executing environment... 2 2.1. Supported operating System:... 2 2.2. Hardware requirement (recommend):...
138 Configuration Wizards
9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP
Avaya Network Configuration Manager User Guide
Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information
Features Reference. About Unified Communication System. Before Using This Machine. Starting a Meeting. What You Can Do During the Meeting
Features Reference About Unified Communication System Before Using This Machine Starting a Meeting What You Can Do During the Meeting Leaving a Meeting Managing Address Book Changing Network Configuration
Pro-Watch Software Suite Installation Guide. 2013 Honeywell Release 4.1
Pro-Watch Software Suite Release 4.1 Installation Guide Document 7-901073V2 Pro-Watch Software Suite Installation Guide 2013 Honeywell Release 4.1 Copyright 2013 Honeywell. All rights reserved. Pro-Watch
HOW TO TRANSFER FILES BETWEEN EEN IDL7000 PVR AND USB2 DEVICE
HOW TO TRANSFER FILES BETWEEN EEN IDL7000 PVR AND USB2 DEVICE CONTENTS CONTENTS...2 FOREWORD...3 TRANSFERRING FILES BETWEEN IDL7000M PVR AND USB2 DEVICE...4 CONNECTING AN EXTERNAL USB2 DEVICE...4 COPYING
HP EMAIL ARCHIVING SOFTWARE FOR EXCHANGE
You can read the recommendations in the user guide, the technical guide or the installation guide for HP EMAIL ARCHIVING SOFTWARE FOR EXCHANGE. You'll find the answers to all your questions on the HP EMAIL
ProSAFE 8-Port and 16-Port Gigabit Click Switch
ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.
SMS Database System Quick Start. [Version 1.0.3]
SMS Database System Quick Start [Version 1.0.3] Warning ICP DAS Inc., LTD. assumes no liability for damages consequent to the use of this product. ICP DAS Inc., LTD. reserves the right to change this manual
SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3
SIP Proxy Server Administrator Installation and Configuration Guide V2.31b 09SIPXM.SY2.31b.EN3 DSG, DSG logo, InterPBX, InterServer, Blaze Series, VG5000, VG7000, IP590, IP580, IP500, IP510, InterConsole,
Fiery E100 Color Server. Welcome
Fiery E100 Color Server Welcome 2011 Electronics For Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45098226 27 June 2011 WELCOME 3 WELCOME This Welcome
GS510TP and GS110T Gigabit Smart Switches
GS510TP and GS110T Gigabit Smart Switches Software Administration Manual 350 East Plumeria Drive San Jose, CA 95134 USA December 2011 202-10883-01 v1.0 2011 NETGEAR, Inc. All rights reserved No part of
TOSHIBA GA-1310. Printing from Windows
TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS
SNMP Web Management. User s Manual For SNMP Web Card/Box
SNMP Web Management User s Manual For SNMP Web Card/Box Management Software for Off-Grid Inverter Version: 1.2 Table of Contents 1. Overview... 1 1.1 Introduction... 1 1.2 Features... 1 1.3 Overlook...
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
Software Update Manager User Guide
Software Update Manager User Guide October 2011 2011 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document is complete and accurate
Getting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A
Ascent Capture Internet Server 5 Getting Started with Ascent Capture Internet Server 5 10300260-000 Revision A Copyright Copyright 2001 Kofax Image Products. All Rights Reserved. Printed in USA. The information
Cisco TelePresence VCR MSE 8220
Cisco TelePresence VCR MSE 8220 Getting started 61-0008-05 Contents General information... 3 About the Cisco TelePresence VCR MSE 8220... 3 Port and LED location... 3 LED behavior... 4 Installing the VCR
DVCrypt Conditional Access System
DVCrypt Conditional Access System Quick start guide 1. Introduction DVCrypt is a conditional access system for digital TV broadcasting networks (DVB). It consists of hardware modules and client/server
Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0
Smart Control Center User Guide 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10685-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted,
Smart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
i -CEN S USER S Manual 2007. 08. 13.
i -CEN S i -CEN'S USER S Manual 2007. 08. 13. i -CEN S Table of Contents Overview of i-cen S software... 4 1 Introduction of i-cen S... 4 2 Key Features... 5 3 Key Benefits... 5 4 System Specification...
RouteFinder SOHO. Quick Start Guide. SOHO Security Appliance. EDGE Models RF825-E, RF825-E-AP CDMA Models RF825-C-Nx, RF825-C-Nx-AP
RouteFinder SOHO SOHO Security Appliance EDGE Models RF825-E, RF825-E-AP CDMA Models RF825-C-Nx, RF825-C-Nx-AP Quick Start Guide RouteFinder RF825 Series Quick Start Guide RouteFinder SOHO Security Appliance
Accounting Manager. User Guide A31003-P1030-U114-2-7619
Accounting Manager User Guide A31003-P1030-U114-2-7619 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001 and ISO14001 standards and are certified
ProSafe Plus Switch Utility
ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No
Network Installation Guide. Artisan 810 Series
Network Installation Guide Artisan 810 Series Before You Begin Make sure you installed ink cartridges and loaded paper as described on the Start Here sheet. Then follow the instructions in this guide to
1 DVR 670 Series firmware version 2.1.2 (date 2014-06-17)
Video Recorder 670 Series 1 DVR 670 Series firmware version 2.1.2 (date 2014-06-17) File name: 600rtseries_2.1.2_140617.bin - When a unit detects a HDD error, the DVR will automatically reboot so that
Avaya Wireless AP Device Manager User Guide
Avaya Wireless AP Device Manager User Guide February 2003 Avaya Wireless AP Device Manager User Guide Copyright Avaya Inc. 2003 ALL RIGHTS RESERVED The products, specifications, and other technical information
IX Support Tool Setting Manual
IX System IP network-compatible intercom IX Support Tool Setting Manual Software version 2.0.0.0 or later Before configuring and using the system, read Setting Manual and Operation Manual (PDF) carefully.
Configuration Manager 1.6
Configuration Manager 1.6 en Manual Configuration Manager 1.6 Table of Contents en 1 Table of Contents 1 Introduction 3 1.1 About this manual 3 1.2 Conventions in this manual 3 1.3 System requirements
NVMS - 1000 USER MANUAL. Version 2.1.0
NVMS - 1000 USER MANUAL Version 2.1.0 Contents 1 Software Introduction... 1 1.1 Summary... 1 1.2 Operation Environment... 1 1.3 Install and Uninstall... 2 1.3.1 Install the Software... 2 1.3.2 Uninstall
Server Manual. For Administrators of Cameleon Version 4
Server Manual For Administrators of Cameleon Version 4 Cameleon Version 4 Server Manual For Administrators of Cameleon Version 4 R4-07OCT04 Copyright 2004 360 Surveillance Inc. Camera Cameleon is a trademark
Vodafone PC SMS 2010. (Software version 4.7.1) User Manual
Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6
FastTrak TX4000, FastTrak S150 TX2plus, FastTrak S150 TX4 PROMISE ARRAY MANAGEMENT ( PAM) User Manual
FastTrak TX4000, FastTrak S150 TX2plus, FastTrak S150 TX4 PROMISE ARRAY MANAGEMENT ( PAM) User Manual Version 1.1 Promise Array Management Copyright 2003 Promise Technology, Inc. Copyright by Promise Technology,
UFR II Driver Guide. UFR II Driver Ver. 2.20 ENG
UFR II Driver Guide UFR II Driver Ver. 2.20 Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG 0 Ot UFR II Driver
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
GUIDE. Web Client Application. Model: ER 4.0. Release 4.0.00 / Version No.: 1.01
8e6R Enterprise Reporter USER GUIDE Web Client Application Model: ER 4.0 Release 4.0.00 / Version No.: 1.01 ii 8E6 TECHNOLOGIES, ENTERPRISE REPORTER WEB CLIENT USER GUIDE 8E6 ENTERPRISE REPORTER WEB CLIENT
Camera Management Tool User Manual
Network Camera Camera Management Tool User Manual The Operation Guide should be read before using the network camera. ENGLISH Introduction This manual describes how to configure and operate Camera Management
Quick Start Guide. RV 120W Wireless-N VPN Firewall. Cisco Small Business
Quick Start Guide Cisco Small Business RV 120W Wireless-N VPN Firewall Package Contents Wireless-N VPN Firewall Ethernet Cable Power Adapter Quick Start Guide Documentation and Software on CD-ROM Welcome
Monitoring Network DMN
Monitoring Network DMN User Manual Table of contents Table of contents... 2 1. Product features and capabilities... 3 2. System requirements... 5 3. Getting started with the software... 5 3-1 Installation...
A6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual
802.11ac USB 3.0 Dual Band User Manual August 2014 202-11373-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the
R&S AFQ100A, R&S AFQ100B I/Q Modulation Generator Supplement
I/Q Modulation Generator Supplement The following description relates to the Operating Manuals, version 03 of R&S AFQ100A, and version 01 of R&S AFQ100B. It encloses the following topics: LXI features,
Page 1 S5.5 Monitoring Software Manual Rev 1.2 for Software Ver 1.0
Trantec S5.5 Monitoring Software Manual Initial Setup Minimum PC Requirements 1.6 GHz CPU, 256 MB Memory, 1 available USB port, Windows XP Recommended PC >2.0 GHz CPU, 512 MB (XP) 1 GB (Vista) memory,
Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13
Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this
CA XCOM Data Transport for Windows Server/Professional
CA XCOM Data Transport for Windows Server/Professional Installation Guide Release 11.6 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials,
email-lead Grabber Business 2010 User Guide
email-lead Grabber Business 2010 User Guide Copyright and Trademark Information in this documentation is subject to change without notice. The software described in this manual is furnished under a license
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Deployment Guide for Maximum Security Environments Polycom HDX Systems, Version 3.0.5
Polycom HDX Systems, Version 3.0.5 A warning about operating in a maximum security environment The maximum security profile is designed to lock down communications to the most stringent requirements of
genie app and genie mobile app
genie app and genie mobile app User Manual 350 East Plumeria Drive San Jose, CA 95134 USA June 2012 202-10933-02 v1.0 2012 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,
NVMS-1200. User Manual
NVMS-1200 User Manual Contents 1 Software Introduction... 1 1.1 Summary... 1 1.2 Install and Uninstall... 1 1.2.1 Install the Software... 1 2 Login Software... 3 2.1 Login... 3 2.2 Control Panel Instruction...
24 Port Gigabit Ethernet Web Smart Switch. Users Manual
24 Port Gigabit Ethernet Web Smart Switch Users Manual Content Web Smart Switch Configure login -------------------------------- 2 Configuration System Configuration ---------------------------------------------------
IS SERIES. QuikStart Programming Guide. IP Network Direct System. Programming Videos
0215 IS SERIES IP Network Direct System QuikStart Programming Guide 1 4 GHI 2 ABC 5 JKL 3 DEF 6 MNO PRIVACY TRANSFER LIST SETTING 7 PQRS 8 TUV 9 WXYZ ZOOM 0 # WIDE Programming Videos ATTENTION: This is
How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking
Chapter 7 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax NEXT Wireless Router WNR854T. These features can be found by clicking on the Maintenance
Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6
INTEGRATION GUIDE May 2014 3725-75304-001 Rev B Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved.
Overview of ServerView Windows Agent This chapter explains overview of ServerView Windows Agent, and system requirements.
ServerView User s Guide (For Windows Agent) Areas Covered - Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview of ServerView
Network Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide
BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide Version 5.0 rev 1 Advantech Corp., Ltd. Table of Contents BwSNMP Advantech WebAccess to SNMP Agent (Simple
Job Streaming User Guide
Job Streaming User Guide By TOPS Software, LLC Clearwater, Florida Document History Version Edition Date Document Software Trademark Copyright First Edition 08 2006 TOPS JS AA 3.2.1 The names of actual
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
User Manual of Web Client
User Manual of Web Client 1 Index Chapter 1 Software Installation... 3 Chapter 2 Begin to Use... 5 2.1 Login and Exit... 5 2.2 Preview Interface Instruction... 6 2.3 Preview Image... 7 Chapter 3 Playback...
SNMP Manager User s Manual
SNMP Manager User s Manual Table of Contents 1. Introduction...2 2. SNMP Manager Install, Quick Start and Uninstall...2 2.1. Software Installation...2 2.2. Software Quick Start...2 2.3. Software Uninstall...2
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without
Changing Your Cameleon Server IP
1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may
NETWORK PRINT MONITOR User Guide
NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
AXIS Camera Station Quick Installation Guide
AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera
Cisco UCS Director Payment Gateway Integration Guide, Release 4.1
First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Central Management System (CMS) USER MANUAL
Central Management System (CMS) USER MANUAL LEGAL INFORMATION Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior written permission
