The Complete Technical Paper Proceedings From

Total Page:16

File Type:pdf, Size:1020Kb

The Complete Technical Paper Proceedings From THE COMPLETE TECHNICAL PAPER PROCEEDINGS FROM: AN EVALUATION OF ALTERNATIVE TECHNOLOGIES FOR INCREASING NETWORK INFORMATION CAPACITY Ron Shani, Xtend Networks David Large, Consultant Abstract interchangeably with “information capacity” and “RF bandwidth” will be used when the HDTV, VOD, ITV and other applications historical meaning is intended). The are placing ever-greater pressure on increasing bandwidth demands fall into three operators to transport more information – broad categories: that which is widely distributed as well as communications with individual customers. 1) Common downstream (“broadcast”) Choosing how to create adequate capacity is bandwidth; that is, bandwidth occupied by difficult; driven by financial and regulatory signals that are transmitted throughout the constraints, capital costs and ongoing network (irrespective of whether or not operating considerations. individual customers are enabled to receive them). An example of common signals would This paper will evaluate some of the be a high-definition stream from HBO that technical options against those factors. would be continuously transmitted system- Evaluated technologies will include wide, but for which only certain subscribers bandwidth expansion to 1 GHz, more efficient would be authorized. modulation, more efficient video encoding, elimination of analog video carriage, splitting 2) Interactive downstream (“unicast”) of existing nodes, switched digital video and a bandwidth; that is, bandwidth occupied by proposed use of frequencies above 1 GHz that signals that are transmitted to individual offers the greatest bi-directional bandwidth customers. VOD, Internet communications expansion and the greatest benefit/cost ratio. and telephone are all examples of such signals. INTRODUCTION 3) Upstream bandwidth; that is, bandwidth occupied by signals that are transmitted from Bandwidth Pressures individual customers towards the headend. With the exception of a small amount of The history of cable television is one of bandwidth occupied by network element ever-increasing need for information capacity, management systems (NEMS), all upstream initially driven by the expansion of over-air signals fall in the same category as interactive broadcasting, then premium and ad-supported downstream bandwidth. satellite networks, followed by pay-per-view and high-speed data services. Today, The Case for Dramatic Bandwidth Increase operators are launching bandwidth-intensive high-definition television (HDTV) channels, Historically, manufacturers have offered various flavors of video on demand (VOD), cable operators increases in upper higher Internet access data rates, and downstream RF bandwidth limits in steps of telephone services. Each of these increases 50 MHz or so from an upper frequency limit the need for an increase in system information of 220 MHz to 860 MHz, with the upstream capacity (for purposes of this paper, unless bandwidth remaining fixed, except for one otherwise specified, “bandwidth” will by used step from 30 to 42 MHz. By contrast, in the data world, speeds have increased 4) Direct broadcast satellite operators will be exponentially over several orders of taking advantage of new spectrum, closer magnitude. As more content carried over satellite spacing, higher power and spot beam cable systems is digital in nature, more technology to realize greatly increased communications are directed to and from throughput – as much as 18,000 MB, or individuals, and competitors greatly increase enough to carry 2800 high-definition both video and non-video capacity, the programs at 6.5 Mb/s/program using question is whether operators will need to advanced codecs.iv significantly increase bandwidth, especially upstream bandwidth, to take advantage of 5) In general, television is moving from pre- opportunities and meet competition. scheduled broadcast of standard-resolution programs to on-demand presentation of high- A few points to consider: definition, with a 4X increase in bits per stream and the need to send programming to 1) On the competitive data front, SBC and (and receive communications from) individual Verizon, among other telcos, have launched a subscribers. Competitively, one satellite major fiber-to-the-curb/home push. Typical operator expects to offer its customers 150 of the technology to be deployed is Wave7’s national and 500 local HDTV channels by equipment which provides 500 Mb/s 2007 symmetrical data, shared among 16 passings, in addition to 860 MHz of RF downstream 6) Finally, upstream data communications bandwidth.i Verizon is offering data rates to rates from subscribers are increasing rapidly. 30 Mb/s downstream/5 Mb/s upstream in its VoIP is a symmetrical service; file sharing fibered markets, with the capability to offer can be symmetrical or even asymmetrical in rates of hundreds of megabits per second.ii the upstream direction; and near-future Some overbuild competitors in the US have services such as video telephony will require already offered 100 Mb/s service options to multiples of the bandwidth required for voice. customers and speeds of between 10 and 100 Comcast recently announced plans to offer Mb/s are commonly available in Asia. video instant messaging. RCN now offers a Finally, the capability of copper plant video surveillance service that allows continues to improve and now supports high- customers to stream video from up to four definition digital video. cameras through their broadband connection.v 2) Cable operators are already being pushed In summary, there is significant evidence to significantly increase rates – Comcast that cable operators will need major increases announced a standard rate of 4 Mb/s and an in bi-directional information capacity in the available 6-Mb/s downstream/768-kb/s near future, and that the upstream in upstream rate; Cox increased its standard rate particular, with a current capacity of only to 4 Mb/siii and RCN has upgraded its rates to about 100 Mb/s/node, is a major bottleneck 10 Mb/s. that will need to be addressed. 3) On the telephone side, the number of VoIP Operators can realize this increased residential and small business lines is information capacity through an increase in predicted to hit almost 11 million by 2008, RF bandwidth, through more efficient use of with a significant amount of that traffic existing bandwidth, or through more efficient carried over cable systems. sharing of existing bandwidth. Additionally, increased interactive bandwidth can be realized by sharing of the bandwidth devoted to interactive services among fewer fixing basic problems, while other systems customers. The various upgrade technologies may require little incidental preparation. that will be considered differ in their effects on broadcast verses interactive and Methodology downstream verses upstream information capacity, as will be seen. For ease of comparison, each technology was evaluated as a candidate for upgrading a Candidate Technologies hypothetical 100,000 home cable system which currently has 500-home nodes and an There are many approaches to generating average density of 100 homes per plant mile. more information capacity in a cable system. It is assumed to be 80% aerial plant. The This paper will evaluate the following connected household penetration is assumed possibilities: to be 70%, with 35% of connected homes equipped for digital video reception. The 1) An increase in downstream upper RF system is assumed to currently carry 80 bandwidth limit from 550, 750 or 870 MHz to channels of analog video, 136 total standard- 1 GHz. resolution broadcast digital video streams, 12 2) An increase in digital modulation density high-definition broadcast digital video from 256 QAM to 1024 QAM. streams, VOD, high-speed data, and VoIP. 3) Utilization of more effective digital video Unless otherwise stated, the system is compression technologies, such as MPEG-4. assumed to have been upgraded to 750 MHz 4) Subdivision of existing optical nodes. within the previous ten years. Other 5) Elimination of analog video carriage, with assumptions regarding the system will be the formerly-analog signals transmitted only discussed when relevant to each individual in digital form. candidate technology. 6) Use of switched digital video to avoid sending low-usage channels to subscriber Technologies were evaluated with respect groups except when requested. to their effect on both downstream and 7) Use of RF bandwidth above 1 GHz to upstream capacities and with respect to both expand both downstream and upstream commonly delivered (broadcast) and capacity. interactive services. In each case, the technologies were also evaluated qualitatively This is obviously not a comprehensive list, with respect to future enhancement options. and the choices are not mutually exclusive. Finally, conformance of each alternative to For example, an operator may choose to current regulatory requirements is noted. simultaneously increase modulation density and also use advanced digital compression INCREASE TO 1 GHz BANDWIDTH algorithms. For keep the matrix manageable, however, we evaluated each option separately. An increase in the upper downstream frequency limit to 1 GHz follows the When it comes to discussing quantitative traditional pattern of cable RF bandwidth results, we used what we felt were reasonable expansion. While it offers additional assumptions for an average cable system. For downstream capacity, it does not address the every possible upgrade scenario, however, the upstream bottleneck and does not offer a results will
Recommended publications
  • The Battle Is On! Enabling the Digital Media Home Network INDUSTRY
    INDUSTRY NOTE May 16, 2007 Robert C. Adams, CFA Digital Media Technology 415.962.4553, [email protected] Wireless Technology Jason Tsai 415.318.7069, [email protected] Erik Rasmussen 415.318-7074, [email protected] The Battle Is On! Enabling the Digital Media Home Network FOR DISCLOSURE INFORMATION, REFER TO MONTGOMERY & CO.’S FACTS & DISCLOSURES ON PAGES 18 & 19 Digital Media Technology & Wireless Technology May 16, 2007 INVESTMENT SUMMARY The battle for the digital media The battle for superiority in the next great digital media market opportunity—the digital multimedia home network is on. home network—is on. And, like all great digital media markets, this one just makes good intuitive sense. Digital media consumers worldwide have a great appetite for digital content and they have a desire to move that content around the home. We believe that, necessitated by the continuing adoption of the digital video recorder (DVR) and other content storage technologies, accelerated by the rapid ramp of digital and high-definition television technologies, and enabled by the deep pockets of the telcos and cable operators, this market is poised for significant growth over the next several years and represents one of the largest-volume semiconductor opportunities in the digital media component space to date. The digital media networked The digital multimedia home network opportunity has been necessitated by the increasing ability of home—a function of recording... the consumer to record (or download) and display video content. Over the last several years consumers, especially in North America, have grown fond of recording content and storing it to hard drive solutions.
    [Show full text]
  • Opencable™ Specifications Opencable Unidirectional Receiver OC-SP-OCUR-I08-081114
    OpenCable™ Specifications OpenCable Unidirectional Receiver OC-SP-OCUR-I08-081114 ISSUED Notice This OpenCable specification is a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. (CableLabs®) for the benefit of the cable industry. This document may contain references to other documents not owned or controlled by CableLabs. Use and understanding of this document may require access to such other documents. Designing, manufacturing, distributing, using, selling, or servicing products, or providing services, based on this document may require intellectual property licenses for technology referenced in the document. Neither CableLabs, nor any other entity participating in the creation of this document, is responsible for any liability of any nature whatsoever resulting from or arising out of use or reliance upon this document by any party. This document is furnished on an AS-IS basis and neither CableLabs, nor other participating entity, provides any representation or warranty, express or implied, regarding its accuracy, completeness, or fitness for a particular purpose. © Copyright 2005-2008 Cable Television Laboratories, Inc. All rights reserved. OC-SP-OCUR-I08-081114 OpenCable™ Specifications Document Status Sheet Document Control Number: OC-SP-OCUR-I08-081114 Document Title: OpenCable Unidirectional Receiver Revision History: I01 – Released January 9, 2006 I02 – Released February 10, 2006 I03 – Released April 13, 2006 I04 – Released June 22, 2006 I05 – Released October 31, 2006 I06 – Released November 13, 2007 I07 – Released June 20, 2008 I08 – Released November 14, 2008 Date: November 14, 2008 Status: Work in Draft Issued Closed Progress Distribution Restrictions: Author CL/Member CL/ Member/ Public Only Vendor Key to Document Status Codes: Work in Progress An incomplete document, designed to guide discussion and generate feedback that may include several alternative requirements for consideration.
    [Show full text]
  • Tr 101 532 V1.1.1 (2015-02)
    ETSI TR 101 532 V1.1.1 (2015-02) TECHNICAL REPORT End-to-End Network Architectures (E2NA); Mechanisms addressing interoperability of multimedia service and content distribution and consumption with respect to CA/DRM solutions 2 ETSI TR 101 532 V1.1.1 (2015-02) Reference DTR/E2NA-00004-CA-DRM-interop Keywords CA, DRM, interoperability, terminal ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Smartright: a Copy Protection System for Digital Home Networks Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl
    SmartRight: A Copy Protection System for Digital Home Networks Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl To cite this version: Jean-Pierre Andreaux, Alain Durand, Teddy Furon, Eric Diehl. SmartRight: A Copy Protection System for Digital Home Networks. IEEE Signal Processing Magazine, Institute of Electrical and Electronics Engineers, 2004, 21 (2), pp.100–108. inria-00083200 HAL Id: inria-00083200 https://hal.inria.fr/inria-00083200 Submitted on 29 Jun 2006 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. SmartRight: A Copy Protection System for Digital Home Networks Jean-Pierre Andreaux1, Alain Durand1, Teddy Furon2 and Eric Diehl1 1 THOMSON multimedia R&D France, Rennes, France {jean-pierre.andreaux, alain.durand, eric.diehl}@thomson.net, 2 INRIA / TEMICS, Rennes, France [email protected] Abstract This paper describes the rationales supporting the design of a Copy Protection System. It reflects the experience of the Security Laboratory of Thomson in the development of SmartRight. This paper does not only account the chosen technical solutions. It also explores less technical but highly important issues such as the social, legal and commercial aspects. Hence, while carefully developing our motivations, some light is shed on the very peculiar problems raised by the enforcement of copy protection.
    [Show full text]
  • SECURING DIGITAL CONTENT – STRENGTHS and WEAKNESSES of SOFTWARE and HARDWARE IMPLEMENTATIONS Robin Wilson Nagravision Abstract
    SECURING DIGITAL CONTENT – STRENGTHS AND WEAKNESSES OF SOFTWARE AND HARDWARE IMPLEMENTATIONS Robin Wilson Nagravision Abstract HARDWARE VS. SOFTWARE SECURITY Conditional Access (CA) and Digital “Overview” Rights Management (DRM) are implemented in a number of ways in software (SW) and The security system relies on a hardware (HW). Often these schemes are computation, or algorithm, to decode the described as either “HW” or “SW” based protected content. security or rights management systems. Since SW requires HW on which to execute, Most digital CA systems employ a unique and HW has necessarily SW running on it, key that enables a successful computation. the terminology is often thoroughly confusing The locations on the Set-Top Box (STB) for and misleading. Since we are not dealing the decoding program and key are a the with locks and keys or hypothetical systems, subject o the hardware and software security both hardware and software elements must designations. be present, and work together smoothly, in any sophisticated content security system. “Software Only” Security Further confounding the confusion is the frequent use (and abuse) of terms like This and other terms like “Hardware- “replaceable”, “renewable”, “obfuscated” less”, “Downloadable” and even and “tamperproof”. In this session, these “Renewable” are used to describe security terms will be explained in the context of systems where the security solution supplied content security. by a CA or DRM company does not include hardware. Here the product of the company may be limited to only software but the TERMINOLOGY AND TECHNOBABLE inference is sometimes wrongly made that no additional resources are required or costs are Before embarking on comparing various incurred.
    [Show full text]
  • Etsi Tr 101 532 V1.1.2 (2015-03)
    ETSI TR 101 532 V1.1.2 (2015-03) TECHNICAL REPORT End-to-End Network Architectures (E2NA); Mechanisms addressing interoperability of multimedia service and content distribution and consumption with respect to CA/DRM solutions 2 ETSI TR 101 532 V1.1.2 (2015-03) Reference RTR/E2NA-00007-CA-DRM-interop Keywords CA, DRM, interoperability, terminal ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Entropic Communications Inc (Entr)
    ENTROPIC COMMUNICATIONS INC (ENTR) 10-K Annual report pursuant to section 13 and 15(d) Filed on 02/03/2011 Filed Period 12/31/2010 Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) x ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2010 or ¨ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to . Commission file number: 001-33844 Entropic Communications, Inc. (Exact Name of Registrant as Specified in Its Charter) Delaware 33-0947630 (State or Other Jurisdiction of (I.R.S. Employer Incorporation or Organization) Identification No.) 6290 Sequence Drive San Diego, CA 92121 (Address of Principal Executive Offices, Including Zip Code) Registrant's telephone number, including area code: (858) 768-3600 Securities registered pursuant to Section 12(b) of the Act: Title of Each Class Name of Each Exchange on Which Registered Common Stock, par value $0.001 per share The NASDAQ Stock Market Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes ¨ No x Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes ¨ No x Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days.
    [Show full text]
  • Entropic Communications Annual Report 2009
    ENT_Covers_AR.aiENT_Covers_AR.aiENT_Covers_AR.ai 2 2 2 4/7/10 4/7/104/7/10 4:51 4:514:51 PM PMPM COMMUNICATIONS COMMUNICATIONS COMMUNICATIONS ENTROPIC ENTROPIC ENTROPIC ANNUALANNUALANNUAL REPORTREPORTREPORT 200920092009 CC C MM M YY Y CMCMCM MYMYMY CYCYCY CMYCMYCMY KK K 629062906290 SequenceSequence Sequence DriveDrive Drive SanSanSan Diego,Diego, Diego, CACA CA 9212192121 92121 858.768.3600858.768.3600858.768.3600 p.p. p. 858.768.3601858.768.3601858.768.3601 f.f. f. www.entropic.comwww.entropic.comwww.entropic.com 2009 2009 2009 REPORT REPORT REPORT ENABLINGENABLINGENABLING CONNECTEDCONNECTEDCONNECTED HOMEHOMEHOME ENTERTAINMENTENTERTAINMENTENTERTAINMENT™™™ ANNUAL ANNUAL ANNUAL 48113_A.indd 1 4/7/10 8:37:50 PM ENT_Covers_AR.aiENT_Covers_AR.ai 1 1 4/7/10 4/7/10 4:51 4:51 PM PM ENTROPICENTROPIC COMMUNICATIONS’ COMMUNICATIONS’ PRODUCTS PRODUCTS CORPORATECORPORATE INFORMATION INFORMATION BOARDBOARD OF OF DIRECTORS DIRECTORS EXECUTIVEEXECUTIVE TEAM TEAM UmeshUmesh Padval Padval PatrickPatrick Henry Henry ChairmanChairman of of the the Board, Board, Entropic Entropic Communications Communications PresidentPresident and and Chief Chief Executive Executive Officer Officer Partner,Partner, Bessemer Bessemer Venture Venture Partners Partners DavidDavid Lyle Lyle ThomasThomas Baruch Baruch ChiefChief Financial Financial Officer Officer FounderFounder and and Managing Managing Director, Director, CMEA CMEA Ventures Ventures TomTom Lookabaugh, Lookabaugh, PhD PhD KeithKeith Bechard Bechard ChiefChief Technology Technology Officer Officer Owner,Owner, Pear Pear Lake Lake Consulting Consulting LLC LLC BillBill Bradford Bradford PatrickPatrick Henry Henry SVPSVP Worldwide Worldwide Sales Sales PresidentPresident and and Chief Chief Executive Executive Officer Officer EntropicEntropic Communications Communications VinayVinay Gokhale Gokhale SVPSVP Marketing Marketing and and Business Business Development Development AmirAmir Mashkoori Mashkoori ChiefChief Executive Executive Officer, Officer, Kovio Kovio Inc.
    [Show full text]
  • Opencable™ Specifications Cablecard Interface 2.0
    OpenCable™ Specifications CableCARD Interface 2.0 Specification OC-SP-CCIF2.0-I27-150330 ISSUED Notice This OpenCable specification is the result of a cooperative effort undertaken at the direction of Cable Television Laboratories, Inc. for the benefit of the cable industry and its customers. You may download, copy, distribute, and reference the documents herein only for the purpose of developing products or services in accordance with such documents, and educational use. Except as granted by CableLabs® in a separate written license agreement, no license is granted to modify the documents herein (except via the Engineering Change process), or to use, copy, modify or distribute the documents for any other purpose. This document may contain references to other documents not owned or controlled by CableLabs. Use and understanding of this document may require access to such other documents. Designing, manufacturing, distributing, using, selling, or servicing products, or providing services, based on this document may require intellectual property licenses from third parties for technology referenced in this document. To the extent this document contains or refers to documents of third parties, you agree to abide by the terms of any licenses associated with such third party documents, including open source licenses, if any. Cable Television Laboratories, Inc. 2004-2015 OC-SP-CCIF2.0-I27-150330 OpenCable™ Specifications DISCLAIMER This document is furnished on an "AS IS" basis and neither CableLabs nor its members provides any representation or warranty, express or implied, regarding the accuracy, completeness, noninfringement, or fitness for a particular purpose of this document, or any document referenced herein. Any use or reliance on the information or opinion in this document is at the risk of the user, and CableLabs and its members shall not be liable for any damage or injury incurred by any person arising out of the completeness, accuracy, or utility of any information or opinion contained in the document.
    [Show full text]
  • NCTA Comments on the ENERGY STAR Version 4.1 STB Specification
    April 13, 2012 Katharine Kaplan EPA Team Lead ENERGY STAR Product Development US Environmental Protection Agency 1200 Pennsylvania Avenue, N.W. Washington, DC 20460 [email protected] Re: ENERGY STAR® Specification for Set-top Boxes Version 4.0 Dear Ms. Kaplan: On behalf of the National Cable & Telecommunications Association (“NCTA”), I am responding to the Environmental Protection Agency’s (“EPA”) March 20, 2012 request for comment on ENERGY STAR® Specification for Set-top Boxes Version 4.0 (“ESv4”). Since the adoption of EPA’s Energy Star Version 3.0 and 4.0 specifications for set-top boxes, the cable industry has launched new initiatives dedicated to improving the energy efficiency of cable-provided consumer set-top boxes on an aggressive timeline. These new initiatives include (1) the creation of CableLabs - Energy Lab (a specific facility within CableLabs1 dedicated to improving energy efficiency); (2) focused projects to increase the efficiency of set-top boxes through development of “light sleep” and “deep sleep” set-top box modes that function with U.S. cable system architectures; and (3) cable operator volume procurement commitments for set-top boxes that meet ENERGY STAR standards to move the 1 Cable Television Laboratories or CableLabs, founded in 1988, is the cable industry’s R&D consortium playing a role similar to that played by BellLabs for the telephone industry. CableLabs has over 40 cable operator members representing over 80 million customers, predominantly in North American (US and Canada), but also internationally in Europe, Asia, and Central America. Among other things, CableLabs developed common specifications for the cable modem enabling the size and price of such modems to plummet in a short time as they were made available at retail outlets across the country which, in turn, spurred the revolution in broadband access the Nation has experienced in recent years.
    [Show full text]
  • Approaches to Security and Access Control for Digital Cable Television
    APPROACHES TO SECURITY AND ACCESS CONTROL FOR DIGITAL CABLE TELEVISION Claude T. Baggett Cable Television Laboratories, Inc. Louisville, CO 80027-1266 Abstract cable system size, services, operating philosophy, and access to capital. This paper addresses the several design trade-offs which should be considered by a system operator in selecting a security and In analog television, there is basically only access control sub-system for protecting digital one decision which must be made for access television signals on cable television systems. control; that is, whether to descramble the Factors are discussed which have a strong incoming signal or not. The same descrambler impact on the strength, adaptability, and cost in the set-top converter is used whether the of such systems. The principles discussed in system has one scrambled channel or many. this paper apply whether the primary source of The sophistication and depth of the scrambling security and access control in the subscriber mechanism is limited because the analog signal home is found in a set-top decoder, a decoder is very difficult to reconstruct without leaving interface unit, a home server, or as an insertion unacceptable artifacts in the visible picture. in an MPEG-capable computer or television Therefore, with only one, very limited, receiver. process to protect the analog television signal, meaningful security is difficult. Some later systems, which use line shuffling under the SCOPE control of a modem cryptographic system and hard-encrypted audio, are much superior in This paper will address the options which this aspect, but are costly and have come too system operators should consider in choosing late relative to the advent of digital television.
    [Show full text]
  • Advances in Digital Video Content Protection
    Advances in Digital Video Content Protection EUGENE T. LIN, STUDENT MEMBER, IEEE, AHMET M. ESKICIOGLU, REGINALD L. LAGENDIJK, SENIOR MEMBER, IEEE, AND EDWARD J. DELP, FELLOW, IEEE Invited Paper The use of digital video offers immense opportunities for of illegal copying and distribution on a massive scale. This creators; however, the ability for anyone to make perfect copies problem is not merely theoretical. Popular Internet software and the ease by which those copies can be distributed also facilitate based on a peer-to-peer (P2P) architecture (such as Kazaa misuse, illegal copying and distribution (“piracy”), plagiarism, and misappropriation. Popular Internet software based on a [1], BitTorrent [2], eDonkey [3], and Gnutella) has been used peer-to-peer architecture has been used to share copyrighted to share (distribute) copyrighted music, movies, software, movies, music, software, and other materials. Concerned about and other materials. Furthermore, future P2P systems may the consequences of illegal copying and distribution on a massive encrypt the data being shared, preserve the anonymity of scale, content owners are interested in digital rights management its users, support a larger number of users, and be more (DRM) systems which can protect their rights and preserve the economic value of digital video. A DRM system protects and robust [4], [5]. These advances in P2P systems will create enforces the rights associated with the use of digital content. considerable challenges for copyright enforcement. Thus, Unfortunately, the technical challenges for securing digital content there is a great desire for digital rights management (DRM) are formidable and previous approaches have not succeeded. We systems that can preserve the economic value of digital overview the concepts and approaches for video DRM and describe video and protect the rights of the owners.
    [Show full text]