2009 Ncta Technical Papers PDF
2009 Ncta Technical Papers PDF
2009 Ncta Technical Papers PDF
Social networking sites like MySpace and A further aspect of MySpace and Facebook
Facebook have enabled on-demand user- video-sharing is that the display mechanism is
generated content to millions of viewers. In on the PC. Cable technology has the easiest
this paper we ask whether it is possible to consumer access to the most preferred
leverage social-networking web technology, viewing device for video: the television.
user-generated video, and cable According to a 2008 CTAM study, 96% of
infrastructure to provide a “best of all adults who subscribe to cable or satellite
worlds” experience for these millions of services prefer to watch television on
viewers. traditional TV sets. [Reference: CTAM]
While it is possible for viewers to hook up a
PC to the television, the process remains more
difficult than accessing content via a cable set
INTRODUCTION top box. Given Cable’s widely deployed VOD
infrastructure, can Cable leverage its
customer-friendly on-demand access to the
Glass Houses television to provide user-generated content
via the television?
Social networking sites have enabled, for
better or sometimes worse, unfettered access This paper investigates three scenarios for
to as much personal information as selective entitlement of subscriber-generated
individuals dare make public. When Warhol video content via cable: local sharing, global
uttered the line about everyone being famous sharing within an MSO, and global sharing
for 15 minutes, he appropriately conjugated across MSOs, all of which may in fact
the verb with a “will” rather than a “may”. overlap. In all of these scenarios, the solution
One feels that it is fast becoming impossible acts as a trust broker, allowing subscribers to
not to be famous for 15 minutes. In this issue entitlements to other subscribers –
“glass house” environment, cable potentially friends, family and/or acquaintances. The
has a role in allowing subscribers to cable operator stores the subscriber-generated
selectively draw the shades. Subscriber video content, uploaded via a web portal over
Management Systems (SMSs) have long an MSO’s high speed data service, and
served as a means to provision specific maintains the associated entitlements on the
services to subscribers. Such services subscriber’s behalf. The solution provides a
typically include high speed data tiers and mechanism for the subscriber to allow or
subscription VOD packages. Why not take revoke entitlements on any subset of the
this a step further and allow subscribers to act subscriber’s content.
upon service and account information so as to
offer personal content in a more selective
manner?
The question could be asked, “Who cares Now, envision a connection between the
about user-generated content anyway?” and social-networking web site and an MSO site.
the answer is a resounding “Users do.” The social-networking solution would
understand the connection between web users
In terms of user-generated video and MSO subscriber accounts, deliver user-
specifically, in 2005 there were 3.3 billion generated content to the MSO site, and inform
user-generated video views, growing to 34 the MSO site of what subscribers have access
billion in 2008. [Reference: MediaPost] to what content.
User‐Generated Video Views
(billions)
40
30
20
10
0
2005 2006 2007 2008
THE VISION
The “My (TV) Space” vision starts with a Figure 2. High-level System Overview
social networking web site providing all the
features of the current “social sites” of today:
account management, profile management, Subscribers at the MSO site can subscribe
“friend” management, and content to the user-generated content subscription
management. Content management today package in order to gain access to the user-
includes text, photos, and video. So, on the generated content that their friends have
social networking web site users can upload shared with them. As in subscription Video-
user-generated content and share it with one on-Demand (SVOD) packages, the user may
or more of their friends. Note that this web subscribe to the package via an interactive
site could be an existing social networking screen on the EPG or through a web portal.
In order to enable content access to only As cable viewers interact with user-
those cable viewers who have subscribed to generated content there exists an opportunity
the user-generated content package, the for feedback to the social network. This
solution as a whole will need to understand feedback could be as simple as the number of
cable subscriber information (and package views for a given asset. Furthermore, the
entitlement) across cable operator sites and cable viewer could send messages back to the
even across the cable operators themselves. user who generated the content such as “Great
This will require interaction with existing Video!” or “Very funny!” Again, this aspect
Cable Subscriber Management Systems of the system is a subject unto itself, but the
(SMS’s) to coordinate the information. basic feedback mechanism must be
Several industry-standard or existing SMS- acknowledged.
vendor interfaces may be leveraged for this
interaction. Social Networking VOD Applications
Federated Assets (Metadata and Content) The cable operator’s VOD Application
Server and VOD Client may or may not
A key element of the solution is to allow change depending on the approach taken to
user-generated content to flow to cable the solution.
operator networks. This will include both the
user-generated videos and the metadata One approach is to leverage the existing
associated with the videos such as title, VOD Application. By enhancing the existing
description, length, and the user who created VOD application server and client, the VOD
the content. This data will need to move system could display a “User-Generated
across MSO sites and across multiple MSOs Content” category in the existing VOD Guide.
as well. One approach to getting this content This category would contain the titles of the
and metadata to the service provider site is to user-generated content that the subscriber is
leverage existing CableLabs Asset entitled to view.
Distribution and Metadata interfaces.
Another approach is to develop a new
Federated User-specific Asset Entitlements VOD Application. There are advantages to
providing a new VOD Application (server and
Once the correct assets are on the MSO client), for example, leveraging tru2way, to
site and the VOD solution recognizes that the form the solution. The viewer could be
account has access to the user-generated provided with a branded custom “User-
content package, the solution still needs the Generated Content” user interface with
entitlement information of which users are features specifically designed for interacting
entitled to which specific assets. This with social networking user-generated
information will need to be provided across content. The VOD client experience then
the cable operator sites and potentially across becomes an extension of the web-based
the cable operators. experience. This approach might further
benefit cable operators by providing a means
to “upsell” set-top devices capable of
A key element of the approach may Several approaches have been applied to
appear to be counter intuitive, in that the secure digital media:
embedded information is not designed to be Digital encryption technology is
machine readable but it can be extracted effective to enable secure delivery.
into a human readable form. While it However, once decrypted and presented in a
requires human interaction, it allows use of human visible format, it can be re-recorded
well honed human perception processing to to obtain and distribute an illegal, unsecured
aid the extraction task - which is simply copy. No secure technology currently exists
superior to machine recognition and thereby to prevent re-recording using a camcorder.
solves the problem of content
synchronization. It overcomes the Amongst other applications, the marking
challenges of content misalignment that of media can help investigation to identify
fools machine readable approaches, which individuals that are responsible for abuse,
The result is a robust mark that exists Additionally the mark is spread over
with the actual media and survives time, and while it generally can not be
whole house automation and networking TV CHS VHF 2-13 and UHF 14-36, 38-51 TV CHS 52-69
the TVBD rules and their impact, including Analog TV Clears by June 12, 2009
TV: 294 MHz 108 MHz
some potential TVBD applications and key
700 MHz Band
cable operator concerns. Allocation Done
Public Safety: 24 MHz
Commercial: 84 MHz
DPU Analysis
DPU into
Open cable tap
DPU into
Cable modem which may include multiple SD and HD
Cable Modem
video, high speed data, or telephony services.
Some operators have chosen to stop using
Figure 4. Home Cable System Ingress
Points some cable channels in the 800 MHz band
that were suffering from widespread severe
The interference due to DPU from TVBDs DPU, caused by mobile handsets.
is similar to DPU interference that cable
operators have experienced in the past from The fundamental interference protection
over the air signals including those directly mechanism used by TVBDs to protect OTA
from TV stations, ham radio operators, land reception is the selection of an unused
mobile police and fire radios etc. More frequency or white space. Unused OTA
recently, as some cable system operation has frequencies, however, have little relationship
extended above 800 MHz, DPU interference to unused cable channels. There are very few,
from cell-phones has also occurred. After the if any, white spaces on a cable plant,
digital TV transition, the 700 MHz to 800 especially with the growing demands for more
MHz band will become occupied with high HD, on-demand and data services. This
powered 4G wireless transmitters (e.g., 700 means that every TVBD has the potential to
MHz base stations EIRP levels can exceed 1 interfere with one or more services on the
kW) as well as additional mobile handsets cable plant via DPU. The remaining
(e.g., with typical 200 mW transmit power interference, or DPU, protection mechanism is
levels). The possibility of DPU interference the "shielding effectiveness" (SE) of the cable
due to these services will also need to be system, which includes the entire residential
addressed through the same remediation cabling system including all the devices
techniques. attached to it such as TVs, set tops, and
modems. Once an interfering signal has
It is interesting to note, that after the digital entered the cable system, this undesired
transition, what was previously one of the interferer travels throughout the home along
most troublesome forms of cable system with the desired cable signals. As such, a
DPU, pickup from analog TV transmissions, TVBD causing interference may be located at
The best cables had a SE measured around Figure 7 shows the effect of the common
130 dB which was the limit of the test practice of leaving an unused cable end
equipment. The worst cables were in the exposed (i.e., unterminated) which causes
range of 70 to 80 dB. The type of termination large degradation to the SE. This is likely to
Reference Cable with Various terminations
be typical of pre-wired homes in rooms
140 without TVs or other devices connected to the
130
System Noise cable system.
Shielding Effectiveness dB
120 Floor
with screw on
110 Termination
with push on System with open ports
100 termination
(same cables, various splitters)
90 with Barrel but
no termination
80 open cable end 140
130
Shielding Effectiveness dB
70
120
60
0 200 400 600 800 110
Frequency MHz 100
90
Figure 6. Shielding Effectiveness of 80
Various Cables 70
60
away from the cable system and TVs. Old or Shielding Effectivness dB
Abstract
To operate within the CAAS, it is generally
The cable industry has a long history of acknowledged that the Participating MSOs
working together to advance our services for must adhere to common guidelines. MSOs
the benefit of consumers and our commercial must provide assurances that each of their
customers, including the advertising participating systems will:
community. CableLabs, National Cable • Support uniformity of product and ad
Communications (NCC) and the numerous formats
interconnects that dot the map are examples • Support the defined business processes
of this cooperative spirit. It is a natural • Provide common system interfaces
evolution that cable would work together to • Provide consistent data per the agreed
develop a standardized national platform for upon interfaces, semantics and policies
advanced digital advertising. That is the Given the difficulty of building the CAAS to
prime development task for Canoe Ventures. support multiple heterogeneous MSO delivery
systems, the scope will initially be limited to
At the heart of Canoe’s ecosystem will be MSO video services. However, this will be
the Common Advanced Advertising System expanded to include other platforms based on
and its over-arching business process market demand (e.g. mobile, HSD portals,
management system. This implies a massive other service providers).
data record keeping system and associated
business intelligence capable of aggregating, Reference Architecture
storing, mining and reporting on extremely
high volumes of data. Advanced analytics The reference architecture presents the
and inventory management systems are also envisioned end-to-end system and highlights
crucial to reaching the full potential for the portion of the system for Canoe. The
addressability and adaptive campaign underlying MSO distribution systems will use
management. a common set of interfaces, however the
specific design may vary by MSO or systems
within an MSO.
COMMON ADVANCED ADVERTISING
SYSTEM
Overview
Mobile
STB Client PC
Phone
Customer Assurance
eBusiness Systems
Ops Support
Ops Support
Finance
Master Workflow
Ops Support
The Subscriber Information Service (SIS) is The Distribution Services are intended to
the primary data warehouse aggregating simplify the process of creating, delivering
audience and service measurement data from and fulfilling digital advertising across
all of the distribution systems. It will supply multiple MSOs. While customers could
the necessary storage, processing, and interface directly with the MSO interfaces,
business intelligence functions to support the this service greatly reduces the complexity
Workflow
The following diagram illustrates a high-level workflow between sellers, buyers, the CAAS and
MSO systems.
Proposal
Inventory
Settlements
Design Considerations
Initial Sources for service measurement from profiles and identify targeting groups, deliver
MSO subscribers includes but is not limited specific messages to each targeting group, and
to: determine the efficacy of their messages.
• Linear ad insertion The primary components of the targeting
• Settop box usage, including linear capability include:
viewing, DVR and time-shifted
viewing, and Interactive usage • Definition of targeting profiles to
• On demand usage match the advertiser’s segments of
interest using data from multiple
As a service provider, adherence to applicable sources.
consumer privacy laws and policies are • Identification of the targeting groups
always of critical importance. Any design in an iterative process of refining the
must include strict data governance rules and profiles to maximize the reach (e.g.
auditing capabilities. how many households) – through
blind matching and generating counts.
Addressability
• Creation of advertising packages
consisting of message, creative, and
National, Regional, and Local Advertisers
metadata that are then trafficked and
want to segment customers, develop targeting
delivered.
Segmentation can be applied to the
subscribers’ profile for household (and
eventually set-top box level) level targeting.
Standard Specification
SCTE 30 Digital Program Insertion Splicing API, SCTE 30, 2006
SCTE 35 Digital Program Insertion Cueing Message for Cable, SCTE 35, 2004
SCTE 104 Automation System to Compression System Communications Applications Program
Interface (API), ANSI/SCTE 104 2004
SCTE 118 Program-Specific Ad Insertion - Data Field Definitions, Functional Overview and
Application Guidelines, ANSI/SCTE 118-1 2006
SCTE 130 Digital Program Insertion – Advertising Systems Interfaces, SCTE 130
SCTE 138 Stream Conditioning for Switching of Addressable Content in Digital Television
Receivers, SCTE 138 2009
OC-ETV-AM OpenCable Enhanced TV Application Messaging Specification, OC-SP-ETV-
AM1.0-I03-060714
OC-ETV-BIF OpenCable ETV – Binary Interchange Format 1.0, OC-SP-ETV-BIF1.0-I03-060714
OC-SP-METRICS OpenCable Receiver Metrics Gathering Specification, OC-SP-Metrics-I02-070416
Table 2 - Standards Reference
constraints of the capabilities of legacy
Interfaces with Agency and Advertiser stewardship products in use today.
Systems
This effort will involve not only defining the
Canoe will also define an approach for data system components and communication
exchange with the Advertiser and Agency standards referenced within this document,
community. Again, there is a strong desire but also integrating the new products into the
that the approach between CAAS and its document trafficking workflow, protocols and
customers move toward a standards based formats currently in place with Legacy
approach leveraging and driving the creation Stewardship systems for various documents
of standard specifications within the including proposals, orders, revisions and
Advertising community (AAAA). However, it invoices.
also must be recognized that there will be an
ongoing need to electronically transact This demands familiarity with existing AAAA
business with this community within the common documents and protocols, work with
MSO and National Sales, as well as with the
Conclusion
The connections that the cable industry is However, there is less standardization
making fall into two primary categories. between MSOs. Examples include major
First, the industry will want to create tighter market DMAs served by two or more cable
connections to existing partners and other systems that haven’t created ad
MSOs. Second, the industry is extending its interconnects. It is becoming easier to make
connections to key partners in the media and these types of connections thanks to
entertainment industry and to advertisers. standardization among cable operators, as
Perhaps more importantly, cable systems evidenced by CableLabs’ recently issued
Another example of movement toward Some business historians may trace the
greater standardization is the multi-MSO beginning of a connected marketplace back
funded organization known as Canoe to the use of the U.S. Highway system, a
Ventures. With this organization in place, national telephone system, railroads, or even
some major, positive steps are being taken to the Wells Fargo Wagon. Similar to these
make sure that interactive and advanced past significant events, the ability for
advertising efforts are as standardized as consumers to go online has served as a
possible. This, when successful, will allow major catalyst for the connected
for the widest possible footprint for new and marketplace. Thanks to the Internet’s World
exciting forms of advertising. Wide Web, services now had the ability to
aggregate communities and consumers in
The industry’s move toward greater ways not possible before. In a significant
interconnectivity will support the steps way, this added a new dimension to business
being taking by initiatives such as Canoe in and created brand new opportunities.
order to offer highly competitive advanced Before this change, it was possible to be
advertising and other new business successful by providing a good product or
opportunities in today’s environment. As service to a limited (in both size and
this paper will demonstrate, one of the major geographic diversity) market. Local stores
challenges facing the cable industry in the flourished and providers that best serviced a
near future is the ability to maintain the local focused marketplace won the day.
and individual aspects that have defined
cable throughout its history while making When consumers went online, this all
these new connections.. began to change, but it took a while. At first,
online services looked a lot like the off-line
The significant and meaningful services that preceded them. Compuserve,
connections that are emerging include using Prodigy, and America Online became the
SIP (session initiated protocol) and other dominant players. Each provided a suite of
key technologies to connect service services that was individual, unique and
platforms between MSOs, connecting to catered to the specific users that they were
content providers, broadcasters and major trying to attract. And for a while this worked
studios, connecting with interactive well. Even as the web began to emerge,
television authors and platforms, and these services lived on as the best way to
connecting with prominent advertisers and connect to the web as well as to access
their agencies. These connections allow the additional “walled-garden” services.
cable industry to continue to grow and However, as web based services began to
remain foremost in the minds of consumers add features, the walled-garden approach
as the primary service provider for became less and less valuable. Web based
entertainment and telecommunications services - those that allowed access by
services. millions of consumers regardless of their
internet service provider (ISP) or means of
access - quickly became more valuable than
those (within the walled garden) that only
served members of the private club.
As mentioned above, the best ideas are As organizations such as Canoe focus on
almost always those that can’t yet even be deploying interactive ads nationally, they
imagined. Innovations that creative cannot be as successful without ubiquity.
developers using tru-2-way can come up Ubiquity is achieved when a single
with in their proverbial garages can’t even application can be distributed and function
be imagined until the world that provides across the entire cable footprint, in every
these kinds of connections comes into environment. The most straightforward
existence. The successes of the internet are a approach for accomplishing this objective
great reminder that vast, new capabilities are would be to construct applications
a prerequisite for game-changing successes generically, using generic interfaces, thus
such as eBay and YouTube. History has preventing the need to create new versions
also shown that replicating walled garden of applications for every single deployment
environments, such as Prodigy or in the country. This is obviously a daunting
Compuserve, on a big a screen in the living challenge, but with a few changes to how
room may not be enough take to take the the industry does business today, it can be
industry where it wants to go. accomplished.
i
How did eBay start?, A brief history of eBay, By Aron Hsiao, about.com
Once the signal arrives at the CMC, it is While not specifically addressed in this
either converted to MPEG 2 if required or paper, downstream impairments can
presented to the Imagine Encoder as a obviously be caused by local re-encoding,
Gigabit interface. The efficiency associated rate-shaping or grooming as well as local Ad
with removing the need to take the receiver Insertion systems. Further, the set-top box,
output down to its baseband video the consumer display device, and the
components and then re-encoding has viewing environment all play a contributory
allowed the opportunity to integrate 3 HD role in recovered video quality.
Drawing 1
ut)
Programs by
(in
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
1
2
3
4
5
6
7
8
9
C (o
Imparied
rce
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Site
Sou
CM
Seconds
Channel A 2 16 11 10 11 11 11 14 11 18 11 11 168 11 11 11 12 11 20 11 11 10 14 11 11 14 16 11 11 11 11
Channel B 1 1 0 0 0 0 0 0 0 6 0 0 160 0 0 0 0 0 4 3 2 2 2 1 1 2 7 1 0 2 0
Channel C 9 2 1 1 1 1 1 1 1 5 1 1 159 1 1 1 1 1 5 2 1 1 2 1 1 2 6 1 1 1 1
Channel D 0 12 11 10 11 11 11 11 11 15 8 11 168 11 7 10 10 10 15 8 10 10 12 7 11 12 16 11 11 11 10
Channel E 1 7 2 2 2 2 2 2 2 6 2 2 160 2 2 2 3 2 6 2 2 2 2 3 3 6 5 3 2 2 2
Channel F 9 19 9 9 9 9 10 9 9 13 9 9 167 9 8 9 9 8 14 8 9 8 9 14 14 17 12 15 8 10 9
Table 1
This program is a subjective video The Golden Eye observer assigns a level
quality assessment method devised by the of quality to the channel under test based on
CMC using trained observers to perform their observations of any impairment during
subjective quality measurements of the the test cycle. A sample of the Golden Eye
source video, which is then processed and observer subjective test results is shown in
placed onto an IP network. Each service is Table 2 and is based on the test criteria
viewed for 10 minutes on a predetermined which are listed in Table 3.
schedule, which ensures random quality
Date Time Channel Program CONTOUR HALOI MACRO NOISE SMEARPUMP Channel Entry Total Channel Average
12/15/2008 12:15 A Program 1 2 2 2 2 3 3 44 44
12/19/2008 23:40:00 A Program 2 4 4 4 4 5 4 82 82
12/24/2008 04:32:00 A Program 3 3 4 5 4 4 5 86 86
12/15/2008 12:20 B Program 1 2 2 3 2 3 2 48 48
12/19/2008 23:50:00 B Program 2 3 4 3 3 4 3 65 65
12/24/2008 04:39:00 B Program 3 3 3 4 4 3 3 71 71
12/15/2008 12:25 C Program 1 2 2 2 2 4 4 48 48
12/19/2008 23:56:00 C Program 2 2 3 3 3 3 3 58 58
12/24/2008 04:45:00 C Program 3 3 4 3 3 2 4 63 63
12/16/2008 11:20:00 D Program 1 2 3 2 5 5 2 64 64
12/19/2008 24:05:00 D Program 2 5 4 5 4 5 4 90 90
12/24/2008 05:00:00 D Program 3 3 4 2 3 3 4 59 59
12/16/2008 11:25:00 E Program 1 2 2 4 4 2 4 66 66
12/24/2008 05:52:00 E Program 2 5 3 4 4 5 4 81 81
12/16/2008 11:30:00 F Program 1 2 2 2 4 3 4 56 56
12/24/2008 06:01:00 F Program 2 4 3 4 3 2 4 68 68
Table 2
HALOING 1 2 3 4 5
Haloing is typically seen around areas of high contrast, such as Heavy blocking Blocking along the Localized blocking Blocking occurring no haloing.
sharp lines, text edges, and graphics. On close inspection, part of that occurs on the edges of most noticeable along at the edges of
the graphic appears to extend into the background. edges of all objects. the edges of logos only.
objects on the objects; always
Halling can manifest as smaller details in graphics appearing to screen. present at the
soften or loose edge resolution resulting in apparent blocking edges of all text
along graphic edges. and graphics.
MACROBLOCKING 1 2 3 4 5
Macroblocking is a defect where the edges of blocks or rows of The whole screen 10 - 15 seconds of 5 - 10 seconds of 3 - 5 seconds of no blocks.
blocks, are typically seen as a grid-like-pattern. This defect often Blocks up, blocking covering blocking covering blocking around a
occurs during dissolves from one scene to another or during action regardless of half of the of at least half the small portion of
scenes involving a great deal of complex movement. scene content. screen. screen. screen.
Another way this artifact is presented is with small to large pixels Note: This is a e.g. Consistent e. g. Blocks occur e.g. Scene
and/or blocks containing corrupted or green pictures. This is very rare event. blocking occurs at the focus of the transitions /
caused by transmission or transport anomalies. during every scene screen; often dissolves / short
transition, during motion. action scenes
fade/dissolves, (explosions).
action scenes, etc.
NOISE 1 2 3 4 5
Noise appears as random speckles on an otherwise smooth Black speckle Scenes presenting Scenes with black Black dots that No noise.
surface and can significantly degrade video quality. clusters that a raining effect of speckles that randomly pop into
manifest clearly black speckles appear to be any portion of the
Although noise often detracts from an image, it is sometimes defined block that cluster and moving on static scene.
desirable since it can add a grainy look that is reminiscent of film. edges. move into the backgrounds.
Noise can also increase the apparent sharpness of an image. foreground.
Closely resembles e.g. walls,
traditional e.g. Noise that curtains, or sky
Macroblocking, manifests itself that appear to
though not and is a distraction have movement in
associated with within the scene. the background.
motion.
SMEARING 1 2 3 4 5
Smearing is a defect where part of the image remains fixed in Regular loss of Losing object Intermittent loss of Individual or no smearing.
space while the adjacent parts of the image moves leaving a trail. object detail that detail on faces or object detail on unrelated
Smearing may also be observed in faces or across large areas of manifests as materials that are faces or materials. occurrences of
a similar type that have fine detail (e.g. grass fields). localized blocking the focus of object detail loss
on a face or a scene.
Smearing commonly affects facial color tones causing video to material.
take on an unnatural look.
PUMPING 1 2 3 4 5
Pumping is a defect where the video or parts of the video appear All scenes with Noticeable Scenes that have Low motion No pumping.
to pulse at a regular interval. static backgrounds movement on minor regular scenes that have
begin to block and static backgrounds movement on intermittent but not
This is typically seen in areas of smooth neutral colors. bleed to the during both motion static constant
foreground. and still scenes. backgrounds. movement on
e.g. Noticeable on static
an overhead view backgrounds.
of a golf course or
a wall of wood
paneling.
Table 3
Drawing 2
Touch Point 1 is a measurement point at the Touch Point 2 at the Master Control facility
source, such as a live event venue or a requires non-referenced measurements
dubbing house. This is a critical point because there are many video sources
requiring non-referenced video quality required to create a video service. Service
measurements. Video artifacts are caused by degradation causes include varying levels of
analog to digital conversion and tape to video quality of programs and commercials
digital storage conversion requiring and failures of automation resulting in loss
compression of the video. of video or the wrong video played out. This
The second generation of the DVB system for Forced by the increasing competition in the
cable – called DVB-C2 – is an innovative media and communications sector, European
approach making use of state of the art MSOs considered utilizing the benefits pro-
communication technologies which have vided by such modern communication tech-
never been implemented in broadband cable nologies in broadband cable networks. In
networks before. An OFDM (Orthogonal 2006, the DVB [3] Project was approached to
Frequency Division Multiplex) based launch a work item aiming at the development
modulation scheme in combination with a of a second generation DVB system for cable
two-dimensional interleaving (in both called DVB-C2.
frequency and time) and an LDPC (Low
Parity Density Code) error protection
mechanism provide a spectral efficiency
fractions of a dB below the Shannon limit. Figure 1: Logos of DVB and ReDeSign
Will there ever be any reason to develop a
new PHY for cable after DVB-C2 is widely This article describes the DVB-internal
implemented? development process of the DVB-C2 specifi-
cation. It focuses on the work carried out by
the DVB Technical Module and its TM-C2
INTRODUCTION technical experts group launched to prepare
the technical specification. The DVB work is
The Digital Video Broadcasting (DVB) trans- supported by the research project ReDeSign.
mission system for cable (DVB-C) [1] defines The Institut fuer Nachrichtentechnik (IfN) of
physical layer and low-layer signaling Technische Universitaet Braunschweig has
techniques for the transmission of digital taken key positions in both organizations,
For determining the general performance of DVB-C2, the latter using a code rate of 5/6. It
DVB-C2, an additive white Gaussian noise is observed that the robustness of DVB-C2
(AWGN) channel model was implemented. increases by some 7 dB compared to DVB-C.
This rather simple channel model allows a The SNR required to receive the corres-
better comparison with equivalent perfor- ponding DVB-C signal equals approximately
mance figures of DVB-C and DOCSIS which 24 dB whereas the simulation of the
both represent digital cable transmission equivalent DVB-C2 signal resulted in a
systems in operation today. In addition, the required SNR of some 17 dB.
results can be better compared with the
Shannon limit [12], [13] defining the Increased spectral efficiency
theoretical channel capacity limit for the
transmission of digital information through Comparing the spectral efficiencies of both
channels impaired by Gaussian noise. A more technologies at an SNR of 24 dB( e.g. 64-
sophisticated cable channel model was QAM for DVB-C and 1k-QAM for DVB-C2),
implemented in the further simulations it is observed that the efficiency increases
explained later. from 4.8 bps per Hz to 7 bps per Hz which is
an increase of almost 50 %.
Increased robustness
First estimations of efficiency gains based on
The diagram in figure 4 clearly shows the an introduction of DVB-C2 in combination
advancement of DVB-C2 compared to DVB- with further technologies such as statistical
C (and DOCSIS, respectively) in terms of multiplexing and advance audiovisual coding
both spectral efficiency and reduction of SNR (e.g. MPEG-4) resulted in a total efficiency
required for reception of a signal with a increase of more than 100 %. This figure
dedicated spectral efficiency. In the follow- corresponds with a bandwidths saving
ing, the 64-QAM mode is used by means of achievable in cable networks of more than
an example. This modulation scheme 50 %.
provides a spectral efficiency of almost 4.8
bps per Hz when applied in both DVB-C and
140
Figure 5 Example LTE link budget (macrocell)
130
loss (dB)
120
110
80
connection, the top modulation rate is only 0 0.2 0.4 0.6 0.8 1
130.000
125.000
120.000
115.000
In the preceding sections it has been
loss (dB)
110.000
A typical strand mounted wireless BTS is The architecture of such a strand mounted
shown in Figure 10. basestation is shown in Figure 12. The
combined DOCSIS® and power enter the unit
via power protection module that splits the
power and the DOCSIS® apart. This module
provides filtering to prevent emissions from
entering the plant and lightning and power
surge protection. A power supply takes the
plant power quasi square wave and converts it
to usable dc voltages for the rest of the BTS.
Figure 10 Deployed Strand Mount Basestation
Dan Holden
Comcast Media Center
Least-skipped ads
AD SKIPPING
However, viewers with the capability to
DVR penetration skip ads don’t skip through all ads
indiscriminately. For example, TiVo
Customers skip ads for various reasons commissioned a study (Jan 2008) on
including burnout and lack of interest in the advertising and determined not all advertising
advertised product. The potential for is skipped. The least-skipped ads include
consumer ad skipping is increasing on a theatrical film releases, which accounted for
yearly basis. According to data collected in six of the ten most-viewed commercials in
2008 on DVR penetration, twenty-nine DVR playback mode. In addition, eight of the
percent of U.S. television households are ten most-watched time-shifted cable spots
equipped with DVRs, placing the potential for occurred while viewers were watching the
ad-skipping in front of approximately 33 show “Psych” on USA Network. TiVo
million households (Nielsen data) i . attributed this statistic to integration of
characters from the TV show into the
Moreover, nearly two thirds of U.S. advertising, making it difficult for viewers to
households with $100,000-plus incomes distinguish between commercial and program
subscribe to time shifting services or own a content.
time-shifting device, which translates to at
least one DVR in at least 15 million affluent
households (Ipsos Mendelson ii ) Earlier research by TiVo (covering May
2008) supported the idea that viewers skip
In the first four weeks of the Fall 2008 TV fewer ads that they see as relevant to their
season research from IPG’s Magna, indicated circumstances and interests. TiVo’s
DVR time shifting accounted for 11 percent PowerWatch study specifically evaluated
of all prime-time ratings on the five broadcast spots skipped by demographic. The data
networks. They found DVR playbacks now indicated that viewing for children's skincare
equal 16 percent of all prime time viewing by products in homes with children under 12 was
consumers age 18-49. That's more than 37 percent greater than in homes with adults
double the impact VCRs had, which was at 50-plus. Advertising for toys and games had
the 90-percent penetration level. In DVR- 22 percent more viewing in homes with
only homes, nearly 40 percent of household children under 12. Contrast this to political
prime-time viewing (and 50 percent of prime- ads, which had 15 percent more viewing in
time viewing in the 18-49 age range) is now the homes with adults 50-plus. Finally, ads
time shifted content. iii
There are three general methods deployed Since customers will choose to view
today for VOD trick file displays: files, content that matches their interests, this new
indexes, and dynamic video generation. The approach represents a win / win for the
file method creates a new trick file (video file) advertiser and consumer. User behavior is the
that is played when a trick mode is activated. key. Once the customer has the remote in his
Indexing is a similar approach. However, or her hand, the content presents an
rather than creating a new video file, indexes opportunity to turn the original commercial
are assigned to frames of the original video. pod into an interactive experience. This
These indexes are utilized by the video pump principle also applies to other content that
to select the correct frames to display in order viewers may seek to skip. For example, a
to achieve a fast forward effect. The dynamic viewer that fast forwards through the first
video generation approach uses tools to several moments of a TV series that contains
calculate how many frames to skip in real- clips from previous episodes could be
time as the video is played. exposed to a short promotional segment about
one of the leading characters or a product
Each method outlined above may be used endorsement.
to create a trick file advertisement. While
each method described has its own As previously noted, trick-file advertising
complexities associated with the creation of is consistent with the direction that consumers
the trick file ad, the true complexity surrounds and advertisers are driving technology.
the successful mapping and tracking of these Advertisers are open with their plans to move
enhanced ads. To meet the need of the advertising dollars to platforms that offer
advertising community for detailed data, it is greater levels of audience engagement.
key that methods be developed to track Meanwhile, studies such as the ones cited
original advertising as well as the replacement earlier in this paper demonstrate that viewers
ad, while exposing the consumer to equipped with ad-skipping technology will
replacement spot. choose to watch ads that interest them.
Based on the specifications above, there Once the video has been correctly
are approx 60 I-frames of content after assembled, the next step is to add the audio
removing the black that appear before and track. Then, the newly created elementary
after ads, resulting in approx. 60 frames of stream is wrapped with an MPEG-2 transport
background video. In this example, the I- stream component. Now it is ready for
frames are labeled “I1” to “I60.” As all of the distribution to VOD pumps, DVRs, or other
black frames are equivalent, they are CE devices. This algorithm can be adapted to
collectively referred to as “B”. Creating a support a wide range of durations.
five second trick-file ad will require a total of
150 frames of video (5 seconds * 30 VOD based
frames/second). A simple algorithm for
reconstruction would be 3(I1) + 3(I2) + 2(I3) There are two options for creating trick
+ … + 2(In), where n=location of the frame in files as part of the VOD process. First, with a
the original asset. This would result in a few enhancements to the video pump, it
trick-file of approximately 120 frames, thirty should be possible to create the picture-in-
frames short of the 150-frame objective. picture video effect dynamically. This would
Next, additional I-Frames are added at the allow late binding of the advertising
beginning and end of the file to achieve the replacement spot. As the pump plays trick-
150 frame objective, and to bookend the file file video, the replacement advertisement and
with frames of black in order to provide appropriate spatial separation would be
smooth video transition. This process results spliced into the reserved section of the trick-
in having the original 912 frames of video play video.
reduced to 156 frames of video that will run in
five seconds. This new file will then be used Alternately, it is possible to orchestrate the
to provide the background video of the VOD pump, which in essence would make a
original spot running in fast forward mode. copy of the trick file and provide the
appropriate enhancements to it. The output of
at “trick file generation device” could be
attached to a feed that’s capable of splicing
portions of the video.
Consider simply increasing QAM levels to Note that SNR discussion above refers to
-3 dB on the 79-channel cascade. This nets a the effect of a power increase on a fixed
1.5-2.0 dB total power load increase, which is thermal noise floor. However, there is a
enough to noticeably impact distortions if distortion component referred to as composite
nothing else is changed (no cascade intermodulation noise (CIN) that appears like
shortening). Now consider Table 3. Here, it a thermal noise floor, but is in fact a result of
is postulated that 1024-QAM is run at -3 dBc, distortion products with a digital carrier
with another set of digital channels (half of component. As digital carriers increase, there
them) remaining at -6 dBc. is more digital contribution to create CIN. In
system analysis, the CIN parameter combines
We saw in Tables 1 and 2 that the analog with the thermal noise floor to create the
reclamation effort can yield possible QAM parameter known as Composite Carrier-to-
level increases for the same power load, but Noise, or CCN. CIN looks like thermal noise,
with this typically being less than 3 dB. and has effects like thermal noise, and is
Nonetheless, to win back margin lost to SNR, mathematically treated like thermal noise in
in Table 3 we assume that 1024-QAM is run the calculation of SNR. However, it
at the -3 dBc level, and that the digital load aggregates as a distortion would aggregate
that is split into -6 dBc and -3 dBc segments. through a cascade, dominated by third order
This approach could limit the 1.5-2.0 dB effects. It can be easily isolated in system
additional power loading effects of having all cascade tests, and the CIN and AWGN
digital channels increase to -3 dB, but also components of CCN identified. However, the
provide that extra SNR boost to a set of 1024- CIN effect has not been included into the
QAM channels. In one case, the lower half of model at this point.
Table 3 - Split Loading for 1024-QAM - 1000 MHz In our examples,
14 dB Channel Uptilt @ 870 MHz performance analysis for
Lower Digital @ -3 dBc Upper Digital @ -3 dBc nominal and increased output
Delta Ref QAM Increase Delta Ref QAM Increase
levels lead to the conclusion
79 Analog 0.7 --- 1.7 --- that CIN contribution is
59 Analog 0.1 --- 1.4 ---
always smaller than the
39 Analog -0.4 0.5 1.0 ---
30 Analog -0.6 0.5 1.2 --- thermal noise contribution,
All Digital -1.0 1.0 1.1 --- and in some cases negligibly
For both cascade shortening and Consider Table 6, which shows the results
minimizing the analog loading, Table 5 shows of typical 1310 nm optics through 20 km of
large available distortion gains. These analog fiber, with 79-channel analog loading and
beat distortions look like narrowband digital loading to 1 GHz. The QAM level is
interferers, but with random amplitude and ranged over -4 dBc to -8 dBc, and the 1024-
phase properties and a measurable bandwidth QAM channel inserted in several locations in
which, as previously described, makes them the loaded digital band, where it’s MER and
more difficult to cancel compared to static pre-RS FEC BER are measured.
CW interference. Cascade shortening reduces
the 20LogN accumulation of CTB distortion It is apparent, in particular given the -4 dBc
through the RF amplifiers, and these are the data and analog CNRs in the low 50 dB range,
HFC elements that tend to drive link that there is a measurement floor associated
distortion. Analog reclamation reduces the with the link, reflected in both BER and MER.
amount of beats entered
into the mixing process Table 6 – 1024-QAM Performance on Fully Loaded Optical Link
through which the 1024-QAM Carrier Frequency
CTBs and CSOs 603 MHz 747 MHz 855 MHz
accumulate. Both are QAM @ -4 dB to Analog MER 39.6 39.2 38.9
Finally, re-consider the CTBth,max of 51 The good news is that interference analysis
dBc under the conditions that the increase in conducted in 2002 based on findings
QAM power to a -3 dB derate applies to the extrapolated from 256-QAM performance of
whole load, and that the whole load is 1 GHz that era now seems to have been addressed in
of bandwidth. The total RF load then is the receivers available today. Narrowband
increased about 2 dB, increasing distortions, cancellation performance seems robust, and a
and in particular third order distortions by 4 measurable improvement over 2002. The
dB. This case is shown in Figure 14. Note performance against narrowband interference
the shift of a tolerable N+5 cascade to now today for 1024-QAM is roughly what it once
what might be an N+3 to maintain was for 256-QAM – the level of interference
performance against this threshold if not that used to disturb 256-QAM performs to
paying attention to the total power loading. roughly the same error rate now, but on the
Note also that this assumes a starting derate of more advanced modulation. This is very
QAM at -6 dBc and increasing to -3 dBc. If important for analog beat distortion
the starting derate is lower, than the impact on mitigation, which appears as noise modulated
total power is smaller. narrowband interference. The random
element of it makes the receiver have to work
With the curves above, operators are able harder, and as a result it is less capable of
to evaluate the likelihood of 1024-QAM can attenuating the interference. The improved
run successfully on the plant around some performance makes what once looked to be a
basic assumptions. Furthermore, a model has potentially troublesome CTB problem now a
been put in place that allows evaluation on a manageable one with some constraints on the
case-by-case basis for given combinations of HFC link, with performance characteristics
equipment, channel plans, and alignment. plotted against CTB and channel line-up
variations.
14
12
10
2
Im( Si)
0
10
12
14
− 16
16
16 14 12 10 8 6 4 2 0 2 4 6 8 10 12 14 16
− 16 Re( Si) 16
1024-QAM @ 40 dB SNR
32 32
30
28
26
24
22
20
18
16
14
12
10
8
6
4
Im( Si)
2
0
2
4
6
8
10
12
14
16
18
20
22
24
26
28
− 32 30
32
32 30 28 26 24 22 20 18 16 14 12 10 8 6 4 2 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32
− 32 Re( Si) 32
Fiber Pad
1024-QAM Amplifier
Modulator (BLE)
Noise Pad
Source
Tunable
Var.
CW Gain Band Pass
Atten.
Generator Filter
Var.
Atten.
Spec. Analyzer
1024-QAM PC
(CTB/SNR/Power
Demodulator (BERT)
Monitor)
50
45 STB SNR, dB
40
45
RF Cascade Depth
35
44.5
30
44
25
43.5
20
43
15
42.5
10
5
0
45 44.5 44 43.5 43 42.5 42 41.5 41 40.5
QAM Optical CCN
Figure 7 – Sensitivity of Cascade Depth to STB and Optical Noise Contributions for a 40 dB Link
Requirement
50
45
STB SNR, dB
40
41.5
RF Cascade Depth
35
41
30
40.5
25
40
20
39.5
15
39
10
5
0
45 44.5 44 43.5 43 42.5 42 41.5 41 40.5 40
QAM Optical CCN
Figure 8 – Sensitivity of Cascade Depth to STB and Optical Noise Contributions for a 38 dB Link
Requirement
12
9
6
3
0
-3
-6
-9
-12
-15
-18 Total CSO
-21 Total CTB
-24 Carriers
-27
-30
-33
-36
-39
-42
-45
-48
-51
-54
0 100 200 300 400 500 600 700 800 900 1000
45
42
39
36
33
30
27
24
21 Total CSO
Total CTB
18 Carriers
15
12
-3
-6
0 100 200 300 400 500 600 700 800 900 1000
50.00
45.00
40.00
RF Cascade Depth
35.00
30.00 79
25.00 59
20.00 30
15.00
10.00
5.00
0.00
80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65
RF Amplifier CTB
Figure 11 – Cascade Depth Thresholds vs. CTB Performance and Analog Channel Loading,
CTBmax = 51 dB
50.00
45.00
40.00
RF Cascade Depth
35.00
30.00 79
25.00 59
20.00 30
15.00
10.00
5.00
0.00
80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65
RF Amplifier CTB
Figure 12 – Cascade Depth Thresholds vs. CTB Performance and Analog Channel Loading,
CTBmax = 58 dB
20.00
18.00
16.00
RF Cascade Depth
14.00
12.00
79
10.00
59
8.00
6.00
4.00
2.00
0.00
80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65
RF Amplifier CTB
Figure 13 – Cascade Depth Thresholds vs. CTB Performance and Analog Channel Loading,
CTBmax = 58 dB, Expanded for 59 & 79-channels only
50.00
45.00
40.00
RF Cascade Depth
35.00
30.00 79
25.00 59
20.00 30
15.00
10.00
5.00
0.00
80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65
RF Amplifier CTB
Figure 14 – Cascade Depth Thresholds vs. CTB Performance and Analog Channel Loading,
CTBmax = 51 dB, QAM load @ -3 dBc
Rob Thompson
Chuck Moore
Jack Moran
Rob Howald
For coefficient analysis of multiple CMs, Figure 4 is the equalizer’s phase response,
it is helpful to break-down impulse response θe(f). Calculation for phase response is based
measurements into regions in which dominant upon a 1024-point, Fast Fourier Transform of
impairments will have the greatest impact. the DOCSIS 2.0 Pre-Eq coefficients and is
Numerically sorting on these impaired regions shown in Eq 5. Note that the equalizer’s
facilitates efficient organization of similarly phase response is ideally linear throughout the
impaired CM groups, and this can help in channel’s bandwidth.
diagnosing issues.
Eq 5 – Phase Response
Figure 6 illustrates one of many possible Now consider Figure 10. Figure 10 shows
micro-reflection source configurations. Two the effect of a micro-reflection on a16-QAM
devices with poor return loss, acting as signal signal’s constellation diagram. The micro-
reflectors, are separated by a length of cable. reflection’s characteristics are those
The CM is acting as the second reflector, but previously depicted in Figure 7. Note the
any HFC component has the potential to spread throughout the symbol region on each
achieve a similar result. The reflector return 16-QAM point, and subsequently how now
loss and the loss between the reflectors less additive noise has more likelihood of
determine the amplitude of the micro- causing a symbol to jump a boundary and
reflection. The delay encountered as a signal create a hard decision error than the Figure 8
copy traverses the red path of Figure 6 will case.
determine which equalizer tap is responsible
for correction. Figure 11 repeats the same micro-
reflection scenario for 64-QAM. 16-QAM is
Note that the CM has as a design limit has less sensitive micro-reflections than 64-QAM
a high return maximum loss value of 6 dB, because of reduced decision boundary size of
meaning it may reflect up to 25% of its 64-QAM for the same average transmit
incident power. In the plant, design limits are power. In other words, 16-QAM symbol size
typically significantly better, but over time can spread more than 64-QAM. In comparing
will degrade as the plant ages and elements Figure 10 and Figure 11, the same level of
that contribute to good RF matching – micro-reflection impairment has spread the
connectors, cable, splitters, interfaces on symbols of the 64-QAM constellation
PCBs – degrade. appreciably closer to the symbol boundaries
than in 16-QAM constellation. The 64-QAM
QAM Signaling Impact situation is clearly a catastrophic situation
with some added noise unless some
Lastly, there is linear phase and negligible GDV uniquely impacts the DOCSIS Pre-
GDV across the channel’s bandwidth. Note Eq coefficients. The main-tap region of the
equalizer’s GDV is approximately 12 nsec impulse response magnitude, shown in Figure
across the channel’s bandwidth. 23, reveals main-tap spreading as was
REFERENCES
0
-5
-10
Magnitude (dB)
-15
-20
-25
-30
-35
-40
-45
-50
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Tap (symbol spaced - 5.12 Msym/sec)
3.14
2.36
1.57
Phase (radians)
0.79
0.00
-0.79
-1.57
-2.36
-3.14
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
8.00E-03
6.00E-03
Magnitude (dB)
4.00E-03
2.00E-03
0.00E+00
-2.00E-03
-4.00E-03
-6.00E-03
-8.00E-03
-2.56
-1.92
-1.28
-0.64
0.64
1.28
1.92
2.56
Relative Frequency (MHz)
3.14
2.36
1.57
Phase (radians)
0.79
0.00
-0.79
-1.57
-2.36
-3.14
-2.56
-1.92
-1.28
-0.64
0.64
1.28
1.92
2.56
1340
1335
Group Delay (nsec)
1330
1325
1320
1315
1310
1305
1300
-2.56
-1.92
-1.28
-0.64
0.64
1.28
1.92
2.56
Relative Frequency (MHz)
Reflector2
HFC Coaxial
CMTS Reflector1 Cable
Network Network
Modem
2
Amplitude (dBmV)
-1
-2
-3
-4
-2.56 -1.92 -1.28 -0.64 0.00 0.64 1.28 1.92 2.56
Relative Frequency (MHz)
1 1/3
2/3
Quadrature
-0
- 2/3
-1 1/3
-1 1/3
- 2/3
2/3
1 1/3
-0
In-Phase
1 1/7
6/7
4/7
2/7
Quadrature
-0
- 2/7
- 4/7
- 6/7
-1 1/7
-1 1/7
- 6/7
- 4/7
- 2/7
2/7
4/7
6/7
1 1/7
-0
In-Phase
1 1/3
2/3
Quadrature
-0
- 2/3
-1 1/3
-1 1/3
- 2/3
2/3
1 1/3
-0
In-Phase
1 1/7
6/7
4/7
2/7
Quadrature
-0
- 2/7
- 4/7
- 6/7
-1 1/7
-1 1/7
- 6/7
- 4/7
- 2/7
2/7
4/7
6/7
1 1/7
-0
In-Phase
0
-5
-10
Magnitude (dB)
-15
-20
-25
-30
-35
-40
-45
-50
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Tap (symbol spaced - 5.12 Msym/sec)
1.000
0.800
0.600
Magnitude (dB)
0.400
0.200
0.000
-0.200
-0.400
-0.600
-0.800
-1.000
-2.56
-1.92
-1.28
-0.64
0.64
1.28
1.92
2.56
1480
Group Delay (nsec)
1430
1380
1330
1280
1230
-2.56
-1.92
-1.28
-0.64
0.64
1.28
1.92
2.56
Relative Frequency (MHz)
0
-5
-10
Magnitude (dB)
-15
-20 5.12 Msym/sec
-25 2.56 Msym/sec
-30 1.28 Msym/sec
-35
-40
-45
-50
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
7
6
5
4
Amplitude (dBmV)
3
2
1
0
-1
-2
-3
-4
-2.56 -1.92 -1.28 -0.64 0.00 0.64 1.28 1.92 2.56
Relative Frequency (MHz)
1 1/3
2/3
Quadrature
-0
- 2/3
-1 1/3
-1 1/3
- 2/3
2/3
1 1/3
-0
In-Phase
1 1/7
6/7
4/7
2/7
Quadrature
-0
- 2/7
- 4/7
- 6/7
-1 1/7
-1 1/7
- 6/7
- 4/7
- 2/7
2/7
4/7
6/7
1 1/7
-0
In-Phase
1 1/3
2/3
Quadrature
-0
- 2/3
-1 1/3
-1 1/3
- 2/3
2/3
1 1/3
-0
In-Phase
1 1/7
6/7
4/7
2/7
Quadrature
-0
- 2/7
- 4/7
- 6/7
-1 1/7
-1 1/7
- 6/7
- 4/7
- 2/7
2/7
4/7
6/7
1 1/7
-0
In-Phase
0
-5
-10
Magnitude (dB)
-15
-20
-25
-30
-35
-40
-45
-50
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Tap (symbol spaced - 5.12 Msym/sec)
3.000
2.500
Magnitude (dB)
2.000
1.500
1.000
0.500
0.000
-0.500
-2.56
-1.92
-1.28
-0.64
0.64
1.28
1.92
2.56
0
-5
-10
Magnitude (dB)
-15
-20
-25
-30
-35
-40
-45
-50
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Tap (symbol spaced - 5.12 Msym/sec)
0.400
0.300
Magnitude (dB)
0.200
0.100
0.000
-0.100
-0.200
-0.300
-2.56
-1.92
-1.28
-0.64
0.64
1.28
1.92
2.56
1450
1430
Group Delay (nsec)
1410
1390
1370
1350
1330
1310
1290
1270
-2.56
-1.92
-1.28
-0.64
0.64
1.28
1.92
2.56
Relative Frequency (MHz)
0
-5
-10
Magnitude (dB)
-15
-20
-25 200 ns/MHz
-30
-35
-40
-45
-50
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
µ-Reflection
Simulator
CM
SB5101
Ethernet
Protocol
Analysis
Figure 27 - Micro-Reflection Impaired Communication Channel Test
Topology
0
Micro-Reflection Impairment Level (dB)
-5
-10
-15
-20
-25
-30
-35
-40
-8
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Tap Location (T = Symbol)
0
Micro-Reflection Impairment
-5
-10
-15
Level (dB)
-20
-25
-30
-35
-40
-8
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Tap (Symbol-Spaced)
4.5
4
Amplitude (dB)
3.5
2.5
2
-2.56 -1.92 -1.28 -0.64 0.00 0.64 1.28 1.92 2.56
Relative Frequency (MHz)
400
300
200
Group Delay (nsec)
100
-100
-200
-300
-2.56 -1.92 -1.28 -0.64 0.00 0.64 1.28 1.92 2.56
Relative Frequency (MHz)
0
Micro-Reflection Impairment Level (dB)
-5
-10
-15
-20
-25
-30
-35
-40
-8
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Tap Location (T = Symbol)
0
Micro-Reflection Impairment
-5
-10
-15
Level (dB)
-20
-25
-30
-35
-40
-8
-7
-6
-5
-4
-3
-2
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Tap (Symbol Spaced)
T1 26 20 14 26
3
CM CM
T1B T1A
CM
23
3A
23 20 17 14
CM 20
1B
17 20 20 26
1
17
CM CM
1A 1C
2
CM
26
2C
CM CM
2A 2B
14 17 20 23
Example A
Figure 1 – Telepresence Endpoint with Three Screens
Adapting Telepresence to the Home The lights in the room were changed
Office to get the right color, and a reflective light
source was added above the TV to help
The home office is not as easily the camera. The windows in the room had
configured as the enterprise environment. to get blackout shades so that they would
The easiest solution for a home office is to not create back lighting.
use an all-in-one floor standing system
and put it on the far side of the desk. To connect back to the enterprise
environment, a good quality router with
The author of the paper configured a build in VPN (IPsec based) is needed. As
home office telepresence system with will be seen later in the paper, the
discrete components. He put a 40” LCD existence of this router and the VPN
Figure 2 – TPoD End‐to‐End System
Figure 2 shows an entire TPoD system In a worst case scenario, there could
that spans both the enterprise and the be three routers in the home network.
service provider environment.
1. A home router which aggregates all
The enterprise contains one or more the traffic from the home network
telepresence systems. It also contains its
own IP PBX system (call manager system) 2. A telepresence router that places
that is used to connect IP phones and to telepresence traffic onto a VPN. A
connect the telepresence systems. There is third-party service provider may
a local telepresence conference bridge as remotely manage this router.
well.
3. An enterprise telecommuter router to
The home office as described earlier that is managed by the enterprise for
contains a telepresence system that sits data and VoIP connectivity. (Ideally,
behind a VPN router. This connects to the this is the same router as the
cable operator through a local cable telepresence router)
modem (CM) and cable modem
termination system (CMTS). The main difference between these
three routers is that a different individual
For TPoD systems that are deployed or organization manages each router. In
for intra-enterprise purposes, all calls are the simplest scenario, there is one router
typically routed to the CMS managed by that manages both the home network and
the enterprise. If the enterprise CMS is not the telecommuter and telepresence
compatible with the home office networks.
telepresence system, a third-party
telepresence service may be used. Third- One connectivity option is to have the
party service may also be used to enable home router and telepresence router
inter-enterprise calls. The third-party connected separately to the CM. For this
service provider will require secure access to work, the cable operator has to be able
to each enterprise. This is significant as it to configure the CM to classify and
can impact call flow considerations. provide QoS treatment for telepresence
traffic. This would require separate IP
addresses from the cable operator for each
HOME NETWORK router and NAT in the CM to be disabled.
CONSIDERATIONS
If the telepresence router is connected
The home network consists of all the through the home router, the home router
networked components in the home and should be configured to provide priority
the interconnectivity, including the access to the CM for the telepresence
telepresence endpoint and the DOCSIS service.
CM. The connection between the
• Traffic Priority
The minimum value for B is 1522 (one
• Max Sustained Traffic Rate (R)
minimum size Ethernet frame) and the
• Max Traffic Burst (B)
default is 3044 bytes although it can be as
• Min Reserved Traffic Rate high as 20 million byes for the DS and 3
We also need to make sure that the Since the entire upstream and
introduction of telepresence units in the downstream channel is dedicated to a
field does not disrupt service to other telepresence setup, the QoS profile for the
modems deployed in the field. This can be telepresence modem would simply
achieved in multiple ways dedicate the full channel bandwidth as
CIR bandwidth for that modem.
Option 1: Separate Upstream and
Downstream for Telepresence Pros
While this option has severe limitation Option 2: Shared Upstream and
when it comes to scaling the telepresence Downstream
service, it’s a safe option to start field
trials and to roll out the service initially. In this option, the telepresence cable
Nailing certain cable modems to certain modem shares the upstream and
downstream channels can be done easily downstream channels with other cable
Authorization of the Telepresence Client: While this change in the VPN router
would ensure that the CMTS can snoop
As the CMTS is going to process the RSVP over UDP message, there is a
resource reservation requests from the further challenge in the VPN scenario.
home, it has to be ensured that the solution The source and destination address and
is not susceptible to Denial of Service port information in the RSVP message
attacks from malicious cable modem would not be useful for the CMTS, since
users. The standard mechanism to the packets of the telepresence flow would
authorize a user requesting bandwidth still be encrypted within the IPsec VPN
using RSVP is by using Pull-COPS /AAA tunnel. (and therefore encapsulated with
(Authentication, Authorization and packets whose IP addresses are those of
Accounting) where the CMTS would the VPN gateways).
offload the authorization decision to a
COPS /AAA server. To solve this problem the CMTS will
instead have to store the source and
Pull-COPS /AAA authorization may destination IP address in the IP header of
not be deployed in a specific cable the packet carrying the RSVP over UDP
network. Hence another option is to add a message, and use those to create the
vendor-specific TLV in the modem classifier. When the VPN router forwards
configuration file to indicate to the CMTS the RSVP over UDP message to the
CMTS, it uses the same source and
destination address that it will use to send and a source address of @2, which
the corresponding media packets within represent the near end of the VPN tunnel.
the IPsec VPN tunnel.
Figure 4 also shows an additional NAT
Hence, the CMTS can create a operation that is performed by the cable
DOCSIS classifier that matches all the modem which changes the source address
traffic within the VPN tunnel. The VPN of the packet to @3 and keeps the
router would have to insert a flag in the destination address unchanged as @4. The
RSVP message that the CMTS would CMTS filters the RSVP over UDP packet
interpret as “don’t use the address and port and uses the destination address @4 and
information within the RSVP message. source address @3 to create the upstream
Instead, create the DOCSIS classifier and downstream classifiers to provide
using the source and destination address of appropriate QoS to the bi-directional
the RSVP over UDP packet”. telepresence media.
2. Even for the non-VPN case, RSVP 3. When the CMTS intercepts the RSVP
messages coming from the remote over UDP message, it ensures that the
telepresence endpoint may be filtered message is being received from a
out somewhere in the network – client behind an authorized modem. If
especially if that endpoint belongs to a authorization fails, the CMTS would
different service provider. drop the packet. If it succeeds it would
continue to process the RSVP request.
3. The CMTS would be open to Denial
of Service attacks from the Internet. 4. If the “ignore the filter spec” flag is
It’s easier to authorize the local not set, the CMTS creates an upstream
telepresence endpoint requesting QoS classifier based on source, destination
than it would be to authorize a remote IP address, protocol, and destination
telepresence endpoint that the port. It also creates a downstream
operator has no control over. classifier based on source and
destination IP address, protocol and
In order to avoid these issues, source port.
bidirectional RSVP can be used as defined
in the PacketCable specification. This To avoid problems with symmetric
would enable the local telepresence NATs, in both classifiers the local
endpoint to also request bandwidth from telepresence endpoint UDP ports are
the CMTS for the reverse flow in the not used for classification. If the
downstream direction. “ignore the filter spec” flag is set,
then the CMTS creates upstream and
Step-Wise Solution downstream classifiers based only on
the source and destination IP address
1. As part of the call setup, the video of the received RSVP over UDP
resolution is negotiated. The local packet.
telepresence endpoint calculates the
bandwidth to match this resolution and 5. The CMTS tries to admit the upstream
sends an RSVP over UDP message and downstream service flows based
that describes the upstream and on the TSPEC. If it fails, the CMTS
6. Once the local telepresence endpoint 2. Complex NAT and VPN scenarios can
succeeds in reserving the required be supported with this solution.
bandwidth, it completes the SIP call
setup and telepresence media begins to 3. An on-path RSVP over UDP solution
flow between the two telepresence for TPoD can simultaneously exist
endpoints. with an off-path PCMM system for
VoIP.
7. When the telepresence call is done, the
local telepresence endpoint sends an Cons
RSVP teardown message which is
again intercepted by the CMTS. When 1. Even though the reference PCMM
the CMTS receives this message, it architecture does include support for
deletes the upstream and downstream RSVP clients that request QoS
service flows created for the resource directly from the CMTS, this
telepresence call. approach has not been fully defined in
the standards specification. Hence
8. RSVP uses soft state to manage the initial implementations of this solution
QoS reservation in the network. This would be vendor specific or need to be
soft state has to be periodically further standardized.
refreshed by the local telepresence
endpoint by sending RSVP message
periodically. If the CMTS does not SOLUTION #3
receive these periodic RSVP OFF-PATH RESERVATION
messages, it will eventually timeout
the bandwidth reservation and will tear Nailing down bandwidth as
down the service flows created for the recommended in solutions #1 and #2 will
RSVP request. be a challenge for many cable operators.
An alternative approach is to use the
This behavior ensures that bandwidth DQoS infrastructure as defined in
is reclaimed even in the case where the PacketCable MultiMedia to dynamically
TP call is not gracefully torn down. An create and tear down service flows as
example where this is need would be if needed.
the local telepresence endpoint is
powered down before it can end the Rather than statically provisioning the
telepresence call and send the RSVP QoS within the access network, the first
teardown message. initial SIP Invite from the Telepresence
client to the call manager would trigger a
Pros secure sequence of events that would
The basic flow for requesting QOS 8. Telepresence media flows flow bi-
from a hosted call manager external to the directionally with the proper QoS.
cable network is as follows.
Multiple checkpoints are used to
1. Local TelePresence (CPE) issues SIP maintain security:
Invite to call manager.
• the 3rd party call manager must have
2. Call Manager sends SIP based QOS their specific certification signed by
request to the Service Edge Proxy the site they are contacting,
using a secure transport protocol such
as SIPS, TLS or HTTPS • the edge proxy must have details on
the contacting site,
3. Edge Proxy validates request and
sends the request to application
manager.
REFERENCES
[1] “Datacenter Reference Guide”, Sun
Microsystems, July 2007.
INTRODUCTION
CHALLENGES FOR PROVIDING
The world of entertainment video is CONSISTENTLY GOOD
changing to support alternative methods for QUALITY OF EXPERIENCE
Abstract
EVALUATING THE DRIVERS FOR
The explosion in the variety of SERVICE PROVIDER SUPPORTED HOME
Consumer Electronic (CE) devices and NETWORKING
applications that deliver video and internet In this section of the paper we explore the
experiences has produced the need for simple technology drivers for adoption of home
and integrated home networking solutions. networking. We consider the following
The cable TV community has analyzed, tested drivers:
and debated the viability of offering home
networking solutions for many years but Proliferation of wireless networked
competitive pressures and technology devices.
advancements has finally prompted near term Rise of Wireless Home Networking
action. Standards and Ease of Use.
Rise of Personal Web Applications,
Although the home networking environmental Place-shifting, and Social Networking
conditions are reaching an inflection point, Rise of Personal Digital Media and
the standards, consortiums and technologies Low Cost Home Storage, and the
are very fragmented and the network operator decline of Digital Rights Management
economics justifying a service offering can be (DRM).
marginal. Access Competition, Product
Relevance and Substitution.
This paper focuses on various wireless home Wireless Home Networking is
networking technologies and solutions. The happening today !
drivers for home networking are considered
and a variety of wireless home networking Proliferation of Wireless Networked Devices
configurations are discussed.
Today‟s digital home includes many
Preliminary test results from both a networking capable devices, with the range of
performance and economic basis are multi-media networked devices continuing to
evaluated. Of particular importance will be to increase. End users require home networking
assess the user and operator experience from in order to support many of these new
a set-up and maintenance perspective. devices.
The conclusion section will contrast the Multi-media Devices: Manufacturers are
technical and economic characteristics and starting to include network connections or
benefits of the various wireless home Wi-Fi technology in common devices like
networking solutions. A recommendation will digital still cameras and MP3 players and
be proposed that identifies areas of printers. Examples include Apples Wi-Fi
opportunities for wireless home networking enabled iPod touch, or iPhone; Eye-Fi‟s Wi-Fi
solutions for Multiple System Operators SD memory card; Archos personal media
(MSO’s). player; and the Hitachi Wooo camcorder or
Multi-room Audio: Multi-room audio Service providers can drive home networking
solutions that leverage home networking further toward mass market by building a
capabilities are emerging. Examples include proper integrated support ecosystem.
Sonos, Linksys by Cisco Wireless Home Installers and service providers could
Audio system 2, and Apple‟s Airport-based incorporate available tools to allow easy
wireless audio streaming; in addition to audio maintenance and upgrades.
streamers such as the Logitech‟s Squeezebox,
and Internet radio devices such as Tangent‟s
Quattro Internet radio. Rise of Place-shifting, Media multi-tasking,
Personal Web Applications and Social
Networked TVs: TV sets with built in Networking
networking are beginning to emerge. At CES
2009 for example Sony, Samsung, LG and (a) Place-shifting and multi-tasking
Toshiba were all introducing TVs with
Ethernet and/or Wireless connections 3 which Place shifting devices such as the Slingbox
could be used to display Yahoo! widgets. have emerged to enable services to be used in
any room. Place shifting devices and services
require a home network ideally based on a
Rise of Wireless Home Networking Standards solution that supports location flexibility or
and Ease of Use portability.
(b) Personal Web Applications & Social With an expanding library of personal digital
Networking content including music, photos and movies;
the home network starts to play a pivotal role
The personalization of the web is evident in in allowing a user‟s multiple devices to
the explosion of web-based email platforms synchronize or access personal content
such as Gmail, Yahoo Mail and Windows between rooms and across devices.
Live Mail.
Furthermore, applications are emerging to
With the emergence of social networking support multi-device synchronization of
applications such as MySpace and Facebook, personal digital media such as Microsoft Live
combined with micro-blogging platforms Mesh, driving the need for home networking.
Twitter and Friendfeed; web-based
applications reinforce the personalized nature (b) Low Cost Home Storage
of networked communication.
In 1988 1 GB of storage in the home would
The speed at which web-based personal cost about US$40,000, so storing an 11GB
applications have been developed for wireless music library would cost US$440,000! That
networked devices, such as the Apple iPhone cost has dramatically declined so that in 2008
and Google‟s Android platform emphasizes 1 GB of storage cost of approximately
the importance of operator-supported wireless US$0.20 meaning that 11GB music library
home networking. could be stored for US$2.20. This dramatic
shift in the economics of storage has enabled
Rise of Personal Digital Media and Low Cost households to store large libraries of multi-
Home Storage, and the decline of DRM media content for consumption around the
home.
(a) Personal Digital Media
10
on Home Networking
1
0
1988
1990
1992
1994
1996
1998
2000
2002
2004
2006
2008
Additionally, small form factor storage, such
as SD cards, and smaller Mini and Micro SD
cards are supporting multi-media from a range
of new home wireless networked devices such
as Apple‟s iPhone and Google‟s G1 Android
handset. Such devices are able to both access
and contribute to the personal digital media As a result Telco‟s have deployed advanced
library. residential gateways for several years by
necessity.
(c) The demise of Digital Rights Management
(DRM) (b) Product Relevance and Substitution
Driving Service Provider Wireless Home
Recently Apple announced it was abandoning Networking
DRM protection for iTunes song downloads
in favour of a non-DRM model7. The fall of The traditional RBOC or Incumbent Telco,
DRM means that a barrier to multi-room has typically placed an emphasis on the
audio has fallen and this facilitates a wider residential gateway CPE device with the latest
device ecology for the consumption of multi- features as a way to attract subscribers,
room around the home. The key question is reporting the residential gateway CPE as a
whether this trend will extend to the video subscriber acquisition expense. This has
world? In particular, the ability to move provided a head start for Telco‟s in residential
MPEG4/H.264 HD content to various devices gateway adoption and wireless home
within the home at its much lower bandwidth networking penetration.
requirements could be a key enabler for whole
home wireless networking of video, data and A subset of Telco residential gateway
voice. deployments can be seen below in Table 2:
Technology
Unfortunately the gain of a MIMO Spatial Because the 802.11n specification has
Multiplexing (SM) system assumes the provisions for many optional features there
existence of multipath and uncorrelated exists the ability of a chip designer and access
signals for each of the spatial streams being point developers to offer a variety of
transmitted. Radio signals need to reflect off standards compliant 802.11n
of walls and furniture to cause the receiver to implementations. The major suppliers of
see multiple representations of the same 802.11a,b,g chipsets and start-up companies
signal arriving at different times and have begun to optimize video transport within
amplitudes. In typical residential homes this the home over the 5 GHz spectrum associated
phenomena occurs but situations could arise with 802.11n.
where the intended multipath effect is not
present thereby decreasing the benefit of The ability to use the additional 20 and 40
MIMO and increases in system capacity. MHz channel bandwidths, aggregate baseband
and RF functions onto a single System on a
In 802.11n systems it is important for all Chip (SoC), utilize MPEG4/H.264
traffic to be classified as priority, best efforts compression and take advantage of MIMO
or background type traffic. Implementing the technologies have led to many advancements
Quality of Service traffic classifications called in video distribution within the home.
Wireless Multi-Media (WMM) will be a
difficult but important process. The correct Some new and innovative chip design shops
tagging and classification will be critical to have creatively utilized the various core
properly manage the traffic in a wireless home technologies listed below to great advantage
network. Not all consumers will be up to this while still complying with the standard.
task and could cause performance issues that
will reflect poorly on the technology. Beamforming MIMO (simultaneous
transmission of the same data streams
A final implementation and design over multiple antennas)
consideration in the 802.11n specification are Adaptive channel modulation and
the use of two interference control coding options
mechanisms called Dynamic Frequency Enhanced QoS (prioritizing video,
Selection (DFS) and Transmit power Control data and voice services)
(TPC). DFS is a feature that checks for the Radio resource techniques (utilizing
presence of military radar operating in the 5 feedback information from the client
GHz frequencies and if detected requires the devices while transmitting)
802.11n device to utilize other available Linking compressed video (H.264)
frequencies. TPC requires 802.11n devices to chip and MIMO RF technologies
reduce their transmit power if they are Integration of advanced Power
operating very close to each other.33 Amplifier (PA) and antenna designs
Although these interference controls are a
burden to the 802.11n system developer they As these many variations of the 802.11n
are not hugely disruptive issues but must be standard enter the market it will be very
important for the Wi-Fi Alliance and network
% Bytes Lost
R2R: 3.2
Not tested
R2R: 10.9
L2L: 0.0 L2L: 0.0 jitter and packet loss) over range and
Required: < 0.1 W2L: 0.0
L2W: 0.0
W2L: 0.0
L2W: 0.0
network load.
W2R: 0.6 W2R: 0.2 Effective throughput and capacity over
R2W: 1.0
L2R: 1.8
R2W: 0.4
L2R: 0.1 path loss.
R2L: 1.4
R2R: 8.5
R2L: 0.2
R2R: 3.0
Receiver sensitivity and spectral
Jitter (ms) Not tested Not tested L2L: 0.0 efficiency.
Required: < 2 W2L: 0.5
L2W: 2.3 Service specific quality matrix such as
W2R: 2.4
R2W: 4.0
video startup and zapping latency.
L2R: 2.8
Considering the technology costs we initially Figure 16: Wireless Home Networking “Pain
reviewed the incremental costs of wireless Threshold” and Technology Costs
home networking technology we considered Wireless Home Networking Cost Per Subscriber Per Month
to add wireless and the B-end, in the case that $30 WHN. Pain Threshold / Month $29.17
$15
$12.50
(Tzero) -22%
***
-50%
© 2015 National Cable and Telecommunications Association. All Rights Reserved.