Newtec Proprietary
Confidentiality: Unrestricted
R3.2_v1.0
Table of Contents
MDM9000 Satellite Modem
16.18.3 Operation of AES ........................................................................................................................... 301
16.18.3.1 AES Setup Global Encryption ................................................................................................. 301
16.18.3.1.1 Setting a Global Key for the Transmission ........................................................................ 302
16.18.3.2 AES Content Protection Multi-Stream ..................................................................................... 305
16.18.3.2.1 Multi-Stream Transmissions to Different Groups of Receivers ......................................... 305
16.18.3.3 Changing Keys Seamlessly ..................................................................................................... 306
16.18.3.4 Adding a Receiver to the Network ........................................................................................... 306
16.18.3.5 Removing a Receiver from the Network .................................................................................. 307
16.18.3.6 Sending Protected Content Keys ............................................................................................ 307
16.18.3.7 Creating Groups of Receivers ................................................................................................. 307
16.18.3.8 Changing Group Keys ............................................................................................................. 307
16.18.3.9 Deleting Keys .......................................................................................................................... 308
16.18.4 Generating Encrypted Content Keys ............................................................................................. 309
16.18.4.1 128-Bit Keys ............................................................................................................................ 310
16.18.4.2 64-Bit Keys .............................................................................................................................. 311
17 Appendix - Alarm List ................................................................................... 312
17.1 Generic Alarms ...................................................................................................................................... 313
17.2 Ethernet Interface Alarms ...................................................................................................................... 314
17.3 BBF over IP Alarms ............................................................................................................................... 315
17.4 Modulator Alarms ................................................................................................................................... 316
17.5 Reference Clock Alarms ........................................................................................................................ 317
17.6 Demodulator Alarms .............................................................................................................................. 318
17.7 Alarms: BUC Power Alarms ................................................................................................................... 319
18 Appendix - Overview of the Used Technologies ....................................... 320
18.1 DVB-S2, DVB-S2X and S2 Extensions ................................................................................................. 320
18.1.1 DVB-S2 Standard ............................................................................................................................ 320
18.1.2 DVB-S2X Standard .......................................................................................................................... 322
18.1.3 S2 Extensions .................................................................................................................................. 324
18.2 Noise and Distortion Estimator (Node) .................................................................................................. 326
18.2.1 How Does Node Work ...................................................................................................................... 326
18.3 Wideband .............................................................................................................................................. 328
18.4 Clean Channel Technology® ................................................................................................................ 328
19 Appendix - Classification Expressions ...................................................... 329
19.1 Layer 2 Examples .................................................................................................................................. 332
19.1.1 Frequently used Layer 2 Expressions .............................................................................................. 332
19.1.2 Expression: All ................................................................................................................................. 333
19.1.3 Expression: Layer 2 VLAN ID ........................................................................................................... 335