Overall Architecture 1.1
Comcast Confidential 4
4.5.14 Encryption Resource Manager ................................................................33
4.5.15 Encryption Engine ................................................................................... 33
4.5.16 Network Resource Manager.................................................................... 34
4.5.17 Transport Network................................................................................... 34
4.5.18 Edge Resource Manager.........................................................................34
4.5.19 Edge Device ............................................................................................ 35
4.5.20 Network Management System (NMS) ..................................................... 35
4.5.21 Data Warehouse (DW) ............................................................................35
4.5.22 Logging Server (LS) ................................................................................ 35
5 INTERFACE DESCRIPTION.........................................................................36
5.1 Asset Interfaces................................................................................................. 36
5.1.1 Asset Distribution Interface (A1)..............................................................36
5.1.2 Asset Ingest Interface (A2)...................................................................... 36
5.1.3 Asset Propagation Interface (A3) ............................................................37
5.1.4 Real Time Metadata Interface (A4) .........................................................37
5.1.5 Real Time Manager Interface (A5) .......................................................... 37
5.1.6 Asset Publishing Interface (A6) ...............................................................37
5.1.7 Client Navigation Interface (A7)...............................................................37
5.2 Session Interfaces.............................................................................................38
5.2.1 Client Session Interface (S1)................................................................... 38
5.2.2 Session Authorization Interface (S2)....................................................... 38
5.2.3 Session and On Demand Resource Interface (S3) ................................. 38
5.2.4 Session and Encryption Resource Interface (S4).................................... 39
5.2.5 Session and Network Resource Interface (S5) .......................................39
5.2.6 Session and Edge Resource Interface (S6) ............................................ 39
5.3 Resource Interfaces..........................................................................................39
5.3.1 Asset Location Interface (R1).................................................................. 39
5.3.2 Streaming Server Resource Interface (R2) .............................................40
5.3.3 Conditional Access System Interface (R3).............................................. 40
5.3.4 Encryption Resource Interface (R4) ........................................................40
5.3.5 Network Resource Interface (R5)............................................................40
5.3.6 Edge Resource Interface (R6)................................................................. 40
5.4 Entitlement Interfaces.......................................................................................41
5.4.1 Entitlement Validation Interface (E1)....................................................... 41
5.4.2 Client Purchase Interface (E2) ................................................................41
5.5 Stream Control Interfaces ................................................................................41
5.6 Client Auto-discovery Interfaces (D1) .............................................................42
5.7 Video Transport Interfaces............................................................................... 42
5.7.1 Source Transport Interface (V1)..............................................................42
5.7.2 Encrypted Transport Interface (V2) .........................................................42
5.7.3 Network Transport Interface (V3) ............................................................42
5.7.4 Client Transport Interface (V4) ................................................................ 42
5.8 Network Management Interfaces .....................................................................42
5.9 Data Warehousing Interfaces........................................................................... 43
5.10 Event Logging Interfaces .............................................................................. 43
- 1
- 2
前往页