BS IEC 62766-8:2017:2018 Edition
$167.15
Consumer terminal function for access to IPTV and open multimedia services – Profiles
Published By | Publication Date | Number of Pages |
BSI | 2018 | 34 |
IEC 62766-8:2017(E) defines three example profiles that may be adopted for implementation in suitable devices.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
4 | CONTENTS |
6 | FOREWORD |
8 | INTRODUCTION |
9 | 1 Scope 2 Normative references 3 Terms, definitions and abbreviated terms |
10 | 3.1 Terms and definitions 3.2 Abbreviated terms 4 Release 2 IPTV solution profiles |
11 | 5 Open internet profile 5.1 General 5.2 IPTV Services 5.3 Residential network 5.3.1 WAN gateway 5.3.2 IMS gateway 5.3.3 Application gateway 5.3.4 OITF |
12 | 5.4 Service provider discovery entry points 5.5 Service discovery and content metadata 5.6 Authentication methods 5.7 Content and service protection 5.8 SVG tiny V1.2 5.9 Remote management |
13 | 6 Baseline managed profile 6.1 General 6.2 IPTV services 6.3 Residential network 6.3.1 WAN gateway 6.3.2 IMS gateway |
14 | 6.3.3 Application gateway 6.3.4 OITF 6.4 Service provider discovery entry points 6.5 Scheduled content and streamed CoD service enablers 6.6 Authentication methods 6.7 Content and service protection |
15 | 6.8 OITF capabilities 6.9 Remote management 7 Enhanced managed profile 7.1 General 7.2 IPTV services 7.3 Residential network 7.3.1 WAN gateway 7.3.2 IMS gateway 7.3.3 AG |
16 | 7.3.4 OITF 7.4 Service provider discovery entry points 7.5 Scheduled content and streamed CoD service enablers 7.6 Broadband content guide 7.7 Authentication methods 7.8 Content and service protection |
17 | 7.9 Remote management 8 Specification of profile features 8.1 General 8.2 IPTV services support in the OITF Tables Table 1 – Legend for status in the profiles |
18 | Table 2 – Release 2 IPTV service support profiling |
19 | 8.3 Media formats Table 3 – Media formats profiling |
20 | 8.4 HTTP adaptive streaming |
21 | 8.5 Content metadata Table 4 – HTTP adaptive streaming profiling Table 5 – Content metadata profiling |
22 | 8.6 Protocols |
23 | Table 6 – Protocols profiling |
25 | 8.7 Declarative application environment |
26 | Table 7 – DAE features profiling |
30 | 8.8 Procedural application environment |
31 | 8.9 Authentication, content protection and service protection Table 8 – Authentication and CSP profiling |
32 | Bibliography |