MSA Series Analyzer Products

Installation and Operation Manual
Videotek® MSA
MSA-100-MI-VM Multi Source Analyzer
Motion Imagery Virtual Machine
Revision A
P061-0030
Delivering the Moment
Publication Information
© 2014 Imagine Communications Corp. Proprietary and Confidential.
Imagine Communications considers this document and its contents to be proprietary and confidential. Except for
making a reasonable number of copies for your own internal use, you may not reproduce this publication, or any
part thereof, in any form, by any method, for any purpose, or in any language other than English without the
written consent of Imagine Communications. All others uses are illegal.
This publication is designed to assist in the use of the product as it exists on the date of publication of this manual,
and may not reflect the product at the current time or an unknown time in the future. This publication does not in
any way warrant description accuracy or guarantee the use for the product to which it refers. Imagine
Communications reserves the right, without notice to make such changes in equipment, design, specifications,
components, or documentation as progress may warrant to improve the performance of the product.
Trademarks
Videotek® is a registered trademark of Imagine Communications or its subsidiaries.
Microsoft® and Windows® are registered trademarks of Microsoft Corporation. All other trademarks and trade
names are the property of their respective companies.
Contact Information
Imagine Communications has office locations around the world. For locations and contact information see:
http://www.imaginecommunications.com/contact-us/
Support Contact Information
For support contact information see:


Support Contacts: http://www.imaginecommunications.com/services/technical-support/
eCustomer Portal: http://support.imaginecommunications.com
© 2014 Imagine Communications Corp.
Proprietary and Confidential
i
Contents
About This Manual ................................................................................................. 1
Intended Audience ........................................................................................................ 1
Finding Specific Information ......................................................................................... 1
Manual Information ....................................................................................................... 2
Revision History .......................................................................................................... 2
Writing Conventions .................................................................................................. 2
Obtaining Documents ................................................................................................2
Directives and Compliances ........................................................................................... 3
Restriction on Hazardous Substances (RoHS) Directive ................................................ 3
Waste from Electrical and Electronic Equipment (WEEE) Directive ............................... 3
Chapter 1
Introduction .............................................................................................................. 5
Product Features.............................................................................................................5
Standard Features for the MSA-100-MI-VM .............................................................. 5
Analysis/Test Report and History ................................................................................. 6
KLV Support .............................................................................................................. 6
Stream Capture ......................................................................................................... 6
Data Traffic Monitoring and Logging ......................................................................... 7
Custom Layout and Labeling ...................................................................................... 8
Video Display Aspect Ratio and Alignment ................................................................. 8
Analog and Digital Clocks .......................................................................................... 8
On Screen Error Display .............................................................................................. 8
Dual Monitor Support ................................................................................................9
Virtual Screen ............................................................................................................ 9
SAP (Session Announcement Protocol) Support .......................................................... 9
Applicable Standards ............................................................................................... 10
Key Terms and Product Concepts ................................................................................ 12
Safety ............................................................................................................................ 12
MSA-100-MI-VM Service and Support ........................................................................ 12
Chapter 2
Installation .............................................................................................................. 13
Installation Procedures ................................................................................................ 13
Virtualization Requirements ..................................................................................... 13
MSA Installation ....................................................................................................... 13
ii
Contents
Setup........................................................................................................................ 13
Updating VM Settings ................................................................................................. 18
Clone........................................................................................................................ 18
Cloning the VM ............................................................................................................ 18
Creating Additional MSA Instances .......................................................................... 27
Configuring Cloned VM(s) .......................................................................................... 28
Verify VM Settings .................................................................................................... 28
Updating the Operating System Configuration ......................................................... 31
License the VM ............................................................................................................ 32
Install License (HW Dongle) ...................................................................................... 32
Extending the Windows Server 2008 Grace Period ................................................... 32
Hardware Setup ...........................................................................................................32
On/Off Procedures ....................................................................................................... 32
Start the MSA Server ................................................................................................ 32
Stop the MSA Server ................................................................................................ 33
Ethernet Addresses .................................................................................................. 33
Installing the Remote Client ..................................................................................... 33
Updating Licenses......................................................................................................... 37
Chapter 3
Operation .................................................................................................................. 41
Key Terms and Product Concepts ................................................................................ 41
Control Panel GUI ......................................................................................................... 43
Virtual Screen Tab......................................................................................................... 44
Program Manager Tab.................................................................................................. 46
Adding Sources ........................................................................................................ 46
Deleting Sources ...................................................................................................... 50
Managing Persistent Sources .................................................................................... 51
Loading a Source List ............................................................................................... 52
Saving a Source List ................................................................................................. 52
Edit Layout ............................................................................................................... 52
Setting the BISS Description Key ............................................................................... 52
Shuffle Program ...........................................................................................................53
Editing Layouts ............................................................................................................. 53
Grid Layout .............................................................................................................. 54
Item List ................................................................................................................... 55
Layout Controls ....................................................................................................... 56
Controls Tab .................................................................................................................. 59
Program Information ................................................................................................ 59
Video........................................................................................................................ 60
Audio ....................................................................................................................... 60
General Traffic Status ............................................................................................... 60
Highlight Window .................................................................................................... 60
VBI Data Overlay ...................................................................................................... 61
Errors ....................................................................................................................... 61
Startup Setting ......................................................................................................... 61
Video Quality Tuneup ..............................................................................................61
PSI/SDP Tab .................................................................................................................. 62
MSA Series
Installation and Operation Manual
PSI/SI/PSIP/SDP Table Analysis ................................................................................... 62
Bit Rate Tab ................................................................................................................... 62
Video Info Tab............................................................................................................... 63
Pic Graph Tab ................................................................................................................ 64
Quant Graph Tab .......................................................................................................... 66
Test Tab.......................................................................................................................... 67
Show Log Window .................................................................................................. 68
Show History Window ............................................................................................. 68
Test Settings Window ..............................................................................................69
Test Schedule ...........................................................................................................74
Auto Capture ...........................................................................................................74
Manual Capture ....................................................................................................... 75
Traffic Log Tab............................................................................................................... 75
Traffic Log Settings .................................................................................................. 76
Email/SMS Tab ......................................................................................................... 77
Application Log Tab...................................................................................................... 77
Active Alarm Tab ......................................................................................................... 78
Audio Info Tab .............................................................................................................. 79
Wave Monitor Tab ........................................................................................................ 79
Resource Monitor Tab .................................................................................................. 80
SAP Listener Tab ...........................................................................................................81
Closed Caption and XDS Tab........................................................................................ 82
KLV Tab ......................................................................................................................... 84
PES Window ............................................................................................................. 84
MMS Window ......................................................................................................... 85
On Screen Display Window ...................................................................................... 85
Remote Client ............................................................................................................... 88
Users Tab ....................................................................................................................... 88
Streaming Tab .............................................................................................................. 90
Source Info Tab ............................................................................................................. 91
Main Video Window .................................................................................................... 92
Program Display ....................................................................................................... 93
Adult Content Block ................................................................................................ 94
Highlight Window .................................................................................................... 96
PIP Alarm Bar ...........................................................................................................96
Source List Management and Custom Layout ........................................................... 98
MSA Source List ....................................................................................................... 98
Sample Custom Layout ..........................................................................................103
Source List Text ......................................................................................................103
Default Source List .................................................................................................104
Shutting Down MSAServer.EXE ................................................................................105
Chapter 4
Troubleshooting ..................................................................................................107
Initial Checks ...............................................................................................................107
Frequently Asked Questions......................................................................................108
iii
iv
Contents
Chapter 5
Specifications .......................................................................................................111
Protocols......................................................................................................................111
Compression Formats.................................................................................................112
Closed Caption............................................................................................................113
XDS Data .....................................................................................................................113
Transport Layer Analysis............................................................................................113
Table Analysis .............................................................................................................114
Video Layer Analysis .................................................................................................115
Audio Layer Analysis..................................................................................................115
Appendix A
Open Source Software Copyright Information.....................................117
FreeType License .........................................................................................................117
LibJPEG License ...........................................................................................................117
CMU/UCD Copyright Notice.......................................................................................117
Networks Associates Technology, Inc. Copyright Notice (BSD)...............................118
Cambridge Broadband Ltd. Copyright Notice (BSD) ................................................118
Sun Microsystems, Inc. Copyright Notice (BSD) .......................................................119
Sparta, Inc. Copyright Notice (BSD)...........................................................................120
Cisco/BUPTNIC Copyright Notice (BSD).....................................................................120
Fabasoft R&D Software GmbH & Co. KG Copyright Notice (BSD) ..........................121
The GNU v2 License ....................................................................................................121
GNU General Public License ...................................................................................121
GNU General Public License ...................................................................................122
GNU Lesser Public License..........................................................................................126
GNU Lesser General Public License .........................................................................126
GNU Lesser General Public License .........................................................................127
Appendix B
Glossary ...................................................................................................................133
Index .........................................................................................................................145
1
About This Manual
This manual details the features, installation procedures, operational procedures, and
specifications of the MSA-100-MI-VM Analyzer.
About This Manual provides an overview of this installation and operation manual,
describes manual conventions, and tells you where to look for specific information. This
section also gives you important information on unpacking and shipping your product.
Intended Audience
This manual is written for engineers, technicians, and operators responsible for the
installation, setup, and / or operation of the MSA-100-MI-VM Analyzer.
Finding Specific Information
Table P-1 shows the location of specific information in this manual.
Table P-1 Finding Specific Information in this Guide
If you are looking for
Go to
Customer Service information
Page 12
Ethernet setup and configuration
Page 33
Features
Page 5
SNMP
Page 103
Specifications
Page 111
Troubleshooting
Page 107
2
About This Manual
Manual Information
This section provides information about the revision history of the manual, writing
conventions used for ease of understanding as well as for navigation throughout the
document, and information about obtaining other product manuals.
Revision History
Table P-2 Manual Revision History
Revision
Date
Revision History
A
January 2012
Initial release
Writing Conventions
To enhance your understanding, the authors of this manual have adhered to the following
text conventions:
Table P-3 Manual Style and Writing Conventions
Term or
Convention
Description
Bold
Indicates dialog boxes, property sheets, fields, buttons, check
boxes, list boxes, combo boxes, menus, submenus, windows, lists,
and selection names
Italics
Indicates email addresses, the names of books or publications, and
the first instances of new terms and specialized words that need
emphasis
CAPS
Indicates a specific key on the keyboard, such as ENTER, TAB,
CTRL, ALT, or DELETE
Code
Indicates variables or command-line entries, such as a DOS entry or
something you type into a field
> or 
Indicates the direction of navigation through a hierarchy of menus
and windows
hyperlink
Indicates a jump to another location within the electronic
document or elsewhere
Internet address
Indicates a jump to a website or URL
Indicates important information that helps to avoid and
troubleshoot problems
To perform a
procedure
Indicates the introduction to a procedure or series of procedural
steps
Obtaining Documents
The installation and operation manuals for most Imagine Communications products are
included on your Documentation and Product Resources DVD as individual Adobe Acrobat
PDF files. Most of the software applications contained on the DVD include Online Help
(electronic documents integrated into their respective software applications). While working
in the application, you can open the Online Help and print out individual topics.
MSA-100-MI-VM
Installation and Operation Manual
Directives and Compliances
This section provides information concerning Imagine Communications compliance with EU
Directive 2002/95/EC and EU Directive 2002/96/EC.
Restriction on Hazardous Substances (RoHS) Directive
Directive 2002 / 95 / EC — commonly known as the European Union (EU) Restriction on
Hazardous Substances (RoHS) — sets limits on the use of certain substances found in
electrical and electronic equipment. The intent of this legislation is to reduce the amount of
hazardous chemicals that may leach out of landfill sites or otherwise contaminate the
environment during end-of-life recycling. The Directive, which took effect on July 1, 2006,
refers to the following hazardous substances:

Lead (Pb)

Mercury (Hg)

Cadmium (Cd)

Hexavalent Chromium (Cr-V1)

Polybrominated Biphenyls (PBB)

Polybrominated Diphenyl Ethers (PBDE)
In accordance with this EU Directive, products sold in the European Union will be fully
RoHS-compliant and “lead-free.” Spare parts supplied for the repair and upgrade of
equipment sold before July 1, 2006 are exempt from the legislation. Equipment that
complies with the EU directive will be marked with a RoHS-compliant symbol, as shown in
Figure P-1.
Figure P-1 RoHS Compliance Symbol
Waste from Electrical and Electronic Equipment (WEEE) Directive
The European Union (EU) Directive 2002 / 96 / EC on Waste from Electrical and Electronic
Equipment (WEEE) deals with the collection, treatment, recovery, and recycling of electrical
and electronic waste products. The objective of the WEEE Directive is to assign the
responsibility for the disposal of associated hazardous waste to either the producers or users
of these products. As of August 13, 2005, producers or users are required to recycle
electrical and electronic equipment at end of its useful life, and must not dispose of the
equipment in landfills or by using other unapproved methods. (Some EU member states
may have different deadlines.)
In accordance with this EU Directive, companies selling electric or electronic devices in the
EU will affix labels indicating that such products must be properly recycled. Contact your
local Sales representative for information on returning these products for recycling.
Equipment that complies with the EU directive will be marked with a WEEE-compliant
symbol, as shown in Figure P-2.
3
4
About This Manual
Figure P-2 WEEE Compliance Symbol
5
1
Introduction
The new Multi-Source Analyzer (MSA) from Imagine Communications offers a range of
solutions that couple confidence monitoring with full testing of compressed video
conformance, audio level, data services and TR-101-290 on any terrestrial broadcast, cable
headend, satellite or telco network.

The MSA-100-MI-VM comes with 2 codecs: MPEG2 and H264, the remote GUI and
four SD PIPs.
This platform provides full conformance testing and traffic status monitoring.
The MSA-100-MI-VM delivers awareness of system information and ancillary data, with the
ability to provide the conformance results in an intuitive GUI interface, along with one or
more mosaic displays that provide real-time full-motion video decode and audio level
analysis. A variety of physical input formats are supported, along with all major compression
standards, a wide array of transport and streaming protocols, and the ability to
simultaneously handle a large number of channels in real time.
Product Features
Standard Features for the MSA-100-MI-VM

Decoding, deep conformance testing, quality analysis and confidence monitoring

Ability to mix a variety of compression formats (H.264/AVC and MPEG-2)

Support for multiple inputs from dual Ethernet IP ports

Simultaneous display of multiple sources of decoded video and audio

Simultaneous, real-time analysis of all sources on all channels

Video quality of experience via black and freeze frame detection

Audio quality of experience via silence and digital clip detection

Validation of systems, video and audio layers

Persistent, unique test settings for individual channels or groups of channels

Support for CC608 and selected XDS message rendering

Traffic status for SI, IP, TS layer, PSIP, CC708, AFD, WSS and DVB teletext

Capture-on-error and manual capture options

Rich local user interface standard, optional support for multiple remote users
6
Chapter 1
Introduction
Analysis/Test Report and History
MSA-100-MI-VM provides the following analysis data:

Test summary of each source at system, video and audio level

Detailed test message of each error/warning type

Monthly, daily and hourly test history (error/warning count) over the past 12 months
KLV Support
MSA-100-MI-VM supports the following

ISO/IEC 13818-1/2007 Synchronous KLV and SMPTE RP 217

Asynchronous KLV metadata signaling, and supports the decoding of certain metadata
sets.
The MSA-100-MI-VM follows the National Geospatial Agency (NGA) standards for
metadata including

MISB STD 0902.1

MISB 0601.2

MISB 0102.5

MISB 0604.1

SMPTE 336M
Stream Capture
MSA supports two different stream capture modes:

Automatic stream capture on error
Auto capture can only be enabled one source at a time; this is to avoid multiple sources
having errors at the same time and overwhelming the capture device. Source data
captured will be saved from 3 seconds before the error happens, and 1 to 60 seconds
after the error happens. If a new error happens during the trailing period, auto capture
will continue without creating a new capture file.
Users can set the maximum capture file size to break large continuous capture into
smaller files for easier offline inspection from a workstation on the same network
Users can choose to stop auto capture once the hard drive is full, or remove the oldest
capture files until enough room is available.
For customers that have clean signals and can maintain a low error ratio, it is possible to
enable auto capture on all sources under the condition that the combined error stream
rate is less than the hard drive write speed.
Users can enable capture on error for system, video or audio layer tests.
MSA-100-MI-VM
Installation and Operation Manual

Manual stream capture
Users can manually start and stop stream capture on a selected source.
When RTP header capture is enabled, each RTP packet is captured in the following
format:
Table 1-1 RTP Packet Capture Format
RTP Capture Format
Number of
Bits
Mnemonic
FourCC
32
bslbf ('mRTP')
Receiving Time Stamp
32
uimsbf (90KHz)
Packet Size
32
uimsbf (RTP header size + payload size)
RTP Header
Variable
RTP Payload
Variable
Input data before de-multiplexing are captured in both capture modes, except that RTP
header can be dropped in manual mode.
Data Traffic Monitoring and Logging
MSA-100-MI-VM monitors and logs the data traffic at the following layers, and the status
can be overlaid over the corresponding video window:

IP layer traffic status

TS layer traffic status

Audio/Video layer traffic status

NTSC CC traffic status

ATSC PSIP traffic status

SCTE-35 traffic status

DVB Teletext traffic status (ETSI EN 300 472 or ETSI EN 301 775)

DVB VBI VPS (Video Program System) traffic status

DVB VBI WSS (Wide Screen Signaling) traffic status

DVB VBI AMOL (Automated Measurement Of Lineups) traffic status

DVB VBI TVG2X (TV guide information) traffic status

DVB VBI CopyGuard traffic status

DVB VBI VITC (Vertical Interval Time Code) traffic status
There is an option to show the PIDs of applicable traffics on screen. The order of the audio
ES can be configured according to either the PID value, or their position in the PMT table.
MSA also logs the following events daily:

Input signal status

RTP errors

ETR sync errors

ETR continuity counter errors

Audio/video buffer overflow

Frozen video
7
8
Chapter 1
Introduction

Black video

Video resolution change

Video Display Aspect Ratio change

Silent audio

Clipping audio
Default for log capture is 16,000 events logged per day. By default up to 30 days of traffic
histories are kept; this can be changed by adding maxDailyLogDays registry value to the
MSA setting.
Custom Layout and Labeling
MSA supports custom video layout and labeling. The main display window can be
partitioned into multiple video grids from 2x2 to 9x9. Each window can have a custom
video window size from 1x1 to 3x3 grids. Each output video can be positioned into any of
the custom size window as long as there is no overlap.
The video window label is also customizable. Users can select to display the service name
decoded from the TS SDT tables, or the program title decoded from XDS data, or a custom
name as the label of a video window. The Motion Imagery (MI) data can also be shown on
sceen and is settable via the KLV tab. Custom name and service name can be enabled and
displayed at the same time (separated by a dash). Different label colors can be selected for
different input sources.
Custom layout can be designed using the New Custom Layout tool inside the Program
Manager tab. See Program Manager Tab on page 46 for more information.
Video Display Aspect Ratio and Alignment
MSA automatically adjusts the video display aspect ratio according to the pixel aspect ratio
of the video stream and the video display window size. Users can also select to align the
video to the left side of a video window, or center it.
There is an option under Controls tab to ignore display aspect ratio, and always fill the
whole video window.
Analog and Digital Clocks
MSA supports both analog and digital on screen clocks. These clocks are fully resizable
according to the window size they reside in, and they can be enabled or disabled separately.
Each MSA unit should be synchronized to a NTP server for better time accuracy.
On Screen Error Display
MSA displays the following critical errors over the video window when they are detected:

No license

Disabled (Low CPU)1

No signal (displayed when signal is lost after being acquired)
MSA-100-MI-VM
Installation and Operation Manual

Acquiring signal (displayed when signal has never been acquired)

Scrambled

Black video

Frozen video

Silent audio

Clipping audio

No KLV data
Dual Monitor Support
MSA supports using two monitors to improve productivity. There are two modes: Stretch
mode and Clone mode.
Stretch mode

In stretch mode, the video window can be displayed over the primary monitor and the
control interface can be displayed over the secondary monitor.
Clone mode

In clone mode, both monitors display the same content; the control interface can be
hidden when it is not in use.
When there is only one monitor, dual-monitor mode becomes full screen mode, and single
monitor mode becomes window mode.
To toggle between dual monitor and single monitor mode (or full screen and window
mode), right click on the video window, check/uncheck Dual Monitor mode on the popup
menu. Function key F12 can also be used to toggle dual-monitor mode (full screen mode).
Virtual Screen
MSA comes with up to 12 virtual screens. Each virtual screen can be configured to display
up to 12 HD, 24 SD programs or 48 3Gb programs. You can configure the system to flip
through the virtual screens either manually or automatically.
SAP (Session Announcement Protocol) Support
MSA supports detecting multicast services announced from SAP servers. Up to 8 SAP
servers can be supported at the same time with high throughput design.
The default SAP group address is 224.2.127.254 at port 9875. SAP messages formatted
according to RFC-2974 is supported.
1 The
unit is enabled for a certain amount of testing capacity. If the system is over 90% of CPU used
despite not using all available testing capacity, the system will decline to add more PIPs.
9
10
Chapter 1
Introduction
Applicable Standards
Table 1-2 MSA-100-MI-VM Applicable Standards and Descriptions
Standard
Description
ATSC A/52B
ATSC A/52B: Digital Audio Compression (AC-3, E-AC-3),
Revision B, 2005.
ATSC A/53E
ATSC A/53E: ATSC Digital Television Standard, Revision E
with Amendment No. 1, 2005.
ATSC A/65B
Program and System Information Protocol for Terrestrial
Broadcast and Cable (Revision B).
EIA/CEA 608-C
EIA/CEA-608-C: Line 21 Data Services, 2005.
EIA/CEA 708-C
EIA/CEA-708-C: Digital Television (DTV) Closed Captioning,
2006.
ETSI EN 300 472
Specification for conveying ITU-R System B Teletext in DVB
bitstreams.
ETSI EN 301 775
Specification for the carriage of Vertical Blanking
Information (VBI) data in DVB bitstreams.
GB/T 20090.2
GB/T 20090.2: Information technology - Advanced coding
of audio and video - Part 2: Video.
ISO/IEC 11172-1
ISO/IEC 11172-1:1998 (E), International Standard,
Information Technology - Coding of Moving Pictures and
Associated Audio for Digital Storage Media at up to about
1.5 Mbits/s - Part 1: Systems.
ISO/IEC 11172-2
ISO/IEC 11172-2:1998 (E), International Standard,
Information Technology - Coding of Moving Pictures and
Associated Audio for Digital Storage Media at up to about
1.5 Mbits/s - Part 2: Video.
ISO/IEC 11172-3
ISO/IEC 11172-3:1998 (E), International Standard,
Information Technology - Coding of Moving Pictures and
Associated Audio for Digital Storage Media at up to about
1.5 Mbits/s - Part 3: Audio.
ISO/IEC 13818-1
ISO/IEC 13818-1:2000 (E), International Standard,
Information Technology - Generic Coding of Moving
Pictures and Associated Audio Information: Systems.
ISO/IEC 13818-2
ISO/IEC 13818-2:2000 (E), International Standard,
Information Technology - Generic Coding of Moving
Pictures and Associated Audio Information: Video.
ISO/IEC 13818-3
ISO/IEC 13818-3:1998 (E), International Standard,
Information Technology - Generic Coding of Moving
Pictures and Associated Audio Information: Audio.
ISO/IEC 13818-4
ISO/IEC 13818-4:1998/Cor-2:1998, International Standard,
Information Technology - Generic Coding of Moving
Pictures and Associated Audio Information: Conformance
Testing, Technical Corrigendum 2.
ISO/IEC 13818-7
ISO/IEC 13818-7:2003 (E), International Standard,
Information Technology - Generic Coding of Moving
Pictures and Associated Audio Information: Part 7:
Advanced Audio Coding (AAC).
MSA-100-MI-VM
Installation and Operation Manual
Table 1-2 MSA-100-MI-VM Applicable Standards and Descriptions (Continued)
Standard
Description
ISO/IEC 14496-1
ISO/IEC 14496-1:2001 (E), International Standard,
Information Technology - Coding of Audio-Visual Objects Part 1: Systems.
ISO/IEC 14496-2
ISO/IEC 14496-2:2001 (E), International Standard,
Information Technology - Coding of Audio-Visual Objects Part 2: Visual.
ISO/IEC 14496-3
ISO/IEC 14496-3:2001 (E), International Standard,
Information Technology - Coding of Audio-Visual Objects Part 3: Audio.
ISO/IEC 14496-3
ISO/IEC 14496-3:2001/Amd1:2003 (E), International
Standard, Information Technology - Coding of Audio-Visual
Objects - Part 3: Audio. Amendment 1: Bandwidth
Extension.
ISO/IEC 61672-1
IEC 61672-1 Electro Acoustics - Sound level meters - Part 1:
Specifications.
ISO 639-2
ISO 639-2: 1998, Codes for the Representation of Names of
Languages- Part 2: Alpha-3 Code.
ITU-U H.263
ITU-T H.263:2005 (E), Series H. Audiovisual and Multimedia
Systems, Infrastructure of Audiovisual Services - Coding of
Moving Video, Video Coding for Low Bit Rate
Communication.
ITU-U H.264
ITU-T H.264:2005 (E), Series H. Audiovisual and Multimedia
Systems, Infrastructure of Audiovisual Services - Coding of
Moving Video, Advanced Video Coding for Generic
Audiovisual Services.
SCTE 20
ANSI/SCTE 20: Methods for Carriage of Closed Captions
and Non-Real Time Sampled Video, 2004.
SCTE 27
ANSI/SCTE 27: (Formerly DVS 026), Subtitling Methods for
Broadcast Cable, 2003.
SCTE 43
ANSI/SCTE 43: Digital Video Systems Characteristics
Standard for Cable Television, 2005.
SCTE 35
ANSI/SCTE 35: Digital Program Insertion Cueing Message
for Cable, 2004.
SMPTE 421M
SMPTE 421M:2005 (E), Proposed SMPTE Standard for
Television: VC-1 Compressed Video Bitstream Format and
Decoding Process.
SMPTE 302M
SMPTE 302M:2002 (E), Proposed SMPTE Standard for
Television: Mapping of AES3 Data into an MPEG-2
Transport Stream.
RFC 2974
Session Announcement Protocol (SAP).
RFC4566
Session Description Protocol (SDP).
RFC 2326
Real Time Streaming Protocol (RTSP).
RFC 3550 and 
RFC 3551
Real Time Protocol (RTP) A Transport Protocol for Real-Time
Applications.
11
12
Chapter 1
Introduction
Table 1-2 MSA-100-MI-VM Applicable Standards and Descriptions (Continued)
Standard
Description
RFC 3016
RTP Payload Format for MPEG-4 Audio/Visual Streams.
RFC 3984
RTP Payload Format for H.264 Video.
RFC3640
RTP Payload Format for Transport of MPEG-4 Elementary.
Key Terms and Product Concepts
Table 3-1 on page 41 provides key terms and product concepts specific to the
MSA-100-MI-VM. These terms and concepts appear throughout the manual to help the
understanding of how the MSA operates. If you are not familiar with these concepts, please
review them.
Safety
See the Directives and Compliances on page 3 for a list of important safety instructions.
Carefully observe all safety alert symbols for dangers, warnings, and cautions. They alert
installers and operators of possible dangers or important information contained in this
manual.
Keep in mind, though, that warnings alone do not eliminate hazards, nor are they a
substitute for safe operating techniques and proper accident prevention measures.
MSA-100-MI-VM Service and Support
Refer to Product Servicing on page 3 for support information.

Obtain a Return Authorization (RA) number from the Imagine Communications
Customer Service Department.

Attach a tag to the VM media (typically a flash drive) with the following information:

Your company name, address, and telephone number

The name of the contact person at your company

The RA number

An explanation of the problem

To prevent shipping damage, pack the component the same way Imagine
Communications had packed it. If possible, use the original packing materials in the
original shipping container.

Ship the unit to the location provided by the service department representative.
Attn: RA xxxx (where xxxx is the RA number)
Email: [email protected]
13
2
Installation
Installation Procedures
Virtualization Requirements
MSA virtualization requires the following virtualization software:

Virtualization server with the VMWare® ESXi™ (4.1) Hypervisor installed

vSphere™ Kit or Edition - vSphere kits (Essentials or Essentials Plus) and/or editions
(Standard, Advanced, Enterprise or Enterprise Plus) are typically required to support
virtual machine deployment (e.g., cloning) and reliability (e.g., uptime requirements).
Client requirements determine the appropriate kit or edition for each client site.

vSphere Client - User interface for administering virtual machines, including start up,
shutdown, resource allocation, performance, etc.

vCenter™ Server - The server is utilized for centralized management of the virtual hosts
in the cluster. It provides services for importing, cloning, etc.
MSA virtualization requires the following operating system license:

Microsoft® Windows Server® 2008 R2 Standard Edition licenses for each
Windows-based guest operating system
MSA Installation
The virtual MSA installation consists of two steps: Setup  Clone
IMPORTANT
The MSA VM is shipped with the trial (evaluation) version of Microsoft Windows Server
2008 R2 (Standard Edition). Licensing and activation should occur during the installation
process in compliance with applicable licensing and/or evaluation terms.
If the VM is installed and started without licensing/activation then it will shut down every
hour until this is resolved.
Setup
The Initial Setup step loads the MSA VM into an environment and completes the preliminary
configuration steps.
Copyright © 2012, Harris Corporation
14
Chapter 2
Installation
Import the VM
IMPORT BASED ON VCENTER
The import steps below are based on vCenter capabilities. If vCenter is not being utilized
then the steps are similar (i.e., no clustering options).
Complete the following steps to import the VM.
1
Connect the thumb/external drive that contains the MSA virtual machine file (i.e., *.ova) to
a computer running the VMWare vSphere™ Client.
2
Launch the vSphere Client.
3
Click File Deploy OVF Template.
A wizard appears.
Figure 2-1 First Page of the Wizard
4
Use the Browse option to navigate to the drive, select the VM and import it, and then click
Next.
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
5
Enter a name for the VM, and then click Next.
You can give it any name, but for ease of use, give it the name of the VM, excluding the
.ova extension.
Figure 2-2 Entering a Name
6
Select the host or cluster on which you want to deploy the OVF template, and then click
Next.
Figure 2-3 Selecting a Host or Cluster
Copyright © 2012, Harris Corporation
15
16
Chapter 2
Installation
7
Select the Specific Host, and then click Next.
Figure 2-4 Selecting the Specific Host
8
Select a datastore, and then click Next.
Figure 2-5 Selecting a Datastore
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
9
Select Thin Provisioned Format, and then click Next.
Figure 2-6 Selecting Thin Provisioned Format
10
Review the import options, and then click Finish.
Figure 2-7 Reviewing the Improt Options
Copyright © 2012, Harris Corporation
17
18
Chapter 2
Installation
Import status will be displayed during the import process.
Figure 2-8 Progress bar for the Import Process
11
Close the dialog window when the import is complete.
Updating VM Settings
Complete the following step to update the VM settings:
1
Right-click on the VM and rename it using the appropriate display name.
Note: the name is changed for readability.
The cloning process creates one or more MSA servers/instances based on the number of
licenses purchased.
Clone
IMPORTANT
Keep the following points in mind regarding VM cloning and testing:

The cloning feature that is utilized is included in VMWare's vCenter Server (v4.1). This
option is not available in the freeware version of ESXi (v4.1). If vCenter Server is not an
option then contact BCD support.

The Windows Server 2008 license should be entered during the cloning step. If the OS
is not licensed then the VM will shut down every hour until a license is provided (interim
approaches are discussed in the Appendix).

VM startup may take 10-15 minutes and typically includes reboots.
Cloning the VM
VALUES MUST BE UNIQUE
The VM name, NETBIOS name and IP address must be unique.
Complete the following steps to clone the VM:
1
Right-click on the VM and select Clone.
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
2
Enter a Name for the VM, such as "msa01", and then click Next.
Note: This name should be the same as the target hostname for clarity and consistency. The
VM name can be renamed to a 'friendly' name after the cloning is complete.
Figure 2-9 Renaming the VM
3
Select the desired host in the cluster, and then click Next.
Figure 2-10 Selecting a Host in the Cluster
Copyright © 2012, Harris Corporation
19
20
Chapter 2
Installation
4
Select the desired datastore, and then click Next.
Figure 2-11 Selecting a Datastore
5
Select Thin provisioned format, and then click Next.
Figure 2-12 Selecting Thin Provisioned Format
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
6
Select Customize using the Customization Wizard, and then click Next.
Figure 2-13 Selecting the Customize Option
7
Enter the Name and Organization, and then click Next.
Figure 2-14 Entering a Name and Organization
Copyright © 2012, Harris Corporation
21
22
Chapter 2
Installation
8
Enter the NETBIOS Name (i.e., hostname), and then click Next.
Figure 2-15 Entering a NETBIOS Name
9
Enter the Product Key (if known) or leave blank and uncheck Include Server License
Information, and then click Next.
Figure 2-16 Entering a Product Key
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
10
Enter the Password (provided by Imagine Communications) for the Administrator account
and check Automatically log on as the Administrator (1 time), and then click Next.
Figure 2-17 Entering a Password
11
Enter the Time Zone (select GMT that has London in the list), and then click Next twice (
no Run Once options are required).
Figure 2-18 Entering the Time Zone
Copyright © 2012, Harris Corporation
23
24
Chapter 2
Installation
12
Select Custom settings, and then click Next.
Figure 2-19 Selecting Custom Settings
13
Click on ellipsis to open the Network Properties window.
Click
here
Figure 2-20 Clicking on the Ellipsis
14
Enter staging values for the IP Address, Subnet Mask and DNS Server.
The IP Address must be in the target IP range for the domain so that this VM can be
configured for staging purposes.
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
Figure 2-21 Entering Staging Values
15
Click OK to close the Network Properties window.
16
Record the IP address information inFigure 2-21 in the table provided on page 33.
17
Verify the network configuration and click Next.
18
Verify network configuration, and then click Next.
19
Enter the Windows Server Domain (if applicable).
20
Enter user credentials, and then click Next.
Figure 2-22 Determining How this Machine Will Participate in a Network
Copyright © 2012, Harris Corporation
25
26
Chapter 2
Installation
21
Leave Generate New Security ID (SID) checked (this is critical), and then click Next.
Figure 2-23 Leave Generate New Security ID Checked
22
If this VM configuration will be used to create other VMs (with modifications) or future
VMs, check Save this customization specification and enter a Name, and then click
Next.
Figure 2-24 Entering a Name and Saving this Customization
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
23
Verify VM customization options, and then click Finish.
Figure 2-25 Verifying the Customization Options
24
Verify VM settings, and then click Finish again.
Figure 2-26 Verifying the VM Settings
Note: The VM should not be started at this time.
Creating Additional MSA Instances
Repeat the steps in the section Cloning the VM on page 18 to create additional MSA
instances. The saved template can be utilized to simplify the process:
Copyright © 2012, Harris Corporation
27
28
Chapter 2
Installation

Select Customize using an existing customization specification.

Select the saved customization template, and make sure to check Use the
Customization Wizard to temporarily adjust the specification before deployment.

Make necessary changes to loaded values (e.g., hostname, IP address).
Configuring Cloned VM(s)
IMPORTANT - CLONED VM WILL START SLOWLY
A cloned VM will start slowly; taking approximately 15 minutes and typically including one
or more automatic reboots. It is imperative that no logins are attempted during this process
or the VM will not function properly. When the system configuration is complete the system
will automatically log in using the local administrator account.
Complete the following sections in the specified sequence to configure the cloned VM.
Verify VM
Settings
Complete the following steps to confirm that each VM is configured properly.
1
Right-click on each VM and choose Edit Settings.
Figure 2-27
2
Use the information in the table below to verify/update the VM's settings.
note: the display name will vary by VM..
Table 2-1 VM Settings
VM Display
Name
Virtual
Processors
Memory
Size (GB)
Hard Disk
(GB)
msa01
4
4
40
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
3
Verify and update the Memory Size, and then click OK.
Figure 2-28 Verifying the Memory Size
4
Verify/Update the Number of virtual processors, and then click OK.
Figure 2-29 Verifying the Number of Virtual Processors
Copyright © 2012, Harris Corporation
29
30
Chapter 2
Installation
5
Verify the Video Card Auto-detect Video settings radio button is selected, and then click
OK.
Figure 2-30 Verifying the Video Card Auto-Detect is Selected
6
Verify/Update the Hard Disk.
The hard disk on the Windows-based VMs may have been reduced for distribution
purposes. The hard disk must be resized during the deployment process. Update the
Provisioned Size if the value is different from the table above:
Figure 2-31 Verifying the Hard Disk
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
7
Verify the correct port group (usually dvPortGroup [dvSwitch]) is selected for the Network
label on the Network adapter, and then click OK.
Figure 2-32 Verifying the Correct Port Group is Selected
Updating the Operating System Configuration
Complete the following steps:
1
Log on as local administrator.
2
(Optional) Update the computer name and/or description.
3
Review the IP address and DNS information that was entered during the cloning step.

Correct the information if it is not valid.

Confirm that IPv6 is not selected.
4
Turn on Network Discovery (if it is off).
5
If a product license was not entered during the cloning step, then re-arm the server as an
interim solution.
See Extending the Windows Server 2008 Grace Period on page 32.
6
7
Update available disk space (if applicable):
a
Open Server Manager.
b
Select Storage.
c
Select Disk Management.
d
If unallocated storage exists, then right-click on the C:\ drive and choose Extend,
adding the new storage to the C:\ drive.
Update the timezone to (UTC) Coordinated Universal Time and update the NTP source.
For best results, the group policy on the domain controller should be updated to enable
time synchronization.
8
Take a Snapshot.
Copyright © 2012, Harris Corporation
31
32
Chapter 2
Installation
License the VM
The MSA VM must be licensed in order to function properly.
Install License (HW Dongle)
Install USB HASP (i.e., dongle) that is provided in an available USB port on the hardware
platform.
Update the VM settings so that the VM can access the USB dongle:
1
Power down the VM.
2
Edit the VM settings, add a USB controller, and save the settings.
3
Edit the VM settings, add the USB device (Aladdin Knowledge HASP HL 3.25), and save the
settings.
4
Power up the VM.
Note: if you have multiple VM's on the same ESXi server that use hardware dongles, install
the physical USB devices one at a time to ensure that the correct USB device is assigned to
the correct VM.
Extending the Windows Server 2008 Grace Period
The Windows Server 2008 R2 evaluation copy needs to be activated within ten days of
cloning. Failing to activate the evaluation will cause the licensing service to shut the
machine down every hour.
The ten day activation period can be reset five times (four times for a cloned VM) by using
the "rearm" command - For additional information refer to:
http://www.microsoft.com/downloads/en/
details.aspx?FamilyID=ba571339-5436-4cf5-9c37-6ed7dab6f781&displaylang=en
Hardware Setup
The MSA (VM) does not include hardware such as a virtualization server. Hardware is
typically provided by the client and the MSA (VM) is imported into this server.
On/Off Procedures
Start the MSA Server
1
Open the vSphere Client.
2
Choose the MSA Server.
3
Choose Start.
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
4
Logon to the MSA Server once the boot process completes.
Stop the MSA Server
1
Open the vSphere Client.
2
Choose the MSA Server.
3
Choose the Console Window to access the VM.
4
Logon to the Server.
5
Use Start  Shutdown to stop the server
The Console window will be black when the shutdown is complete.
Ethernet Addresses
Record the address for MSA-100-MI-VM:
MSA interface static IP address (NIC #1)
MSA interface subnet mask (NIC #1)
Gateway IP address (NIC #1)
Installing the Remote Client
The remote client uses a Windows installer. The remote client will use the IP address set in
the previous section.
To install the remote client:
1
Find the program on the MSA main unit, and then copy it to a portable storage device (such
as a USB device) to transfer to the PC where the client will be installed. The file can be
found at C:\\programsfiles(x86)/Imagine/MSA/MSA Client_#.#.#.#.
2
Copy the files to a location on your PC.
3
Open the location where you stored the files, and then double click on the file:
MSAClient_#.#.#.#.exe. (the # represents the number of the current program.)
There is one item to make sure is turned off in this installation (Launch Pad). See
.Figure 2-36.
Following is the sequence of windows that will open during the installation process. Follow
the guide and installer for a proper installation of the remote client.
Copyright © 2012, Harris Corporation
33
34
Chapter 2
Installation
Figure 2-33 MSA Client Dialog Box
4
Click Next.
5
The MSA Client Setup License Agreement dialog box opens.
Figure 2-34 MSA Client Setup License Agreement Dialog Box
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
6
Click I Agree.
The MSA Client Setup Choose Components dialog box opens.
Figure 2-35 MSA Client Setup Choose Components Dialog Box
7
Deselect the Launch Pad check box, and then click Next.
If the Launch Pad section is checked during installation, when the application is closed by
using the X on the program it will automatically reopen. By selecting Launch Pad you must
close the Launch Pad application before closing the program.
The MSA Client Setup Choose Installation Location dialog box opens.
Figure 2-36 MSA Client Setup Choose Installation Location Dialog Box
8
The default location for installing the MSA client is the Imagine folder. Make one of the
following selections:
Copyright © 2012, Harris Corporation
35
36
Chapter 2
Installation
9

If this is the correct location, click Install.

If you want to select a different location, click Browse…, navigate to the desired
location, and then select Install.
When the installation is complete, the following dialog box opens.
Figure 2-37 MSA Client Setup Installation Complete Dialog Box
10
Click Next.
The MSA Client Successful Installation dialog box opens.
Figure 2-38 MSA Client Successful Installation Dialog Box
11
Click Close.
The installation is complete.
12
The default location for installing the MSA client is Imagine/MSA/Client. Run the program
by clicking on Start  All Programs  Imagine  MSA  MSA Client.
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
Updating Licenses
Periodically you may need to update a license.
To update a license
1
On the MSA, launch the License Update program from the Microsoft® Windows® Start
menuAll ProgramsImagineMSA.
Figure 2-39 Start Menu Selections
2
Select License Update.
The HASP HL RUS window opens.
Copyright © 2012, Harris Corporation
37
38
Chapter 2
Installation
Figure 2-40 HASP HL RUS Window
3
Press the Collect Information button.
An information file is created.
Figure 2-41 HASP HL RUS Window
4
5
Save the file; make sure to use a .v2c extension.
Email that file to [email protected] and request a new license file.
You will get a return email containing a file with a .v2c extension.
6
Select the Apply License Update tab from the License Update dialog box, and then click
on the … button.
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
Figure 2-42 Apply License Update Tab
7
Direct the program to the location where the .v2c, returned from
[email protected], file is stored, and then click the Apply Update
button.
The new license is available for use.
Copyright © 2012, Harris Corporation
39
40
Chapter 2
Installation
Copyright © 2012, Harris Corporation
41
3
Operation
The MSA-100-MI-VM is designed for automatic monitoring and testing once it is setup
properly. Upon power up, MSA is launched in full screen mode automatically and the
default input Source list is loaded (See Default Source List on page 104 for details). To
manage the input Sources manually, use Program Manager Tab on page 46 to add and
delete input Sources.
If MSA is terminated, it will be launched again in 8 seconds.
The MSA application is partitioned into two main components, MsaServer.exe and
MsaClient.exe, along with ImagineWatchDogService.exe instances which are run as a
“Windows™ Services.” To shut down the MsaServer.exe or the MsaClient.exe see
page 105.
Key Terms and Product Concepts
Table 3-1 provides several key terms and product concepts specific to the MSA-100-MI-VM.
These terms and concepts appear throughout the manual to help the understanding of
how the MSA operates.
Table 3-1 MSA Key Terms and Product Concepts
Term
Definition
Source
A Source is any input that can be acquired over a physical
channel. An example is a unique network stream from a
subnet.
Program
A Program nominally has a video essence and one or more
audio essences synchronized with the video with dedicated
clocking. A program may also have associated data,
synchronized or unsynchronized with the audio and video.
(Other products may substitute the word “Flow” instead of
Program.)
PIP
A PIP is a scaled view of the full motion video and audio level
meters for a given Program. The scaled view is usually
arranged in a mosaic so that multiple Programs can be viewed
at once. The option exists to view PIP full screen on command
to avoid any scaling and minimize or eliminate format
conversion.
42
Chapter 3
Operation
Table 3-1 MSA Key Terms and Product Concepts (Continued)
Term
Definition
3G
The term 3G is a designation for picture sizes 352×288(CIF) or
lower resolution as it pertains the Source video being
decoded, analyzed and possibly rendered on screen. Two 3G
PIPs are equivalent to a single SD PIP and two SD PIPs are
equivalent to a single HD PIP for pricing and testing capacity.
RADIO
A Radio is a Source that is only tested for audio and ancillary
data, not for video essence. If shown in the foreground layout
of PIPs a small place in the layout is reserved for displaying
audio bars and other pertinent data.
SHDW
In SDHW the Program(s) under analysis and monitoring but
not shown as PIPs are in the background with no rendering of
the decoded video essence and no display of audio level
meters. These background Programs are said to be Shadow
Tested to a deep conformance level. The abbreviation used
for ordering this type of testing includes SHDW in the part
number.
SHDWA
In SHDWA the Program(s) under analysis and monitoring are
background tested only to packet and system levels. No
decoding of essence is done. Quality of Service is assessed via
packet and / or system metrics. The abbreviation used for
ordering this type of testing includes SHDWA in the part
number.
Virtual Screen
A Virtual Screen is a container for PIPs and SHDW Programs.
Up to 12 of these can be defined and swapped between. The
Virtual Screen in the foreground shows the PIPs, while up to
11 other Virtual Screens in the background manage groups of
SHDW or SHDWA Programs.
Shuffle
A Shuffle is a swap between one of the potential 12 Virtual
Screens that can be defined to contain a group of Program(s)
under test. The Virtual Screen that shuffles to the foreground,
either manually or based on a timer, becomes the PIP mosaic.
The Virtual Screen(s) that switch the background each contain
groups of SHDW or SHDWA Program(s).
Headless Operation
Headless Operation means that the MSA-100-MI-VM device
does not require local keyboard, monitor and mouse to
operate. All operation can be managed from remote locations
via the MsaClient.exe.
UDP
UDP stands for User Datagram Protocol, a best-effort delivery
of discrete “datagrams” that does not rely on a client-server
connection.
SMTP
SMTP stands for Simple Mail Transfer Program, a generic
method of e-mailing alerts to one or more e-mail accounts
located on known mail servers.
Multicast
Multicast is a means of targeting content to those devices
that know to join the group described by an Class D IP
Address and Port combination.
MSA-100-MI-VM
Installation and Operation Manual
Table 3-1 MSA Key Terms and Product Concepts (Continued)
Term
Definition
RTP
RTP stands for Real-time Transport Protocol, a lightweight
means of streaming a Program over a network over top of
UDP protocol.
RTMP
RTMP stands for Real Time Messaging Protocol, an Adobe
proprietary protocol for stream audio, video and data over the
internet.
RTSP
RTSP stands for Real Time Streaming Protocol, a network
control protocol to control streaming media servers.
HLS
HLS stands for HTTP Live Streaming, a proposed standard by
Apple for internet streaming to iPhone, iPad and similar
devices.
Control Panel GUI
Figure 3-1 Control Panel GUI
The control panel GUI is shown in two panels. Each side (right and left) can be controlled
independent of the other. Some information screens may be dependent on the selections of
other screens. The following section separates each tab for ease of understanding and
explanation.
43
44
Chapter 3
Operation
Virtual Screen Tab
Figure 3-2 Virtual Screen Tab
At the Virtual Screen tab, you can add up to 12 virtual screens. Each screen can be
configured independently using the Program Manager. See Edit Layout on page 52.
The Edit Screen button simply changes the Virtual Screen Name used. Customizing the
screen look or layout is done via the Edit Layout Control found in the Program Manager tab.
See Edit Layout on page 52.
The Del Screen button is used to eliminate the entire Virtual Screen container, including the
setup of all Programs currently being managed within that screen. Be careful when using
the Del Screen button.
The Delete All button is used to clear all Virtual Screen Containers and thus all Programs
from various Sources. Be very careful when using the Delete All button.
The Virtual Screen dialog in the main GUI frame shows the screen’s name, how many
Sources are being analyzed, and how many Programs from all Sources. After all screens are
configured, a screen list can be saved so that the same setting can be loaded when
necessary.
The Load Screen List button is used to load a .srcl file that was previously stored using Save
Screen List. The .scrl is a text-based configuration file that lists one or more Virtual Screens
and the specifics of the Sources and Programs contained within each Virtual Screen.
On the Display Window there are controls for flipping through different virtual screens.
Users can also enable auto shuffling by selecting from some preset shuffling intervals. The
PageUp, PageDown, Up arrow, and Down arrow keys can also be used when focus is on
this window in the Main GUI to navigate through Virtual Screens.
MSA-100-MI-VM
Installation and Operation Manual
Figure 3-3 Display Window
The Display Window contains the current Virtual Screen layout including logo, clock,
highlight window and PIPs. The Display Window also contains the controls shown in the top
bar, plus a side “Alarm Bar” (not shown).
On a Virtual Screen the PIP with the red highlighting is the selected PIP. Audio is monitored
on the selected PIP. The audio service monitored when a PIP is selected depends on a setting
in the Program Manager tab. The aspect ratio of the PIPs can be varied via a pull-down
menu item in the upper left of the Display Window.
45
46
Chapter 3
Operation
Program Manager Tab
Figure 3-4 Program Manager Tab
The Program Manager tab provides Source and Program management functions and
information. Each Source is identified with a Source ID. It can help to identify the Source
when a conformance error is reported. For temporary monitoring session, the Source ID is
monotonically increased after MSA is started. For persistent monitoring session, the Source
ID is assigned by the user within the range of 1000 to 9999. Each Program is identified with
the Program number from a transport stream. There can be multiple Programs in one
Source. The Source ID and the Program number together uniquely identify a specific audio/
video Program.
When a persistent Source ID is used (1000-9999), Program test histories, settings and
reports of the Source are saved in the persistent data folder, and will be restored
automatically when the Source is loaded again.
Besides Source ID, the Program Manager also displays the Source description, service name
and provider name. For DVB stream, the service and provider names are only available when
SDT tables are carried in the Source. For ATSC stream, the service name is available when
VCT tables are carried in the Source.
Inside Program Manager, you can toggle between full window (single PIP shown in full
resolution) and mosaic modes using one of the following methods:

Double click the currently selected Program from the Source list.

Double click the Video window.
Adding Sources
Use the Add Source button to add a Source for monitoring and
verification.
For information about adding Sources from the SAP server, see page 81.
To add a Source
1
Select one of the tabs based on the desired input type (see Table 3-2 for examples).
MSA-100-MI-VM
Installation and Operation Manual
2
Enter corresponding parameters, and then click Add Source.
After a Source is added, there is a delay before the Programs are acquired. For real-time
input such as ASI and multicast, this delay is determined by the PSI table frequency.
Table 3-2 Add Source Input Type Tabs
ASI Source Type Tab (see page 48)
RF Type Tab (see page 48)
Multicast Type Tab (see page 48)
Unicast Type Tab (see page 48)
RTSP Type Tab (see page 49)
Namepipe Type Tab (see page 49)
47
48
Chapter 3
Operation
Table 3-2 Add Source Input Type Tabs (Continued)
SDP Type Tab
Apple HTTP Type Tab
RTMP Type Tab
File Tab

ASI: Once an ASI input port on an MSA-OPT-DVB-ASI is selected, that Source is strictly
committed to the Virtual Screen that contains that Source until the Source is 'Deleted'.
This means there is no sharing of Programs on a given ASI Input port between two
different Virtual Screens. Port 1 of a given MSA-OPT-DVB-ASI is closest to the edge of
the unit. Port 4 closest to the center of the unit.

RF: Select the RF source with the drop down. There is no sharing of a given RF Input
port between Virtual Screens. Port 0 is the 'F' connector closest to the edge of the unit.
Select the modulation type supported by the RF input module. Modulation type and
Frequency controls must be set properly to allow RF reception

Multicast: Network interfaces can be shared across multiple Virtual Screens. Only the
specific IP Address and Port combination uniquely define a network source.
It is crucial with the MSA for users to identify the specific network interface from the
drop down control to allow for successful join to a given 'Multicast Group'. Refined
filtering can be done for fast acquisition of a Multicast Source by listing the “Source IP”
address(es) for IGMPv3 sources.

Unicast: Use the specific network interface from the drop down control to allow for
successful join of a Unicast source. The unique interface and port together identify a
given Source. A single network interface can be used on multiple Virtual screens or
within the same Virtual Screen.
MSA-100-MI-VM
Installation and Operation Manual

RTSP: It is crucial with the MSA for users to identify the specific network interface from
the drop down control to allow for successful Real Time Streaming Protocol connection.

Namepipe: Type the server and pipe name into the selected boxes.

SDP: It is crucial with the MSA for users to identify the specific network interface from
the drop down control if using Hyper Text Transport Protocol (HTTP) for download of
the Session Description Protocol (SDP) file. If using a discrete SDP file to identify a
Source, the file must be on the 'D partition' of the MSA. For analyzing a single
previously recorded clip, the Prog Mgr tab provides a source option for File Source. Clips
can only be stored or retrieved from the root (“/”) of the D partition or below

Apple http: Type the http address in the box provided.

RTMP: It is crucial with the MSA for users to identify the specific network interface
from the drop down control where the URL can be found. The LIVE or VOD radio
buttons are used for selecting this function.

File: Select the browse button to look for the stored file location. For analyzing a single
previously recorded clip, the Prog Mgr tab provides a source option for File Source. Clips
can only be stored or retrieved from the root (“/”) of the D partition or below.
MSA-100-MI-VM differentiates between temporary and persistent monitoring sessions by
using different Source ID ranges. ID ranges 0-999 are used by the system to perform
temporary monitoring or debugging. ID ranges 1000-9999 are used by customers for
persistent long term monitoring. History, conformance message logs, and test settings are
retained for persistent monitoring. After a persistent Source ID has been used, it cannot be
reused for other Sources with different parameters. This is designed to maintain the
integrity of test and history logs. To reallocate a persistent Source ID, all history, test logs,
and test settings must be removed. To help manage the persistent Source list, use the
Persistent button described on page 51.
For analyzing a single previously recorded clip, the Prog Mgr tab provides a Source option
for File Source. Clips can only be stored or retrieved from the root (“/”) of the D partition or
below.
Tip:
Only a single FILE Source can be analyzed at once, along with streaming Sources. Disk
bandwidth is needed for manual or automatic captures of incoming content.
Enter corresponding parameters, and then click Add.
After a Source is added, there will be a delay before the Programs are acquired. For
real-time input such as ASI and multicast, this delay is determined by the PSI table
frequency.
49
50
Chapter 3
Operation
Batch Add
For Multicast and RTSP inputs, there is a batch add mode on the selected ADD SOURCE
tabs. Type in the selected SrcID (source ID), multicast group, and port number or RTSP URL
for the selected video feed.
Figure 3-5 Batch Add Mode for Multicast Sources
Figure 3-6 Batch Add Mode for RTSP Sources
MSA-100-MI-VM differentiates between temporary and persistent monitoring sessions by
using different Source ID ranges. ID ranges 0-999 are used by the system to perform
temporary monitoring or debugging. ID ranges 1000-9999 are used by customers for
persistent long term monitoring. History, conformance message logs, and test settings are
retained for persistent monitoring. After a persistent Source ID has been used, it cannot be
reused for other Sources with different parameters. This is designed to maintain the
integrity of test and history logs. To reallocate a persistent Source ID, all history, test logs,
and test settings must be removed. To help manage the persistent Source list use the
Persistent button described on page 51.
Users can use Source ID -1 to let MSA select the next available temporary ID.
If there are multiple Programs in the input stream, a dialog is displayed that allows the user
to select which Programs to add.
Figure 3-7 Multiple Programs Selection Screen
Deleting Sources
Use the Del Source and Delete All buttons to delete existing Sources
and layouts.
MSA-100-MI-VM
Installation and Operation Manual
To delete a Source
1
Select a Program from the Program list.
2
Press the Del Source button to remove the Source.
The software shows the Source ID of the selected Program and asks for confirmation of the
deletion.
3
Press OK to confirm the deletion.
If multiple Programs from the same Source are being monitored then all those Programs will
be removed as well.
To delete all Sources
1
Press the Delete All button to delete all Sources on the given Virtual Screen and layouts.
The software asks for confirmation of the deletion.
2
Press OK to confirm the deletion.
Managing Persistent Sources
Use the Persistent button to launch the Persistent Source List dialog (see
Figure 3-8). Use this dialog to manage persistent IDs.
To access the Persistent Source dialog
1
At the Program Manager tab, click Persistent.
The Persistent Source List dialog box opens.
Figure 3-8 Persistent Source List Dialog Box
To delete a persistent Source
1
Select a Program from the Program list.
2
Press the Delete From Persistent List button.
51
52
Chapter 3
Operation
The software shows the Source ID of the selected Program and ask for confirmation of the
deletion.
3
Press OK to confirm the deletion.
Deleting a persistent ID from the list will destroy all persistent data relating to that Source
including history, conformance message logs, and test settings. After an ID has been
deleted, it can be reallocated for a new Source. Users can also load and unload persistent
Sources from the list to build a custom Source list.
Loading a Source List
To load a Source list that has been saved to your hard drive
1
At the Program Manager tab, click Load List.
2
Select the .srcl file to be loaded.
3
Click Open.
All current Sources are removed and Sources from the list are loaded.
Saving a Source List
To save a Source list
1
At the Program Manager tab, click Save List.
2
Type in the file name of the Source list.
3
Click Save.
Sources are saved into the Source list.
A Source list can be customized by adding layout keywords (See Layout Keywords on
page 98 for details).
Edit Layout
The Edit Layout button launches the Edit Layout dialog box. See Editing
Layouts on page 53 for details.
Setting the BISS Description Key
Use the BISS Key button to launch a dialog box (see Figure 3-9) that
allows the user to set a BISS key for decryption of service.
When BISS encryption is detected for a Program, “BISS“ will be indicated over the video as
well as in the Program Manager for that Program.
MSA-100-MI-VM
Installation and Operation Manual
Figure 3-9 BISS Key Session Dialog Box
Shuffle Program
The Shuffle Program control is a drop-down list box containing
selections that enable a user to automatically shuffle the active Program
after a delay of 1 to XX seconds in the current virtual screen so that a
user can do a listening test of each Program.
Editing Layouts
The Editing Layout dialog is launched when the Edit Layout button in the Program Manager
tab is pressed, or when a new Source is added to a custom layout. Use this dialog to
configure the mosaic layout.
Figure 3-10 Edit Layouts Dialog Box (Standard Layout Shown)
53
54
Chapter 3
Operation
Grid Layout
The Grid Layout shows the current mosaic configuration. There are three types of grid
layouts: Standard, Custom, and Radio.
Standard Layout (Default)
By default each virtual screen is created with a standard layout which automatically chooses
the most suitable grid resolution and positions the input Sources within the grid. In this
mode, the user can only select which Sources appear in the virtual screen; the system
handles all other settings. Standard layouts are best suited for temporary/dynamic
monitoring where the number of Sources can change and the user does not want to spend
time to create a layout. Standard layouts do not support the clock, highlight, logo, or radio
items.
Figure 3-11 Standard (Default) Layout
Custom Layout
Use a custom layout to customize the appearance of the mosaic. The clock, highlight, logo,
and radio items are only available in this mode. For each Program, the grid location, Source
ID, and Program ID are indicated.
Figure 3-12 Custom Layout
Enter Custom Layout mode by selecting the Custom Layout checkbox below the Layout grid
(see Figure 3-10 on page 53).
MSA-100-MI-VM
Installation and Operation Manual
Tip:
Each item can be resized in the custom layout by dragging the bottom right hand corner of
each item block.
Radio Layout
Use a radio layout to configure the radio item that is created in the custom layout. The radio
layout enables subdividing radio item into a smaller subgrid, which allows for higher density
of radio Programs.
Figure 3-13 Radio Layout
Enter Radio Layout mode by pressing the Edit Grid toggle button next to the radio
checkbox. (see Figure 3-10 on page 53).
Item List
The Item List shows the configurable items in the system. The Item List Filters are used to
help manage the items during configuration.
Figure 3-14 Item List
Tip:
Each row in the Item List can be dragged and dropped onto the Grid Layout for direct
placement on to an available grid slot (only for non-standard layouts).
Item List component descriptions are shown in Table 3-3.
Table 3-3 Item List Component Descriptions
Component
Description
Monitor Item
If checked, indicates that the item is being monitored. Select the
checkbox in the title bar to monitor or clear all Programs.
Virtual Screen
Selects the virtual screen in which the Program will be displayed.
55
56
Chapter 3
Operation
Table 3-3 Item List Component Descriptions (Continued)
Component
Description
Grid Position
Sets the grid position where the Program will be displayed.
Grid Size
Sets the grid block size for the Program
Grid Label
Sets a custom name for the Program. See Program Information
on page 59.
Text Color
Sets the text color for the entire input Source. All Programs from
the same Source will share this color.
Adult Content Block
Sets the adult content block for this Program. See Adult Content
Block on page 94.
Layout Controls
Layout control descriptions are shown in Table 3-4.
Table 3-4 Layout Controls Descriptions
Control
Description
Add Virtual Screen
Click this button to create a new virtual screen.
Select Current Virtual Screen
Use this drop-down list box to select the layout of the virtual
screen to display and modify.
Select All Sources with Video
Click this button select for monitoring all available Sources
with video. (Use this button if you intend to monitor all
Sources that have video.)
Select All Sources with Audio
Click this button select for monitoring all available Sources
with audio. (Use this button if you intend to monitor all
Sources that have audio.)
Enabled Source Indicator
View this information box to determine the number of
standard and high definition licenses currently used by the
system.
Available Source Indicator
View this information box to determine the number of
standard and high definition licenses available for use.
MSA-100-MI-VM
Installation and Operation Manual
Table 3-4 Layout Controls Descriptions (Continued)
Control
Description
Show All Programs
Click this button to alter the filters so that all the Programs
are shown in the Item List.
Source ID Filter
Use this drop down list box to set up a filter based on Source
ID. Use this to inspect all Programs for a specific Source.
Good Position & Size Filter
View this checked information box to determine Programs
that have valid position and size settings.
Bad Position & Size Filter
View this checked information box to determine Programs
that have invalid position and size settings.
Disabled
View this checked information box to determine Programs
that are not being monitored.
Current Screen Only Filter
View this checked information box to determine Programs
shown from the current virtual screen only. This filter should
be used in conjunction with the other filters.
Custom Layout
Select this checkbox to enable a custom layout which will
give the user control over the mosaic.
Grids Per Row
Use this drop down list box to set the number of horizontal
grids. The grids per row can be changed at any time as long
as there is no conflict with existing Programs already placed
on the grid.
Grids Per Column
Use this drop down list box to set the number of vertical
grids. The grids per column can be changed at any time as
long as there is no conflict with existing Programs already
placed on the grid.
On Screen Clock
Use this drop down list box to display and configure an on
screen clock for the layout.
Highlight Window
Select this checkbox to enable a highlight window for
placement in the layout.
Logo
Use this drop down list box to put a logo in the layout to
help identify the Programs on the virtual screen. Press the
Browse button to locate an image to display. Only logos
saved in a BMP file format can be used.
57
58
Chapter 3
Operation
Table 3-4 Layout Controls Descriptions (Continued)
Control
Description
Radio
Select this checkbox to enable radio item. Once enabled, the
size and position of the radio item needs to be set in the
Item List. Press the Edit Grid button to toggle between
custom layout and radio layout modes. In radio layout
mode, users can select the placement for radio Programs.
Radio Grid Resolution
Use these drop down list boxes to set the sub-grid resolution
of the radio item. These controls are only available when in
Radio Layout mode.
Revert Changes
Click this button to restore the layout state to what it was
when the dialog was launched.
Auto Arrange
Click this button to have the system automatically populate
the grid with Programs that have been selected for
monitoring but have not been assigned a grid position.
The system sequentially assigns each Program to the next
available grid position.
OK
Click this button to apply changes.
Cancel
Click this button to discard changes.
Save Template
Click this button to save a custom layout as a template.
Once a custom layout is complete it can be saved as a
template to be reused on other Virtual Screens. The Sources
under test will not travel with the template. Only the grid
positions, highlight, clock, logo and radio options are
remembered in the template.
Load Template
Click this button to apply an existing template.
When ready to apply an already stored template to the
currently selected Virtual Screen, the grid positions,
highlight, clock, logo and radio options if set are
automatically entered.
MSA-100-MI-VM
Installation and Operation Manual
Controls Tab
Figure 3-15 Controls Tab
The Controls tab allows the user to configure the information that is shown for each
Program that is being monitored.
Program Information
Use Show custom name to display the name set by
the configuration script/custom. Custom name can be
displayed with service name at the same time when
both are available, separated by a dash.
For DVB streams, when SDT tables are carried in the
transport stream, check the Show service name
checkbox to display corresponding service names over the video window. For ATSC streams,
if PSIP tables are carried in the transport stream, the service name will be populated by the
decode Short Name from the VCT.
Use Show provider name to display the provider of the service.
Use Show EIT present/following events to show the P/F events on the title area.
Tip:
Service name, provider name and P/F event options are exclusive options. Only one of them
can be selected at one time.
When Show Source description is checked, the Source information will be shown.
If the Show Program Title option is enabled for line 21 data services, and a Program title
exists then it will be displayed instead of the service name or the custom name.
59
60
Chapter 3
Operation
Video
This section shows options for displaying video,
video window alignment and whether to ignore
display aspect ratio. There is an option to start
decoding of H.264 video even when there is no
IDR/RP.
For Radio/Music channels, some of them are
associated with a MPEG video stream that only
encodes a video frame every several seconds;
check the Long video traffic delay (Music
Cover Mode) to avoid resetting the video
window before the next frame comes.
Audio
Selections in this section are used to show or
hide audio bars in the video window and set the
style.
Note that LED style PPM will fall back to solid
style PPM if there is not enough screen space for
discrete LED drawing.
Audio ES order can also be set according to PID value or position in the PMT table.
General Traffic Status
Selections in this section determine what traffic
status is shown in the video display.
If a certain data stream is not signaled to present in the Source, then no traffic status will be
drawn for it even it is enabled. This is to avoid clogging the screen and to highlight those
traffics that are having problems.
Highlight Window
Selections in this section enable the user to configure
overlay data for the highlight window. These settings
override the global traffic settings for the program that
is being displayed in the Highlight Window.
MSA-100-MI-VM
Installation and Operation Manual
VBI Data Overlay
Selections in this section are used to configure
VBI data overlay on the video display.
Errors
Selections in this section are used to load alarms on
the PIPs and/or show Conformance Errors in a bar to
the right of the current PIP view.
Startup Setting
Selections in this section are used to enable loading either
the default Source list or the last used configuration at
startup. Select the Load last configuration at startup
option unless a fixed configuration is always used.
Video Quality Tuneup
The video quality tune up button is used to fine tune
mosaic video quality according to the input video
format (NTSC or PAL/SECAM) and resolution (HD or
SD).
High quality video scaling produces much better
video quality, especially when remote streaming is
used. However this option will use 5-10% more
resources compared to standard video scaling.
Users can find a balance of higher test capacity or
better visual quality here.
61
62
Chapter 3
Operation
PSI/SDP Tab
PSI/SI/PSIP/SDP Table Analysis
Figure 3-16 PSI/SP Tab
The PSI/SDP tab provides detail table syntax element display and hex view. Tables with errors
are highlighted in red color. Whenever new tables arrive, the table tree view is refreshed. To
avoid being interrupted while performing detail inspection, uncheck the refresh control
button R to disable auto refresh.
Bit Rate Tab
Figure 3-17 Bit Rate Tab
The Bit Rate tab provides bit rate statistics at 3 different levels: Source, Program, and PID/
port.
The bit rate can also be shown as a pie chart as shown in Figure 3-18.
MSA-100-MI-VM
Installation and Operation Manual
Figure 3-18 Bit Rate Pie Chart
Video Info Tab
Figure 3-19 Video Info Tab for MPEG-2 Video
63
64
Chapter 3
Operation
Figure 3-20 Video Info Tab for H.264 Video
The Video Info tab displays detailed sequence level video parameter values and descriptions.

For MPEG-2 video, the information includes sequence header, sequence header
extension, and sequence display extension.

For MPEG-4 Part 2 video, this includes visual object sequence, visual object, and video
object layer.

For H.264/AVC video, this includes sequence parameter set, VUI parameters, and
picture parameter set information.

For SMPTE VC-1 video, this includes the sequence header and the entry header.
Video output can be disabled by un-checking the Show Video checkbox.
When both the Show Video and Audio Level (In Audio Info tab) checkboxes are unchecked,
the video window is hidden.
Pic Graph Tab
Figure 3-21 Pic Graph Tab
MSA-100-MI-VM
Installation and Operation Manual
Figure 3-22 Pic Graph Tab
The Pic Graph tab displays the video picture coding types and the bit rate profile. It shows
the long-term bit distribution of a video stream and can be used to determine how well an
encoder is at making picture coding decisions.
Supported picture types for different video formats include

MPEG2: I, P, B, D

MPEG4: I, P, B, S (Sprite)

H.264/AVC: I, P, B, SI, SP
To change the time scale of the Pic Graph, use the slider on the left side of the tab.
65
66
Chapter 3
Operation
Quant Graph Tab
Figure 3-23 Quant Graph Tab
The Quant Graph tab displays the maximum quant scale (or Qp), minimum quant scale, and
average quant scale of a picture inside a video stream. It can be used as a rough indication
of video quality along the time axis.
Quant scale range for different video formats include

MPEG-2: [2, 62] for linear quant, [1, 112] for non-linear quant

MPEG-4: [1, 31]

H.264/AVC: [-QpBdOffset, 56]

VC-1: [1, 31]
To change the time scale of the Quant Graph, use the slider under the graph.
MSA-100-MI-VM
Installation and Operation Manual
Test Tab
Figure 3-24 Test Tab
The Test tab provides test results from ETR 101-290 tests (For DVB streams), MPEG-2,
MPEG-4, H.264 video conformance tests, and audio level tests.
The following selections are available on the Test tab:
Table 3-5 Test Tab Function Selections
Button/Function
Description
Show Log
Shows or hides the Conformance Log message window
(Figure 3-25), which displays error or warning messages
generated for the currently selected stream.
Show History
Shows or hides the Conformance History window (Figure 3-26),
which displays an error and warning graph over a period of time
for the currently selected stream.
Sort Src ID
Sort the Source list according to Source ID.
Test Settings Window
Shows or hides the Test Settings window (Figure 3-27), which
allows the user to configure the conformance tests for all the
streams.
Automatic Capture
Shows or hides the Conformance Settings  Auto Capture
window (Figure 3-31), which allows the user to set the
automatic capture parameters.
Manual Capture
Shows or hides the Conformance Settings  Manual Capture
window (Figure 3-32), which allows the user to control stream
captures.
67
68
Chapter 3
Operation
Show Log Window
Figure 3-25 Show Log Window
The Show Log shows all of the error and warning messages that are generated for the
Source that is currently selected in SrcID. The Conformance Log is reset daily at midnight.
Up to 30 days of log are stored in the system; users can use the Daily Log drop down list to
access previous logs.
Show History Window
Figure 3-26 Show History Window
The Show History window shows an error and warning graph for the currently-selected
Source.
MSA-100-MI-VM
Installation and Operation Manual
The following selections are available on the Conformance History window:
Table 3-6 Conformance History Function Selections
Button/Function
Description
Select Source ID
Selects the Source for which to view conformance history
Select Time Resolution of Graph
Select to see the monthly error/warning count summary for the
past 12 months ending with the current month.
Select to see the daily error/warning count summary for the
month selected in the drop down list.
Select to see the hourly error/warning count summary for a
specific day in the month (use the drop down list to select the
day and the daily drop down list to select the month)
Previous or Next
If viewing the hourly graph, changes the current day
If viewing the daily graph, changes the current month
Save History
Saves history data to a file based on Monthly, Daily, or Hourly
selection
Hide History Windows
Hides the Conformance History window (to show the window,
select Show History from the Conformance tab)
Test Settings Window
There are three tabs on the test setting window: System Tests, Video Tests, and Audio Tests.
The System tab is used to configure the ETR-290 and packet tests. The Video tab is used to
enable video and conformance tests and the Audio Tab is used to select audio channels and
enable audio tests.
There are three levels for testing: Global, Source and Program. By default all Programs use
the Global settings. All temporary sources use the Global settings. Only persistent Sources
use the Source or Program settings. Program settings have priority over Source settings;
which, in turn, have priority over Global settings. Each program and source can have a
different set of tests enabled or have specific levels or time parameters changed for custom
testing.
Schedule testing can also be enabled on the Test Setting screen. The settings can be
customized on all of the test widows for a specific time window to enable the testing. Each
of the three; System, Video and Audio can be modified to only test during set times. When
both the "from" and "to" values are set to 00:00:00, testing is enabled all of the time.
69
70
Chapter 3
Operation
System Tests
The System tab provides for setting ETR-290 tests and RTP packet tests. Modifying the
ETR-290 test parameters from the default setting to a custom setting can be done by
selecting the Custom ETR Settings button and using the pop up window to set the available
parameters.
All changes to settings need to be applied by pressing the Apply button.
Figure 3-27 System Tests Window
MSA-100-MI-VM
Installation and Operation Manual
Video Tests
Use the Video Tests window for configuring the encoding (conformance) tests and video
testing parameters. The video test has a duration setting that can be modified. Click on the
parameter setting # and typing in the desired value in the range of the test selected and
press enter.
All changes to settings need to be applied by pressing the Apply button.
Figure 3-28 Video Tests Window
71
72
Chapter 3
Operation
Audio Tests
The Audio Tests window is used to enable the audio alarms; Silence detection, maximum
Audio level and Digital over threshold. Audio streams can also be selected to be enabled or
disabled in this window.
Audio tests can be enabled or disabled for each individual audio stream.
Note: If you change the audio ES order in the Controls tab, this setting will need to be
changed as well to reflect the changed number order of the audio streams.
Figure 3-29 Audio Tests Window
MSA-100-MI-VM
Installation and Operation Manual
Figure 3-30 Audio Tests With Loudness
73
74
Chapter 3
Operation
Test Schedule
Schedule testing can also be enabled on the Test Setting screen. The settings can be
customized on all of the test widows for a specific time window to enable the testing. Each
of the three; System, Video and Audio can be modified to only test during set times. When
both the "from" and "to" values are set to 00:00:00 testing is enabled all of the time.
Users should refrain from using schedule settings unless absolutely necessary, especially for
Program specific schedules. This eliminates the potential for the MSA to not show (hide)
errors due to the testing being turned off by the scheduled test time limit.
Auto Capture
Figure 3-31 Auto Capture Window
MSA-100-MI-VM
Installation and Operation Manual
Auto capture can only be enabled for one Source at a time. When this option is enabled,
streams will be captured whenever an error belonging to enabled error categories happens.
It is recommended that this option only be enabled during troubleshooting and it is
recommended that this option be turned off for continuous monitoring.
Manual Capture
Figure 3-32 Manual Capture Window
Manually capture a stream from the selected Source, and store it at the specified location.
When RTP header capture is enabled, a 12-byte packet header is added for each RTP
packet.
Traffic Log Tab
Figure 3-33 Traffic Log Tab
75
76
Chapter 3
Operation
The Traffic Log provides daily logging of all important messages for all Sources. A new log
file is created each day, with a maximum of 16000 events per day. By default, logs are kept
for 30 days, after which they are deleted. Users can filter all messages by Source ID and
Program numbers, and then export the filtered results.
Click the Settings button to configure which events are saved in the daily
traffic log. There are three settings: local log, syslog and SNMP trap.
Traffic Log Settings
Figure 3-34 Local Log Tab
The Local Log tab is used to configure which events are recorded in the daily MSA logs. The
local log stores daily traffic events on a local file under D:\Logs\Traffic by default. There is a
16,000 entry limit per day for the local log.
MSA-100-MI-VM
Installation and Operation Manual
Email/SMS Tab
Figure 3-35 Email/SMS Tab
The Email/SMS tab is used to configure email notification for specific events. Users need to
enter the email account information which the MSA will use to send emails and then select
the events and add the notification email addresses.
Application Log Tab
Figure 3-36 Application Log Tab
The Application Log logs application events, including application level errors.
77
78
Chapter 3
Operation
Active Alarm Tab
Figure 3-37 Active Alarm Tab
The Active Alarm tab provides a summary of the most recent alarms that have been
triggered. These alarms are generated by filtering the conformance logs of all Sources with
the time window parameters. Source and Program filtering can be enabled for the active
alarm list, but it only applies to messages being displayed, and does not affect the GPO
alarm status.
Table 3-7 Active Alarm Function Selections
Button/Function
Description
Selects time window for which alarms will be shown; selections are last 5,
10, 30, 60, 120, 300, or 600 seconds.
Filters based on Source ID to only see errors for a specific Source.
Enables filtering on a specific Program within a Source; the SrcID filter
must be used first to target a single Source before this control is enabled.
Turns the refresh of the alarm list on and off, so that users can closely
inspect the list without it constantly updating.
Indicates status of optional GPO device.
Shows summary of the types of alarms present in the alarm list based on
system, video, and audio categories. Users can instantly get a high level
summary of where the problems are.
Active alarm summary can also be output through a GPO device when one
is detected; if a GPO device is disconnected when MSA is running, it can be
re-initialized by deselecting the Active Alarm tab (e.g. select Audio Info),
then selecting the Active Alarm tab again.
GPO write errors are reported through App Log.
System layer GPO pin is DIO-A0, video layer GPO pin is DIO-A1, and audio
layer GPO pin is DIO-A2 (please read labels on the USB-DIO-32-RoHS box
for pin layout).
Other I/O ports are reserved.
MSA-100-MI-VM
Installation and Operation Manual
Audio Info Tab
Figure 3-38 Audio Info Tab
The Audio Info tab displays audio header information for MPEG-1 Audio Layer-1/2/3, AC-3,
AAC and AAC+. Audio bit rate, sampling rate, and channel configuration of a Program can
be easily found by selecting a Program and then click the Audio Info tab.
To display audio level information over the video window, check the Audio Level checkbox.
Wave Monitor Tab
Figure 3-39 Wave Monitor Tab
The Wave Monitor tab displays Peak dBFS level and a waveform for the current audio
stream.
The level indicator displays audio level range from 0 dBFS to -60 dBFS. The red bar is from 0
dBFS to -10dBFS; the yellow bar is from -10 dBFS to -20 dBFS. There is also a peak indicator
with a half decay time of 10 seconds.
79
80
Chapter 3
Operation
The waveform monitor displays the audio wave form for the last five seconds.
Click Configure Output to customize the function and appearance of the Wave Monitor
tab.
Figure 3-40 Wave Monitor Configure Output
Resource Monitor Tab
Figure 3-41 Resource Monitor Tab
MSA-100-MI-VM
Installation and Operation Manual
The Resource Monitor is used to determine how many streams can be processed safely.
System loading should never exceed 90%. Overloading the system will cause MSA to
disable Programs to prevent loss of testing integrity.
This selection adds a clock feature to the selected window. This does not use a license from
the key.
SAP Listener Tab
Figure 3-42 SAP Listener Tab
The SAP listener populates the multicast service list so that users do not have to remember
the multicast addresses of each service. Select a network interface, assign a persistent ID if
desired, and then press the Add Service button to add the SAP Source. (Up to 8 SAP
servers can be added.)
81
82
Chapter 3
Operation
Figure 3-43 SAP Listener Setting Tab
Closed Caption and XDS Tab
Figure 3-44 CC608 / Closed Caption/XDS Trace Tab
MSA-100-MI-VM
Installation and Operation Manual
Figure 3-45 CC708 / Closed Caption/XDS Trace Tab
Figure 3-46 CC708 / Closed Caption/XDS Trace Tab
The Closed Caption/XDS tab enables users to troubleshoot closed captioning problems by
listing a caption trace. Users may select which channel of caption information to display.

The OSD combo box is used to select which CC channel to decode for on screen display
of the current selected Program.

The Trace combo box is used to select which CC channel to dump the debug trace on
the CC-XDS Trace window.
The CC-XDS Trace window has a 300-line rolling buffer. Check the “Freeze Trace” checkbox
option to stop updating the trace buffer.
83
84
Chapter 3
Operation
KLV Tab
MSA-100-MI-VM supports ISO/IEC 13818-1/Amd 1 Synchronous KLV and SMPTE RP
217Asynchronous KLV metadata signaling, and supports the decoding of certain metadata
sets. The MSA-100-MI-VM follows the National Geospatial Agency (NGA) standards for
metadata including MISB STD 0902.1, MISB 0601.2, MISB 0102.5, and MISB 0604.1. The
unit also follows SMPTE 336M specification.
The KLV Tab has both Packetized Elementary Stream (PES) and Minimum Metadata Set
(MMS) mode selections.
PES Window
Figure 3-47 PES Window
The PES window shows the metadata contained in the stream selected. The PES selection
allows selecting the PID to choose the PES in a Multi Program Stream (MPS) for displaying
the metadata contained in that stream. Figure 3-47 shows the PES mode with the Program
Identification (PID) selection available.
MSA-100-MI-VM
Installation and Operation Manual
MMS Window
Figure 3-48 MMS Window
The MMS is set by the NGA and the MMS mode window shows additional data that is
included in the stream. The (ARRISVEP Time stamp is also included in the MMS window.
On Screen Display Window
When On Screen Display (OSD) settings button on the KLV tab is selected, the KLV OSD
Settings window opens.
85
86
Chapter 3
Operation
Figure 3-49 On Screen Display Window
This window supports the showing of KLV data and the selection of what to show on screen
in Tile mode or Full Screen mode. This allows seeing different KLV data on screen when
selecting to go full screen. When in Tile mode there is limited space on screen to show the
KLV data in each picture. Reducing the information displayed in Tile mode is the preferred
method. Then, when clicking on the selected tile to go full screen, the Full Screen selection
is used to show all of the selected data that the user needs to see.
MSA-100-MI-VM
Installation and Operation Manual
Figure 3-50 ull Screen Picture with Metadata Overlay
Figure 3-51 Tiled Picture Display with Metadata Overlay
In Tile mode the data is limited by the size of the picture. The greater the number of
pictures, the more the KLV data should be limited to make what is shown useful to the
operator. In other tiles there is no KLV data available; this indication is shown with a red
background.
87
88
Chapter 3
Operation
Remote Client
Figure 3-52 Remote Client Tab
See Installing the Remote Client on page 33 for information about installing the remote
client capability.
The default Username is “admin” and the default password is “admin”.
Users Tab
Figure 3-53 Users Tab
MSA-100-MI-VM
Installation and Operation Manual
The Users tab is used to set up and administer the remote user accounts for the MSA.
Different permissions can be assigned to each account based on user’s job role. The default
server port is 8887.
There is a limit of 2 simultaneous unicast (TCP) users and 6 users for multicast.
Figure 3-54 Users Tab (After a Remote [Unicast TCP] Streaming Connection Was Made)
89
90
Chapter 3
Operation
Streaming Tab
Use the Streaming tab to turn on streaming of the Video mosaic and the audio for the
selected Program.
Figure 3-55 Streaming Tab Remote Client
Figure 3-56 Streaming Tab 2
This tab is taken from the remote client and used to configure the remote streaming. The
Enable Remote Streaming check box must be enabled on the main unit.
Because it has the best bandwidth efficiency, Multicast is the preferred option whenever a
client has access to multicast streaming. When multicast is not an option (for example,
when connecting from a public network), Unicast (TCP) mode can be used for streaming.
Each Unicast (TCP) client increases the server side bandwidth consumption. There is a
maximum limit of two simultaneous Unicast (TCP) connections at any time.
Unicast TCP is a user-based configuration. The local client can only change settings for
Multicast streaming, which is shared by all remote clients selecting the multicast option.
Each remote client can decide independently whether to receive Multicast streaming or
Unicast (TCP) streaming.
MSA-100-MI-VM
Installation and Operation Manual
Source Info Tab
Figure 3-57 Source Info Tab (Multicast)
91
92
Chapter 3
Operation
Figure 3-58 Source Info Tab (RF)
The Source Information Tab is used to see the input source specific information for the
selected screen. Each source type has different information that applies to the type of input
selected. Figure 3-57 and Figure 3-58 show two different input types: Multicast and RF.
Main Video Window
The video window can be configured in full window mode and tiled mode.

When in full window mode, only the current selected video is displayed.

When in tiled mode, the main video window consists of 2×2 to 9×9 video windows
according the number of Programs simultaneously decoded. The current video is
highlighted by a red rectangle. In custom layout mode, up to 9×9 grids can be
specified, and videos can be displayed at different sizes.
MSA-100-MI-VM
Installation and Operation Manual
To display a video in full window mode, double click the target video window. To restore the
video window back to tiled mode, double click the video window again.
To change the current Program, click the video window of the target Program, or select the
target Program from the Program list in the Program Manager.
Program Display
Figure 3-59 Program Display
Table 3-8 Program Display Items and Descriptions
Display Item
Description
Title
Shows either the Program title, service name, or a custom
title based on settings made on in the Controls tab (See
Controls Tab on page 59)
CGMS-A
Copy guard rating
Traffic Status
Traffic status for a data stream will not be displayed if the
data stream is not signaled to be present. For example, if
NTSC-CC traffic status is enabled through the Controls
tab, but the input stream does not signal the present of
NTSC-CC data at all, the NTSC-CC status will not be
shown since it is not applicable and will always be “No
Traffic.”
If a certain feature’s traffic status is not on the screen
while it is enabled, the feature is either not present or not
signaled. This way users can focus on features that are
intended to be included, but are missing or go wrong.
93
94
Chapter 3
Operation
Table 3-8 Program Display Items and Descriptions (Continued)
Display Item
Description
Audio Levels
Shows the left and right audio levels for a maximum of
two Sources. Multi-channel audio Sources are down
mixed to two channels for displaying.
The audio type is displayed below the audio level bars
using the following legend
MP: MPEG Audio
AA: AAC
3/1: AAC
1+1: AAC
2/2: AAC
1/0: AAC
3/2: AC-3
2/0: AAC
PC: PCM
3/0: AAC
AM: AMR
2/1: AAC
UN: Unknown audio type
Adult Content Block
The adult content block is used to obscure Programs that may have content not suitable for
general public viewing but must still be monitored and tested for QA.
Right click on a Program in the Program display to bring up the pop-up menu used to set
the Content Blockage filter. Individual blockage filter settings can be applied to each
Program being monitored by the MSA. The blockage filter only affects the video so that
status displays can still be read including closed caption.
Figure 3-60 Content Blockage Filter Settings
The adult content blockage level can also be set in the custom layout dialog when adding
new Sources.
MSA-100-MI-VM
Installation and Operation Manual
Table 3-9 Content Blockage Filter Selection Examples
Selection
No Content Blockage
Blockage Level Low
Blockage Level Medium
Blockage Level High
Blockage Level Extreme
Result
95
96
Chapter 3
Operation
Highlight Window
A highlight window allows users to view the active Program in a larger space and displays
more details such as traffic status, CC and XDS data. When a highlight window is present,
the content of the active Program will be cloned into the highlight window. The highlight
window supports an independent, onscreen text configuration, which allows the user to
disable Data Traffic displays and Line 21 Data Services on regular mosaic windows and only
enable these on the highlight window for closer inspection.
To create a layout with a highlight window, use the Custom Layout design tool under
Program Manager.
PIP Alarm Bar
Figure 3-61 PIP Alarm Bar
The PIP Alarm Bar indicates if any PIP or Shadow Program being tested has a warning or
conformance error and allows for timed shuffling or manual switch to the Virtual Screen
that contains that Program.
Orange items indicate warnings happening in a Program under test.
MSA-100-MI-VM
Installation and Operation Manual
Figure 3-62 Indicators Showing Warnings Happening In a Program Under Test
97
98
Chapter 3
Operation
Source List Management and Custom Layout
The Source list is a human readable and editable text file which can be generated by MSA
from the Save List command of the Program Manager tab. The following is the text of a
very simple Source list file that contains two multicast Sources:
MSA Source List
customLayout=6x5
clockPos=22
clockSize=2x2
clockMode=analog
SourceID=1000 
SourceType=MCast 
ProgramSelMask=0x7ff ; Total 11 Programs selected
interface=192.168.100.102 
multicastGroup=239.1.2.0 
port=5000 
customName=IP1,IP2,IP3,IP4,IP5,IP6 ; Custom name of the first 6 Programs
customPos=12,13,14,15,16,17,18,20,21,26,27 customSize=1x1,1x1,1x1,1x1,1x1,1x1,2x2
customLabelColor=255,255,0
SourceID=1001 
SourceType=MCast 
ProgramSelMask=0x1 
interface=192.168.100.102 
multicastGroup=239.1.2.1 
port=5001
The first line of a Source list is the magic text “MSA Source List,” without the double
quotation marks. MSA uses this magic text to identify the .srcl file type. After the magic
text, there are two Source description blocks that are separated by a blank line. Each Source
description block represents a Source. The number of description lines varies depending on
the Source type, but SourceID, SourceType and ProgramSelMask(or ProgramSelNum) are
mandatory for every Source description block. The following are the currently available
description keys and their usages.
Layout Keywords
customLayout
params: =%dx%d
; max =6x6
customName
params: =%s
; a valid string, max 32 char
customPos
params: =%d
; max =35
customSize
params: =%d
; range =[1×1, 3×2]
customLabelColor
params: =%d,%d,%d
; any valid RGB color
MSA-100-MI-VM
Installation and Operation Manual
customPos is a zero-based grid index. For a 5×5 custom grid layout, the range of customPos
is [0, 24]. customPos must be present for all selected Programs of a Source. customSize is
range from 1×1 to 3×2 and there must be no overlaps. If customSize is not specified, the
default is 1×1.
customLayout must be the first keyword in the Source list when it is used.
customName, customPos, customSize and customLabelColor shall be placed after each
Source description group.
Clock Keywords
clockPos
params: =%d
; max =35 (for 6×6 layout)
clockSize
params: =%d×%d
; max =3×2
clockMode
params: ={analog, digital, both}
clockPos is a zero based grid index, for a 5×5 custom grid layout, the range of clockPos is
[0, 24]. clockSize is range from 1×1 to 3×2, there must be no overlap between the clock
window and the video windows. clockMode selects analog clock, digital clock or both of
them for display.
Only one clock window can be specified.
Clock keywords shall be placed after customLayout when they are used, and all of them
must be present together.
Highlight Keywords
highlightPos
params: =%d
; max =35 (for 6×6 layout)
highlightSize
params: =%d×%d
; max =3x3
These two parameters specify the highlight window position and size.
Source Keywords
SourceID
params: =%d
; range =[1000, 9999]
SourceType
params: = {ASI,SDI,MCast,
UCastUDP,UCastHTTP,RTSP,
Namepipe}
; NOT case sensitive
ProgramSelMask
params: =0x%x
; range = [0x01, 0xFFFFFFFF]
ProgramSelNum
params: =%d
; must be valid TS Program
number
interface
params: =%d.%d.%d.%d
; must be valid local IP interface
port
params: =%d
multicastGroup
params: =%d.%d.%d.%d
; must be valid multicast address
namePipe
params: =%s
; must be valid namepipe
asiDeviceIndex
params: =%d
; range=[0,7]
99
100
Chapter 3
Operation
URL
params: =%s
; must be valid URL
contentBlockage
params: =%d
; range=[0,3]
igmpv3FilterMode
params: =%d
; 0 for inclusive, 1 for exclusive
igmpv3FilterStr
params: =%s
; IP addresses separated by ";"
rfDeviceIndex
params: =%d
; range=[0,3]
rfModulation
params: =%d
; range=[0,6]
rfFreq
params: =%d
; Value frequency in Hz
rfBandwidth
params: =%d
; DVB-T/H, range=[5, 8] MHz or
Zero
rfJ83Annex
params: =%d
; range=[0,2]

SourceID
Source ID is used to identify a Source for error report and management. Source ID is a
number range from 0 to 9999 and is divided into two parts.
The first part is in the range of 0 to 999, Source IDs in this range are used by MSA for
temporary monitoring sessions and are reserved for MSA use only. When users add the
first Source to MSA manually, its Source ID will be assigned zero. Sources added later
will be assigned Source ID monotonically. Source IDs of deleted Sources won't be
reused in the same temporary test session.
The second part is in the range of 1000 to 9999 and is used for persistent monitoring.
A persistent Source retains conformance test summary, conformance message log and
conformance history (up to one year). Users are supposed to assign a unique ID from
the second part to every Source under monitoring. Typically this is done by first adding
all the Sources using Add Source, save the Source list to a Source list file using Save List,
and then manually modify the SourceID of each Source description block to the Source
ID assigned to that Source. With every Source ID assigned in the persistent range
(1000-9999), now the Source list can be loaded into MSA using Load List and start
persistent monitoring.
Important: If a Source ID has been used by a Source, you cannot assign it to another
Source even after the Source used the ID has been deleted from the list. This is to
maintain persistency of the conformance test results and histories. The only way to
reclaim a Source ID after it has been used is to remove the persistency data of that ID.
This is not recommended; only do it with careful planning.

SourceType
Source type can be ASI, MCast, UCastUDP, UCastHTTP, RTSP, or Namepipe. Source Type
is NOT case sensitive.

ProgramSelMask
Program selection mask is used to select active Programs from MPTS for monitoring.
Each bit (bit 0 to 31) represents a Program in the order that it appears in the PAT table.
For single Program Source, the mask should be set to 0x1.

ProgramSelNum
Program selection number is used to select active Programs from MPTS for monitoring
using the Program numbers. To select more than one Program, just separate Program
numbers with a comma. For example:
MSA-100-MI-VM
Installation and Operation Manual

ProgramSelNum=100,200,300
The above line selects 3 Programs (Program numbers are 100, 200, 300 respectively)
from the MPTS Source.
Either ProgramSelMask or ProgramSelNum can be used to select Programs from a MPTS for
monitoring. When both are present, ProgramSelMask has higher priority.

interface
Interface is the local IP interface used for multicast or unicast monitoring. This is useful
for workstations with two or more Ethernet ports.

port
IP port for multicast or unicast monitoring

multicastGroup
This keyword specifies the multicast address. The multicast address range is 224.0.0.0
to 239.255.255.255 and forms the Class D range, which is made up of the high order
bits 1110 followed by the 28 bit multicast group ID. There is no subnetting with these
Class D addresses. A multicast group can have a permanently-assigned address or the
group may be Transient. Well-known Class D addresses are assigned by the Internet
Assigned Numbers Authority (IANA). Some of these are detailed in Table 3-10:
Table 3-10 Class D Addresses Assigned by IANA
Address
Purpose
Address
Purpose
224.0.0.1
All hosts on a subnet
224.0.0.12
DHCP server/relay agent
224.0.0.2
All routers on a subnet
224.0.0.13
All PIM routers
224.0.0.4
All DVMRP routers
224.0.0.14
RSVP Encapsulation
224.0.0.5
All OSPF routers (DR others)
224.0.0.15
All CBT routers
224.0.0.6
All OSPF designated routers
224.0.0.18
VRRP
224.0.0.7
ST Routers
224.0.1.1
NTP
224.0.0.8
ST Hosts
224.0.1.8
SUN NIS+
224.0.0.9
All RIPv2 routers
224.0.1.39
Cisco RP Announce
224.0.0.10
All EIGRP routers
224.0.1.40
Cisco RP Discovery
224.0.0.11
Mobile-Agents
A full list of Multicast addresses can be found at
www.iana.org/assignments/multicast-addresses/multicast-addresses.xhtml and 
http://www.ietf.org/rfc/rfc1700.txt
The range 224.0.0.0 to 224.0.0.255 is reserved for local purposes meaning that routers
should not forward these datagrams since the applications that use these addresses do
not need the datagrams to go further than one hop. The range 239.0.0.0 to
239.255.255.255 is reserved for administrative scoping (RFC 2365). This is where
groups of routers agree an address range to and from which multicast traffic is
prevented from entering or leaving a defined zone.

namePipe
Namepipe server address for namepipe Source.
101
102
Chapter 3
Operation

asiDeviceIndex
ASI device index for ASI input. Each ASI input device is assigned a device index by MSA.
The typical range is from 0 to 7.

URL
URL for HTTP unicast Source.

contentBlockage
Specifies content blockage levels: 0 means no content blockage, 1 means Low level, 2
means Medium level, 3 means High level, 4 means Extreme level.

igmpv3FilterMode
0 means inclusive mode, 1 means exclusive mode

igmpv3FilterStr
Specifies the inclusive or exclusive multicast Source address (Source IPs). IPs are
separated by a semicolon (“;”).

rfDeviceIndex
RF device index for RF input. Each RF input device is assigned a device index by MSA;
the typical range is from 0 to 3.

rfModulation
RF device modulation type, defined as:
kModType_QAM64 = 0,
kModType_QAM256 = 1,

kModType_ATSC
= 2,
kModType_DVBT
= 3,
kModType_DVBS
= 4,
kModType_DVBS2
= 5,
rfFreq
RF device demodulation frequency in Hz.

rfBandwidth
DVB-T/H bandwidth in MHz.

rfJ83Annex
QAM J83 annex type, defined as:
kJ83_None
= 0,
kJ83_A
= 1,
kJ83_B
= 2,
kJ83_C
= 3,
MSA-100-MI-VM
Installation and Operation Manual
Sample Custom Layout
The following is a sample custom 5×5 layout. There are four Sources in this setting:

The first Source (ID=3000) is ASI device 0, with 4 HD Programs.

The Second Source (ID=3010) is ASI device 1, with 5 SD Programs.

The third and fourth Sources (ID=4001, 4002) are IP multicast Sources (each of them
has one SD Program). Both the analog and digital clocks are shown in the middle of the
screen display shown in Figure 3-63.
Figure 3-63 Sample Custom Layout Screen Display
Table 3-11 Grid Position Numbering
Grid Position
Number
Grid Position
Number
Grid Position
Number
Grid Position
Number
Grid Position
Number
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Source List Text
MSA Source List
customLayout=5x5
clockPos=2
clockSize=1x2
clockMode=both
103
104
Chapter 3
Operation
SourceID=3000
SourceType=ASI
ProgramSelMask=0xf
asiDeviceIndex=0
customPos=0,3,15,18
customLabelColor=255,255,0
customSize=2x2,2x2,2x2,2x2
customName=HD-1, HD-2, HD-3, HD-4
SourceID=3010
SourceType=ASI
ProgramSelNum=100,200,300,400,500
asiDeviceIndex=1
customPos=10,11,12,13,14
customLabelColor=255,0, 255
customName=SD-1, SD-2, SD-3, SD-4, SD-5
SourceID=4001
SourceType=MCast
ProgramSelMask=0x01
interface=192.168.2.201
multicastGroup=239.1.1.1
port=5010
customPos=17
customLabelColor=0, 255, 255
customName=IP1
SourceID=4002
SourceType=MCast
ProgramSelMask=0x01
interface=192.168.2.201
multicastGroup=239.1.1.2
port=5020
customPos=22
customLabelColor=0, 255, 255
customName=IP2
Default Source List
When MSA starts from a reset or cold start, it may automatically load the default Source list
located at d:\. The default Source list name is default.srcl. Users can create their own Source
lists and copy the most frequent used list as the default list.
Users can configure MSA to load either the last configuration, or load the default Source
list.
To shut down the MsaServer.exe or the MsaClient.exe see the following section.
MSA-100-MI-VM
Installation and Operation Manual
Shutting Down MSAServer.EXE
Proper shutdown of the MsaServer.exe can only be accomplished via the Services dialog
under the Windows™ Service Manager. Shutdown of the Imagine WatchDog Service
shown in the Services dialog is the only valid means of proper shutdown of the
MsaServer.exe.
Figure 3-64 Imagine Watchdog Service
Shutting down the client does not stop the MsaServer.exe from running (testing to stop).
On the local unit an MSA Launchpad start tray application is running to continually relaunch
the MsaClient.exe if it is shut down without shutdown of the MSA Launchpad.
105
106
Chapter 3
Operation
107
4
Troubleshooting
CAUTION: These instructions are for use by qualified personnel only. To reduce the
risk of electric shock, do not perform this installation or any servicing unless you
are qualified to do so. Refer all servicing to qualified service personnel.
When power is applied to the unit, the display shows the startup screen for about 45
seconds.
Initial Checks
If the MSA-100-MI-VM is not functioning properly, first verify the following:

The Server (VM) is running.

The remote GUI and the server IP addresses match.
Initial difficulties with operation or display can be due to improper setup. Review the
Control tab settings (see page 59) to ensure that the proper adjustments have been made
for the signal requirements.
Copyright © 2012, Harris Corporation
108
Chapter 4
Troubleshooting
Frequently Asked Questions
Why the display aspect ratios of some videos seem to be wrong?
MSA uses aspect ratio information extracted from video streams to calculate the display
aspect ratio.
When display aspect ratio is used in a video stream, it doesn't need to be changed when
the video resolution is changed. MPEG-2 video encodes display aspect ratio in the bit
streams.
When pixel/sample aspect ratio is used in a video stream, the display aspect ratio is
calculated from the video coded resolution and the pixel aspect ratio. So pixel aspect ratio
needs to be changed when the video resolution is change. Some encoders don't change
pixel aspect ratio correctly when the video resolution is changed, and MSA catches this kind
of error by showing the wrong display aspect ratio. H.264/AVC videos encode pixel/sample
aspect ratio in the bit streams.
Does MSA support dual-monitor?
Yes, MSA supports dual-monitor in clone mode and stretch mode. In clone mode, both
monitors display the same content. In stretch mode, the video window is displayed full
screen on the primary monitor, and the control panel is displayed on the secondary monitor.
To switch between single-monitor mode and dual-monitor mode, right click on the video
window, and toggle the dual-monitor flag.
How can I display the video window in full screen mode?
The video window will be displayed in full screen mode when dual-monitor mode is used.
You can use dual-monitor mode even when you only have one monitor. Right click on the
video window, a popup menu will allow you to toggle between single-monitor and
dual-monitor mode (i.e., window and full screen mode).
Can I have different video grid sizes for different input?
Video grid size is configurable by using source list (that is, configuration script).
HD input should have at least a 2×2 grid size for higher quality.
Why are the video windows black for some of the H.264 inputs?
H.264 decoding is not started until either an IDR picture or a Recovery Point is found from
the input bitstream. Some synchronous points are necessary for error free decoding of
H.264 bitstream; however, some H.264 encoders do not use IDR or RP. As a result, error free
decoding of their output is only possible by assuming certain advance coding tools are not
used.
To support such kind of H.264 input, enable the “H.264 No IDR” checkbox through the
Controls Tab (see page 60).
Copyright © 2012, Harris Corporation
MSA-100-MI-VM
Installation and Operation Manual
How can I troubleshoot data acquisition problems?
MSA can provide Data Traffic Status at different layers for each input stream. These traffic
statuses can be enabled through the Controls tab of the main window. There are three data
traffic layers:

System layer (Includes IP and Transport Stream layers)

Audio/Video data layer

Closed Caption data layer
Please see Program Display on page 93 for detail descriptions of the meanings of each
traffic status.
If the unit only booted to Windows and I need to log in, what is my Windows
logon password?
The Windows logon password is admin.
If the problem still exists after troubleshooting the MSA-100-MI-VM, see MSA-100-MI-VM
Service and Support on page 12 for further instructions.
Copyright © 2012, Harris Corporation
109
110
Chapter 4
Troubleshooting
Copyright © 2012, Harris Corporation
111
5
Specifications
Specifications are subject to change without notice.
Protocols
Table 5-1 Protocols Specifications
Item
Specification
Transport protocols
TS over ASI
TS over UDP (multicast or unicast)
TS over RTP/UDP (multicast or unicast)
TS over TCP
TS over Namepipe
Streaming protocols
RTSP (RFC 2326), SDP (RFC 2327)
Transport
RTP (RFC 3550, RFC 3551)
Video payload
MP4V-ES (RFC 3016): sp and ASP profiles
H264 (RFC 3984): Baseline, Extended, Main
and High profiles
Audio payload
MP4A-LATM (RFC 3016): AAC, HE-AAC v1,
HE-AAC v2
mpeg4-generic (RFC 3640): AAC-lbr and
AAC-hbr
RTMP (Real Time Messaging Protocol
1.0)
Transport
RTMP/TCP
Video payload
H.264/AVC: Baseline, Extended, Main and
High profiles
Audio payload
AAC, HE-AAC v1, HE-AAC v2
MPEG audio
112
Chapter 5
Specifications
Table 5-1 Protocols Specifications (Continued)
Item
Specification
Apple HTTP Live (IETF Internet Draft HTTP
Live Streaming)
Transport
TS/TCP
Video payload
H.264/AVC: Baseline, Extended, Main and
High profiles
Audio payload
AAC, HE-AAC v1, HE-AAC v2
Windows Media HTTP Streaming (MS-WMSP) support coming soon.
Compression Formats
Table 5-2 Video Compression Formats
Item
Specification
MPEG-1 Video (ISO/IEC 11172-2)
MPEG-2 Video (ISO/IEC 13818-2)
Supported profiles (all levels)
Simple
Main
4:2:2
HD is supported by main profile @ high level.
H.264/AVC Video (ITU-T H.264)
Supported profiles (all levels)
Baseline
Main
Extended
High
High 4:2:2 (extra license required with
complexity conditions)
MSA-100-MI-VM
Installation and Operation Manual
Audio Compression Formats

MPEG-1 Audio (ISO/IEC 11172-3)

MPEG-2 Audio (ISO/IEC 13818-3)

MPEG-2 AAC (ISO/IEC 13818-7)

MPEG-4 AAC (ISO/IEC 14496-3)

MPEG-4 HE-AAC v1 (ISO/IEC 14496-3/Amd.1)

MPEG-4 HE-AAC v2 (ISO/IEC 14496-3/Amd.2)

AC-3 (ATSC A/52B), E-AC-3 (Dolby Digital Plus)

SMPTE 302M (SMPTE 302M)
Multichannel audio is down-mixed to stereo audio for output and level analysis
Closed Caption
MSA supports real-time decoding of Closed Caption carried by:

EIA-608B over SCTE-20

EIA-608B over ATSC A/53
XDS Data
MSA supports real-time decoding of the following XDS data:

Program name (title)

Content advisory (V-Chip), including MPA, U.S. PG, Canadian English, Canadian French

Copy Generation Management System, Analog (CGMS-A)
Transport Layer Analysis
Table 5-3 Transport Layer Analysis Specifications
Item
Specification
IP layer
Dropped packet detection for RTP layer
RTP header length error
Transport layer analysis
First priority
ESTI TR 101 290 tests for transport stream
layer
TS sync loss
Sync byte error
PAT error
Continuity count error
113
114
Chapter 5
Specifications
Table 5-3 Transport Layer Analysis Specifications (Continued)
Item
Specification
PMT error
PID error
Second priority
Transport error
CRC error
PCR repetition error
PCR discontinuity indicator error
PCR accuracy error
PTS error
CAT error
Third priority
NIT actual error
NIT other error
Unreferenced PID
SDT actual error
SDT other error
EIT actual error
EIT other error
EIT PF error
RST error
TDT error
Table Analysis
MSA supports the following table analysis:

TS PSI

TS DVB-SI

TS ATSC-PSIP

RTSP SDP
The table analysis feature shows detail syntax elements of all know tables and descriptors,
and provides a Hex data view for debugging and analysis.
MSA-100-MI-VM
Installation and Operation Manual
Video Layer Analysis
MSA supports the following video layer analysis:

Video stream information

Video picture graph and bit rate profile

Video quant graph (video quality)

Video conformance tests (from sequence level down to block level)

MPEG-2/MPEG-1 video conformance test
This test checks semantic rules and data integrity according to ISO/IEC 13818-2
(ISO/IEC 11172-2 for MPEG-1)

MPEG-4 Part 2 video conformance test
This test checks semantic rules and data integrity according to ISO/IEC 14496-2 (v2)

H.264/AVC video conformance test
This test checks semantic rules and data integrity according to ITU-T H.264

SMPTE VC-1 conformance test
This test checks semantic rules and data integrity according to SMPTE 421M

Black video detection with user configurable delay

Frozen video detection with user configurable delay
Audio Layer Analysis
Table 5-4 Audio Layer Analysis Specifications
Item
Specification
Audio stream information
Audio type
Audio bit rate
Sampling frequency
Channel mode
Other compression format-dependent
information
Audio wave monitor
Short-term wave window: 1 audio frame
Long-term wave window: 5 seconds
Fast PPM with digital clipping indicator
PPM parameters
0 ms attack
12 dB/second decay (fallback)
4 second hold for peak
Audio level test
Silence detection
Max level detection
Digital clipping detection
115
116
Chapter 5
Specifications
117
A
Open Source Software
Copyright Information
Copyright information for certain Open Source software products is provided below. Source
code for all Open Source software used in the development of this product is available upon
request (contact the Imagine Communications Customer Service Department). See
MSA-100-MI-VM Service and Support on page 12 for contact information.
FreeType License
Portions of this software are copyright © 2008 The FreeType Project (www.freetype.org). All
rights reserved.
LibJPEG License
This software is based in part on the work of the Independent JPEG Group.
CMU/UCD Copyright Notice
Copyright © 1989, 1991, 1992 by Carnegie Mellon University.
Derivative Work © 1996, 1998-2000.
Copyright © 1996, 1998-2000, The Regents of the University of California. All rights
reserved.
Permission to use, copy, modify and distribute this software and its documentation for any
purpose and without fee is hereby granted, provided that the above copyright notice appears
in all copies and that both that copyright notice and this permission notice appear in
supporting documentation, and that the name of CMU and The Regents of the University of
California not be used in advertising or publicity pertaining to distribution of the software
without specific written permission.
118
Appendix A
Open Source Software Copyright Information
CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALL WARRANTIES
WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE
UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL
DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA
OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS
ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
SOFTWARE.
Networks Associates Technology, Inc. Copyright Notice (BSD)
Copyright © 2001-2003, Networks Associates Technology, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.

Neither the name of the Networks Associates Technology, Inc. nor the names of its
contributors may be used to endorse or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS”
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS;OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY,WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Cambridge Broadband Ltd. Copyright Notice (BSD)
Portions of this code are copyright © 2001-2003, Cambridge Broadband Ltd. All rights
reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
MSA-100-MI-VM
Installation and Operation Manual

The name of Cambridge Broadband Ltd. may not be used to endorse or promote
products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER “AS IS” AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Sun Microsystems, Inc. Copyright Notice (BSD)
Copyright © 2003 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California
95054, U.S.A. All rights reserved.
Use is subject to license terms below.
This distribution may include materials developed by third parties.
Sun, Sun Microsystems, the Sun logo and Solaris are trademarks or registered trademarks of
Sun Microsystems, Inc. in the U.S. and other countries.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.

Neither the name of the Sun Microsystems, Inc. nor the names of its contributors may
be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS”
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
119
120
Appendix A
Open Source Software Copyright Information
Sparta, Inc. Copyright Notice (BSD)
Copyright © 2003-2008, Sparta, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.

Neither the name of Sparta, Inc. nor the names of its contributors may be used to
endorse or promote products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS”
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Cisco/BUPTNIC Copyright Notice (BSD)
Copyright © 2004, Cisco, Inc and Information Network Center of Beijing University of Posts
and Telecommunications. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.

Neither the name of Cisco, Inc, Beijing University of Posts and Telecommunications, nor
the names of their contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS”
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
MSA-100-MI-VM
Installation and Operation Manual
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Fabasoft R&D Software GmbH & Co. KG Copyright Notice (BSD)
Copyright © Fabasoft R&D Software GmbH & Co. KG, 2003 [email protected]. Author:
Bernhard Penz
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.

The name of Fabasoft R&D Software GmbH & Co KG or any of its subsidiaries, brand or
product names may not be used to endorse or promote products derived from this
software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The GNU v2 License
GNU General Public License
Version 2, June 1991
Copyright © 1989, 1991 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
Boston, MA 02110-1301 USA. Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
121
122
Appendix A
Open Source Software Copyright Information
Preamble
The licenses for most software are designed to take away your freedom to share and
change it. By contrast, the GNU General Public License is intended to guarantee your
freedom to share and change free software--to make sure the software is free for all its
users. This General Public License applies to most of the Free Software Foundation's
software and to any other program whose authors commit to using it. (Some other Free
Software Foundation software is covered by the GNU Lesser General Public License instead.)
You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public
Licenses are designed to make sure that you have the freedom to distribute copies of free
software (and charge for this service if you wish), that you receive source code or can get it
if you want it, that you can change the software or use pieces of it in new free programs;
and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these
rights or to ask you to surrender the rights. These restrictions translate to certain
responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you
must give the recipients all the rights that you have. You must make sure that they, too,
receive or can get the source code. And you must show them these terms so they know
their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this
license which gives you legal permission to copy, distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain that everyone
understands that there is no warranty for this free software. If the software is modified by
someone else and passed on, we want its recipients to know that what they have is not the
original, so that any problems introduced by others will not reflect on the original authors’
reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the
danger that redistributors of a free program will individually obtain patent licenses, in effect
making the program proprietary. To prevent this, we have made it clear that any patent
must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
GNU General Public License
Terms and Conditions for Copying, Distribution and Modification
0. This License applies to any program or other work which contains a notice placed by the
copyright holder saying it may be distributed under the terms of this General Public License.
The “Program,” below, refers to any such program or work, and a “work based on the
Program” means either the Program or any derivative work under copyright law: that is to
say, a work containing the Program or a portion of it, either verbatim or with modifications
and/or translated into another language. (Hereinafter, translation is included without
limitation in the term “modification.”) Each licensee is addressed as “you.”
MSA-100-MI-VM
Installation and Operation Manual
Activities other than copying, distribution and modification are not covered by this License;
they are outside its scope. The act of running the Program is not restricted, and the output
from the Program is covered only if its contents constitute a work based on the Program
(independent of having been made by running the Program). Whether that is true depends
on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive
it, in any medium, provided that you conspicuously and appropriately publish on each copy
an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that
refer to this License and to the absence of any warranty; and give any other recipients of the
Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option
offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a
work based on the Program, and copy and distribute such modifications or work under the
terms of Section 1 above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you
changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part
contains or is derived from the Program or any part thereof, to be licensed as a whole at
no charge to all third parties under the terms of this License.
c) If the modified program normally reads commands interactively when run, you must
cause it, when started running for such interactive use in the most ordinary way, to
print or display an announcement including an appropriate copyright notice and a
notice that there is no warranty (or else, saying that you provide a warranty) and that
users may redistribute the program under these conditions, and telling the user how to
view a copy of this License. (Exception: if the Program itself is interactive but does not
normally print such an announcement, your work based on the Program is not required
to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that
work are not derived from the Program, and can be reasonably considered independent and
separate works in themselves, then this License, and its terms, do not apply to those
sections when you distribute them as separate works. But when you distribute the same
sections as part of a whole which is a work based on the Program, the distribution of the
whole must be on the terms of this License, whose permissions for other licensees extend to
the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written
entirely by you; rather, the intent is to exercise the right to control the distribution of
derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program
(or with a work based on the Program) on a volume of a storage or distribution medium
does not bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in
object code or executable form under the terms of Sections 1 and 2 above provided that
you also do one of the following:
a) Accompany it with the complete corresponding machine-readable source code,
which must be distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange; or,
123
124
Appendix A
Open Source Software Copyright Information
b) Accompany it with a written offer, valid for at least three years, to give any third
party, for a charge no more than your cost of physically performing source distribution,
a complete machine-readable copy of the corresponding source code, to be distributed
under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange; or,
c) Accompany it with the information you received as to the offer to distribute
corresponding source code. (This alternative is allowed only for noncommercial
distribution and only if you received the program in object code or executable form
with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications
to it. For an executable work, complete source code means all the source code for all
modules it contains, plus any associated interface definition files, plus the scripts used to
control compilation and installation of the executable. However, as a special exception, the
source code distributed need not include anything that is normally distributed (in either
source or binary form) with the major components (compiler, kernel, and so on) of the
operating system on which the executable runs, unless that component itself accompanies
the executable.
If distribution of executable or object code is made by offering access to copy from a
designated place, then offering equivalent access to copy the source code from the same
place counts as distribution of the source code, even though third parties are not compelled
to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly
provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute
the Program is void, and will automatically terminate your rights under this License.
However, parties who have received copies, or rights, from you under this License will not
have their licenses terminated so long as such parties remain in full compliance.
5. You are not required to accept this License, since you have not signed it. However,
nothing else grants you permission to modify or distribute the Program or its derivative
works. These actions are prohibited by law if you do not accept this License. Therefore, by
modifying or distributing the Program (or any work based on the Program), you indicate
your acceptance of this License to do so, and all its terms and conditions for copying,
distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient
automatically receives a license from the original licensor to copy, distribute or modify the
Program subject to these terms and conditions. You may not impose any further restrictions
on the recipients’ exercise of the rights granted herein. You are not responsible for enforcing
compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any
other reason (not limited to patent issues), conditions are imposed on you (whether by
court order, agreement or otherwise) that contradict the conditions of this License, they do
not excuse you from the conditions of this License. If you cannot distribute so as to satisfy
simultaneously your obligations under this License and any other pertinent obligations, then
as a consequence you may not distribute the Program at all. For example, if a patent license
would not permit royalty-free redistribution of the Program by all those who receive copies
directly or indirectly through you, then the only way you could satisfy both it and this
License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular
circumstance, the balance of the section is intended to apply and the section as a whole is
intended to apply in other circumstances.
MSA-100-MI-VM
Installation and Operation Manual
It is not the purpose of this section to induce you to infringe any patents or other property
right claims or to contest validity of any such claims; this section has the sole purpose of
protecting the integrity of the free software distribution system, which is implemented by
public license practices. Many people have made generous contributions to the wide range
of software distributed through that system in reliance on consistent application of that
system; it is up to the author/donor to decide if he or she is willing to distribute software
through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of
the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by
patents or by copyrighted interfaces, the original copyright holder who places the Program
under this License may add an explicit geographical distribution limitation excluding those
countries, so that distribution is permitted only in or among countries not thus excluded. In
such case, this License incorporates the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General
Public License from time to time. Such new versions will be similar in spirit to the present
version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version
number of this License which applies to it and “any later version,” you have the option of
following the terms and conditions either of that version or of any later version published by
the Free Software Foundation. If the Program does not specify a version number of this
License, you may choose any version ever published by the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose
distribution conditions are different, write to the author to ask for permission. For software
which is copyrighted by the Free Software Foundation, write to the Free Software
Foundation; we sometimes make exceptions for this. Our decision will be guided by the two
goals of preserving the free status of all derivatives of our free software and of promoting
the sharing and reuse of software generally.
No Warranty
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO
THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES
ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT
LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES
SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE
WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
125
126
Appendix A
Open Source Software Copyright Information
GNU Lesser Public License
GNU Lesser General Public License
Version 2.1, February 1999
Copyright © 1991, 1999 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
Boston, MA 02110-1301 USA. Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
[This is the first released version of the Lesser GPL. It also counts as the successor of the
GNU Library Public License, version 2, hence the version number 2.1.]
Preamble
The licenses for most software are designed to take away your freedom to share and
change it. By contrast, the GNU General Public Licenses are intended to guarantee your
freedom to share and change free software--to make sure the software is free for all its
users.
This license, the Lesser General Public License, applies to some specially designated software
packages--typically libraries--of the Free Software Foundation and other authors who
decide to use it. You can use it too, but we suggest you first think carefully about whether
this license or the ordinary General Public License is the better strategy to use in any
particular case, based on the explanations below.
When we speak of free software, we are referring to freedom of use, not price. Our General
Public Licenses are designed to make sure that you have the freedom to distribute copies of
free software (and charge for this service if you wish); that you receive source code or can
get it if you want it; that you can change the software and use pieces of it in new free
programs; and that you are informed that you can do these things.
To protect your rights, we need to make restrictions that forbid distributors to deny you
these rights or to ask you to surrender these rights. These restrictions translate to certain
responsibilities for you if you distribute copies of the library or if you modify it.
For example, if you distribute copies of the library, whether gratis or for a fee, you must give
the recipients all the rights that we gave you. You must make sure that they, too, receive or
can get the source code. If you link other code with the library, you must provide complete
object files to the recipients, so that they can relink them with the library after making
changes to the library and recompiling it. And you must show them these terms so they
know their rights.
We protect your rights with a two-step method: (1) we copyright the library, and (2) we
offer you this license, which gives you legal permission to copy, distribute and/or modify the
library.
To protect each distributor, we want to make it very clear that there is no warranty for the
free library. Also, if the library is modified by someone else and passed on, the recipients
should know that what they have is not the original version, so that the original author’s
reputation will not be affected by problems that might be introduced by others.
MSA-100-MI-VM
Installation and Operation Manual
Finally, software patents pose a constant threat to the existence of any free program. We
wish to make sure that a company cannot effectively restrict the users of a free program by
obtaining a restrictive license from a patent holder. Therefore, we insist that any patent
license obtained for a version of the library must be consistent with the full freedom of use
specified in this license.
Most GNU software, including some libraries, is covered by the ordinary GNU General Public
License. This license, the GNU Lesser General Public License, applies to certain designated
libraries, and is quite different from the ordinary General Public License. We use this license
for certain libraries in order to permit linking those libraries into non-free programs.
When a program is linked with a library, whether statically or using a shared library, the
combination of the two is legally speaking a combined work, a derivative of the original
library. The ordinary General Public License therefore permits such linking only if the entire
combination fits its criteria of freedom. The Lesser General Public License permits more lax
criteria for linking other code with the library.
We call this license the “Lesser” General Public License because it does Less to protect the
user’s freedom than the ordinary General Public License. It also provides other free software
developers Less of an advantage over competing non-free programs. These disadvantages
are the reason we use the ordinary General Public License for many libraries. However, the
Lesser license provides advantages in certain special circumstances.
For example, on rare occasions, there may be a special need to encourage the widest
possible use of a certain library, so that it becomes a de-facto standard. To achieve this,
non-free programs must be allowed to use the library. A more frequent case is that a free
library does the same job as widely used non-free libraries. In this case, there is little to gain
by limiting the free library to free software only, so we use the Lesser General Public License.
In other cases, permission to use a particular library in non-free programs enables a greater
number of people to use a large body of free software. For example, permission to use the
GNU C Library in non-free programs enables many more people to use the whole GNU
operating system, as well as its variant, the GNU/Linux operating system.
Although the Lesser General Public License is Less protective of the users’ freedom, it does
ensure that the user of a program that is linked with the Library has the freedom and the
wherewithal to run that program using a modified version of the Library.
The precise terms and conditions for copying, distribution and modification follow. Pay
close attention to the difference between a “work based on the library” and a “work that
uses the library.” The former contains code derived from the library, whereas the latter must
be combined with the library in order to run.
GNU Lesser General Public License
Terms and Conditions for Copying, Distribution and Modification
0. This License Agreement applies to any software library or other program which contains a
notice placed by the copyright holder or other authorized party saying it may be distributed
under the terms of this Lesser General Public License (also called “this License”). Each
licensee is addressed as “you.”
A “library” means a collection of software functions and/or data prepared so as to be
conveniently linked with application programs (which use some of those functions and
data) to form executables.
127
128
Appendix A
Open Source Software Copyright Information
The “Library,” below, refers to any such software library or work which has been distributed
under these terms. A “work based on the Library” means either the Library or any derivative
work under copyright law: that is to say, a work containing the Library or a portion of it,
either verbatim or with modifications and/or translated straightforwardly into another
language. (Hereinafter, translation is included without limitation in the term
“modification.”)
“Source code” for a work means the preferred form of the work for making modifications
to it. For a library, complete source code means all the source code for all modules it
contains, plus any associated interface definition files, plus the scripts used to control
compilation and installation of the library.
Activities other than copying, distribution and modification are not covered by this License;
they are outside its scope. The act of running a program using the Library is not restricted,
and output from such a program is covered only if its contents constitute a work based on
the Library (independent of the use of the Library in a tool for writing it). Whether that is
true depends on what the Library does and what the program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library’s complete source code as you
receive it, in any medium, provided that you conspicuously and appropriately publish on
each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the
notices that refer to this License and to the absence of any warranty; and distribute a copy
of this License along with the Library.
You may charge a fee for the physical act of transferring a copy, and you may at your option
offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a
work based on the Library, and copy and distribute such modifications or work under the
terms of Section 1 above, provided that you also meet all of these conditions:
a) The modified work must itself be a software library.
b) You must cause the files modified to carry prominent notices stating that you
changed the files and the date of any change.
c) You must cause the whole of the work to be licensed at no charge to all third parties
under the terms of this License.
d) If a facility in the modified Library refers to a function or a table of data to be
supplied by an application program that uses the facility, other than as an argument
passed when the facility is invoked, then you must make a good faith effort to ensure
that, in the event an application does not supply such function or table, the facility still
operates, and performs whatever part of its purpose remains meaningful.
(For example, a function in a library to compute square roots has a purpose that is
entirely well-defined independent of the application. Therefore, Subsection 2d requires
that any application-supplied function or table used by this function must be optional:
if the application does not supply it, the square root function must still compute square
roots.)
These requirements apply to the modified work as a whole. If identifiable sections of that
work are not derived from the Library, and can be reasonably considered independent and
separate works in themselves, then this License, and its terms, do not apply to those
sections when you distribute them as separate works. But when you distribute the same
sections as part of a whole which is a work based on the Library, the distribution of the
whole must be on the terms of this License, whose permissions for other licensees extend to
the entire whole, and thus to each and every part regardless of who wrote it.
MSA-100-MI-VM
Installation and Operation Manual
Thus, it is not the intent of this section to claim rights or contest your rights to work written
entirely by you; rather, the intent is to exercise the right to control the distribution of
derivative or collective works based on the Library.
In addition, mere aggregation of another work not based on the Library with the Library (or
with a work based on the Library) on a volume of a storage or distribution medium does not
bring the other work under the scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public License instead of
this License to a given copy of the Library. To do this, you must alter all the notices that refer
to this License, so that they refer to the ordinary GNU General Public License, version 2,
instead of to this License. (If a newer version than version 2 of the ordinary GNU General
Public License has appeared, then you can specify that version instead if you wish.) Do not
make any other change in these notices.
Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU
General Public License applies to all subsequent copies and derivative works made from that
copy.
This option is useful when you wish to copy part of the code of the Library into a program
that is not a library.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2)
in object code or executable form under the terms of Sections 1 and 2 above provided that
you accompany it with the complete corresponding machine-readable source code, which
must be distributed under the terms of Sections 1 and 2 above on a medium customarily
used for software interchange.
If distribution of object code is made by offering access to copy from a designated place,
then offering equivalent access to copy the source code from the same place satisfies the
requirement to distribute the source code, even though third parties are not compelled to
copy the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is designed to
work with the Library by being compiled or linked with it, is called a “work that uses the
Library.” Such a work, in isolation, is not a derivative work of the Library, and therefore falls
outside the scope of this License.
However, linking a “work that uses the Library” with the Library creates an executable that
is a derivative of the Library (because it contains portions of the Library), rather than a
“work that uses the library.” The executable is therefore covered by this License. Section 6
states terms for distribution of such executables.
When a “work that uses the Library” uses material from a header file that is part of the
Library, the object code for the work may be a derivative work of the Library even though
the source code is not. Whether this is true is especially significant if the work can be linked
without the Library, or if the work is itself a library. The threshold for this to be true is not
precisely defined by law.
If such an object file uses only numerical parameters, data structure layouts and accessors,
and small macros and small inline functions (ten lines or less in length), then the use of the
object file is unrestricted, regardless of whether it is legally a derivative work. (Executables
containing this object code plus portions of the Library will still fall under Section 6.)
Otherwise, if the work is a derivative of the Library, you may distribute the object code for
the work under the terms of Section 6. Any executables containing that work also fall under
Section 6, whether or not they are linked directly with the Library itself.
129
130
Appendix A
Open Source Software Copyright Information
6. As an exception to the Sections above, you may also combine or link a “work that uses
the Library” with the Library to produce a work containing portions of the Library, and
distribute that work under terms of your choice, provided that the terms permit
modification of the work for the customer’s own use and reverse engineering for
debugging such modifications.
You must give prominent notice with each copy of the work that the Library is used in it and
that the Library and its use are covered by this License. You must supply a copy of this
License. If the work during execution displays copyright notices, you must include the
copyright notice for the Library among them, as well as a reference directing the user to the
copy of this License. Also, you must do one of these things:
a) Accompany the work with the complete corresponding machine-readable source
code for the Library including whatever changes were used in the work (which must be
distributed under Sections 1 and 2 above); and, if the work is an executable linked with
the Library, with the complete machine-readable “work that uses the Library,” as object
code and/or source code, so that the user can modify the Library and then relink to
produce a modified executable containing the modified Library. (It is understood that
the user who changes the contents of definitions files in the Library will not necessarily
be able to recompile the application to use the modified definitions.)
b) Use a suitable shared library mechanism for linking with the Library. A suitable
mechanism is one that (1) uses at run time a copy of the library already present on the
user’s computer system, rather than copying library functions into the executable, and
(2) will operate properly with a modified version of the library, if the user installs one, as
long as the modified version is interface-compatible with the version that the work was
made with.
c) Accompany the work with a written offer, valid for at least three years, to give the
same user the materials specified in Subsection 6a, above, for a charge no more than
the cost of performing this distribution.
d) If distribution of the work is made by offering access to copy from a designated
place, offer equivalent access to copy the above specified materials from the same
place.
e) Verify that the user has already received a copy of these materials or that you have
already sent this user a copy.
For an executable, the required form of the “work that uses the Library” must include any
data and utility programs needed for reproducing the executable from it. However, as a
special exception, the materials to be distributed need not include anything that is normally
distributed (in either source or binary form) with the major components (compiler, kernel,
and so on) of the operating system on which the executable runs, unless that component
itself accompanies the executable.
It may happen that this requirement contradicts the license restrictions of other proprietary
libraries that do not normally accompany the operating system. Such a contradiction means
you cannot use both them and the Library together in an executable that you distribute.
7. You may place library facilities that are a work based on the Library side-by-side in a
single library together with other library facilities not covered by this License, and distribute
such a combined library, provided that the separate distribution of the work based on the
Library and of the other library facilities is otherwise permitted, and provided that you do
these two things:
a) Accompany the combined library with a copy of the same work based on the Library,
uncombined with any other library facilities. This must be distributed under the terms of
the Sections above.
MSA-100-MI-VM
Installation and Operation Manual
b) Give prominent notice with the combined library of the fact that part of it is a work
based on the Library, and explaining where to find the accompanying uncombined
form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as
expressly provided under this License. Any attempt otherwise to copy, modify, sublicense,
link with, or distribute the Library is void, and will automatically terminate your rights under
this License. However, parties who have received copies, or rights, from you under this
License will not have their licenses terminated so long as such parties remain in full
compliance.
9. You are not required to accept this License, since you have not signed it. However, nothing
else grants you permission to modify or distribute the Library or its derivative works. These
actions are prohibited by law if you do not accept this License. Therefore, by modifying or
distributing the Library (or any work based on the Library), you indicate your acceptance of
this License to do so, and all its terms and conditions for copying, distributing or modifying
the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the Library), the recipient
automatically receives a license from the original licensor to copy, distribute, link with or
modify the Library subject to these terms and conditions. You may not impose any further
restrictions on the recipients’ exercise of the rights granted herein. You are not responsible
for enforcing compliance by third parties with this License.
11. If, as a consequence of a court judgment or allegation of patent infringement or for any
other reason (not limited to patent issues), conditions are imposed on you (whether by
court order, agreement or otherwise) that contradict the conditions of this License, they do
not excuse you from the conditions of this License. If you cannot distribute so as to satisfy
simultaneously your obligations under this License and any other pertinent obligations, then
as a consequence you may not distribute the Library at all. For example, if a patent license
would not permit royalty-free redistribution of the Library by all those who receive copies
directly or indirectly through you, then the only way you could satisfy both it and this
License would be to refrain entirely from distribution of the Library.
If any portion of this section is held invalid or unenforceable under any particular
circumstance, the balance of the section is intended to apply, and the section as a whole is
intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property
right claims or to contest validity of any such claims; this section has the sole purpose of
protecting the integrity of the free software distribution system which is implemented by
public license practices. Many people have made generous contributions to the wide range
of software distributed through that system in reliance on consistent application of that
system; it is up to the author/donor to decide if he or she is willing to distribute software
through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of
the rest of this License.
12. If the distribution and/or use of the Library is restricted in certain countries either by
patents or by copyrighted interfaces, the original copyright holder who places the Library
under this License may add an explicit geographical distribution limitation excluding those
countries, so that distribution is permitted only in or among countries not thus excluded. In
such case, this License incorporates the limitation as if written in the body of this License.
13. The Free Software Foundation may publish revised and/or new versions of the Lesser
General Public License from time to time. Such new versions will be similar in spirit to the
present version, but may differ in detail to address new problems or concerns.
131
132
Appendix A
Open Source Software Copyright Information
Each version is given a distinguishing version number. If the Library specifies a version
number of this License which applies to it and “any later version,” you have the option of
following the terms and conditions either of that version or of any later version published by
the Free Software Foundation. If the Library does not specify a license version number, you
may choose any version ever published by the Free Software Foundation.
14. If you wish to incorporate parts of the Library into other free programs whose
distribution conditions are incompatible with these, write to the author to ask for
permission. For software which is copyrighted by the Free Software Foundation, write to the
Free Software Foundation; we sometimes make exceptions for this. Our decision will be
guided by the two goals of preserving the free status of all derivatives of our free software
and of promoting the sharing and reuse of software generally.
No Warranty
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE LIBRARY “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO
THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY
PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES
ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT
LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES
SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH
ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF
THE POSSIBILITY OF SUCH DAMAGES.
133
B
Glossary
601. An international standard (ITU-R BT.601) for component digital television. It defines
the sampling systems, matrix values, and filter characteristics for digital television.
8 VSB. Vestigial sideband modulation with 8 discrete amplitude levels.
16 VSB. Vestigial sideband modulation with 16 discrete amplitude levels.
Advanced Television Systems Committee (ATSC). The parent organization that
developed, tested and described the form and function of the US digital television formats.
AES/EBU. A digital audio standard established jointly by the Audio Engineering Society
(AES) and the European Broadcasting Union (EBU).
Artifacts. Unwanted visible effects in the picture created by disturbances in the
transmission or image processing, such as edge crawl or “hanging dots” in analog pictures,
or “pixilation” in digital pictures.
Aspect Ratio. The ratio of horizontal to vertical dimensions. A square has an aspect of 1:1
since the horizontal and vertical measurements are always equal. Current television screen
aspect ratios are 4:3 and 16:9.
Asynchronous Serial Interface (ASI). A transmission method adopted by the DVB, and
called DVB-ASI. The transmission method allows for the transport of varying data payloads
in a constant data stream. The DVB-ASI transport stream rate is 270 Mb/s.
Audio Breakaway. Routing video and accompanying audio in separate signal paths.
Audio-Follow. Routing video and accompanying audio together in the same signal path.
Auto Trans. Automatic transition; the execution of a single wipe or fade from current
picture to another picture by way of an automatic device.
Bandwidth. The range of frequencies used to transmit information such as picture and
sound.
Baseband Video. An unmodulated video signal.
Black. Also color black, blackburst. A composite color video signal that has the composite
sync, reference burst, and a black video signal.
Blanking Processor. A circuit which removes sync, burst and blanking from the program
video and then replaces it with sync, burst and blanking from the reference input. The
process ensures constant sync and burst levels on program video.
134
Appendix B
Glossary
Border. An electronically-generated picture member which is used in wipes to separate the
two video sources used in the wipe. It is of even thickness and has color produced by the
matte generator.
Broadcast Legal. Encoding video signal parameters to conform to prescribed limits for
broadcast. Encoding rules vary by NTSC, PAL, country and broadcast facility.
BTSC. Broadcast Television Standards Committee. A US standard for stereo audio encoding
in NTSC broadcast television.
CAV. Component Analog Video
CDP. Caption Distribution Packet
CES. Consecutive Errored Samples
Composite Video. A single video signal that includes all color video and timing
information. A composite signal includes luminance, chrominance, blanking pulses, sync
pulses and color burst information.
Chrominance. The color portion of a video signal that represents the saturation and hue.
Black, gray and white have no chrominance; color signals have both chrominance and
luminance.
CH. Chroma
Chrominance/Luminance Delay. A measurement that indicates the amount to which
chrominance and luminance are aligned with respect to each other. A low C/L delay figure
can minimize the effects of ghosts or color offset on the received picture.
C/L Delay. Chrominance/Luminance Delay
Clipping. The electronic process of shearing off the peaks of either the white or black
excursions of a video signal for limiting purposes. Clipping is often performed prior to
modulation to limit the signal.
CMRR. Common Mode Rejection Ratio
Color Burst. The portion of a color video signal which contains a short sample of the color
subcarrier. It is used as a color synchronization signal to establish a reference for the color
information following it and is used by a color monitor to decode the color portion of a
video signal. The color burst acts as both amplitude and phase reference for color hue and
intensity. The color oscillator of a color television receiver is phase locked to the color burst.
Composite Sync. A signal consisting of horizontal sync pulses, vertical sync pulses and
equalizing pulses only.
CRC. Cyclical Redundancy Check
Crosspoint. An electronic switch, usually controlled by a button on the panel. Control logic
will allow for only one crosspoint, for each bus, to be switched “ON” on at a time.
D/A. Conversion of digital to analog signals.
DA. Distribution Amplifier
Data Element. An item of data as represented before encoding and after decoding.
MSA-100-MI-VM
Installation and Operation Manual
Decoded Stream. The decoded reconstruction of a compressed bit stream.
Decibel (dB). A logarithmic measure of the ratio between two powers, voltages, currents,
sound intensities, etc. Signal-to-noise ratios are expressed in decibels.
Default. A factory preset value or condition.
Demodulator. A receiver, such as for television broadcast, cable, and closed circuit
applications. A TV demodulator receives and processes off-air or cable RF signals and
provides baseband video and audio outputs.
DHCP. Dynamic Host Configuration Protocol
Differential Gain. A measurement that specifies how much the chrominance gain is
affected by the luminance level. Expressed as a percentage showing the largest amplitude
change between any two levels, it indicates how much color saturation variance occurs
when the luminance level changes.
Differential Phase. A peak-to-peak measurement that specifies the extent to which the
chrominance phase is affected by the luminance level. Expressed in degrees of subcarrier
phase, it indicates how much hue shift occurs with luminance level changes.
Digital Video Broadcasting (DVB). A specific project office of the European Broadcast
Union. This group has produced a set of digital broadcasting standards.
DSK. Down Stream Key, a keyer which is electronically located after (or down stream from)
all other functions of a switcher. The key resulting will appear to be on top of all other
pictures from the switcher.
DVITC, D-VITC. Digital Vertical Interval Time Code. Timecode information stored on
specific lines in the vertical blanking interval of a television signal.
EAV. End of Active Video in component digital systems.
EBU. European Broadcasting Union
Editor. A device or system which controls video tape recorders, video switchers, and other
related devices in order to electronically splice segments of recorded video into a finished
production.
EDH. Error Detection and Handling. A recommended practice defined in SMPTE RP 165. A
system to generate and then detect video data errors in serial digital video systems.
Effects Keyer. A keyer which is electronically located in the mix/wipe generator portion of
a switcher. The resulting key would appear under the down stream key.
EIA Rack Space or Unit. A specific size as designated by the Electronics Industry
Association. The rack unit is 19 inches wide, and is 1.75 inches tall. A device which requires
3 EIA rack units is 19 inches wide and 5.25 inches (3x1.75 = 5.25) tall.
Elementary Stream (ES). A generic term for one of the coded video, audio or other
variable length bit streams which are packetized to form MPEG-2 transport streams.
Consists of compressed data from a single source (audio, video, data, etc.). One elementary
stream is carried in a sequence of PES packets with one and only one stream ID.
135
136
Appendix B
Glossary
Embedded Audio. Digital audio information multiplexed onto a serial digital data stream.
Up to sixteen channels can be multiplexed on a single stream of 601 video, minimizing
cabling and routing requirement.
ENG. Electronic News Gathering
Encoded Clip Softness. In the encoded legalization process, “softness,” as applied to
encoded clips, refers to the processing of the video at the point of the clip. The clips are
applied in YCbCr color space. The clip point is either an immediate limit (no softness) or will
have a range of values leading to the clip point, all reduced to smooth the clip point to a
less immediate limit (softness).
Encoded Legalization. Limiting of the luminance and color difference signals such that,
once encoded into a composite video signal, the resultant encoded video does not violate
the maximum or minimum signal levels as defined by the specific encoding rules. NTSC and
PAL video plus various users of these types of video have many varied rules for maximum
and minimum encoding limits. Encoded legalization usually calculates first the encoded
luminance value and then the corresponding chroma value to make legalization
judgements.
Encoded Video. A combined single video signal that is constructed from either separate
GRB or luminance and two color difference video signals. NTSC, PAL, and SECAM are all
examples of encoded video.
Envelope Detection. An RF signal detection technique that does not respond to phase
variations in the carrier signal, enabling measurement of a transmitter’s incidental phase.
When used together with synchronous detection, envelope detection helps isolate either
video and/or RF as the causes of phase distortion.
External Key Input. This is an alternate source for key cut. This is usually a separate
external input to a switcher
Fade-thru-Black. A production technique which is a two step process. The first step will
fade the program video to black. The second step will fade from black to the video selected
on the preview bus. This is usually used in major scene transitions.
Fade-to-Black. A production technique which simply fades the program video to black and
program audio to silent. This is used to end programs and to escape from embarrassing
pictures or sounds.
Field. A picture or picture portion which is produced within one cycle of vertical
synchronization. In interlaced systems, a full picture or frame requires two consecutive
fields.
FM Trap. A circuit designed to minimize potential interference from strong FM signals in
receiving equipment, such as a TV demodulator. For example, an FM trap can attenuate
signals between 88-108 MHz to reduce interference on NTSC television channel 6.
Frame. A single full resolution picture as viewed in either a video or film system. In the case
of interlaced video, two consecutive fields provide all of the information of one frame. In
non-interlaced systems, one cycle of vertical synchronization produces a frame. A 60 Hz
interlaced system, produces 30 frames of video in one second. A 60 Hz progressive (or
non-interlaced) system, produces 60 frames of video in one second. Common frame rates
are 24 (film) 25, 29.97, 30, 50, 59.94 and 60.
Frame Synchronizer. An electronic device that synchronizes two or more video signals.
Using one input as a reference, it locks a second signal to the reference.
MSA-100-MI-VM
Installation and Operation Manual
Frame Store. An electronic method of capturing and storing a single frame of video.
Gamma. This term applies to the linearity of the change from black to white. Gamma
controls adjust the gray or 50% point of the video either up or down, with the effect of
changing the gray level of the video.
Gamut. The whole or total of whatever is being addressed. In color space, gamut refers to
all colors which are included in a particularly defined color group, such as 601 gamut.
Genlock (Generator Lock). A method of synchronization involving the generation of a
video signal that is time and phase locked with another signal.
GPI. General Purpose Interface
Headend. In a cable TV system, the facilities where program sources (satellite, terrestrial,
VTR, local) are received and remodulated for distribution through a cable plant.
Headless Operation. In Headless Operation, the MSA does not require local keyboard,
monitor and mouse to operate. All operation can be managed from remote locations.
High Definition Television (HDTV). High definition television has a resolution of
approximately twice that of conventional television in both the horizontal (H) and vertical
(V) dimensions and a picture aspect ratio (H to V) of 16:9.
High Level. A range of allowed picture parameters defined by the MPEG-2 video coding
specification which corresponds to high definition television.
HRC. Harmonically-Related Carrier
Hue. Color tint
HLS. HTTP Live Stream. A standard proposed by Apple for Internet streaming to iPhone,
iPad and similar devices.
ICPM. Incidental Carrier Phase Modulation. A measurement of picture carrier phase
distortion (affected by the video signal level) that occurs in the transmitter.
Installation Categories. Categories of measurements that occur on circuits attached or
not attached to a live electrical supply outlet. Installation Categories are as follows:

Category I is for measurements that occur on circuits not attached to a live electrical
supply outlet (115/230 VAC). The voltages come from secondary power sources. The
secondary power source includes circuits energized by low-voltage sources and
electronics such as batteries.

Category II is for measurements that occur on circuits attached to a live electrical supply
outlet (115/230 VAC).

Category III is for measurements that occur on equipment permanently connected to
the building. The distribution level equipment are usually fixed installations and circuit
breakers.

Category IV is for measurements that occur at the main electrical power supply.
IP. Internet Protocol
IRC. Incrementally-Related Carrier
I.R.E. Refers to the Institute of Radio Engineers, and is used as a unit of measurement. In
NTSC television, 1 volt of signal equals 140 IRE units.
137
138
Appendix B
Glossary
ISP. Internet Service Provider
Jitter. A deformation of a signal affected by poor synchronization.
Key. An effect in television where a selected portion of background video is removed and
replaced with another video.
Key Cut. In a key effect, this is the video which designates the portion of background video
which is removed.
Key Fill. In a key effect, this is the video which is used to replace the portion of background
video which was removed. This may be the same video as the Key Cut video.
Key Invert. In a key effect, this is an electronic action which reverses the polarity of the key
cut signal. It makes black appear as white, and white appear as black.
Key Mask. In a key effect, it uses a wipe pattern from the wipe pattern generator to restrict
the key cut from removing video in a portion of the screen. This requires the use of the wipe
pattern generator and the Mask/Preset Size controls.
Key Source. Another term which is the same as key cut.
Legalization. The modification of serial digital video to conform to analog color space
rules, as required by users.
LCD. Liquid Crystal Display
LED. Light-Emitting Diode
LFE. Low Frequency Effects
Lissajous. A display of the amplitude and phase relationships between two input signals.
LS. Left Surround
LTC. Longitudinal Time Code, A SMPTE timecode standard usually recorded onto the linear
audio track of a VTR.
Luminance. The degree of brightness (black and white portion of the video signal) at any
given point in the video image. A video signal is comprised of luminance, chrominance and
sync. If luminance is high, the picture is bright and if low the picture is dark. Changing the
chrominance does not affect the brightness of the picture.
Main Level. A range of allowed picture parameters defined by the MPEG-2 video coding
specification with maximum resolution equivalent to standard definition television.
Main Profile. A subset of the syntax of the MPEG-2 video coding specification that is
supported over a large range of applications. Applications include, MP@HL (Main profile at
high level) and MP@ML (Main profile at main level).
Mask/Preset Size. Uses the wipe pattern generator in the keyer portion of the effects
generator. This is used to adjust the size of a preset pattern or for adjusting the size of a
mask to block a portion of the key cut (source) from use in the keyer.
Matte Generator. An internal generator which can make any color, is used for border
color and may be used for key fill. It is identical to the Color Background Generator, but
simply used in other areas of the switcher.
MSA-100-MI-VM
Installation and Operation Manual
Mbps. Megabits Per Second
mV. Millivolts
M/E. Mix/Effects System
MP@HL. Main profile at high level
MP@ML. Main profile at main level
MPEG. Refers to standards developed by the ISO/IEC JTC1/SC29 WG11, Moving Picture
Experts Group.
MPEG-2. Refers to ISO/IEC standards 13818-1 (Systems), 13818-2 (Video), 13818-3
(Audio), and 13818-4 (Compliance).
Multicast. A means of targeting content to those devices that know to join the group
described by an Class D IP Address and Port combination.
Multi-Level Effects. Applies to any effects generator which can do more than one effect
at a time. Typically, a multi level switcher can produce a Key and a Background transition in
the same effects generator at one time.
NTSC. National Television Systems Committee, the color television system used in the
United States, Canada, Mexico and Japan.
NVRAM. Nonvolatile RAM
Packet Identifier (PID). A unique integer value used to associate elementary streams of a
program in a single or multi-program transport stream.
Packet. A packet consists of a header followed by a number of contiguous bytes from an
elementary data stream. It is a layer in the system coding syntax.
Packetized Elementary Stream (PES). The data structure used to carry elementary stream
data. The packets consist of a header followed by payload data, and a stream is a series of
packets which form an elementary stream and have a single stream identification.
PAL. Phase Alternation Line; the standard color television system in many European and
other countries.
Passive Looping. Video and audio signals routed through components, even if power is
removed. Signals are not amplified or processed, maintaining transparency.
Pedestal Level. An offset used in a video system to separate the active video from the
blanking level by maintaining the black level above the blanking level by a small amount.
PIP. Picture-in-Picture. A scaled view of the full motion video and audio level meters for a
given Program. The scaled view is usually arranged in a mosaic so that multiple Programs
can be viewed at once. The option exists to view PIP full screen on command to avoid any
scaling and minimize or eliminate format conversion.
Pixel. A Picture cell or Picture element representing one sample of picture information, such
as an individual sample of R, G, B, luminance or chrominance.
Pollution Degree. A measurement of the foreign materials such as conductive dust, gas,
and moisture between the internal areas of the product and the outside environment.
Pollution Degrees are 1,2 3, and 4.
139
140
Appendix B
Glossary

Pollution Degree 1 describes conditions where no pollution occurs or only dry,
nonconductive pollution occurs. This is normal for equipment located in clean rooms.
The pollution classified under Pollution Degree 1 has no environmental influence.

Pollution Degree 2 describes conditions where dry, nonconductive pollution occurs. This
is normal in an office environment. Temporary conductivity caused by condensation
may occur when the unit is not in service.

Pollution Degree 3 describes conditions where conductive pollution occurs, or dry,
nonconductive pollution occurs due to condensation. Rooms that cannot maintain the
moisture or temperature fall into this category. The location can only protect from
outside weather conditions such as direct sunlight, rain, snow, and wind. Industrial
areas can fall under Pollution Degree 3.

Pollution Degree 4 describes pollution that generates persistent conductivity through
conductive dust, rain, or snow. Pollution Degree 4 is for outdoor locations.
Preset. Refers to establishing any condition prior to use on the Program output. This term is
used in reference to wipe patterns and is often interchanged with Preview.
Preview. The video output channel used to view the intended Program results prior to the
execution of the next transition.
PRO Audio. A transmitted audio channel for talent cueing via Interrupt Foldback (IFB) to
ENG vans and remote applications. Some demodulators support PRO audio monitoring.
Program. A transport stream combination of a video stream and one or more audio and
data streams associated with that video stream. In analog terms, “Program” refers to the
Base Band video and audio produced by the final output of a switcher.
A program nominally has a video essence and one or more audio essences synchronized
with the video with dedicated clocking. It may also have associated data, synchronized or
unsynchronized with the audio and video. Other products may substitute the word “Flow”
for the word “Program.”
Program Association Table (PAT). A list of all programs that are in the ATSC data stream.
Program Map Table (PMT). A listing of all elementary streams that comprise a complete
(television) program.
Program Clock Reference (PCR). This is a time reference signal that is placed in MPEG
streams for the purpose of time coordinating various data streams.
Program and System Information Protocol (PSIP). Information sent out as part of an
ATSC transport stream which lists all of the video, audio, data and program information
contained in the stream. This is the “TV guide” for a given stream.
Progressive Scanning. Also non-interlaced. A system of video scanning where lines of a
picture are transmitted consecutively, such as with VGA monitor displays.
Push-push Toggle Switch. An electro-mechanical device which, when pushed, alternates
the condition of the switch. Push once, it’s off, push again, it’s on.
Quadrature Output. An output in a television demodulator used for measuring Incidental
Carrier Phase Modulation (ICPM) in a transmitter.
QPSK. Quadrature Phase Shift Keying, typically used by satellite downlinks.
MSA-100-MI-VM
Installation and Operation Manual
QAM. Quadrature Amplitude Modulation, the technique used by cable TV systems
(64-QAM and 256-QAM) to remodulate signals for distribution in a cable plant.
GRB Legalization. Limiting of luminance and color difference video signals such that, once
transcoded into GRB component video signals, the resultant video does not violate the
maximum or minimum signal levels as defined by component video level rules. Typically, the
maximum value for R, G, or B is 700 mV, and the absolute minimum value for any of these
signals is 0 mV.
Reclocking. The process of regenerating digital data with a clock recovered from the input
data.
Resolution. A measure of the finest detail that can be seen, or resolved, in a reproduced
image.
RS. Right Surround
RS-422. Recommended Standard number 422, an E.I.A. standard which describes a type of
data interchange. Television products use this standard as its communication format
between the electronics frame and editors, control panel and computers. An RS-422 line
may be extended up to 1,000 feet (304 m).
RTMP. Real Time Messaging Protocol. An Adobe proprietary protocol for streaming audio,
video, and data over the Internet.
RTP. Real-time Transport Protocol. A lightweight means of streaming a Program over a
network over top of UDP protocol.
RTSP. Real Time Streaming Protocol. A network control protocol used to control streaming
media servers.
Sampling. Process by which an analog signal is sampled to convert the analog signal to
digital.
SAP. Secondary Audio Program, used in television broadcast for second language
broadcasting, simulcasting, and separate audio programming.
Saturation. Color intensity
SAW Filter. Surface Acoustic Wave filter
Segment Error Rate (SER). A calculated average of uncorrected transport stream packets
vs. total packets as accumulated over a designated period of time.
SHDW. Shadow Tested. When a background program is described as being Shadow Tested,
the program under analysis and monitoring but not shown as PIPs is in the background with
no rendering of the decoded video essence and no display of audio level meters.
Shuffle. To swap between 1 of the potential 12 virtual screens that can be defined to
contain a group of program(s) under test. The virtual screen that shuffles to the foreground,
either manually or based on a timer, becomes the PIP mosaic. The virtual screen(s) that
switch the background each contain groups of SHDW program(s).
141
142
Appendix B
Glossary
Signal to Noise Ratio-Analog (SNR). A measurement of the noise level in a signal
expressed in dB (decibels) as a ratio of between the audio or video signal’s maximum
peak-to-peak signal voltage and the measured voltage of noise present when the signal is
removed. Higher SNR figures indicate that any noise introduced by system components will
not be perceived in the picture and sound output signals.
Signal to Noise Ratio-8VSB (SNR). As applies to 8VSB transmissions, this is a calculated
average power of the ideal signal divided by the actual demodulated signal power.
SMTP. Simple Mail Transfer Program. A generic method of e-mailing alerts to one or more
e-mail accounts located on known mail servers.
SMPTE. Society of Motion Picture and Television Engineers
SNMP. Simple Network Management Protocol. A UDP-based protocol where the device,
running an agent abstracts certain control and status variables as a database, responding to
“Set” commands or “Get” queries. The agent can also send notifications (traps) of alarms
to a management client such as Navigator, Bigfoot, or HP Openview.
Source. Any input that can be acquired over a physical channel. Examples include an RF
frequency, a DVB-ASI or a unique network stream from a subnet.
Standard Definition Television (SDTV). This term is used to signify a digital television
system in which the quality is approximately equivalent to that of NTSC. This equivalent
quality may be achieved from pictures originated at the 4:2:2 level of ITU-R BT.601 and
subjected to processing as part of the bit rate compression. The results should be such that
when judged across a representative sample of program material, subjective equivalence
with NTSC is achieved. The displayed picture may be either the traditional 4:3 or the
wide-screen 16:9 aspect ratio.
STL. Studio Transmitter Link
Synchronous Detection. A common detection technique used in television demodulators
that removes quadrature distortion, enabling comparison of transmitter output with video
input signal.
S-Video. Also Y/C. Transmits luminance and color portions separately via multiple wires,
thus avoiding the color encoding process and resulting loss of picture quality.
Tally. A system used to light lamps and indicate usage. Most production switchers have an
internal tally system to indicate selected functions, and which selected functions are
currently involved with Program.
TCP. Transmission Control Protocol
Telecine. A device used to convert film to video; movie film is digitally sampled and
converted to video frame by frame in real-time.
TCXO. Temperature Compensated Crystal Oscillator
THD. Total Harmonic Distortion
Transport Stream-ATSC (TS). Consists of the following: (1) Packets: 188 bytes - fixed
length with descriptive data, (2) Carries several programs, (3) has a PID which identifies the
type of TS packet (video, audio, other), and (4) carries descriptive information about the
program.
MSA-100-MI-VM
Installation and Operation Manual
UDP. User Datagram Protocol. A best-effort delivery of discrete datagrams that does not
rely on a client-server connection.
UHF. Ultra High Frequency
Unity Gain. An electronic term indicating that a signal will be neither amplified or
attenuated. One volt of signal level in results in one volt of signal level out.
Vector. A measure that has two individual properties: magnitude and direction.
Vector Clip. A special encoded clip version that limits only the Cb and Cr input video
signals and does not affect (nor is it affected by) the luminance component. This color-only
clip limits the maximum vector excursions as viewed in an encoded state and is intended for
users who wish to prevent encoded vectors from ever exceeding the perimeter circle of an
encoded vector display.
VHF. Very High Frequency
Virtual Screen. A container for PIPs and SHDW programs. Up to 12 virtual screens can be
defined and swapped. The virtual screen in the foreground shows PIPs, while up to 11 other
virtual screens in the background manage groups of SHDW programs.
VITC. Vertical Interval Time Code, a method for recording on to video tape the timecode
address for each video frame inserted in the vertical interval.
Waveform. A visual representation of a signal in the shape of a wave that plots amplitude
versus time.
White Level. The brightest part of a video signal, corresponding to approximately 1.0 Volt.
White Balance. An electronic process used to calibrate the picture for accurate color
display in different lighting conditions.
Wipe. A special effect in which two pictures from different video sources are displayed on
one screen. Production switchers and special effects generators provide numerous wipe
patterns varying from simple horizontal and vertical wipes to multi-shaped, multi-colored
arrangements.
XGA. High resolution 1024×768 non-interlaced (progressive) display monitor
XVGA. Extended Video Graphics Adapter
YPbPr. CAV format composed of luminance (Y) and two color difference signals (Pb and Pr)
Y/C. Also S-video. Describes the separation of video signal luminance and chrominance
components.
Zero Carrier Pulse (chopper). In a TV demodulator, removes the carrier in the vertical
interval for a short period, enabling depth of field measurement.
143
144
Appendix B
Glossary
145
Index
A
Active alarm tab 78
Add, batch 50
Adding sources 46
Adult content block 94
Alignment, video display 8
Analog clocks 8
Analysis data 6
Applicable standards 10
Application log tab 77
asiDeviceIndex 102
Aspect ratio, video display 8
Audience 1
Audio compression formats 113
Audio info tab 79
Audio layer analysis 115
Audio options 60
Auto capture 74
Automatic stream capture on error. See
Stream capture modes
B
Batch add 50
BISS description key, setting 52
Bit Rate tab 62
C
Capture
auto 74
manual 75
Class D addresses 101
Clock keywords 99
Clocks
analog 8
digital 8
Clone mode 9
Closed caption 113
Closed caption tab 82
Compression formats 112
Concepts 12, 41
Content block 94
contentBlockage 102
Control panel GUI 43
Controls tab 59
Controls, layouts 56
Copyrights 117–132
Cambridge Broadband Ltd. 118
Cisco/BUPTNIC 120
CMU/UCD 117
Fabasoft R&D Software GmbH & Co.
KG 121
Networks Associates Technology 118
Sparta, Inc. 120
Sun Microsystems, Inc. 119
Custom
labeling 8
layout 8
Custom layout 98, 103
See alsoGrid layout
D
Data logging 7
Data overlay 61
Data traffic monitoring 7
Deleting sources 50
Digital clocks 8
Directives
RoHS 3
WEEE 3
Display
alignment 8
aspect ratio 8
program 93
Documents, obtaining 2
Dual monotor support 9
146
Index
E
Editing layouts 52, 53–58
Email/SMS tab 77
Error display 8
Errors 61
F
Features 5
Finding information 1
Formats, compression 112
G
Glossary 133–143
Grid layout 54
Grid position numbering 103
GUI, control panel 43
H
Highlight keywords 99
Highlight window 60, 96
editing 52, 53–58
grid 54
keywords 98
Licenses 37
FreeType 117
GNU lesser public 126–132
GNU v2 121–125
LibJPEG 117
Loading source lists 52
Logging data 7
M
Main features 5
Main video window 92
Managing persistent sources 51
Manual capture 75
Manual information 2
Manual stream capture. See Stream capture modes
Modes
clone 9
stretch 9
Monitor, dual support 9
MSA source list 98, 103
MSAServer.EXE 105
multicastGroup 101
I-J
IANA 101
igmpv3FilterMode 102
igmpv3FilterStr 102
Initial checks 107
Installation
remote client 33
interface 101
Item list 55
K
Key terms 12, 41
Keywords
clock 99
highlight 99
layout 98
sources 99
L
Labeling, custom 8
Layouts
controls 56
custom 8, 98, 103
N
namePipe 101
O
Obtaining document 2
On screen error display 8
Open source software 117–132
Cambridge Broadband Ltd. 118
Cisco/BUPTNIC 120
CMU/UCD copyright notice 117
Fabasoft R&D Software GmbH & Co.
KG 121
FreeType license 117
GNU lesser public license 126–132
GNU v2 license 121–125
LibJPEG license 117
Networks Associates Technology 118
Sparta, Inc. 120
Sun Microsystems, Inc. 119
Options
audio 60
video 60
MSA-100-MI-VM
Installation and Operation Manual
P
Persistant sources, managing 51
Pic Graph tab 64
PIP alarm bar 96
port 101
Product concepts 12, 41
Program display 93
Program information 59
Program manager tab 46
Program, shuffle 53
ProgramSelMask 100
ProgramSelNum 100
Protocols specifications 111
PSI table analysis 62
PSI/SDP tab 62
PSIP table analysis 62
Q
Quant Graph tab 66
R
RA. See Return authorization
Radio layout. See Grid layout
Remote client 33, 88
Resource monitor tab 80
Restriction on Hazardous Substances
(RoHS) directive 3
Return authorization 12
Revisioin history 2
rfDeviceIndex 102
rfModulation 102
RTP packet capture format 7
S
Safety
directives 3–4
information 12
SAP listener tab 81
SAP. See Session announcement protocol
Saving source lists 52
Screen, virtual 9
SDP table analysis 62
Service 12
Session announcement protocol 9
Setting BISS description keys 52
Settings
traffic log 76
Shipments, returning to Imagine Communications 12
Show history window 68
Show log window 68
Shuffle program 53
SI table analysis 62
Source info tab 91
Source list management 98
SourceID 100
Sources
adding 46
deleting 50
keywords 99
managing persistant 51
MSA sources list 98
source list 103, 104
source list management 98
Source list text 103
source lists
loading 52
saving 52
SourceType 100
Specifications
audio layer analysis 115
protocols 111
table analysis 114
transport layer analysis 113
video layer analysis 115
Standard features 5
Standard layout. See Grid layout
Standards 10
Startup setting 61
Status, traffic 60
Stream capture modes 6
Streaming tab 90
Stretch mode 9
Support
SAP 9
Support for dual monitors 9
T
Table analysis 114
PSI 62
PSIP 62
SDP 62
SI 62
TABS
PSI/SDP 62
Tabs
active alarm 78
Application log 77
audio info 79
bit rate 62
closed caption 82
controls 59
email/sys 77
147
148
Index
pic graph 64
program manager 46
quant graph 66
Resource monitor 80
SAP listener 81
source info 91
streaming 90
test 67
traffic log 75
users 88
video info 63
virtual screen 44
wave monitor 79
XDS 82
Terms 12, 41, 133–143
Test schedule 74
Test settings window 69
Test tab 67
Text, source list 103
Traffic log
settings 76
tab 75
Traffic monitoring 7
Traffic status 60
Transport layer analysis 113
Troubleshooting 107–109
U
UCD copyright notice 117
Updating licenses 37
URL 102
Users tab 88
V
VBI data overlay 61
Video compression formats 112
Video display alignment 8
Video display aspect ratio 8
Video Info tab 63
Video layer analysis 115
Video options 60
Video quality tuneup 61
Virtual screen 9
Virtual screen tab 44
W-X-Y
Waste from Electrical and Electronic Equipment (WEEE) directive 3
Wave monitor tab 79
Windows
highlight 96
main video 92
show history 68
show log 68
test settings 69
Writing conventions 2
XDS
data 113
tab 82