SlideShare a Scribd company logo
1 of 69
Download to read offline
AKHILGARG
2011
VIDEOSURVEILLANCESYSTEM:
ACASESTUDY
With the development and globalization of human social activities,
Surveillance systems have become increasingly important and popular
in the public places such as banks, airports, public squares, casinos and
other places.
Case study made in:
VVDN Technologies Pvt. Ltd.
1241/36, Atul Kataria Chowk, Gurgaon
+91 124 4147642, +91 124 4378539
1 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
ACKNOWLEDGEMENT
First of all I would like to thanks Supreme Power “Almighty God” for his blessings showered on
us during the project work without him nothing is possible.
Really it gives me immense pleasure to express my feelings of gratitude & reverence to people
who helped me in accomplishment of this project “Video Surveillance System: A Case Study” so
successfully.
The efforts put by me during the development of this project would have not been fruitful, had it
not been the people around us, who encouraged and helped us at all times.
I feel proud to do this project in VVDN Technologies in the Hardware Lab. I am highly pleased
to express my deep sense of gratitude to my project guide Mr. Himanshu Garg & Mr. Hemant
Sharma for their valuable guidance, suggestions and constant supervision at every stage. I will
remain ever grateful to them for their encouragement during the project.
Finally I want to thank all staff members of Hardware Lab for their very important support and
cooperation.
2 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
CERTIFICATE
TO WHOM SOEVER IT MAY CONCERN
Dated: __________
This is to certify that Mr. AKHIL GARG, student of PANIPAT INSTITUTE OF
ENGINEERING & TECHNOLOGY, Panipat has successfully completed his six weeks
Industrial Training in VVDN Technologies, Gurgaon and submitted the project entitled “Video
Surveillance System: A Case Study”.
All his work is genuine and original and was timely completed. His conduct was found out to be
very satisfactory and his work has enabled us to add value to the organization and we wish him
success for his future.
Mr. Puneet Aggarwal Mr. Rajesh Kumar
Dy. Manager (A.P. ECE)
(VVDN, Gurgaon)
Mr. Himanshu Garg
(Project Guide)
3 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
INDEX
1. Surveillance .........................................................................................................................................8
1.1. Video Surveillance System...........................................................................................................8
1.1.1. IP based Video Surveillance System ....................................................................................9
1.2. Benefits of Video Surveillance ...................................................................................................9
2. Emerging market trends in video surveillance...............................................................................13
2.1. General trends...........................................................................................................................13
2.2.1. Video based fire detection ................................................................................................15
2.2.2. Toll plaza video AVCC (Automatic vehicle counting & classification)........................16
2.2.3. Abandoned Object Detection ...........................................................................................17
2.2.4. Intrusion Detection ...........................................................................................................18
2.2.5. Video Enhancement..........................................................................................................19
2.2.6. Perimeter breach detection ..............................................................................................20
2.2.7. Indoor people counting.....................................................................................................21
2.2.8. Object removal detection..................................................................................................22
2.2.9. Stopped vehicle detection .................................................................................................23
2.2.10. Camera Tampering detection ..........................................................................................24
2.2.11. Privacy Masking................................................................................................................24
2.3. Emerging application areas......................................................................................................25
2.3.1. Retail ..................................................................................................................................25
2.3.2. Transportation ..................................................................................................................26
2.3.3. Education...........................................................................................................................26
2.3.4. Industries ...........................................................................................................................27
2.3.5. City surveillance................................................................................................................27
2.3.6. Government.......................................................................................................................27
2.3.7. Healthcare..........................................................................................................................28
2.3.8. Banking and finance .........................................................................................................28
3. Network cameras ..............................................................................................................................30
3.1. Classification of network cameras on the basis of their appearance and application area 31
3.1.1. Fixed box network cameras .............................................................................................31
4 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3.1.2. Fixed Dome Network Cameras........................................................................................32
3.1.3. PTZ Cameras ....................................................................................................................33
3.2. Classification of network camera on the basis of their Functionality..................................34
3.2.1. Day and night network cameras......................................................................................34
3.2.2. HDTV, Megapixel or standard resolution camera.........................................................35
3.3. How the IP Cameras are made / assembled............................................................................37
3.3.1. Part list for assembling FALCON camera......................................................................37
3.3.2. Assembly Line document..................................................................................................41
Assembly line deatils...................................................................................................................................41
Falcon Assembly..........................................................................................................................................41
PCB Assembly..............................................................................................................................................41
Encoder,Power & IO boards.......................................................................................................................41
4. Possible connectivity options............................................................................................................53
4.1. Basic terms used in connectivity..............................................................................................53
4.2. Wired IP Surveillance System .................................................................................................55
4.2.1. Types of Ethernet networks:............................................................................................55
5. A typical video surveillance system at one live site named as “Macawer Beekay”.....................62
5.1. Solution explanation .................................................................................................................63
5.2. Solution components.................................................................................................................63
5.2.1. Remote Surveillance Camera Units:...................................................................................63
5.2.2. Weather-proof Camera Housings........................................................................................63
5.2.3. L2 Switch 24 port................................................................................................................64
5.2.4. Wireless Communication devices.......................................................................................64
5.2.4.1. Camera CPE’s.................................................................................................................64
5.2.4.2. BTS .................................................................................................................................64
5.2.5. Video management system ...............................................................................................65
6. CONCLUSION .................................................................................................................................67
7. REFERENCES..................................................................................................................................68
5 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
ABOUT THE COMPANY
VVDN stands for Video Voice Data Networking. VVDN provides design services & solutions in
Voice, Video, Data and Networking domains. VVDN has strong experience in designing end-to-
end solutions for Video Surveillance and Networking Domain
Embedded Systems
Hardware Design & Development
System Board Design, PCB layout,
Verification & Validation (V&V), Low
Power Designs, Hardware
Integration.
System Software Engineering
RTOS, Design Methodologies, DSP,
Protocol Development, Software
Porting, Interface Integration,
Algorithms.
Design Services
End to End development of
IP/Network camera, Video
Surveillance, Video Analytics.
Networking
Wireless Networking
Wifi, WiMax, routers, USB ,
bluetooth, Wireless LAN (IEEE
802.11), GSM, RF, Mobile
processors
Wired Networking
LAN/WAN, Ethernet, Operating
Systems: Microsoft, Linux, Unix,
VxWorks.
Equipment’s
Servers, Blade Servers, Handheld
Devices. Mobile Engineering.
Telecom Applications
Integrated Services & Solutions
Commutation Equipment, Devices.
VOIP Solutions
IAD, IP Phones, IP PBX, Office-in-
box, Residential Gateway, CPE’s.
Operation Support Services
Enterprise Applications, Support
Applications, J2EE Framework, Web
Applications, Security.
We aim at providing high quality software engineering products and services to our clients. We
always adhere to minimal time frame for completing our client orders so that our customer
remains competitive and become more productive in market. VVDN believes in automation to
reduce project lifecycle and to increase the efficiency in terms of resources and expenses.
Besides this, we assure that we deliver for what we agreed for with our customer. In a nutshell,
we guarantee delivery of our products & services to customers while maintaining cost efficiency
and faster turnaround time for marketing, and thus is our motto “Certainty of Outcome”
We specialize in development of customized solutions which helps our customers in achieving
their objectives. We provide technical services which includes Software Development Lifecycle;
Video Surveillance, Wireless, Networking, and Telecom solutions to design, develop and
execute technology projects.
Our Product Development Methodology and Line of Attack Service Strategy is associated with
customer profitability thereby increasing internal customer value intimately. We also believe in
achieving customer confidence in our deep capabilities in software / hardware areas of embedded
systems, in networking as well as in electronic industry.
6 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Contents
Part I: What is Video Surveillance?
Part II: Market Trends in Video Surveillance
Part III: What are Network Cameras and How They are made?
Part IV: Possible Connectivity Medium
Part V: A Typical Surveillance System and its Components
7 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Part I
What is Video Surveillance?
8 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
1. Surveillance
Definition: Surveillance is the monitoring of the behavior, activities, or other changing
information, usually of people and often in a superstitious manner. Surveillance is
a French word meaning "watching over". It most usually refers to observation of individuals
or groups by government organizations, military, schools, hospitals and several other public
places.
The word surveillance may be applied to observation from a distance by means of electronic
equipment (like CCTV or IP cameras), or interception of electronically transmitted
information (Internet traffic or phone calls).Surveillance is very useful to governments and
law enforcement to maintain social control, recognize and monitor threats, and
prevent/investigate criminal activity.
1.1. Video Surveillance System
Video Surveillance System uses video cameras for the purpose of observing an area.
They are often connected to a recording device, IP network, and are watched by an
officer. Cameras and recording equipment used to be relatively expensive and required
human personnel to monitor camera footage. Now with cheaper production techniques, it
is simple and inexpensive enough to be used in home security systems, and for everyday
surveillance. Analysis of footage is made easier by automated software that organizes
digital video footage into a searchable database, and by automated video analysis
software (such as VIRAT and Human ID). The amount of footage is also drastically
reduced by motion sensors which only record when motion is detected.
Figure: Surveillance Cameras
9 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
1.1.1. IP based Video Surveillance System
IP-Surveillance System is a system that gives users the ability to monitor and record
video/audio over an IP (Internet Protocol-based) computer network such as a local
area network (LAN) or the Internet. In a simple IP-Surveillance system, this
involves the use of a network camera (or an analog camera with a video
encoder/video server), a network switch, a PC for viewing, managing and storing
video, and video management software.
Figure: IP based Video Surveillance System with alarm integration
1.2. Benefits of Video Surveillance
The digital, network video surveillance system provides a host of benefits and advanced
functionalities that cannot be provided by an analog video surveillance system. The
advantages include remote accessibility, high image quality, event management and
intelligent video capabilities, easy integration possibilities and better scalability,
flexibility and cost-effectiveness.
 Remote accessibility: Network cameras and video encoders can be
configured and accessed remotely, enabling multiple, authorized users to view
live and recorded video at any time and from virtually any networked location in
the world. This is advantageous if users would like a third-party company, such
as a security firm, to also gain access to the video. In a traditional analog CCTV
system, users would need to be at a specific, on-site monitoring location to view
and manage video, and off-site video access would not be possible without such
equipment as a video encoder or a network digital video recorder (DVR). A DVR
is the digital replacement for the video cassette recorder.
10 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
 High image quality: In a video surveillance application, high image quality
is essential to be able to clearly capture an incident in progress and identify
persons or objects involved. With progressive scan and megapixel technologies,
a network camera can deliver better image quality and higher resolution than an
analog CCTV camera.
 Event management and intelligent video: There is often too much
video recorded and lack of time to properly analyze them. Advanced network
cameras and video encoders with built- in intelligence or analytics take care of
this problem by reducing the amount of uninteresting recordings and enabling
programmed responses. Such functionalities are not available in an analog
system.
Network cameras and video encoders have built-in features such as video motion
detection, audio detection alarm, active tampering alarm, I/O (input/output)
connections, and alarm and event management functionalities. These features
enable the network cameras and video encoders to constantly analyze inputs to
detect an event and to automatically respond to an event with actions such as
video recording and sending alarm notifications.
 Easy, future-proof integration: Network video products based on open
standards can be easily integrated with computer and Ethernet-based information
systems, audio or security systems and other digital devices, in addition to video
management and application software. For instance, video from a network
camera can be integrated into a Point of Sales system or a building management
system.
 Scalability and flexibility: A network video system can grow with a user’s
needs. IP-based systems provide a means for many network cameras and video
encoders, as well as other types of applications, to share the same wired or
wireless network for communicating data; so any number of network video
products can be added to the system without significant or costly changes to the
network infrastructure. This is not the case with an analog system. In an analog
video system, a dedicated coaxial cable must run directly from each camera to a
viewing/recording station. Separate audio cables must also be used if audio is
required.
11 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
 Cost-effectiveness: An IP-Surveillance system typically has a lower total
cost of ownership than a traditional analog CCTV system. IP-based networks and
wireless options are much less expensive alternatives than traditional coaxial and
fiber cabling for an analog CCTV system. In addition, digital video streams can
be routed around the world using a variety of interoperable infrastructure.
Management and equipment costs are also lower since back-end applications and
storage run on industry standard, open systems-based servers, not on proprietary
hardware such as a DVR in the case of an analog CCTV system.
 Power over Ethernet technology: PoE cannot be applied in an analog
video system, can be used in a network video system. PoE enables networked
devices to receive power from a PoE-enabled switch or midspan through the
same Ethernet cable that transports data (video). PoE provides substantial savings
in installation costs and can increase the reliability of the system.
Figure A system that uses Power over Ethernet.
12 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Part II
Emerging Market Trends in Video
Surveillance
13 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2. Emerging market trends in video surveillance
2.1. General trends
 Gone are the days when grainy, black and white CCTV cameras attached in discreet
corners would fix themselves on immovable paths. IP surveillance is a need now. It is
now monitored by security experts switching channels from their laptop in another part of
the city, analyzing various aspects and behavior. As in-situations and popular campuses
turn into soft targets, surveillance has been shifted from the admin to the IT department.
 The IP surveillance system needs an initial investment but it transfers the entire load on
the network making it more mobile and easier to guard.
 An Axis communication study said that with if there were more than 32 cameras on a
network, IP surveillance would be cheaper to own in comparison to the traditional analog
option.
 The costs can further decrease when cameras are configured to a router and can operate
wirelessly hence reduce the sizable, hid-den wiring hassle.
 Cameras now come equipped with the ability to acquire power over the Ethernet.
 The HD quality allows for clearer quality and smarter identification.
 The cameras are usually connected to a network video recorder to handle recording,
video and alarm management. These cameras are better high-quality Web Cams and can
thus be routed to be viewed on remote screens as well.
 The software, that comes, allows users to map movements and suspicious objects on the
camera's range.
 An alarm can then be triggered and the alert can be sent in the form on an automatically
generated phone call, text message and even email to certain set of people or the control
center.
 “IIT Mumbai has implemented IP surveillance to observe the entrances and exits,” said
Navinder Chauhan, D-Link. Chauhan explained that after the IT department took over, a
company would be able to handle it better since streams can then be diverted to tablets or
even smart-phones. This helps in keeping a constant watch and with-out someone
monitoring movements, while sitting all night in front of a television screen.
 The cameras not only help in identification of regular offences, the software given with
them can link images with a database of the undesirables provided by the police or by an
internal authority and can raise an alarm.
14 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2. Newest market Trend : Video analytics
VMS is integrated with comprehensive cluster of advanced Video Analytic Algorithms.
Each Video Analytic Module is coupled with Incident-Event-Action framework. User
can set different actions on each Video Analytic events.
 Abandoned Object Detection
 Video Based Fire Detection
 Zone Intrusion Detection
 Automatic Video Image Enhancement
 Boundary Loitering Detection
 Intelligent People Counting
 Object Removal Detection
 Perimeter Tripwire
 Stopped Vehicle Detection
 Camera Tampering Detection
 Toll Plaza Vehicle Classification
Each of the above Video Analytics can be run both in manual and auto mode with
scheduled presets. On each event detection VMS would send alerts to appropriate
security personnel. DiCortex Alert Management Framework supports alerts in the form
of Sound alarms, Email, SMS, camera alarm. Above all Video Analytics are equipped
with False Alarm Suppression Technology (FAST) which minimizes false alarms and
further strengthens the solution reliability.
15 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.1. Video based fire detection
Sensor based Fire Alarms detects fire by monitoring the environmental changes
associated with combustion. But these systems got some limitations in covering
wide physical area.
Video Based Fire Detection technology further strengthen the IP Video Surveillance
solutions. It works using advanced Image processing and Pattern Recognition
algorithm. This analytic has been tested in wide variety of scenarios ranging of
normal indoor mild fire to forest fires. System can alert the user based on the
intensity and duration of the fire occurrence.
False Alarm Suppression Technology (FAST) further helps in adding more
reliability to this Video Analytic.
Figure: Detection of fire by Fire detection analytic
16 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.2. Toll plaza video AVCC (Automatic vehicle counting &
classification)
Advanced Technology for Vehicle Counting and Classification is Easy to Install and
Use for existing Toll Plaza. It has edge over conventional Hardware sensors based
AVCC (Automatic Vehicle Classification) in terms of interoperability. AVCC
solution is capable of detecting and classifying the vehicles into different classes
such as BIKE, CAR, LCV, 2-Axle HCV, 3-Axle HCV and OSV. It can be easily
integrated with existing Toll Plaza Ticketing Management Software. The solution
can be used for both Real time validation of Operator issues tickets and also offline
Audit of the Ticketing System.
Key Advantages
 Easy to Install and Operate
 No need of Hardware sensors
 Open Framework for Easy Integration
 Recording the Vehicle Snapshot
 Advanced Reporting and Statistics
 Integrated with i2V Video Management
Software
 Better Accuracy for Vehicle Detection &
Classification
17 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.3. Abandoned Object Detection
This is one of most important and crucial Video Analytic Algorithm which serves many
of the current security requirements. It became practically impossible to human beings
for round the clock monitoring of the crowded areas like Airports, City Metro Stations
etc. Our Solutions mainly aims at detecting the suspicious objects, unattended baggage
etc. Algorithm is specially tuned to handle crowded scenes. This analytic adds the
maximum intelligence to surveillance applications.
Figure: abandoned object detection by camera
 Very accurate even in low light conditions
 Well-tuned to handle crowded scenarios like Airports, Metro stations
 System can learn from the user feedback in case of false alarms
 Pre Event recording feature is available with this analytic
 Ideal for detecting the bomb baggage in public places
 Useful for detecting the Foreign objects on Railway tracks
 Well suited to places like Shopping malls, Airports, Metro Stations etc.
18 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.4. Intrusion Detection
This is the process of locating a moving object in a prohibited or restricted area in
time. The algorithm analyses the video frames and outputs the location of moving
targets within the frame. Video based Intrusion detection (VID) is a way of defining
activity in a scene by analyzing image data and differences in a series of images.
The functionality is made available with video management software. System
allows you to set the activity threshold depending on what you want to monitor.
System has the capability to set the sensitivity for indoor or outdoor conditions to
avoid false alarms.
Figure: Intrusion detected by camera
 Support Multiple Intrusion Zones with a Single Camera.
 Direction based Intrusion detection with regular shapes.
 User can get Zone based Alarms
 Global Parameter Control Over the System
 Minimal False Alarm Rates
 Well customized to Indian Requirements
 Automatic Image enhancement Controls for Bad light Scenarios
 Well-tuned with Low Frame Rate and Low Resolution Input
 Supports the feature of scheduled automatic on/off of this Analytics module.
 Supports Wide variety of Intrusion Zones shapes starting with Simple
Rectangle to Any sized Polygon
 User can define Directional based Intrusion for Regular Shaped Zones like
Square, Rectangle.
19 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.5. Video Enhancement
This analytic automatically converts the low contrast and low brightness video to
enhanced video. It intelligently enhances the quality of the video by analyzing the
local and global features in each frame of the video. Automatic Video Image
enhancement can be used in following cases:
 Enhancing Video containing Fog
 Enhancing the Video containing Low light
 Enhancing the Video in Rainy season
Figure: Video Enhanced by Analytic
 This feature is available at run time both while recording and playback.
 Useful while viewing the videos covered with Fog or Rain
 It can always play or record the better quality night time videos
 Scheduled application of this feature is possible with VMS
 Advanced image enhancement techniques were used to improve the video
quality.
20 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.6. Perimeter breach detection
This is a Trespassing Detection Analytic which can detect the trespassing of humans
in restricted areas. Any number restricted areas can be selected by the user. This
analytic is also capable of sending zone based alerts. This is different from
conventional Intrusion detection systems in terms of Human tracking over the
selected zones. Once the system detects the possible Trespasser, then it starts
transmitting audio and visual signals to the monitoring workstation at the local
security office
Figure: Perimeter breach detected by analytic
 Support a combination of Multiple Zones.
 Allows different Parameter Settings for Each Zone.
 Zone highlighting when it detects the trespasser.
 Global parameter Control over all selected Zones.
 Automatic Image enhancement Controls for Bad light Scenarios
 Supports the feature of scheduled automatic on/off of this analytics module.
 As each Zone is identified with a unique identifier, user can get to know
exact zone where trespassing occurred.
21 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.7. Indoor people counting
People Counting is one of the Video Analytic module which helps in Statistical
analysis of Human flow inside any building or premises. Our People Counting
algorithm is well suited to such requirements. The system gives a real time
indication of number of visitors inside the store or building. It creates a Virtual line
or Virtual zone for counting operation. Later system starts tracking the Human
Heads passing over the virtual line. User can adjust the position of the line over
entire image.
Figure: People counting done by Video analytic
 The use of people counting systems can prove very useful in the retail
environment to calculate the conversion rate.
 It is useful in counting the people in exhibitions so that to avoid overcrowding.
 Can be used in estimating the better ways to evacuate any building by
knowing the total people count in advance.
 Helps in getting the routing information as the cameras not only count people,
but they also sense the direction of movement to determine the route people take
inside the store.
 Useful in knowing the Average dwell time of people inside the building.
 Helps in better Staff planning by having people flow statistics
22 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.8. Object removal detection
This is the way of protecting valuables without any human monitoring. User can select
the objects which need to be watched by the camera. Whenever object is found missing,
then system will generate alarms.
Your camera will acts as a virtual guard for the valuable objects. With this analytic 24x7
monitoring of the valuable objects is possible. User can also configure the time after
which alarm should be raised once the system detects missing object.
Figure: Missing object detection by analytic
 Very simple & user friendly graphical interface with minimal mouse clicks.
 Effective for 24x7 round the clock monitoring with even minimum illumination.
 User can select any number of objects to be watched by the Analytic.
 Very good performance even for watching multiple objects in the single
video.
 Well suited to Indian Requirements
 Very useful for round the clock monitoring of valuables in Museums.
 Can be used of protecting the sensitive objects put for show case like gold,
ornaments etc.
 Can be used for Equipment monitoring of computers, servers in sensitive server
rooms.
 Can be used for protection of assets in banks and other financial locations.
 Useful for eye watch of items put for display during product exhibitions.
23 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.9. Stopped vehicle detection
Most of the road accidents are mainly due to stopped vehicles. Our analytics is capable of
detecting a stopped vehicle in multiple scenarios. Once the system detects the stopped
vehicle, it is capable of taking the zoomed snapshot of the vehicle which includes the
License Plate number image of vehicle.
It can detect any stopped vehicle on roads. Once the user selects any No-Parking area,
system starts detecting vehicle coming close to it. If any vehicle lowers its speed or trying
to stop in No-Parking zone, then system will start alerting the user for illegal halting.
User can select any number of zones in the video and each zone can have its own
configurable parameters. Here time duration for which vehicle is allowed to halt is also
configurable.
Figure: Stopped vehicle detected by camera
o By this system we can prevent any kind of illegal parking or illegal halting on the
roads, premises etc.
o It would be very useful to prevent traffic jams in crowded areas because of the
illegal halting.
o With this analytic we can also detect the vehicle which needs assistance
o Illegal halting for long period of time can be detected & alerted to security for any
unusual activity like BOMB or Explosive material in the vehicle
24 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.10. Camera Tampering detection
This is Advanced Video based camera tampering detection analytic which can be
coupled with any of the rest of Video Analytics. This Video Analytic further adds
strength to the video solution by continuously monitoring the video feed from the
camera. Camera tampering event will be generated whenever camera is moved,
partially covered, severely defocused, paint sprayed etc.
2.2.11. Privacy Masking
Privacy masking, which allows certain areas of a scene to be blocked or masked
from viewing and recording, can be made available in various network video
products. In a PTZ camera or PTZ dome camera, the functionality has the ability to
maintain the privacy masking even as the camera’s field of view changes since the
masking moves with the coordinate system.
Figure: With built-in privacy masking (gray rectangle in image), the camera can guarantee privacy for areas that should not be covered by a
surveillance application.
25 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.3. Emerging application areas
Network video can be used in an almost unlimited number of applications; however, most of its
uses fall under security surveillance or remote monitoring of people, places, property and
operations. The following are some typical application possibilities in key industry segments
2.3.1. Retail
Network video systems in retail stores can significantly reduce theft, improve staff
security and optimize store management. A major benefit of network video is that it can
be integrated with a store’s EAS (electronic article surveillance) system or a POS (point
of sale) system to provide a picture and a record of shrinkage-related activities. The
system can enable rapid detection of potential incidents, as well as any false alarms.
Network video offers a high level of interoperability and gives the shortest return on
investment.
Network video can also help identify the most popular areas of a store and provide a
record of consumer activity and buying behaviors that will help optimize the layout of a
store or display. It can also be used to identify when shelves need to be restocked and
when more cash registers need to be opened because of long queues.
26 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.3.2. Transportation
Network video can enhance personal safety and overall security at air- ports, highways,
train stations and other transit systems, as well as in mobile transport such as in buses,
trains and cruise ships. Network video can also be used to monitor traffic conditions to
reduce congestion and improve efficiency. Many installations in the transportation sector
require only the best systems, involving high image quality (which can be provided by
progressive scan technology in network cameras), high frame rates and long retention
times. In some demanding environments such as on buses and trains, network cameras
that can withstand varying temperatures, humidity, dust, vibrations and vandalism are
required.
2.3.3. Education
From daycare centers to universities, network
video systems have helped deter vandalism and
increase the safety of staff and students. In
education facilities where an IT infrastructure is
already in place, network video presents a more
favorable and cost-effective solution than an
analog system because new cabling is often not
required. In addition, event management features
in network video can generate alarms and give
security operators accurate, real-time images on
which to base their decisions. Network video can
also be used for remote learning; for example, for
students who are unable to attend lectures in
person.
27 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.3.4. Industries
Network video can be used to monitor and
increase efficiencies in manufacturing lines,
processes and logistic systems, and for securing
warehouses and stock control systems. Network
video can also be used to set up virtual meetings
and get technical support at a distance.
2.3.5. City surveillance
Network video is one of the most useful tools for
fighting crime and protecting citizens. It can be
used to detect and deter. The use of wireless
networks has enabled effective city-wide
deployment of network video. The remote
surveillance capabilities of network video have
enabled police to respond quickly to crimes being
committed in live view.
2.3.6. Government
Network video products are used to secure all
kinds of public buildings, from museums and
offices to libraries and prisons. Cameras placed at
building entrances and exits can record who
comes in and out, 24 hours a day. They are used
to prevent vandalism and increase security of
staff. With intelligent video applications such as
people counting, network video can provide
statistical information, such as the number of
visitors to a building.
28 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.3.7. Healthcare
Network video enables cost-effective,
high-quality patient monitoring and
video surveillance solutions that
increase the safety and security of staff,
patients and visitors, as well as
property. Authorized hospital staff can,
for example, view live video from
multiple locations, detect activity and
provide remote assistance.
2.3.8. Banking and finance
Network video is used in security
applications in bank branches,
headquarters and ATM (automated teller
machine) locations. Banks have been
using surveillance for a long time, and
while most installations are still analog,
network video is starting to make
inroads, especially in banks that value
high image quality and want to be able
to easily identify people in a
surveillance video.
29 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Part III:
What are Network Cameras and how they
are made?
30 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3. Network cameras
A network or IP camera is a type of camera that can send and receive data via a computer
network and Internet. The main components of a network camera include a lens, an image
sensor, one or several processors, and memory. The processors are used for image processing,
compression, video analysis and networking functionalities. The memory is used for storing the
network camera’s firmware (computer program) and for local recording of video sequences.
Figure A network camera connects directly to the network.
Like a computer, the network camera has its own IP address, is connected directly to a network
and can be placed wherever there is a network connection. This differs from a web camera,
which can only operate when it is connected to a personal computer (PC) via the USB or IEEE
1394 port, and to use it, software must be installed on the PC. A network camera provides web
server, FTP (File Transfer Protocol), and e-mail functionalities, and includes many other IP
network and security protocols.
A network camera can be configured to send video over an IP network for live viewing and/or
recording either continuously, at scheduled times, on an event or on request from authorized
users. Captured images can be streamed as Motion JPEG, MPEG-4 or H.264 video using various
networking protocols, or uploaded as individual JPEG images using FTP, e-mail or HTTP
(Hyper- text Transfer Protocol).
In addition to capturing video, Network cameras provide event management and intelligent video
functionalities such as video motion detection, audio detection, active tampering alarm and auto-
tracking. Most network cameras also offer input/output (I/O) ports that enable connections to
external devices such as sensors and relays. Other features may include audio capabilities and
built-in support for Power over Ethernet (PoE).
31 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Figure Front and back of a network camera.
3.1. Classification of network cameras on the basis of their
appearance and application area
Network Cameras are of several types depending on their usability and features. They
can be classified into 3 categories based on their appearance and application area:
 Fixed Box Camera
 Fixed Dome Camera
 PTZ Camera
Network cameras can also be classified in terms of whether they are designed for indoor
use only or for indoor and outdoor use.
Outdoor network cameras often have an auto iris lens to regulate the amount of light the
image sensor is exposed to. An outdoor camera will also require an external, protective
housing unless the camera design already incorporates a protective enclosure. Housings
are also available for indoor cameras that require protection from harsh environments
such as dust and humidity, and from vandalism or tampering. In some camera designs,
vandal and tamper-proof features are already built-in and no external housing is required.
3.1.1. Fixed box network cameras
A fixed box network camera, which may come with a fixed or varifocal lens, is a camera
that has a fixed field of view (normal/telephoto/wide-angle) once it is mounted. A fixed
camera is the traditional camera type where the camera and the direction in which it is
pointing are clearly visible. This type of camera represents the best choice in applications
where it is advantageous to make the camera very visible. A fixed camera usually
enables its lens to be changed. Fixed cameras can be installed in housings designed for
indoor or outdoor installation.
32 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Figure Fixed network cameras including wireless and megapixel versions.
3.1.2. Fixed Dome Network Cameras
A fixed dome network camera, also called a mini dome, essentially involves a fixed
camera that is pre-installed in small dome housing. The camera can be directed to point in
any direction. Its main benefit lies in its discreet, non-obtrusive design, as well as in the
fact that it is hard to see in which direction the camera is pointing. The camera is also
tamper resistant.
One of the limitations of a fixed dome camera is that it rarely comes with an
exchangeable lens, and even if it is exchangeable, the choice of lenses is limited by the
space inside the dome housing. To compensate for this, a varifocal lens is often provided
to enable the camera’s field of view to be adjusted.
Figure Fixed dome network cameras.
33 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3.1.3. PTZ Cameras
A PTZ camera or a PTZ dome camera can manually or automatically pan, tilt and
zoom in and out of an area or object. All PTZ commands are sent over the same
network cable as for video transmission; no RS-485 wires need to be installed as is
the case with an analog PTZ camera.
PTZ dome network cameras can cover a wide area by enabling greater flexibility in
pan, tilt and zoom functions. They enable a 360-degree, continuous pan, and a tilt of
usually 180 degrees. The optical zoom of a PTZ dome typically ranges between 10x
and 35x.
A PTZ dome network camera also provides mechanical robustness for continuous
operation in guard tour mode, whereby the camera automatically moves from one
preset position to the next in a pre-determined order or at random. Normally up to
20 guard tours can be set up and activated during different times of the day. In guard
tour mode, one PTZ dome network camera can cover an area where 10 fixed
network cameras would be needed. The main drawback is that only one location can
be monitored at any given time, leaving the other nine positions unmonitored.
Figure: PTZ dome network cameras
34 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3.2. Classification of network camera on the basis of their
Functionality
3.2.1. Day and night network cameras
All types of network cameras—fixed, fixed dome, PTZ, and PTZ dome can offer
day and night functionality. A day and night camera is designed to be used in
outdoor installations or in indoor environments with poor lighting.
A day and night, color network camera delivers color images during the day. As
light diminishes below a certain level, the camera can automatically switch to night
mode to make use of near- infrared (IR) light to deliver high-quality, black and
white images.
Near-infrared light, which spans from 700 nanometers (nm) up to about 1000 nm, is
beyond what the human eye can see, but most camera sensors can detect it and make
use of it. During the day, a day and night camera uses an IR-cut filter. IR light is
filtered out so that it does not distort the colors of images as the human eye sees
them. When the camera is in night (black and white) mode, the IR-cut filter is
removed, allowing the camera’s light sensitivity to reach down to 0.001 lux or
lower.
Figure: Image at left, IR-cut filter in a day/night network camera; middle, position of
IR-cut filter during daytime; at right, position of IR-cut filter during nighttime.
Figure: Graph shows how an image sensor responds to visible and
near-IR light. Near-IR light spans the 700 nm to 1000 nm range
35 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Day and night cameras are useful in environments that restrict the use of artificial light. They
include low-light video surveillance situations, covert surveillance and discreet applications, for
example, in a traffic surveillance situation where bright lights would disturb drivers at night.
An IR illuminator that provides near-infrared light can also be used in conjunction with a day
and night cameras to further enhance the camera’s ability to produce high-quality video in
lowlight or nighttime conditions.
Figure: At left, image without an IR illuminator; at right, image with an IR illuminator
3.2.2. HDTV, Megapixel or standard resolution camera
One of the unique benefits that network video brings to the video surveillance
market is the ability to move beyond the traditional PAL/NTSC resolution and
frame rate limitations and experience high-resolution video with extreme image
detail. Even a 1 megapixel network camera offers a resolution that is at least three
times better than an analog CCTV camera, and there are network cameras that offer
as much as 8 megapixel resolution – and beyond.
Choosing the right camera for your system can easily become a challenge. These
guidelines help you optimize your camera installation based on how you need to use
your video to fulfill your video surveillance goals.
HDTV Network Cameras are a recent technology development that has gained
enormous interest on the video surveillance market. As for megapixel, HDTV
means excellent image detail, but in addition, a true HDTV network camera
complies with industry standards which ensure excellent color representation, full
frame rate and a 16:9 format.
36 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3.2.3. Thermal Network Cameras
Thermal Network Cameras are a perfect complement to any professional IP-
Surveillance system that needs to secure an area or a perimeter in complete
darkness. They create images based on the heat that always radiates from any
object, vehicle or person. This gives the cameras the power to see through complete
darkness and deliver images that allow operators to detect and act on suspicious
activity – 24 hours a day, seven days a week.
Figure All objects emit thermal radiation which can be detected with a thermal network camera. Images are generally produced in black and
white but can be artificially colored to make it easier to distinguish different shades.
Thermal cameras are excellent for detecting people, objects and incidents in darkness
and other challenging conditions. Thermal cameras do not, however, deliver images
that allow reliable identification – that is why thermal cameras and conventional
cameras complement and support each other in a surveillance installation.
Thermal cameras do not require any additional light sources – conventional or IR – that
consume energy, create shadows and reveal their locations. And, in contrast to
conventional day-and-night cameras that depend on a certain amount of near-infrared
light to function, thermal cameras deliver reliable surveillance images even in complete
darkness.
37 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3.3. How the IP Cameras are made / assembled
For assembling a particular camera, lot of parts are joined together to form a finished
product. Here I am taking an example of Shyam Fixed Box Camera, that how it is made.
3.3.1. Part list for assembling FALCON camera
Following is the Part list for Assembling Shyam Fixed Box IP Camera (Falcon SM200
series)
Falcon
Item Agile part# Material
use PicturesPart Name QTY
1
Bottom plate
(With
painting)
601.00146.00 Al. Alloy 1 NO
2
Top (with
painting)
601.00145.00 Al. Alloy 1 NO
5
Capture PC
plate With
painting
601.00147.00 Zn Alloy 1 NO
to hold capture
pcb
3 Ball screw 601.00229.00 Zn Alloy 1 NO
in mounitng
4
mount -1
With
painting)
601.00272.00 Zn Alloy 1 NO
6
Mount-
bottom With
Painting)
601.00271.00 Al. Alloy 1 NO
38 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
8
Hitachi lens
mount
609.00130.00 ABS 1 NO
9
Lens shade
(for Hitachi
lens)
609.00125.00 ABS 1 NO
10
lens shade
(for CS
mount lens)
609.00128.00 ABS 1 NO
11
lens shade
(for x4 lens)
609.00129.00 ABS 1 NO
12
CS lens
holder
(Internal)
609.00157.00 ABS 1 NO
13
CS lens
holder
(External)
609.00126.00 ABS 1 NO
14
M12 (S) lens
mount
609.00158.00 ABS 1 NO
15
Ring Nut
(same part
as in Kite)
609.00073.00 ABS 1 NO
to adjust M12
lens
16
Spacer for IR
cut filter
610.00026.00 Silicon 1 NO
17
Rubber cap
for DC Iris
connector
hole
610.00027.00 Silicon 1 NO
39 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
18
Rubber cap
for SMA
connector
hole
610.00028.00 Silicon 1 NO
19
spacer for
keekon
601.00213.00 BRASS 4 NOS
20
spacer for CS
(INTERNAL)
601.00214.00 BRASS 4 NOS
21
spacer for
IO-POWER
pcb
601.00310.00 BRASS 1 NO
22
spacer for CS
(EXTERNAL)
601.00298.00 BRASS 4 NOS
23
M3 CSK
605.00197.00 SS 4 NOS OUTSIDE
HOUSING
24 M3 PAN
CROSS HEAD
605.00223.00 SS 10 NOS
PCB FITTING
25 THUMB
SCREW
605.00224.00 SS 1 NO
IN MOUNITNG
26 GRUB
SCREW
605.00225.00 SS 2 NOS
IN MOUNITNG
27
SELF
TAPPING
WITH
ANCHOR
605.00226.00 SS 4 NOS
WALL
MOUNITNG
28
M2 CSK
605.00238.00 SS 2 NOS FOR FITTING IR
CUT FILTER
29
M2 HEX NUT
605.00132.00 SS 2 NOS FOR FITTING IR
CUT FILTER
40 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
30
SELF
TAPPING
ST2.9 x 16L
605.00239.00 SS 2 NOS FOR FITTING
LENS HOLDER
31
M4 CSK
605.00240.00 SS 1 NO
FOR FITTING
OUTDOOR
SHIELD
32
SHIELD
MOUNTING
SCREW
601.00328.00 BRASS 1 NO
FOR FITTING
OUTDOOR
SHIELD
33 LABLE 104.00063.00 POLYMIDE 1 NO
41 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3.3.2. Assembly Line document
Assembly line deatils
Falcon Assembly
PCB Assembly
Encoder,Power & IO boards
Step 1.1
Step 1.2
Plug-IN Power & IO
PCBs in respective
slots
Back-panel Connectors
Power Board
IO Board
42 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.3
Up to this point is common for all models
Step 1.4
Fix the spacer between
Power & IO boards
with screws from both
sides
Fix the PCB assembly
into “Bottom plate”
with Three screws as
shown
43 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Capture Board (Only for CS mount and x4 Zoom)
Step 1.5
Option 1: x4 Zoom lens (internal mount):
Step 1.6: Fix lens mount and lens to capture board
Place Spacer (IR cut filter
spacer) above the image
sensor
Fix IR Cut filter above the sensor
with spacer in between. (IR cut
filter shown in transparent form for
clarity )
Image sensor on capture
board
44 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Lens mount assembly (for x4 Zoom lens)
Step 1.7 : Fix Capture board Assembly to the “Holding plate”
Fix “S-Mount lens holder”
on the capture PCB above
sensor
Fix with Two diagonal
screws
Fix x4 zoom lens on
to the lens holder
Use locking nut to fix lens in
Correct focal length
Fix the Capture PCB
assembly (with lens) to the
“holding plate” with 4
spacers
45 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Capture board assembly with
lens and holding plate
Fix the Capture PCB
assembly (with lens) to
the “holding plate” with
4 spacers
46 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.8: Fix lens assembly inside enclosure (bottom plate)
Insert “holding” plate into the
slot in front of bottom plate
47 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.9: Connect Capture Board to Encoder baord
Step 1.10: Connect Mic
Connect capture board to
encoder board using FRC cable
Insert Mic to the Mis hole in
front of the bottom plate and
connect Mic cable to encoder
board connector
48 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.11 Fix top cover
Slide-in the top cover on to
Bottom cover
Fix top cover with 4 screws
(2 on either side) to the
bottom plate
49 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.12: Fix Lens shade
Fix x4” Lens shade” to
the front cover
Use “rubber gasket to close
DC Iris connector hole in
front panel
50 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.13: Fix Antenna ( same for all Wi-Fi models)
For non-Wi-Fi models, Use rubber
gasket to close SMA connector
hole on Back plate
For Wi-Fi models, Use SMA
connector on back plate and
connect SMA antenna to it
Back panel SMA connector for antenna
SMA antenna
51 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.14 : Fix Mounting base (Same for all models)
Fix Mounting base to the
Bottom plate
Camera can now be
mounted on to the
required surface (Wall)
52 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Part IV
Possible Connectivity Medium
53 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
4. Possible connectivity options
 Wired system
 Wireless system
 Hybrid system: combination of wired and wireless system
4.1. Basic terms used in connectivity
4.1.1. IP addressing:
Any device that wants to communicate with other devices via the Internet must have
a unique and appropriate IP address. IP addresses are used to identify the sending
and receiving devices. There are currently two IP versions: IP version 4 (IPv4) and
IP version 6 (IPv6). The main difference between the two is that the length of an
IPv6 address is longer (128 bits compared with 32 bits for an IPv4 address). IPv4
addresses are most commonly used today.
4.1.2. Ports:
A port number defines a particular service or application so that the receiving server
(e.g., net- work camera) will know how to process the incoming data. When a
computer sends data tied to a specific application, it usually automatically adds the
port number to an IP address without the user’s knowledge. Port numbers can range
from 0 to 65535. Certain applications use port numbers that are pre-assigned to
them by the Internet Assigned Numbers Authority (IANA). For example, a web
service via HTTP is typically mapped to port 80 on a network camera.
4.1.3. Data transport protocols for network video:
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are the
IP-based protocols used for sending data. These transport protocols act as carriers
for many other protocols. For example, HTTP (Hyper Text Transfer Protocol),
which is used to browse web pages on servers around the world using the Internet, is
carried by TCP.
TCP provides a reliable, connection-based transmission channel. It handles the
process of breaking large chunks of data into smaller packets and ensures that data
sent from one end is received on the other. TCP’s reliability through retransmission
may introduce significant delays. In general, TCP is used when reliable
communication is preferred over transport latency.
54 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
UDP is a connectionless protocol and does not guarantee the delivery of data sent,
thus leaving the whole control mechanism and error-checking to the application
itself. UDP provides no transmissions of lost data and, therefore, does not introduce
further delays.
55 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Table Common TCP/IP protocols and ports used for network video.
4.2. Wired IP Surveillance System
In Wired IP Surveillance System all the various components are connected to each other
through LAN or Ethernet. Data is sent in the form of packets and to regulate the
transmission of the packets, Ethernet technology is used. Ethernet uses a star topology in
which the individual nodes (devices) are networked with one another via active
networking equipment such as switches. The number of networked devices in a LAN
can range from two to several thousand.
The physical transmission medium for a wired LAN involves cables, mainly twisted pair
or fiber optics. A twisted pair cable consists of eight wires, forming four pairs of twisted
copper wires and is used with RJ-45 plugs and sockets. The maximum cable length of a
twisted pair is 100 m (328 ft.) while for fiber, the maximum length ranges from 10 km to
70 km, depending on the type of fiber. Depending on the type of twisted pair or fiber
optic cables used, data rates today can range from 100 Mbit/s to 10,000 Mbit/s.
Figure Twisted pair cabling includes four pairs of twisted wires, normally connected to a RJ-45 plug at the end.
A rule of thumb is to always build a network with greater capacity than is currently
required. To future-proof a network, it is a good idea to design a network such that only
30% of its capacity is used. Since more and more applications are running over networks
today, higher and higher network performance is required. While network switches
(discussed below) are easy to upgrade after a few years, cabling is normally much more
difficult to replace.
4.2.1. Types of Ethernet networks:
 Fast Ethernet: Fast Ethernet refers to an Ethernet network that can
transfer data at a rate of 100 Mbit/s. It can be based on a twisted pair or fiber
optic cable. Most devices that are connected to a network, such as a laptop
or a network camera, are equipped with a 100BASE-TX/10BASE-T
Ethernet interface, most commonly called a 10/100 interface, which supports
both 10 Mbit/s and Fast Ethernet. The type of twisted pair cable that
56 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
supports Fast Ethernet is called a Cat-5 cable.
 Gigabit Ethernet: Gigabit Ethernet, which can also be based on a twisted
pair or fiber optic cable, delivers a data rate of 1,000 Mbit/s (1 Gbit/s) and is
becoming very popular. It is expected to soon replace Fast Ethernet as the de
facto standard.
The type of twisted pair cable that supports Gigabit Ethernet is a Cat-5e cable,
where all four pairs of twisted wires in the cable are used to achieve the high data
rates. Cat-5e or higher cable categories are recommended for network video
systems. Most interfaces are backwards compatible with 10 and 100 Mbit/s
Ethernet and are commonly called 10/100/1000 interfaces.
For transmission over longer distances, fiber cables such as 1000BASE-SX (up to
550 m/1,639 ft.) and 1000BASE-LX (up to 550 m with multimode optical fibers
and 5,000 m with single-mode fibers) can be used.
Figure Longer distances can be bridged using fiber optic cables. Fiber is typically used in the backbone of a network and not in nodes such as a
network camera.
 10 Gigabit Ethernet: 10 Gigabit Ethernet is the latest generation and
delivers a data rate of 10 Gbit/s (10,000 Mbit/s), and a fiber optic or twisted
pair cable can be used. 10GBASE-LX4, 10GBASE-ER and 10GBASE-SR
based on an optical fiber cable can be used to bridge distances of up to 10,000
m (6.2 miles). With a twisted pair solution, a very high quality cable (Cat-6a
or Cat-7) is required. 10 Gbit/s Ethernet is mainly used for backbones in high-
end applications that require high data rates.
57 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
4.3. Wireless IP Surveillance System
In Wireless IP Surveillance System all the various components are connected to each
other wirelessly through Internet using various communicating protocols such as HTTP,
UDP and RTSP etc. Before discussing various protocols, some of the basic elements of
Internet communication such as routers, firewalls and Internet service providers are
discussed below:
 Routers: To forward data packages from one LAN to another LAN via the Internet,
networking equipment called a network router must be used. A router routes
information from one network to another based on IP addresses. It forwards only data
packages that are to be sent to another network. A router is most commonly used for
connecting a local network to the Internet. Traditionally, routers were referred to as
gateways.
 Firewalls: A firewall is designed to prevent unauthorized access to or from a
private network. Firewalls can be implemented in both hardware and software, or a
combination of both. Firewalls are frequently used to prevent unauthorized Internet
users from accessing private networks that are connected to the Internet. Messages
entering or leaving the Internet pass through the firewall, which examines each
message, and blocks those that do not meet the specified security criteria.
 Internet connections: In order to connect a LAN to the Internet, a network
connection via an Internet service provider (ISP) must be established. When
connecting to the Internet, terms such as upstream and down- stream are used.
Upstream describes the transfer rate with which data can be uploaded from the device
to the Internet; for instance, when video is sent from a network camera. Downstream
is the transfer speed for downloading files; for instance, when video is received by a
monitoring PC.
In most scenarios—for example, a laptop that is connected to the Internet—downloading
information from the Internet is the most important speed to consider. In a network video
application with a network camera at a remote site, the upstream speed is more relevant
since data (video) from the network camera will be uploaded to the Internet.
NAT (Network address translation): When a network device with a private IP address
wants to send information via the Internet, it must do so using a router that supports
NAT. By using this technique router can translate a private IP address into a public IP
address without the sending host’s knowledge.
Port forwarding: To access cameras that are located on a private LAN via the Internet,
the public IP address of the router should be used together with the corresponding port
number for the network camera/video encoder on the private network.
58 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Port forwarding works as follows. Incoming data packets reach the router via the router’s
public (external) IP address and a specific port number. The router is configured to
forward any data coming into a predefined port number to a specific device on the private
network side of the router. The router then replaces the sender’s address with its own
private (internal) IP address. To a receiving client, it looks like the packets originated
from the router. The reverse happens with outgoing data packets. The router replaces the
private IP address of the source device with the router’s public IP address before the data
is sent out over the Internet.
Figure Router knows to forward data (request) coming into port 8032 to a network camera with a private IP address of 192.168.10.13 port 80
so that network camera can then begin to send video.
Port forwarding is traditionally done by first configuring the router. Different routers
have different ways of doing port forwarding and there are web sites such as
www.portfoward.com that offer step-by-step instruction for different routers. Usually
port forwarding involves bringing up the router’s interface using an Internet browser, and
entering the public (external) IP address of the router and a unique port number that is
then mapped to the internal IP address of the specific network video product and its port
number for the application.
59 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Wireless Network Camera: A network camera with built-in wireless support is a
consideration when running a cable between a LAN and a network camera is impractical,
difficult or expensive. Wireless network cameras are suitable for use in outdoor
situations, in environments such as historic buildings where the installation of cables
would damage the interior, or in cases where there is a need to move cameras to new
locations on a regular basis, such as in a supermarket. Ensure that the wireless network
camera supports security protocols such as IEEE 802.1X and WPA/WPA2 (Wi-Fi
Protected Access), which will help secure the wireless communication.
A Wireless Network Camera
using 802.11b/g.
Figure By using a wireless bridge, any network camera can be used in a wireless network.
WLAN: A wireless local area network (WLAN) links two or more devices using some
wireless distribution method (typically spread-spectrum or OFDM radio), and usually
providing a connection through an access point to the wider internet. This gives users the
mobility to move around within a local coverage area and still be connected to the
network. Most modern WLANs are based on IEEE 802.11 standards, marketed under the
Wi-Fi brand name.
All components that can connect into a wireless medium in a network are referred to as
stations. All stations are equipped with wireless network interface controllers (WNICs).
Wireless stations fall into one of two categories: access points, and clients. Access points
(APs), normally routers, are base stations for the wireless network. They transmit and
receive radio frequencies for wireless enabled devices to communicate with. Wireless
clients can be mobile devices such as laptops, personal digital assistants, IP Camera and
other Smartphones, or fixed devices such as desktops and workstations that are equipped
with a wireless network interface.
60 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Wireless networks: For video surveillance applications, wireless technology offers a
flexible, cost-efficient and quick way to deploy cameras, particularly over a large area as
in a parking lot or a city center surveillance application. There would be no need to pull a
cable through the ground. In older, protected buildings, wireless technology may be the
only alternative if standard Ethernet cables may not be installed.
Figure A network with wired and wireless connections.
61 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Part V
A Typical Surveillance System and its
Components
62 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
5. A typical video surveillance system at one live site named
as “Macawer Beekay”
In the Proposed Solution, we have to do video surveillance in the complete industrial plant,
which will be monitored locally as well as central control room, situated at some remote
location. In this network we will connect all outdoor cameras through RF technology in P2P
or point-to-multipoint Mode and indoor camera through wired connectivity. Every Location
will be covered by either PTZ or fixed box Camera. Through Fix Camera we can view a pre-
define area/zone, whereas a PTZ can be used for viewing the surrounding area (360 Deg.) of
any particular locations. Every outdoor Camera will connect to the Remote Unit (CPE), and
CPE will communicate to Base Station via Wireless. Repeater will be used where Line of
sight will not be available.
Figure:A bird’s eye-view of all the locations mentioned in the solution
63 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
5.1. Solution explanation
 There will be 31 fixed box, 5 PTZ cameras and 3 dome cameras
installed for surveillance.
 All indoor cameras will be connected by 8-Port PoE switch through
CAT-6 Cable.
 All the outdoor cameras would be connected through wireless
 Complete cabling will be done for all the cameras.
5.2. Solution components
5.2.1. Remote Surveillance Camera Units:
 IP Fixed Box Camera (4x) ,IP PTZ Camera (35x),IP Fixed Zoom (10x)
 They should be easy to install. Reliability is mandatory along with robustness.
 Camera units will be installed at the light poles located at the border fencing
 Unit installation should be easy and fast.
 It should have provision of 24 hours backup and provision of adding more backup in
special need.
 All the camera units shall be enclosed in the weather-proof casing which has inbuilt
heater and fan.
 Link establishment with should be very easy and of high throughput. This throughput
should be maintained in every kind of climate.
 Camera shall be supported by IR lamps for night visibility
 Camera shall have the support for the Pole Mount
 Camera Units shall be of good resolution.
 Camera Units shall be IP based and should give video & audio data on the IP interface
built inside the camera
 Camera Units shall be able to talk to the Wireless CPE
 Each camera shall stream at a bit rate of 512 Kbps or 1 Mbps
5.2.2. Weather-proof Camera Housings
 Weather-proof Standard IP66 with inbuilt heater and fan
 Indoor and Outdoor Installations
 Made for ultra-harsh environments
 Applicable to Fixed Box and PTZ Cameras
64 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
5.2.3. L2 Switch 24 port
 Switch is having the Throughput of 56Gbps.
 Total they have 28 Gigabit ports in full duplex mode.
 Supports many features like VLANs, Access list policies, radius Authentication.
 Gives the 1 gig connectivity to all the connected Nodes.
 Support QoS for prioritize the data stream like Voice and Video.
 They are Easy to install and Monitor
5.2.4. Wireless Communication devices
5.2.4.1. Camera CPE’s
 They are easy to install. Reliability is also available in this along with robustness.
Camera CPE will be installed at the light poles located at the border fencing. They
would be installed near the cameras and will be connected to the camera using
ethernet interface.
 These CPE will act as wireless client and will transfer the video data to central
BTS to which they are registered.
 CPE shall be able to communicated independently to the central BTS without
affecting other CPE’s
5.2.4.2. BTS
 BTS (Base Station) will be installed at the place wherever maximum line of site
will be available. The distance will depend on the terrain between the BTS and
the wireless CPE’s which it will connect to each Base Station has the capacity of
100 Mbps and shall support 15 CPE as the multipoint’s
 BTS will aggregate the video & audio data from cameras which are connected
through the CPE for that particular BTS will communicate to the CPE over secure
802.11b/g/n protocol.
 Each BTS will have multiple sector antennas to connect on either side.
 Fully Secure Communication with 128 bit encryption.
65 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
5.2.5. Video management system
IP signal from RU will come to a desktop with large display. Here video
management server is running to get the live feed from remote camera units.
Functional Specifications of Video management server are given below
5.2.5.1. Live View Client
 Automatic searching of devices in the network- Auto Search Supported
 View live videos in 2x2, 3x3 and 4x4, 5x5, 6x6, 8x8 and split views in
windows matrix
 Remote Live View through web or through remote client.
 View over Mobile
 Devices network connection status
 Picture Snapshot in jpeg format
 Full screen view
 PTZ controls for PTZ cameras
 On screen Display: Frame rate, bit rate, date/time or user specified text.
5.2.5.2. Recordings & Storage
 Triplex Mode: Live View, Recording and Playback simultaneously
 Recording stream settings: Encoding (MJPEG, MPEG4 H.264), Resolution
and
 Frame rate.
 Recordings in Chunks: Configurable Chunk Time
 Schedule Recording with Date and time settings
 Automatic Recordings restart after power failures
 Disk Space Management. Alarms and events
 Calculator to Find Hard disk requirements based on Number of cameras,
number of days and Video Stream settings namely encoding, resolution and
frame rate.
5.2.5.3. Playback of recorded video
 Intelligent Search: Based on Camera, Date & time
 Sorting recordings: Based on Camera and Start or End date/Time
 Playback recordings: Play, forward and Seek options. Slow and fast playing
 View Recordings using Desktop Client or through Windows Media Player
 Export Evidence: Export Recorded video to CD/DVD or external drive as
evidence.
 Playback on Archived Video.
66 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
5.2.5.4. Archiving
 Archiving on External Network Storage, CD/DVD or USB
 Scheduled Archiving: Day and time of archiving
 Automatic delete or archiving after set number of days.
5.2.5.5. Alarms
Types of Alarm:
 Email (Email server settings required)
 SMS (Gateway/Modem required)
 Option to add Physical Alarm connected in the Camera
 Alarm for Low Disk Space
 Alarm for Recording problems
 Alarm for Archiving Events
5.2.5.6. Management
Camera Management:
 Defining Camera Groups
 Camera access based on user roles
 Saving and retrieving screen views
User Management:
 User based camera or camera group access
 User Roles and levels
 Login & Authentication
5.2.5.7. Video Analytics Software’s:
 Intrusion Detection
 Left Object Detection
 Overcrowding
 Camera Tampering
5.2.5.8. Security
Camera Management:
 Secure Communication
 Double Login Security
 Saving and retrieving screen views by user
67 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
6. CONCLUSION
This project helped us gain the insight of how a Video Surveillance System is integrated, its
working, maintenance and various other factors affecting it. Each Networking component
was discussed in detail. Different types of network camera each having its particular need
and application; different types of connecting media and modes; working of switch &
routers; wired or wireless modes; video analytics utilizes the super power of computer
processing help generate alarm on any unusual activity and lots more. All the things helped
explore new avenues of knowledge.
In short, Video Surveillance is growing industry which integrates various fields of
Engineering to take the Security to the next level.
68 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
7. REFERENCES
E-Books:
[1] Axis Technical guide to network video
[2] Axis IP-Surveillance design guide
[3] Various datasheets: Falcon SM200 Series, S810 Hawk, HAWK S9118
Sites:
[1] www.vvdntech.com
[2] www.shyamnetworks.com
[3] www.axis.com
[4] www.en.wikipedia.org

More Related Content

Similar to video surveilance system

Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerMohamed Atef
 
Dissertation report 2_3
Dissertation report 2_3Dissertation report 2_3
Dissertation report 2_3Abub6666
 
Gsm based home security system
Gsm based home security systemGsm based home security system
Gsm based home security systemNarayan Gour
 
Realtimesamplingofutilization
RealtimesamplingofutilizationRealtimesamplingofutilization
RealtimesamplingofutilizationVicente Nava
 
Master Arbeit_Chand _Piyush
Master Arbeit_Chand _PiyushMaster Arbeit_Chand _Piyush
Master Arbeit_Chand _PiyushPiyush Chand
 
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdfsteganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdfssusere02009
 
F dx sdk pro .net programming manual (windows) sg1 0030-b-008
F dx sdk pro .net programming manual (windows) sg1 0030-b-008F dx sdk pro .net programming manual (windows) sg1 0030-b-008
F dx sdk pro .net programming manual (windows) sg1 0030-b-008Oscar Groselle
 
Jacob King Final Year Project
Jacob King Final Year ProjectJacob King Final Year Project
Jacob King Final Year ProjectJacob King
 
Croma_key_Report.pdf
Croma_key_Report.pdfCroma_key_Report.pdf
Croma_key_Report.pdfGauriHadgekar
 
Siwes report by mukhtar salisu
Siwes report by mukhtar salisuSiwes report by mukhtar salisu
Siwes report by mukhtar salisuMukhtarsalisu2
 

Similar to video surveilance system (20)

Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone Jammer
 
Dissertation report 2_3
Dissertation report 2_3Dissertation report 2_3
Dissertation report 2_3
 
Gsm based home security system
Gsm based home security systemGsm based home security system
Gsm based home security system
 
Realtimesamplingofutilization
RealtimesamplingofutilizationRealtimesamplingofutilization
Realtimesamplingofutilization
 
Master Arbeit_Chand _Piyush
Master Arbeit_Chand _PiyushMaster Arbeit_Chand _Piyush
Master Arbeit_Chand _Piyush
 
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdfsteganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
steganographyfinalreport (deepu) (1) - Deepak Yadav.pdf
 
Brain Computer Interface
Brain Computer InterfaceBrain Computer Interface
Brain Computer Interface
 
ThesisB
ThesisBThesisB
ThesisB
 
F dx sdk pro .net programming manual (windows) sg1 0030-b-008
F dx sdk pro .net programming manual (windows) sg1 0030-b-008F dx sdk pro .net programming manual (windows) sg1 0030-b-008
F dx sdk pro .net programming manual (windows) sg1 0030-b-008
 
Portfolio CCTV BWIC
Portfolio CCTV BWICPortfolio CCTV BWIC
Portfolio CCTV BWIC
 
Jacob King Final Year Project
Jacob King Final Year ProjectJacob King Final Year Project
Jacob King Final Year Project
 
thesis-2
thesis-2thesis-2
thesis-2
 
Abrek_Thesis
Abrek_ThesisAbrek_Thesis
Abrek_Thesis
 
thesis final
thesis finalthesis final
thesis final
 
Croma_key_Report.pdf
Croma_key_Report.pdfCroma_key_Report.pdf
Croma_key_Report.pdf
 
Synaesthsia
SynaesthsiaSynaesthsia
Synaesthsia
 
Mobile d
Mobile dMobile d
Mobile d
 
Final version_printed
Final version_printedFinal version_printed
Final version_printed
 
Linish v s 2005 06
Linish v s 2005 06Linish v s 2005 06
Linish v s 2005 06
 
Siwes report by mukhtar salisu
Siwes report by mukhtar salisuSiwes report by mukhtar salisu
Siwes report by mukhtar salisu
 

More from Akhil Garg

Embedded Systems Training Report
Embedded Systems Training ReportEmbedded Systems Training Report
Embedded Systems Training ReportAkhil Garg
 
MEMS final techfest
MEMS final techfestMEMS final techfest
MEMS final techfestAkhil Garg
 
VVDN-IP_Camera_Platform_ODM-A0-02
VVDN-IP_Camera_Platform_ODM-A0-02VVDN-IP_Camera_Platform_ODM-A0-02
VVDN-IP_Camera_Platform_ODM-A0-02Akhil Garg
 
Humanoid Robotics: Towards Smart Community
Humanoid Robotics: Towards Smart Community Humanoid Robotics: Towards Smart Community
Humanoid Robotics: Towards Smart Community Akhil Garg
 
Gesture recognition techniques
Gesture  recognition techniques Gesture  recognition techniques
Gesture recognition techniques Akhil Garg
 

More from Akhil Garg (6)

TAG_Pitch
TAG_PitchTAG_Pitch
TAG_Pitch
 
Embedded Systems Training Report
Embedded Systems Training ReportEmbedded Systems Training Report
Embedded Systems Training Report
 
MEMS final techfest
MEMS final techfestMEMS final techfest
MEMS final techfest
 
VVDN-IP_Camera_Platform_ODM-A0-02
VVDN-IP_Camera_Platform_ODM-A0-02VVDN-IP_Camera_Platform_ODM-A0-02
VVDN-IP_Camera_Platform_ODM-A0-02
 
Humanoid Robotics: Towards Smart Community
Humanoid Robotics: Towards Smart Community Humanoid Robotics: Towards Smart Community
Humanoid Robotics: Towards Smart Community
 
Gesture recognition techniques
Gesture  recognition techniques Gesture  recognition techniques
Gesture recognition techniques
 

video surveilance system

  • 1. AKHILGARG 2011 VIDEOSURVEILLANCESYSTEM: ACASESTUDY With the development and globalization of human social activities, Surveillance systems have become increasingly important and popular in the public places such as banks, airports, public squares, casinos and other places. Case study made in: VVDN Technologies Pvt. Ltd. 1241/36, Atul Kataria Chowk, Gurgaon +91 124 4147642, +91 124 4378539
  • 2. 1 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY ACKNOWLEDGEMENT First of all I would like to thanks Supreme Power “Almighty God” for his blessings showered on us during the project work without him nothing is possible. Really it gives me immense pleasure to express my feelings of gratitude & reverence to people who helped me in accomplishment of this project “Video Surveillance System: A Case Study” so successfully. The efforts put by me during the development of this project would have not been fruitful, had it not been the people around us, who encouraged and helped us at all times. I feel proud to do this project in VVDN Technologies in the Hardware Lab. I am highly pleased to express my deep sense of gratitude to my project guide Mr. Himanshu Garg & Mr. Hemant Sharma for their valuable guidance, suggestions and constant supervision at every stage. I will remain ever grateful to them for their encouragement during the project. Finally I want to thank all staff members of Hardware Lab for their very important support and cooperation.
  • 3. 2 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY CERTIFICATE TO WHOM SOEVER IT MAY CONCERN Dated: __________ This is to certify that Mr. AKHIL GARG, student of PANIPAT INSTITUTE OF ENGINEERING & TECHNOLOGY, Panipat has successfully completed his six weeks Industrial Training in VVDN Technologies, Gurgaon and submitted the project entitled “Video Surveillance System: A Case Study”. All his work is genuine and original and was timely completed. His conduct was found out to be very satisfactory and his work has enabled us to add value to the organization and we wish him success for his future. Mr. Puneet Aggarwal Mr. Rajesh Kumar Dy. Manager (A.P. ECE) (VVDN, Gurgaon) Mr. Himanshu Garg (Project Guide)
  • 4. 3 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY INDEX 1. Surveillance .........................................................................................................................................8 1.1. Video Surveillance System...........................................................................................................8 1.1.1. IP based Video Surveillance System ....................................................................................9 1.2. Benefits of Video Surveillance ...................................................................................................9 2. Emerging market trends in video surveillance...............................................................................13 2.1. General trends...........................................................................................................................13 2.2.1. Video based fire detection ................................................................................................15 2.2.2. Toll plaza video AVCC (Automatic vehicle counting & classification)........................16 2.2.3. Abandoned Object Detection ...........................................................................................17 2.2.4. Intrusion Detection ...........................................................................................................18 2.2.5. Video Enhancement..........................................................................................................19 2.2.6. Perimeter breach detection ..............................................................................................20 2.2.7. Indoor people counting.....................................................................................................21 2.2.8. Object removal detection..................................................................................................22 2.2.9. Stopped vehicle detection .................................................................................................23 2.2.10. Camera Tampering detection ..........................................................................................24 2.2.11. Privacy Masking................................................................................................................24 2.3. Emerging application areas......................................................................................................25 2.3.1. Retail ..................................................................................................................................25 2.3.2. Transportation ..................................................................................................................26 2.3.3. Education...........................................................................................................................26 2.3.4. Industries ...........................................................................................................................27 2.3.5. City surveillance................................................................................................................27 2.3.6. Government.......................................................................................................................27 2.3.7. Healthcare..........................................................................................................................28 2.3.8. Banking and finance .........................................................................................................28 3. Network cameras ..............................................................................................................................30 3.1. Classification of network cameras on the basis of their appearance and application area 31 3.1.1. Fixed box network cameras .............................................................................................31
  • 5. 4 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 3.1.2. Fixed Dome Network Cameras........................................................................................32 3.1.3. PTZ Cameras ....................................................................................................................33 3.2. Classification of network camera on the basis of their Functionality..................................34 3.2.1. Day and night network cameras......................................................................................34 3.2.2. HDTV, Megapixel or standard resolution camera.........................................................35 3.3. How the IP Cameras are made / assembled............................................................................37 3.3.1. Part list for assembling FALCON camera......................................................................37 3.3.2. Assembly Line document..................................................................................................41 Assembly line deatils...................................................................................................................................41 Falcon Assembly..........................................................................................................................................41 PCB Assembly..............................................................................................................................................41 Encoder,Power & IO boards.......................................................................................................................41 4. Possible connectivity options............................................................................................................53 4.1. Basic terms used in connectivity..............................................................................................53 4.2. Wired IP Surveillance System .................................................................................................55 4.2.1. Types of Ethernet networks:............................................................................................55 5. A typical video surveillance system at one live site named as “Macawer Beekay”.....................62 5.1. Solution explanation .................................................................................................................63 5.2. Solution components.................................................................................................................63 5.2.1. Remote Surveillance Camera Units:...................................................................................63 5.2.2. Weather-proof Camera Housings........................................................................................63 5.2.3. L2 Switch 24 port................................................................................................................64 5.2.4. Wireless Communication devices.......................................................................................64 5.2.4.1. Camera CPE’s.................................................................................................................64 5.2.4.2. BTS .................................................................................................................................64 5.2.5. Video management system ...............................................................................................65 6. CONCLUSION .................................................................................................................................67 7. REFERENCES..................................................................................................................................68
  • 6. 5 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY ABOUT THE COMPANY VVDN stands for Video Voice Data Networking. VVDN provides design services & solutions in Voice, Video, Data and Networking domains. VVDN has strong experience in designing end-to- end solutions for Video Surveillance and Networking Domain Embedded Systems Hardware Design & Development System Board Design, PCB layout, Verification & Validation (V&V), Low Power Designs, Hardware Integration. System Software Engineering RTOS, Design Methodologies, DSP, Protocol Development, Software Porting, Interface Integration, Algorithms. Design Services End to End development of IP/Network camera, Video Surveillance, Video Analytics. Networking Wireless Networking Wifi, WiMax, routers, USB , bluetooth, Wireless LAN (IEEE 802.11), GSM, RF, Mobile processors Wired Networking LAN/WAN, Ethernet, Operating Systems: Microsoft, Linux, Unix, VxWorks. Equipment’s Servers, Blade Servers, Handheld Devices. Mobile Engineering. Telecom Applications Integrated Services & Solutions Commutation Equipment, Devices. VOIP Solutions IAD, IP Phones, IP PBX, Office-in- box, Residential Gateway, CPE’s. Operation Support Services Enterprise Applications, Support Applications, J2EE Framework, Web Applications, Security. We aim at providing high quality software engineering products and services to our clients. We always adhere to minimal time frame for completing our client orders so that our customer remains competitive and become more productive in market. VVDN believes in automation to reduce project lifecycle and to increase the efficiency in terms of resources and expenses. Besides this, we assure that we deliver for what we agreed for with our customer. In a nutshell, we guarantee delivery of our products & services to customers while maintaining cost efficiency and faster turnaround time for marketing, and thus is our motto “Certainty of Outcome” We specialize in development of customized solutions which helps our customers in achieving their objectives. We provide technical services which includes Software Development Lifecycle; Video Surveillance, Wireless, Networking, and Telecom solutions to design, develop and execute technology projects. Our Product Development Methodology and Line of Attack Service Strategy is associated with customer profitability thereby increasing internal customer value intimately. We also believe in achieving customer confidence in our deep capabilities in software / hardware areas of embedded systems, in networking as well as in electronic industry.
  • 7. 6 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Contents Part I: What is Video Surveillance? Part II: Market Trends in Video Surveillance Part III: What are Network Cameras and How They are made? Part IV: Possible Connectivity Medium Part V: A Typical Surveillance System and its Components
  • 8. 7 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Part I What is Video Surveillance?
  • 9. 8 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 1. Surveillance Definition: Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people and often in a superstitious manner. Surveillance is a French word meaning "watching over". It most usually refers to observation of individuals or groups by government organizations, military, schools, hospitals and several other public places. The word surveillance may be applied to observation from a distance by means of electronic equipment (like CCTV or IP cameras), or interception of electronically transmitted information (Internet traffic or phone calls).Surveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. 1.1. Video Surveillance System Video Surveillance System uses video cameras for the purpose of observing an area. They are often connected to a recording device, IP network, and are watched by an officer. Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage. Now with cheaper production techniques, it is simple and inexpensive enough to be used in home security systems, and for everyday surveillance. Analysis of footage is made easier by automated software that organizes digital video footage into a searchable database, and by automated video analysis software (such as VIRAT and Human ID). The amount of footage is also drastically reduced by motion sensors which only record when motion is detected. Figure: Surveillance Cameras
  • 10. 9 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 1.1.1. IP based Video Surveillance System IP-Surveillance System is a system that gives users the ability to monitor and record video/audio over an IP (Internet Protocol-based) computer network such as a local area network (LAN) or the Internet. In a simple IP-Surveillance system, this involves the use of a network camera (or an analog camera with a video encoder/video server), a network switch, a PC for viewing, managing and storing video, and video management software. Figure: IP based Video Surveillance System with alarm integration 1.2. Benefits of Video Surveillance The digital, network video surveillance system provides a host of benefits and advanced functionalities that cannot be provided by an analog video surveillance system. The advantages include remote accessibility, high image quality, event management and intelligent video capabilities, easy integration possibilities and better scalability, flexibility and cost-effectiveness.  Remote accessibility: Network cameras and video encoders can be configured and accessed remotely, enabling multiple, authorized users to view live and recorded video at any time and from virtually any networked location in the world. This is advantageous if users would like a third-party company, such as a security firm, to also gain access to the video. In a traditional analog CCTV system, users would need to be at a specific, on-site monitoring location to view and manage video, and off-site video access would not be possible without such equipment as a video encoder or a network digital video recorder (DVR). A DVR is the digital replacement for the video cassette recorder.
  • 11. 10 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY  High image quality: In a video surveillance application, high image quality is essential to be able to clearly capture an incident in progress and identify persons or objects involved. With progressive scan and megapixel technologies, a network camera can deliver better image quality and higher resolution than an analog CCTV camera.  Event management and intelligent video: There is often too much video recorded and lack of time to properly analyze them. Advanced network cameras and video encoders with built- in intelligence or analytics take care of this problem by reducing the amount of uninteresting recordings and enabling programmed responses. Such functionalities are not available in an analog system. Network cameras and video encoders have built-in features such as video motion detection, audio detection alarm, active tampering alarm, I/O (input/output) connections, and alarm and event management functionalities. These features enable the network cameras and video encoders to constantly analyze inputs to detect an event and to automatically respond to an event with actions such as video recording and sending alarm notifications.  Easy, future-proof integration: Network video products based on open standards can be easily integrated with computer and Ethernet-based information systems, audio or security systems and other digital devices, in addition to video management and application software. For instance, video from a network camera can be integrated into a Point of Sales system or a building management system.  Scalability and flexibility: A network video system can grow with a user’s needs. IP-based systems provide a means for many network cameras and video encoders, as well as other types of applications, to share the same wired or wireless network for communicating data; so any number of network video products can be added to the system without significant or costly changes to the network infrastructure. This is not the case with an analog system. In an analog video system, a dedicated coaxial cable must run directly from each camera to a viewing/recording station. Separate audio cables must also be used if audio is required.
  • 12. 11 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY  Cost-effectiveness: An IP-Surveillance system typically has a lower total cost of ownership than a traditional analog CCTV system. IP-based networks and wireless options are much less expensive alternatives than traditional coaxial and fiber cabling for an analog CCTV system. In addition, digital video streams can be routed around the world using a variety of interoperable infrastructure. Management and equipment costs are also lower since back-end applications and storage run on industry standard, open systems-based servers, not on proprietary hardware such as a DVR in the case of an analog CCTV system.  Power over Ethernet technology: PoE cannot be applied in an analog video system, can be used in a network video system. PoE enables networked devices to receive power from a PoE-enabled switch or midspan through the same Ethernet cable that transports data (video). PoE provides substantial savings in installation costs and can increase the reliability of the system. Figure A system that uses Power over Ethernet.
  • 13. 12 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Part II Emerging Market Trends in Video Surveillance
  • 14. 13 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2. Emerging market trends in video surveillance 2.1. General trends  Gone are the days when grainy, black and white CCTV cameras attached in discreet corners would fix themselves on immovable paths. IP surveillance is a need now. It is now monitored by security experts switching channels from their laptop in another part of the city, analyzing various aspects and behavior. As in-situations and popular campuses turn into soft targets, surveillance has been shifted from the admin to the IT department.  The IP surveillance system needs an initial investment but it transfers the entire load on the network making it more mobile and easier to guard.  An Axis communication study said that with if there were more than 32 cameras on a network, IP surveillance would be cheaper to own in comparison to the traditional analog option.  The costs can further decrease when cameras are configured to a router and can operate wirelessly hence reduce the sizable, hid-den wiring hassle.  Cameras now come equipped with the ability to acquire power over the Ethernet.  The HD quality allows for clearer quality and smarter identification.  The cameras are usually connected to a network video recorder to handle recording, video and alarm management. These cameras are better high-quality Web Cams and can thus be routed to be viewed on remote screens as well.  The software, that comes, allows users to map movements and suspicious objects on the camera's range.  An alarm can then be triggered and the alert can be sent in the form on an automatically generated phone call, text message and even email to certain set of people or the control center.  “IIT Mumbai has implemented IP surveillance to observe the entrances and exits,” said Navinder Chauhan, D-Link. Chauhan explained that after the IT department took over, a company would be able to handle it better since streams can then be diverted to tablets or even smart-phones. This helps in keeping a constant watch and with-out someone monitoring movements, while sitting all night in front of a television screen.  The cameras not only help in identification of regular offences, the software given with them can link images with a database of the undesirables provided by the police or by an internal authority and can raise an alarm.
  • 15. 14 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.2. Newest market Trend : Video analytics VMS is integrated with comprehensive cluster of advanced Video Analytic Algorithms. Each Video Analytic Module is coupled with Incident-Event-Action framework. User can set different actions on each Video Analytic events.  Abandoned Object Detection  Video Based Fire Detection  Zone Intrusion Detection  Automatic Video Image Enhancement  Boundary Loitering Detection  Intelligent People Counting  Object Removal Detection  Perimeter Tripwire  Stopped Vehicle Detection  Camera Tampering Detection  Toll Plaza Vehicle Classification Each of the above Video Analytics can be run both in manual and auto mode with scheduled presets. On each event detection VMS would send alerts to appropriate security personnel. DiCortex Alert Management Framework supports alerts in the form of Sound alarms, Email, SMS, camera alarm. Above all Video Analytics are equipped with False Alarm Suppression Technology (FAST) which minimizes false alarms and further strengthens the solution reliability.
  • 16. 15 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.2.1. Video based fire detection Sensor based Fire Alarms detects fire by monitoring the environmental changes associated with combustion. But these systems got some limitations in covering wide physical area. Video Based Fire Detection technology further strengthen the IP Video Surveillance solutions. It works using advanced Image processing and Pattern Recognition algorithm. This analytic has been tested in wide variety of scenarios ranging of normal indoor mild fire to forest fires. System can alert the user based on the intensity and duration of the fire occurrence. False Alarm Suppression Technology (FAST) further helps in adding more reliability to this Video Analytic. Figure: Detection of fire by Fire detection analytic
  • 17. 16 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.2.2. Toll plaza video AVCC (Automatic vehicle counting & classification) Advanced Technology for Vehicle Counting and Classification is Easy to Install and Use for existing Toll Plaza. It has edge over conventional Hardware sensors based AVCC (Automatic Vehicle Classification) in terms of interoperability. AVCC solution is capable of detecting and classifying the vehicles into different classes such as BIKE, CAR, LCV, 2-Axle HCV, 3-Axle HCV and OSV. It can be easily integrated with existing Toll Plaza Ticketing Management Software. The solution can be used for both Real time validation of Operator issues tickets and also offline Audit of the Ticketing System. Key Advantages  Easy to Install and Operate  No need of Hardware sensors  Open Framework for Easy Integration  Recording the Vehicle Snapshot  Advanced Reporting and Statistics  Integrated with i2V Video Management Software  Better Accuracy for Vehicle Detection & Classification
  • 18. 17 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.2.3. Abandoned Object Detection This is one of most important and crucial Video Analytic Algorithm which serves many of the current security requirements. It became practically impossible to human beings for round the clock monitoring of the crowded areas like Airports, City Metro Stations etc. Our Solutions mainly aims at detecting the suspicious objects, unattended baggage etc. Algorithm is specially tuned to handle crowded scenes. This analytic adds the maximum intelligence to surveillance applications. Figure: abandoned object detection by camera  Very accurate even in low light conditions  Well-tuned to handle crowded scenarios like Airports, Metro stations  System can learn from the user feedback in case of false alarms  Pre Event recording feature is available with this analytic  Ideal for detecting the bomb baggage in public places  Useful for detecting the Foreign objects on Railway tracks  Well suited to places like Shopping malls, Airports, Metro Stations etc.
  • 19. 18 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.2.4. Intrusion Detection This is the process of locating a moving object in a prohibited or restricted area in time. The algorithm analyses the video frames and outputs the location of moving targets within the frame. Video based Intrusion detection (VID) is a way of defining activity in a scene by analyzing image data and differences in a series of images. The functionality is made available with video management software. System allows you to set the activity threshold depending on what you want to monitor. System has the capability to set the sensitivity for indoor or outdoor conditions to avoid false alarms. Figure: Intrusion detected by camera  Support Multiple Intrusion Zones with a Single Camera.  Direction based Intrusion detection with regular shapes.  User can get Zone based Alarms  Global Parameter Control Over the System  Minimal False Alarm Rates  Well customized to Indian Requirements  Automatic Image enhancement Controls for Bad light Scenarios  Well-tuned with Low Frame Rate and Low Resolution Input  Supports the feature of scheduled automatic on/off of this Analytics module.  Supports Wide variety of Intrusion Zones shapes starting with Simple Rectangle to Any sized Polygon  User can define Directional based Intrusion for Regular Shaped Zones like Square, Rectangle.
  • 20. 19 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.2.5. Video Enhancement This analytic automatically converts the low contrast and low brightness video to enhanced video. It intelligently enhances the quality of the video by analyzing the local and global features in each frame of the video. Automatic Video Image enhancement can be used in following cases:  Enhancing Video containing Fog  Enhancing the Video containing Low light  Enhancing the Video in Rainy season Figure: Video Enhanced by Analytic  This feature is available at run time both while recording and playback.  Useful while viewing the videos covered with Fog or Rain  It can always play or record the better quality night time videos  Scheduled application of this feature is possible with VMS  Advanced image enhancement techniques were used to improve the video quality.
  • 21. 20 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.2.6. Perimeter breach detection This is a Trespassing Detection Analytic which can detect the trespassing of humans in restricted areas. Any number restricted areas can be selected by the user. This analytic is also capable of sending zone based alerts. This is different from conventional Intrusion detection systems in terms of Human tracking over the selected zones. Once the system detects the possible Trespasser, then it starts transmitting audio and visual signals to the monitoring workstation at the local security office Figure: Perimeter breach detected by analytic  Support a combination of Multiple Zones.  Allows different Parameter Settings for Each Zone.  Zone highlighting when it detects the trespasser.  Global parameter Control over all selected Zones.  Automatic Image enhancement Controls for Bad light Scenarios  Supports the feature of scheduled automatic on/off of this analytics module.  As each Zone is identified with a unique identifier, user can get to know exact zone where trespassing occurred.
  • 22. 21 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.2.7. Indoor people counting People Counting is one of the Video Analytic module which helps in Statistical analysis of Human flow inside any building or premises. Our People Counting algorithm is well suited to such requirements. The system gives a real time indication of number of visitors inside the store or building. It creates a Virtual line or Virtual zone for counting operation. Later system starts tracking the Human Heads passing over the virtual line. User can adjust the position of the line over entire image. Figure: People counting done by Video analytic  The use of people counting systems can prove very useful in the retail environment to calculate the conversion rate.  It is useful in counting the people in exhibitions so that to avoid overcrowding.  Can be used in estimating the better ways to evacuate any building by knowing the total people count in advance.  Helps in getting the routing information as the cameras not only count people, but they also sense the direction of movement to determine the route people take inside the store.  Useful in knowing the Average dwell time of people inside the building.  Helps in better Staff planning by having people flow statistics
  • 23. 22 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.2.8. Object removal detection This is the way of protecting valuables without any human monitoring. User can select the objects which need to be watched by the camera. Whenever object is found missing, then system will generate alarms. Your camera will acts as a virtual guard for the valuable objects. With this analytic 24x7 monitoring of the valuable objects is possible. User can also configure the time after which alarm should be raised once the system detects missing object. Figure: Missing object detection by analytic  Very simple & user friendly graphical interface with minimal mouse clicks.  Effective for 24x7 round the clock monitoring with even minimum illumination.  User can select any number of objects to be watched by the Analytic.  Very good performance even for watching multiple objects in the single video.  Well suited to Indian Requirements  Very useful for round the clock monitoring of valuables in Museums.  Can be used of protecting the sensitive objects put for show case like gold, ornaments etc.  Can be used for Equipment monitoring of computers, servers in sensitive server rooms.  Can be used for protection of assets in banks and other financial locations.  Useful for eye watch of items put for display during product exhibitions.
  • 24. 23 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.2.9. Stopped vehicle detection Most of the road accidents are mainly due to stopped vehicles. Our analytics is capable of detecting a stopped vehicle in multiple scenarios. Once the system detects the stopped vehicle, it is capable of taking the zoomed snapshot of the vehicle which includes the License Plate number image of vehicle. It can detect any stopped vehicle on roads. Once the user selects any No-Parking area, system starts detecting vehicle coming close to it. If any vehicle lowers its speed or trying to stop in No-Parking zone, then system will start alerting the user for illegal halting. User can select any number of zones in the video and each zone can have its own configurable parameters. Here time duration for which vehicle is allowed to halt is also configurable. Figure: Stopped vehicle detected by camera o By this system we can prevent any kind of illegal parking or illegal halting on the roads, premises etc. o It would be very useful to prevent traffic jams in crowded areas because of the illegal halting. o With this analytic we can also detect the vehicle which needs assistance o Illegal halting for long period of time can be detected & alerted to security for any unusual activity like BOMB or Explosive material in the vehicle
  • 25. 24 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.2.10. Camera Tampering detection This is Advanced Video based camera tampering detection analytic which can be coupled with any of the rest of Video Analytics. This Video Analytic further adds strength to the video solution by continuously monitoring the video feed from the camera. Camera tampering event will be generated whenever camera is moved, partially covered, severely defocused, paint sprayed etc. 2.2.11. Privacy Masking Privacy masking, which allows certain areas of a scene to be blocked or masked from viewing and recording, can be made available in various network video products. In a PTZ camera or PTZ dome camera, the functionality has the ability to maintain the privacy masking even as the camera’s field of view changes since the masking moves with the coordinate system. Figure: With built-in privacy masking (gray rectangle in image), the camera can guarantee privacy for areas that should not be covered by a surveillance application.
  • 26. 25 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.3. Emerging application areas Network video can be used in an almost unlimited number of applications; however, most of its uses fall under security surveillance or remote monitoring of people, places, property and operations. The following are some typical application possibilities in key industry segments 2.3.1. Retail Network video systems in retail stores can significantly reduce theft, improve staff security and optimize store management. A major benefit of network video is that it can be integrated with a store’s EAS (electronic article surveillance) system or a POS (point of sale) system to provide a picture and a record of shrinkage-related activities. The system can enable rapid detection of potential incidents, as well as any false alarms. Network video offers a high level of interoperability and gives the shortest return on investment. Network video can also help identify the most popular areas of a store and provide a record of consumer activity and buying behaviors that will help optimize the layout of a store or display. It can also be used to identify when shelves need to be restocked and when more cash registers need to be opened because of long queues.
  • 27. 26 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.3.2. Transportation Network video can enhance personal safety and overall security at air- ports, highways, train stations and other transit systems, as well as in mobile transport such as in buses, trains and cruise ships. Network video can also be used to monitor traffic conditions to reduce congestion and improve efficiency. Many installations in the transportation sector require only the best systems, involving high image quality (which can be provided by progressive scan technology in network cameras), high frame rates and long retention times. In some demanding environments such as on buses and trains, network cameras that can withstand varying temperatures, humidity, dust, vibrations and vandalism are required. 2.3.3. Education From daycare centers to universities, network video systems have helped deter vandalism and increase the safety of staff and students. In education facilities where an IT infrastructure is already in place, network video presents a more favorable and cost-effective solution than an analog system because new cabling is often not required. In addition, event management features in network video can generate alarms and give security operators accurate, real-time images on which to base their decisions. Network video can also be used for remote learning; for example, for students who are unable to attend lectures in person.
  • 28. 27 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.3.4. Industries Network video can be used to monitor and increase efficiencies in manufacturing lines, processes and logistic systems, and for securing warehouses and stock control systems. Network video can also be used to set up virtual meetings and get technical support at a distance. 2.3.5. City surveillance Network video is one of the most useful tools for fighting crime and protecting citizens. It can be used to detect and deter. The use of wireless networks has enabled effective city-wide deployment of network video. The remote surveillance capabilities of network video have enabled police to respond quickly to crimes being committed in live view. 2.3.6. Government Network video products are used to secure all kinds of public buildings, from museums and offices to libraries and prisons. Cameras placed at building entrances and exits can record who comes in and out, 24 hours a day. They are used to prevent vandalism and increase security of staff. With intelligent video applications such as people counting, network video can provide statistical information, such as the number of visitors to a building.
  • 29. 28 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 2.3.7. Healthcare Network video enables cost-effective, high-quality patient monitoring and video surveillance solutions that increase the safety and security of staff, patients and visitors, as well as property. Authorized hospital staff can, for example, view live video from multiple locations, detect activity and provide remote assistance. 2.3.8. Banking and finance Network video is used in security applications in bank branches, headquarters and ATM (automated teller machine) locations. Banks have been using surveillance for a long time, and while most installations are still analog, network video is starting to make inroads, especially in banks that value high image quality and want to be able to easily identify people in a surveillance video.
  • 30. 29 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Part III: What are Network Cameras and how they are made?
  • 31. 30 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 3. Network cameras A network or IP camera is a type of camera that can send and receive data via a computer network and Internet. The main components of a network camera include a lens, an image sensor, one or several processors, and memory. The processors are used for image processing, compression, video analysis and networking functionalities. The memory is used for storing the network camera’s firmware (computer program) and for local recording of video sequences. Figure A network camera connects directly to the network. Like a computer, the network camera has its own IP address, is connected directly to a network and can be placed wherever there is a network connection. This differs from a web camera, which can only operate when it is connected to a personal computer (PC) via the USB or IEEE 1394 port, and to use it, software must be installed on the PC. A network camera provides web server, FTP (File Transfer Protocol), and e-mail functionalities, and includes many other IP network and security protocols. A network camera can be configured to send video over an IP network for live viewing and/or recording either continuously, at scheduled times, on an event or on request from authorized users. Captured images can be streamed as Motion JPEG, MPEG-4 or H.264 video using various networking protocols, or uploaded as individual JPEG images using FTP, e-mail or HTTP (Hyper- text Transfer Protocol). In addition to capturing video, Network cameras provide event management and intelligent video functionalities such as video motion detection, audio detection, active tampering alarm and auto- tracking. Most network cameras also offer input/output (I/O) ports that enable connections to external devices such as sensors and relays. Other features may include audio capabilities and built-in support for Power over Ethernet (PoE).
  • 32. 31 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Figure Front and back of a network camera. 3.1. Classification of network cameras on the basis of their appearance and application area Network Cameras are of several types depending on their usability and features. They can be classified into 3 categories based on their appearance and application area:  Fixed Box Camera  Fixed Dome Camera  PTZ Camera Network cameras can also be classified in terms of whether they are designed for indoor use only or for indoor and outdoor use. Outdoor network cameras often have an auto iris lens to regulate the amount of light the image sensor is exposed to. An outdoor camera will also require an external, protective housing unless the camera design already incorporates a protective enclosure. Housings are also available for indoor cameras that require protection from harsh environments such as dust and humidity, and from vandalism or tampering. In some camera designs, vandal and tamper-proof features are already built-in and no external housing is required. 3.1.1. Fixed box network cameras A fixed box network camera, which may come with a fixed or varifocal lens, is a camera that has a fixed field of view (normal/telephoto/wide-angle) once it is mounted. A fixed camera is the traditional camera type where the camera and the direction in which it is pointing are clearly visible. This type of camera represents the best choice in applications where it is advantageous to make the camera very visible. A fixed camera usually enables its lens to be changed. Fixed cameras can be installed in housings designed for indoor or outdoor installation.
  • 33. 32 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Figure Fixed network cameras including wireless and megapixel versions. 3.1.2. Fixed Dome Network Cameras A fixed dome network camera, also called a mini dome, essentially involves a fixed camera that is pre-installed in small dome housing. The camera can be directed to point in any direction. Its main benefit lies in its discreet, non-obtrusive design, as well as in the fact that it is hard to see in which direction the camera is pointing. The camera is also tamper resistant. One of the limitations of a fixed dome camera is that it rarely comes with an exchangeable lens, and even if it is exchangeable, the choice of lenses is limited by the space inside the dome housing. To compensate for this, a varifocal lens is often provided to enable the camera’s field of view to be adjusted. Figure Fixed dome network cameras.
  • 34. 33 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 3.1.3. PTZ Cameras A PTZ camera or a PTZ dome camera can manually or automatically pan, tilt and zoom in and out of an area or object. All PTZ commands are sent over the same network cable as for video transmission; no RS-485 wires need to be installed as is the case with an analog PTZ camera. PTZ dome network cameras can cover a wide area by enabling greater flexibility in pan, tilt and zoom functions. They enable a 360-degree, continuous pan, and a tilt of usually 180 degrees. The optical zoom of a PTZ dome typically ranges between 10x and 35x. A PTZ dome network camera also provides mechanical robustness for continuous operation in guard tour mode, whereby the camera automatically moves from one preset position to the next in a pre-determined order or at random. Normally up to 20 guard tours can be set up and activated during different times of the day. In guard tour mode, one PTZ dome network camera can cover an area where 10 fixed network cameras would be needed. The main drawback is that only one location can be monitored at any given time, leaving the other nine positions unmonitored. Figure: PTZ dome network cameras
  • 35. 34 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 3.2. Classification of network camera on the basis of their Functionality 3.2.1. Day and night network cameras All types of network cameras—fixed, fixed dome, PTZ, and PTZ dome can offer day and night functionality. A day and night camera is designed to be used in outdoor installations or in indoor environments with poor lighting. A day and night, color network camera delivers color images during the day. As light diminishes below a certain level, the camera can automatically switch to night mode to make use of near- infrared (IR) light to deliver high-quality, black and white images. Near-infrared light, which spans from 700 nanometers (nm) up to about 1000 nm, is beyond what the human eye can see, but most camera sensors can detect it and make use of it. During the day, a day and night camera uses an IR-cut filter. IR light is filtered out so that it does not distort the colors of images as the human eye sees them. When the camera is in night (black and white) mode, the IR-cut filter is removed, allowing the camera’s light sensitivity to reach down to 0.001 lux or lower. Figure: Image at left, IR-cut filter in a day/night network camera; middle, position of IR-cut filter during daytime; at right, position of IR-cut filter during nighttime. Figure: Graph shows how an image sensor responds to visible and near-IR light. Near-IR light spans the 700 nm to 1000 nm range
  • 36. 35 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Day and night cameras are useful in environments that restrict the use of artificial light. They include low-light video surveillance situations, covert surveillance and discreet applications, for example, in a traffic surveillance situation where bright lights would disturb drivers at night. An IR illuminator that provides near-infrared light can also be used in conjunction with a day and night cameras to further enhance the camera’s ability to produce high-quality video in lowlight or nighttime conditions. Figure: At left, image without an IR illuminator; at right, image with an IR illuminator 3.2.2. HDTV, Megapixel or standard resolution camera One of the unique benefits that network video brings to the video surveillance market is the ability to move beyond the traditional PAL/NTSC resolution and frame rate limitations and experience high-resolution video with extreme image detail. Even a 1 megapixel network camera offers a resolution that is at least three times better than an analog CCTV camera, and there are network cameras that offer as much as 8 megapixel resolution – and beyond. Choosing the right camera for your system can easily become a challenge. These guidelines help you optimize your camera installation based on how you need to use your video to fulfill your video surveillance goals. HDTV Network Cameras are a recent technology development that has gained enormous interest on the video surveillance market. As for megapixel, HDTV means excellent image detail, but in addition, a true HDTV network camera complies with industry standards which ensure excellent color representation, full frame rate and a 16:9 format.
  • 37. 36 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 3.2.3. Thermal Network Cameras Thermal Network Cameras are a perfect complement to any professional IP- Surveillance system that needs to secure an area or a perimeter in complete darkness. They create images based on the heat that always radiates from any object, vehicle or person. This gives the cameras the power to see through complete darkness and deliver images that allow operators to detect and act on suspicious activity – 24 hours a day, seven days a week. Figure All objects emit thermal radiation which can be detected with a thermal network camera. Images are generally produced in black and white but can be artificially colored to make it easier to distinguish different shades. Thermal cameras are excellent for detecting people, objects and incidents in darkness and other challenging conditions. Thermal cameras do not, however, deliver images that allow reliable identification – that is why thermal cameras and conventional cameras complement and support each other in a surveillance installation. Thermal cameras do not require any additional light sources – conventional or IR – that consume energy, create shadows and reveal their locations. And, in contrast to conventional day-and-night cameras that depend on a certain amount of near-infrared light to function, thermal cameras deliver reliable surveillance images even in complete darkness.
  • 38. 37 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 3.3. How the IP Cameras are made / assembled For assembling a particular camera, lot of parts are joined together to form a finished product. Here I am taking an example of Shyam Fixed Box Camera, that how it is made. 3.3.1. Part list for assembling FALCON camera Following is the Part list for Assembling Shyam Fixed Box IP Camera (Falcon SM200 series) Falcon Item Agile part# Material use PicturesPart Name QTY 1 Bottom plate (With painting) 601.00146.00 Al. Alloy 1 NO 2 Top (with painting) 601.00145.00 Al. Alloy 1 NO 5 Capture PC plate With painting 601.00147.00 Zn Alloy 1 NO to hold capture pcb 3 Ball screw 601.00229.00 Zn Alloy 1 NO in mounitng 4 mount -1 With painting) 601.00272.00 Zn Alloy 1 NO 6 Mount- bottom With Painting) 601.00271.00 Al. Alloy 1 NO
  • 39. 38 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 8 Hitachi lens mount 609.00130.00 ABS 1 NO 9 Lens shade (for Hitachi lens) 609.00125.00 ABS 1 NO 10 lens shade (for CS mount lens) 609.00128.00 ABS 1 NO 11 lens shade (for x4 lens) 609.00129.00 ABS 1 NO 12 CS lens holder (Internal) 609.00157.00 ABS 1 NO 13 CS lens holder (External) 609.00126.00 ABS 1 NO 14 M12 (S) lens mount 609.00158.00 ABS 1 NO 15 Ring Nut (same part as in Kite) 609.00073.00 ABS 1 NO to adjust M12 lens 16 Spacer for IR cut filter 610.00026.00 Silicon 1 NO 17 Rubber cap for DC Iris connector hole 610.00027.00 Silicon 1 NO
  • 40. 39 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 18 Rubber cap for SMA connector hole 610.00028.00 Silicon 1 NO 19 spacer for keekon 601.00213.00 BRASS 4 NOS 20 spacer for CS (INTERNAL) 601.00214.00 BRASS 4 NOS 21 spacer for IO-POWER pcb 601.00310.00 BRASS 1 NO 22 spacer for CS (EXTERNAL) 601.00298.00 BRASS 4 NOS 23 M3 CSK 605.00197.00 SS 4 NOS OUTSIDE HOUSING 24 M3 PAN CROSS HEAD 605.00223.00 SS 10 NOS PCB FITTING 25 THUMB SCREW 605.00224.00 SS 1 NO IN MOUNITNG 26 GRUB SCREW 605.00225.00 SS 2 NOS IN MOUNITNG 27 SELF TAPPING WITH ANCHOR 605.00226.00 SS 4 NOS WALL MOUNITNG 28 M2 CSK 605.00238.00 SS 2 NOS FOR FITTING IR CUT FILTER 29 M2 HEX NUT 605.00132.00 SS 2 NOS FOR FITTING IR CUT FILTER
  • 41. 40 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 30 SELF TAPPING ST2.9 x 16L 605.00239.00 SS 2 NOS FOR FITTING LENS HOLDER 31 M4 CSK 605.00240.00 SS 1 NO FOR FITTING OUTDOOR SHIELD 32 SHIELD MOUNTING SCREW 601.00328.00 BRASS 1 NO FOR FITTING OUTDOOR SHIELD 33 LABLE 104.00063.00 POLYMIDE 1 NO
  • 42. 41 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 3.3.2. Assembly Line document Assembly line deatils Falcon Assembly PCB Assembly Encoder,Power & IO boards Step 1.1 Step 1.2 Plug-IN Power & IO PCBs in respective slots Back-panel Connectors Power Board IO Board
  • 43. 42 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Step 1.3 Up to this point is common for all models Step 1.4 Fix the spacer between Power & IO boards with screws from both sides Fix the PCB assembly into “Bottom plate” with Three screws as shown
  • 44. 43 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Capture Board (Only for CS mount and x4 Zoom) Step 1.5 Option 1: x4 Zoom lens (internal mount): Step 1.6: Fix lens mount and lens to capture board Place Spacer (IR cut filter spacer) above the image sensor Fix IR Cut filter above the sensor with spacer in between. (IR cut filter shown in transparent form for clarity ) Image sensor on capture board
  • 45. 44 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Lens mount assembly (for x4 Zoom lens) Step 1.7 : Fix Capture board Assembly to the “Holding plate” Fix “S-Mount lens holder” on the capture PCB above sensor Fix with Two diagonal screws Fix x4 zoom lens on to the lens holder Use locking nut to fix lens in Correct focal length Fix the Capture PCB assembly (with lens) to the “holding plate” with 4 spacers
  • 46. 45 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Capture board assembly with lens and holding plate Fix the Capture PCB assembly (with lens) to the “holding plate” with 4 spacers
  • 47. 46 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Step 1.8: Fix lens assembly inside enclosure (bottom plate) Insert “holding” plate into the slot in front of bottom plate
  • 48. 47 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Step 1.9: Connect Capture Board to Encoder baord Step 1.10: Connect Mic Connect capture board to encoder board using FRC cable Insert Mic to the Mis hole in front of the bottom plate and connect Mic cable to encoder board connector
  • 49. 48 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Step 1.11 Fix top cover Slide-in the top cover on to Bottom cover Fix top cover with 4 screws (2 on either side) to the bottom plate
  • 50. 49 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Step 1.12: Fix Lens shade Fix x4” Lens shade” to the front cover Use “rubber gasket to close DC Iris connector hole in front panel
  • 51. 50 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Step 1.13: Fix Antenna ( same for all Wi-Fi models) For non-Wi-Fi models, Use rubber gasket to close SMA connector hole on Back plate For Wi-Fi models, Use SMA connector on back plate and connect SMA antenna to it Back panel SMA connector for antenna SMA antenna
  • 52. 51 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Step 1.14 : Fix Mounting base (Same for all models) Fix Mounting base to the Bottom plate Camera can now be mounted on to the required surface (Wall)
  • 53. 52 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Part IV Possible Connectivity Medium
  • 54. 53 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 4. Possible connectivity options  Wired system  Wireless system  Hybrid system: combination of wired and wireless system 4.1. Basic terms used in connectivity 4.1.1. IP addressing: Any device that wants to communicate with other devices via the Internet must have a unique and appropriate IP address. IP addresses are used to identify the sending and receiving devices. There are currently two IP versions: IP version 4 (IPv4) and IP version 6 (IPv6). The main difference between the two is that the length of an IPv6 address is longer (128 bits compared with 32 bits for an IPv4 address). IPv4 addresses are most commonly used today. 4.1.2. Ports: A port number defines a particular service or application so that the receiving server (e.g., net- work camera) will know how to process the incoming data. When a computer sends data tied to a specific application, it usually automatically adds the port number to an IP address without the user’s knowledge. Port numbers can range from 0 to 65535. Certain applications use port numbers that are pre-assigned to them by the Internet Assigned Numbers Authority (IANA). For example, a web service via HTTP is typically mapped to port 80 on a network camera. 4.1.3. Data transport protocols for network video: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are the IP-based protocols used for sending data. These transport protocols act as carriers for many other protocols. For example, HTTP (Hyper Text Transfer Protocol), which is used to browse web pages on servers around the world using the Internet, is carried by TCP. TCP provides a reliable, connection-based transmission channel. It handles the process of breaking large chunks of data into smaller packets and ensures that data sent from one end is received on the other. TCP’s reliability through retransmission may introduce significant delays. In general, TCP is used when reliable communication is preferred over transport latency.
  • 55. 54 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY UDP is a connectionless protocol and does not guarantee the delivery of data sent, thus leaving the whole control mechanism and error-checking to the application itself. UDP provides no transmissions of lost data and, therefore, does not introduce further delays.
  • 56. 55 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Table Common TCP/IP protocols and ports used for network video. 4.2. Wired IP Surveillance System In Wired IP Surveillance System all the various components are connected to each other through LAN or Ethernet. Data is sent in the form of packets and to regulate the transmission of the packets, Ethernet technology is used. Ethernet uses a star topology in which the individual nodes (devices) are networked with one another via active networking equipment such as switches. The number of networked devices in a LAN can range from two to several thousand. The physical transmission medium for a wired LAN involves cables, mainly twisted pair or fiber optics. A twisted pair cable consists of eight wires, forming four pairs of twisted copper wires and is used with RJ-45 plugs and sockets. The maximum cable length of a twisted pair is 100 m (328 ft.) while for fiber, the maximum length ranges from 10 km to 70 km, depending on the type of fiber. Depending on the type of twisted pair or fiber optic cables used, data rates today can range from 100 Mbit/s to 10,000 Mbit/s. Figure Twisted pair cabling includes four pairs of twisted wires, normally connected to a RJ-45 plug at the end. A rule of thumb is to always build a network with greater capacity than is currently required. To future-proof a network, it is a good idea to design a network such that only 30% of its capacity is used. Since more and more applications are running over networks today, higher and higher network performance is required. While network switches (discussed below) are easy to upgrade after a few years, cabling is normally much more difficult to replace. 4.2.1. Types of Ethernet networks:  Fast Ethernet: Fast Ethernet refers to an Ethernet network that can transfer data at a rate of 100 Mbit/s. It can be based on a twisted pair or fiber optic cable. Most devices that are connected to a network, such as a laptop or a network camera, are equipped with a 100BASE-TX/10BASE-T Ethernet interface, most commonly called a 10/100 interface, which supports both 10 Mbit/s and Fast Ethernet. The type of twisted pair cable that
  • 57. 56 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY supports Fast Ethernet is called a Cat-5 cable.  Gigabit Ethernet: Gigabit Ethernet, which can also be based on a twisted pair or fiber optic cable, delivers a data rate of 1,000 Mbit/s (1 Gbit/s) and is becoming very popular. It is expected to soon replace Fast Ethernet as the de facto standard. The type of twisted pair cable that supports Gigabit Ethernet is a Cat-5e cable, where all four pairs of twisted wires in the cable are used to achieve the high data rates. Cat-5e or higher cable categories are recommended for network video systems. Most interfaces are backwards compatible with 10 and 100 Mbit/s Ethernet and are commonly called 10/100/1000 interfaces. For transmission over longer distances, fiber cables such as 1000BASE-SX (up to 550 m/1,639 ft.) and 1000BASE-LX (up to 550 m with multimode optical fibers and 5,000 m with single-mode fibers) can be used. Figure Longer distances can be bridged using fiber optic cables. Fiber is typically used in the backbone of a network and not in nodes such as a network camera.  10 Gigabit Ethernet: 10 Gigabit Ethernet is the latest generation and delivers a data rate of 10 Gbit/s (10,000 Mbit/s), and a fiber optic or twisted pair cable can be used. 10GBASE-LX4, 10GBASE-ER and 10GBASE-SR based on an optical fiber cable can be used to bridge distances of up to 10,000 m (6.2 miles). With a twisted pair solution, a very high quality cable (Cat-6a or Cat-7) is required. 10 Gbit/s Ethernet is mainly used for backbones in high- end applications that require high data rates.
  • 58. 57 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 4.3. Wireless IP Surveillance System In Wireless IP Surveillance System all the various components are connected to each other wirelessly through Internet using various communicating protocols such as HTTP, UDP and RTSP etc. Before discussing various protocols, some of the basic elements of Internet communication such as routers, firewalls and Internet service providers are discussed below:  Routers: To forward data packages from one LAN to another LAN via the Internet, networking equipment called a network router must be used. A router routes information from one network to another based on IP addresses. It forwards only data packages that are to be sent to another network. A router is most commonly used for connecting a local network to the Internet. Traditionally, routers were referred to as gateways.  Firewalls: A firewall is designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks that are connected to the Internet. Messages entering or leaving the Internet pass through the firewall, which examines each message, and blocks those that do not meet the specified security criteria.  Internet connections: In order to connect a LAN to the Internet, a network connection via an Internet service provider (ISP) must be established. When connecting to the Internet, terms such as upstream and down- stream are used. Upstream describes the transfer rate with which data can be uploaded from the device to the Internet; for instance, when video is sent from a network camera. Downstream is the transfer speed for downloading files; for instance, when video is received by a monitoring PC. In most scenarios—for example, a laptop that is connected to the Internet—downloading information from the Internet is the most important speed to consider. In a network video application with a network camera at a remote site, the upstream speed is more relevant since data (video) from the network camera will be uploaded to the Internet. NAT (Network address translation): When a network device with a private IP address wants to send information via the Internet, it must do so using a router that supports NAT. By using this technique router can translate a private IP address into a public IP address without the sending host’s knowledge. Port forwarding: To access cameras that are located on a private LAN via the Internet, the public IP address of the router should be used together with the corresponding port number for the network camera/video encoder on the private network.
  • 59. 58 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Port forwarding works as follows. Incoming data packets reach the router via the router’s public (external) IP address and a specific port number. The router is configured to forward any data coming into a predefined port number to a specific device on the private network side of the router. The router then replaces the sender’s address with its own private (internal) IP address. To a receiving client, it looks like the packets originated from the router. The reverse happens with outgoing data packets. The router replaces the private IP address of the source device with the router’s public IP address before the data is sent out over the Internet. Figure Router knows to forward data (request) coming into port 8032 to a network camera with a private IP address of 192.168.10.13 port 80 so that network camera can then begin to send video. Port forwarding is traditionally done by first configuring the router. Different routers have different ways of doing port forwarding and there are web sites such as www.portfoward.com that offer step-by-step instruction for different routers. Usually port forwarding involves bringing up the router’s interface using an Internet browser, and entering the public (external) IP address of the router and a unique port number that is then mapped to the internal IP address of the specific network video product and its port number for the application.
  • 60. 59 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Wireless Network Camera: A network camera with built-in wireless support is a consideration when running a cable between a LAN and a network camera is impractical, difficult or expensive. Wireless network cameras are suitable for use in outdoor situations, in environments such as historic buildings where the installation of cables would damage the interior, or in cases where there is a need to move cameras to new locations on a regular basis, such as in a supermarket. Ensure that the wireless network camera supports security protocols such as IEEE 802.1X and WPA/WPA2 (Wi-Fi Protected Access), which will help secure the wireless communication. A Wireless Network Camera using 802.11b/g. Figure By using a wireless bridge, any network camera can be used in a wireless network. WLAN: A wireless local area network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network. Most modern WLANs are based on IEEE 802.11 standards, marketed under the Wi-Fi brand name. All components that can connect into a wireless medium in a network are referred to as stations. All stations are equipped with wireless network interface controllers (WNICs). Wireless stations fall into one of two categories: access points, and clients. Access points (APs), normally routers, are base stations for the wireless network. They transmit and receive radio frequencies for wireless enabled devices to communicate with. Wireless clients can be mobile devices such as laptops, personal digital assistants, IP Camera and other Smartphones, or fixed devices such as desktops and workstations that are equipped with a wireless network interface.
  • 61. 60 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Wireless networks: For video surveillance applications, wireless technology offers a flexible, cost-efficient and quick way to deploy cameras, particularly over a large area as in a parking lot or a city center surveillance application. There would be no need to pull a cable through the ground. In older, protected buildings, wireless technology may be the only alternative if standard Ethernet cables may not be installed. Figure A network with wired and wireless connections.
  • 62. 61 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY Part V A Typical Surveillance System and its Components
  • 63. 62 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 5. A typical video surveillance system at one live site named as “Macawer Beekay” In the Proposed Solution, we have to do video surveillance in the complete industrial plant, which will be monitored locally as well as central control room, situated at some remote location. In this network we will connect all outdoor cameras through RF technology in P2P or point-to-multipoint Mode and indoor camera through wired connectivity. Every Location will be covered by either PTZ or fixed box Camera. Through Fix Camera we can view a pre- define area/zone, whereas a PTZ can be used for viewing the surrounding area (360 Deg.) of any particular locations. Every outdoor Camera will connect to the Remote Unit (CPE), and CPE will communicate to Base Station via Wireless. Repeater will be used where Line of sight will not be available. Figure:A bird’s eye-view of all the locations mentioned in the solution
  • 64. 63 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 5.1. Solution explanation  There will be 31 fixed box, 5 PTZ cameras and 3 dome cameras installed for surveillance.  All indoor cameras will be connected by 8-Port PoE switch through CAT-6 Cable.  All the outdoor cameras would be connected through wireless  Complete cabling will be done for all the cameras. 5.2. Solution components 5.2.1. Remote Surveillance Camera Units:  IP Fixed Box Camera (4x) ,IP PTZ Camera (35x),IP Fixed Zoom (10x)  They should be easy to install. Reliability is mandatory along with robustness.  Camera units will be installed at the light poles located at the border fencing  Unit installation should be easy and fast.  It should have provision of 24 hours backup and provision of adding more backup in special need.  All the camera units shall be enclosed in the weather-proof casing which has inbuilt heater and fan.  Link establishment with should be very easy and of high throughput. This throughput should be maintained in every kind of climate.  Camera shall be supported by IR lamps for night visibility  Camera shall have the support for the Pole Mount  Camera Units shall be of good resolution.  Camera Units shall be IP based and should give video & audio data on the IP interface built inside the camera  Camera Units shall be able to talk to the Wireless CPE  Each camera shall stream at a bit rate of 512 Kbps or 1 Mbps 5.2.2. Weather-proof Camera Housings  Weather-proof Standard IP66 with inbuilt heater and fan  Indoor and Outdoor Installations  Made for ultra-harsh environments  Applicable to Fixed Box and PTZ Cameras
  • 65. 64 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 5.2.3. L2 Switch 24 port  Switch is having the Throughput of 56Gbps.  Total they have 28 Gigabit ports in full duplex mode.  Supports many features like VLANs, Access list policies, radius Authentication.  Gives the 1 gig connectivity to all the connected Nodes.  Support QoS for prioritize the data stream like Voice and Video.  They are Easy to install and Monitor 5.2.4. Wireless Communication devices 5.2.4.1. Camera CPE’s  They are easy to install. Reliability is also available in this along with robustness. Camera CPE will be installed at the light poles located at the border fencing. They would be installed near the cameras and will be connected to the camera using ethernet interface.  These CPE will act as wireless client and will transfer the video data to central BTS to which they are registered.  CPE shall be able to communicated independently to the central BTS without affecting other CPE’s 5.2.4.2. BTS  BTS (Base Station) will be installed at the place wherever maximum line of site will be available. The distance will depend on the terrain between the BTS and the wireless CPE’s which it will connect to each Base Station has the capacity of 100 Mbps and shall support 15 CPE as the multipoint’s  BTS will aggregate the video & audio data from cameras which are connected through the CPE for that particular BTS will communicate to the CPE over secure 802.11b/g/n protocol.  Each BTS will have multiple sector antennas to connect on either side.  Fully Secure Communication with 128 bit encryption.
  • 66. 65 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 5.2.5. Video management system IP signal from RU will come to a desktop with large display. Here video management server is running to get the live feed from remote camera units. Functional Specifications of Video management server are given below 5.2.5.1. Live View Client  Automatic searching of devices in the network- Auto Search Supported  View live videos in 2x2, 3x3 and 4x4, 5x5, 6x6, 8x8 and split views in windows matrix  Remote Live View through web or through remote client.  View over Mobile  Devices network connection status  Picture Snapshot in jpeg format  Full screen view  PTZ controls for PTZ cameras  On screen Display: Frame rate, bit rate, date/time or user specified text. 5.2.5.2. Recordings & Storage  Triplex Mode: Live View, Recording and Playback simultaneously  Recording stream settings: Encoding (MJPEG, MPEG4 H.264), Resolution and  Frame rate.  Recordings in Chunks: Configurable Chunk Time  Schedule Recording with Date and time settings  Automatic Recordings restart after power failures  Disk Space Management. Alarms and events  Calculator to Find Hard disk requirements based on Number of cameras, number of days and Video Stream settings namely encoding, resolution and frame rate. 5.2.5.3. Playback of recorded video  Intelligent Search: Based on Camera, Date & time  Sorting recordings: Based on Camera and Start or End date/Time  Playback recordings: Play, forward and Seek options. Slow and fast playing  View Recordings using Desktop Client or through Windows Media Player  Export Evidence: Export Recorded video to CD/DVD or external drive as evidence.  Playback on Archived Video.
  • 67. 66 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 5.2.5.4. Archiving  Archiving on External Network Storage, CD/DVD or USB  Scheduled Archiving: Day and time of archiving  Automatic delete or archiving after set number of days. 5.2.5.5. Alarms Types of Alarm:  Email (Email server settings required)  SMS (Gateway/Modem required)  Option to add Physical Alarm connected in the Camera  Alarm for Low Disk Space  Alarm for Recording problems  Alarm for Archiving Events 5.2.5.6. Management Camera Management:  Defining Camera Groups  Camera access based on user roles  Saving and retrieving screen views User Management:  User based camera or camera group access  User Roles and levels  Login & Authentication 5.2.5.7. Video Analytics Software’s:  Intrusion Detection  Left Object Detection  Overcrowding  Camera Tampering 5.2.5.8. Security Camera Management:  Secure Communication  Double Login Security  Saving and retrieving screen views by user
  • 68. 67 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 6. CONCLUSION This project helped us gain the insight of how a Video Surveillance System is integrated, its working, maintenance and various other factors affecting it. Each Networking component was discussed in detail. Different types of network camera each having its particular need and application; different types of connecting media and modes; working of switch & routers; wired or wireless modes; video analytics utilizes the super power of computer processing help generate alarm on any unusual activity and lots more. All the things helped explore new avenues of knowledge. In short, Video Surveillance is growing industry which integrates various fields of Engineering to take the Security to the next level.
  • 69. 68 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY 7. REFERENCES E-Books: [1] Axis Technical guide to network video [2] Axis IP-Surveillance design guide [3] Various datasheets: Falcon SM200 Series, S810 Hawk, HAWK S9118 Sites: [1] www.vvdntech.com [2] www.shyamnetworks.com [3] www.axis.com [4] www.en.wikipedia.org