This document provides a case study of a video surveillance system implemented at VVDN Technologies Pvt. Ltd. It begins with an introduction to video surveillance systems and their benefits. It then discusses emerging trends in video surveillance technology, including applications in fire detection, traffic monitoring, intrusion detection, and more. The document also examines network camera components and connectivity options for video surveillance systems. Finally, it provides a description of a specific video surveillance system installed at a site called "Macawer Beekay", outlining the solution components and technical details.
The Early Adopters phase begins migrating data and moving a subset of users (5-10%) to Google Apps. Key tasks include beginning to provision user accounts and migrate mail, calendar, and contact data from the legacy system. Change management efforts ramp up through user communications and training. Technical configuration focuses on setting up split mail delivery and testing mobile connectivity to Google Apps.
The document discusses a development project report on failure analysis of rotary triggers. Rotary triggers play a vital role in achieving weighing accuracy in on-board weighing scales. Increased failures during the warranty period prompted an investigation into the root causes. Tests were developed to replicate faults in triggers returned as no fault found. Failure analysis found the potting material was not preventing water and toxic gases, leading to electronic component failures. Recommendations included improving the potting material to address the issue.
This document summarizes a project on developing a video surveillance system that can detect movement, record video footage, and transmit footage wirelessly. The system aims to be standalone and function unattended for a week. Key objectives are interfacing sensors with a microcontroller for detection, controlling a motor's position and speed, developing video capturing and wireless transmission software, and designing a robust power system. Deliverables include testing microcontroller input/output, a motion detection circuit, and programs for sending data to a PC and wireless transmission. The project aims to build a low-cost automated video surveillance system.
This document discusses a thesis on using augmented reality for full body immersion. It describes using a motion capture suit and video see-through technologies with the Oculus Rift head mounted display. The thesis aims to achieve realistic interactions between the user and virtual characters through body movements and gestures controlled in the augmented reality scene. It plans to evaluate the system using surveys after subjects interact with a virtual agent scenario while wearing the motion capture suit and Oculus Rift.
The document discusses penetration testing methodologies used by EC-Council. It describes several certification programs offered through EC-Council Press that provide training for security analysts, network security administrators, disaster recovery professionals and other IT security roles. The document also outlines EC-Council's mission to address the need for well-educated information security practitioners and describes the organization's global network of subject matter experts who help set cybersecurity standards.
The document discusses conducting a thorough analysis of common penetration testing tools and techniques that would be best suited for penetration testing of small and medium businesses in Nigeria, analyzing tools like Nmap, Metasploit, and Netsparker. It aims to determine the appropriate tools and techniques for an in-house penetration test by testing tools against mock systems and evaluating them based on metrics like speed, user-friendliness, and vulnerabilities identified.
The document is an internship report on CCTV surveillance submitted in partial fulfillment of a Bachelor of Technology degree. It discusses CCTV systems used at different scales, from small to large enterprises. Case studies describe CCTV setups at a GNFC building, a TDI plant, and an AMC citywide surveillance project covering multiple locations in Ahmedabad. The report provides an overview of CCTV technology and components as well as specifications for IP cameras.
iGUARD: An Intelligent Way To Secure - ReportNandu B Rajan
This document presents a project report for an intelligent door lock system called iGuard. It was submitted by Nandu B Rajan in partial fulfillment of the requirements for a Bachelor of Technology degree in computer science and engineering. The report includes sections on requirements analysis, system design, implementation, testing, and conclusions. It aims to develop a door lock system that provides strengthened security functions such as sending images of unauthorized access attempts to users and alerting users if the lock is physically damaged.
The Early Adopters phase begins migrating data and moving a subset of users (5-10%) to Google Apps. Key tasks include beginning to provision user accounts and migrate mail, calendar, and contact data from the legacy system. Change management efforts ramp up through user communications and training. Technical configuration focuses on setting up split mail delivery and testing mobile connectivity to Google Apps.
The document discusses a development project report on failure analysis of rotary triggers. Rotary triggers play a vital role in achieving weighing accuracy in on-board weighing scales. Increased failures during the warranty period prompted an investigation into the root causes. Tests were developed to replicate faults in triggers returned as no fault found. Failure analysis found the potting material was not preventing water and toxic gases, leading to electronic component failures. Recommendations included improving the potting material to address the issue.
This document summarizes a project on developing a video surveillance system that can detect movement, record video footage, and transmit footage wirelessly. The system aims to be standalone and function unattended for a week. Key objectives are interfacing sensors with a microcontroller for detection, controlling a motor's position and speed, developing video capturing and wireless transmission software, and designing a robust power system. Deliverables include testing microcontroller input/output, a motion detection circuit, and programs for sending data to a PC and wireless transmission. The project aims to build a low-cost automated video surveillance system.
This document discusses a thesis on using augmented reality for full body immersion. It describes using a motion capture suit and video see-through technologies with the Oculus Rift head mounted display. The thesis aims to achieve realistic interactions between the user and virtual characters through body movements and gestures controlled in the augmented reality scene. It plans to evaluate the system using surveys after subjects interact with a virtual agent scenario while wearing the motion capture suit and Oculus Rift.
The document discusses penetration testing methodologies used by EC-Council. It describes several certification programs offered through EC-Council Press that provide training for security analysts, network security administrators, disaster recovery professionals and other IT security roles. The document also outlines EC-Council's mission to address the need for well-educated information security practitioners and describes the organization's global network of subject matter experts who help set cybersecurity standards.
The document discusses conducting a thorough analysis of common penetration testing tools and techniques that would be best suited for penetration testing of small and medium businesses in Nigeria, analyzing tools like Nmap, Metasploit, and Netsparker. It aims to determine the appropriate tools and techniques for an in-house penetration test by testing tools against mock systems and evaluating them based on metrics like speed, user-friendliness, and vulnerabilities identified.
The document is an internship report on CCTV surveillance submitted in partial fulfillment of a Bachelor of Technology degree. It discusses CCTV systems used at different scales, from small to large enterprises. Case studies describe CCTV setups at a GNFC building, a TDI plant, and an AMC citywide surveillance project covering multiple locations in Ahmedabad. The report provides an overview of CCTV technology and components as well as specifications for IP cameras.
iGUARD: An Intelligent Way To Secure - ReportNandu B Rajan
This document presents a project report for an intelligent door lock system called iGuard. It was submitted by Nandu B Rajan in partial fulfillment of the requirements for a Bachelor of Technology degree in computer science and engineering. The report includes sections on requirements analysis, system design, implementation, testing, and conclusions. It aims to develop a door lock system that provides strengthened security functions such as sending images of unauthorized access attempts to users and alerting users if the lock is physically damaged.
This document summarizes a dissertation report on designing and implementing a SCADA system using wireless sensors to control fire effects in a refinery. The report acknowledges those who helped with the project and states the research aims to understand how to design interactive systems that are useful and save lives. It then discusses requirements for the hardware and software, technical issues considered, and designing the network topology.
The document describes a project report for a GSM-based home security system. The system uses an 8051 microcontroller, sensors for fire, burglary and gas, a GSM module, and other components to automate security and monitoring of a home. When intrusions or issues are detected, the system will send alerts to users via the GSM network. The report provides details on the components used, how the system was integrated and programmed, its advantages, and potential applications. It aims to develop a low-cost security solution that provides continuous monitoring through a multi-layered approach.
This document describes a master's thesis project carried out at Ericsson's site in Linköping, Sweden. The purpose of the project was to construct a model to capture and present the utilization rate of test equipment at a telecommunications company. The authors studied models from the production industry and proposed a common utilization tool that could store, configure and present utilization data from all types of equipment in Ericsson's test environment. As part of the project, the authors implemented a measurement module to sample the state of Base Station Controllers in Ericsson's test environment and validated it against real data.
This master's thesis explores integrating a home automation architecture based on EnOcean technology with a telecommunications architecture. It develops an EnOcean resource adaptor for a JAIN SLEE application server to communicate with an EnOcean gateway. It then develops a JAIN service that allows a SIP user agent to control and monitor home automation devices like lamps, motion sensors, and energy meters through an interactive voice response system. The goal is to demonstrate a method for remote management and control of EnOcean-based smart home devices through a telecommunications network and SIP.
This document provides an overview of image and audio steganography. It discusses the basics of steganography including its definition as concealed writing and a brief history of its use from ancient times to modern digital applications. The document focuses on different steganography techniques for images and audio, including least significant bit (LSB) encoding and decoding processes. It also includes system design diagrams and an implementation section describing a steganography program.
This document discusses brain computer interfaces (BCIs), including their applications and challenges. It describes how BCIs can be used for medical purposes like rehabilitation as well as non-medical applications in education, marketing, entertainment and security. The document outlines different techniques for acquiring brain signals, such as invasive and noninvasive methods, and discusses the electrical signals measured from the brain. It also examines major challenges for BCIs, such as usability and technical issues, and potential solutions to address these challenges.
This document summarizes a thesis on detecting coughs using mobile phones. It explores using a phone's built-in accelerometer to detect coughing as an alternative to audio-based detection. The author conducted an experiment collecting accelerometer data from coughing and non-coughing scenarios. Initial results using 7 features and 10-fold cross-validation achieved over 90% accuracy for cough detection. The thesis aims to determine the viability of accelerometer-based cough detection and achieve accuracy comparable to audio-based methods.
F dx sdk pro .net programming manual (windows) sg1 0030-b-008Oscar Groselle
This document provides an overview and instructions for programming with the SecuGen .NET SDK fingerprint recognition library. It discusses initializing the SGFingerPrintManager object, opening the fingerprint reader device, capturing and processing fingerprint images, and matching templates. The SDK allows developers to easily integrate fingerprint biometrics into .NET applications using SecuGen fingerprint readers and algorithms.
The document outlines a plan to implement CCTV cameras at Bridgewater International College. It analyzes the existing surveillance system, finding some cameras and cables were broken. The solution is to install a new 16-port DVR device, replace damaged cables, and add 8 new cameras. This was executed by fitting new cameras, installing the DVR and software, and replacing cables. The total cost was about 71,200 rupees. The upgraded system was implemented in 3 days to improve security at the college.
This document provides an introduction and table of contents to a research paper that compares video compression techniques used by HEVC and VP9 codecs. It discusses the need for new codecs to efficiently store and transmit ultra-high definition video. The paper will look at the encoding techniques used by each codec and conduct subjective testing to determine which is better at different bitrates and content. It provides background on how the eye perceives light and motion to understand video compression evaluation.
This thesis developed a system to enable a quadcopter to autonomously navigate to predefined target locations while avoiding obstacles. The system uses a monocular camera for localization, mapping and object detection. It implements Simultaneous Localization and Mapping (SLAM) for localization and builds a map. Oriented FAST and Rotated BRIEF (ORB) features are used to detect and classify obstacles. Reinforcement learning is used to navigate around obstacles and reach targets, by learning from rewards and punishments. The system was implemented and tested on a Parrot AR.Drone, navigating autonomously indoors to validate the approach.
This document is the master's thesis of Natascha Abrek submitted to the Technical University of Munich on October 14, 2015. The thesis proposes designing and implementing a mobile application for collaborative structuring of knowledge-intensive processes. Knowledge-intensive processes involve activities like knowledge sharing, reuse and collaboration between knowledge workers. However, such processes are unpredictable and dynamic in nature. The thesis aims to develop a mobile version of the existing web application Darwin to facilitate structuring of knowledge-intensive processes on mobile devices according to usability guidelines. An evaluation of the developed mobile solution will also be conducted to incorporate design improvements iteratively.
The document is a project report on using open hardware systems for surveillance. It was submitted by four students for their Bachelor of Technology degree. The report discusses conducting preliminary tests on the Raspberry Pi and Cubie Truck open hardware devices and their suitability for use in surveillance cameras. It also evaluates integrating surveillance camera feeds with an open source ERP (Enterprise Resource Planning) system to provide a low-cost surveillance solution using open hardware.
1. Previous work on green screen keying required controlled illumination and manual guidance, which is not feasible for real-time applications.
2. Recent approaches have used deep learning models but these struggle to achieve both high robustness and pixel-wise accuracy.
3. The proposed method in the paper uses a deeply guided linear model that first performs segmentation using a robust CNN, then applies a linear model to refine the segmentation, achieving both high robustness and accuracy for real-time green screen keying without specialized lighting or manual input.
A report on a project involving work on Arduino and Android. Overview as follows:
Synaesthesia is a system created to facilitate the traversal of small journeys for those of hard of sight to work in conjunction with a cane or seeing eye dog. This system allows users to avoid obstacles of waist height and alert them to moving obstacles within a distance of 3m.
The system works by reading values from three ultrasonic sensors connected to an Arduino board and sends the values to an Android device to interpret the distance and play corresponding tones of varying speed and volume. This is then sent to a Bluetooth headset to allow for stereoscopic sound to alert the user as to where the objects are approximately located.
The project endeavoured to deliver a reliable solution to these objectives in a portable environment.
This thesis evaluates the suitability of agile development methods for mobile applications. It presents improvements to an established agile method called Mobile-D, including categorizing mobile apps, including end-users in the development lifecycle, and adding performance testing. A support tool is developed to enable some improvements, providing features like performance testing for Android components, usage logging, and automatic test case generation. The goal is to improve Mobile-D and provide a more ideal mobile app development methodology and useful development tools.
This document is the final year project report presented by BOUAICHA Abdenour to fulfill the requirements for a MASTER degree in Electrical and Electronic Engineering from the M'Hamed BOUGARA University in Boumerdes, Algeria. The project involves characterizing vehicle flow for intelligent transportation systems using image processing techniques. Video is acquired from a fixed roadside camera and analyzed to detect, count, classify, and estimate the speeds of vehicles in real-time as they pass through a selected region of interest on the road.
This document provides an overview of augmented reality (AR) and its key components. It discusses the evolution of AR from early prototypes in the 1960s to current research. The main components of an AR system are described as a head-mounted display, tracking system, and mobile computing power. Two types of head-mounted displays are examined - optical see-through and video see-through displays. The document provides details on how each type of display works and their relative advantages and disadvantages. Finally, several applications of AR technology are briefly mentioned such as medical, entertainment, military training and more.
This document provides a technical report on a student's experience through the Student Industrial Work Experience Scheme (SIWES) program at X-Cel Computer Company Limited. It describes the various networking devices, tools, and equipment the student learned about and used, including routers, switches, patch panels, cables, and other infrastructure. It also details the experience gained in areas like networking, computer maintenance, and CCTV installation. The student declares having fulfilled the requirements for the National Innovation Diploma through this practical training opportunity at an IT company.
This document is a summer training report submitted by Akhil Garg to fulfill requirements for a Bachelor of Technology degree in Electronics and Communication Engineering. It discusses embedded systems and the 8051 microcontroller family. Specifically, it provides an introduction to embedded systems, compares microprocessors and microcontrollers, describes the architecture and features of the 8051 microcontroller, explains programming the 8051 in both assembly and C languages, and includes examples of programming the 8051 to control LEDs, 7-segment displays, LCDs, keypads and more. It also discusses the tools needed for 8051 programming including the Keil compiler and Flash Magic programmer.
This document summarizes a dissertation report on designing and implementing a SCADA system using wireless sensors to control fire effects in a refinery. The report acknowledges those who helped with the project and states the research aims to understand how to design interactive systems that are useful and save lives. It then discusses requirements for the hardware and software, technical issues considered, and designing the network topology.
The document describes a project report for a GSM-based home security system. The system uses an 8051 microcontroller, sensors for fire, burglary and gas, a GSM module, and other components to automate security and monitoring of a home. When intrusions or issues are detected, the system will send alerts to users via the GSM network. The report provides details on the components used, how the system was integrated and programmed, its advantages, and potential applications. It aims to develop a low-cost security solution that provides continuous monitoring through a multi-layered approach.
This document describes a master's thesis project carried out at Ericsson's site in Linköping, Sweden. The purpose of the project was to construct a model to capture and present the utilization rate of test equipment at a telecommunications company. The authors studied models from the production industry and proposed a common utilization tool that could store, configure and present utilization data from all types of equipment in Ericsson's test environment. As part of the project, the authors implemented a measurement module to sample the state of Base Station Controllers in Ericsson's test environment and validated it against real data.
This master's thesis explores integrating a home automation architecture based on EnOcean technology with a telecommunications architecture. It develops an EnOcean resource adaptor for a JAIN SLEE application server to communicate with an EnOcean gateway. It then develops a JAIN service that allows a SIP user agent to control and monitor home automation devices like lamps, motion sensors, and energy meters through an interactive voice response system. The goal is to demonstrate a method for remote management and control of EnOcean-based smart home devices through a telecommunications network and SIP.
This document provides an overview of image and audio steganography. It discusses the basics of steganography including its definition as concealed writing and a brief history of its use from ancient times to modern digital applications. The document focuses on different steganography techniques for images and audio, including least significant bit (LSB) encoding and decoding processes. It also includes system design diagrams and an implementation section describing a steganography program.
This document discusses brain computer interfaces (BCIs), including their applications and challenges. It describes how BCIs can be used for medical purposes like rehabilitation as well as non-medical applications in education, marketing, entertainment and security. The document outlines different techniques for acquiring brain signals, such as invasive and noninvasive methods, and discusses the electrical signals measured from the brain. It also examines major challenges for BCIs, such as usability and technical issues, and potential solutions to address these challenges.
This document summarizes a thesis on detecting coughs using mobile phones. It explores using a phone's built-in accelerometer to detect coughing as an alternative to audio-based detection. The author conducted an experiment collecting accelerometer data from coughing and non-coughing scenarios. Initial results using 7 features and 10-fold cross-validation achieved over 90% accuracy for cough detection. The thesis aims to determine the viability of accelerometer-based cough detection and achieve accuracy comparable to audio-based methods.
F dx sdk pro .net programming manual (windows) sg1 0030-b-008Oscar Groselle
This document provides an overview and instructions for programming with the SecuGen .NET SDK fingerprint recognition library. It discusses initializing the SGFingerPrintManager object, opening the fingerprint reader device, capturing and processing fingerprint images, and matching templates. The SDK allows developers to easily integrate fingerprint biometrics into .NET applications using SecuGen fingerprint readers and algorithms.
The document outlines a plan to implement CCTV cameras at Bridgewater International College. It analyzes the existing surveillance system, finding some cameras and cables were broken. The solution is to install a new 16-port DVR device, replace damaged cables, and add 8 new cameras. This was executed by fitting new cameras, installing the DVR and software, and replacing cables. The total cost was about 71,200 rupees. The upgraded system was implemented in 3 days to improve security at the college.
This document provides an introduction and table of contents to a research paper that compares video compression techniques used by HEVC and VP9 codecs. It discusses the need for new codecs to efficiently store and transmit ultra-high definition video. The paper will look at the encoding techniques used by each codec and conduct subjective testing to determine which is better at different bitrates and content. It provides background on how the eye perceives light and motion to understand video compression evaluation.
This thesis developed a system to enable a quadcopter to autonomously navigate to predefined target locations while avoiding obstacles. The system uses a monocular camera for localization, mapping and object detection. It implements Simultaneous Localization and Mapping (SLAM) for localization and builds a map. Oriented FAST and Rotated BRIEF (ORB) features are used to detect and classify obstacles. Reinforcement learning is used to navigate around obstacles and reach targets, by learning from rewards and punishments. The system was implemented and tested on a Parrot AR.Drone, navigating autonomously indoors to validate the approach.
This document is the master's thesis of Natascha Abrek submitted to the Technical University of Munich on October 14, 2015. The thesis proposes designing and implementing a mobile application for collaborative structuring of knowledge-intensive processes. Knowledge-intensive processes involve activities like knowledge sharing, reuse and collaboration between knowledge workers. However, such processes are unpredictable and dynamic in nature. The thesis aims to develop a mobile version of the existing web application Darwin to facilitate structuring of knowledge-intensive processes on mobile devices according to usability guidelines. An evaluation of the developed mobile solution will also be conducted to incorporate design improvements iteratively.
The document is a project report on using open hardware systems for surveillance. It was submitted by four students for their Bachelor of Technology degree. The report discusses conducting preliminary tests on the Raspberry Pi and Cubie Truck open hardware devices and their suitability for use in surveillance cameras. It also evaluates integrating surveillance camera feeds with an open source ERP (Enterprise Resource Planning) system to provide a low-cost surveillance solution using open hardware.
1. Previous work on green screen keying required controlled illumination and manual guidance, which is not feasible for real-time applications.
2. Recent approaches have used deep learning models but these struggle to achieve both high robustness and pixel-wise accuracy.
3. The proposed method in the paper uses a deeply guided linear model that first performs segmentation using a robust CNN, then applies a linear model to refine the segmentation, achieving both high robustness and accuracy for real-time green screen keying without specialized lighting or manual input.
A report on a project involving work on Arduino and Android. Overview as follows:
Synaesthesia is a system created to facilitate the traversal of small journeys for those of hard of sight to work in conjunction with a cane or seeing eye dog. This system allows users to avoid obstacles of waist height and alert them to moving obstacles within a distance of 3m.
The system works by reading values from three ultrasonic sensors connected to an Arduino board and sends the values to an Android device to interpret the distance and play corresponding tones of varying speed and volume. This is then sent to a Bluetooth headset to allow for stereoscopic sound to alert the user as to where the objects are approximately located.
The project endeavoured to deliver a reliable solution to these objectives in a portable environment.
This thesis evaluates the suitability of agile development methods for mobile applications. It presents improvements to an established agile method called Mobile-D, including categorizing mobile apps, including end-users in the development lifecycle, and adding performance testing. A support tool is developed to enable some improvements, providing features like performance testing for Android components, usage logging, and automatic test case generation. The goal is to improve Mobile-D and provide a more ideal mobile app development methodology and useful development tools.
This document is the final year project report presented by BOUAICHA Abdenour to fulfill the requirements for a MASTER degree in Electrical and Electronic Engineering from the M'Hamed BOUGARA University in Boumerdes, Algeria. The project involves characterizing vehicle flow for intelligent transportation systems using image processing techniques. Video is acquired from a fixed roadside camera and analyzed to detect, count, classify, and estimate the speeds of vehicles in real-time as they pass through a selected region of interest on the road.
This document provides an overview of augmented reality (AR) and its key components. It discusses the evolution of AR from early prototypes in the 1960s to current research. The main components of an AR system are described as a head-mounted display, tracking system, and mobile computing power. Two types of head-mounted displays are examined - optical see-through and video see-through displays. The document provides details on how each type of display works and their relative advantages and disadvantages. Finally, several applications of AR technology are briefly mentioned such as medical, entertainment, military training and more.
This document provides a technical report on a student's experience through the Student Industrial Work Experience Scheme (SIWES) program at X-Cel Computer Company Limited. It describes the various networking devices, tools, and equipment the student learned about and used, including routers, switches, patch panels, cables, and other infrastructure. It also details the experience gained in areas like networking, computer maintenance, and CCTV installation. The student declares having fulfilled the requirements for the National Innovation Diploma through this practical training opportunity at an IT company.
This document is a summer training report submitted by Akhil Garg to fulfill requirements for a Bachelor of Technology degree in Electronics and Communication Engineering. It discusses embedded systems and the 8051 microcontroller family. Specifically, it provides an introduction to embedded systems, compares microprocessors and microcontrollers, describes the architecture and features of the 8051 microcontroller, explains programming the 8051 in both assembly and C languages, and includes examples of programming the 8051 to control LEDs, 7-segment displays, LCDs, keypads and more. It also discusses the tools needed for 8051 programming including the Keil compiler and Flash Magic programmer.
MEMS (Micro-Electro-Mechanical Systems) are microfabricated structures that have both electrical and mechanical components and functionality. The document discusses how MEMS can be used in accelerometers, gyroscopes, hard drive read/write heads to enable faster actuation and finer positioning. It also outlines fabrication processes for MEMS like surface micro machining and LIGA and provides examples of MEMS applications in data storage, concluding that MEMS will transform lives by improving comfort.
VVDN Technologies provides a full IP network camera platform utilizing TI multimedia SoCs. The platform delivers full HD 1080p60 video and still image capture, H.264 encoding, and extensive system functions, connectivity, and peripheral support. It offers high performance image and video quality with support for stereo image sensors. The scalable and flexible platform enables next generation ultra-low power IP network cameras.
Gesture Recognition Techniques, Leap Motion Sensor: Taking leap to control anything in a real human manner unlike traditional artificial taps and clicks , Sviacam, Eviacam, moves the mouse pointer as you move your Head.
1. AKHILGARG
2011
VIDEOSURVEILLANCESYSTEM:
ACASESTUDY
With the development and globalization of human social activities,
Surveillance systems have become increasingly important and popular
in the public places such as banks, airports, public squares, casinos and
other places.
Case study made in:
VVDN Technologies Pvt. Ltd.
1241/36, Atul Kataria Chowk, Gurgaon
+91 124 4147642, +91 124 4378539
2. 1 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
ACKNOWLEDGEMENT
First of all I would like to thanks Supreme Power “Almighty God” for his blessings showered on
us during the project work without him nothing is possible.
Really it gives me immense pleasure to express my feelings of gratitude & reverence to people
who helped me in accomplishment of this project “Video Surveillance System: A Case Study” so
successfully.
The efforts put by me during the development of this project would have not been fruitful, had it
not been the people around us, who encouraged and helped us at all times.
I feel proud to do this project in VVDN Technologies in the Hardware Lab. I am highly pleased
to express my deep sense of gratitude to my project guide Mr. Himanshu Garg & Mr. Hemant
Sharma for their valuable guidance, suggestions and constant supervision at every stage. I will
remain ever grateful to them for their encouragement during the project.
Finally I want to thank all staff members of Hardware Lab for their very important support and
cooperation.
3. 2 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
CERTIFICATE
TO WHOM SOEVER IT MAY CONCERN
Dated: __________
This is to certify that Mr. AKHIL GARG, student of PANIPAT INSTITUTE OF
ENGINEERING & TECHNOLOGY, Panipat has successfully completed his six weeks
Industrial Training in VVDN Technologies, Gurgaon and submitted the project entitled “Video
Surveillance System: A Case Study”.
All his work is genuine and original and was timely completed. His conduct was found out to be
very satisfactory and his work has enabled us to add value to the organization and we wish him
success for his future.
Mr. Puneet Aggarwal Mr. Rajesh Kumar
Dy. Manager (A.P. ECE)
(VVDN, Gurgaon)
Mr. Himanshu Garg
(Project Guide)
4. 3 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
INDEX
1. Surveillance .........................................................................................................................................8
1.1. Video Surveillance System...........................................................................................................8
1.1.1. IP based Video Surveillance System ....................................................................................9
1.2. Benefits of Video Surveillance ...................................................................................................9
2. Emerging market trends in video surveillance...............................................................................13
2.1. General trends...........................................................................................................................13
2.2.1. Video based fire detection ................................................................................................15
2.2.2. Toll plaza video AVCC (Automatic vehicle counting & classification)........................16
2.2.3. Abandoned Object Detection ...........................................................................................17
2.2.4. Intrusion Detection ...........................................................................................................18
2.2.5. Video Enhancement..........................................................................................................19
2.2.6. Perimeter breach detection ..............................................................................................20
2.2.7. Indoor people counting.....................................................................................................21
2.2.8. Object removal detection..................................................................................................22
2.2.9. Stopped vehicle detection .................................................................................................23
2.2.10. Camera Tampering detection ..........................................................................................24
2.2.11. Privacy Masking................................................................................................................24
2.3. Emerging application areas......................................................................................................25
2.3.1. Retail ..................................................................................................................................25
2.3.2. Transportation ..................................................................................................................26
2.3.3. Education...........................................................................................................................26
2.3.4. Industries ...........................................................................................................................27
2.3.5. City surveillance................................................................................................................27
2.3.6. Government.......................................................................................................................27
2.3.7. Healthcare..........................................................................................................................28
2.3.8. Banking and finance .........................................................................................................28
3. Network cameras ..............................................................................................................................30
3.1. Classification of network cameras on the basis of their appearance and application area 31
3.1.1. Fixed box network cameras .............................................................................................31
5. 4 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3.1.2. Fixed Dome Network Cameras........................................................................................32
3.1.3. PTZ Cameras ....................................................................................................................33
3.2. Classification of network camera on the basis of their Functionality..................................34
3.2.1. Day and night network cameras......................................................................................34
3.2.2. HDTV, Megapixel or standard resolution camera.........................................................35
3.3. How the IP Cameras are made / assembled............................................................................37
3.3.1. Part list for assembling FALCON camera......................................................................37
3.3.2. Assembly Line document..................................................................................................41
Assembly line deatils...................................................................................................................................41
Falcon Assembly..........................................................................................................................................41
PCB Assembly..............................................................................................................................................41
Encoder,Power & IO boards.......................................................................................................................41
4. Possible connectivity options............................................................................................................53
4.1. Basic terms used in connectivity..............................................................................................53
4.2. Wired IP Surveillance System .................................................................................................55
4.2.1. Types of Ethernet networks:............................................................................................55
5. A typical video surveillance system at one live site named as “Macawer Beekay”.....................62
5.1. Solution explanation .................................................................................................................63
5.2. Solution components.................................................................................................................63
5.2.1. Remote Surveillance Camera Units:...................................................................................63
5.2.2. Weather-proof Camera Housings........................................................................................63
5.2.3. L2 Switch 24 port................................................................................................................64
5.2.4. Wireless Communication devices.......................................................................................64
5.2.4.1. Camera CPE’s.................................................................................................................64
5.2.4.2. BTS .................................................................................................................................64
5.2.5. Video management system ...............................................................................................65
6. CONCLUSION .................................................................................................................................67
7. REFERENCES..................................................................................................................................68
6. 5 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
ABOUT THE COMPANY
VVDN stands for Video Voice Data Networking. VVDN provides design services & solutions in
Voice, Video, Data and Networking domains. VVDN has strong experience in designing end-to-
end solutions for Video Surveillance and Networking Domain
Embedded Systems
Hardware Design & Development
System Board Design, PCB layout,
Verification & Validation (V&V), Low
Power Designs, Hardware
Integration.
System Software Engineering
RTOS, Design Methodologies, DSP,
Protocol Development, Software
Porting, Interface Integration,
Algorithms.
Design Services
End to End development of
IP/Network camera, Video
Surveillance, Video Analytics.
Networking
Wireless Networking
Wifi, WiMax, routers, USB ,
bluetooth, Wireless LAN (IEEE
802.11), GSM, RF, Mobile
processors
Wired Networking
LAN/WAN, Ethernet, Operating
Systems: Microsoft, Linux, Unix,
VxWorks.
Equipment’s
Servers, Blade Servers, Handheld
Devices. Mobile Engineering.
Telecom Applications
Integrated Services & Solutions
Commutation Equipment, Devices.
VOIP Solutions
IAD, IP Phones, IP PBX, Office-in-
box, Residential Gateway, CPE’s.
Operation Support Services
Enterprise Applications, Support
Applications, J2EE Framework, Web
Applications, Security.
We aim at providing high quality software engineering products and services to our clients. We
always adhere to minimal time frame for completing our client orders so that our customer
remains competitive and become more productive in market. VVDN believes in automation to
reduce project lifecycle and to increase the efficiency in terms of resources and expenses.
Besides this, we assure that we deliver for what we agreed for with our customer. In a nutshell,
we guarantee delivery of our products & services to customers while maintaining cost efficiency
and faster turnaround time for marketing, and thus is our motto “Certainty of Outcome”
We specialize in development of customized solutions which helps our customers in achieving
their objectives. We provide technical services which includes Software Development Lifecycle;
Video Surveillance, Wireless, Networking, and Telecom solutions to design, develop and
execute technology projects.
Our Product Development Methodology and Line of Attack Service Strategy is associated with
customer profitability thereby increasing internal customer value intimately. We also believe in
achieving customer confidence in our deep capabilities in software / hardware areas of embedded
systems, in networking as well as in electronic industry.
7. 6 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Contents
Part I: What is Video Surveillance?
Part II: Market Trends in Video Surveillance
Part III: What are Network Cameras and How They are made?
Part IV: Possible Connectivity Medium
Part V: A Typical Surveillance System and its Components
9. 8 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
1. Surveillance
Definition: Surveillance is the monitoring of the behavior, activities, or other changing
information, usually of people and often in a superstitious manner. Surveillance is
a French word meaning "watching over". It most usually refers to observation of individuals
or groups by government organizations, military, schools, hospitals and several other public
places.
The word surveillance may be applied to observation from a distance by means of electronic
equipment (like CCTV or IP cameras), or interception of electronically transmitted
information (Internet traffic or phone calls).Surveillance is very useful to governments and
law enforcement to maintain social control, recognize and monitor threats, and
prevent/investigate criminal activity.
1.1. Video Surveillance System
Video Surveillance System uses video cameras for the purpose of observing an area.
They are often connected to a recording device, IP network, and are watched by an
officer. Cameras and recording equipment used to be relatively expensive and required
human personnel to monitor camera footage. Now with cheaper production techniques, it
is simple and inexpensive enough to be used in home security systems, and for everyday
surveillance. Analysis of footage is made easier by automated software that organizes
digital video footage into a searchable database, and by automated video analysis
software (such as VIRAT and Human ID). The amount of footage is also drastically
reduced by motion sensors which only record when motion is detected.
Figure: Surveillance Cameras
10. 9 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
1.1.1. IP based Video Surveillance System
IP-Surveillance System is a system that gives users the ability to monitor and record
video/audio over an IP (Internet Protocol-based) computer network such as a local
area network (LAN) or the Internet. In a simple IP-Surveillance system, this
involves the use of a network camera (or an analog camera with a video
encoder/video server), a network switch, a PC for viewing, managing and storing
video, and video management software.
Figure: IP based Video Surveillance System with alarm integration
1.2. Benefits of Video Surveillance
The digital, network video surveillance system provides a host of benefits and advanced
functionalities that cannot be provided by an analog video surveillance system. The
advantages include remote accessibility, high image quality, event management and
intelligent video capabilities, easy integration possibilities and better scalability,
flexibility and cost-effectiveness.
Remote accessibility: Network cameras and video encoders can be
configured and accessed remotely, enabling multiple, authorized users to view
live and recorded video at any time and from virtually any networked location in
the world. This is advantageous if users would like a third-party company, such
as a security firm, to also gain access to the video. In a traditional analog CCTV
system, users would need to be at a specific, on-site monitoring location to view
and manage video, and off-site video access would not be possible without such
equipment as a video encoder or a network digital video recorder (DVR). A DVR
is the digital replacement for the video cassette recorder.
11. 10 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
High image quality: In a video surveillance application, high image quality
is essential to be able to clearly capture an incident in progress and identify
persons or objects involved. With progressive scan and megapixel technologies,
a network camera can deliver better image quality and higher resolution than an
analog CCTV camera.
Event management and intelligent video: There is often too much
video recorded and lack of time to properly analyze them. Advanced network
cameras and video encoders with built- in intelligence or analytics take care of
this problem by reducing the amount of uninteresting recordings and enabling
programmed responses. Such functionalities are not available in an analog
system.
Network cameras and video encoders have built-in features such as video motion
detection, audio detection alarm, active tampering alarm, I/O (input/output)
connections, and alarm and event management functionalities. These features
enable the network cameras and video encoders to constantly analyze inputs to
detect an event and to automatically respond to an event with actions such as
video recording and sending alarm notifications.
Easy, future-proof integration: Network video products based on open
standards can be easily integrated with computer and Ethernet-based information
systems, audio or security systems and other digital devices, in addition to video
management and application software. For instance, video from a network
camera can be integrated into a Point of Sales system or a building management
system.
Scalability and flexibility: A network video system can grow with a user’s
needs. IP-based systems provide a means for many network cameras and video
encoders, as well as other types of applications, to share the same wired or
wireless network for communicating data; so any number of network video
products can be added to the system without significant or costly changes to the
network infrastructure. This is not the case with an analog system. In an analog
video system, a dedicated coaxial cable must run directly from each camera to a
viewing/recording station. Separate audio cables must also be used if audio is
required.
12. 11 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Cost-effectiveness: An IP-Surveillance system typically has a lower total
cost of ownership than a traditional analog CCTV system. IP-based networks and
wireless options are much less expensive alternatives than traditional coaxial and
fiber cabling for an analog CCTV system. In addition, digital video streams can
be routed around the world using a variety of interoperable infrastructure.
Management and equipment costs are also lower since back-end applications and
storage run on industry standard, open systems-based servers, not on proprietary
hardware such as a DVR in the case of an analog CCTV system.
Power over Ethernet technology: PoE cannot be applied in an analog
video system, can be used in a network video system. PoE enables networked
devices to receive power from a PoE-enabled switch or midspan through the
same Ethernet cable that transports data (video). PoE provides substantial savings
in installation costs and can increase the reliability of the system.
Figure A system that uses Power over Ethernet.
13. 12 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Part II
Emerging Market Trends in Video
Surveillance
14. 13 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2. Emerging market trends in video surveillance
2.1. General trends
Gone are the days when grainy, black and white CCTV cameras attached in discreet
corners would fix themselves on immovable paths. IP surveillance is a need now. It is
now monitored by security experts switching channels from their laptop in another part of
the city, analyzing various aspects and behavior. As in-situations and popular campuses
turn into soft targets, surveillance has been shifted from the admin to the IT department.
The IP surveillance system needs an initial investment but it transfers the entire load on
the network making it more mobile and easier to guard.
An Axis communication study said that with if there were more than 32 cameras on a
network, IP surveillance would be cheaper to own in comparison to the traditional analog
option.
The costs can further decrease when cameras are configured to a router and can operate
wirelessly hence reduce the sizable, hid-den wiring hassle.
Cameras now come equipped with the ability to acquire power over the Ethernet.
The HD quality allows for clearer quality and smarter identification.
The cameras are usually connected to a network video recorder to handle recording,
video and alarm management. These cameras are better high-quality Web Cams and can
thus be routed to be viewed on remote screens as well.
The software, that comes, allows users to map movements and suspicious objects on the
camera's range.
An alarm can then be triggered and the alert can be sent in the form on an automatically
generated phone call, text message and even email to certain set of people or the control
center.
“IIT Mumbai has implemented IP surveillance to observe the entrances and exits,” said
Navinder Chauhan, D-Link. Chauhan explained that after the IT department took over, a
company would be able to handle it better since streams can then be diverted to tablets or
even smart-phones. This helps in keeping a constant watch and with-out someone
monitoring movements, while sitting all night in front of a television screen.
The cameras not only help in identification of regular offences, the software given with
them can link images with a database of the undesirables provided by the police or by an
internal authority and can raise an alarm.
15. 14 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2. Newest market Trend : Video analytics
VMS is integrated with comprehensive cluster of advanced Video Analytic Algorithms.
Each Video Analytic Module is coupled with Incident-Event-Action framework. User
can set different actions on each Video Analytic events.
Abandoned Object Detection
Video Based Fire Detection
Zone Intrusion Detection
Automatic Video Image Enhancement
Boundary Loitering Detection
Intelligent People Counting
Object Removal Detection
Perimeter Tripwire
Stopped Vehicle Detection
Camera Tampering Detection
Toll Plaza Vehicle Classification
Each of the above Video Analytics can be run both in manual and auto mode with
scheduled presets. On each event detection VMS would send alerts to appropriate
security personnel. DiCortex Alert Management Framework supports alerts in the form
of Sound alarms, Email, SMS, camera alarm. Above all Video Analytics are equipped
with False Alarm Suppression Technology (FAST) which minimizes false alarms and
further strengthens the solution reliability.
16. 15 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.1. Video based fire detection
Sensor based Fire Alarms detects fire by monitoring the environmental changes
associated with combustion. But these systems got some limitations in covering
wide physical area.
Video Based Fire Detection technology further strengthen the IP Video Surveillance
solutions. It works using advanced Image processing and Pattern Recognition
algorithm. This analytic has been tested in wide variety of scenarios ranging of
normal indoor mild fire to forest fires. System can alert the user based on the
intensity and duration of the fire occurrence.
False Alarm Suppression Technology (FAST) further helps in adding more
reliability to this Video Analytic.
Figure: Detection of fire by Fire detection analytic
17. 16 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.2. Toll plaza video AVCC (Automatic vehicle counting &
classification)
Advanced Technology for Vehicle Counting and Classification is Easy to Install and
Use for existing Toll Plaza. It has edge over conventional Hardware sensors based
AVCC (Automatic Vehicle Classification) in terms of interoperability. AVCC
solution is capable of detecting and classifying the vehicles into different classes
such as BIKE, CAR, LCV, 2-Axle HCV, 3-Axle HCV and OSV. It can be easily
integrated with existing Toll Plaza Ticketing Management Software. The solution
can be used for both Real time validation of Operator issues tickets and also offline
Audit of the Ticketing System.
Key Advantages
Easy to Install and Operate
No need of Hardware sensors
Open Framework for Easy Integration
Recording the Vehicle Snapshot
Advanced Reporting and Statistics
Integrated with i2V Video Management
Software
Better Accuracy for Vehicle Detection &
Classification
18. 17 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.3. Abandoned Object Detection
This is one of most important and crucial Video Analytic Algorithm which serves many
of the current security requirements. It became practically impossible to human beings
for round the clock monitoring of the crowded areas like Airports, City Metro Stations
etc. Our Solutions mainly aims at detecting the suspicious objects, unattended baggage
etc. Algorithm is specially tuned to handle crowded scenes. This analytic adds the
maximum intelligence to surveillance applications.
Figure: abandoned object detection by camera
Very accurate even in low light conditions
Well-tuned to handle crowded scenarios like Airports, Metro stations
System can learn from the user feedback in case of false alarms
Pre Event recording feature is available with this analytic
Ideal for detecting the bomb baggage in public places
Useful for detecting the Foreign objects on Railway tracks
Well suited to places like Shopping malls, Airports, Metro Stations etc.
19. 18 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.4. Intrusion Detection
This is the process of locating a moving object in a prohibited or restricted area in
time. The algorithm analyses the video frames and outputs the location of moving
targets within the frame. Video based Intrusion detection (VID) is a way of defining
activity in a scene by analyzing image data and differences in a series of images.
The functionality is made available with video management software. System
allows you to set the activity threshold depending on what you want to monitor.
System has the capability to set the sensitivity for indoor or outdoor conditions to
avoid false alarms.
Figure: Intrusion detected by camera
Support Multiple Intrusion Zones with a Single Camera.
Direction based Intrusion detection with regular shapes.
User can get Zone based Alarms
Global Parameter Control Over the System
Minimal False Alarm Rates
Well customized to Indian Requirements
Automatic Image enhancement Controls for Bad light Scenarios
Well-tuned with Low Frame Rate and Low Resolution Input
Supports the feature of scheduled automatic on/off of this Analytics module.
Supports Wide variety of Intrusion Zones shapes starting with Simple
Rectangle to Any sized Polygon
User can define Directional based Intrusion for Regular Shaped Zones like
Square, Rectangle.
20. 19 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.5. Video Enhancement
This analytic automatically converts the low contrast and low brightness video to
enhanced video. It intelligently enhances the quality of the video by analyzing the
local and global features in each frame of the video. Automatic Video Image
enhancement can be used in following cases:
Enhancing Video containing Fog
Enhancing the Video containing Low light
Enhancing the Video in Rainy season
Figure: Video Enhanced by Analytic
This feature is available at run time both while recording and playback.
Useful while viewing the videos covered with Fog or Rain
It can always play or record the better quality night time videos
Scheduled application of this feature is possible with VMS
Advanced image enhancement techniques were used to improve the video
quality.
21. 20 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.6. Perimeter breach detection
This is a Trespassing Detection Analytic which can detect the trespassing of humans
in restricted areas. Any number restricted areas can be selected by the user. This
analytic is also capable of sending zone based alerts. This is different from
conventional Intrusion detection systems in terms of Human tracking over the
selected zones. Once the system detects the possible Trespasser, then it starts
transmitting audio and visual signals to the monitoring workstation at the local
security office
Figure: Perimeter breach detected by analytic
Support a combination of Multiple Zones.
Allows different Parameter Settings for Each Zone.
Zone highlighting when it detects the trespasser.
Global parameter Control over all selected Zones.
Automatic Image enhancement Controls for Bad light Scenarios
Supports the feature of scheduled automatic on/off of this analytics module.
As each Zone is identified with a unique identifier, user can get to know
exact zone where trespassing occurred.
22. 21 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.7. Indoor people counting
People Counting is one of the Video Analytic module which helps in Statistical
analysis of Human flow inside any building or premises. Our People Counting
algorithm is well suited to such requirements. The system gives a real time
indication of number of visitors inside the store or building. It creates a Virtual line
or Virtual zone for counting operation. Later system starts tracking the Human
Heads passing over the virtual line. User can adjust the position of the line over
entire image.
Figure: People counting done by Video analytic
The use of people counting systems can prove very useful in the retail
environment to calculate the conversion rate.
It is useful in counting the people in exhibitions so that to avoid overcrowding.
Can be used in estimating the better ways to evacuate any building by
knowing the total people count in advance.
Helps in getting the routing information as the cameras not only count people,
but they also sense the direction of movement to determine the route people take
inside the store.
Useful in knowing the Average dwell time of people inside the building.
Helps in better Staff planning by having people flow statistics
23. 22 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.8. Object removal detection
This is the way of protecting valuables without any human monitoring. User can select
the objects which need to be watched by the camera. Whenever object is found missing,
then system will generate alarms.
Your camera will acts as a virtual guard for the valuable objects. With this analytic 24x7
monitoring of the valuable objects is possible. User can also configure the time after
which alarm should be raised once the system detects missing object.
Figure: Missing object detection by analytic
Very simple & user friendly graphical interface with minimal mouse clicks.
Effective for 24x7 round the clock monitoring with even minimum illumination.
User can select any number of objects to be watched by the Analytic.
Very good performance even for watching multiple objects in the single
video.
Well suited to Indian Requirements
Very useful for round the clock monitoring of valuables in Museums.
Can be used of protecting the sensitive objects put for show case like gold,
ornaments etc.
Can be used for Equipment monitoring of computers, servers in sensitive server
rooms.
Can be used for protection of assets in banks and other financial locations.
Useful for eye watch of items put for display during product exhibitions.
24. 23 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.9. Stopped vehicle detection
Most of the road accidents are mainly due to stopped vehicles. Our analytics is capable of
detecting a stopped vehicle in multiple scenarios. Once the system detects the stopped
vehicle, it is capable of taking the zoomed snapshot of the vehicle which includes the
License Plate number image of vehicle.
It can detect any stopped vehicle on roads. Once the user selects any No-Parking area,
system starts detecting vehicle coming close to it. If any vehicle lowers its speed or trying
to stop in No-Parking zone, then system will start alerting the user for illegal halting.
User can select any number of zones in the video and each zone can have its own
configurable parameters. Here time duration for which vehicle is allowed to halt is also
configurable.
Figure: Stopped vehicle detected by camera
o By this system we can prevent any kind of illegal parking or illegal halting on the
roads, premises etc.
o It would be very useful to prevent traffic jams in crowded areas because of the
illegal halting.
o With this analytic we can also detect the vehicle which needs assistance
o Illegal halting for long period of time can be detected & alerted to security for any
unusual activity like BOMB or Explosive material in the vehicle
25. 24 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.2.10. Camera Tampering detection
This is Advanced Video based camera tampering detection analytic which can be
coupled with any of the rest of Video Analytics. This Video Analytic further adds
strength to the video solution by continuously monitoring the video feed from the
camera. Camera tampering event will be generated whenever camera is moved,
partially covered, severely defocused, paint sprayed etc.
2.2.11. Privacy Masking
Privacy masking, which allows certain areas of a scene to be blocked or masked
from viewing and recording, can be made available in various network video
products. In a PTZ camera or PTZ dome camera, the functionality has the ability to
maintain the privacy masking even as the camera’s field of view changes since the
masking moves with the coordinate system.
Figure: With built-in privacy masking (gray rectangle in image), the camera can guarantee privacy for areas that should not be covered by a
surveillance application.
26. 25 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.3. Emerging application areas
Network video can be used in an almost unlimited number of applications; however, most of its
uses fall under security surveillance or remote monitoring of people, places, property and
operations. The following are some typical application possibilities in key industry segments
2.3.1. Retail
Network video systems in retail stores can significantly reduce theft, improve staff
security and optimize store management. A major benefit of network video is that it can
be integrated with a store’s EAS (electronic article surveillance) system or a POS (point
of sale) system to provide a picture and a record of shrinkage-related activities. The
system can enable rapid detection of potential incidents, as well as any false alarms.
Network video offers a high level of interoperability and gives the shortest return on
investment.
Network video can also help identify the most popular areas of a store and provide a
record of consumer activity and buying behaviors that will help optimize the layout of a
store or display. It can also be used to identify when shelves need to be restocked and
when more cash registers need to be opened because of long queues.
27. 26 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.3.2. Transportation
Network video can enhance personal safety and overall security at air- ports, highways,
train stations and other transit systems, as well as in mobile transport such as in buses,
trains and cruise ships. Network video can also be used to monitor traffic conditions to
reduce congestion and improve efficiency. Many installations in the transportation sector
require only the best systems, involving high image quality (which can be provided by
progressive scan technology in network cameras), high frame rates and long retention
times. In some demanding environments such as on buses and trains, network cameras
that can withstand varying temperatures, humidity, dust, vibrations and vandalism are
required.
2.3.3. Education
From daycare centers to universities, network
video systems have helped deter vandalism and
increase the safety of staff and students. In
education facilities where an IT infrastructure is
already in place, network video presents a more
favorable and cost-effective solution than an
analog system because new cabling is often not
required. In addition, event management features
in network video can generate alarms and give
security operators accurate, real-time images on
which to base their decisions. Network video can
also be used for remote learning; for example, for
students who are unable to attend lectures in
person.
28. 27 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.3.4. Industries
Network video can be used to monitor and
increase efficiencies in manufacturing lines,
processes and logistic systems, and for securing
warehouses and stock control systems. Network
video can also be used to set up virtual meetings
and get technical support at a distance.
2.3.5. City surveillance
Network video is one of the most useful tools for
fighting crime and protecting citizens. It can be
used to detect and deter. The use of wireless
networks has enabled effective city-wide
deployment of network video. The remote
surveillance capabilities of network video have
enabled police to respond quickly to crimes being
committed in live view.
2.3.6. Government
Network video products are used to secure all
kinds of public buildings, from museums and
offices to libraries and prisons. Cameras placed at
building entrances and exits can record who
comes in and out, 24 hours a day. They are used
to prevent vandalism and increase security of
staff. With intelligent video applications such as
people counting, network video can provide
statistical information, such as the number of
visitors to a building.
29. 28 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
2.3.7. Healthcare
Network video enables cost-effective,
high-quality patient monitoring and
video surveillance solutions that
increase the safety and security of staff,
patients and visitors, as well as
property. Authorized hospital staff can,
for example, view live video from
multiple locations, detect activity and
provide remote assistance.
2.3.8. Banking and finance
Network video is used in security
applications in bank branches,
headquarters and ATM (automated teller
machine) locations. Banks have been
using surveillance for a long time, and
while most installations are still analog,
network video is starting to make
inroads, especially in banks that value
high image quality and want to be able
to easily identify people in a
surveillance video.
30. 29 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Part III:
What are Network Cameras and how they
are made?
31. 30 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3. Network cameras
A network or IP camera is a type of camera that can send and receive data via a computer
network and Internet. The main components of a network camera include a lens, an image
sensor, one or several processors, and memory. The processors are used for image processing,
compression, video analysis and networking functionalities. The memory is used for storing the
network camera’s firmware (computer program) and for local recording of video sequences.
Figure A network camera connects directly to the network.
Like a computer, the network camera has its own IP address, is connected directly to a network
and can be placed wherever there is a network connection. This differs from a web camera,
which can only operate when it is connected to a personal computer (PC) via the USB or IEEE
1394 port, and to use it, software must be installed on the PC. A network camera provides web
server, FTP (File Transfer Protocol), and e-mail functionalities, and includes many other IP
network and security protocols.
A network camera can be configured to send video over an IP network for live viewing and/or
recording either continuously, at scheduled times, on an event or on request from authorized
users. Captured images can be streamed as Motion JPEG, MPEG-4 or H.264 video using various
networking protocols, or uploaded as individual JPEG images using FTP, e-mail or HTTP
(Hyper- text Transfer Protocol).
In addition to capturing video, Network cameras provide event management and intelligent video
functionalities such as video motion detection, audio detection, active tampering alarm and auto-
tracking. Most network cameras also offer input/output (I/O) ports that enable connections to
external devices such as sensors and relays. Other features may include audio capabilities and
built-in support for Power over Ethernet (PoE).
32. 31 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Figure Front and back of a network camera.
3.1. Classification of network cameras on the basis of their
appearance and application area
Network Cameras are of several types depending on their usability and features. They
can be classified into 3 categories based on their appearance and application area:
Fixed Box Camera
Fixed Dome Camera
PTZ Camera
Network cameras can also be classified in terms of whether they are designed for indoor
use only or for indoor and outdoor use.
Outdoor network cameras often have an auto iris lens to regulate the amount of light the
image sensor is exposed to. An outdoor camera will also require an external, protective
housing unless the camera design already incorporates a protective enclosure. Housings
are also available for indoor cameras that require protection from harsh environments
such as dust and humidity, and from vandalism or tampering. In some camera designs,
vandal and tamper-proof features are already built-in and no external housing is required.
3.1.1. Fixed box network cameras
A fixed box network camera, which may come with a fixed or varifocal lens, is a camera
that has a fixed field of view (normal/telephoto/wide-angle) once it is mounted. A fixed
camera is the traditional camera type where the camera and the direction in which it is
pointing are clearly visible. This type of camera represents the best choice in applications
where it is advantageous to make the camera very visible. A fixed camera usually
enables its lens to be changed. Fixed cameras can be installed in housings designed for
indoor or outdoor installation.
33. 32 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Figure Fixed network cameras including wireless and megapixel versions.
3.1.2. Fixed Dome Network Cameras
A fixed dome network camera, also called a mini dome, essentially involves a fixed
camera that is pre-installed in small dome housing. The camera can be directed to point in
any direction. Its main benefit lies in its discreet, non-obtrusive design, as well as in the
fact that it is hard to see in which direction the camera is pointing. The camera is also
tamper resistant.
One of the limitations of a fixed dome camera is that it rarely comes with an
exchangeable lens, and even if it is exchangeable, the choice of lenses is limited by the
space inside the dome housing. To compensate for this, a varifocal lens is often provided
to enable the camera’s field of view to be adjusted.
Figure Fixed dome network cameras.
34. 33 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3.1.3. PTZ Cameras
A PTZ camera or a PTZ dome camera can manually or automatically pan, tilt and
zoom in and out of an area or object. All PTZ commands are sent over the same
network cable as for video transmission; no RS-485 wires need to be installed as is
the case with an analog PTZ camera.
PTZ dome network cameras can cover a wide area by enabling greater flexibility in
pan, tilt and zoom functions. They enable a 360-degree, continuous pan, and a tilt of
usually 180 degrees. The optical zoom of a PTZ dome typically ranges between 10x
and 35x.
A PTZ dome network camera also provides mechanical robustness for continuous
operation in guard tour mode, whereby the camera automatically moves from one
preset position to the next in a pre-determined order or at random. Normally up to
20 guard tours can be set up and activated during different times of the day. In guard
tour mode, one PTZ dome network camera can cover an area where 10 fixed
network cameras would be needed. The main drawback is that only one location can
be monitored at any given time, leaving the other nine positions unmonitored.
Figure: PTZ dome network cameras
35. 34 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3.2. Classification of network camera on the basis of their
Functionality
3.2.1. Day and night network cameras
All types of network cameras—fixed, fixed dome, PTZ, and PTZ dome can offer
day and night functionality. A day and night camera is designed to be used in
outdoor installations or in indoor environments with poor lighting.
A day and night, color network camera delivers color images during the day. As
light diminishes below a certain level, the camera can automatically switch to night
mode to make use of near- infrared (IR) light to deliver high-quality, black and
white images.
Near-infrared light, which spans from 700 nanometers (nm) up to about 1000 nm, is
beyond what the human eye can see, but most camera sensors can detect it and make
use of it. During the day, a day and night camera uses an IR-cut filter. IR light is
filtered out so that it does not distort the colors of images as the human eye sees
them. When the camera is in night (black and white) mode, the IR-cut filter is
removed, allowing the camera’s light sensitivity to reach down to 0.001 lux or
lower.
Figure: Image at left, IR-cut filter in a day/night network camera; middle, position of
IR-cut filter during daytime; at right, position of IR-cut filter during nighttime.
Figure: Graph shows how an image sensor responds to visible and
near-IR light. Near-IR light spans the 700 nm to 1000 nm range
36. 35 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Day and night cameras are useful in environments that restrict the use of artificial light. They
include low-light video surveillance situations, covert surveillance and discreet applications, for
example, in a traffic surveillance situation where bright lights would disturb drivers at night.
An IR illuminator that provides near-infrared light can also be used in conjunction with a day
and night cameras to further enhance the camera’s ability to produce high-quality video in
lowlight or nighttime conditions.
Figure: At left, image without an IR illuminator; at right, image with an IR illuminator
3.2.2. HDTV, Megapixel or standard resolution camera
One of the unique benefits that network video brings to the video surveillance
market is the ability to move beyond the traditional PAL/NTSC resolution and
frame rate limitations and experience high-resolution video with extreme image
detail. Even a 1 megapixel network camera offers a resolution that is at least three
times better than an analog CCTV camera, and there are network cameras that offer
as much as 8 megapixel resolution – and beyond.
Choosing the right camera for your system can easily become a challenge. These
guidelines help you optimize your camera installation based on how you need to use
your video to fulfill your video surveillance goals.
HDTV Network Cameras are a recent technology development that has gained
enormous interest on the video surveillance market. As for megapixel, HDTV
means excellent image detail, but in addition, a true HDTV network camera
complies with industry standards which ensure excellent color representation, full
frame rate and a 16:9 format.
37. 36 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3.2.3. Thermal Network Cameras
Thermal Network Cameras are a perfect complement to any professional IP-
Surveillance system that needs to secure an area or a perimeter in complete
darkness. They create images based on the heat that always radiates from any
object, vehicle or person. This gives the cameras the power to see through complete
darkness and deliver images that allow operators to detect and act on suspicious
activity – 24 hours a day, seven days a week.
Figure All objects emit thermal radiation which can be detected with a thermal network camera. Images are generally produced in black and
white but can be artificially colored to make it easier to distinguish different shades.
Thermal cameras are excellent for detecting people, objects and incidents in darkness
and other challenging conditions. Thermal cameras do not, however, deliver images
that allow reliable identification – that is why thermal cameras and conventional
cameras complement and support each other in a surveillance installation.
Thermal cameras do not require any additional light sources – conventional or IR – that
consume energy, create shadows and reveal their locations. And, in contrast to
conventional day-and-night cameras that depend on a certain amount of near-infrared
light to function, thermal cameras deliver reliable surveillance images even in complete
darkness.
38. 37 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3.3. How the IP Cameras are made / assembled
For assembling a particular camera, lot of parts are joined together to form a finished
product. Here I am taking an example of Shyam Fixed Box Camera, that how it is made.
3.3.1. Part list for assembling FALCON camera
Following is the Part list for Assembling Shyam Fixed Box IP Camera (Falcon SM200
series)
Falcon
Item Agile part# Material
use PicturesPart Name QTY
1
Bottom plate
(With
painting)
601.00146.00 Al. Alloy 1 NO
2
Top (with
painting)
601.00145.00 Al. Alloy 1 NO
5
Capture PC
plate With
painting
601.00147.00 Zn Alloy 1 NO
to hold capture
pcb
3 Ball screw 601.00229.00 Zn Alloy 1 NO
in mounitng
4
mount -1
With
painting)
601.00272.00 Zn Alloy 1 NO
6
Mount-
bottom With
Painting)
601.00271.00 Al. Alloy 1 NO
39. 38 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
8
Hitachi lens
mount
609.00130.00 ABS 1 NO
9
Lens shade
(for Hitachi
lens)
609.00125.00 ABS 1 NO
10
lens shade
(for CS
mount lens)
609.00128.00 ABS 1 NO
11
lens shade
(for x4 lens)
609.00129.00 ABS 1 NO
12
CS lens
holder
(Internal)
609.00157.00 ABS 1 NO
13
CS lens
holder
(External)
609.00126.00 ABS 1 NO
14
M12 (S) lens
mount
609.00158.00 ABS 1 NO
15
Ring Nut
(same part
as in Kite)
609.00073.00 ABS 1 NO
to adjust M12
lens
16
Spacer for IR
cut filter
610.00026.00 Silicon 1 NO
17
Rubber cap
for DC Iris
connector
hole
610.00027.00 Silicon 1 NO
40. 39 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
18
Rubber cap
for SMA
connector
hole
610.00028.00 Silicon 1 NO
19
spacer for
keekon
601.00213.00 BRASS 4 NOS
20
spacer for CS
(INTERNAL)
601.00214.00 BRASS 4 NOS
21
spacer for
IO-POWER
pcb
601.00310.00 BRASS 1 NO
22
spacer for CS
(EXTERNAL)
601.00298.00 BRASS 4 NOS
23
M3 CSK
605.00197.00 SS 4 NOS OUTSIDE
HOUSING
24 M3 PAN
CROSS HEAD
605.00223.00 SS 10 NOS
PCB FITTING
25 THUMB
SCREW
605.00224.00 SS 1 NO
IN MOUNITNG
26 GRUB
SCREW
605.00225.00 SS 2 NOS
IN MOUNITNG
27
SELF
TAPPING
WITH
ANCHOR
605.00226.00 SS 4 NOS
WALL
MOUNITNG
28
M2 CSK
605.00238.00 SS 2 NOS FOR FITTING IR
CUT FILTER
29
M2 HEX NUT
605.00132.00 SS 2 NOS FOR FITTING IR
CUT FILTER
41. 40 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
30
SELF
TAPPING
ST2.9 x 16L
605.00239.00 SS 2 NOS FOR FITTING
LENS HOLDER
31
M4 CSK
605.00240.00 SS 1 NO
FOR FITTING
OUTDOOR
SHIELD
32
SHIELD
MOUNTING
SCREW
601.00328.00 BRASS 1 NO
FOR FITTING
OUTDOOR
SHIELD
33 LABLE 104.00063.00 POLYMIDE 1 NO
42. 41 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
3.3.2. Assembly Line document
Assembly line deatils
Falcon Assembly
PCB Assembly
Encoder,Power & IO boards
Step 1.1
Step 1.2
Plug-IN Power & IO
PCBs in respective
slots
Back-panel Connectors
Power Board
IO Board
43. 42 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.3
Up to this point is common for all models
Step 1.4
Fix the spacer between
Power & IO boards
with screws from both
sides
Fix the PCB assembly
into “Bottom plate”
with Three screws as
shown
44. 43 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Capture Board (Only for CS mount and x4 Zoom)
Step 1.5
Option 1: x4 Zoom lens (internal mount):
Step 1.6: Fix lens mount and lens to capture board
Place Spacer (IR cut filter
spacer) above the image
sensor
Fix IR Cut filter above the sensor
with spacer in between. (IR cut
filter shown in transparent form for
clarity )
Image sensor on capture
board
45. 44 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Lens mount assembly (for x4 Zoom lens)
Step 1.7 : Fix Capture board Assembly to the “Holding plate”
Fix “S-Mount lens holder”
on the capture PCB above
sensor
Fix with Two diagonal
screws
Fix x4 zoom lens on
to the lens holder
Use locking nut to fix lens in
Correct focal length
Fix the Capture PCB
assembly (with lens) to the
“holding plate” with 4
spacers
46. 45 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Capture board assembly with
lens and holding plate
Fix the Capture PCB
assembly (with lens) to
the “holding plate” with
4 spacers
47. 46 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.8: Fix lens assembly inside enclosure (bottom plate)
Insert “holding” plate into the
slot in front of bottom plate
48. 47 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.9: Connect Capture Board to Encoder baord
Step 1.10: Connect Mic
Connect capture board to
encoder board using FRC cable
Insert Mic to the Mis hole in
front of the bottom plate and
connect Mic cable to encoder
board connector
49. 48 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.11 Fix top cover
Slide-in the top cover on to
Bottom cover
Fix top cover with 4 screws
(2 on either side) to the
bottom plate
50. 49 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.12: Fix Lens shade
Fix x4” Lens shade” to
the front cover
Use “rubber gasket to close
DC Iris connector hole in
front panel
51. 50 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.13: Fix Antenna ( same for all Wi-Fi models)
For non-Wi-Fi models, Use rubber
gasket to close SMA connector
hole on Back plate
For Wi-Fi models, Use SMA
connector on back plate and
connect SMA antenna to it
Back panel SMA connector for antenna
SMA antenna
52. 51 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Step 1.14 : Fix Mounting base (Same for all models)
Fix Mounting base to the
Bottom plate
Camera can now be
mounted on to the
required surface (Wall)
54. 53 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
4. Possible connectivity options
Wired system
Wireless system
Hybrid system: combination of wired and wireless system
4.1. Basic terms used in connectivity
4.1.1. IP addressing:
Any device that wants to communicate with other devices via the Internet must have
a unique and appropriate IP address. IP addresses are used to identify the sending
and receiving devices. There are currently two IP versions: IP version 4 (IPv4) and
IP version 6 (IPv6). The main difference between the two is that the length of an
IPv6 address is longer (128 bits compared with 32 bits for an IPv4 address). IPv4
addresses are most commonly used today.
4.1.2. Ports:
A port number defines a particular service or application so that the receiving server
(e.g., net- work camera) will know how to process the incoming data. When a
computer sends data tied to a specific application, it usually automatically adds the
port number to an IP address without the user’s knowledge. Port numbers can range
from 0 to 65535. Certain applications use port numbers that are pre-assigned to
them by the Internet Assigned Numbers Authority (IANA). For example, a web
service via HTTP is typically mapped to port 80 on a network camera.
4.1.3. Data transport protocols for network video:
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are the
IP-based protocols used for sending data. These transport protocols act as carriers
for many other protocols. For example, HTTP (Hyper Text Transfer Protocol),
which is used to browse web pages on servers around the world using the Internet, is
carried by TCP.
TCP provides a reliable, connection-based transmission channel. It handles the
process of breaking large chunks of data into smaller packets and ensures that data
sent from one end is received on the other. TCP’s reliability through retransmission
may introduce significant delays. In general, TCP is used when reliable
communication is preferred over transport latency.
55. 54 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
UDP is a connectionless protocol and does not guarantee the delivery of data sent,
thus leaving the whole control mechanism and error-checking to the application
itself. UDP provides no transmissions of lost data and, therefore, does not introduce
further delays.
56. 55 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Table Common TCP/IP protocols and ports used for network video.
4.2. Wired IP Surveillance System
In Wired IP Surveillance System all the various components are connected to each other
through LAN or Ethernet. Data is sent in the form of packets and to regulate the
transmission of the packets, Ethernet technology is used. Ethernet uses a star topology in
which the individual nodes (devices) are networked with one another via active
networking equipment such as switches. The number of networked devices in a LAN
can range from two to several thousand.
The physical transmission medium for a wired LAN involves cables, mainly twisted pair
or fiber optics. A twisted pair cable consists of eight wires, forming four pairs of twisted
copper wires and is used with RJ-45 plugs and sockets. The maximum cable length of a
twisted pair is 100 m (328 ft.) while for fiber, the maximum length ranges from 10 km to
70 km, depending on the type of fiber. Depending on the type of twisted pair or fiber
optic cables used, data rates today can range from 100 Mbit/s to 10,000 Mbit/s.
Figure Twisted pair cabling includes four pairs of twisted wires, normally connected to a RJ-45 plug at the end.
A rule of thumb is to always build a network with greater capacity than is currently
required. To future-proof a network, it is a good idea to design a network such that only
30% of its capacity is used. Since more and more applications are running over networks
today, higher and higher network performance is required. While network switches
(discussed below) are easy to upgrade after a few years, cabling is normally much more
difficult to replace.
4.2.1. Types of Ethernet networks:
Fast Ethernet: Fast Ethernet refers to an Ethernet network that can
transfer data at a rate of 100 Mbit/s. It can be based on a twisted pair or fiber
optic cable. Most devices that are connected to a network, such as a laptop
or a network camera, are equipped with a 100BASE-TX/10BASE-T
Ethernet interface, most commonly called a 10/100 interface, which supports
both 10 Mbit/s and Fast Ethernet. The type of twisted pair cable that
57. 56 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
supports Fast Ethernet is called a Cat-5 cable.
Gigabit Ethernet: Gigabit Ethernet, which can also be based on a twisted
pair or fiber optic cable, delivers a data rate of 1,000 Mbit/s (1 Gbit/s) and is
becoming very popular. It is expected to soon replace Fast Ethernet as the de
facto standard.
The type of twisted pair cable that supports Gigabit Ethernet is a Cat-5e cable,
where all four pairs of twisted wires in the cable are used to achieve the high data
rates. Cat-5e or higher cable categories are recommended for network video
systems. Most interfaces are backwards compatible with 10 and 100 Mbit/s
Ethernet and are commonly called 10/100/1000 interfaces.
For transmission over longer distances, fiber cables such as 1000BASE-SX (up to
550 m/1,639 ft.) and 1000BASE-LX (up to 550 m with multimode optical fibers
and 5,000 m with single-mode fibers) can be used.
Figure Longer distances can be bridged using fiber optic cables. Fiber is typically used in the backbone of a network and not in nodes such as a
network camera.
10 Gigabit Ethernet: 10 Gigabit Ethernet is the latest generation and
delivers a data rate of 10 Gbit/s (10,000 Mbit/s), and a fiber optic or twisted
pair cable can be used. 10GBASE-LX4, 10GBASE-ER and 10GBASE-SR
based on an optical fiber cable can be used to bridge distances of up to 10,000
m (6.2 miles). With a twisted pair solution, a very high quality cable (Cat-6a
or Cat-7) is required. 10 Gbit/s Ethernet is mainly used for backbones in high-
end applications that require high data rates.
58. 57 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
4.3. Wireless IP Surveillance System
In Wireless IP Surveillance System all the various components are connected to each
other wirelessly through Internet using various communicating protocols such as HTTP,
UDP and RTSP etc. Before discussing various protocols, some of the basic elements of
Internet communication such as routers, firewalls and Internet service providers are
discussed below:
Routers: To forward data packages from one LAN to another LAN via the Internet,
networking equipment called a network router must be used. A router routes
information from one network to another based on IP addresses. It forwards only data
packages that are to be sent to another network. A router is most commonly used for
connecting a local network to the Internet. Traditionally, routers were referred to as
gateways.
Firewalls: A firewall is designed to prevent unauthorized access to or from a
private network. Firewalls can be implemented in both hardware and software, or a
combination of both. Firewalls are frequently used to prevent unauthorized Internet
users from accessing private networks that are connected to the Internet. Messages
entering or leaving the Internet pass through the firewall, which examines each
message, and blocks those that do not meet the specified security criteria.
Internet connections: In order to connect a LAN to the Internet, a network
connection via an Internet service provider (ISP) must be established. When
connecting to the Internet, terms such as upstream and down- stream are used.
Upstream describes the transfer rate with which data can be uploaded from the device
to the Internet; for instance, when video is sent from a network camera. Downstream
is the transfer speed for downloading files; for instance, when video is received by a
monitoring PC.
In most scenarios—for example, a laptop that is connected to the Internet—downloading
information from the Internet is the most important speed to consider. In a network video
application with a network camera at a remote site, the upstream speed is more relevant
since data (video) from the network camera will be uploaded to the Internet.
NAT (Network address translation): When a network device with a private IP address
wants to send information via the Internet, it must do so using a router that supports
NAT. By using this technique router can translate a private IP address into a public IP
address without the sending host’s knowledge.
Port forwarding: To access cameras that are located on a private LAN via the Internet,
the public IP address of the router should be used together with the corresponding port
number for the network camera/video encoder on the private network.
59. 58 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Port forwarding works as follows. Incoming data packets reach the router via the router’s
public (external) IP address and a specific port number. The router is configured to
forward any data coming into a predefined port number to a specific device on the private
network side of the router. The router then replaces the sender’s address with its own
private (internal) IP address. To a receiving client, it looks like the packets originated
from the router. The reverse happens with outgoing data packets. The router replaces the
private IP address of the source device with the router’s public IP address before the data
is sent out over the Internet.
Figure Router knows to forward data (request) coming into port 8032 to a network camera with a private IP address of 192.168.10.13 port 80
so that network camera can then begin to send video.
Port forwarding is traditionally done by first configuring the router. Different routers
have different ways of doing port forwarding and there are web sites such as
www.portfoward.com that offer step-by-step instruction for different routers. Usually
port forwarding involves bringing up the router’s interface using an Internet browser, and
entering the public (external) IP address of the router and a unique port number that is
then mapped to the internal IP address of the specific network video product and its port
number for the application.
60. 59 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Wireless Network Camera: A network camera with built-in wireless support is a
consideration when running a cable between a LAN and a network camera is impractical,
difficult or expensive. Wireless network cameras are suitable for use in outdoor
situations, in environments such as historic buildings where the installation of cables
would damage the interior, or in cases where there is a need to move cameras to new
locations on a regular basis, such as in a supermarket. Ensure that the wireless network
camera supports security protocols such as IEEE 802.1X and WPA/WPA2 (Wi-Fi
Protected Access), which will help secure the wireless communication.
A Wireless Network Camera
using 802.11b/g.
Figure By using a wireless bridge, any network camera can be used in a wireless network.
WLAN: A wireless local area network (WLAN) links two or more devices using some
wireless distribution method (typically spread-spectrum or OFDM radio), and usually
providing a connection through an access point to the wider internet. This gives users the
mobility to move around within a local coverage area and still be connected to the
network. Most modern WLANs are based on IEEE 802.11 standards, marketed under the
Wi-Fi brand name.
All components that can connect into a wireless medium in a network are referred to as
stations. All stations are equipped with wireless network interface controllers (WNICs).
Wireless stations fall into one of two categories: access points, and clients. Access points
(APs), normally routers, are base stations for the wireless network. They transmit and
receive radio frequencies for wireless enabled devices to communicate with. Wireless
clients can be mobile devices such as laptops, personal digital assistants, IP Camera and
other Smartphones, or fixed devices such as desktops and workstations that are equipped
with a wireless network interface.
61. 60 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Wireless networks: For video surveillance applications, wireless technology offers a
flexible, cost-efficient and quick way to deploy cameras, particularly over a large area as
in a parking lot or a city center surveillance application. There would be no need to pull a
cable through the ground. In older, protected buildings, wireless technology may be the
only alternative if standard Ethernet cables may not be installed.
Figure A network with wired and wireless connections.
62. 61 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
Part V
A Typical Surveillance System and its
Components
63. 62 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
5. A typical video surveillance system at one live site named
as “Macawer Beekay”
In the Proposed Solution, we have to do video surveillance in the complete industrial plant,
which will be monitored locally as well as central control room, situated at some remote
location. In this network we will connect all outdoor cameras through RF technology in P2P
or point-to-multipoint Mode and indoor camera through wired connectivity. Every Location
will be covered by either PTZ or fixed box Camera. Through Fix Camera we can view a pre-
define area/zone, whereas a PTZ can be used for viewing the surrounding area (360 Deg.) of
any particular locations. Every outdoor Camera will connect to the Remote Unit (CPE), and
CPE will communicate to Base Station via Wireless. Repeater will be used where Line of
sight will not be available.
Figure:A bird’s eye-view of all the locations mentioned in the solution
64. 63 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
5.1. Solution explanation
There will be 31 fixed box, 5 PTZ cameras and 3 dome cameras
installed for surveillance.
All indoor cameras will be connected by 8-Port PoE switch through
CAT-6 Cable.
All the outdoor cameras would be connected through wireless
Complete cabling will be done for all the cameras.
5.2. Solution components
5.2.1. Remote Surveillance Camera Units:
IP Fixed Box Camera (4x) ,IP PTZ Camera (35x),IP Fixed Zoom (10x)
They should be easy to install. Reliability is mandatory along with robustness.
Camera units will be installed at the light poles located at the border fencing
Unit installation should be easy and fast.
It should have provision of 24 hours backup and provision of adding more backup in
special need.
All the camera units shall be enclosed in the weather-proof casing which has inbuilt
heater and fan.
Link establishment with should be very easy and of high throughput. This throughput
should be maintained in every kind of climate.
Camera shall be supported by IR lamps for night visibility
Camera shall have the support for the Pole Mount
Camera Units shall be of good resolution.
Camera Units shall be IP based and should give video & audio data on the IP interface
built inside the camera
Camera Units shall be able to talk to the Wireless CPE
Each camera shall stream at a bit rate of 512 Kbps or 1 Mbps
5.2.2. Weather-proof Camera Housings
Weather-proof Standard IP66 with inbuilt heater and fan
Indoor and Outdoor Installations
Made for ultra-harsh environments
Applicable to Fixed Box and PTZ Cameras
65. 64 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
5.2.3. L2 Switch 24 port
Switch is having the Throughput of 56Gbps.
Total they have 28 Gigabit ports in full duplex mode.
Supports many features like VLANs, Access list policies, radius Authentication.
Gives the 1 gig connectivity to all the connected Nodes.
Support QoS for prioritize the data stream like Voice and Video.
They are Easy to install and Monitor
5.2.4. Wireless Communication devices
5.2.4.1. Camera CPE’s
They are easy to install. Reliability is also available in this along with robustness.
Camera CPE will be installed at the light poles located at the border fencing. They
would be installed near the cameras and will be connected to the camera using
ethernet interface.
These CPE will act as wireless client and will transfer the video data to central
BTS to which they are registered.
CPE shall be able to communicated independently to the central BTS without
affecting other CPE’s
5.2.4.2. BTS
BTS (Base Station) will be installed at the place wherever maximum line of site
will be available. The distance will depend on the terrain between the BTS and
the wireless CPE’s which it will connect to each Base Station has the capacity of
100 Mbps and shall support 15 CPE as the multipoint’s
BTS will aggregate the video & audio data from cameras which are connected
through the CPE for that particular BTS will communicate to the CPE over secure
802.11b/g/n protocol.
Each BTS will have multiple sector antennas to connect on either side.
Fully Secure Communication with 128 bit encryption.
66. 65 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
5.2.5. Video management system
IP signal from RU will come to a desktop with large display. Here video
management server is running to get the live feed from remote camera units.
Functional Specifications of Video management server are given below
5.2.5.1. Live View Client
Automatic searching of devices in the network- Auto Search Supported
View live videos in 2x2, 3x3 and 4x4, 5x5, 6x6, 8x8 and split views in
windows matrix
Remote Live View through web or through remote client.
View over Mobile
Devices network connection status
Picture Snapshot in jpeg format
Full screen view
PTZ controls for PTZ cameras
On screen Display: Frame rate, bit rate, date/time or user specified text.
5.2.5.2. Recordings & Storage
Triplex Mode: Live View, Recording and Playback simultaneously
Recording stream settings: Encoding (MJPEG, MPEG4 H.264), Resolution
and
Frame rate.
Recordings in Chunks: Configurable Chunk Time
Schedule Recording with Date and time settings
Automatic Recordings restart after power failures
Disk Space Management. Alarms and events
Calculator to Find Hard disk requirements based on Number of cameras,
number of days and Video Stream settings namely encoding, resolution and
frame rate.
5.2.5.3. Playback of recorded video
Intelligent Search: Based on Camera, Date & time
Sorting recordings: Based on Camera and Start or End date/Time
Playback recordings: Play, forward and Seek options. Slow and fast playing
View Recordings using Desktop Client or through Windows Media Player
Export Evidence: Export Recorded video to CD/DVD or external drive as
evidence.
Playback on Archived Video.
67. 66 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
5.2.5.4. Archiving
Archiving on External Network Storage, CD/DVD or USB
Scheduled Archiving: Day and time of archiving
Automatic delete or archiving after set number of days.
5.2.5.5. Alarms
Types of Alarm:
Email (Email server settings required)
SMS (Gateway/Modem required)
Option to add Physical Alarm connected in the Camera
Alarm for Low Disk Space
Alarm for Recording problems
Alarm for Archiving Events
5.2.5.6. Management
Camera Management:
Defining Camera Groups
Camera access based on user roles
Saving and retrieving screen views
User Management:
User based camera or camera group access
User Roles and levels
Login & Authentication
5.2.5.7. Video Analytics Software’s:
Intrusion Detection
Left Object Detection
Overcrowding
Camera Tampering
5.2.5.8. Security
Camera Management:
Secure Communication
Double Login Security
Saving and retrieving screen views by user
68. 67 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
6. CONCLUSION
This project helped us gain the insight of how a Video Surveillance System is integrated, its
working, maintenance and various other factors affecting it. Each Networking component
was discussed in detail. Different types of network camera each having its particular need
and application; different types of connecting media and modes; working of switch &
routers; wired or wireless modes; video analytics utilizes the super power of computer
processing help generate alarm on any unusual activity and lots more. All the things helped
explore new avenues of knowledge.
In short, Video Surveillance is growing industry which integrates various fields of
Engineering to take the Security to the next level.
69. 68 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY
7. REFERENCES
E-Books:
[1] Axis Technical guide to network video
[2] Axis IP-Surveillance design guide
[3] Various datasheets: Falcon SM200 Series, S810 Hawk, HAWK S9118
Sites:
[1] www.vvdntech.com
[2] www.shyamnetworks.com
[3] www.axis.com
[4] www.en.wikipedia.org