SlideShare a Scribd company logo
1 of 70
Download to read offline
1
Internship report
On
CCTV SURVEILLANCE
Submitted in partial fulfilment
Of the requirement for the award of the degree of
Bachelor of Technology
In
Electronics and Communication Engineering
By
Riya Dashoriya (11EC001336)
Submitted to
Department of Electronics and Communication Engineering
Sir Padampat Singhania University
Udaipur -313601
Rajasthan - India
Under the supervision of
Mr. Ripal Shah
Sr. Manager – Projects
(n)Code Solutions – A division of GNFC Ltd.
301, GNFC Infotower, Bodakdev, Ahmedabad – 380054
Phone: +91 79 4000 7374
Mobile: +91 98250 11949
E – Mail: Ripal@ncode.in
Website: www.ncode.in
2
CERTIFICATE
This is to certify that the Internship Project entitled ‘CCTV SURVEILLANCE’
being submitted by RIYA DASHORIYA, in fulfilment of the requirement for the
award of degree of Bachelor of Technology in Electronics and Communication
Engineering, has been carried out under my supervision and guidance. The
matter embodied in this thesis has not been submitted, in part or in full, to any
other university or institute for the award of any degree, diploma or certificate.
Mr. Ripal Shah Mr. Uday Prakash Singh
Sr. Manager - Projects Head of Department
(n)Code Solutions Dept. of Electronics and Comm. Eng.
A division of GNFC Ltd. Sir Padampat Singhania University
301, GNFC Infotower, Bodakdev Udaipur – 313601
Ahmedabad – 380054, India Rajasthan - India
Prof. Achintya Choudhury
Dean - School of Engineering
Sir Padampat Singhania University
Udaipur – 313601
Rajasthan India
3
ACKNOWLEDGEMENT
It is always a pleasure to remind the experts in the engineering workshop
for their sincere guidance which I received to uphold my practical as well as
theoretical skills in engineering.
I am thankful to Mr. J. S. Kochar and Mr. J.P. Patel for giving me an
opportunity to enhance my skills as an engineer by allowing us to join this
esteemed organization as a trainee. I would also like to thank Ms. Sarshar Khan
who helped us in getting our internship from (n)Code Solutions– A division of
GNFC Ltd. and Mr. N.R. Bhatt who helped us in getting CCTV department.
It gives me an immense pleasure in expressing my deep sense of
gratitude to Mr. Ripal Shah and Mr. Parth Joshi under whom I successfully
completed my internship program in their department.
I am also grateful to Mr. Kapil, Mr. Pritesh, Mr. Kalpesh, Mr. Mahesh,
Ms. Sweta etc. who helped us all the time during my training program by sharing
their knowledge and experience in this company.
They helped us in all possible ways to solve our doubts regarding
application and implementation of knowledge. It has been a great experience
to work under their supervision as they always kept my morale high.
I would also like to thank my friends with whom I worked as interns and
staff of CCTV Department, (n)Code Solutions– A division of GNFC Ltd., who
helped me directly or indirectly throughout our training.
Finally I apologise all other unnamed who helped me in various ways to
have a safe and good training.
4
SUMMARY/ABSTRACT
As the world becomes less safe, businesses, institutions with valuable assets
need to take precautions to protect themselves and their property. In many
instances, CCTV system is the best answer to crime detection and prevention.
CCTV cameras are springing up all over the place. One of the reasons for the
increased implementation of CCTV is its deterrent ability. It has been observed
that over two-thirds of burglars would probably or definitely not burgle premises
that had CCTV installed.
By setting a network of CCTV cameras on your premises, many locations can
be viewed from a single monitor, thus decreasing your need for expensive
manned guarding or ‘STOP AND SEARCH’ checks.
Even the simple physical presence of CCTV cameras serves to generate a
feeling of safety with your customers, visitors and employees. In situations
where cameras have been placed in prominent locations, unscrupulous
insurance claims and assaults on members of staff dealing with the public have
been vastly reduced.
5
CASE STUDY: SMALL SCALE CCTV SETUP
BUILDING PREMISES (GNFC BUILDING)
In case study regarding the CCTV setup at different enterprises. The first type
taken up is Small Scale Enterprise and in that category GNFC Infotower is
taken for study. The installation is done in the way to emphasize on security
purposes so a PTZ camera is installed at the entrance for building premises
and two more placed in open parking area. One Fixed Dome is also placed in
Parking Area which is closed and it is located in a way to capture the entry and
exit of the vehicles parked.
Upon entering building found are two Fixed Dome cameras one placed in front
of the lifts and other at starting of staircase. The building which has 10 floors,
houses many companies at various floors. So the cameras mainly installed at
each floor is over looking the entrance of staircase for each floor. On some
floors there are Fixed Dome Cameras placed at center to look over the lobby.
The cameras are installed in a way so that there is no privacy breach so the
cabins and restroom areas are devoid of cameras. But there are some
departments in various offices that need security so the cameras are placed
over looking those areas.
The storage is of 10 days and the setup is of analog type. So the architecture
for storage is combination of DVR and Hard Drive. The camera located outside
in general area amounts to total 19 in number. And the most important fact that
is noticed is on entering the premises the notice is placed regarding the building
being under surveillance so that the prospect does not raises question of
privacy being breached.
6
7
CASE STUDY: MEDIUM SCALE CCTV SETUP
CAMPUS WIDE CCTV SURVEILLANCE (TDI DAHEJ
PLANT)
In next category that is medium level enterprise the example taken is TDI Plant
at Dahej which is located at distance of 40 km from Bharuch. TDI plant is a part
of GNFC and the word TDI stands for Toluene Di-Isocynate.
In this plant the main emphasis is given on the warehouse. Where total of 8
cameras are placed. The architecture comprises of four PTZ cameras at
perimeter, one PTZ for warehouse and three 1 MP fixed camera.
The four PTZ IP cameras placed at all four sides of warehouse are of CIF
resolution. And the one PTZ camera is placed inside warehouse for surveillance
the camera is of IP type. The two out of three 1 MP Fixed Camera are placed
inside the warehouse to record the movements inside. The one remaining 1 MP
fixed camera is placed at security gate to monitor the movement at main
entry/exit point of warehouse. The cameras used are equipped with Infrared
Illumination for night vision.
The storage is placed at Porta Hut (Security Office) which stores the video feed
for 7 days. The storage architecture comprises of 3 KVA UPS having two hours
power backup in case of power failure.
8
CASE STUDY: LARGE SCALE
CITY WIDE SURVEILLANCE PROJECT (AMC
PROJECT)
In Large Level Enterprise the case taken is of AMC project. The AMC
(Ahmedabad Municipal Corporation) project is initiative taken to protect the
several locations of Ahmedabad city. The project is being conducted by
(n)Code Solutions. There are total of 595 cameras installed. The locations
covered are 22 BRTS location, VS Hospital, NHL Medical College, Shardaben
Hospital, Nagri Hospital, LG Hospital, & AMC Gardens, Kankaria Lake, 8
Bridges, 5 Railway Stations, 16 AMTS locations.
The institutes housing the CCTV setup have their own Control Room where
the personnel are employed. And for certain locations like gardens, BRTS
location and AMTS location the storage is directly transferred to CP Office.
The main type of camera used are of PTZ type and Fixed Camera type. Out of
all this locations the one taken for study is Kankaria Lake & Kankaria Zoo.
In Kankaria Lake, due to it being a large area the transmission is of wireless
type. So each camera is housed with own wireless transmitter, the data then
being transmitted to the base station and then to control room for viewing and
recording. The cameras are mainly located at the gates to record the entry &
exit of people.
The next location i.e. Kankaria Zoo houses several Fixed Network Cameras at
gates and at locations to monitor certain animals like panther, tiger to monitor
so that the necessary steps are taken in case they break out. The pathway in
the zoo also has PTZ cameras to monitor people so that they do not try to
indulge in act that could result in harm to animals or avoid any catastrophe
events.
9
10
11
CONTENTS
Sr. No. TITLE Page No.
1. Overview Of The GNFC – Company Profile 13
2. Introduction to CCTV Surveillance 15
2.a Network Video 17
2.b Network Camera 18
2.c Video Server 18
2.d Video Management Software 19
3. Evolution of Video Surveillance
System(Technology)
19
3.a Analog CCTV systems using VCR 20
3.b Analog CCTV systems using DVR 21
3.c Analog CCTV systems using network DVR 21
3.d Network Video Systems using Video Servers 21
3.e Network video systems using network cameras 22
4 Applications of CCTV Surveillance System 22
5 IP Camera vs Analog Camera 25
6 Types of IP Camera 25
6.a Fixed Network Cameras 26
6.b Fixed Dome Network Cameras 27
6.c PTZ Network Cameras 27
6.d Network Dome Cameras 28
6.e Non-Mechanical PTZ Network Cameras 28
System Specification Terms
7 Image Sensor 28
7.a CCD Sensor 29
7.b CMOS Sensor 29
7.c “EXMOR” CMOS Sensor 30
8 Progressive scan vs Interlaced Video 30
8.a Interlaced Scanning 30
8.b Progressive Scanning 31
8.c Example: Capturing Moving Objects 31
9 Compression 31
9.a Still image compression standards 32
9.b Video compression standards 32
10. Image Resolution 35
10.a NTSC and PAL Resolutions 35
10.b VGA Resolution 36
10.c MPEG Resolution 36
10.d Megapixel Resolution 37
12
10.e Horizontal Resolution – TVL 37
11 Illumination 37
11.a IR Illuminator – Day and Night Functionality of
Camera
38
11.b White Balance Mode 38
12 Effective Pixels 39
13 Minimum Object Distance 40
14 Lens Type 40
15 Zoom Ratio 40
16 Viewing Angle 41
17 Noise reduction 41
18 S/N Ratio 41
19 Wide-D (View-DR) 42
20 System Considerations 42
20.a Bandwidth and Storage 42
20.b Redundancy 43
20.c System Scalability 44
20.d Frame Rate and its Control 44
21 Maximum Frame Rate 44
22 Shutter Speed 45
23 Gain Control 45
24 Exposure Control 45
25 Focal Length 46
26 F-Number 46
27 Number of Clients 47
28 System Requirements 47
28.a Operating System 47
28.b Processor 48
28.c Memory 48
28.d Web Browser 48
29 General Information about Camera 48
29.a Weight 49
29.b Dimensions 49
29.c Power Requirements 49
29.d Power Consumption 49
29.e Working Temperature 49
29.f Storage Temperature 50
30 IP Network Technologies 50
30.a Ethernet 50
30.b PoE (Power over Ethernet) 51
30.c Wireless Networks 51
30.d Wired Network vs Wireless Networks 52
13
31 Data Transport Methods: Network Protocols 53
31.a IP Address 54
31.b IPv6 54
31.c Data Transport Protocols 54
31.d Transmission methods: Unicasting,
Multicasting, Broadcasting
55
32.a Network Security – Video Flow and Inherent
Security Risks &
Addressing Security Concerns and Risks:
Secure Transmission
55
32.b Security in Wireless 59
33 Storage Considerations 59
33.a Direct Attached Storage 60
33.b NAS and SAN 60
33.c RAID 61
34 Video Management Hardware Platforms 61
34.a PC Server Platform 61
34.b NVR Platform 62
34.c DVR vs NVR 62
35 Video Monitoring 63
35.a Using Web Interface 63
35.b Using Video Management Software 63
36 Recording Video 64
36. Milestone XP – VMS Specification 65
37 Conclusion 66
14
COMPANY PROFILE
Gujarat Narmada Valley Fertilisers & Chemicals Limited (GNFC) is an
Indian manufacturer of fertilizers and Chemicals. GNFC was founded in 1976
and it is listed on Mumbai Stock Exchange. The company was jointly promoted
by the Government of Gujarat and the Gujarat State Fertilizer Company Limited
(GSFC). It was set up in Bharuch, Gujarat. Located at Bharuch in an extremely
prosperous industrial belt, GNFC draws on the resources of the natural wealth
of the land as well as the industrially rich reserves of the area.
GNFC started its manufacturing and marketing operations by setting up in
1982, one of the world's largest single-stream ammonia-urea fertilizer
complexes. Over the next few years, GNFC successfully commissioned
different projects - in fields as diverse as chemicals, fertilizers and electronics.
Since inception, GNFC has worked towards an extensive growth as a
corporation. A growth which respects the environment and springs from the
progressive vision of GNFC.
GNFC today has extended its profile much beyond fertilizers through a process
of horizontal integration. Chemicals/Petrochemicals, Energy Sector,
Electronics/Telecommunications and Information Technology form ambitious
and challenging additions to its corporate portfolio. GNFC has an enterprising,
strategic view towards expansion and diversification.
15
GNFC FLOW CHART:
Figure 1. Flow chart of GNFC Ltd.
(n)Code Solutions - An IT Division of GNFC
(n)Code Solutions offers Digital Certificates that can integrate with applications
such as emails, workflow, enterprise wide applications, or secure VPNs.
The Digital Certificates can be used by individuals, corporates and
governments to secure online B2B/B2C applications and other online
transactions.
It has promoted a portal called www.nprocure.com offering end-to-end
electronic procurement services provider. (n)Code also designs and builds
world class data centre infrastructures. (n)Code also offers a wide range of
Security Services which include Managed IT Services & Secure Infrastructure
design & building Services.
GNFC Flow
Chart
Chemicals Industries
IT Division -
(n)code
PKI & Digital
Certificates
e-
Procurement
e-
Governance
Data Center
CCTV &
Surveillance
Cloud
Computing
16
(n)Code is a significant player in providing high-tech Security & Surveillance
solutions based on CCTV and Video Analytics including setting up of
command and control Centres. (n)Code Solutions has the capabilities to
design, engineer, develop, operate and maintain the IP based Video
surveillance system having end to end security solution with complete
integration of all the security sub systems such as CCTV, Access control &
preventions system, Turnstiles, Boom barriers and Public Address system to
secure the mission critical installation. (n)Code develops the security concept
aligned to customer's risk requirements and adhering to industry best-
practices:
• Design, develop and consultancy services for CCN based Surveillance
system
• City Surveillance and securing the mission critical infrastructure like
Industries, Costal area, Temples, Hospitals etc.
Introduction to CCTV Surveillance
Closed – Circuit Television (CCTV) is the use of video cameras to transmit a
signal to a specific place, on a limited set of monitors. It differs from broadcast
television in that the signal is not openly transmitted, though it may employ point
to point, point to multipoint, or mesh wireless links. Though almost all video
cameras fit this definition, the term is most often applied to those used
for surveillance in areas that may need monitoring such as banks, casinos,
airports, military installations, and convenience stores. Video telephonyis
seldom called "CCTV" but the use of video in distance education, where it is an
important tool, is often so called.
17
In industrial plants, CCTV equipment may be used to observe parts of a process
from a central control room, for example when the environment is not suitable
for humans. CCTV systems may operate continuously or only as required to
monitor a particular event. A more advanced form of CCTV, utilizing digital
video recorders (DVRs), provides recording for possibly many years, with a
variety of quality and performance options and extra features (such as motion
detection and email alerts). More recently, decentralized IP cameras, some
equipped with megapixel sensors, support recording directly to network-
attached storage devices, or internal flash for completely stand-alone
operation. Surveillance of the public using CCTV is particularly common in
18
many areas around the world. In recent years, the use of body worn
video cameras has been introduced as a new form of surveillance.
The video surveillance industry today has a wide range of systems and devices
for monitoring and safeguarding people and property. The core components of
network video system are network camera, video server and video
management software. When selecting an appropriate system, it is useful to
compare the various available technologies in the light of the intended
application area and requirements in terms of cost – effectiveness, scalability,
ease of use and flexibility.
Network Video
Network Video, also referred to as IP – Surveillance for specific applications
within security surveillance and remote monitoring, is a system which gives
users the ability to monitor and record video over an IP network
(LAN/WAN/Internet).
Network video system uses the network, rather than dedicated
point-to-point cabling, as the backbone for transporting information. The term
network refers to both the video and audio sources available throughout the
system. In a network video application, digitized video streams are transferred
to any location in the world via a wired or wireless IP Network, enabling video
monitoring and recording from anywhere on the network.
Network video can be used in an almost unlimited number of applications;
however most of its uses fall into one of the following two categories:
 Security Surveillance
Network video’s advanced functionality makes it highly suited to the
applications involved in security surveillance. The flexibility of digital technology
enhances security personnel’s ability to protect people, property and assets.
Such systems are therefore an especially attractive option for companies
currently using CCTV.
 Remote Monitoring
Network video gives users the ability to gather information at all key points of
an operation and view it in real – time. This makes the technology ideal for
19
monitoring equipment, people and places both locally and remotely. Application
examples include traffic and production line monitoring, and the monitoring of
multiple retail locations. liability, ease of use and flexibility.
Network Camera
A network camera can be described as a camera and computer combined in
one unit. It captured and transmits live images directly over an IP network,
enabling authorized users to locally or remotely view, store, and manage video
over standard IP – based network infrastructure.
Product overview: A network camera has its own IP address. It is connected
to the network and has a built – in web server, FTP server, FTP client, alarm
management, programmability, and much more. A network camera does not
need to be connected to a PC, it operates independently and can be placed
wherever there is an IP network connection. A web camera, on the other hand
is something totally different – it is a camera that requires a connection to a PC
via a USB or IEEE1394 port and a PC to operate.
In addition to video, a network camera also includes other functionalities and
information being transported over the same network connection, i.e. digital
inputs and outputs, audio, serial port(s) for serial data or control of pan/tilt/zoom
mechanisms.
Video Server
A video server makes it possible to move toward a network video system
without having to discard existing analog equipment. It brings new functionality
to analog equipment and eliminates the need for dedicated equipment such as
coaxial cabling, monitors and DVRs – the latter becoming unnecessary as video
recording can be done using standard PC servers.
Product overview: A video server typically has between one and four analog
ports for analog cameras to plug into, as well as an Ethernet port for connection
to the network. Like network cameras, it contains a built – in web server, a
20
compression chip and an operating system so that incoming analog feeds can
be converted into digital video, transmitted and recorded over the computer
network for easier accessibility and viewing,
Besides the video input, a video server also includes other functionalities and
information which are transported over the same network connection: digital
inputs and outputs, audio, serial port(s) for serial data or control of pan/tilt/zoom
mechanisms. A video server can also be connected to a wide variety of
specialized cameras, such as a highly sensitive black and white camera, a
miniature or a microscope camera.
Video Management Software
Video management software running on a Windows or Unix/Linux server,
supplies the basis for video management, monitoring, analysis, and recording.
A wide range of software is available, based on the user’s requirements. A
standard web browser provides adequate viewing for many network video
applications, utilizing the web interface built into the network camera or video
server especially if only one or a few cameras are viewed at the same time.
To view several cameras at the same time, dedicated video management
software is required. A wide range of video management software is available.
In its simplest form, it offers live viewing, storing and retrieving of video
sequences. Advances software contains features like:
 Simultaneous viewing and recording of live video from multiple cameras.
 Several recording modes: continuous, scheduled, on alarm and on motion
detection.
 Capacity to handle high frame rates and large amounts of data.
 Multiple search functions for recorded events.
 Remote access via a web browser, client software and even PDA client.
 Control of PTZ and dome cameras.
 Alarm management functions.
 Full duplex, real-time audio support.
 Video intelligence.
21
Evolution of Video Surveillance System (Technology)
The first CCTV system was installed by Siemens AG at Test Stand
VII in Peenemünde, Germany in 1942, for observing the launch of V-2
rockets. The noted German engineer Walter Bruch was responsible for the
technological design and installation of the system.
In the U.S. the first commercial closed-circuit television system became
available in 1949, called Vericon. Very little is known about Vericon except it
was advertised as not requiring a government permit.
The earliest systems required constant monitoring because there was no way
to record and store the information. Recording systems were introduced
later, when primitive reel-to-reel media was used to preserve the data. These
systems required magnetic tapes to be changed manually. It was a time
consuming, expensive and unreliable process; the operator had to manually
thread the tape from the tape reel through the recorder onto an empty take-up
reel. Due to these short-comings, video surveillance was rare. Only when
VCR technology became available in the 1970s, making it easier to record and
erase information, did video surveillance start to become more common.
During the 1990s, digital multiplexing was developed, which allowed several
cameras to record at once, as well as time lapse and motion-only recording.
This increased the use of CCTV and increased the savings of time and money.
Recently CCTV has been transformed by the shift towards internet-based
products and systems, and other technological developments.
Analog CCTV systems using VCR
An analog CCTV system using a VCR (Video Cassette Recorder) represents a
fully analog system consisting of analog cameras with coax output, connected
to the VCR for recording. The VCR uses the same type of cassettes as a home
VCR. The video is not compressed, and if recording at full frame rate, one tape
lasts a maximum of 8 hours. In larger systems, a quad or multiplexer can be
22
connected in between the camera and the VCR. The quad/multiplexer makes
it possible to record several cameras to one VCR, but at the cost of a lower
frame rate. To monitor the video, an analog monitor is used.
Analog CCTV systems using DVR
An analog CCTV system using a DVR (Digital Video Recorder) is an analog
system with digital recording. In a DVR, the videotape is replaced with hard
drives for the video recording, which requires the video to be digitized and
compressed in order to store as many days’ worth of video as possible. With
early DVRs, hard disk space was limited – so recording duration was limited, or
a lower frame rate had to be used. Recent developments of hard disks means
space is no longer a major problem. Most DVRs have several video inputs,
typically 4, 9, or 16, which means they also include the functionality of quad and
multiplexers.
The DVR system adds the following advantages:
 No need to change tapes.
 Consistent image quality.
Analog CCTV systems using network DVR
An analog CCTV system using a network DVR is a partly digital system which
includes a network DVR equipped with an Ethernet port for network
connectivity. Since the video is digitized and compressed in the DVR, it can be
transported over a computer network to be monitored on a PC in a remote
location. Some systems can monitor both live and recorded video, while some
can monitor only recorded. Furthermore, some systems require a special
Windows client to monitor the video, while others use a standard web browser
making remote monitoring more flexible.
The network DVR system adds following advantages:
23
 Remote monitoring of video via a PC.
 Remote operation of the system.
Network video systems using video servers
A network video system using video servers includes a video server, a network
switch and a PC with video management software. The analog camera
connects to the video server, which digitizes and compresses the video. The
video server then connects to a network and transport video via a network
switch to a PC, where it is stored on hard disks. This is a true network video
system.
A network video system using video servers adds the following advantages:
 Use of standard network and PC server hardware for video recording &
management.
 The system is scalable in steps of one camera at a time.
 Off-site recording is possible.
 It is future-proof since the system can easily be expanded by incorporating
network cameras.
Network Video Systems using Network Cameras
A network camera combines a camera and computer in one unit, which includes
the digitization and compression of the video, as well as a network connector.
The video is transported over an IP-based network, via network switches and
recorded to a standard PC with video management software. This represents
a true network video system, and is also a fully digital system, where no analog
components are used.
A network video system using network cameras adds the following advantages:
 High resolution cameras (megapixel).
 Consistent image quality.
 Power over Ethernet and wireless functionality.
 Pan/tilt/zoom, audio, digital input and output over IP along with video.
24
 Full flexibility and scalability.
Applications of CCTV Surveillance System
Crime Prevention: Surveillance in area that need monitoring such as bank,
casino, airport, military installation, parking lots, public transportation, tracking
terrorist suspects. Used for deterring crime and in mobile police surveillance
vans, often with automatic number plate reorganization and a number of APNI-
linked cameras. Gill and Spriggs did a Cost-effectiveness analysis (CEA) of
CCTV in crime prevention that showed little monetary saving with the
installation of CCTV as most of the crimes prevented resulted in little monetary
loss. Domestic kits are of low quality and cheap whereas the maintenance and
installation of high definition CCTV is expensive. To uncover criminal
conspiracies Oaxaca hired deaf police officers to lip read conversations in 2013.
Hacking and Video art: Hackers and Guerrilla artists have exposed the
vulnerabilities of the video systems in an act dubbed “video sniffing”. They have
crossed feeds, uploaded their own video feeds and used the video footage for
artistic purposes.
Industrial Processes: Industrial processes that take place under conditions
dangerous for humans are today often supervised by CCTV. These are mainly
processes in the chemical industry, the interior of reactors or facilities for
manufacture of nuclear fuel. Line-scan cameras and thermographic cameras
are also used which allow operators to measure the temperature of the
processes. The usage of CCTV in such processes is sometimes required by
law.
Traffic Monitoring: CCTV in transport systems are also used to detect
congestion and notice accidents. Congestion charge is enforced by cameras
positioned inside and at the boundary of congestion charge zone, which
automatically read the license place of cars. If the driver does not pay the
25
charge then a fine will be imposed. Similar systems are being developed as a
means of locating cars reported stolen.
Other surveillance cameras serve as traffic enforcement cameras.
Transport Safety: Remote monitoring of railway stations and tracks, parking
lots and garages, highways and airports. A CCTV system may be installed
where an operator of a machine cannot directly observe people who may be
injured by some unexpected machine operation. For example, on a subway
train, CCTV cameras may allow the operator to confirm that people are clear of
doors before closing them and starting the train.
Control of Retail: Some software integrates with CCTV to monitor the actions
of workers in retail environments. Every action is recorded as an information
block with subtitles that explain the performed operation. This helps to track the
actions of workers, especially when they are making critical financial
transactions, such as correcting or cancelling of a sale, withdrawing money or
altering personal information.
Actions which an employer may wish to monitor could include:
 Scanning of goods, selection of goods, introduction of price and quantity.
 Input and output of operators in the system when entering passwords.
 Deleting operations and modifying existing documents.
 Implementation of certain operations, such as financial statements or
operations with cash.
 Moving goods, revaluation scrapping and counting.
 Control in the kitchen of fast food restaurants.
 Change of settings, reports and other official functions.
Each of these operations is transmitted with a description, allowing detailed
monitoring of all actions of the operator. Some systems allow the user to search
for a specific event by time of occurrence and text description, and perform
statistical evaluation of operator behaviour. This allows the software to predict
deviations from the standard workflow and record only anomalous behaviour.
26
Criminal use: Criminals may use surveillance cameras to monitor the public.
For example, a hidden camera at an ATM can capture people's PINs as they
are entered, without their knowledge. The devices are small enough not to be
noticed, and are placed where they can monitor the keypad of the machine as
people enter their PINs. Images may be transmitted wirelessly to the criminal.
Use in schools: Closed-circuit television is used for school security to monitor
visitors, track unacceptable student behaviour and maintain a record of
evidence in the event of a crime. There are some restrictions on installation,
cameras may not be used in an area where there is a "reasonable expectation
of privacy". Examples of these are bathrooms, gym locker areas and private
offices (unless consent by the office owner is given). Cameras are generally
acceptable in hallways, parking lots, front offices where students, employees,
and parents come and go, gymnasiums, cafeterias, supply rooms and
classrooms. The use of cameras in classrooms is often debated by teachers
who want cameras for protection and teachers who do not
IP Camera vs Analog Camera
In terms of video quality, IP Camera is excel in capturing high definition,
megapixel images but have trouble with low lighting conditions where is Analog
cameras perform well across a variety of lighting conditions and manage motion
well.
In terms of cabling infrastructure, IP camera is capable of transmitting power,
video and data. Analog cameras uses coaxial cable or baluns to transmit analog
video, power and data.
IP cameras are network appliances and as they are devices requiring
management are less reliable but analog cameras are very mature and have a
long track record for reliability.
27
In terms of security, IP video streams can be encrypted and are difficult to
intercept. On the other hand, analog signals are less secure and can be
intercepted and/or viewed by anyone with access to the cabling infrastructure.
An IP camera is a network appliance and requires continuous skilled
management but Analog cameras are unmanaged devices.
One of the clear advantage of IP camera is the flexibility to integrate with a
wireless network. Analog cameras which use radio frequencies to transmit
video wirelessly are limited to about a dozen cameras before it reaches capacity
in the unlicensed spectrum.
In terms of Installation, IP cameras require some basic networking skills for
small installations and significantly more technical skill for an enterprise size
installation. Analog cameras require little to no network and configuration
knowledge; just power, point, and focus, regardless of scope and size of overall
system.
In terms of cost, IP cameras are 3x more expensive than their analog
equipment’s. Large installations require managed network switching equipment
and peripherals, which can become very costly.
Types of IP Camera
Network cameras are available in many different models to suit a wide variety
of needs. With such a wide variety of network cameras available today, most
requirements across all vertical markets and system sizes can be
accommodated. As with analog cameras, network cameras come in different
models.
All the cameras include:
 Vandal resistant versions, depending upon protective housing used.
 Weather resistant versions, depending upon protective housing used.
 Day and night versions. Camera can automatically or manually switch between
day mode with colour video and night mode with black and white low light image
that can be enhanced using IR Illuminators.
Installer must be aware of number of common practices related to camera
positioning, which will help in obtaining best quality out of the system.
28
Fixed Network Cameras
Fixed cameras with a body and a lens represent the traditional camera type. In
some applications it is advantageous to make the camera very visible. If this is
the case then a fixed camera represents the best choice, since the camera is
clearly visible, as is the direction in which it is pointing. Another advantage is
that most fixed cameras have exchangeable lens of C/CS type. For further
protection, it can be installed in housing designed for indoor or outdoor
installation.
Fixed Dome Network Cameras
Also known as mini domes, essentially consists of a fixed camera pre-installed
in a small dome housing. The camera can be easily directed to point in any
direction. Its main benefit is its discrete, non - obtrusive design, as well as in
the fact that it is hard to see in which direction camera is pointing. One of the
limitations is that they rarely have exchangeable lens because of space inside
the dome housing.
29
PTZ Network Cameras
Pan Tilt Zoom (PTZ) cameras have the obvious benefit of being able to pan, tilt
and zoom either manually or automatically. For a manual operation, a PTZ
camera can be used to follow a person in retail store. They are mainly used in
indoors and where it is desirable that the direction in which the camera is
pointing can be seen. Some of them don't have full 360 degree pan and are not
made for continuous operation, so called 'guard tours'. Optical zoom ranges
from 18x to 26x.
Network Dome Cameras
Network dome cameras share same benefits as the fixed dome cameras: they
are fairly discreet and the direction to which they are pointing can't be
determined when looking at the camera. It has the ability to pan 360 degree as
compare to PTZ. It also provides mechanical robustness for continuous
operation in guard tours where the camera continuously moves between say
30
10 presets, day in and day out. With guard tours, one camera can cover an
area where 10 cameras are required to do the same job. The main drawback
is that only 1 location is monitored at any given time, leaving the other 9
positions un-monitored. The optical zoom ranges between 18x and 30x. But for
outdoor installation, zoom factors above 20x normally prove impractical
because of vibration and motion caused by wind.
Non-Mechanical PTZ Cameras
They are a new breed of PTZ cameras. Using a megapixel sensor, it can cover
from 140 to 360 degrees and the operator can select to pan, tilt, and zoom the
camera in any direction without involving any mechanical movement. The key
advantage is that no wear and tear on moving parts. It also offers immediate
movement to a new position, which in a traditional PTZ camera can take up to
1 sec. The best non-mechanical PTZ cameras are using 3 megapixel sensor.
For good image quality, pan and tilt should be limited to 140 degrees and zoom
to 3x. For higher coverage or zoom, image quality will adversely be affected.
System Specification Terms
Image Sensor
Image quality is one of the most important features of any camera.Network
camera are equipped with processing power not only to capture and preset
images, but also to manage and compress them digitally for network transport.
Factors on which image quality is dependent of:
 Choice of optics
 Choice of image sensor
 Available processing power
 Level of sophistication of the algorithms in the processing chip.
The image sensor of the camera is responsible for transforming light into
electrical signals. When building a camera, there are two possible technologies
for the camera’s image sensor:
 CCD Sensor
31
 CMOS Sensor
 “EXMOR” CMOS Sensor
CCD Sensor
CCD Sensors are produced using a technology developed specifically for the
camera industry and have been used in cameras for more than twenty years.
One of the advantage of CCD sensor is higher light sensitivity which results into
better images in low light condition. They are however more expensive as they
are made in a non-standard process and more complex to incorporate into a
camera. It causes a phenomenon called smear where the CCD may bleed
when there is a very bright object in the scene. It causes vertical strips below
and above the object.
CMOS Sensor
CMOS (Complementary Metal Oxide Semiconductor) sensors are based on
standard technology already extensively used in memory chips, inside PCs.
They are unsuitable for cameras where the highest possible image quality is
required. They are less expensive as they contain all the logic required to build
a camera. They can be used to produce small-sized cameras. Large size
sensors are available, providing megapixel resolution to a variety of network
cameras. A limitation of CMOS is their lower light sensitivity. In normal bright
condition, this is fine. But in low light conditions, there is either a very dark or a
very noisy image.
“EXMOR” CMOS Sensor
32
Exmor is the technology implemented on some of their CMOS image sensors.
It performs on-chip analogue/digital signal conversion and two-step noise
reduction in parallel on each column of the CMOS sensor.
Exmor R is a back-illuminated version of CMOS image sensor. Exmor R usage
is limited to smaller sensors for camcorders, compact cameras and mobile
phones. It was the world's first mass-produced implementation of the back-
illuminated sensor technology. Exmor R is approximately twice as sensitive as
a normal front illuminated sensor. The Exmor R sensor allows the camera of
the smartphone to capture high definition movies and stills in low lit areas.
Progressive scan vs Interlaced Video
Two different techniques are available for rendering the video:
 Interlaced Scanning
 Progressive Scanning
Selection of technique depends upon the application and purpose of the video
system, and particularly whether the system is required to capture moving
objects and to allow viewing of detail within a moving object.
Interlaced Scanning
Interlaced scan-based images use techniques developed for Cathode Ray
Tube (CRT)-based TV monitor displays, made up of 576(PAL)/480(NTSC)
visible vertical lines across a standard TV screen. Interlacing divides this into
odd and even lines and refreshes them at 25/30 frames per second. The slight
delay in refreshing causes distortion or 'Jaggedness'. This is because only half
the lines keeps up with the moving image while the other half waits to be
refreshed.
De-interlacing: To reduce the effect of Interlacing, De-interlacing can be used.
It is the process of converting interlaced video into a non-interlaced form, by
eliminating some jaggedness from the video for better viewing. This process is
also called doubling. Some network video products, such as Axis video server
integrate de-interlace filter which improves image quality in the highest
33
resolution (4CIF). This eliminates the motion blur problems caused by analog
video signal from the analog camera.
Interlaced scanning is used in analog cameras, television and VHS video world.
Progressive Scanning
Progressive Scanning scans the entire image line by line every 25/30 of a
second. In this captured images are not split into separate fields. Computer
monitors do not need to interlace to show the picture on the screen. It puts the
images on one line at a time in perfect order 1,2,3,4,5,6,7, etc. So there is
virtually no 'flickering' effect. As such, in a video surveillance application it can
be critical in viewing detail within a moving image such as a person running
away. However, a high quality monitor is required to get the best out of this type
of scan. Progressive scan is used in axis network cameras such as AXIS 210.
Example: Capturing Moving Objects
When a camera captures a moving object, the sharpness of a still image will
depend on the technology used. On comparing JPEG images, captured by
three different cameras using progressive scan, 4CIF Interlaced scan and 2CIF,
we can observe that:
 All image systems produce a clear image of the background.
 Jagged edges from motion with interlaced scan.
 Motion blur caused by the lack of resolution in the 2CIF Sample
 Only progressive scan makes it possible to identify the driver.
Compression
Image and video compression can be done either in a lossless or lossy
approach. In lossless compression, each and every pixel is kept unchanged
such that after decompression, we get an identical image. The compression
ratio is limited in lossless compression and data reduction is also very limited.
So it is an impractical way to store and transfer data. One among the example
34
of lossless compression is GIF. In lossy compression, compression ratio is
increased. The fundamental idea is to reduce things that appear invisible to the
human eye. Compression methods also involve two different approaches to
compression standards:
 Still Image Compression
 Video Compression
Still image compression standards
All still image compression standards are focussed only on one single image at
a time. The most well-known and widespread standard is JPEG.
JPEG (JOINT PHOTOGRAPHIC EXPERTS GROUP) was originally
standardized in mid 1980s. With JPEG, decompression and viewing can be
done from standard web browsers.
JPEG compression can be done at different user defined compression levels,
which determine how much an image is to be compressed. The compression
level selected is directly related to the image quality requested. Besides the
compression level, the image itself also has an impact on the resulting
compression ratio. Example, a white wall may produce a small image file and
a higher compression ratio, while the same compression level applied on a very
complex and patterned scene will produce a larger file size, with a lower
compression ratio. As compression increases, image is more degraded.
JPEG 2000 is another still image compression standard. At low compression
ratio it is same as JPEG but at higher compression ratio, it performs slightly
better than JPEG. Support for JPEG 2000 in web browser and image displaying
and processing application is very limited. JPEG 2000 was specifically
designed for medical applications and still image photographing.
Video compression standards
Video as a sequence of JPEG Images-Motion (M-JPEG)
Motion JPEG is the most commonly used standard in network video system.
A network camera captures individual images and compresses into JPEG
35
format. The network camera captures and compresses and makes it available
as a continuous flow of image over network. At frame rate greater than or equal
to 16 fps, the viewer perceives the motion video as M-JPEG. Each individual
image is a complete JPEG compressed image; they all have same guaranteed
quality, determined by compression level chosen for n/w camera or video
server.
H.263
The H.263 compression technique targets a fixed bit rate video transmission.
The disadvantage of a fixed bit rate is that when an object moves, quality of
image decreases. It was originally designed for video conferencing apps and
not for video surveillance where details are more crucial than fixed bit rate.
MPEG
One of the best-known audio and video streaming techniques is the standard
called MPEG (Motion Pictures Experts Group). The basic principle is to
compare two compressed images to be transmitted over network. The first
compressed image is used as a reference frame and only parts of following
images that differ from reference images are sent. The network viewing station
then reconstructs all images based on the reference image and the “difference
data”. Even if its complexity is high it leads to lower data volumes being
transmitted across network.
DIFFERENT MPEG STANDARDS
 MPEG-1 was released in year 1993 and was intended for storing digital videos
onto CDs. Thus most MPEG-1 encoders & decoders are designed for target bit
rate of about 1.5Mbit/s at CIF resolution. The main focus is on keeping bit-rate
constant at expense of varying quality, typically comparable to VHS video
quality. Frame rate is locked at 25(PAL)/30(NTSC) fps.
 MPEG-2 was approved in 1994 and was designed for high quality digital video
(DVD), digital high-definition TV (HDTV), interactive storage media(ISM), DBV
and cable TV (CATV). It focuses on extending MPEG-1 compression technique
36
to cover larger pics and higher quality at expense of lower compression ratio
and higher bit-rate. Frame rate is same MPEG-1.
 MPEG-4 is a major development from MPEG-2. There are many more tools to
lower the bit rate needed to achieve certain image quality for certain application
or image scene. Frame rate is not locked at 25/30 fps. However, most of the
tools used to lower bit-rate are only relevant for non-real-time applications
because some of the new tools require so much processing power that total
time for encoding and decoding makes them impractical for real-time
applications. Most of the tools in MPEG-4 that can be used in real-time
applications are the same tools that are available in MPEG-1 & MPEG-2.
Key consideration is to select widely used video compression standard that
ensures high image quality, such as M-JPEG or MPEG-4.
MPEG-4 (Part 10)
The two groups behind H.263 & MPEG-4 jointly formed next generation video
compression standard. AVC for Advanced Video Coding also called H.264 or
MPEG-4 Part 10. The intent is to achieve very high data compression. This
standard is capable of providing good video quality at bit rates substantially
lower than previous standards, and this is done without increasing complexity
as to make designs impractical or expensive to implement.
Advantages and Disadvantages of Motion JPEG, MPEG-2 and MPEG-4
M-JPEG is a good choice when you want limited delay between image
capturing, encoding, and transfer over the network, decoding and finally display
at viewing station. Or we can say that M-JPEG has low latency and thus suitable
for image processing, such as in video motion detection or object tracking.
Practical image resolution from mobile phone display size (QVGA) up to full
video (4CIF) image size and above (megapixel) is available in Motion JPEG.
The system guarantees image quality regardless of the movement or image
complexity, offering the flexibility to select either high image quality (low
compression) or low image quality (high compression) with the benefit of
37
smaller image file sizes, lower bit-rate and bandwidth usage. Frame rate can
easily be adjusted to limit bandwidth usage without loss of image quality. Motion
JPEG generates relatively large volume of image data to be sent across the
network.
MPEG has the advantage of sending lower volume of data per time unit across
the network as compared to M-JPEG, except at lower frame rates.
If the available network bandwidth is limited, or if the video is to be recorded at
high frame rate and there are storage space restraints, MPEG is preferred as it
provides high image quality at lower bit-rate. But the lower bandwidth demands
come at cost of higher complexity in encoding and decoding, which in return
increases latency in comparison to M-JPEG.
MPEG-2 and MPEG-4 are subject to licensing fees. At lower frame rates
bandwidth consumption is similar between M-JPEG and MPEG-4 but at higher
frame rates MPEG-4 requires much less bandwidth that M-JPEG.
Image Resolution
Image resolution is the detail an image holds. The term applies to raster digital
images, film images, and other types of images. Higher resolution means more
image detail.
Image resolution can be measured in various ways. Basically, resolution
quantifies how close lines can be to each other and still be visibly resolved.
Resolution units can be tied to physical sizes (e.g. lines per mm, lines per inch),
to the overall size of a picture (lines per picture height, also known simply as
lines, TV lines, or TVL), or to angular subtenant. Line pairs are often used
instead of lines; a line pair comprises a dark line and an adjacent light line. A
line is either a dark line or a light line. A resolution 10 lines per millimetre means
5 dark lines alternating with 5 light lines, or 5 line pairs per millimetre (5
LP/mm). Photographic lens and film resolution are most often quoted in line
pairs per millimetre025569.
Resolution in an analog or digital word is similar. Resolution in digital system is
defined as image is made up of pixel and resolution in analog is specified as
image consists of lines, or TV-Lines. (TV Industry).
38
NTSC and PAL Resolutions
NTSC and PAL standards were originated from television industry. In North
America and Japan, NTSC (National Television System Committee) is used as
the analog video standard. While in Europe, PAL (Phase Alternation by Line) is
more pronounced.
Resolution of NTSC is 480 lines and refresh rate is 60 interlaced fields per
second (30 full frames per second) whereas resolution of PAL is 576 lines and
refresh rate is 50 interlaced fields per second (25 full frames per second). The
amount of information transferred per second is same in both. When analog
video is digitized, the maximum amount of pixels that can be created is based
on the no. of TV line available to be digitized. In NTSC, maximum size of
digitized image is 720*480px. In PAL, it is 720*576px (D1).
Commonly used resolution is:
 704*576 for PAL
 704*480 for NTSC
Sometimes QCIF i.e. Quarter of CIF image is used.
2CIF (Common Intermediate Format) Resolution is 704*240(NTSC) or
704*288(PAL) pixels, means dividing the number of horizontal lines by 2. In
most cases, horizontal line is shown twice, so called "line doubling", when
shown on a monitor in order to maintain correct ratios in the image. This is the
way to cope with motion blur in interlace scan.
VGA Resolution
VGA (Video Graphics Array) is used for 100% digital systems. They are more
flexible. VGA is a graphic display system for PCs and was originally developed
by IBM. Resolution is defined at 460*480px. It is best suited for network
cameras as video is shown on computer screens, with resolutions in VGA or
multiples of VGA. Quarter VGA (QVGA) is similar to CIF with a resolution of
320*240px. It is also called as SIF (Standard Interchange Format) resolution.
39
Other VGA are XVGA (1024*768) and 1290*960px, 4 times VGA which
provides megapixel resolution.
MPEG Resolution
MPEG Resolution can be:
 704*576 pixels (PAL 4CIF)
 704*480 pixels (NTSC 4CIF)
 720*576 pixels (PAL or D1)
 720*480 pixels (NTSC or D1)
Megapixel Resolution
Higher the resolution, more details can be seen in the image. As a result, a
criminal can be identified easily. Maximum resolution of NTSC and PAL in
analog camera after the video signal has been digitized in a DVR or a video
server is 400,000px (704*576=405,504). 400,000 equals to 0.4 Megapixel.
New camera network technology now makes higher resolution possible.
Common megapixel format is 1280*1024 and has 1.3megapx resolution which
is 3 times greater than analog cameras. Several megapixel cameras are
available.
Different megapixel cameras have different aspect ratios. In a standard CCTV,
aspect ratio is 4:3 while in movies and wide screen, 16:9 ratio is used. In
network camera, any aspect ratio can be used. Advantage of aspect ratio is
that, in most of the images, the upper part and lower part of the picture are of
no interest, yet they take up precious pixels and therefore bandwidth and
storage space.
NOTE: Pan/tilt/zoom don't affect the resolution. Operator selects which part of
the megapixel image should be shown. It does not imply any mechanical
movement from the camera and hence high reliability.
Horizontal Resolution – TVL
40
Television Lines (TVL) is a specification of an analog camera’s or monitor’s
horizontal resolution power. It is alternatively known as Lines of Horizontal
Resolution or lines of resolution. TVL is defined as the maximum number of
alternating light and dark vertical lines that can be resolved per picture height.
A resolution of 400 TVL means that 200 distinct dark and vertical lines can be
counted over a horizontal span equal to the height of the picture.
Illumination
The illumination is a key element in creating an artistic piece, and the interplay
of light and shadow is a valuable method. The placement of light sources can
make a considerable difference in the type of message that is being presented.
Minimum illumination is a way to measure the sensitivity of a camera. In other
words, it means how dark the camera can still see usable image.
IR Illuminator – Day and Night Functionality of Camera
IR (Infrared) cameras are used when there are low - light video surveillance
situations i.e., where light conditions are less than optimal as well as discreet
and covert surveillance situations. They make use of the visible light and can
be applied in a residential area at night without disturbing residents. They are
more useful when cameras can't be used in certain environment or situations.
Light Perception: Light is a form of radiation wave energy that exists in a
spectrum. Visible spectrum is 400 to 700nm. In terms of increasing wavelength,
X-Ray -> UV-->VIOLET-RED-->Infrared-->Microwave
Infrared energy is emitted by all the objects (humans, animals, grass, etc.).
Warmer object like people and animals stand out typically from cooler
backgrounds. In night, people can't see colour and hue, they can only see black,
white and shades of grey.
Working of IR camera for day and night or IR-Cut Filter:
Image sensor can sense infrared light up to 1000 nm. When infrared rays hit
the lens in daytime, distortion of colour takes place. Hence all the cameras have
IR-cut filter to remove IR light and to render colour images that humans are
41
used to. IR-cut filter is an optical piece of a glass that is placed between the
lens and the image sensor. As illumination is reduced and the image darkens,
the IR-cut filter can be removed automatically to enable the camera to make
use of IR-light so that it can see even in dark environment. The ability to
automatically place or remove the IR-cut filter depends on the make of camera.
To avoid colour distortions, camera often switches to black and white mode and
is able to generate high quality, black and white images.
White Balance Mode
White Balance is adjusted to get the colours in images as accurate as possible
because images different sources of light have a different temperature to them.
Fluorescent lightning adds a bluish cast to photos whereas tungsten lights add
a yellowish tine to photos. We don’t notice this difference in temperature
because our eyes adjust automatically for it. So unless the temperature of the
light is very extreme a white sheet of paper will generally look white to us.
Some of the basic White Balance settings are:
 Auto: This is where the camera makes a best guess on a shot by shot basis.
 Tungsten: This adds a yellowish tine to photos and generally cools down the
colours in photos. It is used for shooting indoors, especially under tungsten
(incandescent) lighting.
 Fluorescent: This compensates for the ‘cool’ light of fluorescent light and will
warm up the shots.
 Daylight/Sunny: It sets things as fairly ‘normal’ white balance settings.
 Cloudy: This setting warms things up a touch more than ‘daylight’ mode.
 Flash: This can be quite a cool light so in FLASH WB mode, it warms up the
shots a touch.
 Shade: The light in shade is generally cooler than shooting in direct sunlight so
this mode will warm things up a little.
Effective Pixels
42
Digital camera image sensors consist of a number of pixels, which collect
photons (energy pockets of light). The photodiode then converts the photons
into an electrical charge. Each pixel has only one photodiode.
A conventional sensor in, for example, a 12MP (megapixel) camera has an
almost equal number of effective pixels (11.9MP). Therefore, effective pixels
refers to the area of the sensor that said pixels can cover. The 0.1% of pixels
left are used to determine the edges of an image and to provide colour
information. On occasions, not all sensor pixels can be used (for instance, if a
lens cannot cover the whole sensor range).
Some cameras can interpolate the number of sensor pixels. For instance, a
6MP camera can produce 12MP images. Here, the camera interpolates 12
megapixels of information based on the 6 megapixels of effective pixels on the
sensor. (The term interpolation refers to the process of making new pixels,
based on the captured pixels.)
Interpolation cannot ever create data that you didn’t capture in the first place,
and the difference in quality is marginal.
Minimum Object Distance
Minimum Object Distance (MOD) refers to the shortest working distance
between the foremost lens and the motive which can still be focussed using the
focus ring on the lens. Rays of light from the object incident in parallel all
coincide in the focal point of the optics on the sensor side. If the test object
comes closer to the optics, re-focus is required, since the shorter distance
makes the generated image move further and further away from the lens. When
focussing the close range, the lens group is therefore moved away from the
sensor. MOD is measured from the vertex of the front glass of the lens. It
strongly depends on the lens design and the mechanics of the optics and is
clearly manufacturer specific.
Lens Type
43
There are two lens type:
 Fixed or board CCTV Camera Lens has a set viewing angle. This means the
camera lens cannot be zoomed in or adjusted in any way. Fixed lens cameras
are generally less expensive so can be a good option if the layout of an area is
not likely to change (such as a room in a house).
 Vari-focal or Manual Zoom CCTV Camera Lens can be adjusted so it focuses
on exactly the area you wish to record. This advantage also means that the
viewing angle of the surveillance camera can be tweaked to capture the ideal
image plus it has the flexibility to be adjusted at a later date if the area layout
or the requirement changes.
Zoom Ratio
Zoom Ratio is the ratio of the focal length at the telephoto end to that at the
wide end. A zoom lens can change the size of an object appearing on the
monitor to the extent specified by the zoom ratio. Optical zoom lens allows to
monitor a scene from any distance. It is used to define the focal length range
for a zoom lens. If the maximum range through which a particular lens can be
zoomed is 10mm to 100mm, it’s said to have a 10:1 zoom ratio.
Viewing Angle
The angle of view is the shooting range that can be viewed by the lens given a
specific image size. It is usually expressed in degrees. Normally the angle of
view is measured assuming a lens is focussed at infinity. The angle of view can
be calculated if the focal length and image sizes are known. If the distance of
the object is finite, the angle is not used. Instead, the dimension of the range
that can actually be shot, or the field of view, is used. Different CCTV lens sizes
can change the viewing angle of a security camera. Typically angle of view can
be expressed in Horizontal, Vertical or Diagonal. Angle of view at a given
distance depends upon the focal-length of the lens and CCD sensor size.
Smaller focal lengths give a wider angle of view.
44
Noise reduction
XDNR (eXcellent Dynamic Noise Reduction) technology is used for noise
reduction in IP security cameras. XDNR technology utilizes 2-dimensional and
3-dimensional noise reduction methods adaptively to scenes. Under low-light
conditions, XDNR technology provides clear images while minimizing motion
blur, which is a challenge in many outdoor surveillance monitoring applications.
XDNR technology offers the optimum in low light imaging performance.
S/N Ratio
The arch enemy of picture clarity on a monitor is noise which is an electronic
noise that is present to some extent in all video signals. There are several
sources of noise; poor circuit design, hear, over-amplification, etc. The
important factor that determines the tolerance of noise is the amount of noise
in the video signal, the signal to noise ratio. Every time a video signal is
processed, noise is introduced. A common source of noise is when Automatic
Gain Control (AGC) is introduced at a camera in very low light conditions. That
is why manufacturers state the minimum sensitivity of a camera with the AGC
on but the S/N ratio with AGC off. The more is the S/N ratio, the better is the
picture quality.
Wide-D (View-DR)
View-DR is a technology which produces image with an extremely wide
dynamic range. It is a combination of full-capture Wide-D technologies, the
high-speed ‘Exmor’ CMOS sensor, and Visibility Enhancer (VE) technology.
The full-capture Wide-D technology used in View-DR uses an electronic shutter
to capture multiple images and reproduce each frame. With this, all of the
electrons are converted from the captured light are fully used by the imager. As
45
a result, View-DR nearly doubles the sensitivity that is offered by conventional
Wide-D technologies.
System Considerations
Network bandwidth and storage requirements are important considerations
when designing a video surveillance system. The factors include the number of
cameras, the image resolution used, the compression type and ratio, frame
rates and scene complexity. This chapter provides some guidelines on
designing a system, along with information on storage solutions and various
system configurations.
Bandwidth and Storage
Network video products utilize network bandwidth and storage space based on
their configuration. This depends on the following:
 Number of cameras
 Whether recording will be continuous or event-based
 Number of hours per day the camera will be recording
 Frames per second
 Image resolution
 Video compression type: Motion JPEG, MPEG-4, H.264
 Scenery: Image complexity (e.g. gray wall or a forest), lighting conditions and
amount of motion (office environment or crowded train stations)
 How long data must be stored
46
Redundancy
Redundancy in a storage system allows video, or any other data, to be saved
simultaneously in more than one location. This provides a backup for recovering
video if a portion of the storage system becomes unreadable. There are a
number of options for providing this added storage layer in an IP-Surveillance
system, including a Redundant Array of Independent Disks (RAID), data
replication, server clustering and multiple video recipients.
System Scalability
47
One of the advantage of IP is its ability to simply add on cameras by plugging
into any network connection. Analog cameras can too be virtually expanded as
there is no requirement for bandwidth or data transmission between the
cameras and the recorders. It is also possible to scale up the system by adding
more storage servers when needed and do maintenance without bringing down
the entire system.
Frame Rate and its Control
Frame rate, also known as frame frequency and frames per second (FPS),
is the frequency (rate) at which an imaging device produces unique consecutive
images called frames. The term applies equally well
to film and video cameras, computer graphics, and motion capture systems.
Frame rate is most often expressed in frames per second (FPS) and is also
expressed in progressive scan monitors as hertz (Hz).
We can set different recording frame rates for selected cameras; for example,
one under normal operation and another when alarm is triggered. Different
frame rates can also be set for viewing and/or recording purposes and for
different recipients.
Maximum Frame Rate
Full frame rate on all cameras at all times is more than what is required for most
applications. With the configuration capabilities and built-in intelligence of
network cameras, frame rates under normal conditions can be set lower, e.g.
one to four frames per second, to dramatically decrease storage requirements.
In the event of an alarm—for instance, if video motion detection or an external
sensor is triggered—a video management software program can be configured
to request that the network video product send a different stream with a higher
recording frame rate.
48
Shutter Speed
In photography, shutter speed or exposure time is the length of time
a camera's shutter is open when taking a photograph. The amount of light that
reaches the film or image sensor is proportional to the exposure time. The
minimum illumination of security cameras is measured at normal shutter speed
(1/60 sec.).
Many security cameras can capture images at various shutter speeds ranging
from 2 seconds to 1/10,000 second. When capturing images at normal shutter
speeds (ex. 1/60 sec.), moving objects can be captured clearly without picture
blur. On the contrary, when capturing images at slow shutter speeds (ex. 1
sec.), the camera’s CCD accumulates more light so that the image captured is
brighter; however, for moving objects, the accumulation period can be too long,
resulting in picture blur.
By using a slow shutter speed, it is possible to skew the minimum illumination
value in a specification so that the lux rating is much lower than that taken at a
normal shutter speed. However, because the resulting image is blurred, it is not
useful in most surveillance monitoring applications.
Gain Control
When the light falling on camera reduces to a certain level, there is insufficient
to create a full level video signal. AGC (Automatic Gain Control) acts to increase
the amount of amplification in these conditions to bring the signal up to the
required level. As well as amplifying the video signal, additional noise can be
introduced, and the signal to noise ratio reduced. The result is frequently a very
much degraded signal and poor picture on the monitor.
Exposure Control
Exposure is the amount of light per unit area (the image
plane illuminance times the exposure time) reaching a photographic film, as
49
determined by shutter speed, lens aperture and scene luminance. Exposure is
measured in lux seconds, and can be computed from exposure value (EV) and
scene luminance in a specified region.
An appropriate exposure for a photograph is determined by the sensitivity of
the medium used. For photographic film, sensitivity is referred to as film speed.
Exposure is a combination of the length of time and the illuminance at the
photosensitive material.
The exposure in a normal photographic camera can be controlled by a
combination of shutter speed and iris opening. This is not so with a CCTV
camera lens. A standard CCTV camera produces a complete picture every 1/2
of the mains frequency. This is every 1/25 second where the mains frequency
is 50 Hz (cycles per second) and every 1/30 second where the mains frequency
is 60 Hz. Generally the exposure time is fixed and the only control of the amount
of light passing to the imaging device is by adjusting the size of the iris. This is
covered in more detail later in this chapter. Most camera tubes and imaging
devices have some tolerance of the amount of light passed by the lens to create
an acceptable picture. The range of tolerance is generally inversely proportional
to the sensitivity of the camera. The more sensitive cameras require greater
control of the iris aperture.
Focal Length
Parallel incident light transmitted to a lens converges to a point on the optical
axis. This point is the focal point of the lens. The distance between the principle
point in the optical system and the focal point is referred to as the focal length.
For a single thin lens, the focal length is equal to the distance between the
centre of the lens and the focal point. It is measured in mm. A short focal length
has a wide angle of view. A long focal length has a narrow angle of view. The
smaller the CCD Chip, narrower is the angle of view.
F-Number
50
F-number describes how bright a lens is. In other words, it represents the
maximum amount of light that a lens can direct to the camera’s image sensor.
This amount of light is determined by the widest iris opening that the lens allows
or its maximum aperture and the focal length of the lens. F-number is described
as a function of the focal length (f) of a lens and the maximum diameter (D) of
the iris opening as follows:
F-number = f (focal length)/D (maximum iris opening)
A lens with a smaller F-number provides brighter images.
Number of Clients
Number of clients in a network is defined as the number of cameras that may
be added in a network and can be used with the client software running on a
system. It is a specification term of network specification of a CCTV Camera.
The system should allow to be used as a distributed or central architecture with
support to any number of clients or any number of cameras that may be added
in future. The addition of number of clients depends upon the number of license
provided.
System Requirements
System Requirement is the specification of the hardware and software platform
on which the client software is running. It can include the detail about system
computer, system software, system size, communications, video inputs, video
outputs, keyboards, user defined keys, etc.
Operating System
An Operating System is a software that manages computer hardware resources
and provides common services for computer programs. The CCTV Server PC
Operating System can be Windows XP, Windows Vista, Windows 7 or Windows
8. The Operating System program shall be stored in the CPU, and shall not
51
require the presence of a PC for operation. The monitoring software used for
CCTV Cameras shall be Operating System based, functioning under operating
systems. It shall have a high degree of flexibility allowing for further expansion
and customisation needs.
Processor
A processor is the logic circuitry that responds to and processes the basic
instructions that drive a computer. There are several types of processor
available in market. Some of them are Intel Core2 Duo 2 GHz, Intel core i5,
Intel core i3, Pentium IV, 2 GHz, etc. This specifies the configuration for Server
PC.
Memory
Memory refers to the physical devices used to store programs (sequences of
instructions) or data on a temporary or permanent basis for use in a computer
or other digital electronic device. It is the space used to store the data or the
space required to run the Server Software. It can be 128MB RAM, 1GB, etc.
Real time program updates, and overall host communications shall utilize flash
memory. EEPROM memory is required for system program storage and flash
memory for building-specific program storage.
Web Browser
A web browser is a software application for retrieving, presenting and traversing
information resources on the World Wide Web. An information resource is
identified by a Uniform Resource Identifier and may be a web page, image,
video or other piece of content. The web browsers in CCTV surveillance are
required to view the videos with the help of hyperlinks. Examples of web servers
are Microsoft Internet Explorer Version 6.0, 7.0, 8.0, Mozilla Firefox, etc.
52
General Information about Camera
This includes the various specification about a camera including camera’s
weight, dimensions, power requirements, power consumption, starting
temperature, working temperature, storage temperature, Ingress protection and
safety regulation.
Weight
It is the normal mass of a camera. The minimum mass of camera available is
3g. The maximum mass of camera available is 5.9Kg. Usually the weight of the
camera is dependent upon the location where the camera is to be installed and
the specific purpose for which camera is used.
Dimensions
There are several dimensions of camera available. The dimension of camera
depends on the specific purpose for which camera is used and location of
installation.
Power Requirements
The power required for CCTV Camera to operate is given by Power Supply. A
CCTV power supply box allows surveillance system installers to easily manage
the power to multiple CCTV cameras at a central point. This allows the camera
installation to be neater. For example, instead of having 8 power supply plugs,
plug into power strip protector, all of the camera power wires can neatly be run
to a power supply box. A power supply box is installed near the DVR. Each
power cable screws into the power supply box. The power supply box plugs
into a standard power outlet.
Power Consumption
53
When it comes to electricity bill, the amount of electricity used is measured. So,
the amount of electricity use must be minimum. To reduce the cost of system,
usually CCTV’s with low power consumption are preferred.
Working Temperature
Working temperature is the range in which a camera operates. If a camera is
to operate outside where temperatures fluctuate beyond these ranges, the
CCTV must be installed with a protective enclosure containing a heater and a
blower. Otherwise, the equipment will malfunction or breakdown. A starting
temperature is also required by CCTV to work.
Storage Temperature
Storage Temperature refers to the range in which it is safe to store the camera
with no power connections, such as replacement units or units waiting to be
installed. If a camera is to be stored for an extended period at temperature
outside of this range, it may not be operational when the camera is eventually
powered up.
IP Network Technologies
IP is the primary protocol in the internet layer of the internet protocol suite and
has the task of delivering packets from the source host to the destination host
solely based on the IP address in the packet headers. For this purpose, IP
defines packet structures that encapsulate the data to be delivered. It also
defines addressing methods that are used to label the datagram with source
and destination information. Its routing function enables internetworking, and
essentially establishes the Internet.
Ethernet
54
Ethernet is a family of computer networking technologies for Local Area
Network. It has largely replaced competing wired LAN technologies such as
token ring, FDDI and ARCNET. The Ethernet Standards comprise several
wiring and signalling variants of the OSI physical layer in use with Ethernet. The
original 10BASE5 Ethernet used coaxial cable as a shared medium. Later the
coaxial cables were replaced with twisted pair and fiber optic links in
conjunction with hubs or switches. A twisted pair consists of eight wires, forming
four pairs of twisted copper wires and is used with RJ-45 plugs and sockets.
The maximum length of twisted pair is 100 m while for fiber, it ranges from 10km
to 70km. Data rates were periodically increased from the original 10mebabits
per second to 100 gigabits per second.
PoE (Power over Ethernet)
Power over Ethernet (PoE) provides the option of supplying devices connected
to an Ethernet network with power using the same cable as for data
communication. It is widely used to power IP phones, wireless access points
and network cameras in a LAN. The main benefit of PoE is the inherent cost
savings. Moreover, PoE can make a video system more secure. A video
surveillance system with PoE can be powered from the server room, which is
often backed up with a UPS. This means that the video surveillance system can
be operational even during a power outage.
Wireless Networks
For video surveillance applications, wireless technology offers a flexible, cost-
efficient and quick way to deploy cameras, particularly over a large area as in
a parking lot or a city center surveillance application. There would be no need
to pull a cable through the ground. In older, protected buildings, wireless
technology may be the only alternative if standard Ethernet cables may not be
installed.
55
56
There are cameras with built-in wireless support. Network cameras without
built-in wireless technology can still be integrated into a wireless network if a
wireless bridge is used.
Wired Network vs Wireless Networks
The biggest difference between these two types of networks is one uses
network cables and one uses radio frequencies. A wired network allows for a
faster and more secure connection and can only be used for distances shorter
than 2,000 feet. A wireless network is a lot less secure and transmission
57
speeds can suffer from outside interference. Although wireless networking is a
lot more mobile than wired networking the range of the network is usually 150-
300 indoors and up to 1000 feet outdoors depending on the terrain.
The cost for wired networking has become rather inexpensive. Ethernet
cables, hubs and switches are very inexpensive. Some connection sharing
software packages, like ICS, are free; some cost a nominal fee. Broadband
routers cost more, but these are optional components of a wired network, and
their higher cost is offset by the benefit of easier installation and built-in security
features.
Wireless gear costs somewhat more than the equivalent wired Ethernet
products. At full retail prices, wireless adapters and access points may cost
three or four times as much as Ethernet cable adapters and hubs/switches,
respectively.
Wired LANs offer superior performance. A traditional Ethernet
connection offers only 10 Mbps bandwidth, but 100 Mbps Fast Ethernet
technology costs a little more and is readily available. Fast Ethernet should be
sufficient for file sharing, gaming, and high-speed Internet access for many
years into the future. (Wi-Fi.org) Wired LANs utilizing hubs can suffer
performance slowdown if computers heavily utilize the network simultaneously.
Wireless networks using 802.11b support a maximum bandwidth of 11
Mbps. 802.11a and 802.11g LANs support 54 Mbps, that is approximately one-
half the bandwidth of Fast Ethernet. Furthermore, wireless networking
performance is distance sensitive, meaning that maximum performance will
degrade on computers farther away from the access point or other
communication endpoint.
In theory, wireless LANs are less secure than wired LANs, because
wireless communication signals travel through the air and can easily be
intercepted. The weaknesses of wireless security are more theoretical than
practical.
Data Transport Methods: Network Protocols
58
To transfer the data from camera to the destination, several network protocols
are used. Some of the network protocols are SSH, FTP, HTTP, etc.
IP Address
An IP address (Internet Protocol address) is a unique number that devices use
in order to identify and communicate with each other on a network utilizing the
Internet Protocol standard. An IP address consists of four numbers separated
by a dot, each number is in the range 0-255. For example, the address could
be “192.36.253.80”.
The IP address is further split up into a network part and a host part. The
boundary between the two parts is decided by a netmask or a prefix length. A
netmask of 255.255.255.0 means that the first 3 bytes will be the network
address and the last byte the host address. A prefix length is a different way of
providing the boundary, for example the same address as the previous example
has a prefix length of 24 bits (i.e, 192.36.253.80/24).
Certain blocks of addresses have been reserved for private use:
10.0.0.0/8 (netmask 255.0.0.0)
172.16.0.0/12 (netmask 255.240.0.0)
192.168.0.0/16 (netmask 255.255.0.0)
These addresses are intended for private internet and are used for CCTV
cameras.
IPv6
IPv6, or Internet Protocol version 6, is designed as an evolutionary upgrade to
the Internet Protocol and will, in fact, coexist with the older IPv4 for some time.
IPv6 is designed to allow the Internet to grow steadily, both in terms of the
number of hosts connected and the total amount of data traffic transmitted.
The most obvious improvement in IPv6 over the IPv4 is that IP addresses are
lengthened from 32 bits to 128 bits. This extension anticipates considerable
59
future growth of the Internet, providing for an unlimited (for all intents and
purposes) number of networks and systems.
Data Transport Protocols
A data transfer protocol is a standardized format for transmitting data between
two devise. The type of protocol used can determine such variables as the error
checking method, the data compression method, and end-of-file
acknowledgements. The most common protocol for transmitting data on
computer networks today is the TCP/IP Protocol suite. TCP/IP acts as a ‘carrier’
for many other protocols; a good example is HTTP which is used to browse
Web Pages on servers around the world using the Internet.
Transmission methods: Unicasting, Multicasting,
Broadcasting
There are different methods for transmitting data on a computer network:
 Unicast - the sender and the recipient communicate on a point-to-point basis.
Data packets are sent addressed solely to one recipient and no other
computers on the network will need to process this information.
 Multicast - communication between a single sender and multiple receivers on
a network. Multicast technologies are used to reduce network traffic when many
receivers want to view the same source simultaneously by delivering a single
stream of information to hundreds of recipients. The biggest difference
compared with unicasting is that the video stream only needs to be sent once.
 Broadcast - a one-to-everybody transmission. On a LAN, broadcasts are
normally restricted to a specific network segment and are not in practical use
for network video transmissions.
Network Security – Video Flow and Inherent Security Risks
&
60
Addressing Security Concerns and Risks: Secure
Transmission
In any video surveillance system, analog or digital, there is an inherent security
risk in the different parts, components or data transportation media used. These
elements of system may be tampered with or the security of them can be
compromised.
Each function and component has its own inherent risks, examples of which is
described:
1. Video is captured by a Camera
 Camera maybe disconnected, stolen or simply vandalized. Once the system
detects this it triggers a “communication error” event which can be used to
trigger alarms or rules notifying the right people of the issue.
 Camera maybe tampered with by turning it or by covering the lens. Many
cameras support tampering events of different kinds, such as tampering, video
loss, and temperature. These events can be used to trigger alarms or rules
notifying the right people of the issue.
2. Video streamed to the Recording Server
 The network may be disconnected or flooded with unwanted data due to a
DDOS attack. Once the system detects this it triggers a “communication error”
event which can be used to trigger alarms or rules notifying the right people of
the issue. In addition to creating alarms or notifying via emails, Edge Storage
can also be done on select devices. Edge Storage offers the function to record
video in the camera itself and let the Recording Server retrieve these recordings
after a network failure, effectively ensuring video recording even for periods
with no connection to the camera.
 The network may be compromised giving unauthorized persons access to
tapping into the transmitted video. Two methods can be used to protect the
transmitted video: VPN tunneling and HTTPS. A virtual private network (VPN)
tunnel can be set up between the camera and Recording Server using standard
equipment or software. The VPN will encrypt all data transmitted through the
61
tunnel and thus protect against unauthorized access to the video. In addition to
a VPN, HTTP Secure (HTTPS) can also be used. HTTPS uses Secure Socket
Layer (SSL) and offers encrypted communication directly with the camera
without a VPN tunnel.
3. Video stored in the Recording Server database
 The Recording Server may be turned off or fail. Recording Server failover can
be used, which is a function where one or more dedicated Failover Recording
Servers monitor the state of the primary Recording Servers. If the primary
Recording Servers stop responding, due to failure or being turned off, for
example for maintenance, the Failover Recording Servers take over the task of
recording the video. In addition to the failover support, Edge Storage can also
help because, as described in the previous section, it can record video in the
camera, allowing the Recording Server to retrieve the video once it is up and
running again.
 Windows security could be compromised giving local or remote access to the
video database files. To prevent unauthorized access to the video database
files several layers of security can be implemented:
 Physical security
Access to the room with the physical Recording Server should be limited to
a few authorized people only
 Windows server security
Local console and remote desktop access to the server running the Recording
Server should be limited to a few authorized people
Windows should be set to automatically logout after a short time of inactivity
Windows should be kept updated with the newest service releases
 Recording Server database
The database can be configured to encrypt the recordings in two modes:
“Light” and “Strong”
The database can be set to sign the recordings digitally to prevent tampering.
4. Live or recorded video is sent over a network to a client.
62
 The network may be disconnected or flooded with unwanted data due to a
DDOS attack. In case the network connection to the client is disconnected or
rendered inoperable by flooding it with unwanted data, the operator will
immediately see this and can alert the administrator of the issue.While the
clients may not be able to view live or recorded video, the Recording Server
can continue to record video unaffected if the network has been designed so
there are two separate networks; one for clients and one for cameras.
 The network may be compromised giving unauthorized persons access to
tapping into the transmitted video. As with the network connection from the
cameras to the Recording Server, the transmitted video from the Recording
Server to the client can be protected by using VPN tunnelling or HTTPS.
5. The client decodes the video and displays it on the monitor and offers a
function to export video recordings for evidence.
 Unauthorized persons may try to hack or otherwise obtain login credentials to
gain unauthorized access to viewing and exporting video To prevent someone
from hacking into the system, secure Windows Active Directory® (AD)
authentication can be used to provide protection against hacking.
 Authenticated surveillance users may try to tamper with exported material.
Security settings with time profiles can be set to tell when and which cameras
can be viewed live, played back and exported by the user. Furthermore, we can
control all export settings.
6. Exported evidence media is transported from the surveillance site to police
or a court
 The exported video maybe viewed and copied by unauthorized persons. The
database encryption supports up to 256-bit advanced encryption standard
(AES) and access is protected by a password. We can prevent the video from
being re-exported during a single export. This ensures that the video cannot be
exported in another format or be exported to the same format again but without
encryption and digital signing.
 The exported video maybe tampered with removing critical sequences of the
recorded video or be modified to give another impression of the recorded
63
evidence. When video that should be exported is protected with a digital
signature on the Recording Server, the signature of the recorded video will be
checked during the export to ensure that the video has not been tampered with
on the Recording Server. If the recorded video passes the signature check,
including the original digital signature, the video is exported to a new database
on the client PC.
7. The exported evidence is viewed by police or a judge in a court
 The exported video may have been tampered with removing critical sequences
of the recorded video or be modified to give another impression of the recorded
evidence. Recordings have been protected by an encryption and in addition to
this, they have a digital signature that can be verified for authenticity if the
recordings have been tampered with or if the integrity is intact.
Security in Wireless
Due to the nature of wireless communications, anyone with a wireless device
that is present within the area covered by a wireless network can share the
network and intercept data being transferred over it unless the network is
secured.
To prevent unauthorized access to the data transferred and to the network,
some security technologies such as WEP and WPA/WPA2 have been
developed to prevent unauthorized access and encrypt data sent over the
network.
WEP (Wired Equivalent Privacy): WEP prevents people without the correct
key from accessing the network.
WPA/WPA2 (WiFi Protected Access): WPA significantly increases security
by taking care of the shortcomings in the WEP standard. WPA adds a standard
way for distributing encrypted keys.
Recommendations
Some security guidelines when using wireless cameras for surveillance:
64
 Enable the user/password login in the cameras.
 Enable the encryption (HTTPS) in the wireless router/cameras. This should be
done before the keys or credentials are set for the WLAN to prevent
unauthorized access to the network with stolen credentials.
 Ensure that wireless cameras support security protocols such as IEEE 802.1X
and WPA/WPA2.
Storage Considerations
There are several ways by which data can be stored. The type of storage
depends on the amount of data to be stored and many other factors. Commonly
used storage device are:
 Direct Attached Storage
 NAS and SAN
 Raid
Direct Attached Storage
Depending on a PC server’s central processing unit (CPU), network card and
internal RAM (Random Access Memory), a server can handle a certain number
of cameras, frames per second and size of images. Most PCs can hold between
two and four hard disks, and each disk can be up to approx. 300 gigabyte (GB).
In a small to medium-sized installation, the PC that runs the video management
software is also used for video recording. This is called a direct-attached
storage. For example, one hard disk is suitable for storing recordings from six
to eight cameras. With more than 12 to 15 cameras, at least two hard disks
should be used to split the load. For 50 or more cameras, the use of a second
server is recommended.
NAS and SAN
65
When the amount of stored data and management requirements exceed the
limitations of a direct-attached storage, a network-attached storage (NAS) or
storage area network (SAN) allows for increased storage space, flexibility and
recoverability.
Network Attached Storage: NAS provides a single storage device that is
directly attached to a LAN and offers shared storage to all clients on the
network. A NAS device is simple to install and easy to administer, providing a
low-cost storage solution. However, it provides limited throughput for incoming
data because it has only one network connection, which can become
problematic in high-performance systems.
Storage Attached Network: SANs are high-speed, special-purpose networks
for storage, typically connected to one or more servers via fiber. Users can
access any of the storage devices on the SAN through the servers, and the
storage is scalable to hundreds of terabytes. Centralized storage reduces
administration and provides a high performance, flexible storage system for use
in multi-server environments. Fiber Channel technology is commonly used to
provide data transfers at four gigabits per second and to allow large amounts
of data to be stored with a high level of redundancy.
RAID
RAID is a method of arranging standard, off-the-shelf hard drives such that the
operating system sees them as one large hard disk. A RAID setup spans data
over multiple hard disk drives with enough redundancy so that data can be
recovered if one disk fails. There are different levels of RAID, ranging from
practically no redundancy to a full-mirrored solution in which there is no
disruption and no loss of data in the event of a hard disk failure.
Video Management Hardware Platforms
66
There are two different types of hardware platforms for a network video
management system:
 PC server platform involving one or more PCs that run a video management
software program.
 Network video recorder (NVR), which is a proprietary hardware with preinstalled
video management software.
PC Server Platform
A video management solution based on a PC server platform involves PC
servers and storage equipment that can be selected off the shelf to obtain the
maximum performance for the specific design of the system. A PC server
platform is also fully scalable, enabling any number of network video products
to be added to the system as needed. The system hardware can be expanded
or upgraded to meet increased performance requirements. An open platform
also enables easier integration with other systems such as access control,
building management, and industrial control. This allows users to manage video
and other building controls through a single program and user interface.
NVR Platform
A network video recorder comes as a hardware box with preinstalled video
management functionalities. An NVR hardware is often proprietary and
specifically designed for video management. It is dedicated to its specific tasks
of recording, analysing and playing back network video, and often does not
allow for any other applications to reside on them. The operating system can
be Windows, UNIX/Linux or proprietary.
An NVR is designed to offer optimal performance for up to a set number of
cameras, and is normally less scalable. This makes the unit suitable for smaller
systems where the number of cameras stays within the limits of an NVR’s
designed capacity. An NVR is normally easier to install.
67
DVR vs NVR
With a Network Video Recorder, the video input comes from the network—the
video has already been encoded at the cameras. Encoding is simply converting
digital video files from one format to another. The video is then streamed to the
NVR for storage and it can be viewed remotely due to it being on a network.
But with a DVR, it does the encoding at the DVR itself, not at the individual
cameras. Since it digitally compresses the analog feed, it must be located near
the feed. An NVR can be located anywhere on the network. Hence there is
protection against network failure for one thing. With “mirroring”, NVR’s can be
located throughout the network to provide duplication.
Another difference between a DVR and an NVR is access. To view the video
that was recorded, you need to be at the DVR (or burn a disk if you want to
view it elsewhere). But with an NVR, due to its very nature of being on a
network, you can view it remotely. Moreover, paring security cameras with
NVR’s is actually more restrictive than doing so with DVR’s.
Video Monitoring
A key function of a video management system is enabling live and recorded
video to be viewed in efficient and user-friendly ways. Most video management
software applications enable multiple users to view in different modes such as
split view (to view different cameras at the same time), full screen or camera
sequence (where views from different cameras are displayed automatically,
one after the other). Apart from that, using web browser also, you can see
camera by entering the camera’s IP address in the address bar.
Using Web Interface
68
Keeping an eye on property from anywhere with our remote video surveillance
tools. A simple broadband connection is required to use Web Interface. It
securely retrieves and transmits live video from any of the cameras and allows
us to remotely check that at home or business place. All we need is to know the
ip address of camera and check the connectivity using ping. If a response is
received, camera is connected and hence, you can see the video on web
browser by typing the ip address in the address bar.
Using Video Management Software
Many video management software offer a multi-camera playback feature, which
enables users to view simultaneous recordings from different cameras. This
provides users with an ability to obtain a comprehensive picture of an event,
which is helpful in an investigation. Additional features may be multi-monitor
viewing and mapping, which overlays camera icons that represent the locations
of cameras on a map of a building or area.
All video management software applications provide the ability to add and
configure basic camera settings, frame rate, resolution and compression
format, but some also include more advanced functionalities, such as camera
discovery and complete device management. The larger a video surveillance
Internship report - Copy1
Internship report - Copy1

More Related Content

What's hot

Vehicle monitoring and surveillance
Vehicle monitoring and surveillanceVehicle monitoring and surveillance
Vehicle monitoring and surveillance
jiju7172
 
IoT Based Home Automation System over Cloud
IoT Based Home Automation System over CloudIoT Based Home Automation System over Cloud
IoT Based Home Automation System over Cloud
ijtsrd
 

What's hot (20)

Foot Step Power Generation Using Piezoelectric Sensors
Foot Step Power Generation Using Piezoelectric SensorsFoot Step Power Generation Using Piezoelectric Sensors
Foot Step Power Generation Using Piezoelectric Sensors
 
Foot step power generation.ppt
Foot step power generation.pptFoot step power generation.ppt
Foot step power generation.ppt
 
Latest Electrical Mini Projects For EEE Students
Latest Electrical Mini Projects For EEE StudentsLatest Electrical Mini Projects For EEE Students
Latest Electrical Mini Projects For EEE Students
 
Agriculture field motor control system by using Global System for Mobile comm...
Agriculture field motor control system by using Global System for Mobile comm...Agriculture field motor control system by using Global System for Mobile comm...
Agriculture field motor control system by using Global System for Mobile comm...
 
Women’s Safety Jacket
Women’s Safety JacketWomen’s Safety Jacket
Women’s Safety Jacket
 
Video Surveillance Report
Video Surveillance ReportVideo Surveillance Report
Video Surveillance Report
 
Vehicle monitoring and surveillance
Vehicle monitoring and surveillanceVehicle monitoring and surveillance
Vehicle monitoring and surveillance
 
IOT based air quality and monitoring by using arduino
IOT based air quality and monitoring by using arduinoIOT based air quality and monitoring by using arduino
IOT based air quality and monitoring by using arduino
 
IRJET- IOT Based Surveillance Robotic Car using Raspberry PI
IRJET- IOT Based Surveillance Robotic Car using Raspberry PIIRJET- IOT Based Surveillance Robotic Car using Raspberry PI
IRJET- IOT Based Surveillance Robotic Car using Raspberry PI
 
iot pet feeder report
iot pet feeder reportiot pet feeder report
iot pet feeder report
 
03 CCTV camera types
03 CCTV camera types03 CCTV camera types
03 CCTV camera types
 
Surveillance System, CCTV, BMS
Surveillance System, CCTV, BMSSurveillance System, CCTV, BMS
Surveillance System, CCTV, BMS
 
Home automation using wifi
Home automation using wifiHome automation using wifi
Home automation using wifi
 
Project report on home automation using Arduino
Project report on home automation using Arduino Project report on home automation using Arduino
Project report on home automation using Arduino
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
 
Home automation
Home automationHome automation
Home automation
 
War Field Spying Robot with Night Vision Wireless Camera
War Field Spying Robot with Night Vision Wireless CameraWar Field Spying Robot with Night Vision Wireless Camera
War Field Spying Robot with Night Vision Wireless Camera
 
IoT Based Home Automation System over Cloud
IoT Based Home Automation System over CloudIoT Based Home Automation System over Cloud
IoT Based Home Automation System over Cloud
 
Seminar on Home Automation Using Raspberry Pi
Seminar on Home Automation Using Raspberry PiSeminar on Home Automation Using Raspberry Pi
Seminar on Home Automation Using Raspberry Pi
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
 

Similar to Internship report - Copy1

Similar to Internship report - Copy1 (20)

Project
ProjectProject
Project
 
Cctv report
Cctv reportCctv report
Cctv report
 
cctv hand book 2013 xxx.pdf
cctv hand book 2013 xxx.pdfcctv hand book 2013 xxx.pdf
cctv hand book 2013 xxx.pdf
 
PTA Profile Presentation_final200.pptx
PTA Profile Presentation_final200.pptxPTA Profile Presentation_final200.pptx
PTA Profile Presentation_final200.pptx
 
CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals  CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals
 
Survey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance SystemSurvey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance System
 
IRJET- Storage Optimization of Video Surveillance from CCTV Camera
IRJET- Storage Optimization of Video Surveillance from CCTV CameraIRJET- Storage Optimization of Video Surveillance from CCTV Camera
IRJET- Storage Optimization of Video Surveillance from CCTV Camera
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 
GoSecure
GoSecureGoSecure
GoSecure
 
Portfolio CCTV BWIC
Portfolio CCTV BWICPortfolio CCTV BWIC
Portfolio CCTV BWIC
 
Assignment sheet cctv
Assignment sheet cctvAssignment sheet cctv
Assignment sheet cctv
 
car accident.pptx
car accident.pptxcar accident.pptx
car accident.pptx
 
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
 
Cctv system in schools
Cctv system in schoolsCctv system in schools
Cctv system in schools
 
Detailed study of_cctv_cameras
Detailed study of_cctv_camerasDetailed study of_cctv_cameras
Detailed study of_cctv_cameras
 
CCTV
CCTVCCTV
CCTV
 
REAL-TIME VIDEO SURVEILLANCE USING RASPBERRY PI
REAL-TIME VIDEO SURVEILLANCE USING RASPBERRY PIREAL-TIME VIDEO SURVEILLANCE USING RASPBERRY PI
REAL-TIME VIDEO SURVEILLANCE USING RASPBERRY PI
 
CCTV dealers coimbatore - Rajsri infotek
CCTV dealers coimbatore - Rajsri infotekCCTV dealers coimbatore - Rajsri infotek
CCTV dealers coimbatore - Rajsri infotek
 

Internship report - Copy1

  • 1. 1 Internship report On CCTV SURVEILLANCE Submitted in partial fulfilment Of the requirement for the award of the degree of Bachelor of Technology In Electronics and Communication Engineering By Riya Dashoriya (11EC001336) Submitted to Department of Electronics and Communication Engineering Sir Padampat Singhania University Udaipur -313601 Rajasthan - India Under the supervision of Mr. Ripal Shah Sr. Manager – Projects (n)Code Solutions – A division of GNFC Ltd. 301, GNFC Infotower, Bodakdev, Ahmedabad – 380054 Phone: +91 79 4000 7374 Mobile: +91 98250 11949 E – Mail: Ripal@ncode.in Website: www.ncode.in
  • 2. 2 CERTIFICATE This is to certify that the Internship Project entitled ‘CCTV SURVEILLANCE’ being submitted by RIYA DASHORIYA, in fulfilment of the requirement for the award of degree of Bachelor of Technology in Electronics and Communication Engineering, has been carried out under my supervision and guidance. The matter embodied in this thesis has not been submitted, in part or in full, to any other university or institute for the award of any degree, diploma or certificate. Mr. Ripal Shah Mr. Uday Prakash Singh Sr. Manager - Projects Head of Department (n)Code Solutions Dept. of Electronics and Comm. Eng. A division of GNFC Ltd. Sir Padampat Singhania University 301, GNFC Infotower, Bodakdev Udaipur – 313601 Ahmedabad – 380054, India Rajasthan - India Prof. Achintya Choudhury Dean - School of Engineering Sir Padampat Singhania University Udaipur – 313601 Rajasthan India
  • 3. 3 ACKNOWLEDGEMENT It is always a pleasure to remind the experts in the engineering workshop for their sincere guidance which I received to uphold my practical as well as theoretical skills in engineering. I am thankful to Mr. J. S. Kochar and Mr. J.P. Patel for giving me an opportunity to enhance my skills as an engineer by allowing us to join this esteemed organization as a trainee. I would also like to thank Ms. Sarshar Khan who helped us in getting our internship from (n)Code Solutions– A division of GNFC Ltd. and Mr. N.R. Bhatt who helped us in getting CCTV department. It gives me an immense pleasure in expressing my deep sense of gratitude to Mr. Ripal Shah and Mr. Parth Joshi under whom I successfully completed my internship program in their department. I am also grateful to Mr. Kapil, Mr. Pritesh, Mr. Kalpesh, Mr. Mahesh, Ms. Sweta etc. who helped us all the time during my training program by sharing their knowledge and experience in this company. They helped us in all possible ways to solve our doubts regarding application and implementation of knowledge. It has been a great experience to work under their supervision as they always kept my morale high. I would also like to thank my friends with whom I worked as interns and staff of CCTV Department, (n)Code Solutions– A division of GNFC Ltd., who helped me directly or indirectly throughout our training. Finally I apologise all other unnamed who helped me in various ways to have a safe and good training.
  • 4. 4 SUMMARY/ABSTRACT As the world becomes less safe, businesses, institutions with valuable assets need to take precautions to protect themselves and their property. In many instances, CCTV system is the best answer to crime detection and prevention. CCTV cameras are springing up all over the place. One of the reasons for the increased implementation of CCTV is its deterrent ability. It has been observed that over two-thirds of burglars would probably or definitely not burgle premises that had CCTV installed. By setting a network of CCTV cameras on your premises, many locations can be viewed from a single monitor, thus decreasing your need for expensive manned guarding or ‘STOP AND SEARCH’ checks. Even the simple physical presence of CCTV cameras serves to generate a feeling of safety with your customers, visitors and employees. In situations where cameras have been placed in prominent locations, unscrupulous insurance claims and assaults on members of staff dealing with the public have been vastly reduced.
  • 5. 5 CASE STUDY: SMALL SCALE CCTV SETUP BUILDING PREMISES (GNFC BUILDING) In case study regarding the CCTV setup at different enterprises. The first type taken up is Small Scale Enterprise and in that category GNFC Infotower is taken for study. The installation is done in the way to emphasize on security purposes so a PTZ camera is installed at the entrance for building premises and two more placed in open parking area. One Fixed Dome is also placed in Parking Area which is closed and it is located in a way to capture the entry and exit of the vehicles parked. Upon entering building found are two Fixed Dome cameras one placed in front of the lifts and other at starting of staircase. The building which has 10 floors, houses many companies at various floors. So the cameras mainly installed at each floor is over looking the entrance of staircase for each floor. On some floors there are Fixed Dome Cameras placed at center to look over the lobby. The cameras are installed in a way so that there is no privacy breach so the cabins and restroom areas are devoid of cameras. But there are some departments in various offices that need security so the cameras are placed over looking those areas. The storage is of 10 days and the setup is of analog type. So the architecture for storage is combination of DVR and Hard Drive. The camera located outside in general area amounts to total 19 in number. And the most important fact that is noticed is on entering the premises the notice is placed regarding the building being under surveillance so that the prospect does not raises question of privacy being breached.
  • 6. 6
  • 7. 7 CASE STUDY: MEDIUM SCALE CCTV SETUP CAMPUS WIDE CCTV SURVEILLANCE (TDI DAHEJ PLANT) In next category that is medium level enterprise the example taken is TDI Plant at Dahej which is located at distance of 40 km from Bharuch. TDI plant is a part of GNFC and the word TDI stands for Toluene Di-Isocynate. In this plant the main emphasis is given on the warehouse. Where total of 8 cameras are placed. The architecture comprises of four PTZ cameras at perimeter, one PTZ for warehouse and three 1 MP fixed camera. The four PTZ IP cameras placed at all four sides of warehouse are of CIF resolution. And the one PTZ camera is placed inside warehouse for surveillance the camera is of IP type. The two out of three 1 MP Fixed Camera are placed inside the warehouse to record the movements inside. The one remaining 1 MP fixed camera is placed at security gate to monitor the movement at main entry/exit point of warehouse. The cameras used are equipped with Infrared Illumination for night vision. The storage is placed at Porta Hut (Security Office) which stores the video feed for 7 days. The storage architecture comprises of 3 KVA UPS having two hours power backup in case of power failure.
  • 8. 8 CASE STUDY: LARGE SCALE CITY WIDE SURVEILLANCE PROJECT (AMC PROJECT) In Large Level Enterprise the case taken is of AMC project. The AMC (Ahmedabad Municipal Corporation) project is initiative taken to protect the several locations of Ahmedabad city. The project is being conducted by (n)Code Solutions. There are total of 595 cameras installed. The locations covered are 22 BRTS location, VS Hospital, NHL Medical College, Shardaben Hospital, Nagri Hospital, LG Hospital, & AMC Gardens, Kankaria Lake, 8 Bridges, 5 Railway Stations, 16 AMTS locations. The institutes housing the CCTV setup have their own Control Room where the personnel are employed. And for certain locations like gardens, BRTS location and AMTS location the storage is directly transferred to CP Office. The main type of camera used are of PTZ type and Fixed Camera type. Out of all this locations the one taken for study is Kankaria Lake & Kankaria Zoo. In Kankaria Lake, due to it being a large area the transmission is of wireless type. So each camera is housed with own wireless transmitter, the data then being transmitted to the base station and then to control room for viewing and recording. The cameras are mainly located at the gates to record the entry & exit of people. The next location i.e. Kankaria Zoo houses several Fixed Network Cameras at gates and at locations to monitor certain animals like panther, tiger to monitor so that the necessary steps are taken in case they break out. The pathway in the zoo also has PTZ cameras to monitor people so that they do not try to indulge in act that could result in harm to animals or avoid any catastrophe events.
  • 9. 9
  • 10. 10
  • 11. 11 CONTENTS Sr. No. TITLE Page No. 1. Overview Of The GNFC – Company Profile 13 2. Introduction to CCTV Surveillance 15 2.a Network Video 17 2.b Network Camera 18 2.c Video Server 18 2.d Video Management Software 19 3. Evolution of Video Surveillance System(Technology) 19 3.a Analog CCTV systems using VCR 20 3.b Analog CCTV systems using DVR 21 3.c Analog CCTV systems using network DVR 21 3.d Network Video Systems using Video Servers 21 3.e Network video systems using network cameras 22 4 Applications of CCTV Surveillance System 22 5 IP Camera vs Analog Camera 25 6 Types of IP Camera 25 6.a Fixed Network Cameras 26 6.b Fixed Dome Network Cameras 27 6.c PTZ Network Cameras 27 6.d Network Dome Cameras 28 6.e Non-Mechanical PTZ Network Cameras 28 System Specification Terms 7 Image Sensor 28 7.a CCD Sensor 29 7.b CMOS Sensor 29 7.c “EXMOR” CMOS Sensor 30 8 Progressive scan vs Interlaced Video 30 8.a Interlaced Scanning 30 8.b Progressive Scanning 31 8.c Example: Capturing Moving Objects 31 9 Compression 31 9.a Still image compression standards 32 9.b Video compression standards 32 10. Image Resolution 35 10.a NTSC and PAL Resolutions 35 10.b VGA Resolution 36 10.c MPEG Resolution 36 10.d Megapixel Resolution 37
  • 12. 12 10.e Horizontal Resolution – TVL 37 11 Illumination 37 11.a IR Illuminator – Day and Night Functionality of Camera 38 11.b White Balance Mode 38 12 Effective Pixels 39 13 Minimum Object Distance 40 14 Lens Type 40 15 Zoom Ratio 40 16 Viewing Angle 41 17 Noise reduction 41 18 S/N Ratio 41 19 Wide-D (View-DR) 42 20 System Considerations 42 20.a Bandwidth and Storage 42 20.b Redundancy 43 20.c System Scalability 44 20.d Frame Rate and its Control 44 21 Maximum Frame Rate 44 22 Shutter Speed 45 23 Gain Control 45 24 Exposure Control 45 25 Focal Length 46 26 F-Number 46 27 Number of Clients 47 28 System Requirements 47 28.a Operating System 47 28.b Processor 48 28.c Memory 48 28.d Web Browser 48 29 General Information about Camera 48 29.a Weight 49 29.b Dimensions 49 29.c Power Requirements 49 29.d Power Consumption 49 29.e Working Temperature 49 29.f Storage Temperature 50 30 IP Network Technologies 50 30.a Ethernet 50 30.b PoE (Power over Ethernet) 51 30.c Wireless Networks 51 30.d Wired Network vs Wireless Networks 52
  • 13. 13 31 Data Transport Methods: Network Protocols 53 31.a IP Address 54 31.b IPv6 54 31.c Data Transport Protocols 54 31.d Transmission methods: Unicasting, Multicasting, Broadcasting 55 32.a Network Security – Video Flow and Inherent Security Risks & Addressing Security Concerns and Risks: Secure Transmission 55 32.b Security in Wireless 59 33 Storage Considerations 59 33.a Direct Attached Storage 60 33.b NAS and SAN 60 33.c RAID 61 34 Video Management Hardware Platforms 61 34.a PC Server Platform 61 34.b NVR Platform 62 34.c DVR vs NVR 62 35 Video Monitoring 63 35.a Using Web Interface 63 35.b Using Video Management Software 63 36 Recording Video 64 36. Milestone XP – VMS Specification 65 37 Conclusion 66
  • 14. 14 COMPANY PROFILE Gujarat Narmada Valley Fertilisers & Chemicals Limited (GNFC) is an Indian manufacturer of fertilizers and Chemicals. GNFC was founded in 1976 and it is listed on Mumbai Stock Exchange. The company was jointly promoted by the Government of Gujarat and the Gujarat State Fertilizer Company Limited (GSFC). It was set up in Bharuch, Gujarat. Located at Bharuch in an extremely prosperous industrial belt, GNFC draws on the resources of the natural wealth of the land as well as the industrially rich reserves of the area. GNFC started its manufacturing and marketing operations by setting up in 1982, one of the world's largest single-stream ammonia-urea fertilizer complexes. Over the next few years, GNFC successfully commissioned different projects - in fields as diverse as chemicals, fertilizers and electronics. Since inception, GNFC has worked towards an extensive growth as a corporation. A growth which respects the environment and springs from the progressive vision of GNFC. GNFC today has extended its profile much beyond fertilizers through a process of horizontal integration. Chemicals/Petrochemicals, Energy Sector, Electronics/Telecommunications and Information Technology form ambitious and challenging additions to its corporate portfolio. GNFC has an enterprising, strategic view towards expansion and diversification.
  • 15. 15 GNFC FLOW CHART: Figure 1. Flow chart of GNFC Ltd. (n)Code Solutions - An IT Division of GNFC (n)Code Solutions offers Digital Certificates that can integrate with applications such as emails, workflow, enterprise wide applications, or secure VPNs. The Digital Certificates can be used by individuals, corporates and governments to secure online B2B/B2C applications and other online transactions. It has promoted a portal called www.nprocure.com offering end-to-end electronic procurement services provider. (n)Code also designs and builds world class data centre infrastructures. (n)Code also offers a wide range of Security Services which include Managed IT Services & Secure Infrastructure design & building Services. GNFC Flow Chart Chemicals Industries IT Division - (n)code PKI & Digital Certificates e- Procurement e- Governance Data Center CCTV & Surveillance Cloud Computing
  • 16. 16 (n)Code is a significant player in providing high-tech Security & Surveillance solutions based on CCTV and Video Analytics including setting up of command and control Centres. (n)Code Solutions has the capabilities to design, engineer, develop, operate and maintain the IP based Video surveillance system having end to end security solution with complete integration of all the security sub systems such as CCTV, Access control & preventions system, Turnstiles, Boom barriers and Public Address system to secure the mission critical installation. (n)Code develops the security concept aligned to customer's risk requirements and adhering to industry best- practices: • Design, develop and consultancy services for CCN based Surveillance system • City Surveillance and securing the mission critical infrastructure like Industries, Costal area, Temples, Hospitals etc. Introduction to CCTV Surveillance Closed – Circuit Television (CCTV) is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point to point, point to multipoint, or mesh wireless links. Though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that may need monitoring such as banks, casinos, airports, military installations, and convenience stores. Video telephonyis seldom called "CCTV" but the use of video in distance education, where it is an important tool, is often so called.
  • 17. 17 In industrial plants, CCTV equipment may be used to observe parts of a process from a central control room, for example when the environment is not suitable for humans. CCTV systems may operate continuously or only as required to monitor a particular event. A more advanced form of CCTV, utilizing digital video recorders (DVRs), provides recording for possibly many years, with a variety of quality and performance options and extra features (such as motion detection and email alerts). More recently, decentralized IP cameras, some equipped with megapixel sensors, support recording directly to network- attached storage devices, or internal flash for completely stand-alone operation. Surveillance of the public using CCTV is particularly common in
  • 18. 18 many areas around the world. In recent years, the use of body worn video cameras has been introduced as a new form of surveillance. The video surveillance industry today has a wide range of systems and devices for monitoring and safeguarding people and property. The core components of network video system are network camera, video server and video management software. When selecting an appropriate system, it is useful to compare the various available technologies in the light of the intended application area and requirements in terms of cost – effectiveness, scalability, ease of use and flexibility. Network Video Network Video, also referred to as IP – Surveillance for specific applications within security surveillance and remote monitoring, is a system which gives users the ability to monitor and record video over an IP network (LAN/WAN/Internet). Network video system uses the network, rather than dedicated point-to-point cabling, as the backbone for transporting information. The term network refers to both the video and audio sources available throughout the system. In a network video application, digitized video streams are transferred to any location in the world via a wired or wireless IP Network, enabling video monitoring and recording from anywhere on the network. Network video can be used in an almost unlimited number of applications; however most of its uses fall into one of the following two categories:  Security Surveillance Network video’s advanced functionality makes it highly suited to the applications involved in security surveillance. The flexibility of digital technology enhances security personnel’s ability to protect people, property and assets. Such systems are therefore an especially attractive option for companies currently using CCTV.  Remote Monitoring Network video gives users the ability to gather information at all key points of an operation and view it in real – time. This makes the technology ideal for
  • 19. 19 monitoring equipment, people and places both locally and remotely. Application examples include traffic and production line monitoring, and the monitoring of multiple retail locations. liability, ease of use and flexibility. Network Camera A network camera can be described as a camera and computer combined in one unit. It captured and transmits live images directly over an IP network, enabling authorized users to locally or remotely view, store, and manage video over standard IP – based network infrastructure. Product overview: A network camera has its own IP address. It is connected to the network and has a built – in web server, FTP server, FTP client, alarm management, programmability, and much more. A network camera does not need to be connected to a PC, it operates independently and can be placed wherever there is an IP network connection. A web camera, on the other hand is something totally different – it is a camera that requires a connection to a PC via a USB or IEEE1394 port and a PC to operate. In addition to video, a network camera also includes other functionalities and information being transported over the same network connection, i.e. digital inputs and outputs, audio, serial port(s) for serial data or control of pan/tilt/zoom mechanisms. Video Server A video server makes it possible to move toward a network video system without having to discard existing analog equipment. It brings new functionality to analog equipment and eliminates the need for dedicated equipment such as coaxial cabling, monitors and DVRs – the latter becoming unnecessary as video recording can be done using standard PC servers. Product overview: A video server typically has between one and four analog ports for analog cameras to plug into, as well as an Ethernet port for connection to the network. Like network cameras, it contains a built – in web server, a
  • 20. 20 compression chip and an operating system so that incoming analog feeds can be converted into digital video, transmitted and recorded over the computer network for easier accessibility and viewing, Besides the video input, a video server also includes other functionalities and information which are transported over the same network connection: digital inputs and outputs, audio, serial port(s) for serial data or control of pan/tilt/zoom mechanisms. A video server can also be connected to a wide variety of specialized cameras, such as a highly sensitive black and white camera, a miniature or a microscope camera. Video Management Software Video management software running on a Windows or Unix/Linux server, supplies the basis for video management, monitoring, analysis, and recording. A wide range of software is available, based on the user’s requirements. A standard web browser provides adequate viewing for many network video applications, utilizing the web interface built into the network camera or video server especially if only one or a few cameras are viewed at the same time. To view several cameras at the same time, dedicated video management software is required. A wide range of video management software is available. In its simplest form, it offers live viewing, storing and retrieving of video sequences. Advances software contains features like:  Simultaneous viewing and recording of live video from multiple cameras.  Several recording modes: continuous, scheduled, on alarm and on motion detection.  Capacity to handle high frame rates and large amounts of data.  Multiple search functions for recorded events.  Remote access via a web browser, client software and even PDA client.  Control of PTZ and dome cameras.  Alarm management functions.  Full duplex, real-time audio support.  Video intelligence.
  • 21. 21 Evolution of Video Surveillance System (Technology) The first CCTV system was installed by Siemens AG at Test Stand VII in Peenemünde, Germany in 1942, for observing the launch of V-2 rockets. The noted German engineer Walter Bruch was responsible for the technological design and installation of the system. In the U.S. the first commercial closed-circuit television system became available in 1949, called Vericon. Very little is known about Vericon except it was advertised as not requiring a government permit. The earliest systems required constant monitoring because there was no way to record and store the information. Recording systems were introduced later, when primitive reel-to-reel media was used to preserve the data. These systems required magnetic tapes to be changed manually. It was a time consuming, expensive and unreliable process; the operator had to manually thread the tape from the tape reel through the recorder onto an empty take-up reel. Due to these short-comings, video surveillance was rare. Only when VCR technology became available in the 1970s, making it easier to record and erase information, did video surveillance start to become more common. During the 1990s, digital multiplexing was developed, which allowed several cameras to record at once, as well as time lapse and motion-only recording. This increased the use of CCTV and increased the savings of time and money. Recently CCTV has been transformed by the shift towards internet-based products and systems, and other technological developments. Analog CCTV systems using VCR An analog CCTV system using a VCR (Video Cassette Recorder) represents a fully analog system consisting of analog cameras with coax output, connected to the VCR for recording. The VCR uses the same type of cassettes as a home VCR. The video is not compressed, and if recording at full frame rate, one tape lasts a maximum of 8 hours. In larger systems, a quad or multiplexer can be
  • 22. 22 connected in between the camera and the VCR. The quad/multiplexer makes it possible to record several cameras to one VCR, but at the cost of a lower frame rate. To monitor the video, an analog monitor is used. Analog CCTV systems using DVR An analog CCTV system using a DVR (Digital Video Recorder) is an analog system with digital recording. In a DVR, the videotape is replaced with hard drives for the video recording, which requires the video to be digitized and compressed in order to store as many days’ worth of video as possible. With early DVRs, hard disk space was limited – so recording duration was limited, or a lower frame rate had to be used. Recent developments of hard disks means space is no longer a major problem. Most DVRs have several video inputs, typically 4, 9, or 16, which means they also include the functionality of quad and multiplexers. The DVR system adds the following advantages:  No need to change tapes.  Consistent image quality. Analog CCTV systems using network DVR An analog CCTV system using a network DVR is a partly digital system which includes a network DVR equipped with an Ethernet port for network connectivity. Since the video is digitized and compressed in the DVR, it can be transported over a computer network to be monitored on a PC in a remote location. Some systems can monitor both live and recorded video, while some can monitor only recorded. Furthermore, some systems require a special Windows client to monitor the video, while others use a standard web browser making remote monitoring more flexible. The network DVR system adds following advantages:
  • 23. 23  Remote monitoring of video via a PC.  Remote operation of the system. Network video systems using video servers A network video system using video servers includes a video server, a network switch and a PC with video management software. The analog camera connects to the video server, which digitizes and compresses the video. The video server then connects to a network and transport video via a network switch to a PC, where it is stored on hard disks. This is a true network video system. A network video system using video servers adds the following advantages:  Use of standard network and PC server hardware for video recording & management.  The system is scalable in steps of one camera at a time.  Off-site recording is possible.  It is future-proof since the system can easily be expanded by incorporating network cameras. Network Video Systems using Network Cameras A network camera combines a camera and computer in one unit, which includes the digitization and compression of the video, as well as a network connector. The video is transported over an IP-based network, via network switches and recorded to a standard PC with video management software. This represents a true network video system, and is also a fully digital system, where no analog components are used. A network video system using network cameras adds the following advantages:  High resolution cameras (megapixel).  Consistent image quality.  Power over Ethernet and wireless functionality.  Pan/tilt/zoom, audio, digital input and output over IP along with video.
  • 24. 24  Full flexibility and scalability. Applications of CCTV Surveillance System Crime Prevention: Surveillance in area that need monitoring such as bank, casino, airport, military installation, parking lots, public transportation, tracking terrorist suspects. Used for deterring crime and in mobile police surveillance vans, often with automatic number plate reorganization and a number of APNI- linked cameras. Gill and Spriggs did a Cost-effectiveness analysis (CEA) of CCTV in crime prevention that showed little monetary saving with the installation of CCTV as most of the crimes prevented resulted in little monetary loss. Domestic kits are of low quality and cheap whereas the maintenance and installation of high definition CCTV is expensive. To uncover criminal conspiracies Oaxaca hired deaf police officers to lip read conversations in 2013. Hacking and Video art: Hackers and Guerrilla artists have exposed the vulnerabilities of the video systems in an act dubbed “video sniffing”. They have crossed feeds, uploaded their own video feeds and used the video footage for artistic purposes. Industrial Processes: Industrial processes that take place under conditions dangerous for humans are today often supervised by CCTV. These are mainly processes in the chemical industry, the interior of reactors or facilities for manufacture of nuclear fuel. Line-scan cameras and thermographic cameras are also used which allow operators to measure the temperature of the processes. The usage of CCTV in such processes is sometimes required by law. Traffic Monitoring: CCTV in transport systems are also used to detect congestion and notice accidents. Congestion charge is enforced by cameras positioned inside and at the boundary of congestion charge zone, which automatically read the license place of cars. If the driver does not pay the
  • 25. 25 charge then a fine will be imposed. Similar systems are being developed as a means of locating cars reported stolen. Other surveillance cameras serve as traffic enforcement cameras. Transport Safety: Remote monitoring of railway stations and tracks, parking lots and garages, highways and airports. A CCTV system may be installed where an operator of a machine cannot directly observe people who may be injured by some unexpected machine operation. For example, on a subway train, CCTV cameras may allow the operator to confirm that people are clear of doors before closing them and starting the train. Control of Retail: Some software integrates with CCTV to monitor the actions of workers in retail environments. Every action is recorded as an information block with subtitles that explain the performed operation. This helps to track the actions of workers, especially when they are making critical financial transactions, such as correcting or cancelling of a sale, withdrawing money or altering personal information. Actions which an employer may wish to monitor could include:  Scanning of goods, selection of goods, introduction of price and quantity.  Input and output of operators in the system when entering passwords.  Deleting operations and modifying existing documents.  Implementation of certain operations, such as financial statements or operations with cash.  Moving goods, revaluation scrapping and counting.  Control in the kitchen of fast food restaurants.  Change of settings, reports and other official functions. Each of these operations is transmitted with a description, allowing detailed monitoring of all actions of the operator. Some systems allow the user to search for a specific event by time of occurrence and text description, and perform statistical evaluation of operator behaviour. This allows the software to predict deviations from the standard workflow and record only anomalous behaviour.
  • 26. 26 Criminal use: Criminals may use surveillance cameras to monitor the public. For example, a hidden camera at an ATM can capture people's PINs as they are entered, without their knowledge. The devices are small enough not to be noticed, and are placed where they can monitor the keypad of the machine as people enter their PINs. Images may be transmitted wirelessly to the criminal. Use in schools: Closed-circuit television is used for school security to monitor visitors, track unacceptable student behaviour and maintain a record of evidence in the event of a crime. There are some restrictions on installation, cameras may not be used in an area where there is a "reasonable expectation of privacy". Examples of these are bathrooms, gym locker areas and private offices (unless consent by the office owner is given). Cameras are generally acceptable in hallways, parking lots, front offices where students, employees, and parents come and go, gymnasiums, cafeterias, supply rooms and classrooms. The use of cameras in classrooms is often debated by teachers who want cameras for protection and teachers who do not IP Camera vs Analog Camera In terms of video quality, IP Camera is excel in capturing high definition, megapixel images but have trouble with low lighting conditions where is Analog cameras perform well across a variety of lighting conditions and manage motion well. In terms of cabling infrastructure, IP camera is capable of transmitting power, video and data. Analog cameras uses coaxial cable or baluns to transmit analog video, power and data. IP cameras are network appliances and as they are devices requiring management are less reliable but analog cameras are very mature and have a long track record for reliability.
  • 27. 27 In terms of security, IP video streams can be encrypted and are difficult to intercept. On the other hand, analog signals are less secure and can be intercepted and/or viewed by anyone with access to the cabling infrastructure. An IP camera is a network appliance and requires continuous skilled management but Analog cameras are unmanaged devices. One of the clear advantage of IP camera is the flexibility to integrate with a wireless network. Analog cameras which use radio frequencies to transmit video wirelessly are limited to about a dozen cameras before it reaches capacity in the unlicensed spectrum. In terms of Installation, IP cameras require some basic networking skills for small installations and significantly more technical skill for an enterprise size installation. Analog cameras require little to no network and configuration knowledge; just power, point, and focus, regardless of scope and size of overall system. In terms of cost, IP cameras are 3x more expensive than their analog equipment’s. Large installations require managed network switching equipment and peripherals, which can become very costly. Types of IP Camera Network cameras are available in many different models to suit a wide variety of needs. With such a wide variety of network cameras available today, most requirements across all vertical markets and system sizes can be accommodated. As with analog cameras, network cameras come in different models. All the cameras include:  Vandal resistant versions, depending upon protective housing used.  Weather resistant versions, depending upon protective housing used.  Day and night versions. Camera can automatically or manually switch between day mode with colour video and night mode with black and white low light image that can be enhanced using IR Illuminators. Installer must be aware of number of common practices related to camera positioning, which will help in obtaining best quality out of the system.
  • 28. 28 Fixed Network Cameras Fixed cameras with a body and a lens represent the traditional camera type. In some applications it is advantageous to make the camera very visible. If this is the case then a fixed camera represents the best choice, since the camera is clearly visible, as is the direction in which it is pointing. Another advantage is that most fixed cameras have exchangeable lens of C/CS type. For further protection, it can be installed in housing designed for indoor or outdoor installation. Fixed Dome Network Cameras Also known as mini domes, essentially consists of a fixed camera pre-installed in a small dome housing. The camera can be easily directed to point in any direction. Its main benefit is its discrete, non - obtrusive design, as well as in the fact that it is hard to see in which direction camera is pointing. One of the limitations is that they rarely have exchangeable lens because of space inside the dome housing.
  • 29. 29 PTZ Network Cameras Pan Tilt Zoom (PTZ) cameras have the obvious benefit of being able to pan, tilt and zoom either manually or automatically. For a manual operation, a PTZ camera can be used to follow a person in retail store. They are mainly used in indoors and where it is desirable that the direction in which the camera is pointing can be seen. Some of them don't have full 360 degree pan and are not made for continuous operation, so called 'guard tours'. Optical zoom ranges from 18x to 26x. Network Dome Cameras Network dome cameras share same benefits as the fixed dome cameras: they are fairly discreet and the direction to which they are pointing can't be determined when looking at the camera. It has the ability to pan 360 degree as compare to PTZ. It also provides mechanical robustness for continuous operation in guard tours where the camera continuously moves between say
  • 30. 30 10 presets, day in and day out. With guard tours, one camera can cover an area where 10 cameras are required to do the same job. The main drawback is that only 1 location is monitored at any given time, leaving the other 9 positions un-monitored. The optical zoom ranges between 18x and 30x. But for outdoor installation, zoom factors above 20x normally prove impractical because of vibration and motion caused by wind. Non-Mechanical PTZ Cameras They are a new breed of PTZ cameras. Using a megapixel sensor, it can cover from 140 to 360 degrees and the operator can select to pan, tilt, and zoom the camera in any direction without involving any mechanical movement. The key advantage is that no wear and tear on moving parts. It also offers immediate movement to a new position, which in a traditional PTZ camera can take up to 1 sec. The best non-mechanical PTZ cameras are using 3 megapixel sensor. For good image quality, pan and tilt should be limited to 140 degrees and zoom to 3x. For higher coverage or zoom, image quality will adversely be affected. System Specification Terms Image Sensor Image quality is one of the most important features of any camera.Network camera are equipped with processing power not only to capture and preset images, but also to manage and compress them digitally for network transport. Factors on which image quality is dependent of:  Choice of optics  Choice of image sensor  Available processing power  Level of sophistication of the algorithms in the processing chip. The image sensor of the camera is responsible for transforming light into electrical signals. When building a camera, there are two possible technologies for the camera’s image sensor:  CCD Sensor
  • 31. 31  CMOS Sensor  “EXMOR” CMOS Sensor CCD Sensor CCD Sensors are produced using a technology developed specifically for the camera industry and have been used in cameras for more than twenty years. One of the advantage of CCD sensor is higher light sensitivity which results into better images in low light condition. They are however more expensive as they are made in a non-standard process and more complex to incorporate into a camera. It causes a phenomenon called smear where the CCD may bleed when there is a very bright object in the scene. It causes vertical strips below and above the object. CMOS Sensor CMOS (Complementary Metal Oxide Semiconductor) sensors are based on standard technology already extensively used in memory chips, inside PCs. They are unsuitable for cameras where the highest possible image quality is required. They are less expensive as they contain all the logic required to build a camera. They can be used to produce small-sized cameras. Large size sensors are available, providing megapixel resolution to a variety of network cameras. A limitation of CMOS is their lower light sensitivity. In normal bright condition, this is fine. But in low light conditions, there is either a very dark or a very noisy image. “EXMOR” CMOS Sensor
  • 32. 32 Exmor is the technology implemented on some of their CMOS image sensors. It performs on-chip analogue/digital signal conversion and two-step noise reduction in parallel on each column of the CMOS sensor. Exmor R is a back-illuminated version of CMOS image sensor. Exmor R usage is limited to smaller sensors for camcorders, compact cameras and mobile phones. It was the world's first mass-produced implementation of the back- illuminated sensor technology. Exmor R is approximately twice as sensitive as a normal front illuminated sensor. The Exmor R sensor allows the camera of the smartphone to capture high definition movies and stills in low lit areas. Progressive scan vs Interlaced Video Two different techniques are available for rendering the video:  Interlaced Scanning  Progressive Scanning Selection of technique depends upon the application and purpose of the video system, and particularly whether the system is required to capture moving objects and to allow viewing of detail within a moving object. Interlaced Scanning Interlaced scan-based images use techniques developed for Cathode Ray Tube (CRT)-based TV monitor displays, made up of 576(PAL)/480(NTSC) visible vertical lines across a standard TV screen. Interlacing divides this into odd and even lines and refreshes them at 25/30 frames per second. The slight delay in refreshing causes distortion or 'Jaggedness'. This is because only half the lines keeps up with the moving image while the other half waits to be refreshed. De-interlacing: To reduce the effect of Interlacing, De-interlacing can be used. It is the process of converting interlaced video into a non-interlaced form, by eliminating some jaggedness from the video for better viewing. This process is also called doubling. Some network video products, such as Axis video server integrate de-interlace filter which improves image quality in the highest
  • 33. 33 resolution (4CIF). This eliminates the motion blur problems caused by analog video signal from the analog camera. Interlaced scanning is used in analog cameras, television and VHS video world. Progressive Scanning Progressive Scanning scans the entire image line by line every 25/30 of a second. In this captured images are not split into separate fields. Computer monitors do not need to interlace to show the picture on the screen. It puts the images on one line at a time in perfect order 1,2,3,4,5,6,7, etc. So there is virtually no 'flickering' effect. As such, in a video surveillance application it can be critical in viewing detail within a moving image such as a person running away. However, a high quality monitor is required to get the best out of this type of scan. Progressive scan is used in axis network cameras such as AXIS 210. Example: Capturing Moving Objects When a camera captures a moving object, the sharpness of a still image will depend on the technology used. On comparing JPEG images, captured by three different cameras using progressive scan, 4CIF Interlaced scan and 2CIF, we can observe that:  All image systems produce a clear image of the background.  Jagged edges from motion with interlaced scan.  Motion blur caused by the lack of resolution in the 2CIF Sample  Only progressive scan makes it possible to identify the driver. Compression Image and video compression can be done either in a lossless or lossy approach. In lossless compression, each and every pixel is kept unchanged such that after decompression, we get an identical image. The compression ratio is limited in lossless compression and data reduction is also very limited. So it is an impractical way to store and transfer data. One among the example
  • 34. 34 of lossless compression is GIF. In lossy compression, compression ratio is increased. The fundamental idea is to reduce things that appear invisible to the human eye. Compression methods also involve two different approaches to compression standards:  Still Image Compression  Video Compression Still image compression standards All still image compression standards are focussed only on one single image at a time. The most well-known and widespread standard is JPEG. JPEG (JOINT PHOTOGRAPHIC EXPERTS GROUP) was originally standardized in mid 1980s. With JPEG, decompression and viewing can be done from standard web browsers. JPEG compression can be done at different user defined compression levels, which determine how much an image is to be compressed. The compression level selected is directly related to the image quality requested. Besides the compression level, the image itself also has an impact on the resulting compression ratio. Example, a white wall may produce a small image file and a higher compression ratio, while the same compression level applied on a very complex and patterned scene will produce a larger file size, with a lower compression ratio. As compression increases, image is more degraded. JPEG 2000 is another still image compression standard. At low compression ratio it is same as JPEG but at higher compression ratio, it performs slightly better than JPEG. Support for JPEG 2000 in web browser and image displaying and processing application is very limited. JPEG 2000 was specifically designed for medical applications and still image photographing. Video compression standards Video as a sequence of JPEG Images-Motion (M-JPEG) Motion JPEG is the most commonly used standard in network video system. A network camera captures individual images and compresses into JPEG
  • 35. 35 format. The network camera captures and compresses and makes it available as a continuous flow of image over network. At frame rate greater than or equal to 16 fps, the viewer perceives the motion video as M-JPEG. Each individual image is a complete JPEG compressed image; they all have same guaranteed quality, determined by compression level chosen for n/w camera or video server. H.263 The H.263 compression technique targets a fixed bit rate video transmission. The disadvantage of a fixed bit rate is that when an object moves, quality of image decreases. It was originally designed for video conferencing apps and not for video surveillance where details are more crucial than fixed bit rate. MPEG One of the best-known audio and video streaming techniques is the standard called MPEG (Motion Pictures Experts Group). The basic principle is to compare two compressed images to be transmitted over network. The first compressed image is used as a reference frame and only parts of following images that differ from reference images are sent. The network viewing station then reconstructs all images based on the reference image and the “difference data”. Even if its complexity is high it leads to lower data volumes being transmitted across network. DIFFERENT MPEG STANDARDS  MPEG-1 was released in year 1993 and was intended for storing digital videos onto CDs. Thus most MPEG-1 encoders & decoders are designed for target bit rate of about 1.5Mbit/s at CIF resolution. The main focus is on keeping bit-rate constant at expense of varying quality, typically comparable to VHS video quality. Frame rate is locked at 25(PAL)/30(NTSC) fps.  MPEG-2 was approved in 1994 and was designed for high quality digital video (DVD), digital high-definition TV (HDTV), interactive storage media(ISM), DBV and cable TV (CATV). It focuses on extending MPEG-1 compression technique
  • 36. 36 to cover larger pics and higher quality at expense of lower compression ratio and higher bit-rate. Frame rate is same MPEG-1.  MPEG-4 is a major development from MPEG-2. There are many more tools to lower the bit rate needed to achieve certain image quality for certain application or image scene. Frame rate is not locked at 25/30 fps. However, most of the tools used to lower bit-rate are only relevant for non-real-time applications because some of the new tools require so much processing power that total time for encoding and decoding makes them impractical for real-time applications. Most of the tools in MPEG-4 that can be used in real-time applications are the same tools that are available in MPEG-1 & MPEG-2. Key consideration is to select widely used video compression standard that ensures high image quality, such as M-JPEG or MPEG-4. MPEG-4 (Part 10) The two groups behind H.263 & MPEG-4 jointly formed next generation video compression standard. AVC for Advanced Video Coding also called H.264 or MPEG-4 Part 10. The intent is to achieve very high data compression. This standard is capable of providing good video quality at bit rates substantially lower than previous standards, and this is done without increasing complexity as to make designs impractical or expensive to implement. Advantages and Disadvantages of Motion JPEG, MPEG-2 and MPEG-4 M-JPEG is a good choice when you want limited delay between image capturing, encoding, and transfer over the network, decoding and finally display at viewing station. Or we can say that M-JPEG has low latency and thus suitable for image processing, such as in video motion detection or object tracking. Practical image resolution from mobile phone display size (QVGA) up to full video (4CIF) image size and above (megapixel) is available in Motion JPEG. The system guarantees image quality regardless of the movement or image complexity, offering the flexibility to select either high image quality (low compression) or low image quality (high compression) with the benefit of
  • 37. 37 smaller image file sizes, lower bit-rate and bandwidth usage. Frame rate can easily be adjusted to limit bandwidth usage without loss of image quality. Motion JPEG generates relatively large volume of image data to be sent across the network. MPEG has the advantage of sending lower volume of data per time unit across the network as compared to M-JPEG, except at lower frame rates. If the available network bandwidth is limited, or if the video is to be recorded at high frame rate and there are storage space restraints, MPEG is preferred as it provides high image quality at lower bit-rate. But the lower bandwidth demands come at cost of higher complexity in encoding and decoding, which in return increases latency in comparison to M-JPEG. MPEG-2 and MPEG-4 are subject to licensing fees. At lower frame rates bandwidth consumption is similar between M-JPEG and MPEG-4 but at higher frame rates MPEG-4 requires much less bandwidth that M-JPEG. Image Resolution Image resolution is the detail an image holds. The term applies to raster digital images, film images, and other types of images. Higher resolution means more image detail. Image resolution can be measured in various ways. Basically, resolution quantifies how close lines can be to each other and still be visibly resolved. Resolution units can be tied to physical sizes (e.g. lines per mm, lines per inch), to the overall size of a picture (lines per picture height, also known simply as lines, TV lines, or TVL), or to angular subtenant. Line pairs are often used instead of lines; a line pair comprises a dark line and an adjacent light line. A line is either a dark line or a light line. A resolution 10 lines per millimetre means 5 dark lines alternating with 5 light lines, or 5 line pairs per millimetre (5 LP/mm). Photographic lens and film resolution are most often quoted in line pairs per millimetre025569. Resolution in an analog or digital word is similar. Resolution in digital system is defined as image is made up of pixel and resolution in analog is specified as image consists of lines, or TV-Lines. (TV Industry).
  • 38. 38 NTSC and PAL Resolutions NTSC and PAL standards were originated from television industry. In North America and Japan, NTSC (National Television System Committee) is used as the analog video standard. While in Europe, PAL (Phase Alternation by Line) is more pronounced. Resolution of NTSC is 480 lines and refresh rate is 60 interlaced fields per second (30 full frames per second) whereas resolution of PAL is 576 lines and refresh rate is 50 interlaced fields per second (25 full frames per second). The amount of information transferred per second is same in both. When analog video is digitized, the maximum amount of pixels that can be created is based on the no. of TV line available to be digitized. In NTSC, maximum size of digitized image is 720*480px. In PAL, it is 720*576px (D1). Commonly used resolution is:  704*576 for PAL  704*480 for NTSC Sometimes QCIF i.e. Quarter of CIF image is used. 2CIF (Common Intermediate Format) Resolution is 704*240(NTSC) or 704*288(PAL) pixels, means dividing the number of horizontal lines by 2. In most cases, horizontal line is shown twice, so called "line doubling", when shown on a monitor in order to maintain correct ratios in the image. This is the way to cope with motion blur in interlace scan. VGA Resolution VGA (Video Graphics Array) is used for 100% digital systems. They are more flexible. VGA is a graphic display system for PCs and was originally developed by IBM. Resolution is defined at 460*480px. It is best suited for network cameras as video is shown on computer screens, with resolutions in VGA or multiples of VGA. Quarter VGA (QVGA) is similar to CIF with a resolution of 320*240px. It is also called as SIF (Standard Interchange Format) resolution.
  • 39. 39 Other VGA are XVGA (1024*768) and 1290*960px, 4 times VGA which provides megapixel resolution. MPEG Resolution MPEG Resolution can be:  704*576 pixels (PAL 4CIF)  704*480 pixels (NTSC 4CIF)  720*576 pixels (PAL or D1)  720*480 pixels (NTSC or D1) Megapixel Resolution Higher the resolution, more details can be seen in the image. As a result, a criminal can be identified easily. Maximum resolution of NTSC and PAL in analog camera after the video signal has been digitized in a DVR or a video server is 400,000px (704*576=405,504). 400,000 equals to 0.4 Megapixel. New camera network technology now makes higher resolution possible. Common megapixel format is 1280*1024 and has 1.3megapx resolution which is 3 times greater than analog cameras. Several megapixel cameras are available. Different megapixel cameras have different aspect ratios. In a standard CCTV, aspect ratio is 4:3 while in movies and wide screen, 16:9 ratio is used. In network camera, any aspect ratio can be used. Advantage of aspect ratio is that, in most of the images, the upper part and lower part of the picture are of no interest, yet they take up precious pixels and therefore bandwidth and storage space. NOTE: Pan/tilt/zoom don't affect the resolution. Operator selects which part of the megapixel image should be shown. It does not imply any mechanical movement from the camera and hence high reliability. Horizontal Resolution – TVL
  • 40. 40 Television Lines (TVL) is a specification of an analog camera’s or monitor’s horizontal resolution power. It is alternatively known as Lines of Horizontal Resolution or lines of resolution. TVL is defined as the maximum number of alternating light and dark vertical lines that can be resolved per picture height. A resolution of 400 TVL means that 200 distinct dark and vertical lines can be counted over a horizontal span equal to the height of the picture. Illumination The illumination is a key element in creating an artistic piece, and the interplay of light and shadow is a valuable method. The placement of light sources can make a considerable difference in the type of message that is being presented. Minimum illumination is a way to measure the sensitivity of a camera. In other words, it means how dark the camera can still see usable image. IR Illuminator – Day and Night Functionality of Camera IR (Infrared) cameras are used when there are low - light video surveillance situations i.e., where light conditions are less than optimal as well as discreet and covert surveillance situations. They make use of the visible light and can be applied in a residential area at night without disturbing residents. They are more useful when cameras can't be used in certain environment or situations. Light Perception: Light is a form of radiation wave energy that exists in a spectrum. Visible spectrum is 400 to 700nm. In terms of increasing wavelength, X-Ray -> UV-->VIOLET-RED-->Infrared-->Microwave Infrared energy is emitted by all the objects (humans, animals, grass, etc.). Warmer object like people and animals stand out typically from cooler backgrounds. In night, people can't see colour and hue, they can only see black, white and shades of grey. Working of IR camera for day and night or IR-Cut Filter: Image sensor can sense infrared light up to 1000 nm. When infrared rays hit the lens in daytime, distortion of colour takes place. Hence all the cameras have IR-cut filter to remove IR light and to render colour images that humans are
  • 41. 41 used to. IR-cut filter is an optical piece of a glass that is placed between the lens and the image sensor. As illumination is reduced and the image darkens, the IR-cut filter can be removed automatically to enable the camera to make use of IR-light so that it can see even in dark environment. The ability to automatically place or remove the IR-cut filter depends on the make of camera. To avoid colour distortions, camera often switches to black and white mode and is able to generate high quality, black and white images. White Balance Mode White Balance is adjusted to get the colours in images as accurate as possible because images different sources of light have a different temperature to them. Fluorescent lightning adds a bluish cast to photos whereas tungsten lights add a yellowish tine to photos. We don’t notice this difference in temperature because our eyes adjust automatically for it. So unless the temperature of the light is very extreme a white sheet of paper will generally look white to us. Some of the basic White Balance settings are:  Auto: This is where the camera makes a best guess on a shot by shot basis.  Tungsten: This adds a yellowish tine to photos and generally cools down the colours in photos. It is used for shooting indoors, especially under tungsten (incandescent) lighting.  Fluorescent: This compensates for the ‘cool’ light of fluorescent light and will warm up the shots.  Daylight/Sunny: It sets things as fairly ‘normal’ white balance settings.  Cloudy: This setting warms things up a touch more than ‘daylight’ mode.  Flash: This can be quite a cool light so in FLASH WB mode, it warms up the shots a touch.  Shade: The light in shade is generally cooler than shooting in direct sunlight so this mode will warm things up a little. Effective Pixels
  • 42. 42 Digital camera image sensors consist of a number of pixels, which collect photons (energy pockets of light). The photodiode then converts the photons into an electrical charge. Each pixel has only one photodiode. A conventional sensor in, for example, a 12MP (megapixel) camera has an almost equal number of effective pixels (11.9MP). Therefore, effective pixels refers to the area of the sensor that said pixels can cover. The 0.1% of pixels left are used to determine the edges of an image and to provide colour information. On occasions, not all sensor pixels can be used (for instance, if a lens cannot cover the whole sensor range). Some cameras can interpolate the number of sensor pixels. For instance, a 6MP camera can produce 12MP images. Here, the camera interpolates 12 megapixels of information based on the 6 megapixels of effective pixels on the sensor. (The term interpolation refers to the process of making new pixels, based on the captured pixels.) Interpolation cannot ever create data that you didn’t capture in the first place, and the difference in quality is marginal. Minimum Object Distance Minimum Object Distance (MOD) refers to the shortest working distance between the foremost lens and the motive which can still be focussed using the focus ring on the lens. Rays of light from the object incident in parallel all coincide in the focal point of the optics on the sensor side. If the test object comes closer to the optics, re-focus is required, since the shorter distance makes the generated image move further and further away from the lens. When focussing the close range, the lens group is therefore moved away from the sensor. MOD is measured from the vertex of the front glass of the lens. It strongly depends on the lens design and the mechanics of the optics and is clearly manufacturer specific. Lens Type
  • 43. 43 There are two lens type:  Fixed or board CCTV Camera Lens has a set viewing angle. This means the camera lens cannot be zoomed in or adjusted in any way. Fixed lens cameras are generally less expensive so can be a good option if the layout of an area is not likely to change (such as a room in a house).  Vari-focal or Manual Zoom CCTV Camera Lens can be adjusted so it focuses on exactly the area you wish to record. This advantage also means that the viewing angle of the surveillance camera can be tweaked to capture the ideal image plus it has the flexibility to be adjusted at a later date if the area layout or the requirement changes. Zoom Ratio Zoom Ratio is the ratio of the focal length at the telephoto end to that at the wide end. A zoom lens can change the size of an object appearing on the monitor to the extent specified by the zoom ratio. Optical zoom lens allows to monitor a scene from any distance. It is used to define the focal length range for a zoom lens. If the maximum range through which a particular lens can be zoomed is 10mm to 100mm, it’s said to have a 10:1 zoom ratio. Viewing Angle The angle of view is the shooting range that can be viewed by the lens given a specific image size. It is usually expressed in degrees. Normally the angle of view is measured assuming a lens is focussed at infinity. The angle of view can be calculated if the focal length and image sizes are known. If the distance of the object is finite, the angle is not used. Instead, the dimension of the range that can actually be shot, or the field of view, is used. Different CCTV lens sizes can change the viewing angle of a security camera. Typically angle of view can be expressed in Horizontal, Vertical or Diagonal. Angle of view at a given distance depends upon the focal-length of the lens and CCD sensor size. Smaller focal lengths give a wider angle of view.
  • 44. 44 Noise reduction XDNR (eXcellent Dynamic Noise Reduction) technology is used for noise reduction in IP security cameras. XDNR technology utilizes 2-dimensional and 3-dimensional noise reduction methods adaptively to scenes. Under low-light conditions, XDNR technology provides clear images while minimizing motion blur, which is a challenge in many outdoor surveillance monitoring applications. XDNR technology offers the optimum in low light imaging performance. S/N Ratio The arch enemy of picture clarity on a monitor is noise which is an electronic noise that is present to some extent in all video signals. There are several sources of noise; poor circuit design, hear, over-amplification, etc. The important factor that determines the tolerance of noise is the amount of noise in the video signal, the signal to noise ratio. Every time a video signal is processed, noise is introduced. A common source of noise is when Automatic Gain Control (AGC) is introduced at a camera in very low light conditions. That is why manufacturers state the minimum sensitivity of a camera with the AGC on but the S/N ratio with AGC off. The more is the S/N ratio, the better is the picture quality. Wide-D (View-DR) View-DR is a technology which produces image with an extremely wide dynamic range. It is a combination of full-capture Wide-D technologies, the high-speed ‘Exmor’ CMOS sensor, and Visibility Enhancer (VE) technology. The full-capture Wide-D technology used in View-DR uses an electronic shutter to capture multiple images and reproduce each frame. With this, all of the electrons are converted from the captured light are fully used by the imager. As
  • 45. 45 a result, View-DR nearly doubles the sensitivity that is offered by conventional Wide-D technologies. System Considerations Network bandwidth and storage requirements are important considerations when designing a video surveillance system. The factors include the number of cameras, the image resolution used, the compression type and ratio, frame rates and scene complexity. This chapter provides some guidelines on designing a system, along with information on storage solutions and various system configurations. Bandwidth and Storage Network video products utilize network bandwidth and storage space based on their configuration. This depends on the following:  Number of cameras  Whether recording will be continuous or event-based  Number of hours per day the camera will be recording  Frames per second  Image resolution  Video compression type: Motion JPEG, MPEG-4, H.264  Scenery: Image complexity (e.g. gray wall or a forest), lighting conditions and amount of motion (office environment or crowded train stations)  How long data must be stored
  • 46. 46 Redundancy Redundancy in a storage system allows video, or any other data, to be saved simultaneously in more than one location. This provides a backup for recovering video if a portion of the storage system becomes unreadable. There are a number of options for providing this added storage layer in an IP-Surveillance system, including a Redundant Array of Independent Disks (RAID), data replication, server clustering and multiple video recipients. System Scalability
  • 47. 47 One of the advantage of IP is its ability to simply add on cameras by plugging into any network connection. Analog cameras can too be virtually expanded as there is no requirement for bandwidth or data transmission between the cameras and the recorders. It is also possible to scale up the system by adding more storage servers when needed and do maintenance without bringing down the entire system. Frame Rate and its Control Frame rate, also known as frame frequency and frames per second (FPS), is the frequency (rate) at which an imaging device produces unique consecutive images called frames. The term applies equally well to film and video cameras, computer graphics, and motion capture systems. Frame rate is most often expressed in frames per second (FPS) and is also expressed in progressive scan monitors as hertz (Hz). We can set different recording frame rates for selected cameras; for example, one under normal operation and another when alarm is triggered. Different frame rates can also be set for viewing and/or recording purposes and for different recipients. Maximum Frame Rate Full frame rate on all cameras at all times is more than what is required for most applications. With the configuration capabilities and built-in intelligence of network cameras, frame rates under normal conditions can be set lower, e.g. one to four frames per second, to dramatically decrease storage requirements. In the event of an alarm—for instance, if video motion detection or an external sensor is triggered—a video management software program can be configured to request that the network video product send a different stream with a higher recording frame rate.
  • 48. 48 Shutter Speed In photography, shutter speed or exposure time is the length of time a camera's shutter is open when taking a photograph. The amount of light that reaches the film or image sensor is proportional to the exposure time. The minimum illumination of security cameras is measured at normal shutter speed (1/60 sec.). Many security cameras can capture images at various shutter speeds ranging from 2 seconds to 1/10,000 second. When capturing images at normal shutter speeds (ex. 1/60 sec.), moving objects can be captured clearly without picture blur. On the contrary, when capturing images at slow shutter speeds (ex. 1 sec.), the camera’s CCD accumulates more light so that the image captured is brighter; however, for moving objects, the accumulation period can be too long, resulting in picture blur. By using a slow shutter speed, it is possible to skew the minimum illumination value in a specification so that the lux rating is much lower than that taken at a normal shutter speed. However, because the resulting image is blurred, it is not useful in most surveillance monitoring applications. Gain Control When the light falling on camera reduces to a certain level, there is insufficient to create a full level video signal. AGC (Automatic Gain Control) acts to increase the amount of amplification in these conditions to bring the signal up to the required level. As well as amplifying the video signal, additional noise can be introduced, and the signal to noise ratio reduced. The result is frequently a very much degraded signal and poor picture on the monitor. Exposure Control Exposure is the amount of light per unit area (the image plane illuminance times the exposure time) reaching a photographic film, as
  • 49. 49 determined by shutter speed, lens aperture and scene luminance. Exposure is measured in lux seconds, and can be computed from exposure value (EV) and scene luminance in a specified region. An appropriate exposure for a photograph is determined by the sensitivity of the medium used. For photographic film, sensitivity is referred to as film speed. Exposure is a combination of the length of time and the illuminance at the photosensitive material. The exposure in a normal photographic camera can be controlled by a combination of shutter speed and iris opening. This is not so with a CCTV camera lens. A standard CCTV camera produces a complete picture every 1/2 of the mains frequency. This is every 1/25 second where the mains frequency is 50 Hz (cycles per second) and every 1/30 second where the mains frequency is 60 Hz. Generally the exposure time is fixed and the only control of the amount of light passing to the imaging device is by adjusting the size of the iris. This is covered in more detail later in this chapter. Most camera tubes and imaging devices have some tolerance of the amount of light passed by the lens to create an acceptable picture. The range of tolerance is generally inversely proportional to the sensitivity of the camera. The more sensitive cameras require greater control of the iris aperture. Focal Length Parallel incident light transmitted to a lens converges to a point on the optical axis. This point is the focal point of the lens. The distance between the principle point in the optical system and the focal point is referred to as the focal length. For a single thin lens, the focal length is equal to the distance between the centre of the lens and the focal point. It is measured in mm. A short focal length has a wide angle of view. A long focal length has a narrow angle of view. The smaller the CCD Chip, narrower is the angle of view. F-Number
  • 50. 50 F-number describes how bright a lens is. In other words, it represents the maximum amount of light that a lens can direct to the camera’s image sensor. This amount of light is determined by the widest iris opening that the lens allows or its maximum aperture and the focal length of the lens. F-number is described as a function of the focal length (f) of a lens and the maximum diameter (D) of the iris opening as follows: F-number = f (focal length)/D (maximum iris opening) A lens with a smaller F-number provides brighter images. Number of Clients Number of clients in a network is defined as the number of cameras that may be added in a network and can be used with the client software running on a system. It is a specification term of network specification of a CCTV Camera. The system should allow to be used as a distributed or central architecture with support to any number of clients or any number of cameras that may be added in future. The addition of number of clients depends upon the number of license provided. System Requirements System Requirement is the specification of the hardware and software platform on which the client software is running. It can include the detail about system computer, system software, system size, communications, video inputs, video outputs, keyboards, user defined keys, etc. Operating System An Operating System is a software that manages computer hardware resources and provides common services for computer programs. The CCTV Server PC Operating System can be Windows XP, Windows Vista, Windows 7 or Windows 8. The Operating System program shall be stored in the CPU, and shall not
  • 51. 51 require the presence of a PC for operation. The monitoring software used for CCTV Cameras shall be Operating System based, functioning under operating systems. It shall have a high degree of flexibility allowing for further expansion and customisation needs. Processor A processor is the logic circuitry that responds to and processes the basic instructions that drive a computer. There are several types of processor available in market. Some of them are Intel Core2 Duo 2 GHz, Intel core i5, Intel core i3, Pentium IV, 2 GHz, etc. This specifies the configuration for Server PC. Memory Memory refers to the physical devices used to store programs (sequences of instructions) or data on a temporary or permanent basis for use in a computer or other digital electronic device. It is the space used to store the data or the space required to run the Server Software. It can be 128MB RAM, 1GB, etc. Real time program updates, and overall host communications shall utilize flash memory. EEPROM memory is required for system program storage and flash memory for building-specific program storage. Web Browser A web browser is a software application for retrieving, presenting and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier and may be a web page, image, video or other piece of content. The web browsers in CCTV surveillance are required to view the videos with the help of hyperlinks. Examples of web servers are Microsoft Internet Explorer Version 6.0, 7.0, 8.0, Mozilla Firefox, etc.
  • 52. 52 General Information about Camera This includes the various specification about a camera including camera’s weight, dimensions, power requirements, power consumption, starting temperature, working temperature, storage temperature, Ingress protection and safety regulation. Weight It is the normal mass of a camera. The minimum mass of camera available is 3g. The maximum mass of camera available is 5.9Kg. Usually the weight of the camera is dependent upon the location where the camera is to be installed and the specific purpose for which camera is used. Dimensions There are several dimensions of camera available. The dimension of camera depends on the specific purpose for which camera is used and location of installation. Power Requirements The power required for CCTV Camera to operate is given by Power Supply. A CCTV power supply box allows surveillance system installers to easily manage the power to multiple CCTV cameras at a central point. This allows the camera installation to be neater. For example, instead of having 8 power supply plugs, plug into power strip protector, all of the camera power wires can neatly be run to a power supply box. A power supply box is installed near the DVR. Each power cable screws into the power supply box. The power supply box plugs into a standard power outlet. Power Consumption
  • 53. 53 When it comes to electricity bill, the amount of electricity used is measured. So, the amount of electricity use must be minimum. To reduce the cost of system, usually CCTV’s with low power consumption are preferred. Working Temperature Working temperature is the range in which a camera operates. If a camera is to operate outside where temperatures fluctuate beyond these ranges, the CCTV must be installed with a protective enclosure containing a heater and a blower. Otherwise, the equipment will malfunction or breakdown. A starting temperature is also required by CCTV to work. Storage Temperature Storage Temperature refers to the range in which it is safe to store the camera with no power connections, such as replacement units or units waiting to be installed. If a camera is to be stored for an extended period at temperature outside of this range, it may not be operational when the camera is eventually powered up. IP Network Technologies IP is the primary protocol in the internet layer of the internet protocol suite and has the task of delivering packets from the source host to the destination host solely based on the IP address in the packet headers. For this purpose, IP defines packet structures that encapsulate the data to be delivered. It also defines addressing methods that are used to label the datagram with source and destination information. Its routing function enables internetworking, and essentially establishes the Internet. Ethernet
  • 54. 54 Ethernet is a family of computer networking technologies for Local Area Network. It has largely replaced competing wired LAN technologies such as token ring, FDDI and ARCNET. The Ethernet Standards comprise several wiring and signalling variants of the OSI physical layer in use with Ethernet. The original 10BASE5 Ethernet used coaxial cable as a shared medium. Later the coaxial cables were replaced with twisted pair and fiber optic links in conjunction with hubs or switches. A twisted pair consists of eight wires, forming four pairs of twisted copper wires and is used with RJ-45 plugs and sockets. The maximum length of twisted pair is 100 m while for fiber, it ranges from 10km to 70km. Data rates were periodically increased from the original 10mebabits per second to 100 gigabits per second. PoE (Power over Ethernet) Power over Ethernet (PoE) provides the option of supplying devices connected to an Ethernet network with power using the same cable as for data communication. It is widely used to power IP phones, wireless access points and network cameras in a LAN. The main benefit of PoE is the inherent cost savings. Moreover, PoE can make a video system more secure. A video surveillance system with PoE can be powered from the server room, which is often backed up with a UPS. This means that the video surveillance system can be operational even during a power outage. Wireless Networks For video surveillance applications, wireless technology offers a flexible, cost- efficient and quick way to deploy cameras, particularly over a large area as in a parking lot or a city center surveillance application. There would be no need to pull a cable through the ground. In older, protected buildings, wireless technology may be the only alternative if standard Ethernet cables may not be installed.
  • 55. 55
  • 56. 56 There are cameras with built-in wireless support. Network cameras without built-in wireless technology can still be integrated into a wireless network if a wireless bridge is used. Wired Network vs Wireless Networks The biggest difference between these two types of networks is one uses network cables and one uses radio frequencies. A wired network allows for a faster and more secure connection and can only be used for distances shorter than 2,000 feet. A wireless network is a lot less secure and transmission
  • 57. 57 speeds can suffer from outside interference. Although wireless networking is a lot more mobile than wired networking the range of the network is usually 150- 300 indoors and up to 1000 feet outdoors depending on the terrain. The cost for wired networking has become rather inexpensive. Ethernet cables, hubs and switches are very inexpensive. Some connection sharing software packages, like ICS, are free; some cost a nominal fee. Broadband routers cost more, but these are optional components of a wired network, and their higher cost is offset by the benefit of easier installation and built-in security features. Wireless gear costs somewhat more than the equivalent wired Ethernet products. At full retail prices, wireless adapters and access points may cost three or four times as much as Ethernet cable adapters and hubs/switches, respectively. Wired LANs offer superior performance. A traditional Ethernet connection offers only 10 Mbps bandwidth, but 100 Mbps Fast Ethernet technology costs a little more and is readily available. Fast Ethernet should be sufficient for file sharing, gaming, and high-speed Internet access for many years into the future. (Wi-Fi.org) Wired LANs utilizing hubs can suffer performance slowdown if computers heavily utilize the network simultaneously. Wireless networks using 802.11b support a maximum bandwidth of 11 Mbps. 802.11a and 802.11g LANs support 54 Mbps, that is approximately one- half the bandwidth of Fast Ethernet. Furthermore, wireless networking performance is distance sensitive, meaning that maximum performance will degrade on computers farther away from the access point or other communication endpoint. In theory, wireless LANs are less secure than wired LANs, because wireless communication signals travel through the air and can easily be intercepted. The weaknesses of wireless security are more theoretical than practical. Data Transport Methods: Network Protocols
  • 58. 58 To transfer the data from camera to the destination, several network protocols are used. Some of the network protocols are SSH, FTP, HTTP, etc. IP Address An IP address (Internet Protocol address) is a unique number that devices use in order to identify and communicate with each other on a network utilizing the Internet Protocol standard. An IP address consists of four numbers separated by a dot, each number is in the range 0-255. For example, the address could be “192.36.253.80”. The IP address is further split up into a network part and a host part. The boundary between the two parts is decided by a netmask or a prefix length. A netmask of 255.255.255.0 means that the first 3 bytes will be the network address and the last byte the host address. A prefix length is a different way of providing the boundary, for example the same address as the previous example has a prefix length of 24 bits (i.e, 192.36.253.80/24). Certain blocks of addresses have been reserved for private use: 10.0.0.0/8 (netmask 255.0.0.0) 172.16.0.0/12 (netmask 255.240.0.0) 192.168.0.0/16 (netmask 255.255.0.0) These addresses are intended for private internet and are used for CCTV cameras. IPv6 IPv6, or Internet Protocol version 6, is designed as an evolutionary upgrade to the Internet Protocol and will, in fact, coexist with the older IPv4 for some time. IPv6 is designed to allow the Internet to grow steadily, both in terms of the number of hosts connected and the total amount of data traffic transmitted. The most obvious improvement in IPv6 over the IPv4 is that IP addresses are lengthened from 32 bits to 128 bits. This extension anticipates considerable
  • 59. 59 future growth of the Internet, providing for an unlimited (for all intents and purposes) number of networks and systems. Data Transport Protocols A data transfer protocol is a standardized format for transmitting data between two devise. The type of protocol used can determine such variables as the error checking method, the data compression method, and end-of-file acknowledgements. The most common protocol for transmitting data on computer networks today is the TCP/IP Protocol suite. TCP/IP acts as a ‘carrier’ for many other protocols; a good example is HTTP which is used to browse Web Pages on servers around the world using the Internet. Transmission methods: Unicasting, Multicasting, Broadcasting There are different methods for transmitting data on a computer network:  Unicast - the sender and the recipient communicate on a point-to-point basis. Data packets are sent addressed solely to one recipient and no other computers on the network will need to process this information.  Multicast - communication between a single sender and multiple receivers on a network. Multicast technologies are used to reduce network traffic when many receivers want to view the same source simultaneously by delivering a single stream of information to hundreds of recipients. The biggest difference compared with unicasting is that the video stream only needs to be sent once.  Broadcast - a one-to-everybody transmission. On a LAN, broadcasts are normally restricted to a specific network segment and are not in practical use for network video transmissions. Network Security – Video Flow and Inherent Security Risks &
  • 60. 60 Addressing Security Concerns and Risks: Secure Transmission In any video surveillance system, analog or digital, there is an inherent security risk in the different parts, components or data transportation media used. These elements of system may be tampered with or the security of them can be compromised. Each function and component has its own inherent risks, examples of which is described: 1. Video is captured by a Camera  Camera maybe disconnected, stolen or simply vandalized. Once the system detects this it triggers a “communication error” event which can be used to trigger alarms or rules notifying the right people of the issue.  Camera maybe tampered with by turning it or by covering the lens. Many cameras support tampering events of different kinds, such as tampering, video loss, and temperature. These events can be used to trigger alarms or rules notifying the right people of the issue. 2. Video streamed to the Recording Server  The network may be disconnected or flooded with unwanted data due to a DDOS attack. Once the system detects this it triggers a “communication error” event which can be used to trigger alarms or rules notifying the right people of the issue. In addition to creating alarms or notifying via emails, Edge Storage can also be done on select devices. Edge Storage offers the function to record video in the camera itself and let the Recording Server retrieve these recordings after a network failure, effectively ensuring video recording even for periods with no connection to the camera.  The network may be compromised giving unauthorized persons access to tapping into the transmitted video. Two methods can be used to protect the transmitted video: VPN tunneling and HTTPS. A virtual private network (VPN) tunnel can be set up between the camera and Recording Server using standard equipment or software. The VPN will encrypt all data transmitted through the
  • 61. 61 tunnel and thus protect against unauthorized access to the video. In addition to a VPN, HTTP Secure (HTTPS) can also be used. HTTPS uses Secure Socket Layer (SSL) and offers encrypted communication directly with the camera without a VPN tunnel. 3. Video stored in the Recording Server database  The Recording Server may be turned off or fail. Recording Server failover can be used, which is a function where one or more dedicated Failover Recording Servers monitor the state of the primary Recording Servers. If the primary Recording Servers stop responding, due to failure or being turned off, for example for maintenance, the Failover Recording Servers take over the task of recording the video. In addition to the failover support, Edge Storage can also help because, as described in the previous section, it can record video in the camera, allowing the Recording Server to retrieve the video once it is up and running again.  Windows security could be compromised giving local or remote access to the video database files. To prevent unauthorized access to the video database files several layers of security can be implemented:  Physical security Access to the room with the physical Recording Server should be limited to a few authorized people only  Windows server security Local console and remote desktop access to the server running the Recording Server should be limited to a few authorized people Windows should be set to automatically logout after a short time of inactivity Windows should be kept updated with the newest service releases  Recording Server database The database can be configured to encrypt the recordings in two modes: “Light” and “Strong” The database can be set to sign the recordings digitally to prevent tampering. 4. Live or recorded video is sent over a network to a client.
  • 62. 62  The network may be disconnected or flooded with unwanted data due to a DDOS attack. In case the network connection to the client is disconnected or rendered inoperable by flooding it with unwanted data, the operator will immediately see this and can alert the administrator of the issue.While the clients may not be able to view live or recorded video, the Recording Server can continue to record video unaffected if the network has been designed so there are two separate networks; one for clients and one for cameras.  The network may be compromised giving unauthorized persons access to tapping into the transmitted video. As with the network connection from the cameras to the Recording Server, the transmitted video from the Recording Server to the client can be protected by using VPN tunnelling or HTTPS. 5. The client decodes the video and displays it on the monitor and offers a function to export video recordings for evidence.  Unauthorized persons may try to hack or otherwise obtain login credentials to gain unauthorized access to viewing and exporting video To prevent someone from hacking into the system, secure Windows Active Directory® (AD) authentication can be used to provide protection against hacking.  Authenticated surveillance users may try to tamper with exported material. Security settings with time profiles can be set to tell when and which cameras can be viewed live, played back and exported by the user. Furthermore, we can control all export settings. 6. Exported evidence media is transported from the surveillance site to police or a court  The exported video maybe viewed and copied by unauthorized persons. The database encryption supports up to 256-bit advanced encryption standard (AES) and access is protected by a password. We can prevent the video from being re-exported during a single export. This ensures that the video cannot be exported in another format or be exported to the same format again but without encryption and digital signing.  The exported video maybe tampered with removing critical sequences of the recorded video or be modified to give another impression of the recorded
  • 63. 63 evidence. When video that should be exported is protected with a digital signature on the Recording Server, the signature of the recorded video will be checked during the export to ensure that the video has not been tampered with on the Recording Server. If the recorded video passes the signature check, including the original digital signature, the video is exported to a new database on the client PC. 7. The exported evidence is viewed by police or a judge in a court  The exported video may have been tampered with removing critical sequences of the recorded video or be modified to give another impression of the recorded evidence. Recordings have been protected by an encryption and in addition to this, they have a digital signature that can be verified for authenticity if the recordings have been tampered with or if the integrity is intact. Security in Wireless Due to the nature of wireless communications, anyone with a wireless device that is present within the area covered by a wireless network can share the network and intercept data being transferred over it unless the network is secured. To prevent unauthorized access to the data transferred and to the network, some security technologies such as WEP and WPA/WPA2 have been developed to prevent unauthorized access and encrypt data sent over the network. WEP (Wired Equivalent Privacy): WEP prevents people without the correct key from accessing the network. WPA/WPA2 (WiFi Protected Access): WPA significantly increases security by taking care of the shortcomings in the WEP standard. WPA adds a standard way for distributing encrypted keys. Recommendations Some security guidelines when using wireless cameras for surveillance:
  • 64. 64  Enable the user/password login in the cameras.  Enable the encryption (HTTPS) in the wireless router/cameras. This should be done before the keys or credentials are set for the WLAN to prevent unauthorized access to the network with stolen credentials.  Ensure that wireless cameras support security protocols such as IEEE 802.1X and WPA/WPA2. Storage Considerations There are several ways by which data can be stored. The type of storage depends on the amount of data to be stored and many other factors. Commonly used storage device are:  Direct Attached Storage  NAS and SAN  Raid Direct Attached Storage Depending on a PC server’s central processing unit (CPU), network card and internal RAM (Random Access Memory), a server can handle a certain number of cameras, frames per second and size of images. Most PCs can hold between two and four hard disks, and each disk can be up to approx. 300 gigabyte (GB). In a small to medium-sized installation, the PC that runs the video management software is also used for video recording. This is called a direct-attached storage. For example, one hard disk is suitable for storing recordings from six to eight cameras. With more than 12 to 15 cameras, at least two hard disks should be used to split the load. For 50 or more cameras, the use of a second server is recommended. NAS and SAN
  • 65. 65 When the amount of stored data and management requirements exceed the limitations of a direct-attached storage, a network-attached storage (NAS) or storage area network (SAN) allows for increased storage space, flexibility and recoverability. Network Attached Storage: NAS provides a single storage device that is directly attached to a LAN and offers shared storage to all clients on the network. A NAS device is simple to install and easy to administer, providing a low-cost storage solution. However, it provides limited throughput for incoming data because it has only one network connection, which can become problematic in high-performance systems. Storage Attached Network: SANs are high-speed, special-purpose networks for storage, typically connected to one or more servers via fiber. Users can access any of the storage devices on the SAN through the servers, and the storage is scalable to hundreds of terabytes. Centralized storage reduces administration and provides a high performance, flexible storage system for use in multi-server environments. Fiber Channel technology is commonly used to provide data transfers at four gigabits per second and to allow large amounts of data to be stored with a high level of redundancy. RAID RAID is a method of arranging standard, off-the-shelf hard drives such that the operating system sees them as one large hard disk. A RAID setup spans data over multiple hard disk drives with enough redundancy so that data can be recovered if one disk fails. There are different levels of RAID, ranging from practically no redundancy to a full-mirrored solution in which there is no disruption and no loss of data in the event of a hard disk failure. Video Management Hardware Platforms
  • 66. 66 There are two different types of hardware platforms for a network video management system:  PC server platform involving one or more PCs that run a video management software program.  Network video recorder (NVR), which is a proprietary hardware with preinstalled video management software. PC Server Platform A video management solution based on a PC server platform involves PC servers and storage equipment that can be selected off the shelf to obtain the maximum performance for the specific design of the system. A PC server platform is also fully scalable, enabling any number of network video products to be added to the system as needed. The system hardware can be expanded or upgraded to meet increased performance requirements. An open platform also enables easier integration with other systems such as access control, building management, and industrial control. This allows users to manage video and other building controls through a single program and user interface. NVR Platform A network video recorder comes as a hardware box with preinstalled video management functionalities. An NVR hardware is often proprietary and specifically designed for video management. It is dedicated to its specific tasks of recording, analysing and playing back network video, and often does not allow for any other applications to reside on them. The operating system can be Windows, UNIX/Linux or proprietary. An NVR is designed to offer optimal performance for up to a set number of cameras, and is normally less scalable. This makes the unit suitable for smaller systems where the number of cameras stays within the limits of an NVR’s designed capacity. An NVR is normally easier to install.
  • 67. 67 DVR vs NVR With a Network Video Recorder, the video input comes from the network—the video has already been encoded at the cameras. Encoding is simply converting digital video files from one format to another. The video is then streamed to the NVR for storage and it can be viewed remotely due to it being on a network. But with a DVR, it does the encoding at the DVR itself, not at the individual cameras. Since it digitally compresses the analog feed, it must be located near the feed. An NVR can be located anywhere on the network. Hence there is protection against network failure for one thing. With “mirroring”, NVR’s can be located throughout the network to provide duplication. Another difference between a DVR and an NVR is access. To view the video that was recorded, you need to be at the DVR (or burn a disk if you want to view it elsewhere). But with an NVR, due to its very nature of being on a network, you can view it remotely. Moreover, paring security cameras with NVR’s is actually more restrictive than doing so with DVR’s. Video Monitoring A key function of a video management system is enabling live and recorded video to be viewed in efficient and user-friendly ways. Most video management software applications enable multiple users to view in different modes such as split view (to view different cameras at the same time), full screen or camera sequence (where views from different cameras are displayed automatically, one after the other). Apart from that, using web browser also, you can see camera by entering the camera’s IP address in the address bar. Using Web Interface
  • 68. 68 Keeping an eye on property from anywhere with our remote video surveillance tools. A simple broadband connection is required to use Web Interface. It securely retrieves and transmits live video from any of the cameras and allows us to remotely check that at home or business place. All we need is to know the ip address of camera and check the connectivity using ping. If a response is received, camera is connected and hence, you can see the video on web browser by typing the ip address in the address bar. Using Video Management Software Many video management software offer a multi-camera playback feature, which enables users to view simultaneous recordings from different cameras. This provides users with an ability to obtain a comprehensive picture of an event, which is helpful in an investigation. Additional features may be multi-monitor viewing and mapping, which overlays camera icons that represent the locations of cameras on a map of a building or area. All video management software applications provide the ability to add and configure basic camera settings, frame rate, resolution and compression format, but some also include more advanced functionalities, such as camera discovery and complete device management. The larger a video surveillance