Top Banner
AKHIL GARG 2011 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY With the development and globalization of human social activities, Surveillance systems have become increasingly important and popular in the public places such as banks, airports, public squares, casinos and other places. Case study made in: VVDN Technologies Pvt. Ltd. 1241/36, Atul Kataria Chowk, Gurgaon +91 124 4147642, +91 124 4378539
69

video surveilance system

Feb 19, 2017

Download

Documents

Akhil Garg
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: video surveilance system

AK

HIL

GA

RG

20

11

VID

EO

SU

RV

EIL

LA

NC

E S

YS

TE

M:

A

CA

SE

ST

UD

Y

With the development and globalization of human social activities, Surveillance systems have become increasingly important and popular in the public places such as banks, airports, public squares, casinos and other places.

Case study made in: VVDN Technologies Pvt. Ltd. 1241/36, Atul Kataria Chowk, Gurgaon +91 124 4147642, +91 124 4378539

Page 2: video surveilance system

1 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

ACKNOWLEDGEMENT

First of all I would like to thanks Supreme Power “Almighty God” for his blessings showered on

us during the project work without him nothing is possible.

Really it gives me immense pleasure to express my feelings of gratitude & reverence to people

who helped me in accomplishment of this project “Video Surveillance System: A Case Study” so

successfully.

The efforts put by me during the development of this project would have not been fruitful, had it

not been the people around us, who encouraged and helped us at all times.

I feel proud to do this project in VVDN Technologies in the Hardware Lab. I am highly pleased

to express my deep sense of gratitude to my project guide Mr. Himanshu Garg & Mr. Hemant

Sharma for their valuable guidance, suggestions and constant supervision at every stage. I will

remain ever grateful to them for their encouragement during the project.

Finally I want to thank all staff members of Hardware Lab for their very important support and

cooperation.

Page 3: video surveilance system

2 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

CERTIFICATE

TO WHOM SOEVER IT MAY CONCERN

Dated: __________

This is to certify that Mr. AKHIL GARG, student of PANIPAT INSTITUTE OF

ENGINEERING & TECHNOLOGY, Panipat has successfully completed his six weeks

Industrial Training in VVDN Technologies, Gurgaon and submitted the project entitled “Video

Surveillance System: A Case Study”.

All his work is genuine and original and was timely completed. His conduct was found out to be

very satisfactory and his work has enabled us to add value to the organization and we wish him

success for his future.

Mr. Puneet Aggarwal Mr. Rajesh Kumar Dy. Manager (A.P. ECE)

(VVDN, Gurgaon)

Mr. Himanshu Garg

(Project Guide)

Page 4: video surveilance system

3 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

INDEX 1. Surveillance ......................................................................................................................................... 8

1.1. Video Surveillance System ........................................................................................................... 8

1.1.1. IP based Video Surveillance System .................................................................................... 9

1.2. Benefits of Video Surveillance ................................................................................................... 9

2. Emerging market trends in video surveillance ............................................................................... 13

2.1. General trends ........................................................................................................................... 13

2.2.1. Video based fire detection ................................................................................................ 15

2.2.2. Toll plaza video AVCC (Automatic vehicle counting & classification) ........................ 16

2.2.3. Abandoned Object Detection ........................................................................................... 17

2.2.4. Intrusion Detection ........................................................................................................... 18

2.2.5. Video Enhancement .......................................................................................................... 19

2.2.6. Perimeter breach detection .............................................................................................. 20

2.2.7. Indoor people counting ..................................................................................................... 21

2.2.8. Object removal detection .................................................................................................. 22

2.2.9. Stopped vehicle detection ................................................................................................. 23

2.2.10. Camera Tampering detection .......................................................................................... 24

2.2.11. Privacy Masking ................................................................................................................ 24

2.3. Emerging application areas...................................................................................................... 25

2.3.1. Retail .................................................................................................................................. 25

2.3.2. Transportation .................................................................................................................. 26

2.3.3. Education ........................................................................................................................... 26

2.3.4. Industries ........................................................................................................................... 27

2.3.5. City surveillance ................................................................................................................ 27

2.3.6. Government ....................................................................................................................... 27

2.3.7. Healthcare .......................................................................................................................... 28

2.3.8. Banking and finance ......................................................................................................... 28

3. Network cameras .............................................................................................................................. 30

3.1. Classification of network cameras on the basis of their appearance and application area 31

3.1.1. Fixed box network cameras ............................................................................................. 31

Page 5: video surveilance system

4 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

3.1.2. Fixed Dome Network Cameras ........................................................................................ 32

3.1.3. PTZ Cameras .................................................................................................................... 33

3.2. Classification of network camera on the basis of their Functionality .................................. 34

3.2.1. Day and night network cameras ...................................................................................... 34

3.2.2. HDTV, Megapixel or standard resolution camera ......................................................... 35

3.3. How the IP Cameras are made / assembled............................................................................ 37

3.3.1. Part list for assembling FALCON camera ...................................................................... 37

3.3.2. Assembly Line document .................................................................................................. 41

Assembly line deatils ................................................................................................................................... 41

Falcon Assembly .......................................................................................................................................... 41

PCB Assembly .............................................................................................................................................. 41

Encoder,Power & IO boards ....................................................................................................................... 41

4. Possible connectivity options ............................................................................................................ 53

4.1. Basic terms used in connectivity .............................................................................................. 53

4.2. Wired IP Surveillance System ................................................................................................. 55

4.2.1. Types of Ethernet networks: ............................................................................................ 55

5. A typical video surveillance system at one live site named as “Macawer Beekay” ..................... 62

5.1. Solution explanation ................................................................................................................. 63

5.2. Solution components ................................................................................................................. 63

5.2.1. Remote Surveillance Camera Units: ................................................................................... 63

5.2.2. Weather-proof Camera Housings ........................................................................................ 63

5.2.3. L2 Switch 24 port ................................................................................................................ 64

5.2.4. Wireless Communication devices ....................................................................................... 64

5.2.4.1. Camera CPE’s ................................................................................................................. 64

5.2.4.2. BTS ................................................................................................................................. 64

5.2.5. Video management system ............................................................................................... 65

6. CONCLUSION ................................................................................................................................. 67

7. REFERENCES .................................................................................................................................. 68

Page 6: video surveilance system

5 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

ABOUT THE COMPANY

VVDN stands for Video Voice Data Networking. VVDN provides design services & solutions in

Voice, Video, Data and Networking domains. VVDN has strong experience in designing end-to-

end solutions for Video Surveillance and Networking Domain

Embedded Systems

Hardware Design & Development

System Board Design, PCB layout, Verification & Validation (V&V), Low Power Designs, Hardware Integration.

System Software Engineering

RTOS, Design Methodologies, DSP, Protocol Development, Software Porting, Interface Integration, Algorithms.

Design Services

End to End development of IP/Network camera, Video Surveillance, Video Analytics.

Networking

Wireless Networking

Wifi, WiMax, routers, USB , bluetooth, Wireless LAN (IEEE 802.11), GSM, RF, Mobile processors Wired Networking

LAN/WAN, Ethernet, Operating Systems: Microsoft, Linux, Unix, VxWorks. Equipment’s

Servers, Blade Servers, Handheld Devices. Mobile Engineering.

Telecom Applications

Integrated Services & Solutions

Commutation Equipment, Devices. VOIP Solutions

IAD, IP Phones, IP PBX, Office-in-box, Residential Gateway, CPE’s. Operation Support Services

Enterprise Applications, Support Applications, J2EE Framework, Web Applications, Security.

We aim at providing high quality software engineering products and services to our clients. We

always adhere to minimal time frame for completing our client orders so that our customer

remains competitive and become more productive in market. VVDN believes in automation to

reduce project lifecycle and to increase the efficiency in terms of resources and expenses.

Besides this, we assure that we deliver for what we agreed for with our customer. In a nutshell,

we guarantee delivery of our products & services to customers while maintaining cost efficiency

and faster turnaround time for marketing, and thus is our motto “Certainty of Outcome”

We specialize in development of customized solutions which helps our customers in achieving

their objectives. We provide technical services which includes Software Development Lifecycle;

Video Surveillance, Wireless, Networking, and Telecom solutions to design, develop and

execute technology projects.

Our Product Development Methodology and Line of Attack Service Strategy is associated with

customer profitability thereby increasing internal customer value intimately. We also believe in

achieving customer confidence in our deep capabilities in software / hardware areas of embedded

systems, in networking as well as in electronic industry.

Page 7: video surveilance system

6 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Contents

Part I: What is Video Surveillance?

Part II: Market Trends in Video Surveillance

Part III: What are Network Cameras and How They are made?

Part IV: Possible Connectivity Medium

Part V: A Typical Surveillance System and its Components

Page 8: video surveilance system

7 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Part I

What is Video Surveillance?

Page 9: video surveilance system

8 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

1. Surveillance

Definition: Surveillance is the monitoring of the behavior, activities, or other changing

information, usually of people and often in a superstitious manner. Surveillance is

a French word meaning "watching over". It most usually refers to observation of individuals

or groups by government organizations, military, schools, hospitals and several other public

places.

The word surveillance may be applied to observation from a distance by means of electronic

equipment (like CCTV or IP cameras), or interception of electronically transmitted

information (Internet traffic or phone calls).Surveillance is very useful to governments and

law enforcement to maintain social control, recognize and monitor threats, and

prevent/investigate criminal activity.

1.1. Video Surveillance System

Video Surveillance System uses video cameras for the purpose of observing an area.

They are often connected to a recording device, IP network, and are watched by an

officer. Cameras and recording equipment used to be relatively expensive and required

human personnel to monitor camera footage. Now with cheaper production techniques, it

is simple and inexpensive enough to be used in home security systems, and for everyday

surveillance. Analysis of footage is made easier by automated software that organizes

digital video footage into a searchable database, and by automated video analysis

software (such as VIRAT and Human ID). The amount of footage is also drastically

reduced by motion sensors which only record when motion is detected.

Figure: Surveillance Cameras

Page 10: video surveilance system

9 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

1.1.1. IP based Video Surveillance System

IP-Surveillance System is a system that gives users the ability to monitor and record

video/audio over an IP (Internet Protocol-based) computer network such as a local

area network (LAN) or the Internet. In a simple IP-Surveillance system, this

involves the use of a network camera (or an analog camera with a video

encoder/video server), a network switch, a PC for viewing, managing and storing

video, and video management software.

Figure: IP based Video Surveillance System with alarm integration

1.2. Benefits of Video Surveillance

The digital, network video surveillance system provides a host of benefits and advanced

functionalities that cannot be provided by an analog video surveillance system. The

advantages include remote accessibility, high image quality, event management and

intelligent video capabilities, easy integration possibilities and better scalability,

flexibility and cost-effectiveness.

Remote accessibility: Network cameras and video encoders can be

configured and accessed remotely, enabling multiple, authorized users to view

live and recorded video at any time and from virtually any networked location in

the world. This is advantageous if users would like a third-party company, such

as a security firm, to also gain access to the video. In a traditional analog CCTV

system, users would need to be at a specific, on-site monitoring location to view

and manage video, and off-site video access would not be possible without such

equipment as a video encoder or a network digital video recorder (DVR). A DVR

is the digital replacement for the video cassette recorder.

Page 11: video surveilance system

10 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

High image quality: In a video surveillance application, high image quality

is essential to be able to clearly capture an incident in progress and identify

persons or objects involved. With progressive scan and megapixel technologies,

a network camera can deliver better image quality and higher resolution than an

analog CCTV camera.

Event management and intelligent video: There is often too much

video recorded and lack of time to properly analyze them. Advanced network

cameras and video encoders with built- in intelligence or analytics take care of

this problem by reducing the amount of uninteresting recordings and enabling

programmed responses. Such functionalities are not available in an analog

system.

Network cameras and video encoders have built-in features such as video motion

detection, audio detection alarm, active tampering alarm, I/O (input/output)

connections, and alarm and event management functionalities. These features

enable the network cameras and video encoders to constantly analyze inputs to

detect an event and to automatically respond to an event with actions such as

video recording and sending alarm notifications.

Easy, future-proof integration: Network video products based on open

standards can be easily integrated with computer and Ethernet-based information

systems, audio or security systems and other digital devices, in addition to video

management and application software. For instance, video from a network

camera can be integrated into a Point of Sales system or a building management

system.

Scalability and flexibility: A network video system can grow with a user’s

needs. IP-based systems provide a means for many network cameras and video

encoders, as well as other types of applications, to share the same wired or

wireless network for communicating data; so any number of network video

products can be added to the system without significant or costly changes to the

network infrastructure. This is not the case with an analog system. In an analog

video system, a dedicated coaxial cable must run directly from each camera to a

viewing/recording station. Separate audio cables must also be used if audio is

required.

Page 12: video surveilance system

11 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Cost-effectiveness: An IP-Surveillance system typically has a lower total

cost of ownership than a traditional analog CCTV system. IP-based networks and

wireless options are much less expensive alternatives than traditional coaxial and

fiber cabling for an analog CCTV system. In addition, digital video streams can

be routed around the world using a variety of interoperable infrastructure.

Management and equipment costs are also lower since back-end applications and

storage run on industry standard, open systems-based servers, not on proprietary

hardware such as a DVR in the case of an analog CCTV system.

Power over Ethernet technology: PoE cannot be applied in an analog

video system, can be used in a network video system. PoE enables networked

devices to receive power from a PoE-enabled switch or midspan through the

same Ethernet cable that transports data (video). PoE provides substantial savings

in installation costs and can increase the reliability of the system.

Figure A system that uses Power over Ethernet.

Page 13: video surveilance system

12 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Part II

Emerging Market Trends in Video

Surveillance

Page 14: video surveilance system

13 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2. Emerging market trends in video surveillance

2.1. General trends

Gone are the days when grainy, black and white CCTV cameras attached in discreet

corners would fix themselves on immovable paths. IP surveillance is a need now. It is

now monitored by security experts switching channels from their laptop in another part of

the city, analyzing various aspects and behavior. As in-situations and popular campuses

turn into soft targets, surveillance has been shifted from the admin to the IT department.

The IP surveillance system needs an initial investment but it transfers the entire load on

the network making it more mobile and easier to guard.

An Axis communication study said that with if there were more than 32 cameras on a

network, IP surveillance would be cheaper to own in comparison to the traditional analog

option.

The costs can further decrease when cameras are configured to a router and can operate

wirelessly hence reduce the sizable, hid-den wiring hassle.

Cameras now come equipped with the ability to acquire power over the Ethernet.

The HD quality allows for clearer quality and smarter identification.

The cameras are usually connected to a network video recorder to handle recording,

video and alarm management. These cameras are better high-quality Web Cams and can

thus be routed to be viewed on remote screens as well.

The software, that comes, allows users to map movements and suspicious objects on the

camera's range.

An alarm can then be triggered and the alert can be sent in the form on an automatically

generated phone call, text message and even email to certain set of people or the control

center.

“IIT Mumbai has implemented IP surveillance to observe the entrances and exits,” said

Navinder Chauhan, D-Link. Chauhan explained that after the IT department took over, a

company would be able to handle it better since streams can then be diverted to tablets or

even smart-phones. This helps in keeping a constant watch and with-out someone

monitoring movements, while sitting all night in front of a television screen.

The cameras not only help in identification of regular offences, the software given with

them can link images with a database of the undesirables provided by the police or by an

internal authority and can raise an alarm.

Page 15: video surveilance system

14 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.2. Newest market Trend : Video analytics

VMS is integrated with comprehensive cluster of advanced Video Analytic Algorithms.

Each Video Analytic Module is coupled with Incident-Event-Action framework. User

can set different actions on each Video Analytic events.

Abandoned Object Detection

Video Based Fire Detection

Zone Intrusion Detection

Automatic Video Image Enhancement

Boundary Loitering Detection

Intelligent People Counting

Object Removal Detection

Perimeter Tripwire

Stopped Vehicle Detection

Camera Tampering Detection

Toll Plaza Vehicle Classification

Each of the above Video Analytics can be run both in manual and auto mode with

scheduled presets. On each event detection VMS would send alerts to appropriate

security personnel. DiCortex Alert Management Framework supports alerts in the form

of Sound alarms, Email, SMS, camera alarm. Above all Video Analytics are equipped

with False Alarm Suppression Technology (FAST) which minimizes false alarms and

further strengthens the solution reliability.

Page 16: video surveilance system

15 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.2.1. Video based fire detection

Sensor based Fire Alarms detects fire by monitoring the environmental changes

associated with combustion. But these systems got some limitations in covering

wide physical area.

Video Based Fire Detection technology further strengthen the IP Video Surveillance

solutions. It works using advanced Image processing and Pattern Recognition

algorithm. This analytic has been tested in wide variety of scenarios ranging of

normal indoor mild fire to forest fires. System can alert the user based on the

intensity and duration of the fire occurrence.

False Alarm Suppression Technology (FAST) further helps in adding more

reliability to this Video Analytic.

Figure: Detection of fire by Fire detection analytic

Page 17: video surveilance system

16 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.2.2. Toll plaza video AVCC (Automatic vehicle counting &

classification)

Advanced Technology for Vehicle Counting and Classification is Easy to Install and

Use for existing Toll Plaza. It has edge over conventional Hardware sensors based

AVCC (Automatic Vehicle Classification) in terms of interoperability. AVCC

solution is capable of detecting and classifying the vehicles into different classes

such as BIKE, CAR, LCV, 2-Axle HCV, 3-Axle HCV and OSV. It can be easily

integrated with existing Toll Plaza Ticketing Management Software. The solution

can be used for both Real time validation of Operator issues tickets and also offline

Audit of the Ticketing System.

Key Advantages

Easy to Install and Operate

No need of Hardware sensors

Open Framework for Easy Integration

Recording the Vehicle Snapshot

Advanced Reporting and Statistics

Integrated with i2V Video Management

Software

Better Accuracy for Vehicle Detection &

Classification

Page 18: video surveilance system

17 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.2.3. Abandoned Object Detection

This is one of most important and crucial Video Analytic Algorithm which serves many

of the current security requirements. It became practically impossible to human beings

for round the clock monitoring of the crowded areas like Airports, City Metro Stations

etc. Our Solutions mainly aims at detecting the suspicious objects, unattended baggage

etc. Algorithm is specially tuned to handle crowded scenes. This analytic adds the

maximum intelligence to surveillance applications.

Figure: abandoned object detection by camera

Very accurate even in low light conditions

Well-tuned to handle crowded scenarios like Airports, Metro stations

System can learn from the user feedback in case of false alarms

Pre Event recording feature is available with this analytic

Ideal for detecting the bomb baggage in public places

Useful for detecting the Foreign objects on Railway tracks

Well suited to places like Shopping malls, Airports, Metro Stations etc.

Page 19: video surveilance system

18 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.2.4. Intrusion Detection

This is the process of locating a moving object in a prohibited or restricted area in

time. The algorithm analyses the video frames and outputs the location of moving

targets within the frame. Video based Intrusion detection (VID) is a way of defining

activity in a scene by analyzing image data and differences in a series of images.

The functionality is made available with video management software. System

allows you to set the activity threshold depending on what you want to monitor.

System has the capability to set the sensitivity for indoor or outdoor conditions to

avoid false alarms.

Figure: Intrusion detected by camera

Support Multiple Intrusion Zones with a Single Camera.

Direction based Intrusion detection with regular shapes.

User can get Zone based Alarms

Global Parameter Control Over the System

Minimal False Alarm Rates

Well customized to Indian Requirements

Automatic Image enhancement Controls for Bad light Scenarios

Well-tuned with Low Frame Rate and Low Resolution Input

Supports the feature of scheduled automatic on/off of this Analytics module.

Supports Wide variety of Intrusion Zones shapes starting with Simple

Rectangle to Any sized Polygon

User can define Directional based Intrusion for Regular Shaped Zones like

Square, Rectangle.

Page 20: video surveilance system

19 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.2.5. Video Enhancement

This analytic automatically converts the low contrast and low brightness video to

enhanced video. It intelligently enhances the quality of the video by analyzing the

local and global features in each frame of the video. Automatic Video Image

enhancement can be used in following cases:

Enhancing Video containing Fog

Enhancing the Video containing Low light

Enhancing the Video in Rainy season

Figure: Video Enhanced by Analytic

This feature is available at run time both while recording and playback.

Useful while viewing the videos covered with Fog or Rain

It can always play or record the better quality night time videos

Scheduled application of this feature is possible with VMS

Advanced image enhancement techniques were used to improve the video

quality.

Page 21: video surveilance system

20 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.2.6. Perimeter breach detection

This is a Trespassing Detection Analytic which can detect the trespassing of humans

in restricted areas. Any number restricted areas can be selected by the user. This

analytic is also capable of sending zone based alerts. This is different from

conventional Intrusion detection systems in terms of Human tracking over the

selected zones. Once the system detects the possible Trespasser, then it starts

transmitting audio and visual signals to the monitoring workstation at the local

security office

Figure: Perimeter breach detected by analytic

Support a combination of Multiple Zones.

Allows different Parameter Settings for Each Zone.

Zone highlighting when it detects the trespasser.

Global parameter Control over all selected Zones.

Automatic Image enhancement Controls for Bad light Scenarios

Supports the feature of scheduled automatic on/off of this analytics module.

As each Zone is identified with a unique identifier, user can get to know

exact zone where trespassing occurred.

Page 22: video surveilance system

21 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.2.7. Indoor people counting

People Counting is one of the Video Analytic module which helps in Statistical

analysis of Human flow inside any building or premises. Our People Counting

algorithm is well suited to such requirements. The system gives a real time

indication of number of visitors inside the store or building. It creates a Virtual line

or Virtual zone for counting operation. Later system starts tracking the Human

Heads passing over the virtual line. User can adjust the position of the line over

entire image.

Figure: People counting done by Video analytic

The use of people counting systems can prove very useful in the retail

environment to calculate the conversion rate.

It is useful in counting the people in exhibitions so that to avoid overcrowding.

Can be used in estimating the better ways to evacuate any building by

knowing the total people count in advance.

Helps in getting the routing information as the cameras not only count people,

but they also sense the direction of movement to determine the route people take

inside the store.

Useful in knowing the Average dwell time of people inside the building.

Helps in better Staff planning by having people flow statistics

Page 23: video surveilance system

22 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.2.8. Object removal detection

This is the way of protecting valuables without any human monitoring. User can select

the objects which need to be watched by the camera. Whenever object is found missing,

then system will generate alarms.

Your camera will acts as a virtual guard for the valuable objects. With this analytic 24x7

monitoring of the valuable objects is possible. User can also configure the time after

which alarm should be raised once the system detects missing object.

Figure: Missing object detection by analytic

Very simple & user friendly graphical interface with minimal mouse clicks.

Effective for 24x7 round the clock monitoring with even minimum illumination.

User can select any number of objects to be watched by the Analytic.

Very good performance even for watching multiple objects in the single

video.

Well suited to Indian Requirements

Very useful for round the clock monitoring of valuables in Museums.

Can be used of protecting the sensitive objects put for show case like gold,

ornaments etc.

Can be used for Equipment monitoring of computers, servers in sensitive server

rooms.

Can be used for protection of assets in banks and other financial locations.

Useful for eye watch of items put for display during product exhibitions.

Page 24: video surveilance system

23 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.2.9. Stopped vehicle detection

Most of the road accidents are mainly due to stopped vehicles. Our analytics is capable of

detecting a stopped vehicle in multiple scenarios. Once the system detects the stopped

vehicle, it is capable of taking the zoomed snapshot of the vehicle which includes the

License Plate number image of vehicle.

It can detect any stopped vehicle on roads. Once the user selects any No-Parking area,

system starts detecting vehicle coming close to it. If any vehicle lowers its speed or trying

to stop in No-Parking zone, then system will start alerting the user for illegal halting.

User can select any number of zones in the video and each zone can have its own

configurable parameters. Here time duration for which vehicle is allowed to halt is also

configurable.

Figure: Stopped vehicle detected by camera

o By this system we can prevent any kind of illegal parking or illegal halting on the

roads, premises etc.

o It would be very useful to prevent traffic jams in crowded areas because of the

illegal halting.

o With this analytic we can also detect the vehicle which needs assistance

o Illegal halting for long period of time can be detected & alerted to security for any

unusual activity like BOMB or Explosive material in the vehicle

Page 25: video surveilance system

24 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.2.10. Camera Tampering detection

This is Advanced Video based camera tampering detection analytic which can be

coupled with any of the rest of Video Analytics. This Video Analytic further adds

strength to the video solution by continuously monitoring the video feed from the

camera. Camera tampering event will be generated whenever camera is moved,

partially covered, severely defocused, paint sprayed etc.

2.2.11. Privacy Masking

Privacy masking, which allows certain areas of a scene to be blocked or masked

from viewing and recording, can be made available in various network video

products. In a PTZ camera or PTZ dome camera, the functionality has the ability to

maintain the privacy masking even as the camera’s field of view changes since the

masking moves with the coordinate system.

Figure: With built-in privacy masking (gray rectangle in image), the camera can guarantee privacy for areas that should not be covered by a

surveillance application.

Page 26: video surveilance system

25 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.3. Emerging application areas

Network video can be used in an almost unlimited number of applications; however, most of its

uses fall under security surveillance or remote monitoring of people, places, property and

operations. The following are some typical application possibilities in key industry segments

2.3.1. Retail

Network video systems in retail stores can significantly reduce theft, improve staff

security and optimize store management. A major benefit of network video is that it can

be integrated with a store’s EAS (electronic article surveillance) system or a POS (point

of sale) system to provide a picture and a record of shrinkage-related activities. The

system can enable rapid detection of potential incidents, as well as any false alarms.

Network video offers a high level of interoperability and gives the shortest return on

investment.

Network video can also help identify the most popular areas of a store and provide a

record of consumer activity and buying behaviors that will help optimize the layout of a

store or display. It can also be used to identify when shelves need to be restocked and

when more cash registers need to be opened because of long queues.

Page 27: video surveilance system

26 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.3.2. Transportation

Network video can enhance personal safety and overall security at air- ports, highways,

train stations and other transit systems, as well as in mobile transport such as in buses,

trains and cruise ships. Network video can also be used to monitor traffic conditions to

reduce congestion and improve efficiency. Many installations in the transportation sector

require only the best systems, involving high image quality (which can be provided by

progressive scan technology in network cameras), high frame rates and long retention

times. In some demanding environments such as on buses and trains, network cameras

that can withstand varying temperatures, humidity, dust, vibrations and vandalism are

required.

2.3.3. Education

From daycare centers to universities, network

video systems have helped deter vandalism and

increase the safety of staff and students. In

education facilities where an IT infrastructure is

already in place, network video presents a more

favorable and cost-effective solution than an

analog system because new cabling is often not

required. In addition, event management features

in network video can generate alarms and give

security operators accurate, real-time images on

which to base their decisions. Network video can

also be used for remote learning; for example, for

students who are unable to attend lectures in

person.

Page 28: video surveilance system

27 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.3.4. Industries

Network video can be used to monitor and

increase efficiencies in manufacturing lines,

processes and logistic systems, and for securing

warehouses and stock control systems. Network

video can also be used to set up virtual meetings

and get technical support at a distance.

2.3.5. City surveillance

Network video is one of the most useful tools for

fighting crime and protecting citizens. It can be

used to detect and deter. The use of wireless

networks has enabled effective city-wide

deployment of network video. The remote

surveillance capabilities of network video have

enabled police to respond quickly to crimes being

committed in live view.

2.3.6. Government

Network video products are used to secure all

kinds of public buildings, from museums and

offices to libraries and prisons. Cameras placed at

building entrances and exits can record who

comes in and out, 24 hours a day. They are used

to prevent vandalism and increase security of

staff. With intelligent video applications such as

people counting, network video can provide

statistical information, such as the number of

visitors to a building.

Page 29: video surveilance system

28 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

2.3.7. Healthcare

Network video enables cost-effective,

high-quality patient monitoring and

video surveillance solutions that

increase the safety and security of staff,

patients and visitors, as well as

property. Authorized hospital staff can,

for example, view live video from

multiple locations, detect activity and

provide remote assistance.

2.3.8. Banking and finance

Network video is used in security

applications in bank branches,

headquarters and ATM (automated teller

machine) locations. Banks have been

using surveillance for a long time, and

while most installations are still analog,

network video is starting to make

inroads, especially in banks that value

high image quality and want to be able

to easily identify people in a

surveillance video.

Page 30: video surveilance system

29 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Part III:

What are Network Cameras and how they

are made?

Page 31: video surveilance system

30 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

3. Network cameras

A network or IP camera is a type of camera that can send and receive data via a computer

network and Internet. The main components of a network camera include a lens, an image

sensor, one or several processors, and memory. The processors are used for image processing,

compression, video analysis and networking functionalities. The memory is used for storing the

network camera’s firmware (computer program) and for local recording of video sequences.

Figure A network camera connects directly to the network.

Like a computer, the network camera has its own IP address, is connected directly to a network

and can be placed wherever there is a network connection. This differs from a web camera,

which can only operate when it is connected to a personal computer (PC) via the USB or IEEE

1394 port, and to use it, software must be installed on the PC. A network camera provides web

server, FTP (File Transfer Protocol), and e-mail functionalities, and includes many other IP

network and security protocols.

A network camera can be configured to send video over an IP network for live viewing and/or

recording either continuously, at scheduled times, on an event or on request from authorized

users. Captured images can be streamed as Motion JPEG, MPEG-4 or H.264 video using various

networking protocols, or uploaded as individual JPEG images using FTP, e-mail or HTTP

(Hyper- text Transfer Protocol).

In addition to capturing video, Network cameras provide event management and intelligent video

functionalities such as video motion detection, audio detection, active tampering alarm and auto-

tracking. Most network cameras also offer input/output (I/O) ports that enable connections to

external devices such as sensors and relays. Other features may include audio capabilities and

built-in support for Power over Ethernet (PoE).

Page 32: video surveilance system

31 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Figure Front and back of a network camera.

3.1. Classification of network cameras on the basis of their

appearance and application area

Network Cameras are of several types depending on their usability and features. They

can be classified into 3 categories based on their appearance and application area:

Fixed Box Camera

Fixed Dome Camera

PTZ Camera

Network cameras can also be classified in terms of whether they are designed for indoor

use only or for indoor and outdoor use.

Outdoor network cameras often have an auto iris lens to regulate the amount of light the

image sensor is exposed to. An outdoor camera will also require an external, protective

housing unless the camera design already incorporates a protective enclosure. Housings

are also available for indoor cameras that require protection from harsh environments

such as dust and humidity, and from vandalism or tampering. In some camera designs,

vandal and tamper-proof features are already built-in and no external housing is required.

3.1.1. Fixed box network cameras

A fixed box network camera, which may come with a fixed or varifocal lens, is a camera

that has a fixed field of view (normal/telephoto/wide-angle) once it is mounted. A fixed

camera is the traditional camera type where the camera and the direction in which it is

pointing are clearly visible. This type of camera represents the best choice in applications

where it is advantageous to make the camera very visible. A fixed camera usually

enables its lens to be changed. Fixed cameras can be installed in housings designed for

indoor or outdoor installation.

Page 33: video surveilance system

32 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Figure Fixed network cameras including wireless and megapixel versions.

3.1.2. Fixed Dome Network Cameras

A fixed dome network camera, also called a mini dome, essentially involves a fixed

camera that is pre-installed in small dome housing. The camera can be directed to point in

any direction. Its main benefit lies in its discreet, non-obtrusive design, as well as in the

fact that it is hard to see in which direction the camera is pointing. The camera is also

tamper resistant.

One of the limitations of a fixed dome camera is that it rarely comes with an

exchangeable lens, and even if it is exchangeable, the choice of lenses is limited by the

space inside the dome housing. To compensate for this, a varifocal lens is often provided

to enable the camera’s field of view to be adjusted.

Figure Fixed dome network cameras.

Page 34: video surveilance system

33 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

3.1.3. PTZ Cameras

A PTZ camera or a PTZ dome camera can manually or automatically pan, tilt and

zoom in and out of an area or object. All PTZ commands are sent over the same

network cable as for video transmission; no RS-485 wires need to be installed as is

the case with an analog PTZ camera.

PTZ dome network cameras can cover a wide area by enabling greater flexibility in

pan, tilt and zoom functions. They enable a 360-degree, continuous pan, and a tilt of

usually 180 degrees. The optical zoom of a PTZ dome typically ranges between 10x

and 35x.

A PTZ dome network camera also provides mechanical robustness for continuous

operation in guard tour mode, whereby the camera automatically moves from one

preset position to the next in a pre-determined order or at random. Normally up to

20 guard tours can be set up and activated during different times of the day. In guard

tour mode, one PTZ dome network camera can cover an area where 10 fixed

network cameras would be needed. The main drawback is that only one location can

be monitored at any given time, leaving the other nine positions unmonitored.

Figure: PTZ dome network cameras

Page 35: video surveilance system

34 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

3.2. Classification of network camera on the basis of their

Functionality

3.2.1. Day and night network cameras

All types of network cameras—fixed, fixed dome, PTZ, and PTZ dome can offer

day and night functionality. A day and night camera is designed to be used in

outdoor installations or in indoor environments with poor lighting.

A day and night, color network camera delivers color images during the day. As

light diminishes below a certain level, the camera can automatically switch to night

mode to make use of near- infrared (IR) light to deliver high-quality, black and

white images.

Near-infrared light, which spans from 700 nanometers (nm) up to about 1000 nm, is

beyond what the human eye can see, but most camera sensors can detect it and make

use of it. During the day, a day and night camera uses an IR-cut filter. IR light is

filtered out so that it does not distort the colors of images as the human eye sees

them. When the camera is in night (black and white) mode, the IR-cut filter is

removed, allowing the camera’s light sensitivity to reach down to 0.001 lux or

lower.

Figure: Image at left, IR-cut filter in a day/night network camera; middle, position of

IR-cut filter during daytime; at right, position of IR-cut filter during nighttime.

Figure: Graph shows how an image sensor responds to visible and near-IR light. Near-IR light spans the 700 nm to 1000 nm range

Page 36: video surveilance system

35 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Day and night cameras are useful in environments that restrict the use of artificial light. They

include low-light video surveillance situations, covert surveillance and discreet applications, for

example, in a traffic surveillance situation where bright lights would disturb drivers at night.

An IR illuminator that provides near-infrared light can also be used in conjunction with a day

and night cameras to further enhance the camera’s ability to produce high-quality video in

lowlight or nighttime conditions.

Figure: At left, image without an IR illuminator; at right, image with an IR illuminator

3.2.2. HDTV, Megapixel or standard resolution camera

One of the unique benefits that network video brings to the video surveillance

market is the ability to move beyond the traditional PAL/NTSC resolution and

frame rate limitations and experience high-resolution video with extreme image

detail. Even a 1 megapixel network camera offers a resolution that is at least three

times better than an analog CCTV camera, and there are network cameras that offer

as much as 8 megapixel resolution – and beyond.

Choosing the right camera for your system can easily become a challenge. These

guidelines help you optimize your camera installation based on how you need to use

your video to fulfill your video surveillance goals.

HDTV Network Cameras are a recent technology development that has gained

enormous interest on the video surveillance market. As for megapixel, HDTV

means excellent image detail, but in addition, a true HDTV network camera

complies with industry standards which ensure excellent color representation, full

frame rate and a 16:9 format.

Page 37: video surveilance system

36 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

3.2.3. Thermal Network Cameras

Thermal Network Cameras are a perfect complement to any professional IP-

Surveillance system that needs to secure an area or a perimeter in complete

darkness. They create images based on the heat that always radiates from any

object, vehicle or person. This gives the cameras the power to see through complete

darkness and deliver images that allow operators to detect and act on suspicious

activity – 24 hours a day, seven days a week.

Figure All objects emit thermal radiation which can be detected with a thermal network camera. Images are generally produced in black and

white but can be artificially colored to make it easier to distinguish different shades.

Thermal cameras are excellent for detecting people, objects and incidents in darkness

and other challenging conditions. Thermal cameras do not, however, deliver images

that allow reliable identification – that is why thermal cameras and conventional

cameras complement and support each other in a surveillance installation.

Thermal cameras do not require any additional light sources – conventional or IR – that

consume energy, create shadows and reveal their locations. And, in contrast to

conventional day-and-night cameras that depend on a certain amount of near-infrared

light to function, thermal cameras deliver reliable surveillance images even in complete

darkness.

Page 38: video surveilance system

37 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

3.3. How the IP Cameras are made / assembled

For assembling a particular camera, lot of parts are joined together to form a finished

product. Here I am taking an example of Shyam Fixed Box Camera, that how it is made.

3.3.1. Part list for assembling FALCON camera

Following is the Part list for Assembling Shyam Fixed Box IP Camera (Falcon SM200

series)

Falcon

Item

Agile part# Material

use Pictures Part Name QTY

1 Bottom plate

(With painting)

601.00146.00 Al. Alloy 1 NO

2 Top (with painting)

601.00145.00 Al. Alloy 1 NO

5 Capture PC plate With

painting 601.00147.00 Zn Alloy 1 NO

to hold capture pcb

3 Ball screw 601.00229.00 Zn Alloy 1 NO

in mounitng

4 mount -1

With painting)

601.00272.00 Zn Alloy 1 NO

6 Mount-

bottom With Painting)

601.00271.00 Al. Alloy 1 NO

Page 39: video surveilance system

38 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

8 Hitachi lens

mount 609.00130.00 ABS 1 NO

9 Lens shade (for Hitachi

lens) 609.00125.00 ABS 1 NO

10 lens shade

(for CS mount lens)

609.00128.00 ABS 1 NO

11 lens shade

(for x4 lens) 609.00129.00 ABS 1 NO

12 CS lens holder

(Internal) 609.00157.00 ABS 1 NO

13 CS lens holder

(External) 609.00126.00 ABS 1 NO

14 M12 (S) lens

mount 609.00158.00 ABS 1 NO

15 Ring Nut

(same part as in Kite)

609.00073.00 ABS 1 NO to adjust M12

lens

16 Spacer for IR

cut filter 610.00026.00 Silicon 1 NO

17

Rubber cap for DC Iris connector

hole

610.00027.00 Silicon 1 NO

Page 40: video surveilance system

39 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

18

Rubber cap for SMA

connector hole

610.00028.00 Silicon 1 NO

19 spacer for

keekon 601.00213.00 BRASS 4 NOS

20 spacer for CS (INTERNAL)

601.00214.00 BRASS 4 NOS

21 spacer for IO-POWER

pcb 601.00310.00 BRASS 1 NO

22 spacer for CS (EXTERNAL)

601.00298.00 BRASS 4 NOS

23

M3 CSK

605.00197.00 SS 4 NOS OUTSIDE HOUSING

24 M3 PAN CROSS HEAD

605.00223.00 SS 10 NOS

PCB FITTING

25 THUMB SCREW

605.00224.00 SS 1 NO

IN MOUNITNG

26 GRUB SCREW

605.00225.00 SS 2 NOS

IN MOUNITNG

27

SELF TAPPING

WITH ANCHOR

605.00226.00 SS 4 NOS WALL

MOUNITNG

28

M2 CSK

605.00238.00 SS 2 NOS FOR FITTING IR CUT FILTER

29

M2 HEX NUT

605.00132.00 SS 2 NOS FOR FITTING IR CUT FILTER

Page 41: video surveilance system

40 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

30 SELF

TAPPING ST2.9 x 16L

605.00239.00 SS 2 NOS FOR FITTING LENS HOLDER

31

M4 CSK

605.00240.00 SS 1 NO FOR FITTING OUTDOOR

SHIELD

32 SHIELD

MOUNTING SCREW

601.00328.00 BRASS 1 NO FOR FITTING OUTDOOR

SHIELD

33 LABLE 104.00063.00 POLYMIDE 1 NO

Page 42: video surveilance system

41 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

3.3.2. Assembly Line document

Assembly line deatils

Falcon Assembly

PCB Assembly

Encoder,Power & IO boards

Step 1.1

Step 1.2

Plug-IN Power & IO PCBs in respective slots

Back-panel Connectors

Power Board

IO Board

Page 43: video surveilance system

42 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Step 1.3

Up to this point is common for all models

Step 1.4

Fix the spacer between Power & IO boards with screws from both sides

Fix the PCB assembly into “Bottom plate” with Three screws as shown

Page 44: video surveilance system

43 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Capture Board (Only for CS mount and x4 Zoom)

Step 1.5

Option 1: x4 Zoom lens (internal mount):

Step 1.6: Fix lens mount and lens to capture board

Place Spacer (IR cut filter spacer) above the image sensor

Fix IR Cut filter above the sensor with spacer in between. (IR cut filter shown in transparent form for clarity )

Image sensor on capture board

Page 45: video surveilance system

44 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Lens mount assembly (for x4 Zoom lens)

Step 1.7 : Fix Capture board Assembly to the “Holding plate”

Fix “S-Mount lens holder” on the capture PCB above sensor

Fix with Two diagonal screws

Fix x4 zoom lens on to the lens holder

Use locking nut to fix lens in Correct focal length

Fix the Capture PCB assembly (with lens) to the “holding plate” with 4 spacers

Page 46: video surveilance system

45 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Capture board assembly with lens and holding plate

Fix the Capture PCB assembly (with lens) to the “holding plate” with 4 spacers

Page 47: video surveilance system

46 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Step 1.8: Fix lens assembly inside enclosure (bottom plate)

Insert “holding” plate into the slot in front of bottom plate

Page 48: video surveilance system

47 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Step 1.9: Connect Capture Board to Encoder baord

Step 1.10: Connect Mic

Connect capture board to encoder board using FRC cable

Insert Mic to the Mis hole in front of the bottom plate and connect Mic cable to encoder board connector

Page 49: video surveilance system

48 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Step 1.11 Fix top cover

Slide-in the top cover on to Bottom cover

Fix top cover with 4 screws (2 on either side) to the bottom plate

Page 50: video surveilance system

49 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Step 1.12: Fix Lens shade

Fix x4” Lens shade” to the front cover

Use “rubber gasket to close DC Iris connector hole in front panel

Page 52: video surveilance system

51 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Step 1.14 : Fix Mounting base (Same for all models)

Fix Mounting base to the Bottom plate

Camera can now be mounted on to the required surface (Wall)

Page 53: video surveilance system

52 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Part IV

Possible Connectivity Medium

Page 54: video surveilance system

53 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

4. Possible connectivity options

Wired system

Wireless system

Hybrid system: combination of wired and wireless system

4.1. Basic terms used in connectivity

4.1.1. IP addressing:

Any device that wants to communicate with other devices via the Internet must have

a unique and appropriate IP address. IP addresses are used to identify the sending

and receiving devices. There are currently two IP versions: IP version 4 (IPv4) and

IP version 6 (IPv6). The main difference between the two is that the length of an

IPv6 address is longer (128 bits compared with 32 bits for an IPv4 address). IPv4

addresses are most commonly used today.

4.1.2. Ports:

A port number defines a particular service or application so that the receiving server

(e.g., net- work camera) will know how to process the incoming data. When a

computer sends data tied to a specific application, it usually automatically adds the

port number to an IP address without the user’s knowledge. Port numbers can range

from 0 to 65535. Certain applications use port numbers that are pre-assigned to

them by the Internet Assigned Numbers Authority (IANA). For example, a web

service via HTTP is typically mapped to port 80 on a network camera.

4.1.3. Data transport protocols for network video:

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are the

IP-based protocols used for sending data. These transport protocols act as carriers

for many other protocols. For example, HTTP (Hyper Text Transfer Protocol),

which is used to browse web pages on servers around the world using the Internet, is

carried by TCP.

TCP provides a reliable, connection-based transmission channel. It handles the

process of breaking large chunks of data into smaller packets and ensures that data

sent from one end is received on the other. TCP’s reliability through retransmission

may introduce significant delays. In general, TCP is used when reliable

communication is preferred over transport latency.

Page 55: video surveilance system

54 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

UDP is a connectionless protocol and does not guarantee the delivery of data sent,

thus leaving the whole control mechanism and error-checking to the application

itself. UDP provides no transmissions of lost data and, therefore, does not introduce

further delays.

Page 56: video surveilance system

55 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Table Common TCP/IP protocols and ports used for network video.

4.2. Wired IP Surveillance System

In Wired IP Surveillance System all the various components are connected to each other

through LAN or Ethernet. Data is sent in the form of packets and to regulate the

transmission of the packets, Ethernet technology is used. Ethernet uses a star topology in

which the individual nodes (devices) are networked with one another via active

networking equipment such as switches. The number of networked devices in a LAN

can range from two to several thousand.

The physical transmission medium for a wired LAN involves cables, mainly twisted pair

or fiber optics. A twisted pair cable consists of eight wires, forming four pairs of twisted

copper wires and is used with RJ-45 plugs and sockets. The maximum cable length of a

twisted pair is 100 m (328 ft.) while for fiber, the maximum length ranges from 10 km to

70 km, depending on the type of fiber. Depending on the type of twisted pair or fiber

optic cables used, data rates today can range from 100 Mbit/s to 10,000 Mbit/s.

Figure Twisted pair cabling includes four pairs of twisted wires, normally connected to a RJ-45 plug at the end.

A rule of thumb is to always build a network with greater capacity than is currently required. To future-proof a network, it is a good idea to design a network such that only 30% of its capacity is used. Since more and more applications are running over networks today, higher and higher network performance is required. While network switches (discussed below) are easy to upgrade after a few years, cabling is normally much more difficult to replace.

4.2.1. Types of Ethernet networks:

Fast Ethernet: Fast Ethernet refers to an Ethernet network that can transfer data at a rate of 100 Mbit/s. It can be based on a twisted pair or fiber optic cable. Most devices that are connected to a network, such as a laptop or a network camera, are equipped with a 100BASE-TX/10BASE-T Ethernet interface, most commonly called a 10/100 interface, which supports both 10 Mbit/s and Fast Ethernet. The type of twisted pair cable that

Page 57: video surveilance system

56 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

supports Fast Ethernet is called a Cat-5 cable.

Gigabit Ethernet: Gigabit Ethernet, which can also be based on a twisted pair or fiber optic cable, delivers a data rate of 1,000 Mbit/s (1 Gbit/s) and is becoming very popular. It is expected to soon replace Fast Ethernet as the de facto standard.

The type of twisted pair cable that supports Gigabit Ethernet is a Cat-5e cable, where all four pairs of twisted wires in the cable are used to achieve the high data rates. Cat-5e or higher cable categories are recommended for network video systems. Most interfaces are backwards compatible with 10 and 100 Mbit/s Ethernet and are commonly called 10/100/1000 interfaces.

For transmission over longer distances, fiber cables such as 1000BASE-SX (up to 550 m/1,639 ft.) and 1000BASE-LX (up to 550 m with multimode optical fibers and 5,000 m with single-mode fibers) can be used.

Figure Longer distances can be bridged using fiber optic cables. Fiber is typically used in the backbone of a network and not in nodes such as a

network camera.

10 Gigabit Ethernet: 10 Gigabit Ethernet is the latest generation and

delivers a data rate of 10 Gbit/s (10,000 Mbit/s), and a fiber optic or twisted

pair cable can be used. 10GBASE-LX4, 10GBASE-ER and 10GBASE-SR

based on an optical fiber cable can be used to bridge distances of up to 10,000

m (6.2 miles). With a twisted pair solution, a very high quality cable (Cat-6a

or Cat-7) is required. 10 Gbit/s Ethernet is mainly used for backbones in high-

end applications that require high data rates.

Page 58: video surveilance system

57 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

4.3. Wireless IP Surveillance System

In Wireless IP Surveillance System all the various components are connected to each

other wirelessly through Internet using various communicating protocols such as HTTP,

UDP and RTSP etc. Before discussing various protocols, some of the basic elements of

Internet communication such as routers, firewalls and Internet service providers are

discussed below:

Routers: To forward data packages from one LAN to another LAN via the Internet,

networking equipment called a network router must be used. A router routes

information from one network to another based on IP addresses. It forwards only data

packages that are to be sent to another network. A router is most commonly used for

connecting a local network to the Internet. Traditionally, routers were referred to as

gateways.

Firewalls: A firewall is designed to prevent unauthorized access to or from a

private network. Firewalls can be implemented in both hardware and software, or a

combination of both. Firewalls are frequently used to prevent unauthorized Internet

users from accessing private networks that are connected to the Internet. Messages

entering or leaving the Internet pass through the firewall, which examines each

message, and blocks those that do not meet the specified security criteria.

Internet connections: In order to connect a LAN to the Internet, a network

connection via an Internet service provider (ISP) must be established. When

connecting to the Internet, terms such as upstream and down- stream are used.

Upstream describes the transfer rate with which data can be uploaded from the device

to the Internet; for instance, when video is sent from a network camera. Downstream

is the transfer speed for downloading files; for instance, when video is received by a

monitoring PC.

In most scenarios—for example, a laptop that is connected to the Internet—downloading

information from the Internet is the most important speed to consider. In a network video

application with a network camera at a remote site, the upstream speed is more relevant

since data (video) from the network camera will be uploaded to the Internet.

NAT (Network address translation): When a network device with a private IP address

wants to send information via the Internet, it must do so using a router that supports

NAT. By using this technique router can translate a private IP address into a public IP

address without the sending host’s knowledge.

Port forwarding: To access cameras that are located on a private LAN via the Internet,

the public IP address of the router should be used together with the corresponding port

number for the network camera/video encoder on the private network.

Page 59: video surveilance system

58 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Port forwarding works as follows. Incoming data packets reach the router via the router’s

public (external) IP address and a specific port number. The router is configured to

forward any data coming into a predefined port number to a specific device on the private

network side of the router. The router then replaces the sender’s address with its own

private (internal) IP address. To a receiving client, it looks like the packets originated

from the router. The reverse happens with outgoing data packets. The router replaces the

private IP address of the source device with the router’s public IP address before the data

is sent out over the Internet.

Figure Router knows to forward data (request) coming into port 8032 to a network camera with a private IP address of 192.168.10.13 port 80 so that network camera can then begin to send video.

Port forwarding is traditionally done by first configuring the router. Different routers

have different ways of doing port forwarding and there are web sites such as

www.portfoward.com that offer step-by-step instruction for different routers. Usually

port forwarding involves bringing up the router’s interface using an Internet browser, and

entering the public (external) IP address of the router and a unique port number that is

then mapped to the internal IP address of the specific network video product and its port

number for the application.

Page 60: video surveilance system

59 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Wireless Network Camera: A network camera with built-in wireless support is a

consideration when running a cable between a LAN and a network camera is impractical,

difficult or expensive. Wireless network cameras are suitable for use in outdoor

situations, in environments such as historic buildings where the installation of cables

would damage the interior, or in cases where there is a need to move cameras to new

locations on a regular basis, such as in a supermarket. Ensure that the wireless network

camera supports security protocols such as IEEE 802.1X and WPA/WPA2 (Wi-Fi

Protected Access), which will help secure the wireless communication.

A Wireless Network Camera

using 802.11b/g.

Figure By using a wireless bridge, any network camera can be used in a wireless network.

WLAN: A wireless local area network (WLAN) links two or more devices using some

wireless distribution method (typically spread-spectrum or OFDM radio), and usually

providing a connection through an access point to the wider internet. This gives users the

mobility to move around within a local coverage area and still be connected to the

network. Most modern WLANs are based on IEEE 802.11 standards, marketed under the

Wi-Fi brand name.

All components that can connect into a wireless medium in a network are referred to as

stations. All stations are equipped with wireless network interface controllers (WNICs).

Wireless stations fall into one of two categories: access points, and clients. Access points

(APs), normally routers, are base stations for the wireless network. They transmit and

receive radio frequencies for wireless enabled devices to communicate with. Wireless

clients can be mobile devices such as laptops, personal digital assistants, IP Camera and

other Smartphones, or fixed devices such as desktops and workstations that are equipped

with a wireless network interface.

Page 61: video surveilance system

60 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Wireless networks: For video surveillance applications, wireless technology offers a

flexible, cost-efficient and quick way to deploy cameras, particularly over a large area as

in a parking lot or a city center surveillance application. There would be no need to pull a

cable through the ground. In older, protected buildings, wireless technology may be the

only alternative if standard Ethernet cables may not be installed.

Figure A network with wired and wireless connections.

Page 62: video surveilance system

61 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

Part V

A Typical Surveillance System and its

Components

Page 63: video surveilance system

62 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

5. A typical video surveillance system at one live site named

as “Macawer Beekay”

In the Proposed Solution, we have to do video surveillance in the complete industrial plant,

which will be monitored locally as well as central control room, situated at some remote

location. In this network we will connect all outdoor cameras through RF technology in P2P

or point-to-multipoint Mode and indoor camera through wired connectivity. Every Location

will be covered by either PTZ or fixed box Camera. Through Fix Camera we can view a pre-

define area/zone, whereas a PTZ can be used for viewing the surrounding area (360 Deg.) of

any particular locations. Every outdoor Camera will connect to the Remote Unit (CPE), and

CPE will communicate to Base Station via Wireless. Repeater will be used where Line of

sight will not be available.

Figure: A bird’s eye-view of all the locations mentioned in the solution

Page 64: video surveilance system

63 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

5.1. Solution explanation

There will be 31 fixed box, 5 PTZ cameras and 3 dome cameras

installed for surveillance.

All indoor cameras will be connected by 8-Port PoE switch through

CAT-6 Cable.

All the outdoor cameras would be connected through wireless

Complete cabling will be done for all the cameras.

5.2. Solution components

5.2.1. Remote Surveillance Camera Units:

IP Fixed Box Camera (4x) ,IP PTZ Camera (35x),IP Fixed Zoom (10x) They should be easy to install. Reliability is mandatory along with robustness.

Camera units will be installed at the light poles located at the border fencing

Unit installation should be easy and fast.

It should have provision of 24 hours backup and provision of adding more backup in

special need.

All the camera units shall be enclosed in the weather-proof casing which has inbuilt

heater and fan.

Link establishment with should be very easy and of high throughput. This throughput

should be maintained in every kind of climate.

Camera shall be supported by IR lamps for night visibility

Camera shall have the support for the Pole Mount

Camera Units shall be of good resolution.

Camera Units shall be IP based and should give video & audio data on the IP interface

built inside the camera

Camera Units shall be able to talk to the Wireless CPE

Each camera shall stream at a bit rate of 512 Kbps or 1 Mbps

5.2.2. Weather-proof Camera Housings

Weather-proof Standard IP66 with inbuilt heater and fan

Indoor and Outdoor Installations

Made for ultra-harsh environments

Applicable to Fixed Box and PTZ Cameras

Page 65: video surveilance system

64 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

5.2.3. L2 Switch 24 port

Switch is having the Throughput of 56Gbps.

Total they have 28 Gigabit ports in full duplex mode.

Supports many features like VLANs, Access list policies, radius Authentication.

Gives the 1 gig connectivity to all the connected Nodes.

Support QoS for prioritize the data stream like Voice and Video.

They are Easy to install and Monitor

5.2.4. Wireless Communication devices

5.2.4.1. Camera CPE’s

They are easy to install. Reliability is also available in this along with robustness.

Camera CPE will be installed at the light poles located at the border fencing. They

would be installed near the cameras and will be connected to the camera using

ethernet interface.

These CPE will act as wireless client and will transfer the video data to central

BTS to which they are registered.

CPE shall be able to communicated independently to the central BTS without

affecting other CPE’s

5.2.4.2. BTS

BTS (Base Station) will be installed at the place wherever maximum line of site

will be available. The distance will depend on the terrain between the BTS and

the wireless CPE’s which it will connect to each Base Station has the capacity of

100 Mbps and shall support 15 CPE as the multipoint’s

BTS will aggregate the video & audio data from cameras which are connected

through the CPE for that particular BTS will communicate to the CPE over secure

802.11b/g/n protocol.

Each BTS will have multiple sector antennas to connect on either side.

Fully Secure Communication with 128 bit encryption.

Page 66: video surveilance system

65 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

5.2.5. Video management system

IP signal from RU will come to a desktop with large display. Here video

management server is running to get the live feed from remote camera units.

Functional Specifications of Video management server are given below

5.2.5.1. Live View Client

Automatic searching of devices in the network- Auto Search Supported

View live videos in 2x2, 3x3 and 4x4, 5x5, 6x6, 8x8 and split views in

windows matrix

Remote Live View through web or through remote client.

View over Mobile

Devices network connection status

Picture Snapshot in jpeg format

Full screen view

PTZ controls for PTZ cameras

On screen Display: Frame rate, bit rate, date/time or user specified text.

5.2.5.2. Recordings & Storage

Triplex Mode: Live View, Recording and Playback simultaneously

Recording stream settings: Encoding (MJPEG, MPEG4 H.264), Resolution

and

Frame rate.

Recordings in Chunks: Configurable Chunk Time

Schedule Recording with Date and time settings

Automatic Recordings restart after power failures

Disk Space Management. Alarms and events

Calculator to Find Hard disk requirements based on Number of cameras,

number of days and Video Stream settings namely encoding, resolution and

frame rate.

5.2.5.3. Playback of recorded video

Intelligent Search: Based on Camera, Date & time

Sorting recordings: Based on Camera and Start or End date/Time

Playback recordings: Play, forward and Seek options. Slow and fast playing

View Recordings using Desktop Client or through Windows Media Player

Export Evidence: Export Recorded video to CD/DVD or external drive as

evidence.

Playback on Archived Video.

Page 67: video surveilance system

66 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

5.2.5.4. Archiving

Archiving on External Network Storage, CD/DVD or USB

Scheduled Archiving: Day and time of archiving

Automatic delete or archiving after set number of days.

5.2.5.5. Alarms

Types of Alarm:

Email (Email server settings required)

SMS (Gateway/Modem required)

Option to add Physical Alarm connected in the Camera

Alarm for Low Disk Space

Alarm for Recording problems

Alarm for Archiving Events

5.2.5.6. Management

Camera Management:

Defining Camera Groups

Camera access based on user roles

Saving and retrieving screen views

User Management:

User based camera or camera group access

User Roles and levels

Login & Authentication

5.2.5.7. Video Analytics Software’s:

Intrusion Detection

Left Object Detection

Overcrowding

Camera Tampering

5.2.5.8. Security

Camera Management:

Secure Communication

Double Login Security

Saving and retrieving screen views by user

Page 68: video surveilance system

67 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

6. CONCLUSION

This project helped us gain the insight of how a Video Surveillance System is integrated, its

working, maintenance and various other factors affecting it. Each Networking component

was discussed in detail. Different types of network camera each having its particular need

and application; different types of connecting media and modes; working of switch &

routers; wired or wireless modes; video analytics utilizes the super power of computer

processing help generate alarm on any unusual activity and lots more. All the things helped

explore new avenues of knowledge.

In short, Video Surveillance is growing industry which integrates various fields of

Engineering to take the Security to the next level.

Page 69: video surveilance system

68 VIDEO SURVEILLANCE SYSTEM: A CASE STUDY

7. REFERENCES

E-Books: [1] Axis Technical guide to network video

[2] Axis IP-Surveillance design guide

[3] Various datasheets: Falcon SM200 Series, S810 Hawk, HAWK S9118

Sites: [1] www.vvdntech.com

[2] www.shyamnetworks.com

[3] www.axis.com

[4] www.en.wikipedia.org