Sunteți pe pagina 1din 24

& Securityinfo

watch
.com

10Dispelling
Steps to athe
Successful
Top 10
IPMyths
Surveillance Installation
of IP Surveillance
ALL THIS IS JUST ONE MANS RESPONSIBILITY.
Guess who he calls about video surveillance?

THE LEADING EXPERT

Big security responsibility? Axis delivers scalable, well-proven network


video solutions that offer outstanding video surveillance and monitoring
capability, combined with exceptional flexibility that keeps costs down.
Axis was first to bring the benefits of network video technology to video
surveillance applications. Today we have the worlds largest installed base of
network video products, driving the shift from analog to IP-based solutions.
And we work with an extensive network of CCTV and IT industry partners to
create the perfect video surveillance solution for your present and future
needs. We help you manage the responsibility, no matter how big it is.
Its what you can expect from Axis the global leader in network video.

www.axis.com

FREE! Your copy of the Axis technical guide to network video at www.axis.com/free_guide/
10
Video Surveillance

Steps
to a Successful
IP Surveillance Installation
By Fredrik Nilsson

Intro: Starting a Major Video Project? Steer Clear of the Pitfalls


and Find the Smooth Route by Using the following 10
Steps to a Successful IP Surveillance Installation. . . . . . . . pg. 4
Step #1: From Image Quality to Progressive Scans and APIs,
What You Should Consider when Choosing a Camera. . . pg. 5
Step #2: MPEG-4, Motion JPEG, MPEG-2, License Feeds, Bit
Rates and More: What It All Means . . . . . . . . . . . . . . . . . . pg. 6
Step #3: What to Look For in a Video Management System,
Plus How Open and Closed Systems Differ. . . . . . . . . . . . pg. 8
Step #4: Understanding IP-based Video Storage and Server
Systems, Plus How to Calculate Storage Needs. . . . . . . . pg. 10

The following are a series of articles looking Step #5: Incorporating Analog Cameras with Video Servers. . . . . . pg. 13
at the steps to a successful IP surveillance installa- Step #6: Wireless Networking Options for Surveillance
tion. Fredrik Nilsson, general manager at IP sur- Video Transmissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . pg. 14
veillance manufacturer Axis Communications,
Step #7: Designing the Network. . . . . . . . . . . . . . . . . . . . . . . . . pg. 16
has authored 10 articles on how to successfuly
install an IP surveillance system that have been Step #8: Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . pg. 18
published on securityinfowatch.com and in Step #9: Hot Technologies Definining IP Surveillance: Intelligent
Security Technology & Design. Mr. Nilsson can Video, Megapixel Cameras and Immersive Imaging. . . . . pg. 20
be reached at fredrik.nilsson@axis.com.
Step #10: Best Practices for IP Surveillance Projects. . . . . . . . . pg. 22

Security Technology & Design / securityinfowatch.com 3


Video Surveillance

Originally published on SecurityInfoWatch.com 2006

Introduction: Starting a Major Video Project?


Steer Clear of the Pitfalls and Find the Smooth
Route by Using the Following 10 Steps to a
Successful IP Surveillance Installation
As IP surveillance is quickly becoming Video management tools are dependent on transport protocols along with transmis-
the most flexible and future-proof option the application and many factors have to sion methods, bandwidth, scalability and
for security and surveillance installations, be considered. Well look at considerations network security. In this article, well touch
it is important for users to understand com- of available bandwidth, storage capabilities, on all of those issues - before you encoun-
mon pitfalls, customization options and the scalability, frame-rate control and integra- ter them.
advantages of a fully digital system. tion capabilities.
Starting with the first step in February Step 8: Security
and continuing through November - and Step 4: Storage Securing video is one of the most impor-
published jointly via SecurityInfoWatch. The ability to use open storage solutions tant steps in creating a successful IP sur-
com and in Security Technology & Design is one of the main benefits with IP surveil- veillance installation. Nearly all security
magazine -- we will examine 10 steps that lance. Considerations when determining and surveillance applications contain sen-
security professionals can take in order to storage requirements include frame rate, sitive information that should not be avail-
implement a successful IP Surveillance sys- the amount of time the video needs to able to anyone with an Internet connec-
tem. These include: be stored, the required redundancy, and tion. Understanding and choosing the right
which type of storage that fits best, e.g. a security options - such as firewalls, virtual
Step 1: Choosing a network camera storage area network, or network attached private networks (VPNs) and password pro-
It is important to select cameras that storage. tection - will eliminate concerns that an IP
meet the needs of your organization and surveillance system is open to the public.
installation. This includes cameras that Step 5: Incorporating Analog
can be pan/tilt/zoom, vandal-proof, weath- Cameras Step 9: Hot Technologies
er-resistant, or fixed-dome products. Each So you have analog cameras? These also Today far more video is being recorded
type of camera can be blended into an IP- can be integrated into a network video sys- than anyone could ever monitor or search.
Surveillance system to create a total pack- tem using video servers. The analog cam- Therefore, the next big trend in IP surveil-
age that solves your security needs. Also, era is simply connected to a video server, lance is intelligent video. Advanced network
we have to consider that not all network which digitizes, compresses and transmits cameras can have built-in motion detec-
cameras are created equal. Some low-cost video over the network. Many times, this tion and event handling. In addition, more
network cameras may look appealing at is useful in reducing installation costs be- intelligent algorithms - such as number
first, but security professionals need to un- cause older equipment can continue to (license) plate recognition, people count-
derstand how the components of a network be used. However, there are instances in ing -- are being integrated into security and
camera affect the cameras performance which it is not sufficient to simply convert surveillance systems. Network cameras
and durability. an analog camera video stream into digital and intelligent video have important syner-
due to limitations in video quality. gies that make the systems more reliable
Step 2: Compression and effective than those with a digital video
All digital video surveillance systems use Step 6: Wireless Networking recorder or other centralized system.
some type of compression for the digital Sometimes wireless solutions are the
video. Without effective compression, our best and most cost-effective option for Step 10: Best Practices
networks would grind to a halt due to the security and surveillance installations. Over the last few years, thousands of IP
size of the video files. Selecting the right For example it could be useful in historic surveillance systems have been installed,
compression is vital, and includes choices buildings, where the installation of cables and many lessons have been learned.
between proprietary or industry standard would damage the interior, or within facili- These range from simple tips about camera
modes such as Motion JPEG or MPEG-4. ties where there is a need to move cameras placement and lighting conditions to work-
Compression can also determine whether to new locations on a regular basis. The ing with IT departments and technicians to
video is admissible in court cases, an im- technology can also be used to bridge sites determine issues such as the peak times for
portant consideration for security and sur- without expensive ground cabling. network usage. As we close the series, well
veillance installations. touch on these concerns.
Step 7: Designing the Network By the end of this article series, these 10
Step 3: Video Management Each network design will be specific to steps will enable any security professional
These days, video systems can evaluate the needs of the user and the specified in- to avoid pitfalls and implement best prac-
situations and take the appropriate action, stallation. Beyond the actual cameras, it is tices, making IP srveillance installations
rather than just passively recording video. important to consider IP addressing and easier to install and manage.

4 Security Technology & Design / Securityinfowatch.com


Originally published on SecurityInfoWatch.com 2006

Step #1: From Image Quality to


Progressive Scans and APIs, What You
Should Consider When Choosing a Camera
When building a surveillance system, it als need to understand how these compo- degrade the network data communication
is important to select cameras that meet nents affect the cameras performance and performance. When evaluating PoE-en-
the needs of your organization and installa- durability. abled network cameras, it is important to
tion. This includes selecting specific types Image quality Image quality is the look for those that are based on the IEEE
of cameras to meet the locations where most important feature of any camera. This standard, to ensure that any brand network
cameras are needed and the intricacies of is particularly so in surveillance and moni- switch can be chosen, providing a truly
the venue, including fixed, pan/tilt/zoom toring applications, where lives and proper- open system.
(PTZ), vandal-proof, or fixed-dome cam- ty may be at stake. Superior image quality Progressive scan Progressive scan ca-
eras. enables users to more closely follow details pability is found only in network cameras,
There are all types of network cameras and changes in images, making for better but not all network cameras have this func-
available today, and no matter what your and faster decisions. It also ensures greater tionality. Progressive scan involves expos-
needs are, a network camera is available accuracy for automated analysis and alarm ing and capturing the entire image simul-
to meet them. Although analog cameras tools, such as object recognition. taneously, as opposed to analog interlaced
are available in a similar variety, network When assessing image quality be sure to scanning which is the exposing and captur-
cameras are now offering added benefits, research the following factors: light sensi- ing of only half of the lines in the image
including better image quality and more tivity, the crispness of moving objects, and and then the other half 17msec later. With
installation flexibility. And for some special the clarity level. A cameras datasheet will interlaced scanning, if an object is moving
applications, such as very high-resolution tell part of the story, but it is a good idea to the image will become blurry. In a progres-
needs, or wireless, network cameras are field test a few cameras before making a de- sive scan image all lines are scanned in per-
the only option. cision. In addition, there are some simple fect order so there is virtually no flicker-
Selecting the right network camera is a steps you can take to ensure high quality ing effect.
critical for the success of your surveillance images - use enough light, avoid backlight While interlaced scanning may be suffi-
system. For example, retail environments and reduce contrast whenever possible. cient under certain conditions, progressive
will have different needs than schools or It is also critical to take into account the scan technology allows for far better image
highway systems, and every installation location of the cameras, especially if the quality on moving objects. In a surveillance
has some features that are more impor- cameras will be used outdoors. An auto application, this can be critical in enabling
tant than others. Some may value off-site iris lens, which automatically adjusts the the user to view detail within a moving im-
recording and storage over other features amount of light that reaches the image sen- age such as a person running away or the
such as Power over Ethernet (PoE) or alarm sor, should always be used for outdoor ap- license plate on a moving vehicle. When
management. plications. Direct sunlight should always be cameras capture moving objects, the sharp-
Off-site recording was particularly im- avoided. Mount the camera high above the ness of the frozen images depend on the
portant to Todd Jacobson, the owner of a ground to avoid a contrast effect from the technology used, and progressive scanning
Citgo Sooper Stop in North Dakota. Within sky. If the camera is mounted behind glass, consistently produces the best results in
three weeks of installing a network video the lens must be placed close to the glass to clarity and recognizing important details.
system, his convenience store was robbed. avoid reflections. If the camera will be used JPEG/MPEG4 standards It is impor-
However, because the video was stored off- at night, an infrared (IR) camera should be tant for any network camera to follow JPEG
site, the thief was unable to steal the video used generate high quality images in very and MPEG-4 standards in their entirety.
tape during the robbery, as is common with low light conditions. Many vendors claim compliance with a
traditional analog CCTV systems. Because Power over Ethernet (PoE) In most standard, but do not adhere to that stan-
of the high image quality and the offsite re- buildings today, TCP/IP infrastructure is dard 100 percent. Full adherence ensures
cording, police were able to identify and ap- available by means of Cat 5 and 6 cabling. the flexibility to use video for many differ-
prehend the perpetrator within four hours The cabling can be used for fast transport ent applications. It also guarantees that you
and Jacobson recovered all of the losses of data, and the distribution of power to de- can view the video many years from now. If
from the robbery. vices connected to the network, using PoE a camera uses one companys proprietary
This example also indicates that not all technology. PoE reduces installation costs compression technology and that company
network cameras are created equal. If Ja- by eliminating the need for power outlets goes out of business, the video will be un-
cobson had been using a low-end network at the camera locations and enables easier readable in the future. Also, if a company
camera, it is possible that image quality application of uninterruptible power sup- is following the MPEG-4 standards, ask if
wouldnt have been good enough to help the plies (UPS) to ensure continual operation, the licensing fees are paid, and how many
police identify the thief. There are many even during a power outage. licenses are included with each product.
components that go into creating a quality PoE technology is regulated by the IEEE Proprietary compression technologies are
network camera, and security profession- 802.3af standard and is designed to not also not always admissible in court, an im-

Security Technology & Design / securityinfowatch.com 5


Video Surveillance

portant consideration for security and sur- a vendor where the innovation, support, than buyers have experienced with analog
veillance applications. upgrades, and product path will be there technology. The end user has to be smart.
Extensive support of Video Management for the long term. Vendors will tell a lot of great sounding sto-
Applications The security industry mi- Just like with analog cameras, not all ries, but the user has to have a solid list of
gration to network video includes the use network cameras are created equal. Far evaluation criteria, test the different choic-
of open systems and platforms. Make sure from it, and the differences among network es, and understand the differences between
to select a network camera that has open cameras are greater and more significant the available products.
interfaces (an API or Application Program-
ming Interface), which enables a large va-
riety of software vendors to write programs Network Camera Check List Suggestions
for the cameras. This will increase your
choices in software applications and will Lens: F2.0 and auto iris for outdoor applications
ensure that you are not tied to a single ven- Image sensor: Progressive scan CCD image sensor or high
dor. Your choice of network camera should quality CMOS
never limit vendor options and functional- Resolution: 640x480
ities.
Vendor history and focus It is impor-
Frame rate: 30 frames per second
tant to make network camera decisions Video formats: MJPEG & MPEG4 at Advanced Simple Profile
based on estimations of future growth and level 5
the need for added features and functional- Power over Ethernet: 802.3af compliant
ity. This means your network camera man- Audio: G.711 or AAC-LC format
ufacturer is going to be a long-term partner. Software compatibility: Open API supported by many
Its important to choose a solid partner, so Network Video Recorder software developers
be sure to look for a company that has a
large installed base of cameras, is profit-
Security: Multi-level user name/password protection minimum
able, focuses on network camera technolo- and IP filtering and HTTPS for high security requirements
gy, and offers you local representation and Management: Built in web interface and multi-camera
support. You want to choose a camera from management application

Originally published on SecurityInfoWatch.com 2006

Step #2: MPEG-4, Motion JPEG,


MPEG-2, License Fees, Bit Rates and More:
What It All Means
Every digital video surveillance system is future proof. Selecting the right compres- how different compression formats can af-
uses compression in order to manage file sion can even determine whether video is fect your final image quality.]
size when transporting video over the net- admissible in court cases, an important There are essentially two approaches to
work for storage and viewing. Bandwidth consideration for security and surveillance compression: lossless or lossy. In lossless
and storage requirements render uncom- installations. compression, each pixel is unchanged, re-
pressed video impractical and expensive, sulting in an identical image after the im-
so compression technologies have emerged Compression Terminology age is decompressed for viewing. Files re-
as an efficient way to reduce the amount of The effectiveness of an image compres- main relatively large in a lossless system,
data sent over the network. In short, com- sion technique is determined by the com- which makes them impractical for use in
pression saves money. pression ratio, calculated as the original network video solutions. A well-known
Today there are many kinds of compres- (uncompressed) image file size divided by lossless compression format is the Graph-
sion available. Compression technology can the resulting (compressed) image file size. ics Interchange Format , better known as
be proprietary - invented and supported by At a higher compression ratio, less band- a .GIF image.
one only vendor - or based on a standard width is consumed at a given frame rate. To overcome these problems, several
and supported by many vendors. Selecting If bandwidth is kept consistent, the frame lossy compression standards have been
the right compression is vital to ensuring rate is increased. A higher compression ra- developed, such as JPEG and MPEG. The
the success of a video surveillance installa- tio also results in lower image quality for fundamental idea in lossy compression is
tion. It provides the appropriate quality at each individual image. to reduce portions of the image that ap-
the budgeted cost and ensures the system [See Images A, B, C and D to compare pear invisible to the human eye, thereby

6 Security Technology & Design / Securityinfowatch.com


storage format works and that of an MPEG
format.]
The MPEG standard has evolved since
its inception. MPEG-1 was released in 1993
and was intended for storing digital video
onto CDs. For MPEG-1, the focus was on
keeping the bit-rate (the amount of data
transmitted via the network per second)
relatively constant. However, this created
inconsistent image quality, typically com-
parable to that of videotapes.
MPEG-2 was approved in 1994 and was
designed for video on DVDs, digital high-
Image A: Zoomed out image from an Image B: A zoomed-out highly compressed definition TV, interactive storage media,
original 11MB file that has seen very little still image. The original of Image A had digital broadcast video, and cable TV. The
compression. lower compression ratio resulting in a larger MPEG-2 project focused on extending the
file size (11MB) than Image B (90KB). When MPEG-1 compression technique to cover
looking at the whole image, the quality larger, higher quality pictures with a lower
appears to be equal.
compression ratio and higher bit-rate.
For network video systems, MPEG-4 is a
major improvement from MPEG-2. It was
approved as a standard in 2000, and there
are many more tools in MPEG-4 to lower
the bit-rate needed and achieve higher im-
age qualities. MPEG-4 comes in many dif-
ferent versions. Simple Profile is the lowest
quality, while Advance Simple Profile (Part
2) provides much higher quality video. A
newer version of MPEG-4 called Part 10 (or
Image C: Zooming in on the original image Image D: But when the highly compressed AVC - Advanced Video Coding, or H.264) is
(compressed only slightly) shows the version of the image is zoomed in on, the also available.
motorcycle in the picture in relatively strong loss of data becomes evident. With a limited bandwidth available, us-
detail. ers can opt for a constant bit-rate (CBR),
which generates a constant, pre-set bit-
decreasing the size of the data transmitted full-motion video. As each individual im- rate. However, the image quality will vary
and stored. age is a complete JPEG compressed image, depending on the amount of motion in the
they all have the same guaranteed quality, scene. As an alternative, users can use a
A Note on Still Images determined by the compression ratio for variable bit-rate (VBR) where parameters
Video is essentially a stream of individual the network camera or video server. can be set to maintain high image qual-
images. The most widely accepted standard ity regardless of the motion in the scene.
for still image compression is the Joint Pho- Video Compression This option is generally preferred in sur-
tographic Expert Groups (JPEG) standard. Video compression uses a similar method veillance applications. Because the actual
It was developed in the 1980s and has been as that of still image compression. However, bit-rate will vary with VBR, the network
integrated into standard Web browsers. it adds compression between the frames to infrastructure must have enough capacity
JPEG decreases file sizes by making use of further reduce the average file size. MPEG to transport the video.
similarities between neighboring pixels in is one of the best-known audio and video
the image and the limitations of the human compression standards and was created by The MPEG-4 vs.
eye. Other lossy image compression tech- the Motion Picture Experts Group in the Motion JPEG Debate
niques include JPEG2000 and Wavelet. late 1980s. MPEG compression utilizes one As described above, MPEG-4 and Motion
JPEG is by far the most common and most frame as a reference. Each additional frame JPEG each employ a different technique for
widely supported compression standard for saves and transports only the image infor-
still images. mation that is different from the original. If
Motion JPEG is the most commonly used there is little change between the images,
standard in network video systems, how- there will be few differences resulting in
ever it is technically a still-image compres- a high compression ratio. With significant
sion technique. When employing Motion movement in the images the compression
Image E: An example of a sequence of three
JPEG compression, network cameras cap- ratio will be much lower. The video is then complete JPEG images.
ture individual images and compress them reconstructed at the viewing station based
into JPEG format - similar to a still picture on the reference image and the differ-
- and there is no compression between the ence data. MPEG video compression leads
individual frames. If a network camera cap- to lower data volumes being transmitted
tures and compresses 30 individual still im- across the network than with JPEG.
ages per second, it makes them available [Images E and F give an example of the Image F: An example showing how the
as a continuous flow of images resulting in difference between how a Motion JPEG sequence of three MPEG images is stored.

Security Technology & Design / securityinfowatch.com 7


Video Surveillance

reducing the amount of data transferred and in a MPEG-4 system, there is more latency court system, which has been leading digi-
stored in a network video system. There are before video is available at the viewing sta- tal video admissibility, requires an audit
advantages and disadvantages to each, so it tion. The viewing station needs to be more trail that describes how the images were
is best to consider the goals of the overall powerful (and hence expensive) to decode obtained, where they were stored, etc., to
surveillance system when deciding which of MPEG4, as opposed to the decoding of Mo- make sure the information is not tampered
the two standards is most appropriate. tion JPEG streams. with in any way. As digital video becomes
Due to its simplicity, Motion JPEG is of- One of the best ways to maximize the more widely adopted, the issue of admis-
ten a good choice. There is limited delay benefits of both standards is to look for net- sibility in court will be one to watch.
between image capturing, encoding, trans- work video products that can deliver simul- Compression is one of the most impor-
fer, decoding, and finally display. In other taneous MPEG-4 and Motion JPEG streams. tant factors to building a successful net-
words, Motion JPEG has very little latency, This gives users the flexibility to both maxi- work video system. It influences image and
making it most suitable for real-time view- mize image quality for recording and reduce video quality, latency, cost of the network,
ing, image processing, motion detection or bandwidth needs for live viewing. storage, and can even determine whether
object tracking. One other item to keep in mind is that video is court admissible. Because of these
Motion JPEG also guarantees image qual- both MPEG-2 and MPEG-4 are subject to considerations, it is important to choose
ity regardless of movement or image com- licensing fees, which can add additional your compression standard carefully ...
plexity. It offers the flexibility to select ei- costs to the maintenance of a network vid- otherwise, the video may be rendered ob-
ther high image quality (low compression) eo system. It is important to ask your ven- solete for your purposes.
or lower image quality (high compression), dor if the license fees are paid. If not, you
with the benefit of smaller file sizes and de- will incur additional costs later on. Does one compression
creased bandwidth usage. The frame rate standard fit all?
can easily be adjusted to limit bandwidth Other Considerations When considering this question and when
usage, without loss of image quality. Another important consideration is the use designing a network video application, the
However, Motion JPEG files are still typi- of proprietary compression. Some vendors following issues should be addressed:
cally larger than those compressed with dont adhere to a standard 100 percent or use What frame rate is required?
the MPEG-4 standard. MPEG-4 requires their own techniques. If proprietary compres- Is the same frame rate needed at
less bandwidth and storage to transfer sion is used, users will no longer be able to ac- all times?
data resulting in cost savings. At lower cess or view their files should that particular Is recording/monitoring needed at
frame rates (below 5 fps) the bandwidth vendor stop supporting that technology. all times, or only upon motion/event?
savings created by using MPEG-4 are lim- Proprietary compression also comes into For how long must the video
ited. Employing Motion JPEG network consideration if the surveillance video will be stored?
cameras with video motion detection built potentially be used in court. If so, using What resolution is required?
in, is an interesting alternative, if a higher industry standard compression ensures What image quality is required?
frame rate is only required a portion of that video evidence will be admissible. What level of latency (total time for
the time when motion is in the image. If Some courts believe that evidentiary video encoding and decoding) is acceptable?
the bandwidth is limited, or if video is to should be based on individual frames, not How robus/secure must the system be?
be recorded continuously at a high frame related to each other or manipulated. This What is the available network
rate, MPEG-4 may be the preferred option. would eliminate MPEG because of the way bandwidth?
Because of the more complex compression the information is processed. The British What is the budget for the system?

Originally published on SecurityInfoWatch.com 2006

Step #3: What to Look For in a Video


Management System, Plus How Open
and Closed Systems Differ
Video management platforms in IP sur- important component of IP surveillance support for multiple simultaneous users
veillance systems can be likened to what systems because it effectively manages and thousands of cameras.
VCRs did for pure analog systems and what video for live monitoring and recording. No matter the type or size, there are
digital video recorders (DVRs) do for hy- Video management requirements differ common features in almost every video
brid analog and digital systems. However, depending on the number of cameras, per- management system including:
unlike a simple hardware upgrade, todays formance requirements, platform prefer- Motion-Based Recording Video mo-
video management platforms also add new ences, scalability, and ability to integrate tion detection (VMD) defines activity by
possibilities in functionality, scalability and with other systems. Solutions typically analyzing data and differences in a series
integration. range from single PC systems to advanced of images. VMD can be performed at the
A video management system is a very client/server-based software that provides camera level, which is preferred, or reside

8 Security Technology & Design / Securityinfowatch.com


Device type Description Usage
in the video management software. Video
management software can provide motion Door contact Simple magnetic switch When the door is opened the camera
detection functionality to network cameras detecting opening of takes action sending full motion video
not equipped with this feature. doors or windows. and notifications.
Alarm Generation Video manage- PIR A sensor that detects When motion is detected, the camera
ment systems permit users to generate motion based on heat takes action sending full motion video
alarms based on motion. For example, pa- emission. and notifications.
rameters can be established so that alarms Glass break detector An active sensor that When an air pressure drop is detected,
are not sent during hours of normal activ- measures air pressure the camera takes action sending full
ity, such as from 8 a.m. to 9 p.m., Monday in a room and detects motion video and notifications.
through Friday. Therefore, if motion is de- sudden pressure drops.
tected at 3 a.m. on a Saturday, the system
knows that this activity is not normal, and Chart A. The range of devices that can be connected to a network cameras input port is
almost infinite.
can send e-mails or text message alerts to
the proper authorities.
Frame Rate Control Video manage- Device type Description Usage
ment allows for frame rate control - mean- Door relay A relay that controls the The locking/unlocking of a door
ing that video is monitored and recorded at opening and closing of controlled by a remote operator (over
pre-determined frame rates. It can also be door locks. the network).
configured to increase frame rates if activ- Siren Alarm siren configured The camera activates the siren either
ity is detected, or to reduce frame rates if to sound when alarm is when motion is detected using the built-
there is no motion. detected. in VMD or using information from the
Simultaneous Camera Monitoring digital input.
Video management makes it possible
for multiple users to view several different Alarm/intrusion system Alarm security system The camera acts as an integrated part
continuously monitoring of the alarm system serving as a sensor
cameras at the same time, and increase
a normally closed, or and enhancing the system with event
the resolution for cameras with activity or
normally open, alarm triggered video transfers.
alarms. This enables the system to be uti- circuit.
lized for different purposes and even differ-
ent departments (such as a system in a re- Chart B. The output ports function is to allow the camera to automatically trigger external
tail space used for both security and store devices by remote control from human operators, or software applications.
traffic studies).
Camera Management Video man- protection or intelligent video. NVRs are allow video to be managed online from any-
agement systems allow users to adminis- easier to install, however the number of where in the world, using the proper safe-
trate and manage cameras from a single cameras is often limited to four or 16, and guards such as password protection and IP
interface. This is useful for tasks such as upgrading functionality or security is not address filtering.
detecting cameras on the network, man- normally possible. It is also important to consider whether
aging IP addresses, and setting resolution, Network video systems also allow for a video management system is proprietary
compression and security levels. Cameras open systems with video management soft- and only works with network cameras from
are often located in distant or hard-to-reach ware that can be installed on a PC server select vendors. Video management soft-
locations, making it impractical for the ad- platform. Most video management systems ware should support network cameras from
ministrator to visit every location and indi- are available for the Windows operating multiple vendors to ensure flexibility. How-
vidually upgrade every camera. Video man- system, but there are also options for UNIX, ever, even if a system claims to work with
agement systems provide access to every Linux and Mac OS. many or all network cameras, the system
camera on the network and will automati- Open platform solutions run on off-the- may still not provide the same functional-
cally administer firmware upgrades. shelf hardware, with components selected ity for all types of cameras, and integration
for maximum performance. This allows may not be as seamless.
Open and Closed end users to work with their preferred
One of the first considerations when de- equipment suppliers and makes it easier Integration
signing a video management system is the to upgrade or replace damaged parts. The Video management systems based on
type of hardware platform that is used. Just systems are also fully scalable because open platforms have another advantage
like with DVRs, there are closed systems cameras can be added one at a time, and in that they can be more easily integrated
in which the software and hardware come there is no limit to the number that can be with access control devices, building man-
bundled. These are typically referred to as added or managed. Open systems are suit- agement systems (BMS), industrial control
Network Video Recorders, or NVRs. able for scenarios where large numbers of systems and audio. This allows users to
Although they are networked, NVRs are cameras are deployed. They also make it manage video and other building controls
dedicated to the specific task of recording, easier to add functionality to the system, though a single program and interface. In-
analyzing and playing back video. They such as increased or external storage, fire- tegrating a video surveillance system with
do not allow other applications to reside walls, virus protection and intelligent video access control systems allows video to be
on them, so the hardware is essentially algorithms. captured at all entrance and exit points
locked. This means that it can rarely be Some video management systems use a and for pictures in a badge system to be
altered to accommodate anything outside Web interface to access the video from any matched against images of the person actu-
of the original specifications, such as virus type of computer platform. Web interfaces ally using the access card.

Security Technology & Design / securityinfowatch.com 9


Video Surveillance

so. As employees use their cardkeys for ac- the area both for security purposes and for
cess, officers are able to match live images monitoring processes.
of the people against pictures stored in the Audio can also be easily integrated with
access control database. This also saves of- video management systems because net-
ficers from manually verifying false alarms, works can carry any type of data. Depend-
which saves time and manpower. ing on the video file format, audio can be
Video management systems also enable transported with or in tandem to the video
video to be integrated into industrial auto- stream. This reduces the need for extra ca-
mation systems or BMS, such as heating, bling - as opposed to analog systems where
ventilation, and air conditioning systems an audio cable must be installed along with
(HVAC). To do this, digital inputs and out- the coaxial. Integrating audio into the sys-
puts (I/O) provide data to the system or tem makes it possible for remote personnel
the network cameras for functionalities to hear and speak with possible perpetra-
The Michigan State Polices Forensic Science like controlling the heating or lighting in a tors. Audio can also be used as an indepen-
Lab used video management to integrate room when it is not in use. dent detection method, triggering video
network video with a building management I/O can be configured to record video or recordings and alarms when audio levels
system. send alarms in response to external sen- surpass a preset threshold.
sors. This allows remote monitoring sta- IP-based video management platforms
A prime example of integrating video tions to become immediately aware of a allow users added flexibility and control
with access control systems is the Michigan change in the monitored environment. of a surveillance system. As additional
State Polices Forensic Science Lab. When For industrial automation systems, video features are integrated into the system it
the lab moved to a new facility outside of is sometimes the only way to monitor ac- creates a more total solution for the secu-
the police compound, it installed a network tivity in a room. For example, it is often not rity and building management needs of an
video system integrated with the building possible to enter a clean room or an area organization. As we look forward to intel-
access systems. This allows off-site police containing dangerous chemicals. Integrat- ligent video, video management software
officers to visually verify that the person ing video surveillance with access control will increasingly help generate and manage
entering a secure area is authorized to do is the only way to have visual access to actionable information.

Originally published on SecurityInfoWatch.com 2006

Step #4: Understanding IP-Based Video


Storage and Server Systems, Plus How
to Calculate Storage Needs
Recording and saving video in an IP sur- data creating high demand on the storage sion. If MPEG compression is used, then bit
veillance environment requires the ability solution. rate is the key factor determining the cor-
to store large amounts of data for some- responding storage requirements.
times unspecified lengths of time. There Calculating the storage needs Storage is usually measured in Mega-
are a number of different factors to consid- In order to appropriately calculate the bytes (MB) per hour or in Gigabytes (GB)
er when selecting the appropriate storage storage requirements of a network surveil- per day. One MB equals one million bytes,
system for an installation including scal- lance system, there are a number of ele- and one GB is one billion bytes. There are
ability, redundancy and performance. ments to factor in, such as the number of eight bits per byte, and these bits are es-
Similar to the way a PC can save docu- cameras required in your installation, the sentially small pulses of information.
ments and other files, video can be stored number of hours a day each camera will be Fortunately, there are very specific for-
on a server or PC hard disk. Specialized recording, how long the data will be stored, mulas available for calculating the proper
equipment is not needed because a storage and whether the system uses motion detec- amount of storage to buy. These formulas
solution does not differentiate video data tion or continuous recording. Additional are different for Motion-JPEG and MPEG
- it is viewed as any other large group of parameters like frame rate, compression, compression because Motion-JPEG con-
files that is stored, accessed and eventually image quality and complexity should also sists of one individual file for each image,
deleted. However, video storage puts new be considered. while MPEG is a stream of data, measured
strains on storage hardware because it may The type of video compression employed in bits per second. The formulas are as fol-
be required to operate on a continual basis, also effects storage calculations. Systems lows:
as opposed to during normal business hours employing JPEG or Motion-JPEG compres- Motion JPEG
with other types of files. In addition, video sion vary storage requirements by chang- 1. Image size x frames per second x 3600s
by nature generates very large amount of ing the frame rate, resolution and compres- = KB per hour / 1000 = MB per hour

10 Security Technology & Design / Securityinfowatch.com


Frames per Hours of
Camera Resolution Image size (KB) MB/hour GB/day
second operation

No.1 CIF 13 5 234 8 1,9

No.2 CIF 13 15 702 8 5,6

No.3 4CIF 40 15 2160 12 26

Total for the 3 cameras and 30 days of storage=1002 GB

Frames per Hours of


Camera Resolution Bit Rate (kBit/s) MB/hour GB/day
second operation

No.1 CIF 170 5 76,5 8 0,6

No.2 CIF 400 15 180 8 1,4

No.3 4CIF 880 15 396 12 5

Total for the 3 cameras and 30 days of storage= 204 GB

2. MB per hour x hours of operation per located in the same PC server that runs the Technologies such as Fiber Channel are
day / 1000 = GB per day video management software. The PC and commonly used, providing data transfers at
3. GB per day x requested period of stor- the number of hard disks it can hold de- four gigabits per second (Gbps).
age = Storage need termine the amount of storage space avail- This type of hard disk configuration al-
MPEG able. Most standard PCs can hold between lows for very large and scalable solutions
1. Bit rate / 8(bits in a byte) x 3600s = KB two and four hard disks. With todays tech- where large amounts of data can be stored
per hour / 1000 = MB per hour nology, each disk can store approximately with a high level of redundancy. For ex-
2. MB per hour x hours of operation per 300 gigabytes of information for a total ca- ample, the Kentucky Department of Ju-
day / 1000 = GB per day pacity of approximately 1.2 terabytes (one venile Justice (DJJ) recently updated an
3. GB per day x requested period of stor- thousand gigabytes). analog tape storage system to a SAN sys-
age = Storage need When the amount of stored data and tem, allowing the department to install a
management requirements exceed the lim- greater number of cameras throughout its
Storage Options itations of direct attached storage, a NAS or locations and centralize the storage of re-
As previously mentioned, IP surveillance SAN and allows for increased storage space, mote video feeds. The DJJ employed EMC
does not require specialized storage solu- flexibility and recoverability. Corp.s Surveillance Analysis and Manage-
tions - it simply utilizes standard compo- NAS provides a single storage device that ment Solution (SAMS) to make the video
nents commonly found in the IT industry. is directly attached to a Local Area Network searchable. This system, which handles
This provides lower system costs, higher (LAN) and offers shared storage to all cli- hundreds of cameras, is easily expanded
redundancy, and greater performance and ents on the network (See image 2, network and managed as each individual facilities
scalability than found in DVR counterparts. attached storage). A NAS device is simple needs change.
Storage solutions depend on a PCs or to install and easy to administer, provid-
servers ability to store data. As larger hard ing a low-cost storage solution. However, it Redundant Storage
drives are produced at lower costs, it is provides limited throughput for incoming SAN systems build redundancy into the
becoming less and less expensive to store data because it has only one network con- storage device. Redundancy in a storage
video. There are two ways to approach nection, which could become problematic system allows for video, or any other data,
hard disk storage. One is to have the stor- in high-performance systems. to be saved simultaneously in more than
age attached to the actual server running SANs are high-speed, special-purpose one location. This provides a backup for
the application. The other is a storage so- networks for storage, typically connected recovering video if a portion of the storage
lution where the storage is separate from to one or more servers via fiber. Users can system becomes unreadable. There are a
the server running the application, called access any of the storage devices on the number of options for providing this added
network attached storage (NAS) or storage SAN through the servers, and the storage is storage layer in an IP surveillance system,
area networks (SANs). scalable to hundreds of terabytes. Central- including a Redundant Array of Indepen-
Direct server attached storage is prob- ized storage reduces administration and dent Disks (RAID), data replication, tape
ably the most common solution for hard provides a high-performance, flexible stor- backups, server clustering and multiple
disk storage in small to medium-sized IP age system for use in multi-server environ- video recipients.
surveillance installations (See image 1, ments. In a SAN system, files can be stored RAID RAID is a method of arranging
server attached storage). The hard disk is block by block on multiple hard disks. standard, off-the-shelf hard drives such

Security Technology & Design / securityinfowatch.com 11


Video Surveillance

that the operating system sees them as one


large hard disk. A RAID set up spans data
over multiple hard disk drives with enough
redundancy that data can be recovered if
one disk fails. There are different levels of
RAID - ranging from practically no redun-
dancy, to a full-mirrored solution in which
there is no disruption and no data loss in
the event of hard disk failure.
Data replication This is a common
feature in many network operating sys-
tems. File servers in the network are con-
figured to replicate data among each other
providing a back up if one server fails (See
image 3, data replication).
Tape backup Tape backup is an alter-
native or complementing method where a
Image 1: Server attached storage puts the video storage directly on the same server or PC as tape backup machine is installed on the
the video management software. server and records copies of all materials
saved on a periodic basis, i.e. daily or week-
ly. There is a variety of software and hard-
ware equipment available, and backup poli-
cies normally include taking tapes off-site
to prevent possible fire damage or theft.
Server clustering A common server
clustering method is to have two servers
work with the same storage device, such
Axis Network Cameras
as a RAID system. When one server fails,
the other identically configured server
takes over. These servers can even share
the same IP address, which makes the so
PC Server with called fail-over completely transparent
video management for users.
software Multiple video recipients A common
Network switch, method to ensure disaster recovery and off-
broadband router site storage in network video is to simul-
or corporate firewall taneously send the video to two different
servers in separate locations. These serv-
ers can be equipped with RAID, work in
Image 2: Network attached storage offers shared storage to all clients on the network, and is a clusters, or replicate their data with serv-
single storage device directly attached to the LAN. ers even further away. This is an especially
useful approach when surveillance systems
are in hazardous or not easily accessible
areas, like mass-transit installations or in-
dustrial facilities.
The variety of storage options avail-
able for IP surveillance systems makes
it crucial to consider the different ways
Axis Network Cameras the information will be used and stored
for the long term. As hard drive technol-
ogy continues to advance, it is impor-
tant to utilize open standards to ensure
PC Server with that storage is scalable and future proof.
video management In addition, advances in IP-surveil-
software lance - such as intelligent video algo-
Network switch, rithms - will make it even more critical
broadband router to select open storage devices that can
Separate handle combinations of data from dif-
Storage or corporate firewall
ferent sources. Storage systems should
be able to accommodate new and up-
Image 3: To not lose data upon the event of a file server failure, many companies and coming applications so that equipment
integrators are turning to data replication systems that automatically replicate data on other investments are not lost as technology
units in the even that the primary data server fails. advances.

12 Security Technology & Design / Securityinfowatch.com


Originally published in Security Technology & Design magazine June 2006

Step #5: Incorporating Analog Cameras with Video Servers


As outlined in Myth #9 of our previous
article series, The Top 10 Myths of IP Sur-
veillance (available in the archives of Se-
curityInfoWatch.com), existing analog sur-
veillance systems can easily be upgraded
to IP surveillance systems by incorporating
video servers. This allows for digital deliv-
ery and control of video without the re-
A video server blade (left) easily fits into a
placement of every camera with a network
rack (right), saving space in the server room.
camera.
By connecting existing analog cameras
to video servers, you can digitize, compress
and transmit video over the network. This
and compressed within axial cabling has not been run to a central
reduces installation costs by incorporating
the video server and sent location, it is best to use stand-alone video
older equipment into the network video
over the network via a net- servers positioned close to each camera.
system and allowing for better scalability,
work switch to a PC, which This method reduces installation costs be-
storage on standard PC servers, and remote
typically runs video management cause it uses existing network cabling to
recording and monitoring.
software for storing and monitoring transmit video, instead of running coaxial
the video. cabling to a central location. It also elimi-
Video Servers 101
A video serversometimes referred to as nates the loss in image quality that occurs
Rack-Mounted or Stand-Alone? over longer distances when video is trans-
a video encodereliminates the need for
Video servers save space by fitting into ferred through coaxial cabling. A video
dedicated equipment such as monitors and
existing server rooms, eliminating the server produces digital images, so there is
DVRs by using standard IT equipment and
need for dedicated CCTV control rooms. no quality reduction due to distance.
infrastructure. Each video server can con-
If coax cabling has already been run to a
nect between one and four analog cameras
to the network through an Ethernet port.
central room, a video server rack can be Advantages of Going Digital
used. Rack-mountable video servers come The Alaska Department of Transporta-
Like network cameras, video servers con-
as blades, which are essentially video tion recognized the advantages of a net-
tain built-in analog-to-digital conversion,
servers without their casings. This allows work video system and recently incorpo-
compression, Web and FTP servers, as well
the video servers to be placed in server rated video servers into nine of the largest
as processing power for local intelligence.
racks, which are common in IT environ- ferry terminals in the Alaska Marine High-
Incoming analog feeds are converted into
ments. way System.
digital video, transmitted over the com-
Placing blade video servers in racks al- The organization worked with integrator
puter network, and stored on PCs for easy
lows them to be managed centrally with a CamCentral to install the system, which
viewing and accessibility.
common power supply. One standard 19- uses video servers to digitize video from
Once the video is on the network, it is
inch rack that is 3U high can fit up to 48 analog cameras installed throughout the
identical to video streams coming from
channelsmeaning that up to 48 cameras ferry terminals, enabling staff, security ser-
network cameras. Analog cameras of all
can be digitized on a single rack. vices, and local law enforcement units to
typesfixed, dome, indoor, outdoor, pan/
The functionality of a blade server is ex- monitor the facilities, surrounding waters,
tilt/zoom, and specialty camerascan be
actly the same as a standalone video server. and vehicle and passenger traffic via the
integrated into network video systems us-
Blades are interchangeable and hot-swap- Internet. When the terminals are closed,
ing video servers.
pable in the rack, and they provide net- local law enforcement officials and other
A video server has a coaxial input that
work, serial communication and I/O con- authorized users can access the system
connects it to the analog camera. The
nectors at the rear of each slot. remotely and receive alerts if unusual mo-
server in turn connects to the network
In an analog camera system where co- tion is detected in the facilities. The Alaska
via an Ethernet port. All video is digitized
DOT realized a number of advantages that
video servers could bring to its analog sur-
veillance systems.
Recording, management, and storage
Because video servers use standard PCs
for video recording and management, they
are easy to integrate with existing IT sys-
tems and can be managed as part of that
infrastructure. Video servers allow video to
A network video system in which video is continuously transported over an IP network. be stored with standard storage solutions,
Video servers turn the analog security system into an IP-based video solution. including network attached storage (NAS),

Security Technology & Design / securityinfowatch.com 13


Video Surveillance

storage area networks (SAN) and Redun- Remote recording and monitoring
dant Arrays of Independent Disks (RAID). Video servers allow users to access and
These storage systems are easily expand- record video at remote locations, provided
able, reliable, cost effective, and repair- they have the appropriate authorization
able or replaceable in case of failure. By and login information. Off-site recording
contrast, DVR systems require proprietary can be beneficial in retail environments
hardware, which is more costly and diffi- where it guarantees that video is protect-
cult to replace or upgrade. CamCentral and ed during a theft on the premises. Off-site
the Alaska DOT also took advantage of the viewing allows security personnel to keep
video servers ability to handle firewalls, an eye on their establishment without be-
passwords and other network security ing on the premises. Video server installed alongside an analog
technologysomething that can rarely be Decentralization Video servers de- camera.
done with DVRs. centralize digitization and compression
Scalability Both video servers and functions, so information is handled at the cause computing power is a scarce resource
DVRs leverage existing investments in ana- source instead of in a centralized place. that video and analysis are forced to share.
log cameras, but only video servers make This opens the door for up-and-coming ap- Even networked DVRswhich incorporate
total use of network infrastructure. This plications like intelligent video, which can an Ethernet port for network connectiv-
is particularly important when expanding be used in identifying abandoned luggage at itydo not provide the same functionality
the network video system. An IP surveil- an airport or reading a license plate num- as a video server system.
lance system is expandable in one-camera ber in a parking garage. Video servers can provide cost savings
increments. DVR systems, on the other In the case of the Alaska DOT, using and more functionality than analog or DVR
hand, expand in larger increments. Once video servers allowed CamCentral to cre- systems. They create a truly digital surveil-
the capacity of a DVR is maximized, a new ate specialized motion-detection software lance system and allow users to capitalize
DVR box with 16 or more channels must be that was optimized for the marine environ- on almost all the benefits of network video
added to the system, even if only a handful ment. A centralized processing system, like while incorporating network cameras as
of cameras need to be accommodated. a DVR, cannot handle such applications be- expansion and upgrades are required.

Originally published on SecurityInfoWatch.com 2006

Step #6: Wireless Networking Options for


Surveillance Video Transmissions
Sometimes wireless solutions are the 802.11 and WLANs provides five times that, with 54 Mbps. These
best and most cost-effective option for IP Wireless local area networks (WLANs) are are the maximum data rates, but typical data
surveillance installations. For example, the basis for most wireless networks. They rates are about half that speed, and the further
wireless networks are a common choice in allow mobile users and devices to connect the device is from the access point the lower
historic buildings where the installation of to a Local Area Network (LAN) through a the bandwidth will be. 802.11b and 802.11g
cables would damage the interior. Wireless wireless connection which transmits data operate within the 2.4 GHz frequency. Keep
is also a preferred option within facilities using high frequency radio waves. The pro- in mind that higher frequencies shorten the
where there is a need to move cameras cess is similar to establishing a wireless In- distance that radio waves can reach.
to new locations on a regular basis. The ternet connection for home computers and While 802.11g is sufficient for full frame
technology can also be used to bridge sites laptops; likewise, a company can establish rate video, it operates at only 25 percent of
without expensive ground cabling, or to a WLAN allowing devices like computers a typical 100 Mbps wired connection. The
add cameras in difficult to reach locations and network cameras to connect to the next generation WLAN standard will be
such as parking lots or city centers. network and transmit video. 802.11n and the n standard will greatly
Using wireless with network cameras WLAN standards are well defined, and increase the speed of wireless data trans-
and video servers can be done in a few dif- devices from different vendors can work to- missions. This will improve the functional-
ferent ways. Some cameras come with built gether, which allows for the vendor neutrality ity of wireless IP surveillance systems as it
in wireless functionality, but any network that end-users often request. The most com- will be possible to transmit video at even
camera or video server can be incorporated monly used standard is 802.11g, which pro- higher frame rates.
into a wireless application using a wireless vides higher transfer rates over greater dis-
device point -- a device with an Ethernet tances than 802.11a and 802.11b. While the Alternatives to 802.11
port and a wireless connection or built-in popular 802.11b has a maximum data rate of Some solutions use standards other than
antenna. 11 Megabits per second (Mbps), the 802.11g 802.11, and many of these offerings can

14 Security Technology & Design / Securityinfowatch.com


provide increased performance and much Point-to-multipoint links can be done with WPA2 For even higher security, WPA2
longer distances in combination with very LOS or NLOS technology, depending on should be used. WPA2 uses Advanced En-
high security. This includes the use of mi- the needs of the surrounding area. Deploy- cryption Standard (AES) instead of TKIP.
crowaves and satellites. A microwave link ing a wireless point-to-multipoint system is AES is the best encryption available for
can provide up to 1,000 Mbps at up to 130 much more cost efficient than a wired sys- wireless networks today and is currently
miles. Satellite communication allows for tem that can require laying cabling across being used by the U.S. Government to se-
even further distances, but due to the way vast distances. cure sensitive, but not classified informa-
this system operates -- it transmits up to Mesh networks In a mesh networking tion. WPA2 is also referred to as 802.11i.
a satellite and then back down to earth -- setup, all or most devices on the network Some vendors have established propri-
the latency can be very long. This makes it are connected directly to each other. If one etary modes of securing information on a
less suitable for functions like controlling device can no longer operate, all the rest wireless network. While these systems may
camera movement and video conferenc- still communicate with each other; its the be very secure, keep in mind that these can
ing where low latency is preferred. If larger concept of a self-healing network. Mesh become cumbersome and difficult to man-
bandwidth is required, the use of satellite networks work well when cameras are lo- age when working with a variety of vendors
systems also becomes very costly. cated at scattered points, but can be very on an installation.
WiMAX, or 802.16, is the standard for expensive to establish when using wired Wireless networks can have a profound
broadband wireless access. It enables de- connections. A wireless network allows affect when used in areas it would be oth-
vices with wireless connections to operate these devices to network together without erwise impossible to deploy a surveillance
within a 30-mile range. It is being utilized the need for physical cabling. system. Ace Internet Solutions (AIS) in-
for fixed broadband wireless metropolitan stalled a wireless IP Surveillance system
access networks (WMANs), including those Security in Wireless Networks when it moved to an industrial park in Chi-
in development in San Francisco and Mil- Wireless networks allow for added flexi- cago. There had been a rash of vandalism
waukee. WiMAX supports very high up- bility in the placement of cameras and other and theft in the area, and to help combat
loading and downloading bit rates to handle networked devices throughout the system, the problem, the company wanted to install
services such as Voice over IP (VoIP). but they require added security measures. a surveillance system to monitor an area
WLANs are not necessarily bound by the which encompassed nine square blocks.
Types of Wireless Networks walls of the buildings they serve, which Because all of the network cameras
There are three major types of wireless open them up to security issues not faced were set up outdoors, running data cabling
networks, each providing different benefits with wired solutions. Due to the nature of to each of them would have been too costly
and functionalities. All three utilize wire- wireless communications, everyone with a and difficult to maintain, said Jeff Hole-
less radio waves as the primary method for wireless device within the area covered by winski, president of AIS. With a wireless
transmitting data, although there are a few the network can potentially access its ap- connection, the cameras can transmit im-
other means of transmission. plications. ages no matter where they are, even from
Point-to-point When it is necessary to To address these concerns, there are the top of light poles.
connect two buildings or sites with a high- a number of different methods for secur- Using the wireless IP surveillance system,
speed network, a point-to-point data link ing wireless networks, including Wireless AIS deployed a wireless option and later
capable of long distances and high speeds is Equivalent Privacy (WEP), WiFi Protected discovered an extensive drag racing opera-
required. These connections can be wired Access (WPA), and WiFi Protected Access tion that was using the industrial park late
-- using fiber cabling -- or wireless, using ra- 2 (WPA2), plus a number of proprietary so- at night for races. AIS worked with the Chi-
dio waves or an optical link. Point-to-point lutions. cago Police Department, which was able to
can be a good option to consider when WEP WEP encrypts data transmitted bust the ring, impound more than 100 cars,
youre faced with the challenge of trying over the WLAN. Once WEP has been estab- and make more than 300 arrests.
to create a central security command cen- lished, other typical LAN security mecha- While wireless networks have many ben-
ter when buildings are spread out among a nisms such as password protection, end-to- efits, there are still a few drawbacks. Wire-
large campus, or are separated in a town end encryption, virtual private networks, less networks can affect the frame rate and
and its suburbs. and authentication can be put in place to latency of video delivery, and bandwidth
Some wireless point-to-point links re- further ensure privacy. WEP adds encryp- is affected by the distance from the device
quire direct line-of-sight (LOS) between the tion to the communication and prevents to the access point. Wireless networks are
two points in order to establish a connec- people without the correct key from ac- also susceptible to interference by other
tion. This means there must be a direct, vis- cessing the network. However, the encryp- wireless technologies and systems.
ible path between the transmitting antenna tion code in WEP is static, which makes it However, wireless networks allow for
and the receiving antenna to establish a vulnerable to attacks with inexpensive off- cameras and other devices on the network
link. This can prove difficult in mountain- the-shelf software. Therefore it should not to be moved quickly and easily without the
ous terrain or in urban areas where taller be the only method used to secure a wire- need for expensive cabling. While there are
buildings may disrupt LOS. There are cost- less network. still limitations and security concerns, they
efficient solutions for point-to-point in the WPA WPA was created as a response to can still prove advantageous when used
900 MHz range that can transmit data a few flaws in WEP. WPA works with most wireless correctly for installations that would oth-
miles with non-line-of-site (NLOS), and up network interface cards. With WPA, the ac- erwise be too difficult or costly with wired
to 40 miles with LOS. cess key is changed with every transmitted networks. It is important to understand
Point-to-multipoint Point-to-multi- frame using Temporal Key Integrity Protocol the benefits and challenges and analyze
point distributes data from a single source (TKIP). This makes it much more secure, whether a wireless solution will meet your
to multiple targets. The typical range is up and it is now considered the basic level of organizations demands before installing
to 15 miles at data speeds up to 72 Mbps. security necessary for wireless networks. the network.

Security Technology & Design / securityinfowatch.com 15


Video Surveillance

Originally published in Security Technology & Design magazine August 2006

Step #7: Designing the Network


Networks allow devices such as network Ring In a ring network, devices are is 802.11g, which provides higher transfer
cameras, servers and PCs to communicate connected in a closed loop, meaning that rates at greater distances than 802.11a and
with each other, sharing information and, adjacent devices are directly and indirect- 802.11b.
in some cases, a common Internet connec- ly connected to other devices. MANs and
tion. Network designs can take many forms WANs often use ring configurations, but New or Existing Network?
and vary in terms of performance and se- this design can be used for LANs as well. With all of these networking options
curity. Mesh Mesh networks come in two available, it is sometimes difficult to de-
It is useful to think of building a network varieties: full and partial mesh. In a full termine whether to run IP surveillance
as a layering process, beginning with the mesh network, devices are connected di- on an existing network or to build a new
physical cabling configuration and connec- rectly to each other. In partial mesh, some network dedicated to security and surveil-
tions. The number of cameras, the physical devices are connected to all the others, lance needs.
environment, the sensitivity of the applica- while some are connected only to those Todays LANs typically offer plentiful
tion, and the protocols and software will with which they exchange the most data. bandwidth, with network switches provid-
impact the operation of the IP surveillance Mesh networks are becoming popular as ing 100 Mbit for each device connected on
network. the use of wireless technologies grows. the network. Since network cameras can
consume anywhere from 0.1Mbit to 8 Mbit,
Types of Networks Wired and Wireless Options some precaution is needed to ensure the
Networks can be local area networks Network devices can be connected over network video system will operate as in-
(LANs), metropolitan area networks wires or wirelessly. Ethernet cabling pro- tended. Depending on the number of cam-
(MANs) or wide area networks (WANs). vides a fast network at a reasonable cost eras and required frame rate, three options
Each network covers a progressively larg- and is the primary medium for most exist- are available:
er area. For example, LANs exist within a ing IT infrastructures. Ethernet connec- 1. Dedicated Network Professional
building or company, while MANs could tionswhich resemble phone jacksare surveillance applications may benefit
cover a campus or city center. WANs cover usually integrated into network cameras from a dedicated network in which the
the largest areasanything from multiple and video servers, making it easy to con- IP surveillance system has its own dedi-
distant areas to the entire world. WANs of- nect them to the network. cated switches that are connected to a
ten connect several smaller networks, such Fast Ethernet is the most common stan- high-capacity backbone (see Figure 1).
as LANs and MANs. The largest WAN is the dard used in computer networks today. It Dedicated networks handle video traffic
Internet. supports a transfer rate of 100 megabits more efficiently, without slowing down
per second (Mbit/s). Gigabit Ethernet other general-purpose network applica-
Basic Network Layout (1000 Mbit/s) is the current standard en- tions like voice over IP or file sharing. In
Networks are made up of cabling such dorsed by network equipment vendors and addition, keeping the surveillance net-
as Ethernet or fiber, and equipment such is used primarily in backbones between work separate and disconnected from
as servers, routers and hubs. There are network servers and network switches. the Internet will make it as secure asor
many ways to physically lay out net- The upcoming standard is 10 Gigabit Eth- more secure thanany local CCTV sys-
works, but the main four designs are bus, ernet (10,000 Mbit/s), which will soon be tem. Dedicated networks are preferable
ring, star and mesh. You can determine incorporated into network backbones. IP in very sensitive applications, like those
the right layout for any IP surveillance surveillance systems work with all of these in casinos or airports, and for systems re-
system by considering requirements such standards, so as networks become faster, quiring high frame rates and more than
as redundancy, cost and number of cam- they will be able to support higher-quality 50 cameras.
eras. video.
Bus A bus network connects each Another benefit of Ethernet cabling is
device to a main cable or link called the Power over Ethernet (PoE), which powers
bus, creating a simple and reliable net- devices through the network cables. This
work configuration. If one device fails, the eliminates the need to install power outlets
rest can still communicate with each other, at camera locations and enables a more
unless the bus itself is broken. This setup is continuous power supply.
most often found in older LANs. Sometimes a non-wired solution is ben-
Star Star is the most popular topol- eficial, particularly for buildings where
ogy used in LANs today. In star networks, cable installation will damage the interior,
all devices are directly connected to a cen- or where cameras will be regularly moved.
tral point. If one device is disconnected or Another common use of wireless technol-
crashes, none of the others will be affected. ogy is to bridge two buildings or sites with-
However, if the central switch goes offline, out expensive and complex ground works. Figure 1. In a dedicated network,
the entire network could fail. This makes Wireless LANs are available in a number of no other applications run over the
it important to build redundancy into the well-defined standards that allow for ven- surveillance network
system. dor neutrality. The most common standard

16 Security Technology & Design / Securityinfowatch.com


tures. In Figure 3, the router/switch man-
ages the IP addresses, bandwidth and se-
curity allocated to users on VLAN A (with
access to video) and VLAN B (general pur-
pose traffic). No matter where users might
physically be, all those on VLAN A will have
access to the video while those on VLAN B
will not.
QoS ensures that bandwidth will be
available for surveillance equipment on the
general-purpose network by setting priori-
ty levels for specific ports on a switch. Con-
nections to network cameras and storage
servers can be set at high priority, while
desktops can be set for low priority to en-
sure that bandwidth is always available for
critical surveillance video.

Transmitting Data
Once your network layout is established
and your devices are connected, informa-
Figure 2. In a combined network, the IP surveillance network and general-purpose tion will be transmitted over the network.
network operate in parallel. Transmission Control Protocol/Internet
Protocol (TCP/IP) is the most common way
to transmit all types of data. It is the pro-
tocol used for nearly every application that
2. Combination Network In some 3. Existing Network When there is runs over a network, including the Inter-
cases, it might make sense to implement a enough capacity on the network and the net, e-mail and network video systems.
dedicated IP surveillance network in con- application doesnt require heavy secu- TCP/IP has two parts: TCP breaks data
junction with a general-purpose network. rity, you may simply add network video into packets that are transmitted over the
Video can be recorded locally and isolated equipment onto the existing network. You Internet and reassembled at the destina-
to the dedicated network, except when a can further optimize your network using tion. IP is the address that enables the
viewer on the general-purpose network technologies such as virtual local area packets to arrive at the correct destination.
wants to access it, or when an event trig- networks (VLAN) and quality-of-service For identification and communication pur-
gers video to be sent to a user on the gener- (QoS) levels. poses, every device on the network needs a
al-purpose network (see Figure 2). Because A VLAN uses the existing LAN infrastruc- separate IP address.
access to video using the general-purpose ture but separates the surveillance net-
network (and the extra load it causes) is work from the general-purpose network. Network Performance
temporary, it makes sense to have the two The router/switch is configured to provide After the network is set up, it is criti-
networks work in combination. a range of IP addresses with assigned fea- cal to consider how much information will

Figure 3. The router/switch keeps data from the IP surveillance network separate
from the general network, even though they share a common infrastructure.

Security Technology & Design / securityinfowatch.com 17


Video Surveillance

pass over the network and the contingency A VPN creates a secure tunnel between software, or a combination of both. All
plan if critical components fail. points on the network, but it does not se- data entering or leaving the intranet
The amount of bandwidth required is cure the data itself. Only devices with the passes through the firewall, which ex-
dictated by the amount of information correct access key will be able to work amines it and blocks data that does not
passing through your network. In general, within the VPN, and network devices be- meet the specified security criteria. For
avoid loading a network to more than 50 tween the client and the server will not example, using a firewall, one can make
percent capacity, or you risk of overload- be able to access or view the data. With sure that video terminals are able to ac-
ing the network. When building a new a VPN, different sites can be connected cess the cameras while communication
network or adding capacity to an existing together over the Internet in a safe and from other computers will be blocked.
network, build in 30 to 40 percent more secure way. Some network cameras have built-in IP
capacity than calculated. This will pro- Another way to accomplish security is address filtering, a basic form of firewall
vide flexibility for increasing use in the to apply encryption to the data itself. In that only allows communication with
future. Bandwidth calculatorsavailable this case there is no secure tunnel like the computers that have pre-approved IP
free on the Internetwill analyze your VPN, but the actual data sent is secured. addresses.
bandwidth and recommend an appropri- There are several encryption techniques Network video systems can take a num-
ate capacity. available, like SSL, WEP and WPA. (These ber of different forms depending on the re-
latter two are used in wireless networks.) quirements of the individual installation.
Security Considerations When using SSL, also known as HTTPS, a No matter what form your network takes
With the success of the Internet, secur- certificate will be installed in the device or or what elements you choose to deploy, it
ing networks has become a mandate. Today computer that encrypts the data. is important to work with a well recognized
there are several technologies available, A firewall is designed to prevent un- and reliable vendor to ensure all compo-
such as virtual private networks (VPNs), authorized access to or from a private nents work well together and you have
SSL/TSL and firewalls. network. Firewalls can be hardware or maximized the systems functionality.

Originally published in Security Technology & Design magazine September 2006

Step #8: Security


Nearly all network video installations Authentication identifies the user to Privacy settings prevent others from us-
transmit sensitive information that should the network and is most commonly done ing or reading data on the network. There
be protected from unauthorized users and by providing verifiable information like a are a variety of privacy options available,
potential hackers. There are several ways to username and password, and/or by using including encryption, virtual private net-
provide security within a wired or wireless an X509 (SSL) certificate. works (VPNs) and Secure Socket Layer/
network and between different networks The 802.1X standard is a new port- Transport Layer Security (SSL/TLS). In
and clients. Everything from the data to the based authentication framework available some cases, these settings can slow down
use and accessibility of the network should for even higher levels of security in a both network performance because data has to
be controlled and secured. wired and wireless system. All users access be filtered through multiple applications
Today, IP surveillance systems can requests are filtered through a central au- before it is accessed at its final destination.
be made just as secure as those used by thorization point before access to the net- This could have a negative impact on the
banks for ATM transactions. Network cam- work is granted. performance of an IP surveillance installa-
eras and video servers are currently being During authorization, the system ana- tion, which often requires real-time access
used in highly sensitive locations such as lyzes the authentication information and to video.
the Logan Airport in Boston (see Case in verifies that the device is the one it claims A VPN uses a public infrastructure, such
Point, page 101) and by the largest ferry to be by comparing the provided identity as the Internet, to provide secure access
terminals in Alaska for homeland security to a database of correct and approved iden- to a network from remote locations. A
purposes. tities. Once the authorization is complete, VPN secures the communication through
the device is fully connected and opera- security procedures and tunneling pro-
Secure Transmission tional within the network. tocols like Layer Two Tunneling Protocol
Some of the most common ways to se- IP address filtering is another way to (L2TP), effectively creating a connection
cure communications on a network and restrict communication between devices that is just as secure as a privately owned
the Internet include authentication, au- on a network or the Internet. Network or leased line. The VPN creates a secure
thorization, IP address filtering, VPNs and cameras can be configured to communi- tunnel so that data has to be properly
Hypertext Transfer Protocol over Secure cate only with computers at pre-deter- encrypted before entering the tunnel.
Socket Layer (HTTPS). Some of these mined IP addressesany computer from Data that is not properly encrypted can-
methods secure the data as it travels over an IP address that is not authorized to not enter the tunnel.
the network, while others secure the net- interface with the device will be blocked SSL/TLSalso known as Hypertext
work path itself. from doing so. Transfer Protocol over Secure Socket Layer

18 Security Technology & Design / Securityinfowatch.com


Network security measures in a VPN and SSL/TLS encryption system.

(HTTPS)encrypts the data itself, rather Protected Access (WPA) encryption. user names and passwords, which should
than the tunnel in which it travels. There WEP creates a wireless network that has be at least six characters longthe longer,
are several different types of encryption, comparable security and privacy to a wired the better. Passwords should also mix lower
including SSL, Wireless Equivalent Privacy network. It uses keys to prevent people and upper cases and use a combination of
(WEP) and WiFi Protected Access (WPA) without the correct key from accessing the numbers and letters. Additionally, tools
for wireless networks. When using SSL, a network, which is the security commonly like finger scanners and smart cards can be
digital certificate can be installed from the found in home networks. Data encryption used to increase security.
server to authenticate the sender. Certifi- protects the wireless link so that other Viruses and worms are also major secu-
cates can be issued locally by the user or typical local area network security mech- rity concerns in IP surveillance systems,
by a third party such as Verisign. anismsincluding password protection, so a virus scanner with up-to-date filters
Additional network security can be cre- end-to-end encryption, VPNs and authen- is recommended. This should be installed
ated with the use of firewalls. Firewall ticationcan be put in place. on all computers, and operating systems
software normally resides on a server However, WEP has several flaws that should be regularly updated with service
and protects one network from users on make it unsuitable for use in a corporate packs and fixes from the manufacturer.
other networks. The firewall examines environment. The standard uses a static Network cameras and video servers with
each packet of information and deter- key, making it easy to hack into the net- read-only memory will also help protect
mines whether it should continue on to work with inexpensive, off-the-shelf soft- against viruses and wormsprograms that
its destination or be filtered out. The fire- ware. write themselves into a devices memory. If
wall serves as a gatekeeper, blocking or For additional protection, wireless IP you use network cameras and video servers
restricting traffic between two networks, surveillance should employ WPA, which with read-only memory, these programs
such as a video surveillance network and changes the encryption for every frame will not be able to corrupt the devices in-
the Internet. transmitted. WPA is considered the base ternal operating systems.
level of security for corporate wireless net- Employing the outlined security mea-
Wireless Security works, but for even higher security, WPA2 sures makes an IP surveillance network
Wireless network cameras can create should be used. WPA2 uses Advanced En- secure and allows users the flexibility
additional security requirements. Unless cryption Standard (AES), the best encryp- of off-site access without the worry that
security measures are in place, everyone tion available for wireless networks today. video will fall into the wrong hands. Un-
with a compatible wireless device in the derstanding and choosing the right se-
networks range is able to access the net- Protecting System Access curity optionssuch as firewalls, virtual
work and share services. To better secure In addition to protecting data, it is criti- private networks (VPNs) and password
IP surveillance installations with a wireless cal to control access to the system via a protectionwill eliminate concerns that
component, users should consider using Web interface or an application housed on an IP surveillance system is open to the
Wired Equivalent Privacy (WEP) and Wi-Fi a PC server. Access can be secured with public.

Security Technology & Design / securityinfowatch.com 19


Video Surveillance

Originally published on SecurityInfoWatch.com 2006

Step #9: Hot Technologies Defining IP


Surveillance: Intelligent Video, Megapixel
Cameras and Immersive Imaging
Network video allows for new capabili- video and alerts its operator by triggering vert and store video from analog cameras.
ties in the surveillance industry that were an alarm when there is a change to the In this type of system, all IV algorithms are
not feasible in an analog environment, ei- appropriate level of activity in the field of housed at the DVR level along with digitiza-
ther because they were impossible to im- view. IV is not designed to fully replace hu- tion of the video and video management func-
plement, or just too cumbersome. Some of man analysis. People will still be needed to tionality. In this set up, all computing power
the hottest new technologies available in a assess the entire situation and act accord- is centralized in the DVR, which means the
network video installation are intelligent ingly, because human vision is extremely number of cameras that can be analyzed is
video, megapixel cameras, and something advanced, and is impossible to replicate limited, making the system less scalable.
called immersive imaging. with mathematical algorithms. Distributed intelligence - Distributed in-
Today, far more video is being recorded IV can be used in numerous capacities, telligence can be used in a network video
than anyone could ever monitor or search. including object tracking, object counting, system using analog or network cameras.
Studies from the Sandia National Labora- license plate recognition, face recognition If analog cameras are already installed,
tories, which develops science-based tech- and object identification. For example, the video servers can be added to the system
nologies to support U.S. national security, Boston Police Department has network and used to digitize analog video and run
suggest that personnel can only watch one cameras monitoring the entryway door to IV algorithms closer to the camera level.
monitor for up to 20 minutes before los- their own building. The camera follows The processed information is then fun-
ing focus. Without some form of built-in each individual as they enter until it gets neled through a network switch to storage
algorithm compiling relevant information, enough data points for facial recognition. devices and monitoring stations.
there is simply no way to monitor all the The system then automatically compares In a network video system the edge de-
surveillance cameras in a system - unless this image against an existing database of vices -- the video servers or the network
youve got an almost unlimited budget. outstanding arrest warrants. In this way, if cameras themselves -- have built in com-
Thats where video analytics enters the someone with an outstanding warrant en- puting power to run the IV algorithms,
picture. Intelligent video (IV), the next ters the building for any reason - such as to pushing the intelligence all the way to the
big trend in video surveillance, will allow bail out a friend - the officers know within periphery of the surveillance system. This
cameras to monitor events within the field minutes whether they should detain the makes the system scale from one to thou-
of view. Advanced network cameras can person longer. sands of cameras without over burdening
have built-in motion detection and event Offering this sort of intelligence in the the centralized recording device, like in
handling. In addition, more intelligent video system creates major advantages, the the DVR scenario. It also decreases the
algorithms, such as automatic number most central of which is the ability to re- amount of video sent over the network
plate recognition (a.k.a. license plate rec- duce the workload on staff. The IV system because the cameras themselves decide
ognition) and people counting, are being is never idle. It is constantly on guard, wait- when recording is necessary. This in turn
integrated into security and surveillance ing for an impulse to send an alarm or start reduces the overall strain on the IT infra-
systems. Network cameras and IV have recording. There are a number of different structure by freeing up bandwidth for other
important synergies that make the systems ways to set up an IV surveillance system applications.
more reliable and effective than those us- and important factors, like image quality
ing analog cameras with a digital video re- that should be taken in to account. IV and Image Quality
corder (DVR) or other centralized system. Along with the mathematical algorithms,
Surveillance System image quality is of extreme importance
Intelligent Video Defined Architecture with IV for the accuracy of the IV system. Without
Different vendors have referred to IV by IV can be incorporated into an existing clear images, the best IV algorithms will
various terms including actionable intel- surveillance system, or built into the archi- not be able operate accurately. Network
ligence, video analytics, and intelligent tecture of a new system. There are two dif- cameras bring an end to the interlaced
video. No matter how it is referred to, IV ferent types of network security architec- scan problems of analog systems utilizing
turns video into actionable information, tures that utilize network video. Those two DVR technology. Interlaced images are
which allows users to receive alerts and make methods are 1) centralized intelligence, in created from two sets of lines that update
decisions regarding appropriate next steps. which all intelligence features and algo- alternately. This delay causes a blurring of
The intelligence in IV applications is rithms occur in one location, and 2) dis- the overall image. Network cameras utilize
actually a mathematical analysis of video tributed intelligence, in which the IV func- a newer technology to create images called
streams. The data can be used in a multi- tions occur at dispersed points throughout progressive scan. Progressive scan cap-
tude of ways, many of which are still under the installation. tures the entire image at once, so even with
development. The overarching idea is that Centralized intelligence This is most a high degree of object motion, the image
the surveillance system itself analyzes the common in a system utilizing DVRs to con- is clear.

20 Security Technology & Design / Securityinfowatch.com


Megapixel and Immersive Imaging
Typical DVR system
Analog video systems are tied to televi- - centralized PC
sion specifications, meaning the maximum
resolution is 0.4 megapixels when digitized.
Standard digital still cameras available
at retail stores are now 5 megapixels and IP NETWORK
1.3 megapixel cameras are built into cell
phones. Network video cameras can also
utilize megapixel technology, which has
DIGITIZATION and COMPRESSION
some obvious benefits, beyond just getting
a clearer image. Details from megapixel
Analog Cameras INTELLIGENCE
cameras are more easily recognized in the
image. More details means additional data VIDEO MANAGEMENT
points for IV algorithms, which in-turn im-
proves accuracy of the analytics. STORAGE

Immersive Imaging
Another way to utilize megapixel tech-
nology is for whats being called immer- Distributed intelligence, video servers
sive imaging. By using a wide-angle lens
attached to a megapixel camera, the cam-
era can span a much wider field of view
(some camera lenses designs even cover
a full 360 degrees) than normal cameras.
Immersive imaging facilitates digital pan/
tilt/zoom (PTZ). The result is the abil-
ity to pan, tilt and zoom in on a field of
view, even though the camera stays put.
Because there are no moving parts, us-
ers dont experience the mechanical wear
and tear that exists in analog PTZ cameras
which must physically move Theres also DIGITIZATION DIGITIZATION DIGITIZATION DIGITIZATION
COMPRESSION COMPRESSION COMPRESSION COMPRESSION
a potential gain in speed, since an analog/
mechanical PTZ can be no faster than its INTELLIGENCE INTELLIGENCE INTELLIGENCE INTELLIGENCE
drive motor.

Important Considerations
IV, megapixel and immersive imaging of-
fer a number of benefits to an existing or
new surveillance system. IV can lower the IP NETWORK
total cost of a surveillance system by gen- PC
erating fewer false alarms, and by reducing
the amount of people required to operate
the system. The surveillance system will
alert personnel as appropriate when an un-
usual event occurs. Megapixel imaging al- Distributed intelligence, network cameras
lows for even higher resolutions, which in
turn allow IV algorithms to act even more
exactly.
To be most effective it is critical to work
with vendors that employ open standards
for the use of IV. This allows the user to
DIGITIZATION DIGITIZATION DIGITIZATION DIGITIZATION
choose the best IV algorithms and appli- COMPRESSION COMPRESSION COMPRESSION COMPRESSION
cations for their needs without having to
worry about interoperability challenges. INTELLIGENCE INTELLIGENCE INTELLIGENCE INTELLIGENCE
IV, megapixel and immersive imaging re-
main hot because they will greatly improve
system performance and will continue to
evolve creating even greater user advan-
tages in the coming years. Network video IP NETWORK
is a best of breed system, utilizing open
computing platforms and storage systems, PC
which will result in new hot technologies
on the horizon faster than usual.

Security Technology & Design / securityinfowatch.com 21


Video Surveillance

Originally published on SecurityInfoWatch.com 2006

Step #10: Best Practices for


IP Surveillance Projects
Today, there are well over a million net- HP server and Windows operating platform. plify what the IT industry refers to as MACs
work cameras and video servers installed Also evaluate the speed of your network and -- Moves, Adds and Changes related to IT
worldwide. These installations range in size work with the IT department to determine equipment. When all hardware is standard-
from just a single camera to thousands of how much bandwidth is available or wheth- ized, it limits maintenance, reduces the
cameras -- and are found in almost every er network video can be piggybacked onto need for spare parts, and makes adjust-
type of industry application. No matter other infrastructure, such as that for Voice ments to the system simpler and more cost
the size, every installation benefits from a over IP (VoIP) applications. Security profes- effective. For many installations however,
simple set of best practices that will ensure sionals are often surprised as to how much it is typically not necessary to replace all
all network video equipment is optimized. equipment their organization already has at analog cameras with network cameras, so
These tips range from basic camera place- its disposal for an IP-based video system. video servers are more viable.
ment and lighting conditions to working Although existing analog cameras can
with IT departments and technicians to often be upgraded using video servers, it is Evaluate Site Conditions
figure out issues such as the peak times for sometimes necessary to make a total migra- Conditions at the camera locations will
network usage. tion to network cameras in order to simpli- largely determine which type of network
fy the installation. A large retailer recently camera should be purchased. Just as with
Take Inventory changed its analog closed-circuit television analog cameras, factors such as placing a net-
When first installing IP-based surveil- (CCTV) system to an IP-based system for work camera in an area with very little light
lance, it is important to take note of any ex- about 200 of its stores. Although the com- or exposing it to extreme heat or cold, will
isting inventory. For example, there may be pany already had some analog cameras in dictate which equipment will work best.
analog cameras currently installed or the IT place, it decided not to digitize them with Electrical outlets are another important
department may have a standardized server video servers. Instead, the retailer switched consideration. Although it may seem like a
platform in place, such as a certain type of everything over to network cameras to sim- minor consideration, it costs an average of
$300 to install power to a single location.
Today, network cameras are often installed
IP Surveillance Cost Structure in areas where power outlets do not exist
-- such as on building exteriors, in parking
lots, or on bridges. In these cases, cameras
with Power over Ethernet (PoE) function-
ality will be a major time and cost savings
because they can receive power directly
from their network cable connections. The
Installation PoE feature should be in 100 percent ac-
15% cordance with the IEEE 802.3af standard,
otherwise it will lock the buyer into propri-
etary systems that are likely not compat-
ible with equipment from other vendors.

Network cameras Determine Camera Usage


37% NVR Software In addition to site conditions, camera
11% usage also dictates the necessary speci-
fications. Network cameras range from
less than $200 for an entry-level model to
professional equipment that functions un-
der a broader range of conditions and of-
Network & Cabling fers improved functionality. For example,
17% a camera that will be used to capture ob-
jects moving at high speeds -- such as mov-
ing cars -- need a progressive scan sensor
that will reduce blur. Pan/tilt/zoom (PTZ)
Servers & Storage will be necessary for looking at objects at
20% a distance or to set up automatic patrols of
an area. Megapixel cameras provide higher
resolution and help reduce the number of
cameras needed.

22 Security Technology & Design / Securityinfowatch.com


Make Friends with IT
Beyond just taking inventory of available Analog/DVR System Cost Structure
networking equipment, the IT department
can be helpful in making sure that network
video runs smoothly and does not interfere
with other applications. While communi-
cating with people in IT jargon may seem
intimidating at first, it is very important to
build these relationships to ensure that the
integration of security and networking is
smooth. The IT department will have a vast Installation
knowledge base that will ensure an IP-sur- 21%
veillance system is installed properly, but Analog cameras
that will only happen with good collabora- 27%
tion between the two departments.
For example, the IT department will know
whether bandwidth is genuinely a concern.
In most cases, video traffic is only detrimen-
tal for older networks. In this case, it will
be time to upgrade the network according
to company protocol. The amount of band-
width has increased exponentially the last Cabling
few years, so standard network ports today 24%
are one gigabit a second, and backbones
are typically 10 gigabits a second or higher. DVR
For these networks, IP-surveillance creates 28%
no bandwidths issue whatsoever. Because
todays corporate networks are highly regu-
lated, the IT department can also ensure
that Internet Protocol version 6 (IPv6) and
Quality of Service (QoS) agreements are
supported. If bandwidth is still an issue,
network cameras have enough built-in in-
telligence that they can be programmed to
only send video based on triggering events
such as motion or time of day. ity of new attacks and security breaches. In terms of budgeting, it is important
The IT department can also help establish a Although the Internet regularly transfers to understand that the cost structure of
separate network for the video. This does not all types of sensitive information, it is nec- an IP-surveillance system is quite differ-
require running a separate set of cabling, but essary to use security safeguards, including ent from that of a CCTV system. Although
simply segmenting the video traffic from the VPNs (virtual private networks), encryp- the price of a network camera is usually
rest of the network using a network switch. tion, port-based network access control higher than that of an analog camera, the
The switch routes data to different network (IEEE 802.1X), and password protection. total system cost must be considered in
ports and boosts overall performance. order to generate a correct comparison.
The Eastchester Union Free School Dis- Manage and Budget the Project For example, network cameras include
trict, located in Westchester, N.Y., success- Besides managing equipment and the considerably more functionality than ana-
fully used network switching to utilize extra relationship with the IT department, it is log cameras, such as built-in digitalization,
bandwidth from its existing VoIP network. essential to select the right systems inte- image compression and intelligence. IP in-
Select Telecom Inc., the integrator for the grator and understand the cost structure of frastructure -- including cabling, storage,
project, worked with the district to set up an IP-surveillance system. This will help in and recording -- is also considerably less
virtual local area networks (VLANs) for the establishing -- and sticking to -- a budget expensive than analog infrastructure and
video traffic, separating the voice network and managing the project roll out. provides more functionality. (See figures 1
from the video network. One of the most important items to ask and 2 at right, explaining surveillance cost
By piggybacking the video network onto a systems integrator is how many other IP- structure.)
the voice network, we were able to save sig- based surveillance systems have they suc- IP-surveillance is rapidly gaining mo-
nificant amounts of time and money, said cessfully installed. Talk to their customers mentum. However, the technology is still
Anita Better, director of information tech- and understand whether the integrator em- frequently misunderstood, which can lead
nology for Eastchester. The cameras are so braces new technology, or if the end user had to frustration for security professionals and
bandwidth efficient that the video does not to push for the latest equipment. Integrators IT departments that try to support them.
slow down or degrade the voice network. and consultants who are not familiar with Following the basic best practices outlined
Security will also be a primary concern new technology sometimes over-specify sys- above can help simplify IP-surveillance
for the IT department. Anything that con- tems, and customers end up with equipment rollouts and ensure that the systems oper-
nects to the network opens up the possibil- and functionality they never need. ate as smoothly as possible.

Reprinted with permission from Security Technology & Design magazine and SecurityInfoWatch.com 2006

Security Technology & Design / securityinfowatch.com 23

S-ar putea să vă placă și