Showing posts with label VMS. Show all posts
Showing posts with label VMS. Show all posts

Saturday, December 16, 2023

What Can VMS for CCTV Do?

What Can VMS for CCTV Do? 

Surveillance cameras are almost taken for granted as an integral part of your commercial security system. No matter your business size, you’ve got cameras monitoring critical points in your building. The bigger your business, the more cameras you need, and the more you need to watch them. At a certain point, you’ll need a Video Management System (or Software) to comfortably operate your cameras. A flexible video management system platform doesn’t just tie your cameras together, though – it brings a few unique security solutions to your business, as well.

All NVRs and DVRs come with a rudimentary VMS for CCTV pre-installed. They’re great for smaller systems, but the functions are limited and it becomes difficult to manage footage from surveillance systems with a lot of cameras. These pre-loaded programs generally only allow you to edit basic camera settings, view live feeds, use PTZ controls, play back recorded footage, and save and export clips and screenshots.

An Open VMS for CCTV is a system that can interface with cameras and DVR’s/NVR’s from a variety of manufacturers, reducing or eliminating the hassle of dealing with proprietary cameras and systems. You don’t have to use an Open VMS, but if you’re looking for a full video management suite you’ll likely end up with one. Even if you don’t have systems from different manufacturers, the flexibility of open systems makes them valuable assets for business security.

The catch with video management systems is the initial setup and long-term maintenance. Open VMS for CCTV platforms are difficult to create and maintain, since they have to be compatible with so many brands and types of cameras. Installing them and making sure all the cameras work properly can be quite a chore.

Image Correction and Dewarping

A VMS for CCTV can also correct lens distortion common to wide-angle cameras. Fisheye lenses in particular produce a unique, heavily warped 360° image. They can be used to cover an entire room when mounted on the ceiling, but picking out details from the feed can be a challenge. video management system dewarping straightens and flips the contorted image, giving you a clearer view without adding cameras.

Some VMS programs can even create multiple image channels from one fisheye camera. The corrected images simulate multiple cameras without the trouble of paying for and installing them. You only need to store one recorded file for several feeds, cutting down on your storage needs as well.

Distributed Processing Power

With larger camera networks, a single NVR or DVR might not be enough to handle all your security cameras. Without a VMS for CCTV, you’d have to use each recorder separately to change settings and view your footage. A unified platform to manage your surveillance system makes curating your video a lot easier. A single technician or guard can monitor or review all your feeds from a central office without constantly switching servers.

Multiple Site Management

A central VMS for CCTV can handle not only multiple NVRs, it can manage multiple locations, too. This is critical for any company with more than one site, whether it’s offices, stores, warehouses, workshops, or factories. You’ll be tied into every local server, meaning you can access any site’s footage from your central security office.

Storage Redundancies

Your NVR generally stores its footage on its own internal hard drive, and it doesn’t store it forever. If that hard drive fizzles, your data goes with it unless you remembered to make regular backups. With a video management system, you can send the footage to a dedicated storage server with RAID redundancies, ensuring your data is secure.

Alarm, Audio, and Access Integration

Some VMS programs include options to integrate your other security systems, unifying your interface even further. Compatible systems can activate devices based on camera inputs, such as remote lighting, alarms, sirens, 2-way audio, or camera recording. Your access control system can also be connected to your VMS, triggering a recording or an alarm when a set of credentials is denied. If your systems are fully compatible, you can even manage your alarms and access control from the VMS.

Mobile Recording

Standard NVR/DVR VMS’s allow you to connect your smartphone and view your feeds remotely through an app. A full VMS for CCTV connects you to your main server and manage your entire security system with a few extra features. The latest VMS apps let record video directly through your phone and store it on your server, effectively turning your security guards into roving cameras.

Point-of-Sale Integration

For retail businesses, VMS programs can connect with the register to provide real-time Point-of-Sale data. Transaction analysis becomes much easier, allowing you to investigate or keep an eye on discrepancies.

Friday, September 1, 2023

Security Integration management systems

Security Integration Management Systems 

Security systems are changing at an ever-increasing pace and are becoming standard Information Technology (IT) products running over a Local Area Network (LAN) or Wide Area Network (WAN). As a result of using standard protocols such as Transmission Control Protocol/Internet Protocol (TCP/IP), the manufacturers to develop new generations of integrated systems. These systems are called System Integration as they bring together the management of all aspects of an organisation’s security. In recent years, the market for security equipment has realized the immense merits of integrating different components in a security system. However, true integration may be offered by all the manufacturers in the field today. A truly integrated security system combines the various components and yet they are all part of a more sophisticated and bigger system.

Some people use the term 'integrated' to describe a multiplexer combining full screen and multi screen images. Or a control desk containing an integrated intruder alarm PC, an integrated fence alarm PC and an integrated CCTV PC sitting next to one another. This is not true integration.

It is possible to integrate components like a public address system, CCTV, fence alarms, intruder alarms, fire alarms (life safety) and access control system within a single system. The system can be multi-station networks or even a single PC. All these components should interact with one another as a single entity. For example, whenever the fire alarm gets activated, the screen of the Visual Display Unit should pop up a new text window where detailed instruction should be given on what to do next. Simultaneously, the integrated system may release the doors meant for fire exit and display those CCTV cameras, through which the operator can view the affected area so that the operator in question can engage in a communication with the other staff and do not have to take the help of any public address system.

It is not always necessary to purchase all of the components of a system from one supplier. Manufacturers of Security Management Systems realise that the customer wants choice and will often link to components from other specialist manufacturers. Many manufacturers provide integration modules and protocols such as BACnet and OPC, and data integration methodologies such as eXtensible Markup Language (XML), ActiveX and others, which can in theory link to almost any business system. You will need to talk to individual suppliers to discover what development tools such as Software Development Kits (SDK) and Application Programming Interfaces (API) are available for integrating systems. Yes, the system should be able to function with the help of a battery backup though the duration of this backup time may vary according to the type of panels used within it. In my experience this has not been an issue, but some manufacturers are very cautious to whom they release this information. If you are a competitor it is almost impossible.

Even when protocol has been received 90% of the time it is either incorrect, incomplete or even misleading! It is essential to test product before installation, I know it is an old fashioned idea but it is really nice to see the system actually working.

Opportunities of System integration

There are a number of advantages to be gained in both the security and commercial aspects of designing and adopting an integrated system. This section lists some of the advantages that may be considered when combining separate systems into an integrated solution.

Access Control Systems (ACS)

Access Control is typically specified to provide protection to both property and employees. Generally it is thought of in terms of managing doors. However, it often extends to public areas when coupled with turnstiles, gates and barriers, or highly sensitive areas when coupled with biometrics.  If the access control and intruder alarm systems are linked together, the access control system can be programmed to automatically change, based on the type of alarm that sounds. By integrating Access Control with other systems many advantages may be realized. For example:

Fire Alarm mustering – know where your employees are at a given time.

Know which doors / areas employees are entering, or trying to enter.

Link CCTV images with access control events.

Link Time & Attendance monitoring using the same badge / token software.

Link Visitor Monitoring with Access Control & CCTV using badge / token software.

Increase security through systems such as dual card access or access using a biometric technology.

Intruder & Hold up alarm system control functions can be managed by the Access Control system.

Logical Security

Logical access control is the brother of physical access control but is often limited to secure PC logon. Integrating these two elements can significantly increase your security. For instance, you can restrict PC access to only those who have a smart card and use this to logon to your IT network. Alternatively, you can inhibit network logon if the person is not in the building, further enhancing your security.

One example is to use the CCTV system and access system to monitor and lock doors during a denial of service (DOS) attack at the same time as sending a message to the security guards. Quite often physical and logical attacks go hand in hand.

Time & Attendance (TA) monitoring

The same badge/token used to identify a person in Access Control can register them on and off work with Time & Attendance monitoring. Also as more integrated software systems become available, use of the same software to handle Access Control, Time & Attendance and Visitor Monitoring can be achieved. Remember however, that just because a person went through an Access Control door does not mean they are registered for work, especially under Working Time Directive (WTD) rules. You will need separate T&A clocking stations, albeit on the same network, to monitor working hours and software to calculate employee hours, monitor absences and WTD hours and infringements.

Human Resources (HR) / Payroll

Why enter data twice? When a new employee joins a company his personnel details are often entered into both the appropriate HR system and then again into the security system. By integrating these two systems, a subset of the employee data can automatically be transferred into the Access Control System when an employee joins. Alternatively, when an employee leaves, his rights can be automatically deleted from the Access Control System, again reducing effort and increasing security.

CCTV Systems

By integrating CCTV and other systems such as Access Control, the benefits of more than one system can be coupled to provide a more efficient and usable solution for the end user. IP camera can be integrated with Motion Sensor not only that If IP camera has I/O port you can integrate with other systems like, Hooter, Auto dialer etc. Through Video management intelligent Software you can get face reorganization, license plate reorganization etc.  For example:

Live camera views can be integrated with the Access Control Software, equally Access Control or other data can be integrated with the CCTV system.

Access Control and other security detection systems can initiate pre and post-event video recording, linking the video recording with the event information. This makes searching for events on the DVR/NVR more effective as only the event needs to be searched, for example ‘Door forced – Stores Door’ or ‘Zone 1 – Perimeter breached.’

Track individuals and record their access details against the recording to track suspect users or stolen card users.

Initiate camera presets when specific pre-determined events occur, e.g. when entering a room in a bank, switch the camera to zoom into the door to identify the individual.

Use CCTV with Time & Attendance system to detect / eradicate ‘buddy-clocking’, a practice where employees clock each other on and off work.

Intruder Alarms Systems (IAS)

By integrating intruder with other systems, the benefits of more than one system can be coupled to provide a more efficient and usable solution for the end user. For example:

Set / unset the intruder system using an access reader. No need to use the intruder keypad.

No entry delay time if main door forced. The entry timer is bypassed thus providing an instant alarm.

Disabling of access readers when the intruder system is in the armed state, to prevent false alarms due to unauthorised entry into an armed area.

Using an occupancy count from another system, the Intruder & Hold Up Alarm system can be notified that there may be persons present in the building when the system is being set.

External Perimeter Detection

One of the fundamental objectives of a security system is to provide protection at the outermost perimeter of a property. A perimeter intruder detection system can be used, linked with CCTV to provide early warnings and increased security through verification in the event of a breach. For example, external doors could be automatically locked if the perimeter system detects an abnormal event.

Fire Detection & Alarm Systems

Fire protection / Detection systems have traditionally been isolated from other building management and security systems. By integrating fire with other systems, the benefits of more than one system can be coupled to provide a more efficient and usable solution for the end user. For example:

In the event of a fire all emergency exit doors on the fire escape route need to be automatically released from an electrical point of view, but physical quick release locks may be in place to maintain security and still allow people to escape. It is common practice to install a relay in series with the electric locking mechanism controlled by the fire panel. An alternative is to feed a fire input into the Access Control System, which then automatically releases the appropriate electric locking mechanisms. The proposed link between the Access Control System and the fire system should be evaluated as part of the fire risk assessment.

In addition to providing hardware control during a fire situation, it may be necessary to provide a ‘roll call’ or ‘muster’ report to list all people in the building at the time of the fire alarm.

PA system (PAS)

In general IP paging and intercom systems are used to direct people in emergencies, control doors and control other situations such as crowd control. However, integrating such systems with others leaves the door open to new uses and can push a technology to its full potential. For example, integrating a campus’ PA system with security systems such as video surveillance could give campus security operators more control over emergency communication. Paging can be integrated with IP camera systems. Small amplifiers are used to power speakers that can be used with the cameras.

It is also important that the video management software (VMS) supports the audio. Some VMS will provide an alert if they detect a button activation from the IP camera. The VMS then allows the security person to see what is happening and then talk to the person near the IP camera.

The Digital Acoustic intercom system is independent of the VMS and uses its own Windows paging software. In this case, the security person can receive an alert from an intercom and be notified on their Windows computer. The software also allows the security person to view a nearby IP camera. This is not quite as integrated as the first method, but can provide additional security.

PA Controller should be integrate with Fire Detection system, in case of fire PA system automatic start announcement to evac said area.

Visitor Management Systems (VMS)

For many companies and organizations, a manual paper-based VMS will suffice, providing visual identity of visitors. However, computerized systems linked to Access Control and Time & Attendance systems are the natural bedfellows for integrated security systems. These not only print ID passes, but can also incorporate biometric identification and the scanning of visitor/contractor documentation, licenses, certificates and insurance certificates.

Lift Control

By integrating lift control with the access control system, access to certain floors in a building may be

Restricted, particularly outside normal working hours or in multi-tenanted buildings. To monitor of lift you can fix CCTV Camera which is integrate with Access Control.

Car Park Management (CPM)

Where access to a car park is restricted, the ISMS can automatically monitor the number of spaces left for each tenant or department and regulate access accordingly. For example:

Visually through CCTV.

Audibly through an intercom system.

Automatic number plate recognition.

Access Control tokens.

Guard Tour System (GTS)

By using a guard tour package that integrates with the access door readers can be used to define and monitor a tour by a specific guard, providing a real time indication if the guard does not reach a set point in time (or even if he arrives too early) – equally integration with the CCTV system can provide visual verification of the guard’s location and wellbeing. Many Time & Attendance systems incorporate Guard tour functions as part of their software package.

Building Management Systems (BMS)

Building management systems are responsible for monitoring and controlling the environment of a building, for example lighting control, heating and ventilation (HVAC). In the current climate of energy saving, why leave lights on when an area is unoccupied? By integrating Access Control Systems with BMS systems, the lighting can be automatically controlled by recording when people access an area. The system can also be configured to control the heating by reducing the room temperature when no one is present rather than leaving it on all day and off at night.

Electronic Point of Sale (EPOS)

The logic of integrating security systems together is evident, however if information from systems such as EPOS can be interfaced then a powerful security solution for applications in the retail market and casinos can be deployed.

Data sent from an EPOS system can be overlaid on a live video display, allowing operators to view the camera feed and till transaction simultaneously. The transaction information and alarms enerated by the EPOS system can be bookmarked and recorded alongside the video. This facilitates visual identification of an incident in both real time and through post-event analysis. Powerful transaction analysis can be undertaken on the stored data, for example, finding out when a particular credit card was used by searching every till in a store or across all stores from the head office.

Conversely, recorded video can be searched using a thumbnail feature, which displays a video still image for every transaction, allowing the operator to quickly identify the relevant footage. Evidential quality video clips and associated transaction data can be exported for investigation or use in court.

Alarms generated by the EPOS system, such as ‘register drawer left open’, ‘refund’, or ‘large dollar amount’ can automatically trigger a number of events, including displaying the nearest camera to the specific till and pinpointing the alarm on an interactive map.



Tuesday, February 1, 2022

Difference between Hub and Switch

Difference between Hub and Switch 

Network devices, or networking hardware, are physical devices that are required for communication and interaction between hardware on a TCP/IP network.

Here is the common network device list:

·        Hub

·        Switch

·        Router

·        Bridge

·        Gateway

·        Modem

·        Repeater

·        Access Point

In 2006 The Network Hub is invented at Vancouver, British Columbia, Canada. A hub is a device that connects multiple Ethernet devices on one network and makes them act together as a single network. A hub does not gather information and input in one port results as an output in all ports on the network. A switch is a networking device that performs the same job as the hub but are considered as a more intelligent hub as it gathers information about the data packets it receives and forwards it to only the network that it was intended for. A Hub is a layer-1 device and operates only in the physical network of the OSI Model.

Hubs and switches are devices that are used in data networking on the internet. These devices are used in order to connect two or more networking ports in order to transfer data along the connection. Though the primary job of hubs and switches are the same, to forward data to different networks, they work in different ways.

A hub, also known as Ethernet hub, active hub, network hub, repeater hub or multiport repeater, is a device that connects multiple Ethernet devices on one network and makes them act together as a single network. A hub has multiple input/output (I/O) ports, in which an input in one port results in it being an output in all the other ports, except the port where it was input. In layman’s terms, a hub connects many networks into one, where a data packet that is sent by one networks, is copied and pasted to all network ports, making it so that every port can see that data packet. A hub works on the physical layer or layer 1 of the Open Systems Interconnection (OSI) model. It also works as a data collision detector, sending a jamming signal to all ports if it detects collisions at one port.

It is a simple device that does not examine the data it receives or sends, while just duplicating the data and making it visible for all. The receiving port that has to decide if the data packet is actually intended for it by checking the address on the packet, before passing it on further. Since hubs only have one collision domain, constant collisions occur. Unnecessary traffic is sent to all devices on the network. Originally hubs were popular due to the high price of switches, but switches are not so expensive these days. Hubs are slowly becoming obsolete in many practices, but are still used in special circumstances.

A switch is a networking device that performs the same job as the hub; it connects network segments or devices making them act as a single network. Switches are commonly referred to as a multi-port network bridge that process and routes data on a data link layer or layer of the OSI model. Switches can also process data at the network layer (layer 3) or higher layers and are known as multilayer switches.

Switches are considered as a more intelligent hub as it gathers information about the data packets it receives and forwards it to only the network that it was intended for. When a switch receives a data packet, it examines the data address, the sender and the receiver and stores the memory, after which it then sends the data to the device that the data is meant for.

Most modern Ethernet Local Area Networks (LANs) operate on switches. Small offices and residential devices commonly use single layer switch, while bigger applications require multilayer switches. The switches use a bridge or a router in order to split a larger collision domain to smaller collision domains, resulting in lesser collisions.  Each port has an individual collision domain, allowing computers to maintain dedicated bandwidth.

Hub

Switch

Definition

A hub is a connection point for different segments of a LAN. It contains multiple ports and when it receives a packet of information at one port, it copies this packet to all segments of the LAN so that it can be viewed by all ports.

A switch is multi-port networking device that connects network devices together. A switch operates at the data link layer (layer 2) of the OSI model. A switch filters and then forwards data packets between networks.

Layer

Physical Layer (Layer 1)

Data Link Layer (Layer 2)

Spanning-Tree

No Spanning-Tree

It allows many Spanning-Trees to take place.

Type of Transmission

Broadcast

Broadcast, Uni-cast & Multicast.

Table

No MAC table. Hubs cannot learn MAC address.

Stores MAC address and maintains address.

Used in

LAN (Local Area Networks)

LAN (Local Area Networks)

No of Ports

4

24-48 depending on type of switch.

Collision

Occurs

No collision occurs

Collision Domain

One collision domain

Every port has its own collision domain.

Transmission Mode

Half duplex

Full duplex

Types of Hub

There are three types of the hub that are given below:

1.  Passive Hub

2.  Active Hub

3.  Intelligent Hub

Passive Hub: The passive hubs are the connection point for wires that helps to make the physical network. It is capable of determining the bugs and faulty hardware. Simply, it accepts the packet over a port and circulates it to all ports. It includes connectors (10base-2 port and RJ-45) that can be applied as a standard in your network. This connector is connected to all local area network (LAN) devices. Additionally, the advanced passive hubs have AUI ports, which are connected as the transceiver according to the network design.

Active Hub: As compared to a passive hub, it includes some additional features. It is able to monitor the data sent to the connected devices. It plays an important role between the connected devices with the help of store technology, where it checks the data to be sent and decides which packet to send first.

It has the ability to fix the damaged packets when packets are sending, and also able to hold the direction of the rest of the packets and distribute them. If a port receives a weak signal, but still it is readable, then the active hub reconstructs the weak signal into a stronger signal before its sending to other ports. It can boost the signal if any connecting device is not working in the network. Therefore, it helps to make the continuity of services in LAN.

Intelligent Hub: It is a little smarter than passive and active hubs. These hubs have some kinds of management software that help to analyze the problem in the network and resolve them. It is beneficial to expend the business in networking; the management can assign users that help to work more quickly and share a common pool efficiently by using intelligent hubs. However, it offers better performance for the local area network. Furthermore, with any physical device, if any problem is detected, it is able to detect this problem easily.

The important applications of a hub are given below:

·        Hub is used to create small home networks.

·        It is used for network monitoring.

·        They are also used in organizations to provide connectivity.

·        It can be used to create a device that is available thought out of the network.

Advantages of Hub

1. It provides support for different types of Network Media.

2.  It can be used by anyone as it is very cheap.

3.  It can easily connect many different media types.

4.  The use of a hub does not impact on the network performance.

5.  Additionally, it can expand the total distance of the network.

Disadvantages of Hub

1. It has no ability to choose the best path of the network.

2.  It does not include mechanisms such as collision detection.

3.  It does not operate in full-duplex mode and cannot be divided into the Segment.

4.  It cannot reduce the network traffic as it has no mechanism.

5.  It is not able to filter the information as it transmits packets to all the connected segments.

6.  Furthermore, it is not capable of connecting various network architectures like a ring, token, and ethernet, and more.