Thursday, August 18, 2016

সিসিটিভি দেখে ৮ ঘণ্টায় ধৃত দুষ্কৃতীরা

সিসিটিভি দেখে ঘণ্টায় ধৃত দুষ্কৃতীরা

ক্লোজড সার্কিট ক্যামেরা দেখে ঘটনার আট ঘণ্টার মধ্যে এটিএম লুঠের চেষ্টায় যুক্ত দুষ্কৃতীদের চিহ্নিত করে গ্রেফতার করল পুলিশ বুধবার ঘটনাটি ঘটে কোচবিহারের দিনহাটা থানার ভেটাগুড়িতে ঘটনার আট ঘণ্টার মাথায় জনকে গ্রেফতার করে পুলিশ
পুলিশ সূত্রের খবর, ভোর সাড়ে টে নাগাদ একটি রাষ্ট্রায়ত্ত ব্যাঙ্কের এটিএমের ভিতরে ঢুকে যায় পাঁচ দুষ্কৃতী। আধ ঘন্টার মধ্যে এটিএম মেশিন খুলে নিয়ে বাইরে বেরিয়ে যায় তারা। মেশিনটি গাড়িতে তোলার চেষ্টা শুরু করে তারা। কিন্তু ভোর হয় হয় দেখে সেই মেশিন রাস্তায় ফেলে রেখেই চম্পট দেয় দুষ্কৃতী দল
এর আগেও দুবার কোচবিহার শহর সংলগ্ন এলাকা থেকে আস্ত এটিএম মেশিন নিয়ে চম্পট দেয় দুষ্কৃতীরা। কোচবিহারের পুলিশ সুপার সুনীল যাদব বলেন, পাঁচ জনকে গ্রেফতার করা হয়েছে। তাদের জিজ্ঞাসাবাদ করা হচ্ছে।
পুলিশ সূত্রের খবর, ধৃতদের নাম রফিক আহমেদ, লোকমান হাকিম, ইসমাইল রহমান, জমির হোসেন এবং বিশ্বজিৎ কার্জী। রফিক টাকাগছের বাসিন্দা। লোকমানের বাড়ি খারিজা নলধন্দরা গ্রামে। ইসমাইল নতুনপল্লির এবং বাকি দুজন কালাপানিরর বাসিন্দা
তদন্তে নেমে পুলিশ জানতে পেরেছে, ভেটাগুড়ি প্রধান সড়ক থেকে একটু ভিতরে গলিপথে ওই এটিএম কাউন্টার। সেখানে ক্লোজড সার্কিট টেলিভিশন বসানো থাকলেও রাতে কোনও নিরাপত্তা রক্ষী থাকে না। মঙ্গলবার রাত ১০টা নাগাদ ওই এটিএম মেশিনে দশ লক্ষ টাকা রাখা হয়। রাতে সেখান থেকে কিছু টাকা গ্রাহকরা তুলে নেওয়ার পরে লক্ষ ৭৯ হাজার ৬০০ টাকা ছিল
পুলিশের সন্দেহ, ওই এটিএম মেশিনে আগে থেকেই নজর ছিল দুষ্কৃতীদের। টাকা রাখার বিষয়ে নিশ্চিত হওয়ার পরেই লুঠের ছক কষে তারা। সেই হিসেবেই রাত সাড়ে ৩টে নাগাদ এটিএমে হানা দেয় ওই দলটি। সঙ্গে একটি গাড়িও নিয়ে যায় তারা। ছক অনুযায়ী, আস্ত মেশিন গাড়িতে তুলে কোথাও লুকিয়ে রাখার পরিকল্পনা করেছিল তারা। পরে সুবিধে মতো ভল্ট ভেঙে টাকা বের করে নিত তারা
তদন্তকারী পুলিশ অফিসারদের ধারণা, এই দলটি অপরাধের সঙ্গে যুক্ত থাকলেও আগে কখনও এটিএম মেশিন লুঠ করেনি তারা। বিষয়টি ধারণাও কম ছিল তাদের। সে জন্যই ভোর রাতে অপারেশন শুরু করে তারা। ওই ধরনের এটিএম মেশিন ভেঙে গাড়িতে তুলতে কম করে হলেও দুই ঘণ্টা লাগার কথা। তাতে ভোর হয়ে যাওয়াটা স্বাভাবিক ছিল
ছাড়া এটিএমের ভিতরে সিসিটিভি ক্যামেরাতে যে তাদের ছবি উঠে যাবে, তা নিয়েও সঠিক ধারণা ছিল না দুষ্কৃতীদের। তাই সেগুলি নিয়েও তারা চিন্তিত ছিল না। ভেটাগুড়ি বাজারে দুজন সিভিক ভলেন্টিয়ার পাহারায় থাকেন। বাসিন্দারা জানান, ভোরে রাস্তার মধ্যে মেশিন পড়ে থাকতে দেখে তারা সিভিক ভলেন্টিয়ারকে খবর দেন। তারা পুলিশকে খবর দেয়
ধৃতদের কাছ থেকে এটিএম মেশিন ভাঙার যন্ত্রপাতি উদ্ধার করা হয়েছে। মেশিনের কিছু যন্ত্রপাতিও উদ্ধার হয়। বাসিন্দারা বলেন, এটিমগুলির নিরাপত্তা বাড়ানো উচিত। না হলে যেখানে এটিএম মেশিন আছে সেখানে পুলিশি নিরাপত্তা বাড়ানো উচিত।


Friday, August 12, 2016

Step by Step Guide to Remote view DVR

CCTV – Guide to Remote view of DVR

This post will walk you through setting up a CCTV DVR for remote viewing on Mobile or PC.
Connect the cameras to your DVR using BNC connectors & provide the power supply to DVR.Connect a mouse to the USB port. To view the cameras the DVR can be connected to a monitor through the VGA output of DVR or to a TV through the Video out pin (you may need a BNC to RCA converter)
Connect the DVR to the Network Router (providing internet connection as well as LAN) using the RJ45 Ethernet cable. 
For this demo I’m using DVR, Camera & a Linksys Router.
Right click on DVR screen to get the Menu list.
Click on Home & then click on Network tab.
For Net Link there are two options. Static IP & DHCP.
If you select Static IP, you’ve to feed the IP address manually.
DHCP is Dynamic Host Configuration Protocol. Generally a Router is at the top of a Network & it assigns IP address to a device like DVR when connected to it.
Select this option DHCP.
Note down the IP Addresses.
Here the IP address of DVR is assigned as 192.168.1.108 & the Gateway address is 192.168.1.1 .
The Gateway address is the IP address of the Router.
To view DVR over Internet or Mobile you’ve to open two ports for the incoming traffic on your Router.
1) HTTP PORT &
2) MOBILE PORT.
At the bottom you can see HTTP port assigned as 80.This is the default port for webservice WWW.
Click on the arrow mark next to Netservice to know the Mobile port number.
Here the Mobile port number is shown as Mobile Monitor & port assigned is 34599
Now we shall see how to open these two ports 80 (HTTP) & 34599 (Mobile)  inside Router’s settings.
This process is called Port Forwarding.
PORT FORWARDING SETUP ON ROUTER.

Open a web browser like Internet Explorer or Firefox.Type in the Gateway IP address 192.168.1.1
Following table is a list of some Routers with IP address, Username & password.
In this demo we’re using a LinkSys Router.  So type in the IP 192.168.1.1
User Name is admin & password is also admin
Setup Window of Router opens.
You can note that the Router IP address as well as Network IP address are displayed.
Click on Application & Gaming tab.
Click on Port Range Forwarding tab.
Enter any name  under application , say , DVR . Under start , as well as End enter the HTTP port 80.
Select Protocol as Both. Under IP address enter the IP of DVR. Here it is 192.168.1.108.
Check mark the Enable.
Same way enter application name as DVR1 for the Mobile port enabling. Under Start & End enter 34599 .Protocol is Both & IP is the address of DVR.
Save the settings.
Now it’s time to check whether the Forwarded Ports can be seen from outside over Internet.
For this open the web browser & visit  www.canyouseeme.org
This website displays your current external IP address , along with a question “What Port ?”
Enter the HTTP port 80 & click on Check port button.
You should see a “Success : I can see your service on IP xxx.xxx.x.x on port 80 “.
Again check for the mobile port 34599 to see a success.
If you do not get a success , the port forwarding you’ve done is not correct.Again open the Router Setup & check the correct entries for port forwarding.Check whether the Enable box is checked.
Once you see Success on this site , you can go ahead with your Mobile installation.


Friday, August 5, 2016

Facility Code or Site Code

What is a Facility Code ?
There are many different proximity card formats, but the proximity cards that we sell are encoded with a "Standard" 26-Bit Wiegand format.  Like other proximity and RFID cards, an HID card is simply an ID card which enables proximity technology in its everyday functions. HID cards, as well as other types of RFID cards and smart cards, are popular for access control, as well as other functions like public transportation and employee ID.This format actually contains two sets of numbers:
  •         A 3-digit "facility code", which can range from 1-255
  •         A 5-digit "card number", which can range from 1-65,535.

Most HID proximity cards and key fobs have the 5-digit card number printed on the card.  The 3-digit facility code, however, is printed only on the box in which your cards are shipped.
Gate Keeper can be configured to interpret the Wigand data as either a 16-bit number or a 24-bit number.  The 16-bit number will contain only the 5-digit card number.  The 24-bit number will contain the facility code and card number for a total of 8 digits.  For example, if the facility code for a card is "123" and the card number is "56789" then the 24-bit (8-digit) number read from the card will be "12356789".
A Facility Code is a number encoded on access cards that is intended to represent a specific protected facility or building. Not all card formats support a Facility Code, but the most common card data format in use today does support it — the industry’s original open (i.e. non-proprietary) 26-bit format. The 26-bit format has two data fields: a Facility Code (8 bits) and a Card Number (16 bits), plus two parity bits; thus, the Facility Code number can be a number be between 0 and 255, and the Card Number can be between 0 and 65,535.
With only 65,535 card numbers available across the cards of all customers using the 26-bit card data format, duplicate card numbers are inevitable; therefore, the first purpose of the Facility Code was to enable customers in close proximity to each other to differentiate their set of cards from another customer’s cards. Ideally, each manufacturer would try to manage the facility numbers it issued to various customers in a specific area to minimize the occurrence of duplicates. A card with a Facility Code not matching those used by that specific customer would be denied access, typically generating “Access Denied – Wrong Facility Code” messages.
The 26 bit Wiegand standard format is the industry standard. Card manufacturers such as HID, Indala and AWID sell cards with this format to any dealer. This 26 bit format is recognized by all access hardware.

Over the years, formats with a higher number of bits (33, 37, 48, 50)  have been added to increase card security.


However, some of the higher bit formats are  "proprietary", and usually carry a higher price tag. One exception is the HID 37 bit proprietary format, priced similarly to a 26 bit card.


As an example, if Company A has cards numbered from 1 to 1000, with facility code 230, they would be programmed as follows:

230 - 00001

230 - 00002
230 - 00003 .......up to 230 - 01000

Company B could have the same serial numbers, but with facility code 180, and their cards would be:
180 - 00001
180 - 00002
180 - 00003........up to 180 - 01000

To grant access, an access control system validates the facility code AND the serial number.  Company A will reject Company B cards, and viceversa, even if they have the same serial number, because the facility code does not match.
The HID 37 bit Wiegand format with Facility Code is H10304.  The format consists of 2 parity bits, 16 bit Facility Code and 19 bit Cardholder ID fields.
PFFFFFFFFFFFFFFFFCCCCCCCCCCCCCCCCCCCP
EXXXXXXXXXXXXXXXXXX..................
..................XXXXXXXXXXXXXXXXXXO
P = Parity
O = Odd Parity
E = Even Parity
X = Parity mask
F = Facility Code, range = 0 to  65,535
C = Cardholder ID, range = 0 to 524,287


HID recently announced that the standard format for their Corporate 1000 proximity cards has changed from a 35 bit card format to a new 48 bit card format.

Originally, all Corporate 1000 format cards offered the 35 bit structure (“Corporate 1000 – 35”). The Program’s success created the need for a new format (“Corporate 1000 – 48”).  The larger 48 bit structure change allows for an increased number of individual cards numbers available, from just over 1,000,000 individual card numbers per format for Corporate 1000 – 35 to over 8,000,000 individual card numbers for the new Corporate 1000 – 48 format.
IMPORTANT NOTE: Prox cards are custom programmed with the facility code and start numbers requested by you. For this reason it is important to have the correct numbers at the time an order is placed.

Sunday, July 24, 2016

Access Levels and Access Areas

What's the difference between Access Levels and Access Areas?

Access Areas are enclosed parts of the site where access is controlled by a Keypad, Card Reader, or Single Door Module. This will include the Default area (commonly called 'On-site'), which is the entire site enclosed by the fence and accessed through a gate or main door. It will also include any building where the door access is controlled by an access device, any floor accessed by an elevator keypad, and any gated or walled area within the property controlled by an access device. Access areas do NOT include individually alarmed units, alarmed office areas, or any other part of the site that does not have individual access-controlled doors or gates to enter.
Access Levels combine Access Areas and Time Schedules to control access for groups of users. This allows a site to easily issue access to a user by assigning them into a specific, pre-defined Access Level, without having to select new access privileges each time a new user is entered.  
After you have set up Access Areas and Time Schedules for a site, you create access levels that combine both. Most sites only have 2 - 3 Access Levels for the site:
·         One Access Level for customers who are limited to business hours and to areas that are considered 'On-site'.
·         One Access Level for customers that have 24-hour access to 'On-site' areas of the site.
·         One Access Level for employees that have 24-hour access to all parts of the facility.
Additional Access Levels may include:
·         Customers who have 'extended hours' (such as 6:00 am - 10:00 pm) and have access to 'On-site' areas of the facility.
·         If the site has individual buildings that are keypad-controlled, a separate access level could be set up for each building with the allowed hours for that building.
·         Employees can have separate access levels by shift and areas that they are allowed into.


Saturday, July 9, 2016

Bandwidth Basics for IP CCTV Design

Bandwidth Basics for IP CCTV Design

When using IP cameras, Megapixel cameras, NVRs or even DVRs, understanding the basics about how much bandwidth is available and how much is needed is critical in planning, designing and deploying IP video surveillance systems. Copper Ethernet wiring (typically Cat-5, Cat-5e, Cat-6 or Cat-7) have a practical length limitation of 100 meters (or about 300 feet) between devices. To accommodate longer-length wired network connections, fiber can be used. 
This article is focused for a non-IT audience such as security managers, electronic technicians, sales and marketing folks.

How Much Bandwidth is Available?
To figure out how much bandwidth is available, you first need to determine what locations you are communicating between. Much like driving, you will have a starting point and destination. For example, from your branch office to your headquarters. However, unlike driving, the amount of bandwidth available can range dramatically depending on where you are going.

The most important factor in determining how much bandwidth is available is whether or not you need connectivity between two different buildings.

For instance:
In the Same Building: 70Mb/s to 700 Mb/s of bandwidth is generally available
In Different Buildings: .5 Mb/s to 5 Mb/s of bandwidth is generally available
The amount of bandwidth available going from your office to a co-worker's office in the same building can be 200 times more than the bandwidth from your office to a branch office down the block.
This is true in 90% or more cases. Note the following exceptions:
If these are different buildings but on the same campus, more bandwidth may be available.
If you are in a central business district of a major city, more bandwidth may be available.
If you are a telecommunications or research company, more bandwidth may be available.


Different Buildings
The key driver in bandwidth availability is the cost increase of deploying networks between buildings. Generally referred to as the Wide Area Network or WAN, this type of bandwidth is usually provided by telecommunications companies. One common example is cable modem or DSL, which can provide anywhere from 0.5 Mb/s to 5 Mb/s at Rs. 3000 to Rs. 5000 per month. Another example is a T1, which provides 1.5Mb/s for about Rs. 8000 to Rs. 16000 per month. Above this level, bandwidth generally becomes very expensive.

Many talk about fiber but fiber to the building is not and will not be widely available for years. Fiber to the home or to the business promises to reduce the cost of bandwidth significantly. It is very expensive to deploy and despite excited discussions for the last decade or more, progress remains slow.


Same Buildings
By contrast, bandwidth inside of buildings (or campuses) is quite high because the costs of deploying it are quite low. Non technical users can easily set up a 1000Mb/s networks inside a building (aka Local Area Networks or LANs) for low installation cost with no monthly costs. The cost of deploying networks in buildings are low because there are minimal to no construction expenses. When you are building a network across a city, you need to get rights of ways, trench, install on telephone poles, etc. These are massive projects that can easily demand millions or billions of dollars in up front expenses. By contrast, inside a building, the cables can often by quickly and simply fished through ceilings (not the professional way to do it but the way many people do it in deployments).


A lot of discussion about wireless (WiMax, WiFi, 3G, 4G etc) exists but wireless will not provide significantly greater bandwidth nor significantly better costs than DSL or cable modem. As such, wireless will not solve the expense and limitations of bandwidth between buildings. That being said, wireless absolutely has benefits for mobility purposes and connecting to remote locations that DSL or cable modem cannot cost effectively serve. The point here is simply that it will not solve the problem of bandwidth between buildings being much more expensive than bandwidth inside of buildings.


How Much Bandwidth Do IP Cameras Consume?
For the bandwidth consumption of an IP camera, use 1 Mb/s as a rough rule of thumb. Now, there are many factors that affect total bandwidth consumption. You can certainly stream an IP camera as low as 0.2 Mb/s (or 200 Kb/s) and others as high as 6 Mb/s. The more resolution and greater frame rate you want, the more bandwidth will be used. The more efficient the CODEC you use, the less bandwidth will be used.
For the bandwidth consumption of a Megapixel camera, use 5 Mb/s to 10 Mb/s as a rough rule of thumb. Again, there are a number of factors that affect total bandwidth consumption. A 1.3MP camera at 1FPS can consume as little as 0.8 Mb/s (or 800 Kb/s) yet a 5 megapixel camera can consume as much as 45 Mb/s.



What Does this Mean for my IP Video System?
Just like dealing with personal finance, we can now figure out what we can 'afford':
Between Buildings: We have 0.5 Mb/s to 5 Mb/s to 'spend'
Inside Buildings: We have 70 Mb/s to 700 Mb/s to 'spend'
IP cameras: Cost us 1 Mb/s each
Megapixel cameras: Cost us 5 Mb/s to 10 Mb/s each



Using these points, we can quickly see what combination of IP and megapixel cameras we can use between buildings or inside of buildings.
Inside of buildings, it is easy to stream numerous IP and megapixel cameras.
Between buildings, it is almost impossible to stream numerous IP and megapixel cameras.
Because of this situation, the standard configuration one sees in IP Video systems is:
A local recorder at each building/remote site. The local recorder receives the streams from the building and stores them.


The local recorder only forwards the streams (live or recorded) off-site when a user specifically wants to view video. Rather than overloading the WAN network with unrealistic bandwidth demands all day long, bandwidth is only consumed when a user wants to watch. Generally, remote viewing is sporadic and IP video coexists nicely with the expensive Wide Area Network.

The local recorder has built-in features to reduce the bandwidth needed to stream video to remote clients. Most systems have the ability to reduce the frame rate of the live video stream or to dynamically reduce the video quality to ensure that the video system does not overload the network and that remote viewers can actually see what is going on the other side. Generally, the live video stream is sufficient to identify the basic threat. In any event, bandwidth is generally so costly, especially the upstream bandwidth needed to send to a remote viewer, that this is the best financial decision.

Friday, July 1, 2016

Ethernet Splitter

Ethernet Splitter

An Ethernet splitter can split a single Internet connection so that two or more computers can connect to the Internet simultaneously. It can also create additional connections for other computers on a network, which can reduce the overall amount of cabling required to setup a network. Unfortunately, Ethernet splitters cannot resolve the network collision issues that may occur if the computers connected to the splitter are using the same network resources simultaneously.
The CAT 5E Ethernet splitter allows two separate devices to share the same Ethernet cable. Ethernet splitters are generally used in pairs, with one CAT 5E splitter at the outlet and another Ethernet splitter at the patch panel. This allows for several wiring configurations to connect more devices to your network. Primus Cable offers both Ethernet splitter adapters and pigtail type Ethernet splitters.

The Ethernet Splitter for 1x VOIP + 1x PC, Pigtail Type, 10/100 BaseT 1P/2J 07 splits the signal from one CAT 5E Ethernet cable among two RJ45 connections. This Ethernet splitter is ideal for both domestic and commercial applications. We have both type 7 and type 8 Ethernet splitter adapters. By utilizing this device, two computers can share one CAT 5E Ethernet port. If the router has only one RJ45 port, then an Ethernet switch will be required to run multiple PCs off one signal at the same time.

Our phone cable is commonly used for 10Base-T and 100Base-T networking, particularly for telephone and low speed data applications. We stock both phone cable for plenum and for riser applications. If your project involves installation in plenums or air spaces, the CAT 3 Bulk Cable, Plenum CMP Solid UTP 25Pair 24AWG, 1000, White is a wise choice.


This phone cable features 25 unshielded solid copper pairs in a 24 AWG diameter cable. This phone cable is ideal for indoor voice communications applications, and is supplied on a wooden spool. This CAT 3 phone cable is also easy to install with its color striped pairs.


Primus Cable provides a wide assortment of networking and telco tools for your installation project. EZ-RJPRO™ HD Ratchet Crimp Tool is the professionals’ choice when working with CAT 5E and CAT 6 RJ45 connectors. It also works well with EZ-RJ12/RJ11 connectors. This crimping tool functions as a wire cutter, stripper, and crimping tool all in one. The ratcheted straight action crimping motion ensures a uniform crimp every cycle. Features precision cast crimping dies for superior accuracy. 



How to Connect an Ethernet Splitter
Step 1 – Insert one end of the Ethernet splitter into the primary Ethernet port of the device that is providing the network connection (such as the cable/DSL modem or Internet router).
Step 2 – Insert the Ethernet cables from the devices to be connected (such as a computer, printer, or scanner) into the Ethernet splitter. Users often connect a printer and computer to the splitter in order to minimize the frequency with which network collisions occur while sharing the connection.
Step 3 – Test the connection of the devices on the splitter to ensure that they can connect to network resources.

How to Make an Ethernet Splitter
Step 1 – Procure the following materials: a short Ethernet cable, 2 x RJ45 keystone jacks, electrical tape, super glue, and crimp tool.
Step 2 – Crimp one end of the Ethernet cable so that the wire’s ends are visible. Leave the other end of the cable in-tact.
Step 3 – Follow the directions that come with the keystone jacks to open them, then place the wires from the Ethernet cable into the jacks to split the connection. Place the white and orange wires into Pin #1, the orange wire into Pin #2, the white and green wires into Pin #3, and the green wire into Pin #6. On the second keystone jack, place the white and blue wires into Pin #1, the blue wire into Pin #2, the white and brown wires into Pin #3, and the brown wire into Pin #6.
Step 4 – Glue the jacks to each other by the sides with super glue, then snap them together.
Step 5 – Wrap electrical tape around any exposed wires and begin using the new Ethernet splitter.

This diagram works in a half duplex mode which provides communication in both directions, but only one direction at a time. Under normal operation, each port is constantly sensing any traffic through its receiving pair of wire. As long as it can sense that data is being processed, it will not start sending data. The significance of this operation is to avoid collision where two ports are sending data at the same time, and due to this phenomenon, data will be discarded. When this issue is resolved by both computers, they will start to transmit at random amount of time. The circuit employs the method known as Carrier Sense Multiple Access / Collision Detecion (CSMA/CD) wherein it allows the devices to take turns using the signal carrier line. In this operation, the hub’s primary task is to allow each port to check the signal level of the line to determine whether someone is already using it. The device waits for a few seconds if it is in use, or it transmits otherwise.