Wednesday, November 26, 2014

PoE network camera in Global market

Development of PoE network camera in Global market

Since the launching of Power over Ethernet (PoE) standard, global enterprise are eager to utilize this emerging technology in just a few years. According the latest survey, in just six years from 2008 to now, the annual increasing rate of power equipment with PoE technology will reach 33%. In 2014, global market of power devices with PoE technology will be over $5.2 billion, compound annual growth rate will be 38%.

Along with the development of worldwide security market, users start to consider deploying some network cameras and other network security devices. Network surveillance based on PoE is more and more accepted by users and have great development.
PoE (Power over Ethernet) means keeping the current Ethernet cat-5 deployment, assure interface AP for wireless network security cameras and other IP signal devise based on IP signal, at the same time, it is able to power ac electric for those kinds of devices. PoE technology use one general Ethernet cable to transmit Ethernet signal and ac electrical source simultaneously, allowing power and date to be integrated into the same cable system. In the case of guaranteeing the construction cable safety, keep normal answer operation. PoE network camera use PoE technology to realize the network video surveillance, which has power device function to use direct current main provided by power device equipment to transmit to power device via twisted-pair.
Compared to normal network camera, PoE network camera has following advantages: apart from power the connected device through Ethernet cable, PoE reduce the investment cost, as a result, it decrease the overall the deployment costs to  organize the device based on IP infrastructure. Poe not only provide the need for installing wall power connection, which dramatically reduce the plug costs related supporting end devices but also install the network connection device on the place where is hard to deploy the local alternating current power supply, to some content, provide more flexibility. We can separate PoE network camera form power device end in the practice, which can be divide into two types, normal cameras and PoE adaptor. Front end has Ethernet switch for PoE power, and back end has PoE adaptor, which will transmit the twisted cable power to network camera for the working power. Because power device is able to identify the rate of power, when we use ups to power, the advantage of saving energy is more obvious.

About Wireless Hacking

About Wireless Hacking


Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.

The step by step procedures in wireless hacking can be explained with help of different topics as follows:-


1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.

An access point (AP) is a station that provides frame distribution service to stations associated with it.

The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.



2) Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.



3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.



4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.



5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.



6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.

When the above methods fail, SSID discovery is done by active scanning



7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.



8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).



9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.



10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.



11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.



12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.



13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.



14) Wireless Network Probing :- The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.



15) AP Weaknesses :- APs have weaknesses that are both due to design mistakes and user interfaces



16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.



17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.



18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.



19) War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.

Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.



Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)

2) Turn on (Compatible) WPA / WEP Encryption

3) Change the Default SSID

4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely

Lets find out how best to protect your system from online attacks.
a)    First up don’t allow your CCTV system to respond to a ping request. You don’t want any other internet device to be able to see if your device can “talk” to it. You will be the only one able to do this once you log in to your password encrypted software. Turn the option to receive Pings off in your DVR (digital video recorder) and also in your router. You can also change the port names on the DVR if allowed.
b)    If this function is not feasible, alter the router setups to utilize Port Forwarding, so that web traffic on a certain inbound port number will be sent to the appropriate port of the DVR on your network.
c)    As mentioned above modify the password on the CCTV System with lower and uppercase leTter$ + $ymb0ls- THIS IS A NECESSITY. Make it super complicated.
d)    See to it that you regularly update the firmware on the CCTV System to keep it up to day with the latest security threats. Manufactures will regularly update their software to counteract new threats they have detected.
e)    Configure your router’s Firewall software– Unless you want to give any person on the web access to your CCTV system. With the firewall program that comes along with your router you can also ban particular IP (Internet Protocol) and MAC (computer identification nodes) addresses from accessing your CCTV system.

Monday, November 24, 2014

To 4K or not 4K video or Ultra HD

To 4K or not to 4K video or Ultra HD
Our industry’s seemingly insatiable appetite for more and more resolution has now produced a wave of interest in 4K cameras that promise exceptional clarity and sharpness, akin to the big screen, Ultra HD television sets found in consumer electronics stores and an increasing number of North American homes.
The jury is still out on whether there is an immediate need for the resolution that can overcome the downsides of increased storage and bandwidth required for running 4K cameras in a surveillance operation. Like so many things, if the cost of the camera, cost of the supporting system infrastructure and components were of no concern, this new format would likely be a more viable and attractive option for many security applications.

Here are four things to consider before making the leap to investing in and deploying 4K video:

1. What will I get with 4K that is not possible at lower resolution?
There’s no doubt that 4K technology is light years ahead of analog quality, but the reality is that the increased clarity and sharpness provided by that level of resolution is often over and beyond what is required and able to be managed by a typical security operation. For many reasons, full HD/1080P is the most commonly used resolution for new systems. The majority of security systems in use for live monitoring situation do not really benefit from such a resolution, as the human eye is well served with the details of a 1080P picture. Higher resolutions pay out when more details are required in forensic investigations.

2. Double the resolution, double the processing requirements
Users typically want to see more than one camera on one monitor, and only  occasionally switch to full screen modes. With 4K, the clarity of that multi camera view would be no clearer than what would be viewed from a lower resolution camera. In addition, delivering streams from multiple 4K cameras presents some technical challenges. The client PC and graphics card must handle a significant flow of data. The best approach is to have the live view limited to only enough resolution for the video size and screen resolution of the display.
Today a typical approach to balance PC power requirements and quality uses lower resolution streams for live view, while recording in the highest resolutions. 4K resolution taxes the workload on the network because recording the highest resolution means the full stream content moves from the camera to the NVR.

3. Limitations on form factors, lenses
The availability of affordable high resolution optics is just not there yet, and a dome style camera with a typical curved dome bubble cannot transmit the 4K resolution. In addition, a true 8MP resolution lens with appropriate coverage for the 4K sensor is quite large, which would render a 4K version of the compact dome camera (the market’s favorite form factor) essentially not possible.  The dome camera would get physically bigger which, for many customers, is a negative.

4.  Bandwidth and storage requirements
From a cost perspective, quadrupling the resolution from full HD to 4K won’t quite double the camera price. However, on the recording side it will most definitely demand more than double the storage requirements when operating under the same conditions.

Bandwidth consumption is related to processor power available on the camera. For example, the average full HD cameras deliver about 6Mbps at 30 ips. On the bright side, some manufacturers are offering full HD models with advanced compression capabilities that can reduce bandwidth consumption to about 3Mbps, with the next iteration to handle 4K video at full HD bandwidth consumption levels. Additionally new compression standards such as H.265 HVEC (High Efficiency Video Encoding) will make higher resolution bandwidth more practical for surveillance.

So where does this leave you, 4K today or not just yet? For some customers a bigger number is frequently perceived as a better solution but surveillance installations should focus on the reason the system investment is being made in the first place; protection of personnel and protection of assets. It is far from a one size fits all decision and resolution is an important tool in the system solution.

Next benchmark for video surveillance cameras is going to be the Ultra HD standard, with a resolution of 3840 x 2160 – around 8MP. Given the challenges networks may face carrying Ultra HD video streams it’s hard to say just when we will see the technology reach a tipping point.

THERE are a couple of signs worth paying attention to with Ultra HD (commonly called 4K in consumer and CCTV industries). The first is that UHD consumer monitors, which are now dropping in price at a time many homeowners’ first 1080p HD monitors may be starting to look a little tired. Something else to bear in mind is the consensus forming in digital photography that 8MP is the sweet spot that allows the best balance of low light performance and high resolution.

As most readers know, the more pixels you cram onto an imager, the smaller those pixels must be. And the smaller the pixels, the less light they can absorb. Double the number of pixels on a 1/3-inch HD sensor and you halve the light reaching the sensor. The result is that more pixels does not a perfect camera make – not unless sensor sizes increase. If it’s all about display images today, then 3MP cameras with a 1080p resolution are ideal.

But if you need digital zoom or you use a UHD monitor, then Ultra HD cameras should be a consideration. If you zoom in 2x digital with an Ultra HD image then you are viewing at 2MP, which is pretty good considering how quickly it takes an HD camera to burrow down under 4CIF when digital zoom is applied. 

Something else to bear in mind when considering digital image quality is that pixels on a digital camera’s sensor capture light in red, blue or green – not all colours at once. A layout will be a pair of green, a red and a blue in a grid pattern and onboard software then nuts out the colour value for pixels. This means there’s signal attenuating averaging going on in the background - one colour per 4 pixels.

A camera’s digital engine is also working hard to stave off false colours and moire – spacial aliasing that causes false patterns in a scene. Camera engines will blur an image slightly then sharpen it in order to lose such artifacts. Clearly, the more pixels, the more work the camera processor has to get through and this can be noticeable as latency or blurring if there’s sudden movement – like cars moving at right angles across a scene.

Lenses are another issue. An Ultra HD camera is going to need a quality lens and there’s no doubt that plenty of 1080p cameras are being sold with lenses that are not perfect. Sure, things look good in the centre of the image but out towards the edges details get muddy, especially on the sorts of deep zooms that might motivate a buyer to choose Ultra HD in the first place.

Sensor noise is also something that has to be considered at multiple levels. In low light, cameras increase exposure, elevating noise levels. Furthermore, pixel measurements are never perfect and the flaws in these signals show up on a monitor as noise. It’s unhelpful during the day and blinding at night. Digital noise reduction is the answer but DNR processing doesn’t just lose noise, it sloughs fine detail off a scene. When you look at a camera being tested in low light you can often see the areas where DNR has scrubbed and smudged a scene free of detail. It’s not a good look.

Engineers can build high resolution imagers with fewer noise problems but they need to be big – 1-inch or 1/1.5 inch sensors are ideal. A 1/1.5-inch sensor has 4x the area of the 1/3-inch sensors that typically run inside 1080p CCTV cameras. No wonder GBO’s S1080 camera (BGWT sells them in Australia) with its monster 1-inch sensor has such a great image in low light.

If the sensors are large enough, the lenses are good enough, the network is capable enough and the storage sufficient, then Ultra HD cameras will give end users a lot more detail than 3MP 1080p cameras can. But this capability has to be balanced against many things. Image quality is about more than megapixel count. 

“If a sensor is of the similar size as the equivalent HD sensor and it has 4x the pixels - low light performance will be 4x lower. And streaming bandwidth will be close to 4x larger unless better compression is used”

Keep in mind,
4K =     8.3 megapixels, aspect ratio 16:9 Horizontal resolution
1080p= 2.1 megapixel,  aspect ratio 16:9 Vertical resolution
720p=   1.3 megapixel,  aspect ratio 16:9 Vertical resolution

D1=      0.4 megapixel,  aspect ratio   4:3 Vertical resolution

Saturday, November 15, 2014

Site Surveys Planning for Your Customer

Site Surveys – Planning for Your Customer
Most of us have heard the old saying “Prior planning prevents poor performance” and nowhere is it more important than planning out a Video Surveillance System & Access Control System. Taking time upfront to make sure your survey is complete and accurate will save great amounts of time, money and energy for your installers, making both you and the customers bottom line better.

Making the sale and picking the right product are only parts of the puzzle. Camera placement, lens selection, mounting options and cable planning are all equally important to the success of a job. These elements will also help you gain the loyalty of your customer. If you’re a salesman, project manager or an estimator, at some point you’re going to have to put a project together and it will help if you know what to look for.
Of all the various parts of a CCTV system & Access Control System, the one thing the customer is going to notice above all else is a picture that doesn’t meet his expectations. He won’t care what kind of cable you used to get the picture in front of his eyes, nor will he worry about whether there’s a space in between each piece of equipment mounted in a rack. But he will know right away if he can’t see what he thought he was going to see or if what he can see is out of focus.

Picking camera and lens combinations are one of those areas that have become far easier over time. More sensitive cameras and varifocal lenses have taken most of the work out of the selection process. EM Lock installation has taken most of the work out of the selection process. It is still important however to have a good grasp of the concepts.

Focal length of a lens refers to two main things, the distance a lens can see clearly and the width of the scene a particular lens can see. Focal length is rated in millimeters. The lower the millimeter number, the wider the scene. As you go higher in millimeters, the lens becomes more telephoto and the scene width is greatly reduced. Taking the time to pick the right camera and lens combination will make for a smoother install and a happier customer and reduce the need for return visits.

One aspect of a site survey and system design that is frequently over looked is the environment itself. Not only conditions like temperature and weather extremes, but also physical aspects of the environment. I was recently out at a customer’s site looking at a parking lot through the view of his cameras. The customer told me the view was good now but in the spring when the trees bloom he cannot see anything. His system was installed in the winter when all the trees were bare. Please remember that trees grow. Those newly planted saplings will become towering oaks in a few years. Make sure they won’t impede your view now or ever.
Physical obstruction aren’t only limited to the great outdoors. Warehouses are notorious for large shelving and stacks of product. Shelves and products are subject to reconfiguration at any time. Make sure your camera placement is high enough so that it doesn’t get blocked by a stack of boxes.

It seems obvious to take things like that into consideration but I can tell you it doesn’t always happen that way. In times like we are experiencing today the need to get in and out of a project quickly becomes very important to the bottom line, but we can’t let it compromise the integrity of our system design.

Sunday, October 26, 2014

HD-TVI, HD-CVI, HD-SDI, HD-AHD, Analog & IP Camera

HD-TVI, HD-CVI, HD-SDI, AHD, Analog & IP Camera
Even we enter into digital era, analog surveillance technology doesn't stop its innovation. Besides the HD-SDI and HD-CVI (in house technology of Dahua), today the Hikvision and other camera manufacturers announce HD-TVI cameras release.  HD-TVI means High Definition Transport Video Interface,  HD-TVI is based on traditional coaxial cable for video and data transmission, it supports not only 720P/1080P video signal, but also including audio, data signal over long distance up to 500 meters.

At present, there are approximate 100 million coaxial cables are deployed for analog camera connection. In the next 3-5 years, they will be replaced with high definition camera. However, some users start to worry they have to rewire, re-install or add new network devices for upgrading. This group of users prefer the economical and easy solution to upgrade existing system to HD, rather than adopting the IP camera. In this context, the HD-SDI and HD-TVI technologies were born.

HD-TVI advantages

500 meters long range video transmission:-
As we know, HD-SDI and conventional analog solutions only has limited 100 meters video transmission. Additionally, the cost of HD-SDI equipment is more expensive. The HDTVI technology (HikVision) offers long range distance video transmission at 1080P/720P through coaxial cable.  The cost of HD-TVI products is very affordable, permit users upgrade the system with minimum investment. This makes HDTVI become a perfect solution to fit all analog surveillance applications. Furthermore, the new HDTVI technology support UTC function which can allow user to remotely control the OSD menu and PTZ control via coaxial cable. This means user can quickly install and adjust the camera without accessing the camera itself.
HDTVI Camera with CS 4mm lens
Analog high definition resolution at 720P/1080P:-
Similar to HD-CVI (in house technology from Dahua) and HD-SDI, the new HDTVI cameras can deliver real time 720P/1080P HD resolution video without video latency. The HDTVI DVRs support full time 720P/180P video recording and playback. Through using HDTVI compatible cameras and DVRs, user can setup a complete new HD analog surveillance system or easily upgrade the existing conventional analog system to HD surveillance system.
HDTVI Camera with CS 12mm lens,
Broad manufacturers to offer great compatibility:-
HDTVI equipment is HDTVI open standard, which guarantees trouble-free connection to other HDTVI-compliant cameras and DVRs. By the way, the new designed HDTVI DVR also can support traditional standard video camera for offering great flexibility.  All HDTVI HD cameras can access third party DVRs equipped with HDTVI technology from other manufacturers. The main HDTVI members including TVT, Hikvision, Hisharp, Unifore, LSVT...etc.

HD-TVI vs Analog


In summary, the advantage of HD-TVI compared with Analogue is:
1.       HD resolution on 720P/1080P at 25/30fps
2.       Long distance transmission for HD video
3.       No video quality loss and delay for transmission

HD-TVI vs HD-CVI 

Obviously, HD-TVI and HD-CVI have very similar features, both of them can provide analog high definition solutions. HD-TVI derives from American based company that does not supply to only one manufacturer. Therefore we are expecting many analog camera manufacturers will release wide range of HD-TVI based cameras to market. Therefore, HD-TVI is more likely to become an industry standard, not a proprietary technology/solution.

HD-SDI vs HD-CVI 

HD-TVI vs HD-SDI 

In conclusion, compared with HD-SDI, new HD solution with advantages of:
1.       Longer video transmission distance up to 1000ft (300m) over regular coaxial cable
2.       700ft (200m) distance for video transmission over UTP (Cat5, twisted cable)
3.       More cheaper price for analog HD system
4.       Support twisted cable installation

HD-TVI vs IP Camera

Hence, compared with IPC, the advantages of HD-TVI are
1.       No network bandwidth requirement/influence
2.       No network configuration, as easy as analog system
3.       No video quality loss and compression
4.       No video latency issue, real time live-view
5.       Long video transmission distance
6.       More affordable price for camera and video storage devices

AHD advantages

A new kind of camera: AHD Camera (Analog high definition)/HD-AHD is developing so soon in the market now.
The price is similar as Analog camera and the image effect is similar as digital camera!
The Advantages of AHD Camera:
1) AHD Camera can link with general DVR and the resolution is looks like 1000tvl analog cameras.
2) AHD Camera can link with AHD DVR, and the resolution is Megapixel High Definition ( Now have 1MP, 1.3MP already).
3) Transmit by Coaxial cable-500m!!
4) The price is similar as Analog system no matter considering DVR or camera.

HD-CVI cameras vs HD-AHD cameras

1.       1.0 megapixel AHD camera adopts OV9712 + NVP2431H solution (CMOS Chip: OV9712 & DSP Chips : Nextchip NVP2431H), while HD-CVI camera adopts the PO3100K + DH9801 solution. In addition to the difference of solution, the price vary greatly, OV9712 + NVP2431 of AHD camera module only costs US$7.5, and PO3100K + DH9801 camera module costs approximate US$11.
2.       AHD camera can connect to CRT display directly, the image can display properly. HD-CVI camera connects to traditional CRT, it doesn't show images. For video live view/recording/playback, HD-CVI cameras need to work with HD-CVI DVR. It seems, the HD-AHD cameras support 960H output mode, which is very convenient for test and installation. Since the AHD cameras can be backward compatible with all traditional analog equipment. Compared with HD-CVI, it has advantages of great compatibility.
3.       Competiable with normal D1 / 960H, and analog peripherals (including distributors, matrix, etc.). Switch AHD, IP and Anolog video signal from AHD DVR in no time.
4.       Strong anti-interference capability & solid interface protection that can avoid space high frequency electromagnetic radiation to ensure a constant signal transmission of high definition video display without problems as frame drop and lock loss occurred.

Thursday, October 23, 2014

Android Lollipop vs. Android KitKat

Android Lollipop vs. Android KitKat
Android L is a HUGE update that sees Google taking its already mature platform several steps further. The Big G has tightened up nearly every element of its mobile platform, refining the look and feel of Android across the board, as well as touching up back-end tools and protocols to make the platform even more efficient.


Android 5.0 Lollipop has now launched officially and will be initially available on a brand new Nexus 6 phablet and Nexus 9 tablet. Motorola will be next to follow up with the updates and then soon we expect news from Samsung, HTC, Sony and all the rest. HTC revealed they are planning to bring the new update on their flagship smartphones – One M7 and One M8 – within 90 days after the Google makes the final code available. A new report reveals when the Taiwanese phone maker plans to bring the Android 5.0 Lollipop update for HTC One Mini 2 and Desire 816.

Android 5.0 Lollipop vs. Android KitKat: Material

Android Lollipop is the biggest change to Android in some time, finally bumping Google's OS up a full integer to version 5.0.
It's packed with changes, but the most obvious improvements are visual.

Google's been working on getting its new "Material Design" aesthetic out in the world for months, and Lollipop is its culmination. One of Android's biggest failings up to date - including with KitKat - has been that its design language never felt unified, and with Material Design Google hopes to fix that.
The aesthetic is meant to look both flat and 3D, as if you're starting at animated paper that exists on a z-axis as well as the x and y.
Material Design reflects this with clean, bold lines and colors that transform and alter with fun animations. At its best it lets you sense the depth behind the interface, even when it's at rest and appears flat.
This extends from app icons, fonts and interfaces to simple elements like the new navigation buttons and notification bar icons, and once you get past the changes you'll likely agree that most things look better now.
The changes to Android's interface with Lollipop aren't all visual, either - voice commands with "OK Google" are more prominent now as well, and can even be used when the screen is locked and off on some devices, and there are massive improvements to notifications.

Android 5.0 L vs. Android KitKat: Notifications 

Notifications have been Android's strong suit since day one, and Google is making them even better in Android Lollipop. The big change here is that they're being integrated into the lock screen – something Google previously experimented with when it developed lock screen widgets which allowed you to view emails and events without actually unlocking your phone.
As well as making notifications the first thing you see when you pick up your handset, Google is working on making them smarter when the phone is in active use. For example, in KitKat a call would totally interrupt whatever activity you were involved in, be it reading a book, browsing your emails or playing a game. In Android Lollipop, events such as these will pop up at the top of the screen, a la Samsung’s Galaxy S5, meaning you can choose to jump to that event or ignore it with a quick tap without leaving your current task.
Compared to Android 4.4, notifications are going to be smarter, more intuitive and less intrusive than before. KitKat's notifications system is decent enough, but it was basically recycling what had come before, so it’s good to see some out-of-the-box thinking from Google in this respect.

Android 5.0 L vs. Android KitKat: Security

Google has made massive strides with Android when it comes to overall security, coming up with innovations such as pattern unlocks and facial recognition. KitKat didn't bring much new to the table in this respect, but it worked well enough. Android Lollipop's big advance is going to be about making security more convenient, and it will do this using two methods: Android Wear and your current location.
In the first case, you can use your shiny new Android smartwatch as an authentication tool to automatically bypass your phone's passcode when it detects the watch nearby. In the second example, you can designate safe zones – your home, for example – where your phone will switch off your lock code. While both of these features could potentially create a security risk, if someone steals your phone and your smartwatch, they have access to all of your personal data, for instance, but they will overcome the irksome issue of having to continually unlock your device every few minutes.

Android 5.0 Lollipop vs. Android KitKat: Battery Life

Project Butter was Google's way of making Android feel smoother and slicker, and now the company has revealed Project Volta – a system which will provide developers with a better means of determining what elements of their apps are draining battery at an unnecessary rate. Because Volta will open up the battery stats to devs, they can tinker with their code to make apps more efficient and spot potential problem areas.
Android Lollipop will also take a leaf out of HTC and Samsung's books by coming with a battery saving mode by default. This will help users get as much mileage out of each charge as possible by throttling certain functions when juice is low. Such improvements will ensure that Android L is leaps and bounds ahead of KitKat, which only offers basic stats on what process is gobbling up the most power.

Complete list of devices which will be upgraded to Android L OS will be (Confirmed):
Nexus smartphones and tablets :
Nexus 4
Nexus 5
Nexus 7
Nexus 10
Motorola smartphones:
Moto E
Moto G
Moto X
Moto G 4G
Moto G 2nd Gen
Moto X 2nd Gen
Motorola Droid Ultra
Motorola Droid Maxx
Motorola Droid Mini

Samsung smartphones and tablets:-
Samsung Galaxy S5
Samsung Galaxy S5 Mini
Samsung Galaxy S4
Samsung Galaxy S4 GPE
Samsung Galaxy Alpha
Samsung Galaxy TabPro 8.4
Samsung Galaxy TabPro 10.1
Samsung Galaxy TabPro 12.2
Samsung Galaxy Tab S 8.4
Samsung Galaxy Tab S 10.5
Samsung Galaxy A5
Samsung Galaxy A3
Samsung Galaxy Note 4
Samsung Galaxy Note Edge
Samsung Galaxy Note 3
Samsung Galaxy S3
Samsung Galaxy Note 2

Sony Xperia smartphones:-
Sony Xperia Z1
Sony Xperia Z2
Sony Xperia Z Ultra
Sony Xperia Z Ultra GPE
Sony Xperia Z1 Compact
Sony Xperia Z2 tablet
Sony Xperia Z3
Xperia Z
Xperia ZL
Xperia ZR
Xperia Tablet Z
Xperia Z1S
Xperia Z3v
Xperia Z3 Compact
Xperia Z3 Tablet Compact

HTC smartphones:-
HTC One
HTC One m7
HTC One M8
HTC One GPE
HTC One M8 GPE
HTC Desire Eye
HTC One M8 Eye
HTC One Mini
HTC One Mini 2
HTC One E8
HTC One Max
HTC Butterfly S
HTC Butterfly 2
HTC Desire 816
HTC Desire 610

LG smartphones and tablets:-
LG G2
LG G2 Mini
LG G Flex
LG G3
LG G3 Beat
LG G3 Stylus
LG G Pad 8.3
LG G Pad 8.3 GPE
LG G Pro 2

Other smartphones and tablets:-
Micromax Canvas A1 Android One Smartphone
Karbonn Sparkle V
Spice Dream Uno
Asus Zenfone 4
Asus Zenfone 4 A450CG
Asus Zenfone 5
Asus Zenfone 5 LTE
Asus Zenfone 6
Asus PadFone S
Asus PadFone Infinity 2
Xiaomi Redmi 1S
Xolo One
OnePlus One
Nvidia Shield Tablet
Huawei Ascend Mate 2.