Sunday, May 1, 2011

Reduce Crime with Wireless/ non-Wireless CCTV Systems

CCTV Cameras are probably the best ways to reduce crime with your business or home, and there are numerous of places to purchase CCTV equipment. Below are a few factors to consider once shopping for CCTV cameras that will help you save time and expense, as well as help you to preferable to protect your home.

CCTV systems are used in public places all over the world for crime prevention. Or in the case of a crime being committed, the footage from the cameras can be used to apprehend and convict the perpetrators, perhaps even recover stolen property. And if they are wireless CCTV systems, it’s even more convenient.

CCTV systems for homes and work are, of course, not as elaborate as the ones used in huge malls or city streets. But they follow the same principle. The signal from the cameras is transmitted to only a limited number of screens or monitors. The footage is recorded so you can view it at your convenience. The system is quite easy to set up so you don’t have to pay a technician to come over and install it. Since they are wireless and there are no cables to get tangled up in, you can change the location of the cameras as and when you wish. Wireless CCTV cameras are fast becoming the ultimate tool in the fight against crime.

Rather than hire security personnel, most people are choosing CCTV systems to monitor their home or business. Security guards gain a lot of knowledge about your property and your comings and goings even if they’re on the job for just a week. This information can prove invaluable to planning a break-in. No matter how clean their background checks, who can you really trust nowadays?

The sight of a CCTV camera on your property will psychologically impair a burglar’s nerve to break and enter. Security experts aver that this is the main reason that CCTV systems are so effective in preventing crime. If the criminal plans to go ahead with the crime regardless, there’s a greater chance that the fear will make him bungle the job and get caught anyway. Statistics show that shops and convenient stores that have visible CCTV cameras have fewer instances of shop-lifting or “stick-ups”.

Where to Set Up Your Wireless CCTV System

Survey the property that you want to protect. You’ll want a camera at all entry and exit points including windows. You can also install infrared cameras outside your home for night-time surveillance. If the system is for your shop, consider all areas of the shop that are not directly visible from the cashier’s desk. Then, of course, there’s the cash counter. Consider any area that might be an advantage to a burglar, and put up a camera there. The receiver and monitors should be installed in an area where you spend most of your time.

Some CCTV systems come equipped with motion sensors. So it is only when the system detects an intruder that the cameras will come on, accompanied by a piercing alarm. Some security systems will even call the police or your cell phone to alert you. This is especially useful if you’re away a lot or if you don’t have the resources to man someone at the monitors all day.

The form of your camera will even play a huge part in how well hidden you is, and exactly how secure you can your office or home. Often times, if a surveillance camera is very obvious or large, criminals will immediately try and destroy the camera before stealing merchandise or money, or otherwise not damaging the home. If your CCTV camera is well hidden, it will be a hardship on burglars to obtain the camera, and it's also more likely that you're going to catch the trespassing on tape accurately. A discreet camera will likely make customers forms of languages in your house feel safer. So, small cameras, dome-shaped cameras, and in many cases submergible cameras make the perfect idea if you wish to add a little more security to your dwelling or business.

Don’t wait till you’re the victim of a crime before taking precautions. Install a wireless CCTV system today and sleep easy.

Saturday, April 30, 2011

Things that slow your PC down

You are install one CCTV Software in your Customer PC. During boot up a computer brand new from the store, and to revel in the galactic super-speed in which it loads. It’s another to keep it running at that same speed, especially after some months have passed.

There are many reasons why your computer isn’t running at its optimum. Fortunately, they’re all very easy to solve. Read on to find out what slows your PC down, and what you can do about it.
An overloaded startup
Most applications you install usually add themselves automatically to your Start Up folder. This results in a slower startup because of the time needed to load them all. If your computer used to boot at the speed of light, but now moves slower than an old lady at the zebra crossing, this might be your problem.

SOLVE THIS: by accessing the MSCONFIG command through your search bar or run application, heading to the Startup tab at the top, and unchecking all unnecessary programmes. Seriously, do you really need iTunes to boot whenever you start your computer?
Too many temporary files
Whenever you look at webpages, watch videos, look at photos or even type on Microsoft Word, your computer stores temporary files so that it can load up faster the next time round. These files build up over time and may slow your computer down, especially since they’re usually located in your OS drive.

SOLVE THIS: By running Windows Disk Cleanup, found in Accessories, regularly.
A fragmented disk
A very old school problem, but still a very real one. Disk fragmentation occurs when the file system can’t or won’t allocate enough continuous space to store a complete file. This results in gaps within that file, and can make that file run slower than it usually would. Sometimes, those gaps occur when the OS deletes a file it doesn’t need any more. (This is safe though, your OS is smarter than you think).

SOLVE THIS: By running the Disk Defragmenter, also found in Accessories, regularly. We suggest not using the computer whilst the
Defragmenter runs so as to minimise more fragmentation 
Programs uninstalled improperly
What a mouthful this header is. A PC does not work like a MAC – simply deleting the application you don’t want won’t cut it, and leaves behind remaining files that may cause your computer to slow down.

SOLVE THIS: By always uninstalling programs with the proper uninstall.exe, or remove them via the Control Panel. Go one step further to delete leftover files from the folder manually after uninstallation. This could include save games, 3rd party add ons, screenshots and etc.
A full OS disk
Many people make the mistake of saving everything possible into their C:/ drive, and that usually hosts their OS, or operating system. Once that drive gets too full, it slows down, thereby slowing down your entire computer’s processing speed.

SOLVE THIS: by partitioning your drive into C:/ and D:/ and saving your data in D:/. The lack of strain on your OS drive will let it run faster. You might be pleasantly amazed at the difference this can make.
Background anti-viruses
Anti-viruses are always helpful, but can sometimes do more harm than good. Since they’re always running and usually boot together with your computer, they can slow down processes considerably. Strangely enough, it’s always the ones you’ve got to pay for that wreak the most havoc.

SOLVE THIS: By disabling auto scans and updates, or by switching to a more lightweight, freeware anti-virus. Some have suggested Avira and AVG Antivirus, but it’s your job to ask your trusted geek friend what he’s using.
Spyware and viruses
Malicious software often heads straight for your Windows Registry or core file system, slowing down your computer. They can sneak in with applications you download online and install, and can also hop in from less-than-savoury websites you visit.
SOLVE THIS: While spyware and viruses can be removed manually by deleting them from your registry, some can be more persistent. In this case, use an automatic spyware remover – tons are available if you do a Google search. One of the more popular one is Ad-Aware Spyware Remover.


--Thanks to Maryanne Lee to provide info.

Door Monitoring and Control with Internet CCTV

Because internet CCTV cameras are intelligent, as opposed to the “dumb” traditional CCTV cameras, you can use them to see your property from wherever you are in the world, over the internet.  That, however, is just the start.  By joining these cameras to simple alarm and control circuits, they can be used to monitor and control doors.  In part one of this two-part series, I will show you how the monitoring side of the equation works.

Seeing your home, business or family from the other side of the world is amazing enough, but wireless internet CCTV cameras can do so much more than even this impressive feat.  Most of the best of this type of camera will have a digital input/output port, or I/O port, that allows the camera to be connected to electrical circuits.  The two input connectors on the port can be used to monitor an alarm circuit and trigger an alarm as I will explain.

The input connectors can be wired to each end of a so-called alarm circuit that in reality is nothing more than an unbroken loop of low-voltage wire, connected to, say, a pair of magnetic door contacts.  These are a standard part of any alarm system, but for those of you who have not come across them, you basically get two magnets, with plastic mounts.  One of them has connectors for the two wires of the alarm circuit.  You screw this one with the wires to the door frame, and the other one to the opening door so that they are lined up very close to each other when the door is closed, which keeps the circuit unbroken.  This is known as a “normally closed” or “NC” circuit, because in its normal state, the circuit is complete or closed.  When the door is opened, the magnetic contacts separate and the circuit is broken.

The wireless internet CCTV camera will detect when the circuit is broken because there will be a change in voltage at the input connectors and the camera is programmed to raise the alarm when this happens.  So, when the door is opened your camera can send an immediate message across the internet to a central computer.  This computer is programmed to send a text message to your mobile phone, and perhaps an email too – all within seconds of the door being opened.  Of course, if you want this great feature without “getting your hands dirty”, you will need a specialist “internet CCTV” company that can provide you with a camera pack ready-configured to work with your alarm circuit, so you can just plug it in.

We looked at how your wireless internet CCTV camera can monitor the area in front of an external door, and raise an alert when someone approaches the door.  In this final part of the series we are going to look at the next step in the process; how to use your camera to unlock the door.

You may remember from part one that most good quality internet CCTV cameras have a digital input/output port, or I/O port.  This is simply a series of connectors that allow the camera to be attached to electrical circuits.  I have shown you in part one how the two input connectors on the port can be used for monitoring an alarm circuit and raising an alert.  In a similar way, the two output connectors can be used to switch electrical equipment.  Your camera can be configured so that a current is sent to the output connectors under certain circumstances.  This gets very interesting, because unbelievably you can use the camera to actually open the door! So how can a wireless CCTV camera actually open a front door?  I will explain how in the next few sections.

The first piece of equipment you will need is an electronic door release, which you fit to the door frame.  This is a common piece of equipment in home and business security systems and can be obtained inexpensively by searching for “electronic door release” on the internet.  The door release is fitted to the door frame so that the catch on the door lock fits into it.  The door lock is untouched and the door can be unlocked with a key as usual, but the electronic door release can also open the door.  It does this by freeing the catch from the door frame without unlocking the lock, when a current is sent along the attached wires.

The next step is simply to run the wires from the door release mechanism to the output connectors on the internet CCTV camera’s I/O port. The camera has to be programmed so that it will accept an “open door” text message from your mobile phone or from a web page, and send a current to release the door.  Of course, you may be happy enough fitting the door release mechanism, but programming the camera to work with it is a specialist task.  I always recommend getting in touch with an “internet CCTV” provider for a ready-programmed camera that you simply plug in, so you get this great feature without needing any technical knowledge.

Once you have everything connected, here is how it all works in practice.  Let’s say you get a text message alert from the camera to tell you that someone is at the door, and you know it’s about the time your son gets home from school.  You log in using your mobile phone or PC and see a live picture of your son standing outside the front door, unable to get in because he’s forgotten his key.  You can simply send a text message from your phone to a central number, with your password, user name and a simple command such as “open front door”.  A central computer program gets your text message and processes it, checking your credentials.  Then, the system sends a message across the internet to your internet CCTV camera, and the camera then sends a current to the door release mechanism, which opens the door for your son, all within a few seconds!

New applications for wireless internet CCTV such as door monitoring and control bring the technology to a different level when compared to traditional CCTV.  This is yet another reason why these intelligent digital cameras are fast replacing dumb analogue cameras the world over.

TCP VS UDP & IP Topics

Can you explain the difference between UDP and TCP internet protocol (IP) traffic and its usage with an example?
A. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)is a transportation protocol that is one of the core protocols of the Internet protocol suite. Both TCP and UDP work at transport layer TCP/IP model and both have very different usage.

Difference between TCP and UDP

TCP
UDP
Reliability: TCP is connection-oriented protocol. When a file or message send it will get delivered unless connections fails. If connection lost, the server will request the lost part. There is no corruption while transferring a message.
Reliability: UDP is connectionless protocol. When you a send a data or message, you don't know if it'll get there, it could get lost on the way. There may be corruption while transferring a message.
Ordered: If you send two messages along a connection, one after the other, you know the first message will get there first. You don't have to worry about data arriving in the wrong order.
Ordered: If you send two messages out, you don't know what order they'll arrive in i.e. no ordered
Heavyweight: - when the low level parts of the TCP "stream" arrive in the wrong order, resend requests have to be sent, and all the out of sequence parts have to be put back together, so requires a bit of work to piece together.
Lightweight: No ordering of messages, no tracking connections, etc. It's just fire and forget! This means it's a lot quicker, and the network card / OS have to do very little work to translate the data back from the packets.
Streaming: Data is read as a "stream," with nothing distinguishing where one packet ends and another begins. There may be multiple packets per read call.
Datagrams: Packets are sent individually and are guaranteed to be whole if they arrive. One packet per one read call.
Examples: World Wide Web (Apache TCP port 80), e-mail (SMTP TCP port 25 Postfix MTA), File Transfer Protocol (FTP port 21) and Secure Shell (OpenSSH port 22) etc.
Examples: Domain Name System (DNS UDP port 53), streaming media applications such as IPTV or movies, Voice over IP (VoIP), Trivial File Transfer Protocol (TFTP) and online multiplayer games etc

Further readings

UDP is the faster protocol as it doesn't wait for acknowledgement so it is not at all having reliability as  compared to TCP.

Bridging the Analog-IP Gap

The name "encoder" does not really do these technological miracles justice. These investment-protecting, budget-saving marvels build a bridge between two generations of surveillance technology and bring harmony to your network.

IP-based video surveillance systems bring many important benefits. The image quality they deliver is a vast improvement. The networks are more scalable and cheaper to run. Better still, computerization means you can automate systems to bring about event management and intelligent video. Nevertheless, it is too early to claim that this development has rendered analog CCTV surveillance systems obsolete.

One option to installers would be to replace everything analog. This would mean getting rid of the existing analog cameras, the coaxial cables that have been laid inside and outside the buildings, the recording systems (AVRs or DVRs) and the management system. It would then be necessary to introduce an entirely new Ethernet cabling infrastructure, which would involve not insubstantial disruption, along with new IP-compatible storage hardware and a management system suited to IP or network video.

In many cases, that would be a waste of time and money, and the people who bought analog systems are not going to write off their investment any time soon, especially when around 95 percent of the estimated 40 million surveillance cameras installed in the world are still analog.

While analog technology is being fast eclipsed by IP video, which is growing at 30 percent a year according to IMS Research, there is no reason why the two infrastructures cannot be rationalized together, apart from a few technological hurdles. These barriers to integration are, in most cases, easily surmountable.

For most installations, the most valuable service you can offer your clients is to migrate them from analog to IP video by making judicious use of their existing network. The key to this magic passage is the video encoder. Encoders help convert analog networks into IP-friendly formats, putting the existing investment in cameras and coaxial cable to good use.

Tuesday, March 15, 2011

Change the MAC address in Windows 7

To spoof your MAC address in Windows 7 there are a few facts you need to know. If your network adapter has newer updated drivers, then you can only spoof your mac address to an address that begins with 12. For example 12197ECD414A. You should enter the MAC address without the dashes.

If you would like to spoof your mac address to an address that begins with 00 (for example 00197ECD414A) you must downgrade your network adapter's drivers to an early version.

Go to Start and then click Run. In the text box type CMD (enter). In the command prompt type ipconfig /all. This command gives you all the information for any network card in your system including the wired network adapter, bluetooth adapter, and the wireless adapter. So you’ll have to look under the specific heading you need because each adapter will have it’s own MAC address. The MAC address is called Phyical Address.  Now you know your MAC address.


Go to Start -> Control Panel -> Network and Internet -> Network and Sharing Center -> Change Adapter Settings -> Properties -> Configure -> Network Address -> Value (type your new MAC address). Enter the MAC address without the dashes.


To verify the change of MAC address. Go to Start and then click Run. In the text box type CMD (enter). In the command prompt type ipconfig /all.

CCTV Illegal (90%) Ineffective (80%)


Whether CCTV is an existing element of your security/management strategy or you are considering investing in CCTV, you need to be sure that the system will provide unequivocal evidence.

Imagine your frustration at having your CCTV evidence rejected in a health & safety claim or employment law dispute due to poor quality images or procedural mistakes. The financial impact of such cases could amount to tens if not hundreds of thousands of currency; by comparison most instances of theft can appear almost inconsequential in terms of loss.

The quality of images as seen on TV News and crime reporting programmers is a damning indictment of CCTV standards. Consider the numbers quoted in the headline, 90% Illegal stated by CameraWatch is based on ‘initial research’ and refers to total or partial shortfall in Data Protection Act compliance. 80% Ineffective refers to the efficacy of CCTV evidence examined by the Police and is stated in the Home Office National CCTV Strategy.

These statistics are largely based on anecdotal evidence, nevertheless practical experience of those professionally involved in the assessment of CCTV systems would broadly agree with these estimates.

Another interesting number is the 3.2 to 4.2 million CCTV surveillance cameras employed in the India. Which figure is closest to reality no one knows, but there is probably 1 camera for every 15 members of the population, capturing our images as we go about our lives.

According to current folklore our image is captured 300 times a day and stored for a month or more. Should we be worried?
Provided that CCTV images are managed in accordance with Data Protection Act principles and you are a law abiding citizen, there should be no concern and in countless high profile cases CCTV has proven to be an invaluable aid to investigation. Evidence of the immediately preceding terrorist bombings was of fundamental importance to the Police investigation.

Data Protection Act legislation is at the very core of protecting our Human Rights when it comes to the use of CCTV, so are we safe to assume we are protected from its misuse? The law is certainly adequate and has been since the 1998 Data Protection Act encompassed CCTV images. The Information Commissioner is responsible for enforcement and serious cases of non compliance can result in a substantial fine or even a custodial sentence.

You must let people know that they are in an area where CCTV surveillance is being carried out. The most effective way of doing this is by prominently placed signs at the entrance to the CCTV zone and reinforcing this with further signs inside the area. The signs should contain details of the organization responsible for operating the system, the purposes for using CCTV and contact details.

The Data Protection Act does not prescribe any specific minimum or maximum periods which images should be retained for, the archive period should reflect the organization’s own purposes although 30 days is the accepted norm.
A little known aspect of DPA law is Right of Subject Access, you have a legal right to request a copy of your images captured on CCTV and subject to certain reasonable conditions the organization responsible for the CCTV system (the Data Controller) must provide a copy.

You will need to make the application in writing: stating where you were, the time & date and provide photographic identity so that the relevant images can be searched for. The Data Controller is entitled to charge something for the search including the cost of providing a CD or DVD. The images must be provided to the applicant within 40 days of the date of application or a valid reason for not being able to comply must be given within 21 days.

Legislation is weighted in favor of the applicant and the Data Controller can incur substantial costs in producing the copy recording, particularly if it is found to include images of third parties as well as the applicant. These third party images must be masked in order to protect the identities of others.
A frequent dilemma faced by Security / Facilities Managers of multi tenanted buildings is when a tenant demands access to recordings that may assist them in criminal or civil law matters. In the case of criminal investigation the response is clear cut, the tenant must report the matter to the Police who will request a copy of any video evidence they may require.

Non criminal cases are more complex and disclosure of images directly to the tenant may result in a breach of Data Protection Act law, on the other hand refusal may result in bad feeling if tenant holds the reasonable view that; ‘security is included in the service charge that I am paying and I should be allowed access to CCTV recordings that relate to my business’.

A reasonable response would be to establish the parameters of the recording; date, time and cameras. Then download images in the same manner as for a criminal investigation, but without allowing the applicant to view the images. You have at this point protected the required images from being overwritten by the recording equipment. The next move is to suggest that the tenant instruct their lawyer to request a copy, subject to an undertaking that the law firm becomes Data Controller for the issued copy.
In this article we refer to digital recording only, on the basis that video tape is redundant technology that is no longer serviceable and unlikely to be effective.

Digital images are primarily recorded to hard drive and are only downloaded on demand, the recording equipment should be held in a secure enclosure fixed to the building fabric or located in a security control room. Access to the system to download images should be password protected and only available to nominated Data Processors.

Images should be downloaded to non rewritable media such as CD or DVD and be playable on any video enabled PC or laptop without the need for additional software. It is good practice to download two copies of an incident, one being the Working Copy for issue and the other being an Archive copy held securely on site for backup or verification purposes. It is vital that a robust audit trail is created by means of Unique Reference Numbers printed on the disc during the printing process. The audit trail should be supported by suitable documentation. Download to memory stick, re-recordable media or the internet without secure encryption will compromise the veracity of the evidence.

If CCTV is an existing element within your security & management strategy, make sure that you have a CCTV policy in place describing how it should be managed in compliance with Data Protection Act law. Don’t then file and forget, but ensure that your security staff are issued with a copy and carry out an annual assessment of management and equipment performance, thereby ensuring that your CCTV continues to meet current needs and best practice.

If you are considering the installation of CCTV get a professional to assess your risks and system requirements in the form of an Operational Requirement based on the Home Office model. This is in effect a performance specification that can be issued to those responsible for the technical design and bid process, you can thus be sure of obtaining comparable quotations on which to base your buying decision. Furthermore you will have created a benchmark against which performance can be objectively assessed as a part of an effective professional handover process that will include; System Operating Manual, CCTV Policy, Management Documentation, Statutory CCTV Warning Signs and training of those responsible for managing the system.

Tuesday, March 1, 2011

Products Designed to Provide Home Security

When it comes to protecting your home and your loved ones, you really can't be too cautious. To help homeowners protect the things they cherish, manufacturers of home security products have made a variety of different systems available for use.

Home Alarm SystemsProbably the most used systems for home security are those which come with alarms. The most basic alarm system is a simple device which attaches to an entrance. This economical alarm is usually placed on the front entrance to the home along with a warning sticker informing any would be intruders of the home's protection. On a larger scale, alarm systems can include multiple alarms wired to several entrances as well as first floor windows.

Home security systems with alarms can also include other devices for monitoring the area. Motion sensor cameras and outdoor security lights can be connected to an alarm systems so when they detect motion in the area, the alarms will sound. Some indoor systems use infrared lights to detect motion in the area, which in turn will sound the interior alarm. Alarms are available with different decibel levels making them audible for different ranges. An inexpensive front door alarm will usually be audible to everyone inside the house and possibly to the next door neighbors.

Fake Security DevicesSome people want the security of having deluxe systems installed, but do not have the funds available to invest in these systems. One way to scare off possible intruders is to purchase fake security equipment. Most of the fake items are designed to look like real security cameras. The outer casing is identical to all of the most common types of security cameras, but the inside is empty. These fake cameras come with mounting hardware so they can be attached to any outside wall.

Homeowners can also purchase signs and stickers indicating there are security devices installed on the premises when in fact, there is not. Many people purchase these signs and stickers and place them in their yards and on their doors and windows to deter any potential intruders.

Home Improvements for SecurityIn addition to the alarm and home automation system homeowners can purchase for security, there are also home improvements which can help make a home harder to break into. Replacing screen or service doors on entrances with wrought iron doors will make it much harder for intruders to enter. These doors are made with wrought iron bars designed in attractive styles so they add appeal to the outside of the home.

Installing windows that have interior latch locks can also make them harder to open from the outside. Front doors and garage door sensor can have electronic keypads installed to replace traditional key locks. Keypads require the person to enter their special code number in order to unlock the door. Installing outdoor lights around entrances and on garages will also add protection to a home when the lights are connected to an automatic timer designed to turn them on in the evenings whether you are home or away.

Monday, February 28, 2011

Edge Recording in CCTV System

What is Edge Recording?
Edge recording, also called local storage or on-board recording, is when a camera records video directly onto a SD or memory card in the camera instead of a separate NVR or storage device. Edge recording gives you more flexibility in recording video.
How Edge Recording Works
Saving video files on an on-board memory card is called edge recording because the file location is on the “edge” of the surveillance system network where the camera is located, instead of a “central” location like a NVR where all cameras and other devices are connected.
The SD cards surveillance cameras use can have limited space compared to large computer hard drives or NVRs, making them a great solution when you only want to record small numbers of files. Motion detection-activated recording, where your camera only records if it detects motion and can go long stretches of time between recorded events, work well with edge recording.
Edge recording is also an alternative to larger storage systems if you’re on a budget. While you will need to purchase the SD card separately from the camera, NVR systems can be more expensive and intensive than you need if you don’t save many files.
How Edge Recording Can Help You
Edge recording provides a cost-effective storage system for small systems. But it can also add flexibility to your system, and provide a backup storage method. While specific features will vary by manufacturer, edge storage can:
·         Record files to the memory card in the event that the connection to the central NVR is lost
·         Store video for cameras that cannot easily connect to a central NVR, including remote locations and mobile camera systems
·         Minimize bandwidth by not sending large video files over your network
When used as the main storage location for small video files or as part of a larger system for saving and retrieving files, edge recording is used by many industries and system installers:
·         For businesses who only save motion-activated video at night when the office is closed
·         For home owners, who only record when they are out of the house
·         For public transportation, included busses and trains, who cannot stay connected to a central NVR while traveling

Edge recording is available on cameras from all major surveillance camera brands includingAxisOptica, and Mobotix.

Sunday, February 27, 2011

Capturing Crystal Clear Images With Megapixel Technology

Megapixel surveillance is not a new concept — its applications and benefits are starkly clear. What has changed are smarter cameras, taking advantage of the added pixels and a better understanding of illumination in real life. In the first of a two-part report, A&S examines how smarter megapixel cameras are getting; the second part looks at best practices for optimal performance.

The big picture for megapixel surveillance cameras looks bright, in the wake of the recession. HD and megapixel cameras are expected to make up nearly 30 percent of network camera shipments in 2011, according to IMS Research. By 2015, it is forecast that more than 60 percent of network cameras shipped will be of megapixel resolution.

The resolution increase has a noted effect on the whole surveillance system. While a 2.1-megapixel or 1,080p HD image is six times larger than a D1 image, the additional pixels require a bigger pipe to transmit more data. The infrastructure and storage costs for megapixel are well-documented, with ROI and TCO being used as arguments in favor of bigger pictures. The fate of megapixel is linked to the future of IP networks, with HD forecast to make up most high-resolution cameras compared to megapixel, according to IMS.

Megapixel surveillance requires careful planning, but the benefits of added resolution boost the accuracy of analytics. Edge devices take advantage of faster processors, resulting in smarter use of pixels. Analytics can help reduce bandwidth, as an event will trigger video streaming, rather than constantly sending the same still images over the network. A more distributed architecture puts less strain on networks and makes life easier.

Clarity is the main driver for megapixel. “At the end of the day, you're putting in a security system to protect life and provide evidence in a court of law,” said Stephen Moody, Security Development Manager for ViS Security Solutions, an integrator in Ireland.

Cracking the Code
H.264 is the de facto standard compression for megapixel cameras, due to its efficiency in crunching large data files into smaller ones for transmission and storage. As compression evolved from M-JPEG's stills to MPEG-4 and now to H.264, a variety of profiles yield differences in performance. With 17 profiles in all, three are the most common: baseline, main and high, said Sachin Khanna, PM for CCTV, Bosch Security Systems.

By profile, the baseline is appropriate for video conferencing; the main profile is good for broadcast video; and high profile is most applicable for HD broadcast video. “H.264 requires a fair amount of processing power for encoding and decoding; this may limit the camera's frame rate and dictate the NVR platform to achieve the desired performance,” said Rich Pineau, CTO of Oncam Global.

Most H.264 profiles stem from 2-D applications, with not all profiles being capable of integration. “Even if both cameras are H.264 and the manufacturers are partners, the system could still not work,” said Patrick Lim, Director of Sales and Marketing for Ademco Far East. “The I/O and output are hard to integrate. Some engineers say it's easy to plug and play — there's no such thing.”

Security Camera Selection Guide

ON Sunday, November 8, 2009 we discuss a Guide for choosing the CCTV system, now we know how to select a Security camera.( http://arindamcctvaccesscontrol.blogspot.com/2009/11/guide-for-choosing-cctv-system.html )

Security cameras are literally the eyes of a video surveillance system. Cameras should be deployed in critical areas to capture relevant video.
The two basic principles of camera deployment are (1) use chokepoints and (2) cover assets.
Chokepoints are areas where people or vehicles must pass to enter a certain area. Examples include doorways, hallways and driveways. Placing cameras at chokepoints is a very cost-effective way to document who entered a facility.
Assets are the specific objects or areas that need security. Examples of assets include physical objects such as safes and merchandise areas as well as areas where important activity occurs such as cash registers, parking spots or lobbies. What is defined as an asset is relative to the needs and priorities of your organization.

1. Security Camera Selection

Once you determine what areas you want to cover, there are four camera characteristics to decide on:
1. Fixed vs. PTZ: A camera can be fixed to only look at one specific view or it can be movable through the use of panning, tilting and zooming (i.e., moving left and right, up and down, closer and farer away). Most cameras used in surveillance are fixed. PTZ cameras are generally used to cover wider fields of views and should generally be used only if you expect a monitor to actively use the cameras on a daily basis. A key reason fixed cameras are generally used is that they cost 5 to 8 times less than PTZs (fixed cameras average Rs.12000 to Rs. 22000 whereas PTZ cameras can be over Rs. 75,000 INR).

2. Color vs. Infrared vs. Thermal: In TV, a video can be color or black and white. In video surveillance today, the only time producing a black and white image makes sense is when lighting is very low (e.g., night time). In those conditions, infrared or thermal cameras produce black and white images. Infrared cameras require special lamps (infrared illuminators) that produce clear image in the dark (but are significantly more expensive than color cameras - often 2x to 3x more). Thermal cameras require no lighting but product only silhouettes of objects and are very expensive (Rs. 300,000 to Rs. 1000,000 on average) In day time or lighted areas, color cameras are the obvious choice as the premium for color over black and white is trivial.

3. Standard Definition vs. Megapixel: This choice is similar to that of TVs. Just like in the consumer world, historically everyone used standard definition cameras but now users are shifting into high definition cameras. While high definition TV maxes out at 3 MP, surveillance cameras can provide up to 16 MP resolutions. In 2008, megapixel cameras only represent about 4% of total cameras sold but they are expanding very rapidly.
4. IP vs. Analog: The largest trend in video surveillance today is the move from analog cameras to IP cameras. While all surveillance cameras are digitized to view and record on computers, only IP cameras digitize the video inside the camera. While most infrared and thermal cameras are still only available as analog cameras, you can only use megapixel resolution in IP cameras. Currently, 20% of cameras sold are IP and this percentage is increasingly rapidly.

Most organizations will mix and match a number of different camera types. For instance, an organization may use infrared fixed analog cameras around a perimeter with an analog PTZ overlooking the parking lot. On the inside, they may have a fixed megapixel camera covering the warehouse and a number of fixed IP cameras covering the entrance and hallways.

2. Connectivity

In professional video surveillance, cameras are almost always connected to video management systems for the purpose of recording and managing access to video. There are two main characteristics to decide on for connectivity.
IP vs. Analog: Video can be transmitted over your computer network (IP) or it can be sent as native analog video. Today, most video feeds are sent using analog but migration to IP transmission is rapidly occurring. Both IP cameras and analog cameras can be transmitted over IP. IP cameras can connect directly to an IP network (just like your PC). Analog cameras cannot directly connect to an IP network. However, you can install an encoder to transmit analog feeds over IP. The encoder has an input for an analog camera video feed and outputs a digital stream for transmission over an IP network.
Wired vs. Wireless: Video can be sent over cables or though the air, whether you are using IP or analog video. Over 90% of video is sent over cables as this is generally the cheapest and most reliable way of sending video. However, wireless is an important option for transmitting video as deploying wires can be cost-prohibitive for certain applications such as parking lots, fence lines and remote buildings.

3. Video Management System
Video management systems are the hub of video surveillance solutions, accepting video from cameras, storing the video and managing distribution of video to viewers.
There are four fundamental options in video management systems. Most organizations choose one of the four. However, it's possible that companies may have multiple types when they transition between one to another.
DVRs are purpose built computers that combine software, hardware and video storage all in one. By definition, they only accept analog camera feeds. Almost all DVRs today support remote viewing over the Internet. DVRs are very simple to install but they significantly limit your flexibility in expansion and hardware changes. DVRs are still today the most common option amongst professional buyers. However, DVRs have definitely fallen out of favor and the trend is to move to one of the three categories below.

HDVRs or hybrid DVRs are DVRs that support IP cameras. They have all the functionality of a DVR listed above plus they add support for IP and megapixel cameras. Most DVRs can be software upgraded to become HDVRs. Such upgrades are certainly a significant trend and is attractive because of the low migration cost (supports analog and IP cameras directly).
NVRs are like DVRs in all ways except for camera support. Whereas a DVR only supports analog cameras, an NVR only supports IP cameras. To support analog cameras with an NVR, an encoder must be used.

IP Video Surveillance Software is a software application, like Word or Excel. Unlike DVRs or NVRs, IP video surveillance software does not come with any hardware or storage. The user must load and set up the PC/Server for the software. This provides much greater freedom and potentially lower cost than using DVR/NVR appliances. However, it comes with significant more complexity and time to set up and optimize the system. IP video surveillance software is the hottest trend in video management systems currently and is the most frequent choice for very large camera counts (hundreds or more).

4. Storage

Surveillance video is almost always stored for later retrieval and review. The average storage duration is between 30 and 90 days. However, a small percentage of organization store video for much shorter (7 days) or for much longer (some for a few years).
The two most important drivers for determining storage duration is the cost of storage and the security threats an organization faces.
While storage is always getting cheaper, video surveillance demands huge amount of storage. For comparison, Google's email service offer about 7 GB/s of free email storage. This is considered to be an enormous amount for email. However, a single camera could consume that much storage in a day. It is fairly common for video surveillance systems to require multiple TBs of storage even with only a few dozen cameras. Because storage is such a significant cost, numerous techniques exist to optimize the use of storage.
The type of security threats also impact determining storage duration. For instance, a major threat at banks is the report of fraudulent investigations. These incidents are often not reported by affected customers until 60 or 90 days after the incident. As such, banks have great need for longer term storage. By contrast, casinos usually know about issues right away and if a problem is to arise they learn about it in the same week. Casinos then, very frequently, use much shorter storage duration (a few weeks is common).
Three fundamental types of storage may be selected:
Internal storage uses hard drives built inside of a DVR, NVR or server. Today this is still the most common form of storage. With hard drives of up to 1 TB common today, internal storage can provide total storage of 2TB to 4TB. Internal storage is the cheapest option but tends to be less reliable and scalable than the other options. Nonetheless, it is used the most frequently in video surveillance.

Directly Attached storage is when hard drives are located outside of the DVR, NVR or server. Storage appliances such as NAS or SANs are used to manage hard drives. This usually provides greater scalability, flexibility and redundancy. However, the cost per TB is usually more than internal storage. Attached storage is most often used in large camera count applications.

Storage Clusters are IP based 'pools' of storage specialized in storing video from large numbers of cameras. Multiple DVRs, NVRs or servers can stream video to these storage clusters. They provide efficient, flexible and scalable storage for very large camera counts. Storage clusters are the most important emerging trend in video surveillance storage.
http://arindamcctvaccesscontrol.blogspot.in/2013/10/analog-cctv-storage.html

5. Video Analytics
Video analytics scan incoming video feeds to (1) optimize storage or (2) to identify threatening/interesting events.
Storage optimization is the most commonly used application of video analytics. In its simplest form, video analytics examines video feeds to identify changes in motion. Based on the presence or absence of motion, the video management system can decide not to store video or store video at a lower frame rate or resolution. Because surveillance video captures long periods of inactivity (like hallways and staircases, buildings when they are closed, etc.), using motion analytics can reduce storage consumption by 60% - 80% relative to continuously recording.
Using video analytics to identify threatening/interesting events is the more 'exciting' form of video analytics. Indeed, generally when industry people talk of video analytics, this is their intended reference. Common examples of this are perimeter violation, abandoned object, people counting and license plate recognition. The goal of these types of video analytics is to pro-actively identify security incidents and to stop them in progress (e.g., perimeter violation spots a thief jumping your fence so that you can stop them in real time, license plate recognition identifies a vehicle belonging to a wanted criminal so you can apprehend him).
These video analytics have been generally viewed as a disappointment. While many observers believe that video analytics will improve, the video analytics market is currently contracting (in response to its issues and the recession).

6. Viewing Video
Surveillance video is ultimately viewed by human beings. Most surveillance video is never viewed. Of the video that is viewed, the most common use is for historical investigations. Some surveillance video is viewed live continuously, generally in retail (to spot shoplifters) and in public surveillance (to identify criminal threats. Most live video surveillance is done periodically in response to a 'called-in' threat or to check up on the status of a remote facility.
Four fundamental options exist for viewing video:
Local Viewing directly from the DVR, NVR or servers is ideal for monitoring small facilities on site. This lets the video management system double as a viewing station, saving you the cost of setting up or using a PC. This approach is most common in retailers, banks and small businesses.

Remote PC Viewing is the most common way of viewing surveillance video. In this approach, standard PCs are used to view live and recorded video. Either a proprietary application is installed on the PC or a web browser is used. Most remote PC viewing is done with an installed application as it provides the greatest functionality. However, as web applications mature, more providers are offering powerful web viewing. The advantage of watching surveillance video using a web browser is that you do not have to install nor worry about upgrading a client.

Mobile Viewing allows security operators in the field to immediately check surveillance video. As responders and roving guards are common in security, mobile viewing has great potential. Though mobile clients have been available for at least 5 years, they have never become mainstream due to implementation challenges with PDAs/phones. Renewed interest and optimism has emerged with the introduction of the Apple iPhone.

Video Wall Viewing is ideal for large security operation centers that have hundreds or thousands of cameras under their jurisdiction. Video walls provide very large screens so that a group of people can simultaneously watch. This is especially critical when dealing with emergencies. Video walls generally have abilities to switch between feeds and to automatically display feeds from locations where alarms have been triggered.

7. Integrating Video with Other Systems
Many organizations use surveillance video by itself, simply pulling up the video management systems' client application to watch applications. However, for larger organizations and those with more significant security concerns, this is an inefficient and poor manner to perform security operations. Instead, these organizations prefer an approach similar to the military's common operational picture (COP) where numerous security systems all display on a singular interface.
Three ways exist to deliver such integration with video surveillance:

Access Control as Hub: Most organizations have electronic/IP access control systems. These systems have been designed for many years to integrate with other security systems such as intrusion detection and video surveillance. This is the most way to integrate video surveillance and relatively inexpensive ($10,000 - $50,000 USD). However, access control systems are often limited in the number and depth of integration they support.

PSIM as Hub: In the last few years, manufacturers now provide specialized applications whose sole purpose are to aggregate information from security systems (like video surveillance) and provide the most relevant information and optimal response policies. These applications tend to be far more expensive (($100,000 - $1,000,000 USD) yet support a far wider range of security manufacturers and offer more sophisticated features.

Video Management System as Hub: Increasingly, video management systems are adding in support for other security systems and security management features. If you only need limited integration, your existing video management system may provide an inexpensive (yet limited) solution.

8.Video Resolutions

1.Analog Video Resolutions
Video surveillance solutions use a set of standard resolutions. National Television System Committee (NTSC) and Phase Alternating Line (PAL) are the two prevalent analog video standards. PAL is used mostly in Europe, China, and Australia and specifies 625 lines per-frame with a 50-Hz refresh rate. NTSC is used mostly in the United States, Canada, and portions of South America and specifies 525 lines per-frame with a 59.94-Hz refresh rate.
These video standards are displayed in interlaced mode, which means that only half of the lines are refreshed in each cycle. Therefore, the refresh rate of PAL translates into 25 complete frames per second and NTSC translates into 30 (29.97) frames per second..
Table of Analog Video Resolutions (in pixels)
Format
NTSC-Based (in pixels)
PAL-Based (in pixels)
QCIF
176 × 120
176 × 144
CIF
352 × 240
352 × 288
2CIF
704 x 240
704 x 288
4CIF
704 × 480
704 × 576
D1
720 × 480
720 × 576
Note that the linear dimensions of 4CIF are twice as big as CIF. As a result, the screen area for 4CIF is four times that of CIF with higher bandwidth and storage requirements. The 4CIF and D1 resolutions are almost identical and sometimes the terms are used interchangeably.


2.Digital Video Resolutions
User expectations for resolution of video surveillance feeds are increasing partially due to the introduction and adoption of high-definition television (HDTV) for broadcast television. A 4CIF resolution, which is commonly deployed in video surveillance, is a 4/10th megapixel resolution. The HDTV formats are megapixel or higher. Table lists the typical resolutions available in the industry.

Size/ Format
Pixels
QQVGA
160x120
QVGA
320x240
VGA
640x480
HDTV
1280x720
1M
1280x960
1M
1280x1024
2M
1600x1200
HDTV
1920x1080
3M
2048x1536
While image quality is influenced by the resolution configured on the camera, the quality of the lens, sharpness of focus, and lighting conditions also come into play. For example, harshly lighted areas may not offer a well-defined image, even if the resolution is very high. Bright areas may be washed out and shadows may offer little detail. Cameras that offer wide dynamic range processing, an algorithm that samples the image several times with differing exposure settings and provides more detail to the very bright and dark areas, can offer a more detailed image.
As a best practice, do not assume the camera resolution is everything in regards to image quality. For a camera to operate in a day-night environment, (the absence of light is zero lux), the night mode must be sensitive to the infrared spectrum. It is highly recommended to conduct tests or pilot installations before buying large quantities of any model of camera.