Saturday, September 17, 2011

Why People Choose Wireless Security Cameras (WCCTV)

With the increase in need for security, the demand for security cameras is also on the rise. There are a variety of cameras available in the market, each made for specific purposes and have their own advantages and disadvantages. One of the never-ending debates is the choice between wired and wireless security cameras. While both have their own pros and cons, wireless cameras have become increasingly popular. Few reasons are:

1.) Wireless cameras can be placed at any location. You do not need to worry about installing wires or electric sockets at difficult to reach locations. All you need is a camera that can function within the signal range of your security system.
2.) You do not need to spend money on installing the new wiring system. In case of wireless security cameras, the expenditure on creating a network of insulated wires to connect the entire system can be saved. This is especially true for building that did not install extra wires at the time of construction.
3.) Wires can also make the presence of a camera obvious. If you looking at installing cameras that should not be noticed by every trespasser, wireless security cameras are the right option for you.
4.) Flexibility and mobility comes with wireless cameras. If you are investing in a security system for a building which you might leave in the future, it is best to invest in wireless security devices. Home owners who have taken their house on rent or lease prefer wireless cameras as they can take the cameras along as and when they move to the nest house.
5.) Save you decor with wireless cameras. You might have spent a lot of time and money in selecting the right decor for your home or office. Installing wires might interfere with the overall theme of your decor. Hence, you can opt for wireless cameras that can be installed with minimal disturbance to the entire property.
6.) If you are an owner of an ancestral property, you would not like to damage the masonry by drilling extra holes and wires into the invaluable structure. Hence, wireless cameras are the best option for you.
7.) Hidden cameras are best in wireless versions. While you can use wired cameras and hide them behind furniture, you need to be very careful in covering them. A wireless camera saves you from this effort. You can hide them anywhere without worrying about their getting discovered. Small toys, cutlery, pens and many other things can be equipped with wireless cameras easily.
8.) If you want to use internet to transfer images to you computer, you can go for wireless cameras. The data transmitted through internet can be accessed from any internet enabled system outside your home or office as well.
9.) If are installing the security system yourself, if is always better to choose wireless cameras as they are the easiest to install.

Sunday, September 11, 2011

IP cameras with Audio Detection

What is the best IP cameras with audio you used?
What security audio and video applications have you had experience with and what is the best IP cameras with audio you used?
What is IP Camera Audio and Advanced Audio Detection?
-- Many More Question comeout in my mail/phones ...

If you’ve never considered having an audio component with your surveillance system that may be because analog CCTV systms require separate audio and video cables to be installed from end to end which becomes difficult and costly over long distances. IP cameras make the implementation of audio a lot simpler because the audio and video information are sent over the same network cable eliminating the need for extra cabling.

More and more IP camera audio is becoming a common feature not only because it’s easier to process over a network cable but also because the importance of this additional surveillance medium is now being recognized.

Importance of IP Camera Audio:

Detect emergency situations and make sense of other events.
Audio covers a 360° area - surveillance systems coverage is extended beyond the field of view.
Audio detection can trigger email or, other alerts and automatically direct where a camera should record.
Having audio integrated into your surveillance simply gives you more information about a situation. Many times something is brought to our attention first by what we hear, not what we see. Car alarms, gunshots, breaking glass, and screams will not be recognized by a surveillance camera without audio. With 360° coverage, an event happening behind a camera can still be detected.

Three Audio Modes
If you’re considering audio for your appliction your intended use should be clear because it can affect which IP cameras you can select as there are three audio modes available:
Simplex: Audio can be sent in one direction only. Either from the camera only (most likely) or, from the user only.
Half-Duplex: Audio can be sent and received in both directions (to/from camera and user), BUT only in one direction at a time.
Full-Duplex: Audio is sent and received at the same time - similar to a telephone conversation.
For example, Axis offers a camera, the Axis 207MW that offers one-way audio with a built in mic while the Axis M1054 offers two-way audio support with a built-in mic and speaker.
Features such as noise cancellation and echo cancellation are also available that reduce background noise or eliminate feedback.

Audio Detection Alarm
In the same way that an IP camera can analyze video, they can intelligently analyze audio as well. As noted above, audio can hear what the video cannot see. Audio detection complements video motion detection very well because it reacts to events in areas that are too dark for the video motion detector to pick up on.
Audio detection alarms can be programmed so that when any sound (glass breaking, voices in a room, etc.) is detected, they can trigger an IP camera to:
Send & record video and audio
Send email or other alerts
Active external devices - Alarms, floodlights
Trigger a PTZ IP camera to automatically pan to a preset location to begin recording.
Audio detection can be enabled all time, at specific times, or disabled. It can also be configured to trigger an event if a sound level rises above, falls below, or passes a certain level of sound intensity. Sony IP Cameras has a great video demonstration of this function here:
Some of the applicable Sony IP cameras and video servers that have this feature can be found here:
Sony SNC-CH140
Sony SNC-RS46N
Sony SNT-EX101

Audio Compression & Audio Bit Rates:
Audio compression and audio bit rates, just like video compression and video bit rates, are an important consideration when calculating total bandwidth and storage requirements.
Just like video, audio compression uses a codec to reduce the size for efficient transmission and storage. Some audio codecs support CBR (constant bit rate) mode only or both CBR and VBR (variable bit rate) - these factors affect quality and file size.
Bit rate is an important audio setting because it determines the level of compression or, quality of the audio. Generally speaking, the higher the compression level = the lower the bit rate = the lower the audio quality.

Audio/Video Synchronization
Audio and video are two separate packet (data) streams that are sent over a network. For audio and video to play back perfectly syncronized, the two packets must be time-stamped so that they match up.

Best Practices For Audio Implementation
Audio Equipment & Placement: Select a location that will minimize interferring noise and one that’s as close to the source of the sound as possible.
Amplify Audio Signal Early: This minimizes noise in the signal chain.
Acoustical Adjustments: Adjust input gain and use features such as echo cancellation to improve audio quality.
Codec & Bit Rate Selection: Codec and Bit Rate choice affect audio quality. High compression = low quality (but available bandwidth may be a deciding factor).
Shielded Cable: Shielded cable reduces disturbance and noise. Avoid running cable near power cables or high-frequency switching signals.
Legal Implications: What are you allowed to record? Some countries restrict the use of audio and video surveillance - be sure to check with your local authorities.

visit:

Thursday, September 1, 2011

RAW Formats

RAW Format implies that there is no compression done on the image. The major types of RAW format are RGB, YUV, YIQ. Our eye is more sensitive towards light intensity variation than color variation. So loss on color information will not affect the over all quality of the image. RGB is an end stream format. Information from the image sensor is in RGB format and we need the same format for displaying the image on an end
device. YUV & YIQ formats are developed for Analog TV transmission (NTSC & PAL respectively) and the digital version of YUV, YCbCr is the most common format used for image and video compressions.
Conversion from one format to another is described below:
RGB to YCbCr Conversion
Y = 0.299 R + 0.587 G + 0.11B
Cb = 0.564 (B - Y)
Cr = 0.713 (R - Y)
YCbCr to RGB
R = Y + 1.402 Cr
G = Y – 0.344 Cb – 0.714 C r
B = Y + 1.722 Cb
Y – Luminance Signal
Cb, Cr – Chrominance Signal, Color difference signal
R – Red
G – Green
B – Blue
Need for Compression
Consider an image of resolution 640 × 480. Let us calculate the size of the picture in RAW format. Each of the 10 Color is represented by 8 bits. Then for each pixel it needs 24 bits. Total no of pixels in the image is 640 × 480 = 307200 pixels. Therefore the size of the image turns to 307200 × 3 bytes = 921600 bytes. But an image in compressed format with the same resolution takes only 100 KB.
In the case of RAW video stream of length 1 sec its needs 640 × 480 × 3 × 25 = 23040000 bytes (23 MB) of storage if the frame rate is 25 frames/sec. But it’s known that the VCD format video having a size 700 MB plays for around 80 minutes. In the former case we need 110400 MBs (23 MB × 60 × 80) as storage space for 80 minutes video. Therefore we can achieve a high compression 150: 1 at the cost of computational complexities.

Tuesday, August 16, 2011

NAS, DAS, or SAN? - Choosing the Right Storage Technology ?

Data is unquestionably the lifeblood of today's digital organization. Storage solutions remain a top priority in IT budgets precisely because the integrity, availability and protection of data are vital to business productivity and success. But the role of information storage far exceeds day to day functions. Enterprises are also operating in an era of increased uncertainty. IT personnel find themselves assessing and planning for more potential risks than ever before, ranging from acts of terrorism to network security threats. A backup and disaster recovery plan is essential, and information storage solutions provide the basis for its execution.

Businesses are also subject to a new wave of regulatory compliance legislation that directly affects the process of storing, managing and archiving data. This is especially true for the financial services and healthcare industries, which handle highly sensitive information and bear extra responsibility for maintaining data integrity and privacy.

Although the need for storage is evident, it is not always clear which solution is right for your organization. There are a variety of options available, the most prevalent being direct-attached storage (DAS), network-attached storage (NAS) and storage area networks (SAN). Choosing the right storage solution can be as personal and individual a decision as buying a home. There is no one right answer for everyone. Instead, it is important to focus on the specific needs and long-term business goals of your organization. Several key criteria to consider include:
• Capacity - the amount and type of data (file level or block level) that needs to be stored and shared
• Performance - I/O and throughput requirements
• Scalability - Long-term data growth
• Availability and Reliability - how mission-critical are your applications?
• Data protection - Backup and recovery requirements
• IT staff and resources available
• Budget concerns
While one type of storage media is usually sufficient for smaller companies, large enterprises will often have a mixed storage environment, implementing different mediums for specific departments, workgroups and remote offices. In this paper, we will provide an overview of DAS, NAS and SAN to help you determine which solution, or combination of solutions, will best help you achieve your business goals.


DAS: Ideal for Local Data Sharing Requirements

Direct-attached storage, or DAS, is the most basic level of storage, in which storage devices are part of the host computer, as with drives, or directly connected to a single server, as with RAID arrays or tape libraries. Network workstations must therefore access the server in order to connect to the storage device. This is in contrast to networked storage such as NAS and SAN, which are connected to workstations and servers over a network. As the first widely popular storage model, DAS products still comprise a large majority of the installed base of storage systems in today's IT infrastructures. Although the implementation of networked storage is growing at a faster rate than that of direct-attached storage, it is still a viable option by virtue of being simple to deploy and having a lower initial cost when compared to networked storage. When considering DAS, it is important to know what your data availability requirements are. In order for clients on the network to access the storage device in the DAS model, they must be able to access the server it is connected to. If the server is down or experiencing problems, it will have a direct impact on users' ability to store and access data. In addition to storing and retrieving files, the server also bears the load of processing applications such as e-mail and databases. Network bottlenecks and slowdowns in data availability may occur as server bandwidth is consumed by applications, especially if there is a lot of data being shared from workstation to workstation.

DAS is ideal for localized file sharing in environments with a single server or a few servers - for example, small businesses or departments and workgroups that do not need to share information over long distances or across an enterprise. Small companies traditionally utilize DAS for file serving and e-mail, while larger enterprises may leverage DAS in a mixed storage environment that likely includes NAS and SAN. DAS also offers ease of management and administration in this scenario, since it can be managed using the network operating system of the attached server. However, management complexity can escalate quickly with the addition of new servers, since storage for each server must be administered separately.

From an economical perspective, the initial investment in direct-attached storage is cheaper. This is a great benefit for IT managers faced with shrinking budgets, who can quickly add storage capacity without the planning, expense, and greater complexity involved with networked storage. DAS can also serve as an interim solution for those planning to migrate to networked storage in the future. For organizations that anticipate rapid data growth, it is important to keep in mind that DAS is limited in its scalability. From both a cost efficiency and administration perspective, networked storage models are much more suited to high scalability requirements.

Organizations that do eventually transition to networked storage can protect their investment in legacy DAS. One option is to place it on the network via bridge devices, which allows current storage resources to be used in a networked infrastructure without incurring the immediate costs of networked storage. Once the transition is made, DAS can still be used locally to store less critical data.
NAS: File-Level Data Sharing Across the Enterprise

Networked storage was developed to address the challenges inherent in a server- based infrastructure such as direct-attached storage. Network-attached storage, or NAS, is a special purpose device, comprised of both hard disks and management software, which is 100% dedicated to serving files over a network. As discussed earlier, a server has the dual functions of file sharing and application serving in the DAS model, potentially causing network slowdowns. NAS relieves the server of storage and file serving responsibilities, and provides a lot more flexibility in data access by virtue of being independent.

NAS is an ideal choice for organizations looking for a simple and cost-effective way to achieve fast data access for multiple clients at the file level. Implementers of NAS benefit from performance and productivity gains. First popularized as an entry-level or midrange solution, NAS still has its largest install base in the small to medium sized business sector. Yet the hallmarks of NAS - simplicity and value - are equally applicable for the enterprise market. Smaller companies find NAS to be a plug and play solution that is easy to install, deploy and manage, with or without IT staff at hand. Thanks to advances in disk drive technology, they also benefit from a lower cost of entry.

In recent years, NAS has developed more sophisticated functionality, leading to its growing adoption in enterprise departments and workgroups. It is not uncommon for NAS to go head to head with storage area networks in the purchasing decision, or become part of a NAS/SAN convergence scheme. High reliability features such as RAID and hot swappable drives and components are standard even in lower end NAS systems, while midrange offerings provide enterprise data protection features such as replication and mirroring for business continuance. NAS also makes sense for enterprises looking to consolidate their direct-attached storage resources for better utilization. Since resources cannot be shared beyond a single server in DAS, systems may be using as little as half of their full capacity. With NAS, the utilization rate is high since storage is shared across multiple servers.

The perception of value in enterprise IT infrastructures has also shifted over the years. A business and ROI case must be made to justify technology investments. Considering the downsizing of IT budgets in recent years, this is no easy task. NAS is an attractive investment that provides tremendous value, considering that the main alternatives are adding new servers, which is an expensive proposition, or expanding the capacity of existing servers, a long and arduous process that is usually more trouble than it's worth. NAS systems can provide many terabytes of storage in high density form factors, making efficient use of data center space. As the volume of digital information continues to grow, organizations with high scalability requirements will find it much more cost-effective to expand upon NAS than DAS. Multiple NAS systems can also be centrally managed, conserving time and resources.

Another important consideration for a medium sized business or large enterprise is heterogeneous data sharing. With DAS, each server is running its own operating platform, so there is no common storage in an environment that may include a mix of Windows, Mac and Linux workstations. NAS systems can integrate into any environment and serve files across all operating platforms. On the network, a NAS system appears like a native file server to each of its different clients. That means that files are saved on the NAS system, as well as retrieved from the NAS system, in their native file formats. NAS is also based on industry standard network protocols such as TCP/IP, FC and CIFS.

SANs: High Availability for Block-Level Data Transfer

A storage area network, or SAN, is a dedicated, high performance storage network that transfers data between servers and storage devices, separate from the local area network. With their high degree of sophistication, management complexity and cost, SANs are traditionally implemented for mission-critical applications in the enterprise space. In a SAN infrastructure, storage devices such as NAS, DAS, RAID arrays or tape libraries are connected to servers using Fibre Channel. Fibre Channel is a highly reliable, gigabit interconnect technology that enables simultaneous communication among workstations, mainframes, servers, data storage systems and other peripherals. Without the distance and bandwidth limitations of SCSI, Fibre Channel is ideal for moving large volumes of data across long distances quickly and reliably.

In contrast to DAS or NAS, which is optimized for data sharing at the file level, the strength of SANs lies in its ability to move large blocks of data. This is especially important for bandwidth-intensive applications such as database, imaging and transaction processing. The distributed architecture of a SAN also enables it to offer higher levels of performance and availability than any other storage medium today. By dynamically balancing loads across the network, SANs provide fast data transfer while reducing I/O latency and server workload. The benefit is that large numbers of users can simultaneously access data without creating bottlenecks on the local area network and servers.

SANs are the best way to ensure predictable performance and 24x7 data availability and reliability. The importance of this is obvious for companies that conduct business on the web and require high volume transaction processing. Another example would be contractors that are bound to service-level agreements (SLAs) and must maintain certain performance levels when delivering IT services. SANs have built in a wide variety of failover and fault tolerance features to ensure maximum uptime. They also offer excellent scalability for large enterprises that anticipate significant growth in information storage requirements. And unlike direct-attached storage, excess capacity in SANs can be pooled, resulting in a very high utilization of resources. There has been much debate in recent times about choosing SAN or NAS in the purchasing decision, but the truth is that the two technologies can prove quite complementary. Today, SANs are increasingly implemented in conjunction with NAS. With SAN/NAS convergence, companies can consolidate block-level and file-level data on common arrays.

Even with all the benefits of SANs, several factors have slowed their adoption, including cost, management complexity and a lack of standardization. The backbone of a SAN is management software. A large investment is required to design, develop and deploy a SAN, which has limited its market to the enterprise space. A majority of the costs can be attributed to software, considering the complexity that is required to manage such a wide scope of devices. Additionally, a lack of standardization has resulted in interoperability concerns, where products from different hardware and software vendors may not work together as needed. Potential SAN customers are rightfully concerned about investment protection and many may choose to wait until standards become defined.

Conclusion

With such a variety of information storage technologies available, what is the best way to determine which one is right for your organization? DAS, NAS and SAN all offer tremendous benefits, but each is best suited for a particular environment. Consider the nature of your data and applications. How critical and processing-intensive are they? What are your minimum acceptable levels of performance and availability? Is your information sharing environment localized, or must data be distributed across the enterprise? IT professionals must make a comprehensive assessment of current requirements while also keeping long-term business goals in mind.

Like all industries, storage networking is in a constant state of change. It's easy to fall into the trap of choosing the emerging or disruptive storage technology at the time. But the best chance for success comes with choosing a solution that is cost-correct and provides long term investment protection for your organization. Digital assets will only continue to grow in the future. Make sure your storage infrastructure is conducive to cost-effective expansion and scalability. It is also important to implement technologies that are based on open industry standards, which will minimize interoperability concerns as you expand your network.

Sunday, August 14, 2011

IP CCTV transmission methods

There are essentially three ways of transmitting video streams over the network from the source to the destination: broadcast, unicast and multicast.

Broadcast
Broadcast is defined as a one-to-all communication between the source and the destinations. In IP video surveillance, the source refers usually to the IP camera and the destination refers to the monitoring station or the recording server. In this case, broadcasting would mean that the IP camera would send the video stream to all monitoring stations and recording servers, but also to any IP devices on the network, even though only a few specific destination sources had actually requested the stream. Typically, this method of transmission is not commonly used in IP video surveillance applications, but can be seen more often in the TV broadcasting industry where TV signals are switched at the destination level.

Unicast
Unicast is defined as a one-to-one communication between the source and the destination. Unicast transmissions are usually done in TCP or UDP and require a direct connection between the source and the destination. In this scenario, the IP camera (source) needs to have the capabilities to accept many concurrent connections when many destinations want to view or record that same video at the same time.
In terms of video streaming in unicast transmission, the IP camera will stream as many copies of the video feed requested by the destinations. In figure 1 below, three copies of the same video stream are sent over the network; one copy for each of the three destinations requesting the stream. If each video stream is 4 Mbps, this transmission will produce 12 Mbps (3x4Mbps) of data on multiple network segments.

As a result, many destinations connected in unicast to a video source can result in high network traffic. In other words, if we imagine a large system with 200 destinations requesting the same video stream, we would end up having 800 Mbps (200x4Mbps) of data travelling over the network, which is realistically unmanageable. Although this method of transmission is widely used over the Internet where most routers are not multicast-enabled, within a corporate LAN, unicast transmission is not necessarily the best practice as it can quickly increase the bandwidth needed for viewing and recording camera streams.

Multicast
In multicast transmission, there is no direct connection between the source and the destinations. The connection to the video stream of the IP camera is done by joining a multicast group, which in simple terms means actually connecting to the multicast IP address of the video stream. So the IP camera only sends a single copy of the video stream to its designated IP address and the destination simply connects to the stream available over the network with no additional overhead on the source. In other words, the destinations share the same video stream. In figure 2 below, the same three destinations requesting the video stream have the same impact on the network as a single destination requesting the stream in unicast and there is no more than 4 Mbps of data travelling on each segment of the network. Even with 200 destinations requesting that video stream, the same amount of data would be travelling on the network.

It is evident at this point that using multicast transmissions in an IP video surveillance application can save a lot of bandwidth, especially in large scale deployments where the number of destinations can grow very quickly.


Bandwidth optimisation for IP CCTV
When it comes to IP video surveillance, it is important to efficiently manage the way video streams are transmitted over the network in order not to overload the available bandwidth. Even though IT infrastructures are built to handle any kind of data, the applications generating traffic over the IP network need to be conducive with the efficient utilization of the network resources in place. To this end, different functionalities and mechanisms are offered by IP video surveillance solution providers to allow optimization of bandwidth and network resources such as:
• Multicasting
• Multistreaming
• Video compression

Even though the capacity and speed of the network are constantly increasing and its associated costs are declining, this is still not a good reason for users to ignore the additional investments and efforts needed to optimise bandwidth management. The amount of data travelling on the network is also still on the rise and therefore, investments in bandwidth optimization are ones that can contribute to a reduction in total cost of ownership, specifically in respect to efficiency gains and maximized resources.

For example, in video surveillance, more and more end-users are requesting cameras with higher picture quality and resolution, often opting for high-definition and megapixel cameras. These types of cameras require much more bandwidth than standard definition cameras. Also, more and more people inside as well as outside an organization’s walls are requesting access to video streams over the network. In the case where a large number of users are simultaneously trying to access a specific video stream, efficient use of network resources can be crucial in avoiding overloaded capacity and entire network crashes.
It is equally important to realize that optimizing the bandwidth on the network does not necessarily go hand in hand with large capital investments, but is more a matter of putting the right solutions in place and leveraging the unique and powerful capabilities of these solutions.

Saturday, August 13, 2011

Which Image Quality is Better

When thinking about maximizing image quality, resolution is usually the first thing that comes to mind. However, resolution is not the only factor that impacts quality. The amount of bandwidth available and used can have a dramatic impact on image quality. In this report, we examine bandwidth and the effect that it has on quality across numerous cameras.
Which Image Quality is Better?
To better understand image quality, let's start by examining two samples of the same scene side by side:
 
Consider two questions:
1. Which camera has higher resolution? A or B?
2. Which camera is better? A or B?
It is pretty obvious that the image from Camera B is better so this should be a simple case.
The reality is that those images are from the same camera at the same resolution and frame rate (720p/30). All that was done to the camera was changing the Constant Bit Rate target from 512 Kb/s to 8 Mb/s.
Factors Impacting Quality:
Even with the same resolution, two common settings impact quality: 
1. Bit Rate: Most cameras can have their bit rate adjusted to specific levels (e.g., 512 Kb/s, 2 Mb/s, 8Mb/s, etc.) 
2. Quantization Level: Most cameras can have the level of compression adjusted (often called a quality or compression setting with options from 1-10 or 0-100)
Typically, these are mutually exclusive. If you lock in bit rate, the camera will automatically adjust the quantization level to not exceed the bandwidth set. Vice versa, if you set the quantization level, the camera will automatically change the bandwidth consumed to make sure the quality / compression always stays at the same level.
Our Test Process
We wanted to better understand how changes in these two factors impact video quality. To do so, we did a series of tests with three HD cameras: the Axis P1344, the Sony CH140 and the Bosch NBN-921.
For the bandwidth tests, we tested each camera at the following levels:
  • 512 Kb/s
  • 1 Mb/s
  • 2 Mb/s
  • 4 Mb/s
  • 8 Mb/s
We did this across a series of scenes to see how quality would vary in different conditions:
  • Daytime Indoors (300 lux)
  • Nighttime Indoors (.5 lux)
  • Daytime Intersection
Finally, we did a similar series of tests varying the quality level of a VBR camera (the Axis across 0, 30, 60 and 100 levels) to better understand changes in quality and bandwidth consumption.

Sunday, July 24, 2011

How to Avoid Getting Hacked video

In 1995, a movie called Hackers debuted showing the life of a group of hackers and what kind of trouble they can cause. Hacking is still an ongoing problem today and as a result has crept into the security market through integrated information systems. In this article I’ll share some tips that can help you keep this cyber intrusion away from your home or business.

Generally, most technologically people get excited about the idea of being able to turn on lights, view security cameras, and control other gadgets at home with a Smart Phone. Unfortunately, there are criminals learning how to break into your systems despite increased security and better technology. So as you log in and review footage on your DVR or control feature of your Smart Home, a cyber thief could be following your every move. The best way to keep these so called cyber criminals from hacking into your system is to use encryption. If you leave any part of your system unencrypted, you’ve already created a huge vulnerability.

Many people in the residential market or in small businesses do not need to go to such extremes as encrypting video feeds. It may be necessary though if you’re trying to protect priceless property or have had issues in the past with people trying to steal certain items.

Some DVRs have a watermark feature to aid in preventing theft. This feature can help a viewer tell the difference between a genuine feed and a fake. I also recommend changing user names and passwords on a regular basis. You don’t want to leave your system with the factory defaults of admin/admin or 12345. Login information like this is what hackers are going to try first. Many customers have asked me to log into their systems and when I ask them what their user name and password is, they often respond saying, “I don’t know who set it up, I just have it saved to auto log in”. This is not a good practice and won’t keep your system secure. Remember if you want to keep your security system safe from hackers, you must, first, keep it safe from a 5 year old.

Monday, July 18, 2011

How to Selecting the right CCTV video compression

If you are responsible for planning or designing a new CCTV video surveillance system, you have to make a technology choice regarding which video compression technique to use.

For sure, it will be digital. But which video compression scheme is the most suitable for your application?

1. Motion JPEG CCTV video compression
The JPEG standard was developed by the Joint Photographic Expert Group (part of ISO) for efficient storage of individual frames. Motion JPEG or M-JPEG is a series of separate JPEG images that form a video sequence. When 16 JPEG image frames or more are joined together per second, the result is an illusion of motion video. Video reproduction at 30 frames per second (FPS) for NTSC signals or 25 FPS for PAL signals is called full motion video or continuous-motion video.

Although Motion JPEG is an unlicensed standard it is widely compatible with many applications that require low frame rates or technologies such as Video Analytics where frame by frame analysis is crucial.

Advantages
1. Ability to support multi-mega pixel resolution.
2. Ideal for courtroom single frame evidence.
3. Clearer images at lower frame rates than MPEG-4.
4. Frame by frame playback offers more frames to view.
5. Technology is simpler; this can reduce the cost of a camera or video codec.
6. At low bandwidth priority is given to Image Resolution.
Disadvantages
1. High bit rate for scenes with little or no activity increases bandwidth and storage.
2. Video quality deteriorates at higher compression ratios.
3. No M-JPEG standard often means incompatibility issues.
4. Converting M-JPEG into another format reduces video quality.
5. Dated technology superseded by more bandwidth-efficient encoding techniques.

MPEG-4 CCTV video compression
MPEG-4 is a compression standard that was introduced in late 1998 by the Moving Picture Experts Group. In video surveillance applications MPEG-4 Part 2, also known as MPEG-4 Visual is the version of MPEG-4 most commonly used. MPEG-4 supports both low-bandwidth applications and those applications that require high quality images, with virtually unlimited bandwidth and no limitations in frame-rate. Typically most MPEG-4 based encoders and cameras support video up to DVD quality.

MPEG-4 is much more efficient than M-JPEG because video frames are analysed prior to being sent across the network. The first compressed image (I frame) is used as a reference point, the following images only contain information that differs to the initial I frame reference image. Periodically I frames are transmitted within the video sequence to ensure a recent reference point. The distance between these I frames is known as the GOP (Group of Pictures). The distance between I frames is usually user definable depending on the application and activity in the scene. For example a 25 FPS video stream with a GOP of 50 would mean a new I frame with GOP change information is sent every 2 seconds. The viewing application on the receiving end of the transmission then reconstructs all images based on this information and displays the video.

Advantages
1. MPEG-4 up to 5 times more efficient than M-JPEG at low bandwidths.
2. Increases the amount of time video can be stored compared with M-JPEG.
3. Uses less network bandwidth when compared with M-JPEG.
4. Very efficient at high frame rates.
Disadvantages
1. When the bit-rate is limited video quality suffers.
2. Low efficiency at very low frame-rates or extremely high scene activity.
3. Can be liable to “blurring” on freeze frame or very high motion.

H.264 CCTV video compression
H.264 is the latest MPEG standard for video encoding that is geared to take video beyond the realms of DVD quality by supporting Hi Definition CCTV video. H.264 can also reduce the size of digital video by more than 80% compared with M-JPEG and as much as 50% with MPEG-4, all without compromising image quality. This means that much less network bandwidth and storage space are required. Since the typical storage costs for surveillance projects represent between 20 and 30 percent of the project cost significant savings can be made.

Like many sectors of our industry, the devil is in the detail and system integrators and end-users who wish to see the benefits of an IP-based solution should look to someone who really knows the technology and can give an impartial view. It is common sense that manufacturers will only support their own hardware and will promise the earth for it, whereas a distributor will have evaluated a number of solutions from different vendors and be able to say that product A is the best for solution B because of XYZ whereas product Y is the best for solution C because of etc etc.

Advantage
1. H.264 cameras is that they reduce the amount of bandwidth needed.if your megapixel camera needed 10 Mb/s before (with MJPEG), it might now need only 1.5 Mb/s. So for each camera, you will save a lot of bandwidth.
2. Eliminates barriers: Enables many more networks to support megapixel cameras.
3. The bitstream is fully compatible with existing decoders with no error/drift.
Disadvantages
1. Using analytics with these cameras reduces the H.264 benefit.
2. Costs few hundred dollars more per camera.

Saturday, July 16, 2011

Active X & Direct X Troubleshooting for Windows 2000 & XP

Time by Time I got call from Technician/Engineers/Sr. Engineers/Managers says” Hi Arindam I got your ref from XYZ actually we facing problem with Active X Component installing on Windows XP PC/Laptop “. Yes many sites in India on the Internet use Active X or Direct X controls to display web content. If you are having the following issues, the below instructions offer possible solutions. Before applying this you must knowing PC administrator Password.



Issues:
  • Active X or Direct X Will Not Load
  • WINXP IE Service Pack 2 Not Allowing Load
The following applies to Windows 2000 and Windows XP, and is meant to be used by experienced PC users ONLY.
  • Open Internet Explorer, click on Tools, click on Internet Options
  • Click on the Security Tab
  • Click to Highlight Internet, click Custom Level button
    • .NET framework-Run Authenticode not signed—click to ENABLE
    • Run components signed with Authenticode—- click to ENABLE
    • ActiveX controls and plug-ins
      • Automatic prompting for ActiveX controls—- click to ENABLE
      • Binary and scripting behaviors—- click to ENABLE
      • Download signed ActiveX controls—- click to ENABLED
      • Download unsigned ActiveX controls—- click to ENABLED
      • Init and script ActiveX controls not marked as safe—- click to ENABLED
      • Run ActiveX controls and plug-ins—- click to ENABLE
      • Script ActiveX controls marked safe for scripting—- click to ENABLED
  • Downloads
    • Auto prompt for downloads—- click to DISABLE
    • File downloads— click to ENABLE
    • Font download—- click to ENABLE
  • Java VM
    • Java permissions—— click to HIGH SAFETY
    • Access data sources across domains—- click to DISABLE
    • Allow META REFRESH—- click to ENABLE
    • Allow scripting of IE web-browser controls—- click to DISABLE
    • Allow scripting of windows without size or position—- click to DISABLE
    • Allow web pages to use restricted protocols for active— click to PROMPT
    • Display mixed content—– click to PROMPT
    • Don’t prompt for client certificate selection —— click to DISABLE
    • Drag and drop or paste files—– click to ENABLE
    • Installation of desktop items—-PROMPT
    • Launch programs and files in an IFRAME—- click to PROMPT
    • Navigate sub-frames across different domains— click to ENABLE
    • Open files based on content, not file extensions—- click to ENABLE
    • Software channel permissions—– click to MEDIUM SAFETY
    • Submit non-encrypted form date—- click to ENABLE
    • Use Pop-Up blocker—- click to ENABLE
    • User data persistence—– click to ENABLE
    • Web site in less privileged web content zone can navigate—- click to ENABLE
  • Scripting
    • Active scripting—– click to ENABLE
    • Allow paste operations via script—– click to ENABLE
    • Scripting of Java applets—- click to ENABLE
  • User Authentication
    • Logon
      • click to Automatic logon only in Intranet zone

Saturday, June 25, 2011

Components of a stand alone solar PV system for CCTV System


Sunlight to Electricity is photovoltaic technology converts sunlight into electricity and is emerging as a major power source for CCTV due to its numerous environmental and economic benefits and proven reliability. Enough free sunlight falls on earth to supply our energy needs for years to come.
Environmental Benefits: As PV generates electricity from light, PV produces no air pollution or hazardous waste. It doesn't require liquid or gaseous fuel to be transported or combusted.


Economic and Social Benefits: Sunlight is free and abundant. A photovoltaic system allows you to generate electricity and store it for use when needed. Photovoltaic contributes to our energy security, as a young technology, it creates jobs and strengthens the economy. It frees us from uncertainties and foreign oil dependence.

This energy source is free, clean and highly reliable. PV systems are long-lasting and require little maintenance. The benefits of Photovoltaic’s far outweigh the initial cost the systems.

Solar Panels (PV) Modules
The DC electricity produced by the solar panel or module(s) is used to charge batteries via a solar charge controller. Any DC appliances that are connected to the battery will need to be fused.  DC lights are normally connected to the charge controller. Any AC appliances are powered via an inverter connected directly to the batteries. NOTE: inverters used in grid tie and stand alone systems are different and should not be interchanged.
Most stand alone PV systems need to be managed properly. Users need to know the limitations of a system and tailor energy consumption according to how sunny it is and the state of charge (SOC) of the battery.
Configuration
The solar panels need to be configured to match the system DC voltage, which is determined by the battery. System voltages are typically, 12V DC and 24V DC, larger systems will operate at 48V DC.
The operating voltage of a solar panel in a stand-alone system must be high enough to charge the batteries. For example, a 12V battery will require 14.4V to charge it. The solar panel must be able to deliver this voltage to the battery after power losses and voltage drop in the cables and charge controller and in conditions in which the solar cells operate at a high temperature. A solar panel with a Voc of about 20V is required to reliably charge a 12V battery.
Charge Controllers (Solar controller (or solar regulator))
A charge controller is designed to protect the battery and ensure it has a long working life without impairing the system efficiency. Batteries should not be overcharged and the function of the charge controller is to ensure that the battery is not over charged.
  • Charge controllers are designed to function as follows:
  • Protect the battery from over-discharge, normally referred to as low voltage disconnect (LVD) that disconnects the battery from the load when the battery reaches a certain depth of discharge (DOD).
  • Protect the battery from over-charging by limiting the charging voltage - this is important with sealed batteries - it is usually referred to as high voltage disconnect (HVD).
  • Prevent current flowing back into the solar panel during the night, so called reverse current.

NOTE: controllers with MPP tracking will ensure that the solar modules operate at optimal rating and can increase output by 10% or more.
Batteries
The power requirements of stand alone pv systems are rarely in sync with the battery charging. Appliances and loads need to be powered when there is sufficient solar radiation, during overcast weather and during the night. Bad weather may last for several days and the daily charging and discharging of the batteries takes its toll on them. Batteries that are able to handle the constant charging and discharging are known as deep cycle batteries. Batteries need to have a good charging efficiency, low charging currents and low self-discharge.
Battery Ah Efficiency
The Ah efficiency of a battery describes the relationship between Ah that are put into the battery and the Ah that are taken out. Under ideal conditions a new deep-cycle battery would be 90% efficient.
Choosing the most appropriate battery
The important characteristics to look for are:
  • capacity
  • cycle life
  • price / performance
  • size and space requirements
  • Ah efficiency
  • self-discharge rate
  • installation - vertical or horizontal
  • environmental - will batteries be placed near water supplies or in wildlife parks etc