Wednesday, July 10, 2019

System Integration for High-rise Buildings

System Integration for High-rise Buildings

Integrated systems, or systems integration (SSA – Security Safety Automation), is the process of bringing together component sub-systems into one functional system. It provides a system with coherence by making the parts or components work together, or 'building or creating a whole from parts.

A component means HVAC / VRV, Plumbing, Fire Fighting with Detection, Electrical Systems, Lifts, elevators, Intrusion Alarm, Access Control, UPS & Lighting Automation etc. The result of integration creates BMS.  The powerful combination of open systems protocols and a scalable platform means the BMS can help support growth and expansion of the system in the future. So Building Automation System (BAS) or Building Management System (BMS) is the automatic centralized control of a building's heating, ventilation and air conditioning, lighting and other systems through a building management system or building automation system. The objectives of building automation are improved occupant comfort, efficient operation of building systems, and reduction in energy consumption and operating costs, and improve life cycle of utilities. The Building Automation System (BAS) core functionality is to keep building climate within a specified range, light rooms based on an occupancy schedule, monitor performance and device failures in all systems and provide malfunction alarms. Automation systems reduce building energy and maintenance costs compared to a non-controlled building.
Now we consider a building having 62 floors height is 268 meters (The 42 is a residential skyscraper in Kolkata in the state of West Bengal in India.) tower that is technically advanced, sustainable, and forward-looking. Designed by Hafeez Contractor Architect. Excerpts from the mechanical, electrical, plumbing (MEP), communications, security, and sustainable design specification sections for that building are provided below. For our reader this is just an examples, we are not confirm reality of System integration at “The 42”.

Mechanical
Chilled water:
The building’s cooling will be provided by offsite district chilled-water production plants via pipe connections from street distribution to the energy-transfer room located at the lower level.

Heating systems:

  •        Electric-resistance heating coils will be provided with each dedicated outside air handling unit, as well as each amenity and lobby air handling unit.
  •          Electric-resistance baseboard heaters will be provided along perimeter windows and walls for the ground-floor lobby and at all floors with perimeter glazing higher than 9-ft 6-in.
  •      Baseboard heaters will be interlocked with the fan-powered box serving the respective perimeter area.
  •       Electric-resistance baseboard heaters along perimeter windows and walls for ground-floor retail areas will be provided by the tenants. Baseboard heaters shall be interlocked with the respective air conditioning units provided by the tenants.
Air conditioning
·    Four factory-packaged dedicated outside-air units will be provided in the Level 20 mechanical room to provide minimum code-required ventilation air to all of the typical office floors.
  •         Conference center and fitness area: Variable-volume factory package units will be provided in the mezzanine space above the Level 2 locker room and toilet space to serve the conference center and fitness areas.
  •         Ground-floor lobby: A variable-volume factory package unit will be provided in the basement level to serve the entrance lobby and lounge.

Duct distribution systems
Perimeter offices and interior offices will be supplied from separate variable air volume series flow-fan-powered boxes, system pressure-independent direct digital control (DDC) by the building automation system (BAS) or Building Management System (BMS), low leakage and low-pressure drop for space-temperature control. Perimeter fan-powered boxes will include electric heating coils for envelope heat.

DDC/BAS network, communication, and software
  •   The DDCs and BAS shall provide central control and monitoring of major HVAC equipment. The DDC/BAS will consist of two tiers or levels of networks.
  •    The first-tier network shall provide connectivity between all DDC network controllers (B-BC), the BAS server, and dedicated BMS operator workstations. It shall be Ethernet-based and shall serve as a backbone for all base building technology systems. A virtual local area network (VLAN) may be portioned by the owner and dedicated for BMS communications.
  •    The second-tier networks shall provide communications from each DDC network controller (B-BC) to all DDC controllers, variable-speed drives, equipment-mounted controllers, and other smart field devices.
  •    The BAS shall have custom graphical displays to monitor the operation of HVAC equipment connected to the BAS. User displays shall also include floor plans. Graphical displays shall be submitted electronically to the client and the engineer for review.
  •    Each DDC shall connect to a communication network for central monitoring, remote override, setpoint adjustment, history collection to archive, and alarm annunciation. The BAS shall be capable of generating both advisory and critical alarm-notification messages via email to the designated recipients as determined by the client. Each DDC shall monitor and control the associated HVAC unit in a stand-alone configuration, independent of any other DDC.

BMS hardware features 
All BMS network communications shall use a physical layer of Ethernet and EIA-485. Ethernet cabling will be provided by structured cabling. EIA-485/twisted pair cabling shall be provided by the DDC contractor.

Electrical Systems
Electric service
  •          Primary distribution: Service feeders, originating from separate networks, to the project via underground concrete-encased duct banks. These duct banks shall enter into a utility-owned main-line switching station and transformer vault located in the basement level.
  •          Secondary distribution: The building shall be provided with service entrance switchboard rooms and vertically aligned branch electrical closets strategically located to provide an efficient and economical distribution of wiring systems throughout the facility.
Lighting
  •          Provide lighting systems for base building lobbies; electrical, telephone, mechanical, and elevator equipment rooms; parking; service areas; corridors; stairways; toilets; storage rooms; dock area; elevator pits; supply and recirculation fan plenums; roof hatches; exit signs; etc. The lighting system shall be complete with fixtures, ballasts, drivers, lamps, branch circuits, and controls to interface with BMS and accessories.
  •          Daylighting and shade controls.
Plumbing
Domestic cold water
  •          Provide dual domestic water services connected to the water main in the street per the local water department’s requirements and route into the building’s dedicated pump room.
  •       Provide and install domestic-water service, water meters, and all associated valves on the water services as required by the City and a branch with water line with a double-detector check-valve assembly for continuation by the fire protection contractor.

Storm water system
  •         Furnish and install roof drains at all roofs along with the interior drainage system and downspouts for a complete operable storm water system.
  •          All storm/waste piping, above grade level, shall be connected to a gravity storm sewer. Collect all storm piping and route to the storm detention structure included with overflow. The civil engineer will continue the sewer from that point.

Fire Protection
NFPA 13 apply for High rise building,
Standpipe system
  •          A standpipe system shall be provided for the new proposed high-rise building.
  •      The water supply for the combination sprinkler and standpipe riser shall be hydraulically calculated to supply a residual pressure of 65 psi at the top most outlets, with a flow rate equal to 250 gpm plus actual sprinkler system demand but not less than 500 gpm approx. Through the flow switch BMS get data.

 Automatic sprinkler system
  •      A supervised automatic sprinkler system shall be installed throughout the entire premises, except in dedicated electrical transformer rooms, dedicated main-building switchboard rooms, dedicated electrical closets or rooms where voltage exceeds 600 V, base building life safety emergency generator rooms, elevator shafts, and elevator machine rooms.

Fire Detection
Most fire alarm systems on the market today have the capability to output fire alarm signals over BACnet protocols. This is accomplished via a BACnet gateway that allows the fire alarm system to output signals to third-party equipment as BACnet objects. The third-party equipment can be configured to read and react to data received from the gateway. In order to ensure life safety is not impacted by any integrated non-fire system, a listed barrier gateway, integral with or attached to each control unit or group of control units, as appropriate, must be provided to prevent the other systems from interfering with or controlling the fire alarm system.

The BACnet interface is a standalone piece of fire alarm equipment, so it is constantly online and goes offline only if it loses both primary and backup power, or if it is being serviced. Therefore, there is no downtime or signal restoration necessary when the fire alarm system is reset. If any of the fire alarm points that are being supervised by the gateway change state at any time, the BACnet gateway will automatically change the status of the BACnet objects associated with those points.

Communications
Spaces and Pathways
  •     Spaces—TEF: Two separate telecommunications entrance facilities will be located on the basement level. These are small rooms where the telecommunications service providers will transition their outside-plant cabling to indoor-rated cabling and shall bond the cable sheaths. Multiple service providers may enter the building via the same TEF. They will each be given proportioned wall space to place their splice equipment.
  •      Pathways—incoming services: conduits from the property line are specified for incoming serve to each of the two TEF rooms.

Structured Cabling
Backbone
  •      Vertical fiber backbone: One 12-strand OM4 multimode fiber-optic cable will be provided from telecommunications room to every 5 floors as well as the basement.
  •        This backbone is for the building’s network and other systems the building wishes to deploy. It will allow the IP devices (BAS controllers, lighting controllers, security-access control panels, security cameras, etc.) on each group of three floors to connect to the building LAN access switch.
  •          There may be a consideration for additional single-mode fiber-optic cabling if it is required to support a distributed antenna system implementation.

Data Network
The data network provides the delivery of information services throughout the building. The data network is a single, unified physical network that is comprised of several independent logical networks. A wide variety of network-enabled devices use the data network utility to send and receive information. A device’s ability to communicate with other devices is governed by the security policies that are implemented throughout the data network. By designing and implementing the data network to be flexible and adaptive, this reduces the management and operational expense of reconfiguration once the network is installed.
The systems/devices that will use the unified data network include the following:
  •        Security (access control, video surveillance, visitor management, intercom).
  •        Building control systems (integrated automation system (IAS), BAS, lighting/shade controls, elevator controls).
  •        Audio/video (digital signage, background music, control system).
  •         Wireless.
  •        User devices (PCs, phones, printers, multifunction devices).
  •        Servers.

Voice system
The main voice system will be completely Voice over Internet Protocol, with voice servers residing in the hosted offsite. The voice system shall have a redundant voice server with automatic failover capabilities.

Distributed antenna system
The building will deploy a DAS that will provide cellular enhancement for multiple wireless carriers over a common infrastructure. It also will allow for two-way radios used by building operations staff to utilize the same infrastructure.

Security system
General description
System purpose: The security system is designed to control authorized access and prohibit unauthorized access to private or restricted spaces and to record access events for later investigation or audit purposes. The security system will consist of card-reader access control, Boom barrier / Flap Gate, visitor management, intercom, and security camera subsystems. Duress- or panic-alarm systems and intrusion-alarm systems are not included.

Access Control System (ACS)
The purpose of the ACS is to control authorized access and prohibit unauthorized access to private or restricted spaces and to record access activity for later investigation or audit purposes. The ACS will consist of card readers, data-gathering panels, door controls/sensors, and door alarms.

Visitor Management System (VMS)
·         The purpose of the VMS is to register and log visitors, print badges, track visitors, and provide reports.
  •        The VMS will consist of a standard PC with a camera and badge printer for lobby reception desk use and a stand-alone kiosk for visitor self-registration.
  •          The system will be able to register and log visitor information.
  •          The VMS shall issue visitor credentials (“digital credentials”) to mobile devices to allow those devices to allow access via turnstiles and at elevators based on specific access-authorization rights per tenant.

Video Surveillance System (VSS)
The purpose of the security camera system is to augment the ACS by providing a means to remotely assess activity at access points and to record video images of activity at those locations for later investigation or audit purposes. Not mandatory to use same display with BMS. The security camera system will consist of IP cameras and a network video recorder (NVR).
  •        NVRs will have a TCP/IP network interface for control and operation.
  •        All camera monitoring, playback, and control will be via standard web browser interface.
  •        Personnel with proper system authorization will be able to access live and/or recorded video from desktop PCs. Video verification; “see” what camera “saw” is most valuable part in high rise building. Not mandatory to install AI based Costly video analytics software.
  •        The cameras will be high-resolution color cameras. Additional camera features, such as low-light capability and wide dynamic range, will be provided with specific cameras where those features will be necessary to provide a quality image.

Smart buildings need to meet the expectations of the occupant and technologies must work together flawlessly to provide a personalized experience, now for the security integrator, the key is how do you create an integrated security framework that allows that customer to benefit from that data? To execute this doesn’t look back your cost, find good services, good OEM with quality product & good SI or SSA Integrate Company.

Ref:
http://bhadrafiresafety.blogspot.com/2019/02/nfpa-13-in-high-rise-buildings.html

If you found this artical is gain your knowledge then you can donate some amount through below bank details:-
A/C Name: Arindam Bhadra
A/C no: 19251050015468.
Name of Bank: HDFC BANK.
Branch: Belgharia.
RTGS/NEFT IFSE: HDFC0001925
Your support is highly appreciated to continue / maintain this blog.

Sunday, June 30, 2019

System Integrators tips to win Sales Proposals for New Access Control Systems

System Integrator tips to win Sales Proposals for New Access Control Systems

Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round a building or site. It is only a matter of time before you receive the highest compliment from one of your customers when they say: “We need a completely new access control system, and we want you to design and implement it.”

Any security systems integrator (Security Safety Automation Integrate - SSA Integrate) who has ever worked on an “enterprise-level” access control project will tell you it is not just standard access control, only larger. There are a host of requirements, challenges and issues that come with true enterprise access control.


Today’s enterprise-level projects are more complex than ever, with an emphasis on integration with not only other security systems such as video, but also Active Directory, building control and even beyond — in some cases going to PSIM-level integration. Technologies such as mobile credentialing, PoE and convergence have all to greatly impact this space in recent years, requiring more technical expertise than ever before on the part of the security systems integrator. I am always with you, in case of any designing issue / guide is required, just give me a mail – I work for smarter & safer future – Arindam Bhadra.

Now I share some Checklist to win sales proposal for New Access Control Systems. If you approach it methodically, you can reduce error and ensure that your customer gets the exact system they require.
Questions to ask include:
• What is the short-, mid- and long- range vision for the access control system? Is it based on open standards, like 802.11b/g or 802.3af, for the most affordable infrastructure? Is it scalable enough to support possible mergers and acquisitions?
• What type of Access Card / credential(s) will be used? How many are issued? What type of format will be used, and can it support a projected card-holder population? Is it controlled to ensure there are no duplicate IDs?
• What investment has already been made? Is the current system upgradeable? Or completely new.
• What assets does the end-user have, and what value do these assets have in relation to the operation or business? These range from physical assets like computers to patient records, employee records and client data.

Observe the End-User
Essentially, the integrator should be trying to find out about the culture at the end-user’s location. It can range from an open, accommodating environment, to one with strict and limiting access controls. There will always be a conflict between convenience and security — the challenge is to create procedures and rules that balance these disparate goals.
Did you observe the employees holding doors open for each other? If so, how are they able to verify their current employment status? Did they open the door for persons carrying large packages?

If so, did they check their IDs? Did visitors sign in at the reception desk? Did they wear ID badges? Were they escorted by staff members? Did students have a habit of leaving their rooms unsecure? If so, what sort of liabilities fall on school administration if a theft occurs and they knowingly allowed that practice to continue?
Conduct a Site Survey and Security Audit
Walking through a customer’s facilities can be invaluable when developing a comprehensive access control plan. Here are a few things to look for:
• Mechanical Security: If the openings are not mechanically secure, any additional funds spent on electronic access control are wasted. The following must be addressed before moving forward on an advanced access control system: Are the doors, frames, and hinges in good condition? Are they rugged enough for the application and durable enough for the traffic? Are the frames mortar-filled?
> What key system is in use? Is it a patented, high-security type? How often are locks re-cored? How many master keys have been issued? Have any been lost? How easy is it to reproduce the keys?
> Is there accommodation for the handicapped to ensure compliance with the Local Act?
> Are cross-corridor fire doors in place? Do they have magnetic door holders tied to the fire system?
• Identify the Threat: Consider the enduser’s surroundings: Have you noticed any evidence of gang activity? Have you noticed an increase in shuttered businesses?
If so, perhaps an increase in perimeter security is in order, potentially including increased lighting, cameras and gated access.
• Evaluate the Facility(s): This will help you identify product options. How old is the building? Does it have architectural or historical significance? How thick are the walls? Was asbestos used as an insulating material? If so, it may be difficult and costly to install conventional, wired access control devices. Perhaps a WiFi solution will be a good alternative.
• Identify Assets and Value: Many consider assets to be tangible items that can be sold for quick cash. But assets include anything that someone might want to steal or destroy, and vary among end-users. The important thing is to put a price tag on the loss of the asset, plus the cost of lost productivity and potential liability that could result.

Get the Technical Details
For each opening requiring access control, you’ll need the following details to ensure you order the right product for the given application:
• Does the door swing in or out? Is it leftor right-handed?
• What’s the finish of the existing hardware? What’s the lever style? Would the end-user prefer a more modern look?
• How is each door expected to operate? Ensure that an operational narrative is written for each opening that covers the following conditions, and have the customer sign off on it. This should include: normal state; authorized/unauthorized access and egress; monitoring and signaling; and power failure, fire alarm and mechanical operation.
• Determine where to place access control equipment. This could be an IT closets, server rooms, administrators’ offices or under BMS Room. Make sure your staff will have access for installation, and later for service and maintenance. Also, make sure there is enough space on the wall to mount access control panels, interface modules and power supplies.
• Determine network coverage. Are IP drops where you need them? Is there sufficient WiFi coverage where you need it should you opt for WiFi locksets?

Validate the Security Requirements
Different applications and clients have differing security requirements. Verify these needs with the end-user before starting the system design; otherwise, you could be in for a lot of extra work. The following considerations should be factored into an overall access control plan, as they have a direct impact on product selection and system configuration:
• Lockdown: Is lockdown capability needed in the interior or just the exterior — or at all?
• Real Time: Is real-time communications to the access control system a critical requirement? Perhaps it is for perimeter doors, but what about interior doors?
• Monitoring Requirements: How much monitoring does the end-user need? In most cases, a door position switch will suffice; however, some clients want to know that the door is both closed AND secured — these are not necessarily the same thing.
• Audit Trail Requirements: How important is it to know who and when someone
entered a building or room? For code compliance, this feature is always mandatory, such as accessing computer rooms, personnel records and patient records; however, some companies use audit trail reports to validate employee activity.
• High-Security and Classified Areas: For increased security, there are several options. Is multi-factor authentication a requirement, such as card and PIN or even a biometric verification? Should there be a two-man rule?
• Special Considerations: Some areas, require valid access credentials from both sides of the door — keeping the right people in and the wrong people out. This requirement takes different hardware than a typical free-egress lock or exit device.

Determine Business Requirements
Consider the final details that will allow you to complete your system design:
• Aesthetics: Many high-profile building owners use architectural design to make their facilities stand apart. This extends to the interior space as well. So, is a black wall reader the right choice? Or will an elegant lock with integrated card reader and designer lever be a better option?
• Infectious Disease Control: Some locks and doors are available with an anti-microbial finish designed to inhibit the growth of bacteria.
• Turnover: What kind of turnover does the facility experience? Heavy turnover would be difficult to manage with a PDA-programmable offline lock; however, one-card systems program access privileges onto the card, virtually eliminating the need to tour the doors to reprogram them. Of course, online solutions could address this as well.
• Applications: It is inevitable that a variety of applications will converge into a single system. That’s why it is important to select an access control system that can grow by providing application support for parking access, visitor badging, integrated video and other needs as required.
• System Management: It is important to determine who, how and where the enduser will manage the new access control system. For enterprise-class systems, it might mean multiple departments will manage their own people, while a system administrator will maintain and manage the main, centralized system.
• Budget: You ultimately need to know your customer’s budget; however, with all the upfront research, your findings might be beyond their initial scope. This is how long-term planning comes into play so you can develop a priority list over several phases to ensure the end user gets the access control system that fully meets their requirements

Ensure Code Compliance
Several agencies have issued codes and standards over the years to enhance life safety, improve privacy and reduce fraud. They need to be factored into an overall access control plan, and the Health Insurance Portability and Accountability Act (HIPAA). National Building Code of India 2016; Life-Safety (NFPA 101) — Means of Egress; Fire (NFPA 80) — Retro-fitting, Sprinkler Systems; Accessibility (ANSI A117.1) — Operators, Credentials; and Electrical (NEC NFPA 70) — Installation, Wiring, Products. Select products and services that meet the design requirements and comply with current standards, such as EN50133 European Access Control Standards and Electrical wiring regulations.

Suppose you need to design 2door, where both side card reader for 100nos Card holder. What is the MOQ.
Option 1:
Sl No
Short Description
Long Descriptions
Unit
Total Qty.
1
Door Controller
2 Door / 2 reader Door Controller
No.
2
2
Power Supply
Power Supply for controller
No.
2
3
Proximity Reader
Proximity Readers for Entry & Exit
No.
4
4
Proximity Card
Proximity Cards
No.
100
5
EM Lock
Singe leaf lock ( 600 lbs)
No.
2
6
EDR
Emergency Break glass switch
No.
2
7
MC
Magnatic Contuct
No.
2
8
Access Software
Access Control Software
Set
1
9
Patch Cord
Patch Cord 3 M
No.
2
10
Network Switch
4port Network Switcher
No.
1
11
Access Workstation
PC i5 with windows operating system, complete with keyboard, mouse
No.
1
12
4C Cable
Supply, Laying & Testing of  4cx1.5 sq.mm cable
RM
30
13
2C Cable
Supply, Laying & Testing of  2cx1.5 sq.mm cable
RM
40
14
25mm PVC Conduit
Supply, Laying & Testing of 25mm dia. PVC type conduit
RM
60
Option 2:
Sl No
Short Description
Long Descriptions
Unit
Total Qty.
1
Door Controller
Standalone Door Controller cum reader.
No.
2
2
Power Supply
Power Supply for controller
No.
2
3
Proximity Reader
Proximity Readers for Entry & Exit
No.
2
4
Proximity Card
Proximity Cards
No.
100
5
EM Lock
Singe leaf lock ( 600 lbs)
No.
2
6
EDR
Emergency Break glass switch
No.
2
7
MC
Magnatic Contuct
No.
2
8
Access Software
Access Control Software
Set
1
9
Patch Cord
Cat6a Cable
RM
30
10
Network Switch
4port Network Switcher
No.
1
11
Access Workstation
PC i5 with windows operating system, complete with keyboard, mouse
No.
1
12
4C Cable
Supply, Laying & Testing of  4cx1.5 sq.mm cable
RM
30
13
2C Cable
Supply, Laying & Testing of  2cx1.5 sq.mm cable
RM
40
14
25mm PVC Conduit
Supply, Laying & Testing of 25mm dia. PVC type conduit
RM
60


Ref:
Access & Identity Management Handbook.
https://ipvm.com/reports/video-surveillance--access-control-integration
BS EN 50133-2-1:2000 British Standards Institution 2018.


Sunday, June 2, 2019

Why network monitoring appear delay?

Why network monitoring appear delay?

Speaking in the security industry network monitoring delay, I am afraid we have become a well-known disadvantages of. However, the delay in the end it is because of what reason?
Find out your camera’s IP address by checking the camera’s directory. Once you find your address you will be able to ‘ping’ it using your laptop or smartphone to test the strength of the connection.

Type ‘cmd’ into windows search engine and this should open a DOS command prompt. When this pops up, you will be asked to type in ‘ping’ and your IP address. You may see either ‘Request Time Out’ or ‘Destination Host Unreachable’ appear on the screen. If it does, check to see if the device you are using is on the same network as your camera. If you do see the camera on the network, attempt to connect using your browser.

If you have more than one camera you need to make sure that they have different IP addresses as this can stop you from accessing one or all cameras.


1- For network monitoring, the network bandwidth limitations make ip surveillance has been part of a headache. Because of this restriction, so forcing the network to monitor the transmission had to give up some very important things. In general network transmission systems, the router is the most important and most complete system indispensable equipment. But may not so friendly router for network video transmission. Since the transmission, routing forwarding takes some time, so the more transmission through the router, the greater the delay data. This also allows long-distance transmission, the delay has become an inevitable thing.

In addition to the router, quality, high-pressure line network traffic are also causing delays culprit.

2- Check the Cabling: If the camera's link and/or activity lights aren't blinking, it's likely a cable. A high frequency of connection issues centeraround cabling problems. Basic IT troubleshooting places a huge emphasis on checking transmission cables. Since the final assembly is only as robust as it's weakest link, checking data cables for kinks, frays, shorts, and bad terminations is a very basic troubleshooting step. Cable and patch panel connections made in a hurry by hand can get crossed wires or connectors come loose.

Sometimes the power wires to a PoE camera in the cable may be powering the camera up, but the data wires may be crossed or not connected preventing network connection. To troubleshoot, use a cable tester to test the cabling or use a known good cable to connect to the camera and see if it connects. If a patch panel is used, check the patch cable, that often gets overlooked.

3- Consuming signal processing network hosts 

In the transmission network, the codec is the main factor universally recognized time-consuming. As the network video surveillance system decoding devices are often used for client host. Therefore, host configuration also directly affect the quality of the transmission rate of the entire signal. If you catch a comparison of old and sick host device, then the delay phenomenon is certainly indispensable. 


4- If possible, look at the camera to make sure it is powered up. Most cameras have LED's that indicate the camera's power status, and if it is connected to and transmitting data to the network. Many times these LED's may be concealed inside the camera's housing. If the camera is externally powered (non-PoE) check the power supply if no LED's are lit.

If it is a PoE camera and not powered, check to see if it is plugged into a PoE switch or midspan. Verify that the camera is receiving the proper wattage of PoE power, outdoor cameras with heater/blowers and PTZ cameras often require High-PoE or PoE+ 30W or 60W of PoE power that is higher than most standard 15W PoE switches provide, often requiring different wattage midspans. Some cameras that require >15W of power will boot up and connect with 15W, but not transmit images or respond to PTZ commands.

Another pitfall may be the PoE network switch itself. Some PoE switches do not have enough power to supply 15W to every port and will not supply power to another camera if it is already overloaded. To troubleshoot, connect the camera into a suitable PoE injector or midspan to see if that is the problem.

5- Network transmission, the encoding process itself takes 

Due to the daily video transmission, analog and digital conversion is also a consumer point of time can not be omitted. Currently, in order to obtain a better picture quality, many manufacturers are adopting nowadays the most advanced H.264 compression algorithm as its own. But, when the image scene more complex, more moving objects, the greater the time frame rate and bit rate, H.264 category using the higher level, the greater the difficulty of codecs, time-consuming naturally the more and more. 


6- Don't be a hero, call for help: If you have tried the above steps and still cannot connect to the camera, visit the manufacturer's website for specific model troubleshooting guides and if those do not help, call the camera manufacturer's tech support line. Many times they know "tricks" specific to their hardware and can remotely connect to your PC via the internet to diagnose. Don't be afraid to ask for help, many times technicians waste hours tracking down a problem that the manufacturer's help desk representative can fix in a few minutes. The manufacturer's technician can also start an RMA process to return the camera if it is faulty and needs to be repaired or replaced under warranty.