Professional Documents
Culture Documents
Samuel Kumar
Hanwha Techwin
Wisenet
Contents
DAY 1
0:00 Welcome Note
0:02 Introduction & Agenda Review
0:15 Global CCTV Ranking and Vendor Analysis
o Global Ranking of Vendors
o Vendor Qualification Requirements
0:30 Camera System on Chip
0:40 CMOS vs CCD Sensors
0:50 What is WDR – Wide Dynamic Range
1:00 Break
1:10 What is High Light Compensation & Low Light Technology
1:20 Infra-Red & Thermal Cameras
1:30 Understanding IRIS Types
1:40 Understand Image Resolution
1:50 EN 62676-4 Detection, Recognition, Identification Standards
o Focal Lengths and Selecting the Right Camera Lens
2:10 Network Foundation – Network Flow, transmission, bandwidth
2:30 End of Day 1
Contents
DAY 2
0:00 Review of Day 1
0:10 Compression Standards: H.264 & H.265
o Advanced Compression Techniques
0:30 Understanding Camera Construction Types and its Applications
o Different types of CCTV Cameras
o Single Vs Multi Sensor Cameras
o Different Product Series with Hanwha Techwin Product overview as
example
1: 00 Break
1: 10 Shutter Speed and Image Quality Optimization Methods
1: 30 Image Signal Gain and Noise Reduction Basics and Its effect on the
image quality
2:00 Network Foundation – IP Address, LAN,WAN,VPN, IP Tools Part –
Ping,ipconfig
2:30 End of Day 2
Contents
DAY 3
0:00 Review of Day 2
0:10 Analytics in CCTV
o Commonly used Security Analytics
o Benefits of Analytics
o What is Artificial Intelligence
o Comparison with Traditional Analytics
0:30 Camera Interoperability with other manufacturer systems
o About ONVIF Protocols
o Native Integration and its benefits
1: 00 Break
1: 10 CyberSecurity Basics in CCTV
1: 30 What is Network Video Recorder and its application
1: 40 NVR Storage vs Server Based Recording and External Storage options
2:00 Network Foundation – IP Tools : tracert,wireshark, OSI model,L2,
PoE,HPoE,Fiber
2:30 End of Day 3
Contents
DAY 4
0:00 Review of Day 3
0:10 Video Management Systems
o What is VMS
o VMS Functions and operation demonstration
o Mapping Functions, Alarm Management, Reports and Sequencing.
0:20 Storage Redundancies
o What is RAID
o RAID vs NON RAID Systems
o Storage Calculators – Wisenet Toolbox Example
1: 00 Break
1: 10 Control Room Monitors
o Basics on Control Room expectations
o Video Wall Functions
o Operator efficiency
o Estimating Number of Monitors
2:00 Network Foundation – L3, Uni/Multi-Cast Port Forwarding, DDNS,P2P
2:30 End of Day 4
Global Ranking
Vendor Checklist
Vendor Checklist
SL DESCRIPTION WHY Example : HTW
Ensure Matured Understanding Of Global Requirements. Yes, with 28+ global offices for
1 GLOBAL COMPANY
Local Experience With Global Presence CCTV
Regional Training center presence with dedicated trainer and regi Yes, in Dubai .Trainings in Engli
4 TRAINING CENTER
onal language trainings sh, Arabic & French
5 LOCAL TEAM To Ensure timely support and training in local languages Yes
8 CYBERSECURITY Should have no previous records of major vulnerabilities Yes,UL CAP Certification
Global Presence - Example
Subsidiaries | London, Tianjian, New Jersey, Sao Paulo, Iraq, Dubai, Bac Ninh
Offices | USA/South America(Miami), France(Paris), Germany(Frankfurt), Italy(Milano),
España(Madrid), Poland(Szczecin), Czech Republic(Praha), Turkey(Istanbul),
Russia(Moscow), Singapore, Qatar(Doha), Egypt (Cairo), Johannesburg(South Africa)
China(Beijing, Shanghai, Guangzhou, Chengdu, Korea(Busan, Daegu, Daejeon, Gwangju)
Non-Certified Trainings
1. Webinars and Product Updates
2. Customized Training : Operator Trainings
Training Labs
Training Lab - Example
Training Lab - Example
Training Lab - Example
Vendor Manufacturing
and Quality Process
Vendor Manufacturing Process & Testing
Vendor References
Vendor Project References
26
Camera Components
3.Lens
Fixed Lens Zoom Lens (Motorized Zoom)
Varifocal Lens
Camera Components
4.Image Sensor : CCD and CMOS
Image sensors are very important pieces of technology located
within your security cameras. The image sensor is the
component that captures the light hitting your camera's lens,
turning it into electrical signals which get recorded as video.
4. Typically found in analog cameras. Output is analog 4. A CMOS sensor incorporates amplifiers, A/D-
and requires AtoD external convertors converters and often circuitry
6. Used to be known for good low light performance 6. Current technology advancements in CMOS
Provides superior low light and no longer a
Difference.
Image Sensors and Digital Signal Processors (DSP)
The combination of an Image Sensor and Digital Signal Processor makes up the imaging portion of a security camera. This
duo determines what the quality of the camera's video signal will be. If you purchase a camera that has a quality image sensor
and DSP, you will overall have better more satisfying video, especially in
variable lighting conditions requiring HLC, BLC, and WDR. When looking at a camera's specifications it is
important to look for the types of these two components contained within. Understanding their roles in the camera will play a
huge a part in your decision to purchase one camera over another. Below we discuss some of the common types of these
imaging components.
Image Sensor Size and Lens Size
Camera Components
5. System on Chip-SoC
- CPU,
: Brain of the camera –
- ISP, Codec • Resolution and FPS
- WDR, NR, Sens-I, DIS (+ Gyro)
• WDR Capability
• Image Enhancements
- DSP, HW Accelerator
• Stream and Bandwidth Enhancements
- Low Power
• Analytics
- Multi-Sensor Input • Other - Power
Wisenet Wisenet3
·720p, 30fps ·2MP 60fps
·WDR 2MP 30fps(120dB), Defog
Wisenet2 ·Min. Illumination 2MP 0.1Lux Wisenet5
·2MP 30fps ·5MP 30fps, 2MP 60fps Wisenet7
· WDR 2MP 30fps(150dB), Defog, HLC · 4K 30fps, 4MP 60fps
· Min. Illumination 2MP 0.01Lux · Next Level Cybersecurity
· Improved Image quality
(WDR, Low-light, LDC, etc..)
. Multi-channel support
(Max 4 CH on a single shipset)
LIGHT COMPENSATION
The difference in intensity between the highlights and shadows of a scene is called dynamic range,
Wide Dynamic Range camera uses a number of technologies to widen the range it can register.
Axis' Forensic Capture is an example of a WDR technology.
Dynamic Range
Long Exposure management Tone mapping/
Contrast Control
(Scene analysis)
Short Exposure
WDR-Wide Dynamic Range, continued
Dynamic range is a general term for differences in ratios between measurable quantities of something.
WDR refers to the Ratio between the lightest and darkest elements of the image
1 2 3 4
4 frame Composite
WDR-Wide Dynamic Range – 2MP Modes
120 Sensor
Lens Encoder 60 fps Network
fps DSP 120 fps
120 Sensor
Lens 60 fps Encoder 60 fps Network
fps DSP
60 fps
60 fps
120 Sensor
Lens 30 fps Encoder 30 fps Network
fps DSP
30 fps
30 fps
30 fps
30 fps
WDR-Wide Dynamic Range – Line by Line Method
Short exposure
Long exposure
Shortest exposure
MotionArtifact
MotionArtifact
VS VS
Pixim's digital pixel system (DPS) image capture technology to provide world-leading performance in
challenging lighting conditions, combined with dramatically improved low-light performance.
LIGHT COMPENSATION
HLC – High Light Compensation
High Light Compensation - Demonstration
Highlight compensation (HLC) is a feature that came out of necessity due to overexposure from strong light sources like headlights
or spotlights. This feature senses strong sources of light in video and compensates for exposure on these spots to enhance the
overall quality.
•Helpful in preventing blinding of security cameras at night time from headlights.
•Reduce the glare in video to an extent and make it possible to see license plates on slow moving front approaching vehicles or
stationary vehicles.
High Light Compensation - Demonstration
LIGHT COMPENSATION
BLC-Backlight Compensation
BLC-Backlight Compensation - Demonstration
Backlight Compensation (BLC) is a feature that camera have been utilizing for some time now. When someone is say sitting in
front of a window, or coming in from outside, there is a lot of natural light behind this person. When a camera is aimed in their
direction, the camera is picking up all this natural light behind them, therefore the object or person in the foreground becomes
very dark, almost silhouette like. Such video is not good for security personnel trying to determine who this person is.
BLC is a feature provided by the Digital Signal Processor (DSP) in a security camera that optimizes exposure in the foreground
and background of security video. It splits the video scene into different regions, and uses a different exposure for each of these
regions. It corrects regions with extremely high or low levels of light to maintain a normal and usable level of light for the object in
focus. However, it is important to note that BLC has its limits when correcting exposure in situations where there is an extreme
difference in light between the foreground and background. For best results, WDR has become the sought after feature
Sensitivity
Low Light
Minimum illumination
Aperture
Iris Opening F- Stop
Light-gathering ability.
Refers to how far a lens can open up or close down to let in more or less light.
”Aperture” is a circular opening within a lens, through which light travels into the camera body and onto the camera’s digital sensor.
A large Aperture is a big hole which lets lots of light in,where as a small hole does not let so much light in.
Optics & Barrel
Restricted
IR ILLUMINATOR
IR Range
Smart IR
Variable Zoom IR
Hanwha Techwin – Fixed Camera IR Range
Variable Zoom IR Illuminator
500
Fixed
Moving
Lens
IR
Zoom IR Illuminator
Full Frame IR LEDs
Conventional IR illumination provides intense light at the center of an image, degrading quickly as it moves a
way from the center. Wisenet X series cameras use powerful IR LEDs that provide a wide angle of uniform IR
light across a scene for a wider image capture area.
2X
Hanwha Techwin – Other Convenient Functions
Focal Lengths
Focal Length
Focal Length
LIVE
Demonstration
Super Telephoto
(Long distance,Subject like birds)
Telephoto
(Wildlife - Near Sports ,Portraits
Children )
Normal
(Snapshots Average Situations)
Wide Angle
(Landscapes,Group portraits)
XNP-6550H
DORIS STANDARD
EN62676
Detection : detection of activity within a scene
Observation : being able to interpret what is going on
Recognition : recognition of a known individual or object
Identification : identification of an unknown individual or object
Strong Identification/Inspection : Low Light , Facial Features.
Recognition: The second zone is recognition, marked in yellow. In this area, the security operator will be able to
recognize a person known to them. Viewers can verify with a high degree of certainty whether or not an individual shown
is the same as someone they have seen before. In this area, the pixel density is not less than 125 PPM (38 PPF) or 8mm
per pixel. Also in this area, it is possible to recognize license plates manually, but the camera resolution may be not
sufficient for Automatic number plate recognition (ANPR) systems.
Observation: Next we have the observation zone (green). In this area, some characteristic details of the individual, such
as distinctive clothing, can be seen. The pixel density is 62 pixels per meter or about 19 PPF (16mm per pixel by EN
62676-4)
Detection: Next is the detection zone (light green). In this area, where the operator will be able to detect a human
presence: 25 PPM or 8 PPF (40mm per pixel).
Monitoring: The monitoring zone (blue) is used to monitor or perform crowd control. 12PPM / 4 PPF/ 80mm per pixel.
There is also a special kind of zone called Inspection or Strong Identification: 1000 PPM or 303 PPF (or 1mm per pixel
by EN 62676-4 or EN 50132-7), marked as purple in the program.
DORIS STANDARD
Take Away
Specifying the right detection requirements is important to get the best coverage.
Recognition: The second zone is recognition, marked in yellow. In this area, the security operator will be able to
recognize a person known to them. Viewers can verify with a high degree of certainty whether or not an individual shown
is the same as someone they have seen before. In this area, the pixel density is not less than 125 PPM (38 PPF) or 8mm
per pixel. Also in this area, it is possible to recognize license plates manually, but the camera resolution may be not
sufficient for Automatic number plate recognition (ANPR) systems.
Observation: Next we have the observation zone (green). In this area, some characteristic details of the individual, such
as distinctive clothing, can be seen. The pixel density is 62 pixels per meter or about 19 PPF (16mm per pixel by EN
62676-4)
Detection: Next is the detection zone (light green). In this area, where the operator will be able to detect a human
presence: 25 PPM or 8 PPF (40mm per pixel).
Monitoring: The monitoring zone (blue) is used to monitor or perform crowd control. 12PPM / 4 PPF/ 80mm per pixel.
There is also a special kind of zone called Inspection or Strong Identification: 1000 PPM or 303 PPF (or 1mm per pixel
by EN 62676-4 or EN 50132-7), marked as purple in the program.
Making a FOV on Auto CAD JVSC
Lens Calculator
Networking
Networking Basics in CCTV
Recorder
Viewer
Data Transmission
Recorder
Camera
#1
Camera (A+B+C)
Bx2 Switch Switch
#2 X2
Camera
Viewer
#3
Data Transmission
Recorder
Camera
#1
Camera
B Switch A+B+C Switch
#2
Camera
Viewer
#3
Basics of Networking in CCTV
Switch
Network Monitoring
Network
PC
Cameras Cameras
Switch
Recorder
Network Network
Cameras Camera
INTERNET
Switch
Recorder
Router
1 or Core Switch
more Switch
(Broadband)
Network Router
Camera
Fiber optic Monitoring
converter PC
Network
Camera
Fiber optic
converter LAN cable
Optical fiber cable
Networking Basics in CCTV
NVR
H.264 / 1920x1080 / 30fps
Recording
NVR
H.264 / 800x600 / 15fps
Monitoring
VMS
H.265 / 1920x1080 / 30fps
1CH Monitoring
VMS
H.265 / 640x360 / 15fps
64CH Monitoring
Networking Basics in CCTV
• Network Cable
– UTP cable category
Networking Basics in CCTV
>
Noisy video Dynamic video
>
>
Complex background video
Static video
Simple background video Clear video
Networking Basics in CCTV
High -
Resolution
Low -
Network part 2
IRIS
F stop & P Iris
F-Stop
P-Iris
P-Iris
DC-Iris vs P-Iris
CODEC
CO = Coding/encoding
DECODE
DEC =Decoding LIVE
CODING
PLAYBACK
ANALOG
CODING LIVE DECODE
PLAYBACK
IP CAMERA
86
Codec History
2004: H.264
H.265 was developed for high resolution
2013: H.265
transmission with low bandwidth without losing
resolution or picture quality.
87
Encoding H.26x (1/2)
Frame 1 Frame 2 88
Encoding H.26x (1/2)
Encoding the frames:
Divide the image to blocks that is 16X16 or 32X32 pixels (Macroblock MB).
Frame 1 Frame 2
Full frame Partial Frame
89
(I or Key Frame) (P Frame)
Bandwidth Utilization
1080p 15fps
720p 30fps
Multi-Profile
VGA 5fps
X series – 10 Streams
X Lite Series – 5 Streams
Q Series – 3 Streams
P Series – 3 Streams
Bandwidth Utilization
Optional Streams
1. Mobile/Web Stream
2. View Stream
3. SD Card Recording Stream
4. Redundant Recording Stream
5. 3rd party systems Stream etc.
H.265
High Efficiency Video Coding
Adopted into the Wisenet X / P / Q / T series cameras for up to 50% less bandwidth and storage than H.264 codec,
leading to increased cost savings.
H.265 H.264
BW 5Mbps BW 10Mbps
Wise Stream is an efficient way to reduce storage and bandwidth by dynamically choosing your areas of
motion and regions of interest as your high definition areas, while leaving the rest of the video at a lower
resolution.
Kbps Kbps
H.265 + Wise Stream
H.265
Camera Types
Camera Shapes
Bullet
Long Range Long Range
Dome Zoom Lens Box 5-62mm
5-62mm
Positioning Camera
Ex-Proof Camera
Thermal Camera
PNM-9030V
180 vs 220 degree Panoramic
360 Degree Multi Directional
360 Degree Multi Directional with PTZ
Twin Sensor Multi Directional
Vendor Product
Categorization
Vendor Product Categorizations
Major Differentiators
• Analytic Support – Supported or not supported
• Number of Analytics – Three or Six or Nine or more
• WDR Capability – 120dB or More
• Hardware Features – Specific Form factor models, special lens models, extreme
environment models
• Resolution – Category 1 up to 5 MP and Category 2 – from 4K onwards
Shutter Speed Settings
Factors affects image quality
Shutter Speed (~Exposure Time)
•Frame Rate, controls how many images or frames are shown each second. If it takes one second for something to pass in front of the camera, a frame rate of 5 Frames Per Second
(FPS) means 5 still images of the object
Higher frame rate gives you smoother motion and more images. But this also means more network bandwidth and storage space Mot
Motion blur has got nothing to do with frame rate. It's all down to shutter speed,
Slower Shutter Speeds, let more light in on each exposure, but moving objects can become blurred.
Faster Shutter Speed, will give less blur at the cost of light sensitivity.
So, Frame Rate doesn't affect the sharpness of the individual images. it just gives you more viewers still. A lower frame rate could save value will network and disk space. And
remember the sharpness of moving objects is all about shutter speed
Gain & Noise
Gain Control
A measure of the electric signals amplification .
Increasing the gain makes the image brighter, but nosier.
Before Adjustment
After Adjustment
TEST _ Adjust SSNR Level
Camera setting
– Minimum Shutter Speed : 1/200
– Maximum Shutter Speed : 1/12000
– SSNR level : OFF
– AGC : High
Attached video is encoded so the video quality may be different with actual video.
Before Adjustment
After Adjustment
TEST _ Adjust AGC Level
Camera setting
– Minimum Shutter Speed : 1/200
– Maximum Shutter Speed : 1/12000
– SSNR level : OFF
– AGC : Low
Attached video is encoded so the video quality may be different with actual video.
Before Adjustment
After Adjustment
TEST _ Optimized Setting
Camera setting
– Minimum Shutter Speed : 1/120
– Maximum Shutter Speed : 1/12000
– SSNR level : 4
– AGC : Middle
Attached video is encoded so the video quality may be different with actual video.
Before Adjustment
After Adjustment
Pre Configured– Image
Presets
Pre-Configured Image Presets
Networking
Networking Basics in CCTV
1. IP Address
Example: 192.168.0.1
2. Subnet Mask
Example: 255.255.255.0
3. Default Gateway
192.168.0.254
Smith
• Divides John
Network
Smith Lisa
ID from
Emma
Host ID
.1
192.168.0 .2
.3
255.255.255 .0
Networking Basics in CCTV – Subnet Mask
1 2
Send packet
LAN WAN
Networking Basics in CCTV – VPN
B 128 - 191 1000 0000 – 1011 1111 16 384 65 534 172.16.0.0 – 172.31.255.255
C 192 - 223 1100 0000 – 1101 1111 2.097 M 254 192.168.0.0 – 192.168.255.255 Class A
• ipconfig
• ipconfig /all
• Displays more information including MAC address (physical address)
Networking Basics in CCTV – IP Tools
• ping
What is ping?
Wisenet Cameras & Similar CCTV Cameras have license-free intelligent Video Analytic functions including:
Appear/Disappear, Virtual Line/Enter/Exit, Face, and Tampering detection. Audio detection also allows users to detect an
event beyond a camera’s field of view. Intelligent Motion Detection prevents small, continuous motion from trigger
constant recording.
When these video analytics are linked to a NVR or VMS (same brand or different brand), the NVR/VMS will list then as
separate events for quick recall, using the Smart Search function.
Intelligent Video Analytics
Loitering Detection
– Object loitering in a designated virtual area for more than the set observation time are detected
Virtual area
Loiter
Intelligent Video Analytics-Handover
Motion Detection Hand-Over
[MD] Able to link events with other camera’s preset position
– Multiple cameras are interlocked to keep track of suspicious objects
Intelligent Video Analytics
Queue Statistics
Business Intelligence
What is AI – Artificial
Intelligence
AI vs. Machine Learning vs. Deep Learning
1950’s
1980’s
Input
It is dark! Algorithm
Training with given data
Dark, Turn on the light, Light on, Switch on the
light, Dim up… .etc.
Machine Learning
Using a layered structure of algorithms called an “Artificial Neural Network”
Output
Input
I cannot
see Algorithm
anything.. Artificial Neural Network
Uses of AI Analytics for Forensic Search
Traditional Video Analytics
Reducing false alarm based on deep learning technology
Reducing false alarm based on deep learning technology
Attributes for Forensic Search
- AI camera sends metadata including attributes of objects, coordinates information and setting value to backend server.
- . Person, Face, Vehicle category and so on.
Gender
Vehicle color & type
Face (Age, Mask, Glasses)
Top wear/color
Bag
Bottom wear/color
Enhancing Business Insight with AI
• AI camera has applied new AI algorithm for Alarm accuracy improvement based on the object
classification
Enhancing the Traditional Analytics
Uses of AI Analytics for Forensic Search(color clothing)
Uses of AI Analytics for Forensic Search
Wrong Direction Detection or Vehicle Entry
Area Detection – Type of Vehicles and Zones
Stopped Vehicle
Bi-Spectrum – Thermal and 4K AI – Visibility
Visual image
Thermal image
12
© 2022 All rights reserved.
1) Vehicle Counting
CONFIDENTIAL
• 2 Lanes are available for making rule for Vehicle Counting function.
• Attributes : Car/Bus/Truck/Motocycle/Bicycle
Vehicle Counting 1/2
2) Stopped Vehicle
CONFIDENTIAL
• When the vehicle enters a specific drawn area, an event occurs when the vehicle exceeds
a predetermined time.
• This application can be utilized as giving some fine when unauthorized zone is parked.
3) Traffic Jam
CONFIDENTIAL
St
ar
t
E
n
d
- Speed range
. km/h : 1~40km/h
Truck Classification
Mini-Size
Truck
Mid-Size
Truck
Heavy Truck
– Installation
School Bus • Install the camera on the last lane which Truck Vehicles use.
• The camera is as below.
• Camera : PNB-A9001
A new cutting edge video compression technology WiseStreamIII operates based on the object detection accomplished by AI algorithms. When
combined with the H.265 compression technology, bandwidth can be reduced by up to 80% without compromising the video quality, enabling
efficient video management.
Objects detected,
Low compression
High quality
AI Cameras
AI Special Models
5-62mm AI ID Cameras Powerful 12x optical zoom
1x 12x
2-12. Reducing Total Cost of Ownership
2-channel multi-directional cameras can simultaneously monitor two areas with different FoVs,
which reduces installation costs, network runs, switch ports, and accessories to reduce the Total Cost of Ownership
A motorised Pan Tilt Rotate Zoom (PTRZ) gimbal which enables installers to remotely pan, tilt, rotate and zoom the
lens position in order to set the camera’s field of view, saving time and installation costs.
UL-CAP
Cybersecurity Assurance Program
Key
Random number
Crypto
Secure
OS
(RTOS)
Normal
OS
(Linux)
Data
protection
Accelerator
Sensitive information
+ Development Process EEPROM
Secure
Storage
Metal-shielded RJ-45 terminal and enhanced earthing frame structures can Hard-coated dome bubble provides better resistance to scratches
protect the camera from transient voltage(lightning, static electricity). from external stimuli (sand, worker's hand, etc.).
※ Using STP(shielded twisted pair) cables is recommended. Also, the degradation of resolution due to scratches can be minimized.
Reinforced durability
No stress on seals
GORE vent offer to prevent condensation and maintain performance of long-term storage through water vapor control.
Also, it can prevent sealing damage through pressure equilibrium in the product.
SSM UPDATES
SSM UPDATES
SSM has inbuilt monitoring dashboard which gives the total and status of Cameras (Online/
offline), NVR (Online/Offline) and Recording Server (Online/offline)
Recording Servers 72/128 CH/Server
Design
Source: https://www.shodan.io/
Secured by Design
Strategy
■ What Method Most Used for Hacking ?
- Backdoor
- Manufacturer (hard coding)
- User
- Remote Service(telenet, SSH)
- Weak Password Policy
- Non-used Port open
- Firmware Encryption(rooting)
- Buffer Overflow
■ What Threats could be occurred ?
- Malware Infection
- Data Forgery
- Data Capturing
- Device Manipulation
- System Halt and/or Shutdown
- Admin Authority Seizure
- DDOS Attack
Strategy
• Defense in Depth
• A strategy where you have multiple concentric rings of security that
build on each other, whereby a breach or vulnerability in one layer does
not leave you defenseless.
Device Security Firmware Updates
•Cameras
•NVR/VMS/Client
Segregated software
Networks
Closing unneeded
VLANs ports
Firewall Access
Control/Physical
Access to devices
Intrusion
Detection System
Security by Design
Password Policy
• Minimum length of 8 characters
SSL/TLS:
802.1x
SSL/TLS:
Explained
802.1x Authentication
(Web Browser
(EAP,LEAP)
(EMAIL)and API)
Request Network Access
LAN Network Devices
Client (Supplicant)
Client can now access LAN
Sends authentication
Hanwha Techwin surveillance products allow you to change all ports on the device
• Physical Access is paramount. If you can touch a camera, you can factory default it, and
then do what you want with it.
• It is best if your cameras are high up, out of reach, or flush mounted in the ceiling or a
housing.
• Make sure your NVRs and switches are in a locked area.
• Make sure the network and power cables going to cameras are secure. If someone can
reach up and cut them, it is not secure.
Tampering & NW Disconnection Detection Analytics
…
Port Forwarding
When you provide remote access, use port forwarding, and not
UPnP.
• Even if you are not recording at the edge, you can still use edge recording as a backup, in case the
network or recorder has problems, but the camera still has power.
• Consider putting small, low cost SD cards in each camera, as a value add.
• SV/SSM can easily connect to a camera to review/retrieve the video.
• This also alleviates fears of someone deleting/formatting the hard drives on the recorder.
• Many thieves have torched or taken DVRs so there would not be any CCTV evidence. They don’t think
to take or destroy every camera… it would take too long….
Use VPNs to allow remote access
• Use VPNs (hardware or software) to connect clients or remote sites without opening ports to the
external world.
Keep video in the proprietary format
• Many people dislike proprietary formats – they don’t want to install viewer, or run
programs, or be stuck on one OS. However, this allows the video to be verified using the
built-in watermarking. Without this, the video may not hold up in court.
• This is usually why you invested in a CCTV system in the first place.
Next Level Cybersecurity
189
Recorders & Application
What is NVR vs VMS
64 Channel VMS
NVR NVR
DB
DATABASE
Server
Rec
Combined
193
Differences
SL DESCRIPTION Linux Windows
Future flexibility &
7 Depends on the vendor Easily migration friendly
Upgrades
New Product Featur
8 es & New integratio Longer Development cycle Faster development cycle
ns
9 Repurpose No Yes
Networking
Networking Basics in CCTV – IP Tools
• tracert
From command prompt
• tracert
• Traces the route through the Layer 3 network
• Reveals the router addresses on the route
• * indicates no ping reply – security feature
Useful wireshark practices
1. Always select single interface in a Capturing Options dialog(Gear Icon/ Ctrl+K).
Wireshark might hang if you select all of them.
2. Ensure that selected interface is one you need. At screenshot below the en0 is
selected because cameras are in 192.168.178.0/24 subnet.
3. To reduce RAM usage and filtering efforts later try to use capturing filters when
applicable. Screenshot example will filter packets to and from ports 80 and 554 for
the certain ip address only.
1. For longer capturing sessions always use “Capture to a permanent file” option
from the “Output” section. If you don’t do that Wireshark will very likely hang
after free RAM depletion.
2. It might be very convenient to create a new file once in a while. Thus you won’t
have to go through the huge one during the investigation later.
By default wireshark shows packets with the “since beginning of capture” time marker.
For the convenience it might be changed in “View”-> Time Display Format. E.g. to Time
of Day
Display Filter
Show only traffic in the LAN (192.168.x.x), between workstations and servers -- no
Internet:
Example:
sudo tcpdump -i eth0 host example.org and (port 80 or port 554) -w test.pcapng
The above command sniffs all traffic between interface eth0 of inspected PC and ports 80,
554 of example.org and saves it to test.pcapng. This extension is native for wireshark.
Basics of Networking in CCTV – What is Network
Cable
Processing Wireless
Light
Networking Basics in CCTV – how to Check and set up IP address for a
camera
• Live demonstration
Basics of Networking in CCTV
OSI TCP-IP
Open Systems Interconnect Transport control Protocol-Internet
Protocol
Application
Presentation Application
Session
Transport Transport
Network Internet
Physical Physical
• L1 – Physical Devices
Cables
Radio
Repeaters
Hubs
Racks
Patch Panels
DC+ DC-
© 2020 Hanwha Techwin Co. Ltd. All rights reserved.
• Fiber
CAT6
Greater distance
Network
Lightning/EMI protection
Bitrate/Performance
© 2020 Hanwha Techwin Co. Ltd. All rights reserved.
Why use Retrofit Solutions like Coax and UTP
12 VDC
PoE Switch
Remote Device Local Device
PSE
192.168.10.12
00-40-84-00-00-A1
192.168.10.11
98-E7-43-00-00-01
2
1
192.168.10.13
Switch 3 00-40-84-00-C7-09
5 4
192.168.10.15 192.168.10.14
00-40-84-AB-50-7A 00-40-84-00-70-7D
Router L3 Switch
• Operates at L3 - IP • Operates at L3 - IP
• Connects Ethernet to different media • Operates as a Router and a switch
based network • Routes on Ethernet only
• Example: WiFi, Cable
• Cheap and ubiquitous
1. Direct route
2. Indirect route
3. Default route
4. Network unreachable
Day 4
What is VMS Video Management System?
VMS – Video management system is a vendor agnostic software for CCTV to record, view and manage
multiple surveillance cameras or NVRs . The cameras can be in a single location or across different locations.
VMS is often integrated to other security applications such as Access Control , Analytics, Intrusion etc..
Recording Servers
...
5 Guard Room Operators Workstations
A VMS with Multiple NVRS/ Recorders
Recorder Camera
Camera Recorder
Recoder Camera
Floor 5-10 Switch Switch Site Wide Monitoring
Camera Recorder
LAN
Recorder Camera
Switch Switch
233
Core Server
VMS CENTRAL SERVER is ALSO CALLED CORE SERVER
VMS With Integration
Unlock/Lock
From VMS-SSM
Title of section
5s 5s
9 10 5
4s 4s
7 8 4
3s 3s
5 6 3
2s 2s
3 4 2
1s 1s
1 2 1
RAID system can record more data during same time than using single HDD
RAID
• What is the RAID
• Simple step for saving data on your RAID system
Not-used
Usable area
1 2 Normalize
3 4
RAID 0
Step 1. Cut your data into unit sized pieces
Step 2. Save unit data onto each HDDs in rotation [Example of RAID 0]
7 8
Feature 5 6
• Mirroring System
Performance HDD usage
Min. # of HDDs Redundancy
Read(Normal) Write(Normal) Read(Error) Write(Error)
efficiency
RAID 1
Step 1. Cut your data into unit sized pieces
Step 2. Save unit data onto HDD [Example of RAID 1]
Feature 3 3
• Mirroring System
Performance HDD usage
Min. # of HDDs Redundancy
Read(Normal) Write(Normal) Read(Error) Write(Error)
efficiency
• Mirroring System
Performance HDD usage
Min. # of HDDs Redundancy
Read(Normal) Write(Normal) Read(Error) Write(Error)
efficiency
Feature
• Parity unit has information of other unit data.
(Ex) From example fig., Ap has information of A1, A2 and A3
• Specification of Recorder
– Check Point : Supported level, HDD array limitation and other limitation
Dead Space
Normalize
HDD#1 HDD#2 HDD#3 HDD#4 HDD#5
2TB
500GB 500GB 500GB
1TB 500GB
1TB 2TB
500GB
– In order to configure RAID, the system proceeds to normalize the size of the hard disk you use.
• If all HDDs are the same size, this step is ignored.
– Normalize all HDD sizes based on the smallest HDD.
• Capacity remaining on the HDD is discarded after normalizing.
• [TIP] To minimize wasted capacity, It recommend configuring RAID with HDDs of the same size.
How to calculate
• Check the used level of RAID for considering storage size of parity unit or other
redundancy.
𝑁
– RAID 1 : Use half of HDDs ( ) for redundancy
2
𝑁
• Use half of HDDs ( ) for recording
2
• Formula
After normalizing
Storage Single Total No. No. of HDDs
Size HDD Size of HDDs for Parity unit
Or redundancy unit
Let’s Calculate
• Example #01
• Condition
– Used Level of RAID : RAID 5
– HDD Info.
• Total 6ea 8TB HDDs are used
40𝑇𝐵 = 8𝑇𝐵 × (6 − 1)
Let’s Calculate
• Example #02
• Condition
– Used Level of RAID : RAID 6
– HDD Info.
• Total 6ea 8TB HDDs are used
No. of HDDs for Parity
Total no. of HDDs unit or redundancy
• Calculation
Single HDD size
after normalizing
32𝑇𝐵 = 8𝑇𝐵 × (6 − 2)
Let’s Calculate
• Example #03
• Condition
– Used Level of RAID : RAID 1
– HDD Info.
• Total 6ea 8TB HDDs are used
No. of HDDs for Parity
Total no. of HDDs unit or redundancy
• Calculation
Single HDD size
after normalizing
24𝑇𝐵 = 8𝑇𝐵 × (6 − 3)
Let’s Calculate
• Example #04
• Condition
– Used Level of RAID : RAID 5
– HDD Info.
• Total 6ea are used
– 10TB HDD : 3EA
– 5TB HDD : 1EA
No. of HDDs for Parity
– 8TB HDD : 2EA Total no. of HDDs unit or redundancy
• Calculation
Single HDD size
after normalizing
25𝑇𝐵 = 5𝑇𝐵 × (6 − 1)
Let’s Calculate
• Example #05
• Condition
– Used Level of RAID : RAID 1
– HDD Info.
• Total 6ea are used
– 10TB HDD : 3EA
– 5TB HDD : 1EA
No. of HDDs for Parity
– 8TB HDD : 2EA Total no. of HDDs unit or redundancy
• Calculation
Single HDD size
after normalizing
15𝑇𝐵 = 5𝑇𝐵 × (6 − 3)
Live Demo of Storage Tools –
Wisenet Toolbox Plus
Control Room Monitors
Video Wall Considerations
Virtual Matrix Decoder for 16 monitors
Each connected to
4 monitors
Virtual Matrix Decoder Option
Up to 48 wall monitors, 12 Virtual Matrix Decoder licenses, One server for Virtual Matrix Gateway S/W (Free)
4 48 monitors
VMM
Virtual Matrix Manager
Performance Monitor HD, 30fps – CUDA option CIF, 30fps – CUDA option
simulation
per decoder Up to 4 monitors 1 monitor 27CH, 4 monitor 25CH 1 monitor 28CH, 4 monitor 26CH
260
Virtual Wall Merge
User can merge several monitors and make virtual screen division
[ Merge Mode ]
1x2, 2x1, 2x2, 2x3, 2x4, 2x5, 3x2, 3x3, 3x4,
3x5, 4x2, 4x3, 4x4, 5x3, 5x2
NEW PICTURE
TBA
Video Wall Considerations
• Operators
• Two Types of Tasks
• Task 1 - Just monitoring – no intervention until incident
• Example areas of high traffic public areas where lot of movement is expected.
• Task 2 – Alerts, Alarms received – Immediate action involved
• Back office areas , emergency exits etc. where after notification
• Continuous monitoring required
• May not be required – if it is non threat personnel.
• Response action requires time and focus so additional staffing is required to manage the situation when the
operator is busy
• Operator efficiency
• Low Intensity Monitoring – 50 to 75% performance
• 3 Hours at a time with multiple breaks. Total 6 hours per day.
• Breaks may be replaced with a non-visual display tasks like Logs, or physical guard tour
• Longer than 5 mins breaks is required to ensure continued efficiency to relax.
• Breaks should be taken before fatigue happens
• High Intensity Monitoring – 100% performance
• 20 mins -30 mins with 5 mins break to maintain attention
• Example baggage scanning requires 100% attention have operators shifting every 20 mins.
Video Wall Considerations
• Use of analytics may be used to enhance attention and detection and Not necessarily to
reduce the operators in the room monitoring critical areas.
• Number of monitors per Operator , depending on the task type performed on the monitors.
• High Movement areas ( airports) up to 12 images ( NOT 12 x monitors) at a time ( critical areas)
• Less movement areas (outdoor, on working times) – up to 16 images at a time ( general views)
• Less movement areas with analytics – up to 25 to 40 images per operator
• This is a general consideration only.
No. of Detection
monitors score
4 74%
6 58%
9 53%
Scene
• Note: if the operators are not trained or no experience, then they will take longer detection time
Detection Identify Response Decision within in Result : How many
AREA Each scene
Time time Time Seconds Scene he can see
Emergency Exits 2 2 20 60 10
If the same entrance has two camera with
two angles in the same area , it is still
Main Entrances 2 1 20 30 4
considered as one scene. It is good to be in
the same screen.
Parking Areas 2 10 20 60 4 Each scene can be a an entire parking area
General
2 2 20 60 10
Monitoring
IF analytics , reduces detection time
General
0 2 20 60 20
Monitoring
Scene
• A scene is a logical and meaningful set of related and coherent images and other visual information, to
be monitored with a specific aim. A ‘scene’ is likely to exhibit the following features:
• – the visual information is coherent
• – a scene consists of one or multiple images, and may also include other types of information (such as
process data).
• – all images of the same task related observed reality are considered to be one scene
Where multiple CCTV images are viewed, either in parallel or sequentially, they should be
organized in accordance with the task being undertaken.
No. of cameras per Monitor as per SIRA (2018 eg.)
Visual Field of View
• For ONE operator viewing, if the control room monitor is having more than one or two
monitors, then it should fit within his visual view to DETECT without turning his head.
• So in order to fit within his view, he should reduce the monitor size.
• If the Operator is far from the monitors, then he should consider using larger monitors
• Example 46 inch monitors can have a viewing distance of 3 meters then the width of the control
room can be up to 4 monitors in two rows.
Cameras per monitor
Pixel per image(H)
PIXEL 1 PIXEL 2
it is assumed that the human eye will just be able to see a 1 mm gap
between two black dots at a white background, at 3.4 m distance (= one
minute of arc).
Viewing Distance - Demonstration
WAN LAN
192.166.1.70:8080
192.166.1.50:8080
192.166.1.60:8080
P2P Server
Mobile
End of Class