You are on page 1of 329

Video Foundation Course

Hanwha Techwin Middle East & Africa


4 Days , 2.5 Hours per day
Hanwha-security.com
Presenter

Samuel Kumar

Technical Training Manager


ASIS CPP Certified
Middle East & Africa – Hanwha Techwin
Disclaimer - Content

• All information in this document is for restricted use.


• Hanwha Techwin reserves the right to change or modify the content of this document without any notification.
• This document is strictly prohibited to share without consent from HTME
• The information used in the document is based on the information preset at the time of presentation and expected to change as
technology advances
• It is not the responsibility of HTME for any misuse or use without consent
Hanwha

Hanwha Techwin

Wisenet
Contents
DAY 1
 0:00 Welcome Note
 0:02 Introduction & Agenda Review
 0:15 Global CCTV Ranking and Vendor Analysis
o Global Ranking of Vendors
o Vendor Qualification Requirements
 0:30 Camera System on Chip
 0:40 CMOS vs CCD Sensors
 0:50 What is WDR – Wide Dynamic Range
 1:00 Break
 1:10 What is High Light Compensation & Low Light Technology
 1:20 Infra-Red & Thermal Cameras
 1:30 Understanding IRIS Types
 1:40 Understand Image Resolution
 1:50 EN 62676-4 Detection, Recognition, Identification Standards
o Focal Lengths and Selecting the Right Camera Lens
 2:10 Network Foundation – Network Flow, transmission, bandwidth
 2:30 End of Day 1
Contents
DAY 2
 0:00 Review of Day 1
 0:10 Compression Standards: H.264 & H.265
o Advanced Compression Techniques
 0:30 Understanding Camera Construction Types and its Applications
o Different types of CCTV Cameras
o Single Vs Multi Sensor Cameras
o Different Product Series with Hanwha Techwin Product overview as
example
 1: 00 Break
 1: 10 Shutter Speed and Image Quality Optimization Methods
 1: 30 Image Signal Gain and Noise Reduction Basics and Its effect on the
image quality
 2:00 Network Foundation – IP Address, LAN,WAN,VPN, IP Tools Part –
Ping,ipconfig
 2:30 End of Day 2
Contents
DAY 3
 0:00 Review of Day 2
 0:10 Analytics in CCTV
o Commonly used Security Analytics
o Benefits of Analytics
o What is Artificial Intelligence
o Comparison with Traditional Analytics
 0:30 Camera Interoperability with other manufacturer systems
o About ONVIF Protocols
o Native Integration and its benefits
 1: 00 Break
 1: 10 CyberSecurity Basics in CCTV
 1: 30 What is Network Video Recorder and its application
 1: 40 NVR Storage vs Server Based Recording and External Storage options
 2:00 Network Foundation – IP Tools : tracert,wireshark, OSI model,L2,
PoE,HPoE,Fiber
 2:30 End of Day 3
Contents
DAY 4
 0:00 Review of Day 3
 0:10 Video Management Systems
o What is VMS
o VMS Functions and operation demonstration
o Mapping Functions, Alarm Management, Reports and Sequencing.
 0:20 Storage Redundancies
o What is RAID
o RAID vs NON RAID Systems
o Storage Calculators – Wisenet Toolbox Example
 1: 00 Break
 1: 10 Control Room Monitors
o Basics on Control Room expectations
o Video Wall Functions
o Operator efficiency
o Estimating Number of Monitors
2:00 Network Foundation – L3, Uni/Multi-Cast Port Forwarding, DDNS,P2P
2:30 End of Day 4
Global Ranking
Vendor Checklist
Vendor Checklist
SL DESCRIPTION WHY Example : HTW

Ensure Matured Understanding Of Global Requirements. Yes, with 28+ global offices for
1 GLOBAL COMPANY
Local Experience With Global Presence CCTV

Continued Development Of Unique CCTV Solutions And New Te


2 R & D TEAM Yes
chnologies
MANUFACTURING Easily adopt new technologies, bring robust products , uniform ex
3 Yes. S Korea & Vietnam
PLANT perience , Fast updates.

Regional Training center presence with dedicated trainer and regi Yes, in Dubai .Trainings in Engli
4 TRAINING CENTER
onal language trainings sh, Arabic & French

5 LOCAL TEAM To Ensure timely support and training in local languages Yes

Yes, with 30 years in


6 EXPERIENCE Min. of 5-10 Years experience in CCTV
CCTV

7 REFERENCES Large Project References with Key Infrastructures Yes

8 CYBERSECURITY Should have no previous records of major vulnerabilities Yes,UL CAP Certification
Global Presence - Example

Hanwha Techwin Bac Ninh

Subsidiaries | London, Tianjian, New Jersey, Sao Paulo, Iraq, Dubai, Bac Ninh
Offices | USA/South America(Miami), France(Paris), Germany(Frankfurt), Italy(Milano),
España(Madrid), Poland(Szczecin), Czech Republic(Praha), Turkey(Istanbul),
Russia(Moscow), Singapore, Qatar(Doha), Egypt (Cairo), Johannesburg(South Africa)
China(Beijing, Shanghai, Guangzhou, Chengdu, Korea(Busan, Daegu, Daejeon, Gwangju)

28 Global Network around the world


Vendor Trainings
Vendor Trainings

Certified Training Courses Desing Training


1. Pre- Sales Trainings
 Cameras , NVR & VMS
 Access Control
Installation ,Testing & comissining
2. Post Sales Trainings
 Cameras , NVR & VMS
 Access Control At Least Two Certified
3. Consultant Sessions Pr-sales & Post-sales

Non-Certified Trainings
1. Webinars and Product Updates
2. Customized Training : Operator Trainings
Training Labs
Training Lab - Example
Training Lab - Example
Training Lab - Example
Vendor Manufacturing
and Quality Process
Vendor Manufacturing Process & Testing
Vendor References
Vendor Project References

• MSHEIREB QATAR -10,000 Cameras


• RIYADH METRO - 4000+ Cameras
• EXPO 2020 - 6000+ Cameras

Images from unsplash


Camera Components

Copyright ⓒ 2016 Hanwha Techwin. All rights reserved.


Camera Breakdown System On Chip
SoC Design
- CPU,
- ISP, Codec
- WDR, NR, Sens-I, DIS
(+ Gyro)
HW / - DSP, HW Accelerator
Mech. - Low Power
- Camera, NVR - Multi-Sensor Input
- SMPS, Tooling
SW
- Web, Mobile Viewer
- VMS Software
- Secure SW
- UX, UI design
Intelligent
Tech.
- Video Analytics Optical Design
-Audio Analytics
-Analytics Algorithms - V/F, Zoom Lens
-Artificial Intelligence - IR-Corrected Lens
- Zoom IR illuminator
- Lens Barrel Design 25
Camera Components
1. Camera Body : Plastic , Metal based, Stainless Steel or
HW Certified Housing.

2.Bubble :Vandal Resistant (IK10/IK08 Rating) (ATEX & IECEx)

26
Camera Components
3.Lens
Fixed Lens Zoom Lens (Motorized Zoom)

Varifocal Lens
Camera Components
4.Image Sensor : CCD and CMOS
Image sensors are very important pieces of technology located
within your security cameras. The image sensor is the
component that captures the light hitting your camera's lens,
turning it into electrical signals which get recorded as video.

The two types of sensors used with security cameras are


-CCD sensors
-CMOS sensors.

Both have their advantages and disadvantages. Below is a


brief summary of each type, and you can find our more
about CCD and CMOS image sensors
Camera Components
IMAGE SENSOR CCD VS CMOS
CCD-Charge Coupled Device CMOS-Complementary Metal Oxide Semiconductor

1. Charged Coupled Device 1. Complimentary metal oxide semi-conductor

2. Both Convert Light to Signals

3. Widely used in almost all IP Megapixel cameras. Incl.


3. Typically used in analog cameras Nikon, IPhone & Samsung Phones

4. Typically found in analog cameras. Output is analog 4. A CMOS sensor incorporates amplifiers, A/D-
and requires AtoD external convertors converters and often circuitry

5. High Power Consumption


5. Lower Power consumption ~100 times

6. Used to be known for good low light performance 6. Current technology advancements in CMOS
Provides superior low light and no longer a
Difference.
Image Sensors and Digital Signal Processors (DSP)
The combination of an Image Sensor and Digital Signal Processor makes up the imaging portion of a security camera. This
duo determines what the quality of the camera's video signal will be. If you purchase a camera that has a quality image sensor
and DSP, you will overall have better more satisfying video, especially in
variable lighting conditions requiring HLC, BLC, and WDR. When looking at a camera's specifications it is
important to look for the types of these two components contained within. Understanding their roles in the camera will play a
huge a part in your decision to purchase one camera over another. Below we discuss some of the common types of these
imaging components.
Image Sensor Size and Lens Size
Camera Components
5. System on Chip-SoC

- CPU,
: Brain of the camera –
- ISP, Codec • Resolution and FPS
- WDR, NR, Sens-I, DIS (+ Gyro)
• WDR Capability
• Image Enhancements
- DSP, HW Accelerator
• Stream and Bandwidth Enhancements
- Low Power
• Analytics
- Multi-Sensor Input • Other - Power

5.Software : Connects everything together within the camera and externally


including ONVIF, Mobile app, web browser
6.Other : Classification by Shape and Hardware – Mic,Alarm I/O,Gyro Sensor,
IR illuminators ,SD card etc..
Camera Components
5.System on Chip-SoC, continued
Evolution of SoC SoC – System on Chip

2010 2012 2020


2011 2016

Wisenet Wisenet3
·720p, 30fps ·2MP 60fps
·WDR 2MP 30fps(120dB), Defog
Wisenet2 ·Min. Illumination 2MP 0.1Lux Wisenet5
·2MP 30fps ·5MP 30fps, 2MP 60fps Wisenet7
· WDR 2MP 30fps(150dB), Defog, HLC · 4K 30fps, 4MP 60fps
· Min. Illumination 2MP 0.01Lux · Next Level Cybersecurity
· Improved Image quality
(WDR, Low-light, LDC, etc..)
. Multi-channel support
(Max 4 CH on a single shipset)
LIGHT COMPENSATION

WDR-Wide Dynamic Range


HLC-Highlight Compensation
BLC-Backlight Compensation
WDR-Wide Dynamic Range

The difference in intensity between the highlights and shadows of a scene is called dynamic range,
Wide Dynamic Range camera uses a number of technologies to widen the range it can register.
Axis' Forensic Capture is an example of a WDR technology.

Dynamic Range
Long Exposure management Tone mapping/
Contrast Control
(Scene analysis)

Creates optimized WDR image

Short Exposure
WDR-Wide Dynamic Range, continued
Dynamic range is a general term for differences in ratios between measurable quantities of something.
WDR refers to the Ratio between the lightest and darkest elements of the image

WITHOUT WITH WDR


WDR-Wide Dynamic Range, continued

1 2 3 4

0 sec 1/120 sec 2/120 sec 3/120 sec 4/120 sec

4 frame Composite
WDR-Wide Dynamic Range – 2MP Modes

Encoder can process


WDR OFF: up 60fps @ 2MP each 60 fps video

120 Sensor
Lens Encoder 60 fps Network
fps DSP 120 fps

Every two frames


WDR 120 dB: 60 fps video
combines to one

120 Sensor
Lens 60 fps Encoder 60 fps Network
fps DSP
60 fps
60 fps

Every four frames


WDR 150 dB: 30 fps video
combines to one

120 Sensor
Lens 30 fps Encoder 30 fps Network
fps DSP
30 fps
30 fps
30 fps
30 fps
WDR-Wide Dynamic Range – Line by Line Method

Short exposure

Long exposure

Shortest exposure

0 sec 4/120 sec (1/30sec)

Line by Line Type WDR


: Wisenet7
· Different exposure time Line by Line.
- This allows Longer Exposure time compare to 4 Frame WDR(better S/N)
- It reduces the time gap (capturing Image execute Line by Line for different Long/Short/Shortest exposure time)
WDR-Wide Dynamic Range – Line by Line Method

(4Frame-Frame by Frame@30fps (3Frame-Line by Line@30fps

MotionArtifact
MotionArtifact

VS VS

Exposure time Exposure time

120fps 120fps 120fps 120fps 30fps

Effective on Reducing Motion Artifact with the smaller gap


between Long/Short time exposure frame
WDR-Wide Dynamic Range – PIXIM Chipset
Pixim chipset to maximize Wide Dynamic Range (WDR)

Pixim's digital pixel system (DPS) image capture technology to provide world-leading performance in
challenging lighting conditions, combined with dramatically improved low-light performance.
LIGHT COMPENSATION
HLC – High Light Compensation
High Light Compensation - Demonstration
Highlight compensation (HLC) is a feature that came out of necessity due to overexposure from strong light sources like headlights
or spotlights. This feature senses strong sources of light in video and compensates for exposure on these spots to enhance the
overall quality.
•Helpful in preventing blinding of security cameras at night time from headlights.
•Reduce the glare in video to an extent and make it possible to see license plates on slow moving front approaching vehicles or
stationary vehicles.
High Light Compensation - Demonstration
LIGHT COMPENSATION
BLC-Backlight Compensation
BLC-Backlight Compensation - Demonstration

Backlight Compensation (BLC) is a feature that camera have been utilizing for some time now. When someone is say sitting in
front of a window, or coming in from outside, there is a lot of natural light behind this person. When a camera is aimed in their
direction, the camera is picking up all this natural light behind them, therefore the object or person in the foreground becomes
very dark, almost silhouette like. Such video is not good for security personnel trying to determine who this person is.

BLC is a feature provided by the Digital Signal Processor (DSP) in a security camera that optimizes exposure in the foreground
and background of security video. It splits the video scene into different regions, and uses a different exposure for each of these
regions. It corrects regions with extremely high or low levels of light to maintain a normal and usable level of light for the object in
focus. However, it is important to note that BLC has its limits when correcting exposure in situations where there is an extreme
difference in light between the foreground and background. For best results, WDR has become the sought after feature
Sensitivity
Low Light
Minimum illumination
Aperture
Iris Opening F- Stop
Light-gathering ability.
Refers to how far a lens can open up or close down to let in more or less light.
”Aperture” is a circular opening within a lens, through which light travels into the camera body and onto the camera’s digital sensor.
A large Aperture is a big hole which lets lots of light in,where as a small hole does not let so much light in.
Optics & Barrel

Best-in-class : 2M 4.0X F0.94 V/F Lens

Company A Company H Company D


 1/2” 2M 60fps, H.265 1/1.9” CMOS
 M-V/F(4.1~16.4mm) Image 1/1.9” CMOS 1/1.9” CMOS 1/1.9” CMOS
 WDR, IR, IP66/IK10 (new IMX385
 PoE/DC/AC Sensor = 2x IMX185)
XNO-6085R

2.8 ~ 12.0mm 4.1 ~ 16.4mm


Focal length 4.1 ~ 16.4mm 4.1 ~ 9.0mm (measured: 3.0 ~ 9.0) (measured: 4.0 ~ 12.0)
 1/2” 2M 60fps, H.265
 M-V/F(4.1~16.4mm)
 PTRZ, WDR, IR
 IP66/IK10, PoE/DC/AC
Zoom ratio 4.3x 4.0x
4.0x 2.2x (measured: 3.0) (measured: 3.0)
XNV-6085R

 1/2” 2M 60fps, H.265


F-number 0.94 1.6 1.4 1.53
 M-V/F(4.1~16.4mm), Metal body (V)
 PTRZ, WDR, IR, IK08, PoE/DC
Horizontal 100 (W) ~ 26 (T) 100 (W) ~ 46 (T) 92 (W) ~ 32(T) 92 (W) ~ 32(T)
XND-6085R /
XND-6085RV
FOV

Extreme Low-Light Performance


(0.005 lux)
Why Low Light Is required? To Difference and identify color of objects
Sample Video of Non Low Light and Low Light

Non Low Light and Low Light

Restricted
IR ILLUMINATOR
IR Range
Smart IR
Variable Zoom IR
Hanwha Techwin – Fixed Camera IR Range
Variable Zoom IR Illuminator

* IR illuminance control with changes in zoom ratio

500

Fixed
Moving
Lens
IR
Zoom IR Illuminator
Full Frame IR LEDs

Conventional IR illumination provides intense light at the center of an image, degrading quickly as it moves a
way from the center. Wisenet X series cameras use powerful IR LEDs that provide a wide angle of uniform IR
light across a scene for a wider image capture area.

Fewer, higher-powered IR LEDs with better control


IR Correction
Day 1 Summary

1) Know your vendor


• Global Position
• Local Presence
• Training & Support
• Manufacturing Capability
• Cybersecurity
2) Camera Construction
• Lens and Image Sensor
• System On Chip( SoC)
• WDR Technologies
• Multi exposure – 2 frame capture and 4 frame capture
• IR Illumination
Hanwha Techwin – Other Convenient Functions
Dual SD slot USB for Installation

X series save your time & money by supporting Wi-Fi / Cable


Video transmission through USB when you are installing camera.

2X
Hanwha Techwin – Other Convenient Functions
Focal Lengths
Focal Length
‫‪Focal Length‬‬

‫‪LIVE‬‬
‫‪Demonstration‬‬

‫فإذا اخترنا عدسة ‪ 4mm‬ستكون زاوية الرؤية كبيرة لكن‬


‫بدون تفاصيل دقيقة للصورة‪ ،‬أما إذا اخترنا عدسة‬
‫‪ 12mm‬فستكون زاوية الرؤية صغيرة لكنها ستكون‬
‫أوضح‪ .‬وبالتالي عندما تريد أن تصور منظ ار عاما اختر‬
‫عدسة ‪ ،4mm‬أما إذا أردت صورة دقيقة فيجب أن‬
‫تختار عدسات )‪ (12mm-8mm‬كما هو الحال مثال‬
‫إذا أردت اختيار كامي ار موجهة تحديدا علي آلة الصرف‬
‫عند موظف المحاسبة‬
Focal Length

Super Telephoto
(Long distance,Subject like birds)

Telephoto
(Wildlife - Near Sports ,Portraits
Children )

Normal
(Snapshots Average Situations)

Wide Angle
(Landscapes,Group portraits)

Extreme Wide Angle


(Architecture, Interiors)
Focal Length – PTZ Study Long Zoom
37X & 55x ZOOM KEY FEATURES

• Max. 2Megapixel (1920 x 1080)


• Real 2M 37x Zoom Lens for 1/1.9” sensor (6-222mm)
• Real 2MP 55x Zoom Lens for ½.8” sensor (4.75 – 261mm)
• H.265 / H.264, Wise Stream
• Max. 30fps (H.265 / H.264)
• Auto Tracking
• WDR (120dB)
• Digital Image Stabilization
• Defog, Motion detection, Tampering, Appear/Disappear, Virtual Line, Enter/Exit
• Audio-in/out, Alarm-in/out support
• Edge storage (micro SD/SDHC/SDXC 128GB, NAS)
• IP66/IK10

XNP-6550H
DORIS STANDARD
EN62676
Detection : detection of activity within a scene
Observation : being able to interpret what is going on
Recognition : recognition of a known individual or object
Identification : identification of an unknown individual or object
Strong Identification/Inspection : Low Light , Facial Features.

Video Resolution Body Rep (EN62676) Resolution


Strong Identification 200% 500 PPM Min FHD
Identification 120% 250 PPM Min FHD
Recognition 50% 125 PPM Min HD,FHD
Observation 20% 62 PPM Min 4CIF,HD
Detection 10% 20-50PPM Min 4CIF,HD
Image Resolution
Resolution Comparison: 4CIF, 720p, 1080p, 5MP, 4K, and 180 & 360 Panoramic 12MP
4CIF: 704x480 Pixel
High Definition (HD): 720p image resolution =1280 x 720 Pixels
Full High Definition (FHD): 1080p image resolution =1920 x 1080 Pixels
Quad High Definition (QHD): 2560 x 1440 Pixels
Ultra High Definition(UHD): 4K image resolution =3840 x 2160 Pixels
Ultra High Definition(UHD): 8K image resolution =7680 × 4320 Pixels
DORIS STANDARD
Identification: The first type of camera zone is the identification zone. In the program, this is marked in red. In this area,
you can positively identify a person beyond reasonable doubt. Here we have sufficient picture quality and detail to identify
an individual. The EU standard defines the identification area as “more than 4mm at the target distance per pixel”. If we
covert 4mm per pixels to pixel density (1000mm divide by 4 mm per pixel), the result is 250 pixels per meter (PPM) or
about 76 pixels per foot (PPF).

Recognition: The second zone is recognition, marked in yellow. In this area, the security operator will be able to
recognize a person known to them. Viewers can verify with a high degree of certainty whether or not an individual shown
is the same as someone they have seen before. In this area, the pixel density is not less than 125 PPM (38 PPF) or 8mm
per pixel. Also in this area, it is possible to recognize license plates manually, but the camera resolution may be not
sufficient for Automatic number plate recognition (ANPR) systems.

Observation: Next we have the observation zone (green). In this area, some characteristic details of the individual, such
as distinctive clothing, can be seen. The pixel density is 62 pixels per meter or about 19 PPF (16mm per pixel by EN
62676-4)

Detection: Next is the detection zone (light green). In this area, where the operator will be able to detect a human
presence: 25 PPM or 8 PPF (40mm per pixel).

Monitoring: The monitoring zone (blue) is used to monitor or perform crowd control. 12PPM / 4 PPF/ 80mm per pixel.
There is also a special kind of zone called Inspection or Strong Identification: 1000 PPM or 303 PPF (or 1mm per pixel
by EN 62676-4 or EN 50132-7), marked as purple in the program.
DORIS STANDARD
Take Away
Specifying the right detection requirements is important to get the best coverage.

Typical classification : Typical classification :


Identification :250 PPM Recognition : 125 PPM
1. All Entrances – Indoor & Outdoor 1. All Lobbies
2. Emergency Exits and Entrances 2. Drop off areas
3. Cash Handling Areas 3. Luggage rooms
4. Places of Cash cabinets 4. Safe deposit
5. Outdoor Entertainment Entrances 5. Lift lobby, inside lift, stairs
6. Main Tank Refueling 6. All Corridors
7. Control Room and Equipment room entrances 7. Main Utility Rooms
8. Entrances of business centers, meeting rooms
Typical classification :
9. Show Halls inside and outside
Detection : 50 PPM
10. Main Kitchens, Dining areas
1. Large Landscapes/Gardens
11. Liquor entrances
2. Parking areas
12. Goods loading and unloading
DORIS STANDARD
Identification: The first type of camera zone is the identification zone. In the program, this is marked in red. In this area,
you can positively identify a person beyond reasonable doubt. Here we have sufficient picture quality and detail to identify
an individual. The EU standard defines the identification area as “more than 4mm at the target distance per pixel”. If we
covert 4mm per pixels to pixel density (1000mm divide by 4 mm per pixel), the result is 250 pixels per meter (PPM) or
about 76 pixels per foot (PPF).

Recognition: The second zone is recognition, marked in yellow. In this area, the security operator will be able to
recognize a person known to them. Viewers can verify with a high degree of certainty whether or not an individual shown
is the same as someone they have seen before. In this area, the pixel density is not less than 125 PPM (38 PPF) or 8mm
per pixel. Also in this area, it is possible to recognize license plates manually, but the camera resolution may be not
sufficient for Automatic number plate recognition (ANPR) systems.

Observation: Next we have the observation zone (green). In this area, some characteristic details of the individual, such
as distinctive clothing, can be seen. The pixel density is 62 pixels per meter or about 19 PPF (16mm per pixel by EN
62676-4)

Detection: Next is the detection zone (light green). In this area, where the operator will be able to detect a human
presence: 25 PPM or 8 PPF (40mm per pixel).

Monitoring: The monitoring zone (blue) is used to monitor or perform crowd control. 12PPM / 4 PPF/ 80mm per pixel.
There is also a special kind of zone called Inspection or Strong Identification: 1000 PPM or 303 PPF (or 1mm per pixel
by EN 62676-4 or EN 50132-7), marked as purple in the program.
Making a FOV on Auto CAD JVSC
Lens Calculator
Networking
Networking Basics in CCTV

video video video


Shoot Record Playback
Data Transmission

Camera A Switch A Viewer


Data Transmission

Recorder

Camera Ax2 Switch Ax2 Switch

Viewer
Data Transmission

Recorder
Camera
#1

Camera (A+B+C)
Bx2 Switch Switch
#2 X2

Camera
Viewer
#3
Data Transmission

Recorder
Camera
#1

Camera
B Switch A+B+C Switch
#2

Camera
Viewer
#3
Basics of Networking in CCTV
Switch
Network Monitoring
Network
PC
Cameras Cameras
Switch
Recorder
Network Network
Cameras Camera
INTERNET
Switch
Recorder
Router
1 or Core Switch
more Switch

(Broadband)
Network Router
Camera
Fiber optic Monitoring
converter PC

Network
Camera
Fiber optic
converter LAN cable
Optical fiber cable
Networking Basics in CCTV

NVR
H.264 / 1920x1080 / 30fps
Recording

NVR
H.264 / 800x600 / 15fps
Monitoring

VMS
H.265 / 1920x1080 / 30fps
1CH Monitoring

VMS
H.265 / 640x360 / 15fps
64CH Monitoring
Networking Basics in CCTV

Received Data Size Sending Data Size

• Network Switch, Router


– Upload Speed
– Download Speed
– Actual data processing performance

• Network Cable
– UTP cable category
Networking Basics in CCTV

>
Noisy video Dynamic video

>

>
Complex background video

Static video
Simple background video Clear video
Networking Basics in CCTV

High Profile High Profile


Camera Recorder Viewer
Low Profile Low Profile

High (Resolution/Frame rate) Profile

Low (Resolution/Frame rate) Profile


Networking Basics in CCTV

Properties Setting Quality Bandwidth ETC.

H.264 / H.265 - Frame Loss ↑


Codec
MJPEG - Frame Loss ↓

High -
Resolution
Low -

High Smoother video


Frame rate
Low Less smooth video

High - Frame Loss ↑


GOV Length
Low - Frame Loss ↓

CBR Variable Quality Constant Size Stable System


Bitrate
Control
VBR Constant Quality Variable Size Efficient System
Networking Basics in CCTV

Network part 2
IRIS
F stop & P Iris
F-Stop
P-Iris
P-Iris
DC-Iris vs P-Iris

DC-IRIS P-IRIS ( PRECISION IRIS)

1. Adjusts the opening of IRIS 1. Adjusts the opening of IRIS depending


depending on the Light on the light.

2. Uses Stepper Motor


2. Uses DC-motor

3. The Camera talks to the lens to adjust the Aperture

4. Ensure entire image is in focus


Resolution
Resolution Breakdown

Resolution Pixels Total Pixels Relative Perspective


increase
1CIF 320x240 76,800 1 Visiting Card
4CIF 704x480 337,920 4.4 ~A4 Paper
HD 1280x720 921,600 2.7 12inch Tablet IPAD PRO
FHD 1920x1080 2,073,600 2.25 20 inch Monitor
4K 3840x2160 8,294,400 4 40 Inch Monitor
Network Tranmission -
Wisestream
Codec

CODEC
CO = Coding/encoding
DECODE
DEC =Decoding LIVE
CODING

PLAYBACK

ANALOG
CODING LIVE DECODE

PLAYBACK

IP CAMERA
86
Codec History

1992: JPEG H.264: Advanced Video Coding (MPEG-4 AVC)


Mid 1990’s: MJPEG H.265: High Efficiency Video Coding (HEVC)
1995: MPEG-2

2004: H.264
H.265 was developed for high resolution
2013: H.265
transmission with low bandwidth without losing
resolution or picture quality.

87
Encoding H.26x (1/2)

Inter-Frame encoding: Compressing & transmitting only the changes between


subsequent frames.

Frame 1 Frame 2 88
Encoding H.26x (1/2)
Encoding the frames:
Divide the image to blocks that is 16X16 or 32X32 pixels (Macroblock MB).

Frame 1 Frame 2
Full frame Partial Frame
89
(I or Key Frame) (P Frame)
Bandwidth Utilization

1080p 15fps

720p 30fps

Multi-Profile

 10 unique profiles can be configured,


each with unique Resolution, Frame rate,
Bit rate, Codec, & more
 Perfect for LAN/WAN monitoring

VGA 5fps

X series – 10 Streams
X Lite Series – 5 Streams
Q Series – 3 Streams
P Series – 3 Streams
Bandwidth Utilization

Minimum Streams x 3 Configurable


1.Recording Stream
2.Live Stream
3.Low Resolution Stream For Multi View

Optional Streams
1. Mobile/Web Stream
2. View Stream
3. SD Card Recording Stream
4. Redundant Recording Stream
5. 3rd party systems Stream etc.
H.265
High Efficiency Video Coding
Adopted into the Wisenet X / P / Q / T series cameras for up to 50% less bandwidth and storage than H.264 codec,
leading to increased cost savings.

H.265 H.264
BW 5Mbps BW 10Mbps

Recording 30Days Recording 30Days


1TB 1TB 1TB 1TB
1.62TB 3.24TB
Wise Stream Intelligent Codec
H.265 + Wise Stream

Wise Stream is an efficient way to reduce storage and bandwidth by dynamically choosing your areas of
motion and regions of interest as your high definition areas, while leaving the rest of the video at a lower
resolution.

Kbps Kbps
H.265 + Wise Stream

• Save Bandwidth and Storage Costs


• Automatically Adjust Based on Motion in the Scene
• Works with H.265 and H.264

H.265
Camera Types
Camera Shapes

Bullet
Long Range Long Range
Dome Zoom Lens Box 5-62mm
5-62mm

Mobile Micro Wedge Lift Marine


Transportation extra lux Super Low Light
Stainless

Micro Dome Fish eye PTRZ


ATM/Pinhole
Remote Pan/tilt/
zoom/Rotate
Camera Shapes

Positioning Camera

Multi Sensor Models

Ex-Proof Camera

Thermal Camera

Corner Mount Camera


Single Sensor 4K & AI models 98
180 degree Panoramic
220 degree Panoramic

PNM-9030V
180 vs 220 degree Panoramic
360 Degree Multi Directional
360 Degree Multi Directional with PTZ
Twin Sensor Multi Directional
Vendor Product
Categorization
Vendor Product Categorizations

Major Differentiators
• Analytic Support – Supported or not supported
• Number of Analytics – Three or Six or Nine or more
• WDR Capability – 120dB or More
• Hardware Features – Specific Form factor models, special lens models, extreme
environment models
• Resolution – Category 1 up to 5 MP and Category 2 – from 4K onwards
Shutter Speed Settings
Factors affects image quality
Shutter Speed (~Exposure Time)

How much time the light is given to enter the camera.

Shutter speed Slower Faster

Gathering light Brighter Darker

Motion blur More Less


Adding motion blur to a moving subject Clearly freezing the fast movement

Open source images - unsplash


Difference between Frame Rate vs Shutter Speed

•Frame Rate, controls how many images or frames are shown each second. If it takes one second for something to pass in front of the camera, a frame rate of 5 Frames Per Second
(FPS) means 5 still images of the object

Higher frame rate gives you smoother motion and more images. But this also means more network bandwidth and storage space Mot

Motion blur has got nothing to do with frame rate. It's all down to shutter speed,
Slower Shutter Speeds, let more light in on each exposure, but moving objects can become blurred.
Faster Shutter Speed, will give less blur at the cost of light sensitivity.
So, Frame Rate doesn't affect the sharpness of the individual images. it just gives you more viewers still. A lower frame rate could save value will network and disk space. And
remember the sharpness of moving objects is all about shutter speed
Gain & Noise
Gain Control
A measure of the electric signals amplification .
Increasing the gain makes the image brighter, but nosier.

Gain level Lower Higher

Brightness Darker Brighter

Image noise Less More


The FINE Balance
TEST _ Environment
 Illumination : 300 Lux
TEST _ Environment ( Illumination ~ 5 lux)
 Camera default setting
– Minimum Shutter Speed : 1/5
– Maximum Shutter Speed : 1/12000
– Smart Super Noise Reduction(SSNR) level : 12
– Auto Gain Control (AGC) : High
Attached video is encoded so the video quality may be different with actual video.
TEST _ Adjust minimum shutter speed
 Camera setting
– Minimum Shutter Speed : 1/200
– Maximum Shutter Speed : 1/12000
– Smart Super Noise Reduction(SSNR) level : 12
– Auto Gain Control (AGC) : High
Attached video is encoded so the video quality may be different with actual video.

Before Adjustment
After Adjustment
TEST _ Adjust SSNR Level
 Camera setting
– Minimum Shutter Speed : 1/200
– Maximum Shutter Speed : 1/12000
– SSNR level : OFF
– AGC : High
Attached video is encoded so the video quality may be different with actual video.

Before Adjustment
After Adjustment
TEST _ Adjust AGC Level
 Camera setting
– Minimum Shutter Speed : 1/200
– Maximum Shutter Speed : 1/12000
– SSNR level : OFF
– AGC : Low
Attached video is encoded so the video quality may be different with actual video.

Before Adjustment
After Adjustment
TEST _ Optimized Setting
 Camera setting
– Minimum Shutter Speed : 1/120
– Maximum Shutter Speed : 1/12000
– SSNR level : 4
– AGC : Middle
Attached video is encoded so the video quality may be different with actual video.

Before Adjustment
After Adjustment
Pre Configured– Image
Presets
Pre-Configured Image Presets
Networking
Networking Basics in CCTV

• Change an IP address in windows

• Four configuration parameters:


1. IP Address
2. Subnet Mask
3. Default Gateway
4. DNS Servers
• Primary
• Secondary
Networking Basics in CCTV – IP Address

There are 4 parameters for an IP configuration:

1. IP Address
Example: 192.168.0.1

2. Subnet Mask
Example: 255.255.255.0

3. Default Gateway
192.168.0.254

4. DNS Servers (Primary & Secondary)


192.168.0.254
8.8.8.8
8.8.4.4
Networking Basics in CCTV – IP Address

Smith = 192.168.0 (Network ID)


John = .1 (Host ID)
Lisa = .2
Emma = .3

Smith, John = 192.168.0.1


Smith, Lisa = 192.168.0.2
Smith, Emma = 192.168.0.3
John Smith Lisa Smith

Smith

Walker, Brandon = 192.168.2.1

Emma Smith Brandon Walker


Networking Basics in CCTV – Subnet Mask

Family name NWID First Name Host ID

• Divides John
Network
Smith Lisa
ID from
Emma
Host ID
.1

192.168.0 .2

.3

255.255.255 .0
Networking Basics in CCTV – Subnet Mask

192.168.10.11 Network 192.168.10.22

1 2

Send packet

Which network do I belong to?


192.168.10.11 1100 0000 . 1010 1000 . 0000 1010 . 0000 1011
AND
255.255.255.0 1111 1111 . 1111 1111 . 1111 1111 . 0000 0000
Result: 1100 0000 . 1010 1000 . 0000 1010 . 0000 0000 = 192.168.10.0

Which network does the destination belong to?


192.168.10.22 1100 0000 . 1010 1000 . 0000 1010 . 0000 1011
AND
255.255.255.0 1111 1111 . 1111 1111 . 1111 1111 . 0000 0000
Result: 1100 0000 . 1010 1000 . 0000 1010 . 0000 0000 = 192.168.10.0

Are they the same or different?


Same – send directly via network switch
Networking Basics in CCTV – Default Gateway

• 3rd configuration element of IP


• Exit and Entrance to the network
Networking Basics in CCTV – LAN and WAN

LAN WAN
Networking Basics in CCTV – VPN

• Use VPNs (hardware or software) to connect clients or remote sites


without opening ports to the external world.
Networking Basics in CCTV – IP Classes

Class Address Binary (first byte) NWs Hosts Private Range

A 0 - 126 0000 0001 – 0111 1111 126 16.7 M 10.0.0.0 – 10.255.255.255

B 128 - 191 1000 0000 – 1011 1111 16 384 65 534 172.16.0.0 – 172.31.255.255

C 192 - 223 1100 0000 – 1101 1111 2.097 M 254 192.168.0.0 – 192.168.255.255 Class A

D 224 - 239 1110 0000 – 1110 1000 n/a n/a n/a

E 240 - 255 1111 0000 – 1111 1111 n/a n/a n/a


Networking Basics in CCTV – IP Consideration & IP Addressing

Manual vs dynamic addressing


• 0 - No Zero network
• 127 – Local loopback Manual:
• 224 – 239 - Class D – Reserved for Multicast
• 240 – 255 – Class E – Reserved for future research • Static
• Host addresses not to end in 0 or 255
Automatic:

• DHCP – Dynamic Host Configuration Protocol


– DHCP server holds a record of addresses on local network

• APIPA – Automatic Private IP Addressing


– Fallback address scheme
– 169.254.0.0 – 169.254.255.255
Networking Basics in CCTV – IP Tools

• ipconfig

From command prompt


• ipconfig
• Displays IP Configuration for all adapters

• ipconfig /all
• Displays more information including MAC address (physical address)
Networking Basics in CCTV – IP Tools

• ping

What is ping?

Packet InterNet Groper = ping

Direction and distance measured


• Address is confirmed
• Round trip time measured
Day 3
Common Security
Analytics
Intelligent Video Analytics

Wisenet Cameras & Similar CCTV Cameras have license-free intelligent Video Analytic functions including:
Appear/Disappear, Virtual Line/Enter/Exit, Face, and Tampering detection. Audio detection also allows users to detect an
event beyond a camera’s field of view. Intelligent Motion Detection prevents small, continuous motion from trigger
constant recording.
When these video analytics are linked to a NVR or VMS (same brand or different brand), the NVR/VMS will list then as
separate events for quick recall, using the Smart Search function.
Intelligent Video Analytics

 Loitering Detection
– Object loitering in a designated virtual area for more than the set observation time are detected

Virtual area

Loiter
Intelligent Video Analytics-Handover
Motion Detection Hand-Over
[MD] Able to link events with other camera’s preset position
– Multiple cameras are interlocked to keep track of suspicious objects
Intelligent Video Analytics

Appear/Disappear Motion Detection, Counting


Loitering Face Detection Business Queue
Behavior
Detection Intelligence
Analytics Heat Map
Tampering, Shock
Fog Detection, Defocus Detection

Virtual line (Directional Detection) Break Glass


Scream 10 x Standard Suite
Enter/Exit Sound
Passing 4 x Sound Classification
Analytics Gunshot 3 x Business Intelligence
Explosion
Benefit of Analytics
Uses of Analytics for Forensic Search
Business Intelligence

People counting Heat map

Queue Statistics
Business Intelligence
What is AI – Artificial
Intelligence
AI vs. Machine Learning vs. Deep Learning

What is the difference?

1950’s

Artificial Programs with the ability to learn and


Intelligent reason like human

1980’s

Machine Algorithms with the ability to learn


without being explicitly programmed
Learning
2010’s

Deep Subset of machine learning in which


artificial neural networks adapt and learn
Learning from vast amounts of data
Machine Learning
Performing a function with the data given to it
Output

Input

It is dark! Algorithm
Training with given data
Dark, Turn on the light, Light on, Switch on the
light, Dim up… .etc.
Machine Learning
Using a layered structure of algorithms called an “Artificial Neural Network”
Output

Input

I cannot
see Algorithm
anything.. Artificial Neural Network
Uses of AI Analytics for Forensic Search
Traditional Video Analytics
Reducing false alarm based on deep learning technology
Reducing false alarm based on deep learning technology
Attributes for Forensic Search

- AI camera sends metadata including attributes of objects, coordinates information and setting value to backend server.
- . Person, Face, Vehicle category and so on.

Gender
Vehicle color & type
Face (Age, Mask, Glasses)

Top wear/color

Bag
Bottom wear/color
Enhancing Business Insight with AI
• AI camera has applied new AI algorithm for Alarm accuracy improvement based on the object
classification
Enhancing the Traditional Analytics
Uses of AI Analytics for Forensic Search(color clothing)
Uses of AI Analytics for Forensic Search
Wrong Direction Detection or Vehicle Entry
Area Detection – Type of Vehicles and Zones
Stopped Vehicle
Bi-Spectrum – Thermal and 4K AI – Visibility

Visual image

Thermal image

Real-time analysis information (Metadata) sharing


TNM-C4940TD/C4950TD/C4960TD

12
© 2022 All rights reserved.
1) Vehicle Counting
CONFIDENTIAL

• 2 Lanes are available for making rule for Vehicle Counting function.
• Attributes : Car/Bus/Truck/Motocycle/Bicycle
Vehicle Counting 1/2
2) Stopped Vehicle
CONFIDENTIAL

• When the vehicle enters a specific drawn area, an event occurs when the vehicle exceeds
a predetermined time.
• This application can be utilized as giving some fine when unauthorized zone is parked.
3) Traffic Jam
CONFIDENTIAL

• Available Rule : Max. 4ea.


• There is the (Start-End) order of lines passing through speed detection.
But, there is not implemented the distance from camera yet.

St
ar
t

E
n
d

- Speed unit supports km/h

- Speed range
. km/h : 1~40km/h

- Event based time range : 1~60 min


4. Garbage detection CONFIDENTIAL
5. Truck detection CONFIDENTIAL

Truck Classification

Mini-Size
Truck

Mid-Size
Truck

Heavy Truck

– Installation
School Bus • Install the camera on the last lane which Truck Vehicles use.
• The camera is as below.
• Camera : PNB-A9001

Work Bus • Enclosure : SAK-150IR


# Appendix. (Truck detection) CONFIDENTIAL

Mini-Size Truck Mid-Size Truck Heavy Truck


(1 ton Truck) (3 ton Truck) (5 ton Truck)

• 1 ton to 1.5 ton • 3 ton • More than 5 ton


• Container/Ready-mixed concrete
Truck /Dump/ Oil-trailer/Waste
vehicle etc.
Slip and Fall Detection
WiseDetector
In WiseAI application Customize and train your own object
Using built in Wise Detector Application
Crowd monitoring with Occupancy app
Improved Storage Saving WiseStreamⅢ

A new cutting edge video compression technology WiseStreamIII operates based on the object detection accomplished by AI algorithms. When
combined with the H.265 compression technology, bandwidth can be reduced by up to 80% without compromising the video quality, enabling
efficient video management.

Objects detected,
Low compression
High quality
AI Cameras
AI Special Models
5-62mm AI ID Cameras Powerful 12x optical zoom

1x 12x
2-12. Reducing Total Cost of Ownership

Monitoring two areas with different FoVs

2-channel multi-directional cameras can simultaneously monitor two areas with different FoVs,
which reduces installation costs, network runs, switch ports, and accessories to reduce the Total Cost of Ownership

ID:HWTW_81180011/Name:Samuel Kumar/Group:HTME법인/Print time:2023-01-02 12:50


Additional AI Models

Pan Tilt Rotate


Fish Eye Panoramic
Zoom (PTRZ)
PTRZ

A motorised Pan Tilt Rotate Zoom (PTRZ) gimbal which enables installers to remotely pan, tilt, rotate and zoom the
lens position in order to set the camera’s field of view, saving time and installation costs.

Copyright ⓒ 2018 Hanwha Techwin. All rights reserved


2-4. Next level cybersecurity
The cybersecurity of the new X AI camera validates the boot process, securely stores key information, and preempts hacking risk with
unauthorized access blocking. Our cameras also has been certified UL-CAP, Secure by default certification and including device certificate Root
CA. We can provide industry-leading end-to-end cybersecurity to the customer.

TPM (Trusted Platform Module)


Secure
boot
OTPROM : On-chip

UL-CAP
Cybersecurity Assurance Program
Key

Random number
Crypto
Secure
OS
(RTOS)
Normal
OS
(Linux)
Data
protection
Accelerator
Sensitive information
+ Development Process EEPROM
Secure
Storage

Data Protection Improved security Integrity Secured Hardware


• Secure Storage / OS • UL CAP, Secure by Default Certified • Secure Boot • Secure JTAG
• private device • Secure Open Platform App
certificate Root CA • Verify Firmware Forgery
Next level cybersecurity TPM 2.0 (FIPS 140-2 certification)

TPM is a hardware that creates hard to predict


‘actual random numbers’ and provides enhanced security compared to software producing
similar random numbers. Also, encryption keys can be saved within TPM for dual protection.
So, TPM can serve as a secure storage.
X-plus cameras has applied FIPS 140-2 certified TPM.
FIPS(The United states ‘Federal Information Process Standards) is a security
standard for cryptographic modules the federal governments in the US, UK, Canada
used to approve whether TPM is securely designed and implemented.
With this certified TPM, users are using cameras more securely.
Reinforced durability

Metal shielded RJ-45 Hard-coated dome bubble

Metal-shielded RJ-45 terminal and enhanced earthing frame structures can Hard-coated dome bubble provides better resistance to scratches
protect the camera from transient voltage(lightning, static electricity). from external stimuli (sand, worker's hand, etc.).
※ Using STP(shielded twisted pair) cables is recommended. Also, the degradation of resolution due to scratches can be minimized.
Reinforced durability

Blocking Blocking Flowing air


particles liquid

No stress on seals

Humidity control with GORE vent

GORE vent offer to prevent condensation and maintain performance of long-term storage through water vapor control.
Also, it can prevent sealing damage through pressure equilibrium in the product.
SSM UPDATES
SSM UPDATES

SSM has inbuilt monitoring dashboard which gives the total and status of Cameras (Online/
offline), NVR (Online/Offline) and Recording Server (Online/offline)
Recording Servers 72/128 CH/Server

XRP Recorders XRP-4310DB4 and XRP-4210B4


4. SSM Appliance Product Group comparison

360 Channel PC NVR 128 Channel PC NVR


Model name PRO-7510B4 PRO-7310B6

Design

120 days storage requirement : Qatar , Kuwait (MOI)


regulation)
Request country UAE, KSA, OMAN, Bahrain
Qatar : 1.3M 15 fps, 120 days, H264/265
Kuwait : 3M 15 fps, 120 days, H264/265
Wisenet Viewer
New Launch Wisenet Viewer
EMAP Tools
AUTO CAD REVIT PLUGIN
ONVIF
ONVIF – Working Group Member
• Hanwha Techwin is a key member of the Technical Committee to enhance and update ONVIF specifications
• All Hanwha Techwin Cameras, encoders, & NVRs are ONVIF compatible
• No configuration necessary to enable ONVIF, single user database.
• ONVIF allows easy interoperation between manufactures of IP Video products
ONVIF – Working Group Member

ONVIF PROFILES KEY FEATURES


ONVIF S , 2011 • Video & audio streaming
• Pan-tilt-zoom control & relay output (conditional feature)
• Video configuration & multicast
ONVIF G , 2014 • Configure, request and control recording
• Receive audio and metadata stream
ONVIF Q ,2016 • Easy setup • Discovery, configuration and control of conformant devices
ONVIF T ,2017 • H.264 and H.265 video compression
• HTTPS for secure streaming
• Imaging settings
• Alarm events
• Digital input and relay output
• Bidirectional audio
ONVIF M, 2020 • Analytics configuration and information query for metadata
• Configuration and streaming of metadata
• Generic object classification support
• Metadata definition for geolocation, vehicle, license plate, human face and body
• Event handling interfaces for object counter, face and license plate recognition analytics a
nd for sending • ONVIF events in JSON format over MQTT
• Rule configuration for events
How To Check ONVIF –
Demonstration Via ONVIF.Org
ONVIF – Device
ONVIF – Client
CyberSecurity
The threat is
real
Introduction – CCTV Hacking ripped from the headlines
Ease of Accessing
Devices
Live Demo of Online Vulnerable Devices &
Default Password

Source: https://www.shodan.io/
Secured by Design
Strategy
■ What Method Most Used for Hacking ?
- Backdoor
- Manufacturer (hard coding)
- User
- Remote Service(telenet, SSH)
- Weak Password Policy
- Non-used Port open
- Firmware Encryption(rooting)
- Buffer Overflow
■ What Threats could be occurred ?
- Malware Infection
- Data Forgery
- Data Capturing
- Device Manipulation
- System Halt and/or Shutdown
- Admin Authority Seizure
- DDOS Attack
Strategy

• Defense in Depth
• A strategy where you have multiple concentric rings of security that
build on each other, whereby a breach or vulnerability in one layer does
not leave you defenseless.
Device Security Firmware Updates
•Cameras
•NVR/VMS/Client
Segregated software
Networks
Closing unneeded
VLANs ports

Firewall Access
Control/Physical
Access to devices
Intrusion
Detection System
Security by Design

User Credential Protection Video Data Protection Firmware / Filesystem Protection


Strong Password Policy
• If an incorrect username & password is given more than 5 times within 30 seconds, the camera will lock down access
to the web page to prevent someone from repeatedly trying to guess the password. Existing authenticated video stream
connections will continue.
• All passwords are sent using digest authentication to prevent clear-text passwords from being transmitted over the
network

Password Policy
• Minimum length of 8 characters

• Password cannot be the same as the username

• No more than 3 consecutive or qwerty sequential characters


• Ex: (1234,abcd, 4231, dcba)

• No more than 3 repeated characters


• Ex: (!!!!,1111, aaaa)

• Must have a combination of 3 out of the following 4


• At least 1 uppercase alphabet
• At least 1 lowercase alphabet
• At least 1 numbers
• At least 1 special character
Comparison of password policy strength
Upgrade Firmware
• Make sure firmware and VMS software is up to date to ensure any fixes or new daemon software is used, in case of
any known vulnerabilities
• Firmware can be checked, downloaded & updated in bulk, both online or offline using Device Manager
• Include firmware updates as part of your installation service (initial, 6 months, 1year out), then as RMR
• Firmware files should be encrypted to prevent hackers from gaining valuable info about file structure, files, databases,
etc.. Often hackers can discover a vulnerability simply by examining extracted firmware without access to the
device
Certificate Based Communication
Implementation of certificate based communication ensures that the device endpoints you
are speaking to are not only secure but valid devices on your network

SSL/TLS:
802.1x
SSL/TLS:
Explained
802.1x Authentication
(Web Browser
(EAP,LEAP)
(EMAIL)and API)
Request Network Access
LAN Network Devices
Client (Supplicant)
Client can now access LAN

Validates & allows network access

Sends authentication

Request authentication Forwards authentication


Authenticator Authentication Server
Switch
Access Point
Check device logs

• Hanwha products have extensive


logs. Check them to see if anyone
is trying to gain access to your
devices or has changed settings.
• Logs are retained during reboot
and factory default.
IP Filtering
We can allow or deny access to Hanwha Techwin products by specifying specific addresses
or subnets to access these devices
Security by Obscurity
This type of strategy recommends that default ports for specific protocols should be change
to make it harder for possible attackers to exploit specific ports.

Hanwha Techwin surveillance products allow you to change all ports on the device

Protocol Default Port Editable


HTTP 80 YES
HTTPS 443 YES
RTSP 554 YES
VLANs

This isolates your


VLANs segregate your cameras from your
network based upon printers, e-mail
ports, protocols, MAC servers, workstations,
addresses, port etc.., and only gives
switches, etc.. access to those who
need access.

This can also prevent


problems from
Allocate bandwidth,
devices broadcasting
priority based on
or babbling and
VLANs.
effecting other
devices.
Physical Access

• Physical Access is paramount. If you can touch a camera, you can factory default it, and
then do what you want with it.
• It is best if your cameras are high up, out of reach, or flush mounted in the ceiling or a
housing.
• Make sure your NVRs and switches are in a locked area.
• Make sure the network and power cables going to cameras are secure. If someone can
reach up and cut them, it is not secure.
Tampering & NW Disconnection Detection Analytics

Tampering Detection Analytic


• Use the tampering analytic to alert you that something has happened to a camera.

Network Disconnection Detection Analytic


• If your camera is powered with low voltage, it can detect a physical network
disconnection and start recording to SD card.
• Prevent someone from nefariously taking down network to prevent video recording.
Physically Separating the Security Network
• Decrease your security risk by keeping as many devices “offline” as possible
• Most NVRs have multiple network ports
• This allows you to have a camera port and a client port
• This makes sure that “Bob in Accounting” CAN NOT access the cameras, because there is no network path
• All access is through the NVR
• SSM can access camera streams via NVR


Port Forwarding

When you provide remote access, use port forwarding, and not
UPnP.

Only forward necessary ports, such as NVR as opposed to each


camera.

If you are using another mechanism for remote access, such as


VPN, do not forward the cameras through the router/firewall.
Edge Recording

• Even if you are not recording at the edge, you can still use edge recording as a backup, in case the
network or recorder has problems, but the camera still has power.
• Consider putting small, low cost SD cards in each camera, as a value add.
• SV/SSM can easily connect to a camera to review/retrieve the video.
• This also alleviates fears of someone deleting/formatting the hard drives on the recorder.
• Many thieves have torched or taken DVRs so there would not be any CCTV evidence. They don’t think
to take or destroy every camera… it would take too long….
Use VPNs to allow remote access

• Use VPNs (hardware or software) to connect clients or remote sites without opening ports to the
external world.
Keep video in the proprietary format
• Many people dislike proprietary formats – they don’t want to install viewer, or run
programs, or be stuck on one OS. However, this allows the video to be verified using the
built-in watermarking. Without this, the video may not hold up in court.
• This is usually why you invested in a CCTV system in the first place.
Next Level Cybersecurity

189
Recorders & Application
What is NVR vs VMS

64 Channel VMS
NVR NVR

DB
DATABASE
Server

Rec
Combined

RECORDING 128 to 300


Server Channel
CLIENT
Client
16 Channel NVR
Machine
Embedded NVR

EMBEDDED NVR BENEFITS


• No camera license fees for Recording
• Supports ONVIF
• Off the shelf, user-replaceable HDDs
• Monitor/Mouse/Joystick driven menus with HDMI & VGA output
• Many models with built-in PoE+ Switch for easy and quick setup
• Easy setup wizard GUI
• Easy camera setup & device webpage access
• Hotswap RAID supported on many models
• Compact design
• For LINUX : Low maintenance with No Windows Updates, Anti Virus updates, Windows Licensing
• Easy to secure cameras with a segregated network – NVRs have multiple NICs
Differences of storage servers

SL DESCRIPTION Linux Windows

1 OS Linux OS Windows Standard or Server OS

With current improvements, Windows


2 Stability Good since beginning
are similar
Important to keep up with security up
3 Windows Upgrades Not required
dates
Yes, supports Dual PSU , Redundan
4 Redundancy & Failover Yes, same
t Fans
Error free as it is pre configured an
Subject to compatibility and usually g
d pre installed software and less k
5 Setting up uides are provided by each vendor to
nowledge required about windows
size the server as per the load
servers

6 Purpose Built Dedicated for CCTV only Best of Breed option

193
Differences
SL DESCRIPTION Linux Windows
Future flexibility &
7 Depends on the vendor Easily migration friendly
Upgrades
New Product Featur
8 es & New integratio Longer Development cycle Faster development cycle
ns

9 Repurpose No Yes

10 Cost Cheaper 2 times to 3 times the price of NVR

Usually minimum spec however no


Performance and Ha Usually High spec and allows for enha
11 unnecessary applications are runni
rdware ncements in the future
ng so it is designed just right

E.g.: 8 GB RAM, i5 or less 16 GB or 32GB RAM, Xeon processors

12 Storage expansion Yes yes


194
DAS vs NAS vs SAN

RECORDERS & APPLICATION


vs vs
Direct Attached Storage (DAS) Network Attached Storage Storage Area Networks
(NAS) (SANs)

Open source images - unsplash


Title of section

Networking
Networking Basics in CCTV – IP Tools

• tracert
From command prompt
• tracert
• Traces the route through the Layer 3 network
• Reveals the router addresses on the route
• * indicates no ping reply – security feature
Useful wireshark practices
1. Always select single interface in a Capturing Options dialog(Gear Icon/ Ctrl+K).
Wireshark might hang if you select all of them.
2. Ensure that selected interface is one you need. At screenshot below the en0 is
selected because cameras are in 192.168.178.0/24 subnet.
3. To reduce RAM usage and filtering efforts later try to use capturing filters when
applicable. Screenshot example will filter packets to and from ports 80 and 554 for
the certain ip address only.
1. For longer capturing sessions always use “Capture to a permanent file” option
from the “Output” section. If you don’t do that Wireshark will very likely hang
after free RAM depletion.
2. It might be very convenient to create a new file once in a while. Thus you won’t
have to go through the huge one during the investigation later.
By default wireshark shows packets with the “since beginning of capture” time marker.
For the convenience it might be changed in “View”-> Time Display Format. E.g. to Time
of Day
Display Filter
Show only traffic in the LAN (192.168.x.x), between workstations and servers -- no
Internet:

Show traffic related only to certain protocols:


TCP Sessions contain A LOT of interesting data:
tcpdump - a headless analog for wireshark

1. tcpdump requires sudo privileges to sniff traffic at the interface


2. -i option allows to specify an interface
3. tcpdump allows filtering of the captured data with same logical
constructions as wireshark.
4. -w option allows to save captured data to the file to be open later with GUI
for extra troubleshooting

Example:

sudo tcpdump -i eth0 host example.org and (port 80 or port 554) -w test.pcapng

The above command sniffs all traffic between interface eth0 of inspected PC and ports 80,
554 of example.org and saves it to test.pcapng. This extension is native for wireshark.
Basics of Networking in CCTV – What is Network

2 or more intelligent devices connected by a medium to


share information

Cable
Processing Wireless
Light
Networking Basics in CCTV – how to Check and set up IP address for a
camera

• Live demonstration
Basics of Networking in CCTV

OSI TCP-IP
Open Systems Interconnect Transport control Protocol-Internet
Protocol

Application

Presentation Application

Session

Transport Transport

Network Internet

Data Link Network Access

Physical Physical
• L1 – Physical Devices

Cables
Radio
Repeaters
Hubs
Racks
Patch Panels

© 2020 Hanwha Techwin Co. Ltd. All rights reserved.


• PoE – Power over Ethernet

Power over Ethernet


Using spare pairs (100Mbps)
48V
IEEE 802.3af: PoE 15W
PoE+ 30W
Phantom power
Midspan repeaters

DC+ DC-
© 2020 Hanwha Techwin Co. Ltd. All rights reserved.
• Fiber

CAT6 Optical FiberFiber


Optical
Up to
Up20tokm
20 km

CAT6
Greater distance
Network
Lightning/EMI protection
Bitrate/Performance
© 2020 Hanwha Techwin Co. Ltd. All rights reserved.
Why use Retrofit Solutions like Coax and UTP

12 VDC
PoE Switch
Remote Device Local Device
PSE

IP CAMERA COAX or UTP


PD

24 VAC PoE Negotiation


Why Extended Distance Ethernet

• Provide PoE to remote device(s) without local power

• Go beyond IEEE standard 100m distance

• Avoid adding a switch

• Make use of existing infrastructure and IDF location


Ethernet over coax/UTP
Applications

• Analog to IP camera upgrade


• Less expensive via existing cable
• Quicker deployment
• Extend PoE to locations without power
• Cheaper to run CAT6 cable vs CAT6 and Power

• Unable to pull CAT6 cable


• Elevators
• Historic structures
• Correctional market
• Hospitals
• Casinos
• Industrial locations
• Runs greater than 100m
•Layer 2 – Data Link Layer

© 2020 Hanwha Techwin Co. Ltd. All rights reserved.


• L2

192.168.10.12
00-40-84-00-00-A1
192.168.10.11
98-E7-43-00-00-01

2
1
192.168.10.13
Switch 3 00-40-84-00-C7-09
5 4

192.168.10.15 192.168.10.14
00-40-84-AB-50-7A 00-40-84-00-70-7D

© 2020 Hanwha Techwin Co. Ltd. All rights reserved.


• MAC Address

© 2020 Hanwha Techwin Co. Ltd. All rights reserved.


• Routing

© 2020 Hanwha Techwin Co. Ltd. All rights reserved.


• VLAN

Virtual Local Area Network

• Breaks up switches into smaller LANs


• Controlled by MAC address or switch port numbers
• Explained in greater detail on a future IP course

© 2020 Hanwha Techwin Co. Ltd. All rights reserved.


Networking Basics in CCTV – VLAN

This isolates your


VLANs segregate your cameras from your
network based upon printers, e-mail
ports, protocols, MAC servers, workstations,
addresses, port etc., and only gives
switches, etc. access to those who
need access.

This can also prevent


problems from
Allocate bandwidth,
devices broadcasting
priority based on
or babbling and
VLANs.
effecting other
devices.
•Layer 3 - Network

© 2020 Hanwha Techwin Co. Ltd. All rights reserved.


• Layer 3 Devices

Router L3 Switch
• Operates at L3 - IP • Operates at L3 - IP
• Connects Ethernet to different media • Operates as a Router and a switch
based network • Routes on Ethernet only
• Example: WiFi, Cable
• Cheap and ubiquitous

© 2020 Hanwha Techwin Co. Ltd. All rights reserved.


• Routing

Extract destination address


Calculate destination network

1. Direct route
2. Indirect route
3. Default route
4. Network unreachable

© 2020 Hanwha Techwin Co. Ltd. All rights reserved.


• Summary of Basic IP Networking

Networks work in layers Layer 3 is where logical addressing takes place


OSI contains 7 Layers IP Addressing
IP contains 4 layers Devices at Layer 3
Layer 1 is physical tangible elements of the network Layer 3 Switch
Cabling Router
Hubs Layer 4 is where the type of communication occurs
Repeaters TCP – for accurate communication
Layer 2 is the first Layer with intelligence UDP – for fast communication
Directs packets to destinations
Devices at Layer 2
Bridge
Switch

© 2020 Hanwha Techwin Co. Ltd. All rights reserved.


Title of section

Day 4
What is VMS Video Management System?

VMS – Video management system is a vendor agnostic software for CCTV to record, view and manage
multiple surveillance cameras or NVRs . The cameras can be in a single location or across different locations.
VMS is often integrated to other security applications such as Access Control , Analytics, Intrusion etc..

Reasons to choose VMS:


Customer prefers to use his own hardware like Dell/HP Blade Servers
Centralized management of Live view and Recording from multiple NVRs
Central Synchronized playback of video for investigation
Central Integrated Alarm Management
Integration to 3rd party systems like Access Control
Central Unified Mapping Interface for CCTV and Doors
Centralized management of Back up
(subjective)Video wall Solutions Large Monitor Wall Management.
Typical VMS Schematic
Command and Control Room

Camera x 100’s of cameras


Video Wall

3rd party system


integration
SSM Console

Recording Servers

...
5 Guard Room Operators Workstations
A VMS with Multiple NVRS/ Recorders
Recorder Camera

Switch Switch Floor 15-20

Camera Recorder

Recoder Camera
Floor 5-10 Switch Switch Site Wide Monitoring

Camera Recorder
LAN
Recorder Camera

Floor 10-15 Switch Switch Parking Building


Camera Recorder

Switch Switch

VMS CENTRAL SERVER Switch

233
Core Server
VMS CENTRAL SERVER is ALSO CALLED CORE SERVER
VMS With Integration

Integrated to SSM VMS (License free)


VMS With Integration
UNIFIED MAPPING IN SSM VMS

Unlock/Lock
From VMS-SSM
Title of section

Live Demo of VMS Operational


Functions
• General Monitoring
• Alarm Events
• Reporting
• Integration
Title of section

RAID & Storage Redundancies


Redundant Array of Independent Disks
RAID

• What is the RAID Usable storage and RAW Storage

• If system can be recorded to HDD 1unit data/sec

RAID system with 2 HDDs Normal system with single HDD


- Can record 10 units during 5 sec - Can record 5 units during 5 sec

5s 5s
9 10 5
4s 4s
7 8 4
3s 3s
5 6 3
2s 2s
3 4 2
1s 1s
1 2 1

RAID system can record more data during same time than using single HDD
RAID
• What is the RAID
• Simple step for saving data on your RAID system

Not-used

Usable area

HDD1 HDD2 HDD3 HDD1 HDD2 HDD3


(2TB) (500GB) (1TB) (500GB) (500GB) (500GB)

1 2 Normalize

3 4

Cut HDDs’ usable area to unit size


Save your data!
Level of RAID | RAID 0

Performance HDD usage


Min. # of HDDs Redundancy
Read(Normal) Write(Normal) Read(Error) Write(Error)
efficiency

2 N/A High High N/A N/A 100%

RAID 0
Step 1. Cut your data into unit sized pieces
Step 2. Save unit data onto each HDDs in rotation [Example of RAID 0]

7 8

Feature 5 6

• No HDDs for redundancy : If some error occurs on 3 4

specific HDD, you are unable to resuscitate your data. 1 2


Level of RAID | RAID 1

• Mirroring System
Performance HDD usage
Min. # of HDDs Redundancy
Read(Normal) Write(Normal) Read(Error) Write(Error)
efficiency

2 Half # of HDDs High Middle Middle High 50%

RAID 1
Step 1. Cut your data into unit sized pieces
Step 2. Save unit data onto HDD [Example of RAID 1]

Step 3. Copy your saving data to other HDD


4 4

Feature 3 3

• 2 HDDs make a single array. 2 2

• Half number of HDDs used for redundancy. 1 1

• If you organize total 4TB HDDs for RAID, ONLY you


can save maximum 2TB size data on your RAID
system.
Level of RAID | RAID 5

• Mirroring System
Performance HDD usage
Min. # of HDDs Redundancy
Read(Normal) Write(Normal) Read(Error) Write(Error)
efficiency

3 1 HDD High Low Low Low 67~94%

RAID 5 [Example of RAID 5]

Step 1. Cut your data into unit sized pieces Ap


A1 A2 A3
Step 2. Save unit data onto each HDDs in rotation B3
B1 B2 Bp
Step 3. Make a parity unit data and save that onto each HDDs
C1 Cp C2 C3
in rotation
Dp D1 D2 D3
Feature
• Parity unit has information of other unit data.
(Ex) From example fig., Ap has information of A1, A2 and A3

• Some parts of each HDDs used for redundancy.


(You can resuscitate only 1 HDD from error situation.)
Level of RAID | RAID 6

• Mirroring System
Performance HDD usage
Min. # of HDDs Redundancy
Read(Normal) Write(Normal) Read(Error) Write(Error)
efficiency

4 2 HDDs High Low Low Low 50~88%

RAID 6 [Example of RAID 6]

Step 1. Cut your data into unit sized pieces


A1 A2 A3 Ap Aq
Step 2. Save unit data onto each HDDs in rotation B1 B2 Bp Bq B3
Step 3. Make a parity unit data and save that onto each C1 Cp Cq C2 C3
HDDs in rotation Dp Dq D1 D2 D3

Step 4. One more Step 3! Eq E1 E2 E3 Ep

Feature
• Parity unit has information of other unit data.
(Ex) From example fig., Ap has information of A1, A2 and A3

• There are 2 parity units for same information.


• Some parts of each HDDs used for redundancy.
(You can resuscitate only 2 HDD from error situation.)
Calculation Guide
Calculation Guide | Caution

• The RAID Storage Calculation Guide is a method for calculating reference


values.
• There may be differences between the calculated storage size and the
actual available capacity by the system usage and other reserved capacity.
How to calculate

• Check the environment


1. Specification of Recorder
2. Storage size of each HDDs
3. Used level of RAID
• Calculation
1. Normalizing
2. Calculation
How to calculate

• Specification of Recorder
– Check Point : Supported level, HDD array limitation and other limitation

Supported level of RAID

HDD Array condition for using RAID


How to calculate
• Storage Normalizing

Dead Space

The smallest HDD

Base Line for


normalizing

Normalize
HDD#1 HDD#2 HDD#3 HDD#4 HDD#5
2TB
500GB 500GB 500GB
1TB 500GB
1TB 2TB
500GB

– In order to configure RAID, the system proceeds to normalize the size of the hard disk you use.
• If all HDDs are the same size, this step is ignored.
– Normalize all HDD sizes based on the smallest HDD.
• Capacity remaining on the HDD is discarded after normalizing.
• [TIP] To minimize wasted capacity, It recommend configuring RAID with HDDs of the same size.
How to calculate

• Check the used level of RAID for considering storage size of parity unit or other
redundancy.

If <N> HDDs are ready for RAID system

𝑁
– RAID 1 : Use half of HDDs ( ) for redundancy
2
𝑁
• Use half of HDDs ( ) for recording
2

– RAID 5 : Use 1 HDD for storing parity unit


• Use (𝑁 − 1) HDDs for recording

– RAID 6 : Use 2 HDDs for storing parity unit


• Use (𝑁 − 2) HDDs for recording
How to calculate

• Formula

After normalizing
Storage Single Total No. No. of HDDs
Size HDD Size of HDDs for Parity unit
Or redundancy unit
Let’s Calculate

• Example #01

• Condition
– Used Level of RAID : RAID 5
– HDD Info.
• Total 6ea 8TB HDDs are used

No. of HDDs for Parity


unit or redundancy
• Calculation Total no. of HDDs

Single HDD size


after normalizing

40𝑇𝐵 = 8𝑇𝐵 × (6 − 1)
Let’s Calculate

• Example #02
• Condition
– Used Level of RAID : RAID 6
– HDD Info.
• Total 6ea 8TB HDDs are used
No. of HDDs for Parity
Total no. of HDDs unit or redundancy
• Calculation
Single HDD size
after normalizing

32𝑇𝐵 = 8𝑇𝐵 × (6 − 2)
Let’s Calculate

• Example #03
• Condition
– Used Level of RAID : RAID 1
– HDD Info.
• Total 6ea 8TB HDDs are used
No. of HDDs for Parity
Total no. of HDDs unit or redundancy
• Calculation
Single HDD size
after normalizing

24𝑇𝐵 = 8𝑇𝐵 × (6 − 3)
Let’s Calculate

• Example #04
• Condition
– Used Level of RAID : RAID 5
– HDD Info.
• Total 6ea are used
– 10TB HDD : 3EA
– 5TB HDD : 1EA
No. of HDDs for Parity
– 8TB HDD : 2EA Total no. of HDDs unit or redundancy

• Calculation
Single HDD size
after normalizing

25𝑇𝐵 = 5𝑇𝐵 × (6 − 1)
Let’s Calculate

• Example #05
• Condition
– Used Level of RAID : RAID 1
– HDD Info.
• Total 6ea are used
– 10TB HDD : 3EA
– 5TB HDD : 1EA
No. of HDDs for Parity
– 8TB HDD : 2EA Total no. of HDDs unit or redundancy

• Calculation
Single HDD size
after normalizing

15𝑇𝐵 = 5𝑇𝐵 × (6 − 3)
Live Demo of Storage Tools –
Wisenet Toolbox Plus
Control Room Monitors
Video Wall Considerations
Virtual Matrix Decoder for 16 monitors

Each connected to
4 monitors
Virtual Matrix Decoder Option

Virtual Matrix Decoder for 48 monitors

Up to 48 wall monitors, 12 Virtual Matrix Decoder licenses, One server for Virtual Matrix Gateway S/W (Free)

4 48 monitors

Monitors Video Wall

Virtual Matrix Decoder + Virtual Matrix Decoder Server Recommended Spec

Virtual Matrix Gateway SSW-VD10L/EX : 1ea / server

VMM
Virtual Matrix Manager

Performance Monitor HD, 30fps – CUDA option CIF, 30fps – CUDA option
simulation
per decoder Up to 4 monitors 1 monitor 27CH, 4 monitor 25CH 1 monitor 28CH, 4 monitor 26CH

260
Virtual Wall Merge
User can merge several monitors and make virtual screen division

[ Merge Mode ]
1x2, 2x1, 2x2, 2x3, 2x4, 2x5, 3x2, 3x3, 3x4,
3x5, 4x2, 4x3, 4x4, 5x3, 5x2

< Example >

NEW PICTURE
TBA
Video Wall Considerations

• Operators
• Two Types of Tasks
• Task 1 - Just monitoring – no intervention until incident
• Example areas of high traffic public areas where lot of movement is expected.
• Task 2 – Alerts, Alarms received – Immediate action involved
• Back office areas , emergency exits etc. where after notification
• Continuous monitoring required
• May not be required – if it is non threat personnel.
• Response action requires time and focus so additional staffing is required to manage the situation when the
operator is busy

• Operator efficiency
• Low Intensity Monitoring – 50 to 75% performance
• 3 Hours at a time with multiple breaks. Total 6 hours per day.
• Breaks may be replaced with a non-visual display tasks like Logs, or physical guard tour
• Longer than 5 mins breaks is required to ensure continued efficiency to relax.
• Breaks should be taken before fatigue happens
• High Intensity Monitoring – 100% performance
• 20 mins -30 mins with 5 mins break to maintain attention
• Example baggage scanning requires 100% attention have operators shifting every 20 mins.
Video Wall Considerations

• Use of analytics may be used to enhance attention and detection and Not necessarily to
reduce the operators in the room monitoring critical areas.
• Number of monitors per Operator , depending on the task type performed on the monitors.
• High Movement areas ( airports) up to 12 images ( NOT 12 x monitors) at a time ( critical areas)
• Less movement areas (outdoor, on working times) – up to 16 images at a time ( general views)
• Less movement areas with analytics – up to 25 to 40 images per operator
• This is a general consideration only.

No. of Detection
monitors score
4 74%

6 58%

9 53%
Scene
• Note: if the operators are not trained or no experience, then they will take longer detection time
Detection Identify Response Decision within in Result : How many
AREA Each scene
Time time Time Seconds Scene he can see
Emergency Exits 2 2 20 60 10
If the same entrance has two camera with
two angles in the same area , it is still
Main Entrances 2 1 20 30 4
considered as one scene. It is good to be in
the same screen.
Parking Areas 2 10 20 60 4 Each scene can be a an entire parking area
General
2 2 20 60 10
Monitoring
IF analytics , reduces detection time
General
0 2 20 60 20
Monitoring
Scene

• A scene is a logical and meaningful set of related and coherent images and other visual information, to
be monitored with a specific aim. A ‘scene’ is likely to exhibit the following features:
• – the visual information is coherent
• – a scene consists of one or multiple images, and may also include other types of information (such as
process data).
• – all images of the same task related observed reality are considered to be one scene

Multiple images per scene One image per scene


Grouping

Where multiple CCTV images are viewed, either in parallel or sequentially, they should be
organized in accordance with the task being undertaken.
No. of cameras per Monitor as per SIRA (2018 eg.)
Visual Field of View

Near Peripheral does not require eye


movement (recommended, to be used
whenever possible)
II. Mid Peripheral requires eye movement
(acceptable, may be used if area A cannot be
used)
III. Far peripheral requires head and/or body
movement (should not be used for primary
equipment)

Image from Wikipedia


Take Away

• For ONE operator viewing, if the control room monitor is having more than one or two
monitors, then it should fit within his visual view to DETECT without turning his head.
• So in order to fit within his view, he should reduce the monitor size.

Example : one operator can see 2 x 42 inch monitors in two rows

• If the Operator is far from the monitors, then he should consider using larger monitors
• Example 46 inch monitors can have a viewing distance of 3 meters then the width of the control
room can be up to 4 monitors in two rows.
Cameras per monitor
Pixel per image(H)

FHD Monitor 4K Monitor


Monitor inch diagonal Width in Cm H in cm Tile Horizontal Layout Total Cameras 1920 3840
24 53 40 4 4x4 16 480 960
32 71 40 4 4x4 16 480 960
32 71 40 5 5x5 25 384 768
42 93 52 4 4x4 16 480 960
42 93 52 5 5x5 25 384 768
42 93 52 6 6x6 36 320 640
42 93 52 7 7x7 49 275 549
46 102 57 8 8x8 64 240 480
48 106 60 8 8x8 64 240 480
50 111 62 8 8x8 64 240 480
55 122 68 9 9x9 81 214 427
60 133 75 10 10 x 10 100 192 384
80 177 100 13 13 x 13 169 148 296
Monitor Quantity Estimation per Control Room

Total Cameras in project 500 Choose Critical % 15%


Critical Cameras 15%
critical 75
Less Critical 425
Choose layout Cameras Every X Cameras per
view Displayed seconds Sequences Min No. of Monitors
Fixed View 5x5 25 NA None 25 3
Sequencing 5x5 25 10 6 150 3
Total reqd. Monitors 6
Total Cameras 525
Viewing Distance - Demonstration

PIXEL 1 PIXEL 2

it is assumed that the human eye will just be able to see a 1 mm gap
between two black dots at a white background, at 3.4 m distance (= one
minute of arc).
Viewing Distance - Demonstration

FHD MONITOR 4K MONITOR


Viewing distance
Monitor inch diagonal Width in Cm H in cm Viewing distance min.
min.

42 93 52 1.7 Meters 0.85 Meters


42 93 52 1.7 Meters 0.85 Meters
42 93 52 1.7 Meters 0.85 Meters
42 93 52 1.7 Meters 0.85 Meters
46 102 57 3.4 Meters 1.2 Meters
48 106 60 3.4 Meters 1.2 Meters
50 111 62 3.4 Meters 1.2 Meters
55 122 68 3.4 Meters 1.2 Meters
60 133 75 3.4 Meters 1.7 Meters
80 177 100 3.4 Meters 1.7 Meters
Basics of Networking in CCTV – Multicast vs Unicast
Networking Basics in CCTV – Port Forwarding

WAN LAN

192.166.1.70:8080

192.166.1.50:8080

192.166.1.60:8080

Access from WAN


10.10.1.5:8080192.166.1.50:8080
Protocol Default Port Editable
HTTP 80 YES

HTTPS 443 YES

RTSP 554 YES


Basics of Networking in CCTV – Port Mapping
Basics of Networking in CCTV – Ports Used
Basics of Networking in CCTV - Ports
Basics of Networking in CCTV – Port Forwarding
Basics of Networking in CCTV – Port Forwarding
Basics of Networking in CCTV - DDNS
Basics of Networking in CCTV
Basics of Networking in CCTV
Basics of Networking in CCTV
Basics of Networking in CCTV
Basics of Networking in CCTV
Basics of Networking in CCTV
First – Register for DDNS Service , Second – Setting the DDNS Setting on the device
Basics of Networking in CCTV – P2P

P2P Server

Mobile
End of Class

You might also like