You are on page 1of 14

HOW CCTV WORK

CCTV, or closed-circuit television, is a system that allows video surveillance and


monitoring of a specific area or location. It typically involves several components
working together to capture, transmit, and display video footage. Here's a general
overview of how CCTV works:

1. Cameras: CCTV systems consist of one or more cameras strategically placed to


cover the desired area. These cameras capture video footage continuously or
triggered by motion or specific events.
2. Video Transmission: The captured video signals are transmitted from the cameras
to a central location or a recording device. This can be done through wired
connections (such as coaxial cables or Ethernet cables) or wireless transmission
methods (such as Wi-Fi or cellular networks).
3. Recording and Storage: The transmitted video signals are recorded and stored for
later retrieval. This is typically done using a digital video recorder (DVR),
network video recorder (NVR), or cloud-based storage system. The recorded
footage can be stored locally or remotely, depending on the system setup.
4. Monitoring and Control: The recorded or live video footage can be monitored and
controlled from a central location, such as a security control room or a computer
workstation. Monitoring can be done in real-time to detect any security incidents
or suspicious activities.
5. Display: The video footage from the CCTV cameras can be displayed on monitors
or screens for viewing by security personnel. Multiple camera feeds can be
displayed simultaneously using split-screen or switching techniques.
6. Playback and Analysis: When required, the recorded footage can be retrieved and
played back for analysis or investigation purposes. This allows for reviewing past
events or incidents.
7. Additional Features: Modern CCTV systems may have additional features and
capabilities, such as motion detection, facial recognition, infrared night vision,
pan-tilt-zoom (PTZ) functionality, and integration with other security systems like
alarms or access control.

It's important to note that there are various types of CCTV systems available,
ranging from small-scale setups for homes and businesses to large-scale installations for
cities or public areas. The specific configuration and functionality may vary based on the
system's requirements and intended use.

MEANING OF CCTV

Closed-circuit television (CCTV) stands for a TV system where signals are


transmitted and monitored primarily for video surveillance and security purposes. CCTV
systems are not publicly distributed but are monitored through cameras strategically
placed to observe specific areas. These cameras communicate with monitors or video
recorders through private coaxial cable runs or wireless links, limiting access to the
content to those authorized to view it. CCTV is commonly used for various applications
such as maintaining perimeter security, observing behavior in medical facilities, traffic
monitoring, overseeing hazardous environments, ensuring building and grounds security,
and obtaining visual records for security purposes in different settings like banks, casinos,
and airports. The technology is increasingly utilized in law enforcement for tasks ranging
from traffic observation to monitoring high-crime areas, raising privacy concerns in some
regions where it has become a routine part of police procedures.

ACCESS CONTROL SYSTEM

An Access Control System is a security setup that regulates entry and exit to a
premises by allowing only authorized individuals access. It comprises various
components like locks, readers, sensors, and controllers to manage access securely. Here's
a breakdown of the key elements and how they work together:

Components:
 >Magnetic Lock: A locking device that secures doors and releases upon
authorization.
 >Access Control Reader: Verifies credentials like key cards, biometrics, or PIN
codes.
 >Exit Push Button: Allows individuals to exit the premises.
 >Connecting Wires: Connect various components for seamless operation.

Operation:

1. Credential Verification: Authorized individuals present their credentials to the


access control reader.
2. Access Granting: Upon successful verification, the system triggers the release
mechanism to unlock the door.
3. Logging: Each entry attempt is recorded for security monitoring.

Wiring and Connections:

 >IP Access Control Systems: Utilize network-based setups for easier installation.
 >Reader-Controllers: Connect to the network using PoE and link to electric locks,
sensors, and other devices at the door.
 >Relay Circuit: Controls the power supply to the locking mechanism based on
authorization.
 >Magnetic Locks: Require power supply and ground connections for operation.
 >Fail-Safe vs. Fail-Secure Locks: Determine the locking behavior based on power
status.
 Flexibility and Security:
 >Different Configurations: Systems can support various readers like RFID,
biometric, or smartphone-based.
 >Internal vs. External Doors: Systems can be tailored for different door types.
 >Enhanced Security: Intelligent controllers inside doors provide added security
against vandalism.
 >Power Requirements: Magnetic locks and high-power devices may need
additional power supplies.

HOW TO CONNECT THE DVR SIDE CONNECTION

To connect the DVR (Digital Video Recorder) side connections in a typical CCTV
system, you will need to follow these steps:

1. Power Connection: Start by connecting the power supply to the DVR. Most DVRs
come with a power adapter that needs to be plugged into a power outlet. Ensure that
you have a reliable power source for the DVR.
2. Video Input: Connect the CCTV cameras to the DVR using appropriate cables. The
type of cable will depend on the camera and DVR specifications. The most common
types of cables used are coaxial cables (such as RG59 or RG6) or Ethernet cables (for
IP cameras). Each camera should have a dedicated video input port on the DVR.

For coaxial cables:

- Attach one end of the coaxial cable to the video output port on the camera.

- Connect the other end of the coaxial cable to the corresponding video input port on
the DVR.
For Ethernet cables:

- Plug one end of the Ethernet cable into the network port on the IP camera.

- Connect the other end of the Ethernet cable to an available network port on the DVR.

3. Audio Input (if applicable): If your CCTV system includes audio recording, you may
need to connect the audio input sources (such as microphones) to the DVR. Check the
DVR specifications to identify the audio input ports and use the appropriate cables to
connect the audio sources.

4. Video Output: Connect a display device, such as a monitor or TV, to the DVR to view
the video footage. Depending on the available ports on the DVR and the display device,
you can use HDMI, VGA, or other compatible video output connections. Connect one
end of the video cable to the video output port on the DVR and the other end to the
corresponding input port on the display device.

5. Network Connection: If you want to access the DVR remotely or connect it to a


network for additional functionalities, you'll need to establish a network connection.
Connect an Ethernet cable from the network port on the DVR to a router or network
switch. This enables the DVR to communicate with other devices on the network and
allows remote access through network-based applications or software.

TYPE OF CARD READERS FOR ACCESS CONTROL

1. MIFARE Card Readers:

MIFARE is a brand of contactless smart card technology developed by NXP


Semiconductors. MIFARE card readers are designed to read and interact with MIFARE
cards, which are based on radio frequency identification (RFID) technology. MIFARE
cards are widely used for access control, public transportation systems, and various other
applications.

MIFARE card readers operate in the high-frequency (HF) range (typically 13.56 MHz)
and use electromagnetic fields to communicate with MIFARE cards wirelessly. They
utilize a communication protocol called ISO/IEC 14443, which allows for secure data
transmission between the card reader and the MIFARE card.

MIFARE card readers generally require the card to be held within close proximity
(typically a few centimeters) to the reader for successful communication. This proximity-
based interaction makes them suitable for applications such as door access control, where
users can present their MIFARE card close to the reader to gain entry.

MIFARE cards can store data and are available in different memory capacities. They
often incorporate security features, including encryption and authentication mechanisms,
to ensure secure access control.

2. RFID Card Readers:

RFID (Radio Frequency Identification) card readers are designed to read and interact
with various types of RFID cards. RFID technology uses radio waves for wireless
communication between the card reader and the RFID card.

RFID card readers operate at different frequencies depending on the type of RFID card
being used. Common frequencies include low frequency (LF), high frequency (HF), and
ultra-high frequency (UHF). The specific frequency used determines the communication
range and data transfer speed.

RFID card readers are available in different form factors, including handheld devices,
fixed readers, and proximity readers. They can read RFID cards from a distance, ranging
from a few centimeters to several meters, depending on the frequency and power of the
reader.

RFID cards used with RFID card readers can store various types of information, such as
identification numbers or other data relevant to the application. RFID technology is
widely used in access control systems, inventory management, asset tracking, and more.

It's important to note that MIFARE is a specific technology within the broader category
of RFID. MIFARE card readers are designed specifically for MIFARE cards, while RFID
card readers can work with various types of RFID cards operating at different frequencies
and protocols.

When implementing an access control system, it's essential to choose the appropriate card
reader type based on compatibility with the cards being used and the specific
requirements of the application.

ACCESS CONTROL PANEL

Access control panels serve as the central hub of a building's security system,
facilitating communication between various security components like locks, readers, and
sensors. These panels play a crucial role in managing access, ensuring security, and
enabling seamless integration with other devices.

Access control panels are essential components in modern security systems,


providing centralized control, monitoring, and integration capabilities to ensure the safety
and security of buildings and facilities.

INTRODUCTION TO POINT TO POINT INTERNET

A Point-to-Point Internet connection, also known as P2P or PtP, is a private data


connection that links two or more locations exclusively for private data services. This
wireless internet solution is commonly used in settings like schools, large businesses,
hospitals, and apartment complexes, providing a secure wireless connection over large
areas. The connection is established from a central location, spreading across a wide area
using directional antennas to ensure reliable and fast wireless internet access throughout
the property. Point-to-Point connections are known for their ability to cover large rural
areas, create wireless coverage spanning miles, and simplify installation by eliminating
the need for physical cables. These connections are secure, as they operate within a
private network, avoiding public internet lines and offering a reliable and secure
connection suitable for businesses with sensitive information. Additionally, future
developments in Point-to-Point Internet may focus on energy efficiency and
sustainability, potentially incorporating solar-powered stations for remote installations.
TYPE OF RADIO USE IN POIN-TO-POINT CONNECTIVITY

The Ubiquiti Rocket M5, NanoStation M2, and PowerBeam M5 are all products
from Ubiquiti Networks that operate in the unlicensed radio frequency spectrum for
point-to-point (PtP) connectivity. They are part of Ubiquiti's airMAX series, designed for
outdoor wireless communication.

1. Ubiquiti Rocket M5: The Ubiquiti Rocket M5 is a high-performance wireless radio


designed for PtP and PtMP (point-to-multipoint) applications. It operates in the 5
GHz frequency band and supports the IEEE 802.11n wireless standard. The
Rocket M5 provides a robust and reliable wireless link with high throughput and
long-range capabilities.

2. Ubiquiti NanoStation M2: The Ubiquiti NanoStation M2 is a compact and cost-


effective wireless radio designed for PtP and PtMP applications. It operates in the
2.4 GHz frequency band and supports the IEEE 802.11n wireless standard. The
NanoStation M2 offers a balance of performance and affordability, making it
suitable for shorter-range PtP links.

3. Ubiquiti PowerBeam M5: The Ubiquiti PowerBeam M5 is a high-gain, dish-style


wireless radio designed for long-range PtP and PtMP applications. It operates in
the 5 GHz frequency band and supports the IEEE 802.11n wireless standard. The
PowerBeam M5 offers excellent signal strength, gain, and directional
performance, enabling long-distance wireless links.

All three devices mentioned above (Rocket M5, NanoStation M2, and PowerBeam
M5) are part of the Ubiquiti airMAX ecosystem, which provides advanced features like
airMAX TDMA, airView spectrum analysis, and airOS firmware for efficient network
management.
HOW TO INSTALL OR SETUP A POINT TO POINT LINK CONNECTING
PREMISES ONE TO TWO

To set up a point-to-point (PtP) link connecting two premises, such as connecting


Premises One to Premises Two, you will typically follow these steps:

1. Determine the Line of Sight (LOS): Ensure there is a clear line of sight between the
two premises where you want to establish the wireless link. Obstacles like buildings,
trees, or terrain can interfere with the signal, so it's important to have an unobstructed
LOS for optimal performance.

2. Select the PtP Equipment: Choose the appropriate PtP wireless equipment for your
requirements. This could include devices like Ubiquiti Rocket M5, NanoStation M2, or
PowerBeam M5, as mentioned earlier. Consider factors such as desired range, bandwidth
requirements, and budget when selecting the equipment.

3. Mount the PtP Devices: Install the PtP devices at each premises in suitable outdoor
locations. Ensure they are securely mounted and protected from environmental factors
like rain, moisture, and extreme temperatures. Follow the manufacturer's instructions for
proper installation and consider using mounting brackets or poles for optimal positioning.

4. Configure the PtP Devices: Access the configuration interface of each PtP device using
a web browser. Configure the wireless settings, such as the network name (SSID),
security settings (encryption), and IP addressing. Ensure that both devices are on the
same wireless channel and have compatible settings for seamless communication.

5. Align the PtP Devices: Use the signal strength indicators or alignment tools provided
by the PtP devices to align the antennas. Adjust the alignment and tilt of the antennas at
both premises to maximize the signal strength and optimize the link quality. This step is
crucial for achieving a stable and reliable PtP connection.

6. Test and Optimize the Link: Once the PtP link is established, test the connectivity and
perform speed tests to ensure the desired performance is achieved. Monitor the signal
strength, throughput, and latency to identify any potential issues. If needed, adjust the
alignment, antenna positioning, or configuration settings for optimal performance.

7. Secure the PtP Link: Implement appropriate security measures to protect the wireless
link and prevent unauthorized access. This may include enabling encryption protocols
like WPA2 or using other security features provided by the PtP devices.

THE TCP/IP MODEL

The TCP/IP model, which stands for Transmission Control Protocol/Internet Protocol, is
a fundamental framework that governs efficient and error-free data transmission over
networks. It is a concise version of the OSI model, consisting of four layers that oversee
the transmission of data across network channels. The model's history dates back to the
Cold War era when it was developed by the U.S. Department of Defense to facilitate
communication between computers within their networks and across national boundaries.
TCP/IP has evolved since its inception in the late 1960s, becoming an open standard that
underpins the Internet's network layer.

The TCP/IP model's significance lies in its role as the backbone of the Internet,
facilitating seamless communication between devices and ensuring the efficient exchange
of data across networks.

OSI MODEL TCP/IP STACK


CRIMPING TOOLS

Crimping tools are essential devices used to create secure and reliable electrical
connections by crimping terminals onto wires. These tools come in various types and
designs to cater to different wire sizes and connector types. Here are some key points
about crimping tools based on the sources:

1. Types of Crimping Tools:

>Handheld Crimpers: Tools like pliers or crimping tools that are manually operated for
crimping terminals onto wires.

>Ratcheting Crimpers: Feature a ratcheting mechanism that ensures consistent and


proper crimps with each use.

>Interchangeable Dies: Some crimping tools offer interchangeable dies to


accommodate different wire sizes and connector types.
2. Popular Brands and Models:

>Klein Tools: Known for cutting and crimping tools suitable for various wire sizes and
terminals.

>NEIKO: Offers compact wire strippers with multiple functions like crimping, cutting,
and gripping.

>Wirefy: Provides crimping tools with interchangeable dies and wire stripping
capabilities for precise and uniform crimps.

3. Functionality:

>Strong and Uniform Crimps: Crimping tools ensure strong and uniform crimps every
time, maintaining the integrity of the connection.

>Insulation Preservation: Designed to keep the connectors' insulation intact during the
crimping process.

>Ease of Use: Features like color-coded die nests and adjustable crimping force make
these tools user-friendly and efficient.

4. Applications:

>Electrical Work: Widely used in electrical installations, automotive wiring, marine


applications, and other industries requiring secure wire connections.

>DIY Projects: Ideal for DIY enthusiasts and professionals alike for creating reliable
electrical connections.

These tools play a crucial role in ensuring safe and reliable electrical connections, making
them indispensable in various industries and applications.

You might also like