Acknowledgments |
|
xvii | |
Introduction |
|
xix | |
1 Evolution of video surveillance systems |
|
1 | (6) |
|
1.1 VCR-based analog CCTV systems |
|
|
2 | (1) |
|
1.2 DVR-based analog CCTV systems |
|
|
2 | (1) |
|
1.3 Network DVR-based analog CCTV systems |
|
|
3 | (1) |
|
1.4 Video encoder-based network video systems |
|
|
4 | (1) |
|
1.4.1 Network video recorders and hybrid DVRs |
|
|
4 | (1) |
|
1.5 Network camera-based network video systems |
|
|
5 | (2) |
2 Components of network video |
|
7 | (10) |
|
2.1 Where is network video used? |
|
|
7 | (2) |
|
|
9 | (1) |
|
2.2.1 Comparing a network camera and an analog camera |
|
|
9 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
|
12 | (1) |
|
2.6 Video management software |
|
|
12 | (2) |
|
|
14 | (3) |
3 Network cameras |
|
17 | (24) |
|
3.1 Network camera components |
|
|
17 | (1) |
|
3.2 Types of network cameras |
|
|
18 | (6) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (2) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
24 | (4) |
|
3.3.1 Image stabilization |
|
|
24 | (1) |
|
3.3.2 Presets and guard tours |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
3.4 Panoramic network cameras |
|
|
28 | (6) |
|
3.4.1 Selecting the right viewing angle |
|
|
28 | (1) |
|
3.4.2 Cameras with wide viewing angles |
|
|
29 | (1) |
|
3.4.3 180° panoramic cameras |
|
|
29 | (1) |
|
3.4.4 360° panoramic cameras |
|
|
30 | (2) |
|
3.4.5 Multisensor panoramic cameras |
|
|
32 | (1) |
|
3.4.6 Comparing and combining panoramic and PTZ cameras |
|
|
32 | (2) |
|
|
34 | (1) |
|
3.6 Day-and-night network cameras |
|
|
34 | (2) |
|
|
34 | (2) |
|
3.6.2 Day-and-night applications |
|
|
36 | (1) |
|
3.7 Megapixel network cameras |
|
|
36 | (4) |
|
3.7.1 Benefits of megapixel |
|
|
38 | (1) |
|
3.7.2 Megapixel applications |
|
|
38 | (1) |
|
3.7.3 Drawbacks of megapixel |
|
|
39 | (1) |
|
|
40 | (1) |
4 Camera technologies |
|
41 | (56) |
|
|
41 | (10) |
|
4.1.1 Light characteristics |
|
|
42 | (2) |
|
|
44 | (5) |
|
4.1.2.1 Definition of lux |
|
|
44 | (2) |
|
4.1.2.2 Lux rating of network cameras |
|
|
46 | (1) |
|
4.1.2.3 Lux rating of analog versus network cameras |
|
|
47 | (2) |
|
|
49 | (1) |
|
|
49 | (2) |
|
|
51 | (16) |
|
|
51 | (1) |
|
|
52 | (1) |
|
4.2.2 Lens mount standards |
|
|
52 | (2) |
|
4.2.3 Field of view (focal length) |
|
|
54 | (3) |
|
4.2.4 Matching lens and sensor |
|
|
57 | (1) |
|
4.2.5 Aperture (iris diameter) |
|
|
58 | (2) |
|
4.2.6 Types of iris control |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
62 | (3) |
|
|
65 | (1) |
|
|
65 | (2) |
|
4.2.11 HDTV and megapixel lenses |
|
|
67 | (1) |
|
|
67 | (4) |
|
|
67 | (2) |
|
4.3.2 CMOS and CCD technologies |
|
|
69 | (1) |
|
|
69 | (1) |
|
4.3.3 More about image sensors |
|
|
70 | (1) |
|
4.3.4 HDTV and megapixel sensors |
|
|
70 | (1) |
|
4.4 Image scanning techniques |
|
|
71 | (4) |
|
4.4.1 Interlaced scanning |
|
|
71 | (1) |
|
4.4.2 Deinterlacing techniques |
|
|
71 | (2) |
|
4.4.3 Progressive scanning |
|
|
73 | (2) |
|
|
75 | (11) |
|
|
75 | (1) |
|
4.5.2 Backlight compensation |
|
|
76 | (1) |
|
|
76 | (6) |
|
4.5.3.1 Measuring dynamic range |
|
|
78 | (2) |
|
|
80 | (2) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
4.5.7 Sharpening and contrast |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (9) |
|
4.6.1 NTSC and PAL resolutions |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
4.6.4 Megapixel resolutions |
|
|
90 | (2) |
|
|
92 | (1) |
|
4.6.6 Ultra-HD resolutions |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (2) |
5 Thermal cameras |
|
97 | (18) |
|
5.1 How thermal imaging works |
|
|
99 | (2) |
|
5.1.1 Electromagnetic spectrum |
|
|
100 | (1) |
|
5.1.2 Near-infrared imaging |
|
|
100 | (1) |
|
5.1.3 Using thermal radiation to create images |
|
|
100 | (1) |
|
5.2 Components of a thermal camera |
|
|
101 | (5) |
|
|
102 | (2) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
5.2.3 Lenses for thermal cameras |
|
|
104 | (1) |
|
5.2.3.1 Calculation of focal length |
|
|
104 | (1) |
|
|
105 | (1) |
|
5.3 Presentation of thermal images |
|
|
106 | (2) |
|
5.3.1 Temperature alarm cameras |
|
|
107 | (1) |
|
5.4 Determining detection range |
|
|
108 | (3) |
|
|
109 | (1) |
|
5.4.2 Environmental considerations |
|
|
109 | (6) |
|
|
110 | (1) |
|
|
110 | (1) |
|
5.5 Integrating thermal cameras with intelligent video |
|
|
111 | (1) |
|
5.6 Export regulations for thermal technologies |
|
|
112 | (1) |
|
|
112 | (3) |
6 Video compression technologies |
|
115 | (16) |
|
6.1 Basics of compression |
|
|
115 | (3) |
|
6.1.1 Image and video compression |
|
|
116 | (1) |
|
6.1.2 Lossless and lossy compression |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
118 | (1) |
|
6.2 Compression standards |
|
|
118 | (1) |
|
|
118 | (1) |
|
6.2.2 History of compression formats |
|
|
118 | (1) |
|
|
119 | (5) |
|
|
119 | (2) |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
6.4 More on JPEG compression |
|
|
124 | (1) |
|
6.5 More on MPEG compression |
|
|
124 | (5) |
|
|
124 | (1) |
|
|
125 | (1) |
|
6.5.3 Constant, maximum, and variable bitrates |
|
|
125 | (2) |
|
|
127 | (1) |
|
6.5.5 Baseline and main profiles |
|
|
127 | (1) |
|
6.5.6 Improving H.264 for surveillance needs |
|
|
128 | (1) |
|
|
128 | (1) |
|
6.5.8 Backward compatibility |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
7 Audio technologies |
|
131 | (14) |
|
|
132 | (2) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
134 | (2) |
|
7.2.1 Audio input (microphones) |
|
|
134 | (2) |
|
7.2.1.1 Condenser microphones |
|
|
134 | (1) |
|
7.2.1.2 Electret condenser microphones |
|
|
135 | (1) |
|
7.2.1.3 Dynamic microphones |
|
|
136 | (1) |
|
7.2.1.4 Directional microphones |
|
|
136 | (1) |
|
7.2.2 Audio output (speakers) |
|
|
136 | (1) |
|
7.3 Acoustical adjustments |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
7.4 Audio detection alarm |
|
|
137 | (1) |
|
|
138 | (2) |
|
|
138 | (1) |
|
|
138 | (1) |
|
7.5.3 Software audio codecs |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
|
139 | (1) |
|
7.5.3.4 G.722.2 or AMR-WB |
|
|
140 | (1) |
|
7.6 Audio and video synchronization |
|
|
140 | (1) |
|
7.7 The future of audio in network video |
|
|
140 | (1) |
|
7.8 Other audio devices in network video systems |
|
|
140 | (3) |
|
|
140 | (1) |
|
7.8.2 Network door station |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (2) |
8 Video encoders |
|
145 | (8) |
|
8.1 The components of a video encoder |
|
|
145 | (2) |
|
8.2 Stand-alone video encoders |
|
|
147 | (1) |
|
8.3 Rack-mounted video encoders |
|
|
148 | (1) |
|
8.4 Video encoders with PTZ cameras |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
151 | (2) |
9 Wired networks |
|
153 | (18) |
|
9.1 Evolution of Ethernet |
|
|
153 | (3) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
9.1.4 10 Gigabit Ethernet |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (4) |
|
9.3.1 Twisted-pair cables and RJ45 |
|
|
157 | (1) |
|
|
158 | (1) |
|
9.3.3 Twisted-pair cable types |
|
|
158 | (1) |
|
|
159 | (2) |
|
|
160 | (1) |
|
|
161 | (2) |
|
9.4.1 Media access control addresses |
|
|
161 | (1) |
|
|
162 | (1) |
|
9.4.3 Half duplex and full duplex |
|
|
162 | (1) |
|
|
163 | (2) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
165 | (1) |
|
|
165 | (1) |
|
9.5.6 Internet connections |
|
|
165 | (1) |
|
|
165 | (2) |
|
9.6.1 802.3af and 802.3at standards |
|
|
166 | (1) |
|
9.6.2 Midspans and splitters |
|
|
167 | (1) |
|
9.7 Virtual local area networks |
|
|
167 | (1) |
|
|
168 | (3) |
10 Wireless networks |
|
171 | (14) |
|
10.1 Basics of wireless networks |
|
|
171 | (5) |
|
|
172 | (2) |
|
|
174 | (1) |
|
|
174 | (1) |
|
10.1.4 Radio wave propagation |
|
|
175 | (1) |
|
10.2 Wireless network architectures |
|
|
176 | (2) |
|
10.2.1 Point-to-point network |
|
|
176 | (1) |
|
10.2.2 Point-to-multipoint network |
|
|
176 | (1) |
|
|
177 | (1) |
|
10.3 802.11 WLAN standards |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
|
178 | (1) |
|
10.3.5 802.11ac extension |
|
|
178 | (1) |
|
|
178 | (1) |
|
10.4 Basics of 802.11 networks |
|
|
179 | (1) |
|
10.4.1 Infrastructure network |
|
|
179 | (1) |
|
10.4.2 802.11 frequencies |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
180 | (1) |
|
10.5.1 Wired equivalent privacy |
|
|
180 | (1) |
|
10.5.2 Temporal key integrity protocol |
|
|
180 | (1) |
|
10.5.3 Advanced encryption standard |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
10.5.6 WiFi Protected Access® |
|
|
181 | (1) |
|
10.6 Other wireless solutions |
|
|
181 | (1) |
|
|
181 | (1) |
|
10.6.2 Universal mobile telecommunications system |
|
|
182 | (1) |
|
10.6.3 Wireless interoperability for microwave access |
|
|
182 | (1) |
|
10.7 Performance of wireless networks |
|
|
182 | (1) |
|
|
182 | (3) |
11 Networking technologies |
|
185 | (24) |
|
|
185 | (2) |
|
11.1.1 Layer 1: The physical layer |
|
|
186 | (1) |
|
11.1.2 Layer 2: The data-link layer |
|
|
186 | (1) |
|
11.1.3 Layer 3: The network layer |
|
|
186 | (1) |
|
11.1.4 Layer 4: The transport layer |
|
|
186 | (1) |
|
11.1.5 Layer 5: The session layer |
|
|
187 | (1) |
|
11.1.6 Layer 6: The presentation layer |
|
|
187 | (1) |
|
11.1.7 Layer 7: The application layer |
|
|
187 | (1) |
|
11.2 TCP/IP reference model |
|
|
187 | (7) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
189 | (1) |
|
11.2.4 Network address translation |
|
|
190 | (1) |
|
11.2.5 Services and port numbers |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
192 | (2) |
|
|
192 | (2) |
|
11.3 Managing IP addresses |
|
|
194 | (4) |
|
11.3.1 Setting IP addresses |
|
|
194 | (1) |
|
11.3.2 Manual address allocation |
|
|
194 | (1) |
|
11.3.2.1 Dynamic address allocation |
|
|
194 | (1) |
|
11.3.3 Configuration-free networking |
|
|
195 | (2) |
|
11.3.3.1 UPnP® and Zeroconf |
|
|
196 | (1) |
|
|
196 | (1) |
|
11.3.3.3 MAC and IP address resolution |
|
|
196 | (1) |
|
11.3.3.4 Address resolution protocol |
|
|
196 | (1) |
|
11.3.4 Domain name system |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
11.4.1 User datagram protocol |
|
|
198 | (1) |
|
11.4.2 Transmission control protocol |
|
|
198 | (1) |
|
11.5 Application layer protocols |
|
|
199 | (1) |
|
11.5.1 Hypertext transfer protocol |
|
|
199 | (1) |
|
11.5.2 File transfer protocol |
|
|
199 | (1) |
|
11.5.3 Simple network management protocol |
|
|
200 | (1) |
|
11.5.4 Simple mail transfer protocol |
|
|
200 | (1) |
|
11.5.5 Real-time transport protocol |
|
|
200 | (1) |
|
11.5.6 Session initiation protocol |
|
|
200 | (1) |
|
11.6 Unicast, broadcast, and multicast |
|
|
200 | (1) |
|
|
201 | (2) |
|
|
202 | (1) |
|
11.7.2 QoS in network video |
|
|
202 | (1) |
|
|
203 | (3) |
|
11.8.1 Username and password authentication |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
11.8.4 Virtual Private Network |
|
|
205 | (1) |
|
11.8.5 Hypertext transfer protocol secure |
|
|
206 | (1) |
|
11.9 Best practices for network security |
|
|
206 | (3) |
|
|
207 | (1) |
|
|
207 | (2) |
12 Servers and storage |
|
209 | (10) |
|
|
209 | (2) |
|
12.1.1 Hardware platforms |
|
|
209 | (1) |
|
|
210 | (1) |
|
12.1.3 Video file systems |
|
|
210 | (1) |
|
|
211 | (1) |
|
12.2.1 Small computer system interface |
|
|
211 | (1) |
|
12.2.2 Advanced technology attachment and serial advanced technology attachment interfaces |
|
|
211 | (1) |
|
12.2.3 Hard disk failure rates |
|
|
212 | (1) |
|
12.2.4 Solid-state drives |
|
|
212 | (1) |
|
12.3 Storage architecture |
|
|
212 | (3) |
|
|
212 | (2) |
|
12.3.2 Single-server storage |
|
|
214 | (1) |
|
12.3.3 Network-attached storage |
|
|
214 | (1) |
|
12.3.4 Storage area network |
|
|
214 | (1) |
|
12.3.5 Internet small computer system interface |
|
|
215 | (1) |
|
|
215 | (2) |
|
12.4.1 Redundant array of independent disks systems |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
217 | (2) |
13 Video management |
|
219 | (28) |
|
13.1 Video management architectures |
|
|
220 | (5) |
|
13.1.1 Server-based video management |
|
|
220 | (3) |
|
13.1.1.1 PC server with VMS software |
|
|
221 | (1) |
|
13.1.1.2 Network video recorder |
|
|
222 | (1) |
|
13.1.2 Edge-based video management |
|
|
223 | (1) |
|
13.1.3 Cloud-based video management |
|
|
224 | (1) |
|
13.2 Other aspects of video management architecture |
|
|
225 | (2) |
|
13.2.1 Open vs. vendor-specific software |
|
|
225 | (1) |
|
13.2.2 Protocols and application programming interfaces |
|
|
225 | (1) |
|
13.2.3 Apps for smartphones and tablets |
|
|
225 | (1) |
|
13.2.4 Scalability of video management software |
|
|
226 | (1) |
|
13.2.5 Licensing of video management software |
|
|
226 | (1) |
|
|
227 | (20) |
|
|
227 | (3) |
|
|
227 | (1) |
|
|
228 | (1) |
|
13.3.1.3 Recording and storage |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (3) |
|
|
230 | (1) |
|
13.3.2.2 Viewing of recordings |
|
|
231 | (1) |
|
|
231 | (1) |
|
13.3.2.4 Mapping functionality |
|
|
232 | (1) |
|
|
233 | (5) |
|
13.3.3.1 Edge-based event handling |
|
|
233 | (1) |
|
|
234 | (1) |
|
13.3.3.3 Video motion detection |
|
|
235 | (2) |
|
|
237 | (1) |
|
|
237 | (1) |
|
13.3.4 Administration and management features |
|
|
238 | (3) |
|
13.3.4.1 Managing cameras |
|
|
238 | (1) |
|
13.3.4.2 Time synchronization |
|
|
238 | (2) |
|
|
240 | (1) |
|
|
240 | (1) |
|
|
241 | (4) |
|
13.4.1 Application programming interface |
|
|
241 | (1) |
|
|
242 | (1) |
|
13.4.3 Physical access control |
|
|
243 | (1) |
|
13.4.4 Building management |
|
|
243 | (1) |
|
13.4.5 Industrial control systems |
|
|
244 | (1) |
|
13.4.6 Radio-frequency identification |
|
|
244 | (1) |
|
|
245 | (2) |
14 Hosted video solutions |
|
247 | (16) |
|
14.1 Principles of hosted video |
|
|
247 | (2) |
|
14.2 Stakeholders of hosted video |
|
|
249 | (3) |
|
14.2.1 Video hosting provider |
|
|
250 | (1) |
|
14.2.2 Video service provider |
|
|
250 | (1) |
|
|
250 | (1) |
|
14.2.4 Video service subscriber |
|
|
250 | (2) |
|
14.3 Setting up hosted video |
|
|
252 | (1) |
|
14.4 Characteristics of hosted video |
|
|
253 | (5) |
|
14.4.1 Different needs, different services |
|
|
255 | (3) |
|
14.4.1.1 Basic video surveillance |
|
|
255 | (1) |
|
14.4.1.2 Alarm monitoring |
|
|
256 | (1) |
|
14.4.1.3 Business intelligence |
|
|
256 | (2) |
|
|
258 | (1) |
|
14.5.1 Audits, laws, and certifications |
|
|
258 | (1) |
|
14.5.1.1 Standards for Attestation Engagements |
|
|
258 | (1) |
|
14.5.1.2 ISO/IEC 27001 standard |
|
|
259 | (1) |
|
14.5.1.3 Federal Information Security Management Act |
|
|
259 | (1) |
|
14.5.1.4 European Union Agency for Network and Information Security |
|
|
259 | (1) |
|
14.6 Integration with other systems |
|
|
259 | (2) |
|
14.6.1 Integration with central station automation |
|
|
259 | (1) |
|
14.6.2 Integration with physical access control |
|
|
260 | (1) |
|
|
261 | (2) |
15 Intelligent video |
|
263 | (12) |
|
15.1 What is intelligent video? |
|
|
263 | (1) |
|
15.2 Genesis of intelligent video |
|
|
264 | (1) |
|
15.3 Why intelligent video? |
|
|
265 | (2) |
|
15.3.1 Streamlining video surveillance operations |
|
|
265 | (1) |
|
15.3.2 Managing stored video effectively |
|
|
265 | (1) |
|
15.3.3 Improving business operations |
|
|
266 | (1) |
|
15.4 Intelligent video architectures |
|
|
267 | (5) |
|
15.4.1 Centralized systems |
|
|
267 | (1) |
|
15.4.1.1 DVR-based installations |
|
|
268 | (1) |
|
15.4.1.2 PC server-based installations |
|
|
268 | (1) |
|
15.4.2 Distributed systems |
|
|
268 | (3) |
|
15.4.2.1 Intelligence-at-the-edge installations |
|
|
268 | (3) |
|
15.4.3 Integrating intelligent video applications |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
272 | (3) |
16 Intelligent video applications |
|
275 | (24) |
|
16.1 Categorizing video analytics |
|
|
275 | (2) |
|
16.1.1 Categorizing video analytics by technology |
|
|
275 | (1) |
|
16.1.1.1 Pixels, blobs, and objects |
|
|
276 | (1) |
|
16.1.2 Categorizing video analytics by use |
|
|
276 | (1) |
|
16.2 Analytics for security |
|
|
277 | (5) |
|
16.2.1 Video motion detection |
|
|
277 | (1) |
|
16.2.1.1 Evolution of VMD |
|
|
277 | (1) |
|
16.2.1.2 Tuning of VMD parameters |
|
|
277 | (1) |
|
16.2.2 Camera tampering detection |
|
|
278 | (2) |
|
|
280 | (1) |
|
16.2.3.1 Crossline detection |
|
|
280 | (1) |
|
16.2.3.2 Intrusion detection |
|
|
280 | (1) |
|
16.2.3.3 Object left behind |
|
|
281 | (1) |
|
16.2.3.4 Loitering detection |
|
|
281 | (1) |
|
16.2.4 Fire and smoke detection |
|
|
281 | (1) |
|
16.3 Analytics for business intelligence and operations |
|
|
282 | (8) |
|
16.3.1 Object classification |
|
|
283 | (2) |
|
16.3.2 Object and people counting |
|
|
285 | (3) |
|
16.3.2.1 Customer traffic monitoring |
|
|
286 | (1) |
|
16.3.2.2 Queue management |
|
|
286 | (1) |
|
|
287 | (1) |
|
16.3.3 Dwell time and heat mapping |
|
|
288 | (1) |
|
16.3.4 Traffic management |
|
|
289 | (1) |
|
16.3.4.1 Incident detection |
|
|
289 | (1) |
|
|
290 | (5) |
|
|
291 | (1) |
|
16.4.2 Autotracking using PTZ |
|
|
291 | (1) |
|
|
291 | (1) |
|
16.4.3 License plate recognition |
|
|
292 | (2) |
|
16.4.4 Facial recognition |
|
|
294 | (1) |
|
16.5 Video analytics and privacy |
|
|
295 | (1) |
|
16.5.1 Sound identification |
|
|
295 | (1) |
|
16.6 Realistic expectations on video analytics |
|
|
296 | (1) |
|
|
296 | (3) |
|
16.7.1 Video image quality |
|
|
297 | (1) |
|
16.7.2 Efficient intelligent video algorithms |
|
|
297 | (1) |
|
16.7.3 Computer processing power |
|
|
297 | (1) |
|
16.7.4 Configuring and fine-tuning the system |
|
|
298 | (1) |
17 System design considerations |
|
299 | (54) |
|
17.1 Selecting a network camera |
|
|
299 | (9) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
301 | (4) |
|
17.1.3.1 Determining the resolution needed |
|
|
301 | (4) |
|
|
305 | (1) |
|
17.1.5 Networking functionality |
|
|
305 | (1) |
|
17.1.6 Other functionalities |
|
|
306 | (1) |
|
|
307 | (1) |
|
17.2 Installing a network camera |
|
|
308 | (5) |
|
17.2.1 Surveillance objective |
|
|
308 | (1) |
|
17.2.2 Use plenty of light or add light if needed |
|
|
308 | (2) |
|
17.2.2.1 Use IR light when white light is impracticable |
|
|
309 | (1) |
|
17.2.3 Avoid direct sunlight and glare |
|
|
310 | (1) |
|
|
310 | (2) |
|
|
312 | (1) |
|
17.3 Protecting a network camera |
|
|
313 | (24) |
|
17.3.1 Camera enclosures in general |
|
|
314 | (1) |
|
17.3.2 Transparent coverings |
|
|
315 | (4) |
|
17.3.2.1 Overcoming the limitations of conventional domes |
|
|
316 | (3) |
|
17.3.3 Positioning of fixed cameras |
|
|
319 | (1) |
|
17.3.4 Environmental protection |
|
|
319 | (1) |
|
17.3.5 Vandal and tampering protection |
|
|
320 | (4) |
|
17.3.5.1 Goals of vandal protection |
|
|
321 | (1) |
|
17.3.5.2 Mechanical design |
|
|
321 | (1) |
|
|
321 | (1) |
|
17.3.5.4 Camera placement |
|
|
322 | (1) |
|
17.3.5.5 Intelligent video protecting cameras |
|
|
323 | (1) |
|
|
324 | (4) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
325 | (3) |
|
|
328 | (3) |
|
|
329 | (1) |
|
|
330 | (1) |
|
|
330 | (1) |
|
17.3.7.4 Choosing between shielded and unshielded network cables |
|
|
331 | (1) |
|
17.3.8 Safety of electrical equipment |
|
|
331 | (1) |
|
17.3.9 Environmental ratings |
|
|
332 | (5) |
|
|
332 | (2) |
|
|
334 | (1) |
|
|
334 | (2) |
|
17.3.9.4 IECEx and ATEX certifications |
|
|
336 | (1) |
|
17.4 Storage and server considerations |
|
|
337 | (6) |
|
17.4.1 Small system: From 1 to 10 cameras |
|
|
338 | (1) |
|
17.4.2 Midsize system: From 10 to 100 cameras |
|
|
338 | (1) |
|
17.4.3 Large system: From 100 to 1000+ cameras |
|
|
338 | (1) |
|
|
338 | (1) |
|
17.4.5 Provisioning the server |
|
|
338 | (2) |
|
17.4.6 Calculating storage |
|
|
340 | (3) |
|
17.4.6.1 Calculating storage needs |
|
|
341 | (2) |
|
17.5 Provisioning network bandwidth |
|
|
343 | (2) |
|
17.5.1 Limiting the bandwidth |
|
|
343 | (1) |
|
17.5.2 Network and system latency |
|
|
343 | (1) |
|
|
344 | (1) |
|
17.5.3.1 Tips for better network cabling |
|
|
344 | (1) |
|
17.5.3.2 Preparing the network cable |
|
|
345 | (1) |
|
17.5.3.3 Certifying the cable installation |
|
|
345 | (1) |
|
17.6 Tools for designing systems |
|
|
345 | (5) |
|
17.6.1 Calculators and component selection tools |
|
|
346 | (1) |
|
17.6.2 Comprehensive system design tools |
|
|
347 | (1) |
|
17.6.3 Extensions for CAD software |
|
|
348 | (2) |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
349 | (1) |
|
|
350 | (3) |
Author |
|
353 | (2) |
Index |
|
355 | |