Muutke küpsiste eelistusi

E-raamat: Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

(Axis Communications Inc., Chelmsford, Massachusetts, USA),
  • Formaat: 388 pages
  • Ilmumisaeg: 01-Dec-2016
  • Kirjastus: CRC Press Inc
  • Keel: eng
  • ISBN-13: 9781315399881
  • Formaat - EPUB+DRM
  • Hind: 85,79 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 388 pages
  • Ilmumisaeg: 01-Dec-2016
  • Kirjastus: CRC Press Inc
  • Keel: eng
  • ISBN-13: 9781315399881

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Continuing in the tradition of the bestselling first edition, this book examines networked surveillance video solutions. It provides the latest details on industry hardware, software, and networking capabilities of the latest cameras and DVRs. It addresses in full detail updated specifications on MPEG-4 and other digital video formats, resolution advantages of analog v. digital, intelligent video capabilities, frame rate control, and indoor/outdoor installations factors. New chapters include cloud computing, standards, and thermal cameras.

Acknowledgments xvii
Introduction xix
1 Evolution of video surveillance systems 1(6)
1.1 VCR-based analog CCTV systems
2(1)
1.2 DVR-based analog CCTV systems
2(1)
1.3 Network DVR-based analog CCTV systems
3(1)
1.4 Video encoder-based network video systems
4(1)
1.4.1 Network video recorders and hybrid DVRs
4(1)
1.5 Network camera-based network video systems
5(2)
2 Components of network video 7(10)
2.1 Where is network video used?
7(2)
2.2 Network camera
9(1)
2.2.1 Comparing a network camera and an analog camera
9(1)
2.3 Video encoder
10(2)
2.4 Network
12(1)
2.5 Server and storage
12(1)
2.6 Video management software
12(2)
2.7 Intelligent video
14(3)
3 Network cameras 17(24)
3.1 Network camera components
17(1)
3.2 Types of network cameras
18(6)
3.2.1 Fixed cameras
18(1)
3.2.2 Fixed dome cameras
19(1)
3.2.3 PTZ cameras
20(2)
3.2.4 Panoramic cameras
22(1)
3.2.5 Covert cameras
22(1)
3.2.6 Thermal cameras
23(1)
3.3 PTZ cameras
24(4)
3.3.1 Image stabilization
24(1)
3.3.2 Presets and guard tours
24(1)
3.3.3 Privacy masking
24(1)
3.3.4 E-flip
25(1)
3.3.5 Auto-flip
26(1)
3.3.6 PTZ performance
27(1)
3.3.7 Joystick control
27(1)
3.4 Panoramic network cameras
28(6)
3.4.1 Selecting the right viewing angle
28(1)
3.4.2 Cameras with wide viewing angles
29(1)
3.4.3 180° panoramic cameras
29(1)
3.4.4 360° panoramic cameras
30(2)
3.4.5 Multisensor panoramic cameras
32(1)
3.4.6 Comparing and combining panoramic and PTZ cameras
32(2)
3.5 Onboard cameras
34(1)
3.6 Day-and-night network cameras
34(2)
3.6.1 IR illuminators
34(2)
3.6.2 Day-and-night applications
36(1)
3.7 Megapixel network cameras
36(4)
3.7.1 Benefits of megapixel
38(1)
3.7.2 Megapixel applications
38(1)
3.7.3 Drawbacks of megapixel
39(1)
3.8 Best practices
40(1)
4 Camera technologies 41(56)
4.1 Light
41(10)
4.1.1 Light characteristics
42(2)
4.1.2 Illuminance
44(5)
4.1.2.1 Definition of lux
44(2)
4.1.2.2 Lux rating of network cameras
46(1)
4.1.2.3 Lux rating of analog versus network cameras
47(2)
4.1.3 Color temperature
49(1)
4.1.4 Invisible light
49(2)
4.2 Lenses
51(16)
4.2.1 Lens types
51(1)
4.2.1.1 IR-coated lenses
52(1)
4.2.2 Lens mount standards
52(2)
4.2.3 Field of view (focal length)
54(3)
4.2.4 Matching lens and sensor
57(1)
4.2.5 Aperture (iris diameter)
58(2)
4.2.6 Types of iris control
60(1)
4.2.7 F-number (f-stop)
61(1)
4.2.8 Depth of field
62(3)
4.2.9 Focusing
65(1)
4.2.10 Lens quality
65(2)
4.2.11 HDTV and megapixel lenses
67(1)
4.3 Image sensors
67(4)
4.3.1 Color filtering
67(2)
4.3.2 CMOS and CCD technologies
69(1)
4.3.2.1 CMOS technology
69(1)
4.3.3 More about image sensors
70(1)
4.3.4 HDTV and megapixel sensors
70(1)
4.4 Image scanning techniques
71(4)
4.4.1 Interlaced scanning
71(1)
4.4.2 Deinterlacing techniques
71(2)
4.4.3 Progressive scanning
73(2)
4.5 Image processing
75(11)
4.5.1 Exposure
75(1)
4.5.2 Backlight compensation
76(1)
4.5.3 WDR
76(6)
4.5.3.1 Measuring dynamic range
78(2)
4.5.3.2 Types of WDR
80(2)
4.5.4 Bayer demosaicing
82(1)
4.5.5 Noise
83(1)
4.5.6 White balance
84(1)
4.5.7 Sharpening and contrast
84(1)
4.5.8 Aliasing
85(1)
4.6 Resolution
86(9)
4.6.1 NTSC and PAL resolutions
88(1)
4.6.2 VGA resolutions
88(1)
4.6.3 MPEG resolutions
89(1)
4.6.4 Megapixel resolutions
90(2)
4.6.5 HDTV resolutions
92(1)
4.6.6 Ultra-HD resolutions
93(1)
4.6.7 Aspect ratios
94(1)
4.7 Best practices
95(2)
5 Thermal cameras 97(18)
5.1 How thermal imaging works
99(2)
5.1.1 Electromagnetic spectrum
100(1)
5.1.2 Near-infrared imaging
100(1)
5.1.3 Using thermal radiation to create images
100(1)
5.2 Components of a thermal camera
101(5)
5.2.1 Sensors
102(2)
5.2.1.1 Cooled sensors
102(1)
5.2.1.2 Uncooled sensors
103(1)
5.2.2 Sensor resolutions
104(1)
5.2.3 Lenses for thermal cameras
104(1)
5.2.3.1 Calculation of focal length
104(1)
5.2.4 Thermal enclosures
105(1)
5.3 Presentation of thermal images
106(2)
5.3.1 Temperature alarm cameras
107(1)
5.4 Determining detection range
108(3)
5.4.1 Nomograph
109(1)
5.4.2 Environmental considerations
109(6)
5.4.2.1 Absorption
110(1)
5.4.2.2 Scattering
110(1)
5.5 Integrating thermal cameras with intelligent video
111(1)
5.6 Export regulations for thermal technologies
112(1)
5.7 Best practices
112(3)
6 Video compression technologies 115(16)
6.1 Basics of compression
115(3)
6.1.1 Image and video compression
116(1)
6.1.2 Lossless and lossy compression
117(1)
6.1.3 Block transform
117(1)
6.1.4 Prediction
117(1)
6.1.5 Latency
117(1)
6.1.6 Jitter
118(1)
6.1.7 Compression ratio
118(1)
6.2 Compression standards
118(1)
6.2.1 ITU and ISO
118(1)
6.2.2 History of compression formats
118(1)
6.3 Compression formats
119(5)
6.3.1 JPEG
119(2)
6.3.2 Motion JPEG
121(1)
6.3.3 JPEG 2000
121(1)
6.3.4 Motion JPEG 2000
122(1)
6.3.5 H.261 and H.263
122(1)
6.3.6 MPEG-1
122(1)
6.3.7 MPEG-2
123(1)
6.3.8 MPEG-4
123(1)
6.3.9 H.264
123(1)
6.3.10 H.265
123(1)
6.4 More on JPEG compression
124(1)
6.5 More on MPEG compression
124(5)
6.5.1 Frame types
124(1)
6.5.2 Group of pictures
125(1)
6.5.3 Constant, maximum, and variable bitrates
125(2)
6.5.4 Profile@Level
127(1)
6.5.5 Baseline and main profiles
127(1)
6.5.6 Improving H.264 for surveillance needs
128(1)
6.5.7 Licensing
128(1)
6.5.8 Backward compatibility
129(1)
6.6 Comparing standards
129(1)
6.7 Best practices
130(1)
7 Audio technologies 131(14)
7.1 Audio modes
132(2)
7.1.1 Simplex
133(1)
7.1.2 Half duplex
133(1)
7.1.3 Full duplex
133(1)
7.2 Audio equipment
134(2)
7.2.1 Audio input (microphones)
134(2)
7.2.1.1 Condenser microphones
134(1)
7.2.1.2 Electret condenser microphones
135(1)
7.2.1.3 Dynamic microphones
136(1)
7.2.1.4 Directional microphones
136(1)
7.2.2 Audio output (speakers)
136(1)
7.3 Acoustical adjustments
136(1)
7.3.1 Volume and gain
136(1)
7.3.2 Audio processing
137(1)
7.3.3 Echo cancelation
137(1)
7.3.4 Noise reduction
137(1)
7.4 Audio detection alarm
137(1)
7.5 Audio compression
138(2)
7.5.1 Sampling rates
138(1)
7.5.2 Bitrate
138(1)
7.5.3 Software audio codecs
139(1)
7.5.3.1 AAC-LC
139(1)
7.5.3.2 G.711 PCM
139(1)
7.5.3.3 G.726 ADPCM
139(1)
7.5.3.4 G.722.2 or AMR-WB
140(1)
7.6 Audio and video synchronization
140(1)
7.7 The future of audio in network video
140(1)
7.8 Other audio devices in network video systems
140(3)
7.8.1 Network speakers
140(1)
7.8.2 Network door station
141(1)
7.8.3 SIP
142(1)
7.9 Best practices
143(2)
8 Video encoders 145(8)
8.1 The components of a video encoder
145(2)
8.2 Stand-alone video encoders
147(1)
8.3 Rack-mounted video encoders
148(1)
8.4 Video encoders with PTZ cameras
149(1)
8.5 Video decoder
150(1)
8.6 Best practices
151(2)
9 Wired networks 153(18)
9.1 Evolution of Ethernet
153(3)
9.1.1 10 Mbit/s Ethernet
154(1)
9.1.2 Fast Ethernet
154(1)
9.1.3 Gigabit Ethernet
154(1)
9.1.4 10 Gigabit Ethernet
155(1)
9.1.5 Future of Ethernet
155(1)
9.2 Network topologies
156(1)
9.3 Network cabling
157(4)
9.3.1 Twisted-pair cables and RJ45
157(1)
9.3.2 Cable categories
158(1)
9.3.3 Twisted-pair cable types
158(1)
9.3.4 Fiber cable types
159(2)
9.3.4.1 Fiber connectors
160(1)
9.4 Basics of Ethernet
161(2)
9.4.1 Media access control addresses
161(1)
9.4.2 Frames
162(1)
9.4.3 Half duplex and full duplex
162(1)
9.5 Networking equipment
163(2)
9.5.1 Hubs
163(1)
9.5.2 Switches
163(1)
9.5.3 Routers
164(1)
9.5.4 Firewalls
165(1)
9.5.5 Bridges
165(1)
9.5.6 Internet connections
165(1)
9.6 Power over Ethernet
165(2)
9.6.1 802.3af and 802.3at standards
166(1)
9.6.2 Midspans and splitters
167(1)
9.7 Virtual local area networks
167(1)
9.8 Best practices
168(3)
10 Wireless networks 171(14)
10.1 Basics of wireless networks
171(5)
10.1.1 Wireless spectrum
172(2)
10.1.2 Signal strength
174(1)
10.1.3 Antennas
174(1)
10.1.4 Radio wave propagation
175(1)
10.2 Wireless network architectures
176(2)
10.2.1 Point-to-point network
176(1)
10.2.2 Point-to-multipoint network
176(1)
10.2.3 Mesh network
177(1)
10.3 802.11 WLAN standards
178(1)
10.3.1 802.11b extension
178(1)
10.3.2 802.11a extension
178(1)
10.3.3 802.11g extension
178(1)
10.3.4 802.11n extension
178(1)
10.3.5 802.11ac extension
178(1)
10.3.6 802.11s extension
178(1)
10.4 Basics of 802.11 networks
179(1)
10.4.1 Infrastructure network
179(1)
10.4.2 802.11 frequencies
179(1)
10.4.3 Channels
180(1)
10.5 WLAN security
180(1)
10.5.1 Wired equivalent privacy
180(1)
10.5.2 Temporal key integrity protocol
180(1)
10.5.3 Advanced encryption standard
180(1)
10.5.4 Preshared key
180(1)
10.5.5 802.1X
181(1)
10.5.6 WiFi Protected Access®
181(1)
10.6 Other wireless solutions
181(1)
10.6.1 Bluetooth®
181(1)
10.6.2 Universal mobile telecommunications system
182(1)
10.6.3 Wireless interoperability for microwave access
182(1)
10.7 Performance of wireless networks
182(1)
10.8 Best practices
182(3)
11 Networking technologies 185(24)
11.1 OSI reference model
185(2)
11.1.1 Layer 1: The physical layer
186(1)
11.1.2 Layer 2: The data-link layer
186(1)
11.1.3 Layer 3: The network layer
186(1)
11.1.4 Layer 4: The transport layer
186(1)
11.1.5 Layer 5: The session layer
187(1)
11.1.6 Layer 6: The presentation layer
187(1)
11.1.7 Layer 7: The application layer
187(1)
11.2 TCP/IP reference model
187(7)
11.2.1 Internet protocol
187(1)
11.2.2 IPv4 addresses
188(1)
11.2.3 Subnets
189(1)
11.2.4 Network address translation
190(1)
11.2.5 Services and port numbers
190(1)
11.2.6 Port forwarding
191(1)
11.2.7 IPv6
192(2)
11.2.7.1 IPv6 addresses
192(2)
11.3 Managing IP addresses
194(4)
11.3.1 Setting IP addresses
194(1)
11.3.2 Manual address allocation
194(1)
11.3.2.1 Dynamic address allocation
194(1)
11.3.3 Configuration-free networking
195(2)
11.3.3.1 UPnP® and Zeroconf
196(1)
11.3.3.2 Bonjour®
196(1)
11.3.3.3 MAC and IP address resolution
196(1)
11.3.3.4 Address resolution protocol
196(1)
11.3.4 Domain name system
197(1)
11.3.4.1 Dynamic DNS
198(1)
11.4 Data transport
198(1)
11.4.1 User datagram protocol
198(1)
11.4.2 Transmission control protocol
198(1)
11.5 Application layer protocols
199(1)
11.5.1 Hypertext transfer protocol
199(1)
11.5.2 File transfer protocol
199(1)
11.5.3 Simple network management protocol
200(1)
11.5.4 Simple mail transfer protocol
200(1)
11.5.5 Real-time transport protocol
200(1)
11.5.6 Session initiation protocol
200(1)
11.6 Unicast, broadcast, and multicast
200(1)
11.7 Quality of service
201(2)
11.7.1 Definition
202(1)
11.7.2 QoS in network video
202(1)
11.8 Network security
203(3)
11.8.1 Username and password authentication
203(1)
11.8.2 IP filtering
203(1)
11.8.3 802.1X
204(1)
11.8.4 Virtual Private Network
205(1)
11.8.5 Hypertext transfer protocol secure
206(1)
11.9 Best practices for network security
206(3)
11.9.1 Hardening guides
207(1)
11.9.2 Best practices
207(2)
12 Servers and storage 209(10)
12.1 Servers
209(2)
12.1.1 Hardware platforms
209(1)
12.1.2 Operating systems
210(1)
12.1.3 Video file systems
210(1)
12.2 Hard disks
211(1)
12.2.1 Small computer system interface
211(1)
12.2.2 Advanced technology attachment and serial advanced technology attachment interfaces
211(1)
12.2.3 Hard disk failure rates
212(1)
12.2.4 Solid-state drives
212(1)
12.3 Storage architecture
212(3)
12.3.1 Edge storage
212(2)
12.3.2 Single-server storage
214(1)
12.3.3 Network-attached storage
214(1)
12.3.4 Storage area network
214(1)
12.3.5 Internet small computer system interface
215(1)
12.4 Redundancy
215(2)
12.4.1 Redundant array of independent disks systems
215(1)
12.4.2 Data replication
216(1)
12.4.3 Tape backup
216(1)
12.4.4 Server clustering
217(1)
12.4.5 Multiple servers
217(1)
12.5 Best practices
217(2)
13 Video management 219(28)
13.1 Video management architectures
220(5)
13.1.1 Server-based video management
220(3)
13.1.1.1 PC server with VMS software
221(1)
13.1.1.2 Network video recorder
222(1)
13.1.2 Edge-based video management
223(1)
13.1.3 Cloud-based video management
224(1)
13.2 Other aspects of video management architecture
225(2)
13.2.1 Open vs. vendor-specific software
225(1)
13.2.2 Protocols and application programming interfaces
225(1)
13.2.3 Apps for smartphones and tablets
225(1)
13.2.4 Scalability of video management software
226(1)
13.2.5 Licensing of video management software
226(1)
13.3 System features
227(20)
13.3.1 Recording
227(3)
13.3.1.1 Video recording
227(1)
13.3.1.2 Audio recording
228(1)
13.3.1.3 Recording and storage
228(1)
13.3.1.4 Search options
229(1)
13.3.1.5 Exporting files
229(1)
13.3.2 Viewing
230(3)
13.3.2.1 Live viewing
230(1)
13.3.2.2 Viewing of recordings
231(1)
13.3.2.3 Multistreaming
231(1)
13.3.2.4 Mapping functionality
232(1)
13.3.3 Event management
233(5)
13.3.3.1 Edge-based event handling
233(1)
13.3.3.2 Responses
234(1)
13.3.3.3 Video motion detection
235(2)
13.3.3.4 I/O ports
237(1)
13.3.3.5 Event log files
237(1)
13.3.4 Administration and management features
238(3)
13.3.4.1 Managing cameras
238(1)
13.3.4.2 Time synchronization
238(2)
13.3.4.3 Security
240(1)
13.3.4.4 Audit log files
240(1)
13.4 Integrated systems
241(4)
13.4.1 Application programming interface
241(1)
13.4.2 Point of sale
242(1)
13.4.3 Physical access control
243(1)
13.4.4 Building management
243(1)
13.4.5 Industrial control systems
244(1)
13.4.6 Radio-frequency identification
244(1)
13.5 Best practices
245(2)
14 Hosted video solutions 247(16)
14.1 Principles of hosted video
247(2)
14.2 Stakeholders of hosted video
249(3)
14.2.1 Video hosting provider
250(1)
14.2.2 Video service provider
250(1)
14.2.3 Installer
250(1)
14.2.4 Video service subscriber
250(2)
14.3 Setting up hosted video
252(1)
14.4 Characteristics of hosted video
253(5)
14.4.1 Different needs, different services
255(3)
14.4.1.1 Basic video surveillance
255(1)
14.4.1.2 Alarm monitoring
256(1)
14.4.1.3 Business intelligence
256(2)
14.5 Data security
258(1)
14.5.1 Audits, laws, and certifications
258(1)
14.5.1.1 Standards for Attestation Engagements
258(1)
14.5.1.2 ISO/IEC 27001 standard
259(1)
14.5.1.3 Federal Information Security Management Act
259(1)
14.5.1.4 European Union Agency for Network and Information Security
259(1)
14.6 Integration with other systems
259(2)
14.6.1 Integration with central station automation
259(1)
14.6.2 Integration with physical access control
260(1)
14.7 Best practices
261(2)
15 Intelligent video 263(12)
15.1 What is intelligent video?
263(1)
15.2 Genesis of intelligent video
264(1)
15.3 Why intelligent video?
265(2)
15.3.1 Streamlining video surveillance operations
265(1)
15.3.2 Managing stored video effectively
265(1)
15.3.3 Improving business operations
266(1)
15.4 Intelligent video architectures
267(5)
15.4.1 Centralized systems
267(1)
15.4.1.1 DVR-based installations
268(1)
15.4.1.2 PC server-based installations
268(1)
15.4.2 Distributed systems
268(3)
15.4.2.1 Intelligence-at-the-edge installations
268(3)
15.4.3 Integrating intelligent video applications
271(1)
15.5 APIs and standards
272(1)
15.5.1 Metadata
272(1)
15.6 Best practices
272(3)
16 Intelligent video applications 275(24)
16.1 Categorizing video analytics
275(2)
16.1.1 Categorizing video analytics by technology
275(1)
16.1.1.1 Pixels, blobs, and objects
276(1)
16.1.2 Categorizing video analytics by use
276(1)
16.2 Analytics for security
277(5)
16.2.1 Video motion detection
277(1)
16.2.1.1 Evolution of VMD
277(1)
16.2.1.2 Tuning of VMD parameters
277(1)
16.2.2 Camera tampering detection
278(2)
16.2.3 Object tracking
280(1)
16.2.3.1 Crossline detection
280(1)
16.2.3.2 Intrusion detection
280(1)
16.2.3.3 Object left behind
281(1)
16.2.3.4 Loitering detection
281(1)
16.2.4 Fire and smoke detection
281(1)
16.3 Analytics for business intelligence and operations
282(8)
16.3.1 Object classification
283(2)
16.3.2 Object and people counting
285(3)
16.3.2.1 Customer traffic monitoring
286(1)
16.3.2.2 Queue management
286(1)
16.3.2.3 Tailgating
287(1)
16.3.3 Dwell time and heat mapping
288(1)
16.3.4 Traffic management
289(1)
16.3.4.1 Incident detection
289(1)
16.4 Hybrid analytics
290(5)
16.4.1 Autotracking
291(1)
16.4.2 Autotracking using PTZ
291(1)
16.4.2.1 Gatekeeper
291(1)
16.4.3 License plate recognition
292(2)
16.4.4 Facial recognition
294(1)
16.5 Video analytics and privacy
295(1)
16.5.1 Sound identification
295(1)
16.6 Realistic expectations on video analytics
296(1)
16.7 Best practices
296(3)
16.7.1 Video image quality
297(1)
16.7.2 Efficient intelligent video algorithms
297(1)
16.7.3 Computer processing power
297(1)
16.7.4 Configuring and fine-tuning the system
298(1)
17 System design considerations 299(54)
17.1 Selecting a network camera
299(9)
17.1.1 Types of camera
300(1)
17.1.2 Image quality
300(1)
17.1.3 Resolution
301(4)
17.1.3.1 Determining the resolution needed
301(4)
17.1.4 Compression
305(1)
17.1.5 Networking functionality
305(1)
17.1.6 Other functionalities
306(1)
17.1.7 Vendor
307(1)
17.2 Installing a network camera
308(5)
17.2.1 Surveillance objective
308(1)
17.2.2 Use plenty of light or add light if needed
308(2)
17.2.2.1 Use IR light when white light is impracticable
309(1)
17.2.3 Avoid direct sunlight and glare
310(1)
17.2.4 Avoid backlight
310(2)
17.2.5 Lens selection
312(1)
17.3 Protecting a network camera
313(24)
17.3.1 Camera enclosures in general
314(1)
17.3.2 Transparent coverings
315(4)
17.3.2.1 Overcoming the limitations of conventional domes
316(3)
17.3.3 Positioning of fixed cameras
319(1)
17.3.4 Environmental protection
319(1)
17.3.5 Vandal and tampering protection
320(4)
17.3.5.1 Goals of vandal protection
321(1)
17.3.5.2 Mechanical design
321(1)
17.3.5.3 Mounting
321(1)
17.3.5.4 Camera placement
322(1)
17.3.5.5 Intelligent video protecting cameras
323(1)
17.3.6 Mounting types
324(4)
17.3.6.1 Ceiling mounts
324(1)
17.3.6.2 Wall mounts
324(1)
17.3.6.3 Pole mounts
324(1)
17.3.6.4 Parapet mounts
324(1)
17.3.6.5 Special mounts
325(3)
17.3.7 EMC
328(3)
17.3.7.1 EMC standards
329(1)
17.3.7.2 Emission
330(1)
17.3.7.3 Immunity
330(1)
17.3.7.4 Choosing between shielded and unshielded network cables
331(1)
17.3.8 Safety of electrical equipment
331(1)
17.3.9 Environmental ratings
332(5)
17.3.9.1 IP ratings
332(2)
17.3.9.2 NEMA ratings
334(1)
17.3.9.3 IK ratings
334(2)
17.3.9.4 IECEx and ATEX certifications
336(1)
17.4 Storage and server considerations
337(6)
17.4.1 Small system: From 1 to 10 cameras
338(1)
17.4.2 Midsize system: From 10 to 100 cameras
338(1)
17.4.3 Large system: From 100 to 1000+ cameras
338(1)
17.4.4 Federated systems
338(1)
17.4.5 Provisioning the server
338(2)
17.4.6 Calculating storage
340(3)
17.4.6.1 Calculating storage needs
341(2)
17.5 Provisioning network bandwidth
343(2)
17.5.1 Limiting the bandwidth
343(1)
17.5.2 Network and system latency
343(1)
17.5.3 Network cabling
344(1)
17.5.3.1 Tips for better network cabling
344(1)
17.5.3.2 Preparing the network cable
345(1)
17.5.3.3 Certifying the cable installation
345(1)
17.6 Tools for designing systems
345(5)
17.6.1 Calculators and component selection tools
346(1)
17.6.2 Comprehensive system design tools
347(1)
17.6.3 Extensions for CAD software
348(2)
17.6.3.1 SketchUp®
349(1)
17.6.3.2 Revit®
349(1)
17.6.3.3 Visio®
349(1)
17.7 Legal aspects
350(3)
Author 353(2)
Index 355
Fredrik Nilsson is the Global Manager of Axis Communications, Inc., Chelmsford, Massachusetts.