Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
CCTV Digital
Basics
Training Workbook
Security Systems
Table of Contents
About this course ..........................................................................5
Course Prerequisites....................................................................5
Course Map ....................................................................................6
Course Objectives .........................................................................7
How to use this book.....................................................................9
Welcome!......................................................................................10
Unit 1: Defining Digital ................................................................11
Digital vs. Analog .......................................................................12
What is Digital? ..........................................................................14
Video Imagery ............................................................................15
Digitizing .................................................................................15
Sample rate ............................................................................16
Pixel size ................................................................................16
Pixel bit depth .........................................................................16
Bits and Bytes.........................................................................18
Image File Size ..........................................................................19
Review .........................................................................20
Unit 2: Video Compression .........................................................21
Defining Compression................................................................22
Benefits of video compression................................................22
Managing Video File Sizes.........................................................24
Non-compression techniques .................................................24
Video compression techniques...............................................25
Video compression standards ................................................27
Review .........................................................................29
Unit 3: Networks ..........................................................................31
Defining Networks ......................................................................32
The CCTV market...................................................................32
Network basics...........................................................................33
Network building blocks..........................................................33
Basic network types................................................................34
Half-duplex vs. Full-duplex communications ..........................34
Bandwidth...............................................................................35
Converting Bytes to bits..........................................................36
Bandwidth for digital video......................................................36
Network Communications ..........................................................37
Protocol interactions ...............................................................37
Communications handshake ..................................................37
Network protocols ......................................................................38
Ethernet ..................................................................................38
TCP/IP....................................................................................38
UDP........................................................................................39
ISDN.......................................................................................39
DSL ........................................................................................39
Network devices.........................................................................40
Hubs and Switches.................................................................40
Routers ...................................................................................41
Gateways ...............................................................................41
Modems..................................................................................42
Review .........................................................................43
Unit 4 Network Addresses .......................................................47
What are Mac and IP addresses? ..............................................48
IP address standards..............................................................49
Subnets ..................................................................................50
Domain Naming System (DNS)..................................................51
Multicasting ................................................................................51
Firewalls .....................................................................................52
Review .........................................................................53
Unit 5 Network Transmission Medium....................................55
Network Connections .................................................................56
Cabling Specifications................................................................56
Network cabling terminology...................................................56
Categories of twisted pair cabling...........................................58
Fiber Optic ..............................................................................58
Network Interface Card ..............................................................59
Repeaters ..................................................................................59
Review .........................................................................60
Unit 6 Network Pitfalls..............................................................63
Digital CCTV Networks ..............................................................64
Possibilities and Problems......................................................64
Factors for CCTV Network Integration ....................................65
Bandwidth and storage requirements .....................................65
Connectivity ............................................................................66
Connectivity Tests ..................................................................66
Firewalls .....................................................................................68
Communicating with IT...............................................................68
Appendix ......................................................................................69
Course Prerequisites
This is a foundation course and assumes you are familiar with basic analog video technology. The Bosch Security
Systems provides a CCTV Analog Basics Training course that is recommended as a prerequisite to this CCTV
Digital Basics course.
The material and instructions in this document have been carefully checked for accuracy and are presumed to be
reliable. However, Bosch Security Systems assumes no responsibility for inaccuracies and reserves the right to
modify and revise this document.
Course Map
In this course, you will complete six (6) units. The recommendation is to progress
through each unit in sequential order. There is flexibility in the training order for units 3,
4 and 5, but unit 6 requires all previous units be completed before starting this final
section. It is preferred that you complete each unit before moving on to the remaining
ones. However, your instructor may elect to deliver sections in a different sequence to
accommodate the needs of the students or facilities.
Course Objectives
The following are the course objectives for each unit of training.
Describe the different video file formats and their intended uses.
Determine the relationships between image capture, compression type, file size and
record time.
Determine the image capture and compression options for a given need, using a
reference table.
Identify at least 3 potential factors that can impact CCTV connectivity to networks.
Identify and describe how different network components can limit network
communications.
As a learning guide
Each module covers several related topics. Topics are arranged to build upon
previous prerequisite experiences or previous topics. For this reason, you should work
through the topics in sequence. We organized each topic into explanatory concepts.
As a review tool
Any method of instruction is only as effective as the time and effort you are willing to
invest in it. For this reason, we encourage you to spend time reviewing the reference
material.
As a reference
Learn more:
Be sure to return to this book as needed to refresh your skills and to locate point-ofneed information in the field.
Throughout this book you will find icons that represent certain types of information.
Usually, this information is represented as a small, easy to process segment that
highlights or summarizes a training topic. Sometimes, these icons help you quickly
identify point-of-need information. You can review each type of at-a-glance icon in the
right hand column of this page.
Additional Reference:
Margin locators
Throughout this book you will find in the page margins numbers that correspond to the
projected PowerPoint used by your instructor (such as U3-10). These numbers refer
to PowerPoint slide number that show in the lower right corner of each slide. Use
these markers as your guide to help synchronize the proper workbook page to the
projected visual aid.
Demo or Discussion:
Your instructor will lead
a demonstration or a
classroom discussion
that relates to the topic.
Sometimes, you will be
asked to complete an
exercise that relates to
the topic.
Welcome!
Your instructor:
_____________________________________________
Objectives
After completing this unit, you will be able to:
Topics covered
Digital signals
11
Unit 1
U1-5
Cost efficient infrastructure The ability to use existing wired networks or wireless
transmission, opens new areas of access and cost savings for installation. The option
to piggy back onto a preexisting business network system makes expansion easier
and provides for new efficiencies in maintaining and managing the infrastructure.
Remote access & control Any video source can be accessed and controlled
remotely from anywhere in the world over wire/wireless networks. Intelligence of the
camera functions can be established at the camera location (motion detection, event
handling, output type, time/date, etc.).
Lower cost An IP CCTV system can easily leverage from existing network systems,
business support resources, and storage capabilities.
This training will introduce you to the world of digital CCTV, from two main
perspectives: digital components within an analog world, and as all digital systems.
The following table summarized some the differences and benefits between digital
and analog CCTV. Also included are the benefits of a total digital CCTV system.
Unit 1
U1-6
Advantages
8
8
9
9
9
U1-7
Advantages
9
9
9
9
8
8
8
8
8
8
8
Disadvantages
9
9
9
9
13
Unit 1
What is Digital?
U1-9
If we were to digitally
controlling low voltage
within a computer, then
OFF (no voltage) would
be represented by 0
(zero). The normal
operating low voltages
of the computer, say 12
volts, would be ON,
represented by 1
(one). Any voltage
variations would be
digitally rounded to fit
within the ON or OFF
parameters of 12 volts
or 0 volts.
U1-10
Digital communications use such discrete terms as: Pulse Code Modulation, data
communications, and video digital signals of Wavelet, AVI, JPEG, and MPEG.
Analog communications use continuous terms such as: AM and FM modulation,
high fidelity, and video analog wave signals of Y/C and composite.
Unit 1
Video Imagery
A digital camera uses the lens to focus the light from a scene onto a Charge Coupled
Device (CCD) within the
camera. The CCD is an imaging
sensor that captures the scene
light values, and converts this
information into an analog signal
of continuous electrical voltage
levels. This voltage level varies
in proportion to the different
levels of light.
There are different sizes
available for CCD imagers.
Common CCTV imager sizes,
called camera formats are:
(inches): 1/3, , , 2/3 and 1. The
format of the CCD alone does
not determine the image quality.
Other factors need to be taken into account.
Digitizing
Within the CCD, the area of the video image is broken down into small quadrants in
grid-like fashion. Each small grid area is called a Pixel. A Pixel is one picture element,
and is a sensor that is the smallest component that captures the video image. The
number of pixels (sensors) that are on the CCD surface rates the CCD. A CCD with a
greater number of pixels can capture more detailed visual information.
CCD Resolution is
often measured in
megapixels.
Each megapixel = 1
million pixels.
The analog signal that comes from the CCD imager is received by a microprocessor
within the camera, called a Digital Signal Processor (DSP). This microprocessor
converts the analog signal into a digital signal. This Analog-to-Digital (A/D) signal
conversion is called Digitizing.
The quality of the digital image is dependent upon the quality of both the CCD and the
DSP analog-to-digital conversion. Image quality is impacted by three factors:
y
Sample Rate
Pixel Size
15
Unit 1
Sample rate
U1-11
Pixel size
Pixel Size that is on the CCD defines spatial or image resolution. The size of the
pixels are usually counted in pixels/inch or mm. The smaller the pixels, the greater
level of detail captured.
U1-12
Unit 1
Since digital imagery works on the Binary value system (1 or 0 on or off), each Bit
must record the light as either a 1 or 0 value. For a simple pixel depth of one Bit, the
assigned light value can only be a value of either a one or a zero. This digitally
translates into image values of white or black. This 1 Bit Pixel Depth creates what is
often called a half-tone image. Even using only black and white dots, an image can be
created that appears to have different shades of grey by varying the placement of
these black or white dots.
For a bit depth of five, the brightness resolution capability becomes 32 different levels
of brightness that can be created. A bit depth of 8 can yield 256 different levels of
brightness.
U1-13
To create digital CCTV color, the Primary Colors of Red, Green, and Blue are
required. Each color requires its own Pixel and Pixel Bit Depth. If each color uses five
bits, then you end up with a 15 Bit color system. This digital brightness resolution
combines to produce 32,768 different possible colors.
U1-14
17
Unit 1
For a 15 Bit color system, a pixel represents one of the primary colors (RGB). That
pixel can produce one of 32 discrete variations of that color. When one pixel each of
red, green, and blue are next to each other, they create what is perceived as the final
color seen in that one image area (one of 32,768 colors possible).
Bandwidth will be
covered further in
Unit 3 Networks
U1-16
Just as the alphabet is the building blocks of language, bits represent the foundation
of digital information, and are the smallest form of digital data. Bit values are
expressed in binary code fashion of 1s or 0s. When transmitting this digital
information, it is expressed as bits per second (bps). The slowest component in a
network system will determine the speed of data transmission. Large file sizes and a
slow network component (i.e. modem) can create what we all know as a bottleneck.
Video components and medium that transmit this data use bits as their foundation to
express their carrying capacity (bandwidth):
y
Hard-drive: 40 GB
Unit 1
U1-17
For each video frame captured, a video file is created. That file size is dependent
upon the following:
y
Pixel Bit Depth as determined by the Digital Signal Processor (i.e. 8 bit)
Since CCTV video is motion imaging, full multiple images or image files are produced.
The rate of images captured, displayed, or recorded is referred to as Images Per
Second (IPS).
U1-18
Thus for every second of video captured, digital data is being created at a very high
rate. The need to reduce this file size becomes obvious when considering signal
transmission and video file storage requirements.
Reducing digital video signal data file size is called Compression. This is the next
topic in this training workbook.
19
Unit 1
Review
Complete the review questions below. When you are done, review your answers with
your facilitator.
Place either an A (for Analog) or a D (for Digital), before each item below, depending
what you think it best represents.
___ 1) Time consuming video searches
___
11) PAL, NTSC
Fill in the blank
questions or complete
the activity to reinforce
your understanding.
___
___
12) DSP
___
___
13) Bit
___
___
14) VCR
___
___
15) DVR
___
___
___
___
17) Mbps
___
___
___
___
19) Digitize
___
___
______________________________________
b.
______________________________________
c.
______________________________________
2 Bits
3 Bits
____
__4__ ___
4 Bits
5 Bits
_16__ __
6 Bits
7 Bits
8 Bits
__
__
__
Objectives
After completing this unit, you will be able to:
Describe the different video file formats and their intended uses.
Determine the relationships between image capture, compression type, file size and
record time.
Determine the image capture and compression options for a given need, using a
reference table.
Topics covered
Benefits of compression
Compression types
21
Unit 2
Defining Compression
U2-3
U2-4
U2-5
Note: Bandwidth will be
covered in more detail
within
Unit 3 - Networks.
Faster file transfer rates allows for increased flexibility and speed in
sharing and transmitting video data. This reduces transmission bandwidth
requirements.
In CCTV, the key challenge of video file compression is in achieving the proper
balance between file size compression and image quality.
File compression is expressed as a ratio:
Original file size to New file size
(such as 30:1)
Current common CCTV compression ratios are in the range of 15:1 up to 100:1. The
higher the compression ratio is, the greater the file compression. This usually results
in lower image quality.
U2-6
Unit 2
Table 2.1 shows different video file sizes resulting from different levels of file compression and image capture
rates. This information is also shows how much recording time is possible based upon these variables and the
memory storage size.
Table 2.1 File size and recording times
Hours of recoding by hard drive size:
Video File
File Size
Type
(per image)
30 GB
75 GB
150 GB
240 GB
640 GB
No Compression Color Video (460 TVL) = 650,000 Bytes (65 KB)
39,000,000
At 60 IPS
0.21
0.53
1.07
1.71
4.56
(39 MB)
13,000,000
0.64
1.60
3.21
5.13
13.68
At 20 IPS
(13 MB)
3,250,000
At 5 IPS
2.56
6.41
12.82
20.51
54.70
(3.2 MB)
650,000
12.82
32.05
64.1
102.56
273.50
At 1 IPS
(65 KB)
Low Ratio Compressed Color Video (High resolution) = 30,000 Bytes (3 KB)
1,800,000
At 60 IPS
4.63
11.57
23.15
37.04
98.77
(1.8 MB)
600,000
13.89
34.72
69.44
111.11
296.30
At 20 IPS
(60 KB)
150,000
At 5 IPS
55.56
138.89
277.78
444.44
1,185.19
(15 KB)
30,000
277.78
694.44
1,388.89
2,222.22
5,925.93
At 1 IPS
(3 KB)
Medium Ratio Compressed Color Video (Standard resolution) = 15,000 Bytes (1.5 KB)
900,000
9.26
23.15
46.30
74.07
197.53
At 60 IPS
(90 KB)
300,000
At 20 IPS
27.78
69.44
138.89
222.22
592.59
(30 KB)
75,000
At 5 IPS
111.11
277.78
555.56
888.89
2,370.37
(7.5 KB)
15,000
At 1 IPS
555.56
1,388.89
2,777.78
4,444.44
11,851.85
(1.5 KB)
High Ratio Compressed Color Video (Low resolution) = 7,000 Bytes (0.7 KB)
420,000
19.84
49.60
99.21
158.73
423.28
At 60 IPS
(42 KB)
140,000
59.52
148.81
297.62
476.19
1,269.84
At 20 IPS
(14 KB)
35,000
At 5 IPS
238.10
595.24
1,190.48
1,904.76
5,079.37
(3.5 KB)
7,000
1,190.48
2,976.19
5,952.38
9,523.81
25,396.83
At 1 IPS
(0.7 KB)
23
Unit 2
Reduce the Frame Size of the video frame itself. A 320x240 image is the
digital file size of a 640x480 video image. This requires no file compression
algorithms.
Reduce the image per second (ips) captured and/or recorded. With 20 ips
you create 1/3 the digital file size that 60 ips generates. No file compression
algorithms are used.
Unit 2
U2-7
Lossy Compression
Data compression
techniques that results
in some data loss
through the elimination
of redundant or
unnecessary
information. Most video
compression
technologies use this
type of compression.
Video compression engines can perform file compression tasks in the following ways:
y
Lossless
Compression - Data
compression in which
no data is lost. For
most types of data, this
technique can reduce
files by only 50% (2:1).
Lossless compression
is used for
compressing raw data
and computer
programs.
U2-8
U2-9
Intra-frame
compression has the
advantage of providing
easily retrievable, high
quality video frames.
One method is to use blocks of pixel data (i.e. 8x8 pixel groups), which are
statistically analysed for pixel value similarities or redundancies. These pixel data
similarities are then converted to a new digital value for this block area. For scenes
with broad expanses of similar color/detail (i.e. blue sky), great compression results
are achieved with very little image degrading.
Even in image areas with lots of detail, there are still pixel levels with color or
background redundancies that can be compressed with little loss of image detail. As
compression ratios are increased, this repeated blocking together of pixel data for
analysis and compression will eventually negatively impact image quality. This will first
be notice where contrast edge lines exist, and in areas of fine detail
25
Unit 2
U2-10
Inter-frame
compression can
obtain 100:1
compression in minimal
motion scenes, such as
in a static warehouse.
U2-11
Inter-Frame Compression accounts to the sequence of video frames. For this multiframe compression to work, the data from previous frames is needed. The algorithm
captures periodic reference frames (i.e. every 1/2 second) and looks for only the
differences within successive frames, which are then captured and stored. This
compression technique takes advantage of the fact that any given video frame is
probably very similar to the frames around it. (Also known as temporal or conditional
refresh compression.)
Unit 2
U2-12
CIF Common
Intermediate
Format
This is a part of
H.261 video
conferencing
standards.
H.221 Sets standards for multiplexing audio, video, data and control
information.
H.261 Describes video coding and decoding methods and file compression
techniques. Similar to MPEG compression (not compatible), but it varies in
that it trades picture quality against motion. Thus, motion images will have
lower quality than static images. This function optimizes bandwidth by having
a constant bit rate encoding (vs. constant quality and variable bit rate
encoding.) The compression will always be in multiples of 64 Kbps (for ISDN)
JPEG This is an Intra-frame lossy standard, designed for the effective storage of
individual frame data. Compression ranges of 5:1 to 25:1 will produce little visible loss
in image quality. With greater compression rates (up to 40:1) quantization artifacts
become visible. While JPEG does not include any transmission standards, it is a good
standard for individual frame compression. It produces a compromise between image
quality and storage requirements. JPEG was created by the Joint Photographic Expert
Group and is an ISO industry standard.
M-JPEG Also called Motion JPEG, this uses the single frame JPEG compression
technique and applies it to the sequence of video frames. M-JEG is widespread in the
security industry because of the ability to access individual frames as needed.
Because MJPEG does not take into account relationships between multiple frames,
the video compression rate is not as great as other standards (i.e. H.320/H.261 and
MPEG). M-JPEG is not internationally standardized.
U2-13
U2-14
MPEG This term has evolved to represent a family of digital video lossy
compression, which uses both the intra-frame and inter-frame algorithms standards
and file formats. This family of standards includes MPEG-1, MPEG-2 and MPEG-4.
MPEGs were created by the Moving Pictures Expert Group and are ISO industry
standards.
MPEG-1 This was originally created for the storage of video onto CD-ROM media.
This standard is slightly below the quality of VHS. MPEG-1 not only defines a
compression standard, but also a resolution and transmission standard. Video
standards are a resolution of 352x240 pixels at 30 frames per second (fps), with a
preferred data transmission rate of 1.5 Mbits/s. These were selected because they are
the standards for uncompressed audio and popular MP3 audio files. MPEG-1 is
compressed in non-real time and decompressed in real time. Compression rates of
30:1 are typical, with compression up to 100:1 for low motion video.
27
Unit 2
MPEG-2 This version was created specifically for digital TV. The compression of
video uses both the intra-frame and inter-frame algorithms. MPEG-2 provides a
number of quality options (called profiles and levels), which allows for professional
video transmission rates up to 15 Mbits/s. Video resolution standards of 720x480 and
1280x720 at 60 fps, along with full CD quality audio are specified. MPEG-2 also
provides support for video interlacing, thus meeting standards for broadcast TV,
NTSC, HDTV, and DVD-ROMs. Encoding (compressing) video into MPEG-2 data
requires significant computer processing power. Decoding (decompressing) the
MPEG-2 data stream needs only modest computer processing.
U2-15
U2-16
U2-17
Compression
Type
MPEG 1
MPEG-2
MPEG 4
Wavelet
y Wavelet &
Inter-frame
y Wavelet &
Inter-frame
y Wavelet &
Inter-frame
y Wavelet
Intra-frame
y Conditional
Refresh
y Conditional
Refresh
y Conditional
Refresh
y Full Frame
Refresh
y Lossy
y Lossy
y Lossy
y Lossy
M-JPEG
H.320/261
y Intra-frame
y Inter-frame
y Full Frame
Refresh
y Conditional
Refresh
y Lossy
y Lossy
Typical
Compression
(same quality)
30:1
to
100:1
20:1
to
100:1
20:1
to
300:1
15:1
to
300:1
15:1
to
25:1
20:1
to
100:1
Bandwidth
Requiremts
1-3 Mbps
5-15 Mbps
0.5-4 Mbps
1-4 Mbps
10-26 Mbps
20 kbps 2 Mbps
Compression
Strengths
Data storage
&
Transmission
Products
HiQ
(MPEG-2)
Web
Data storage
Image quality Image quality Data storage
streaming,
&
&
&
&
video phone &
Transmission
Image retrieval Image retrieval Transmission
data storage
VideoJet
VideoJet,
DiBos 8
NetCam2,
Divar
Eazeo,
VideoJet,
DiBos
(JPEG)
Unit 2
Review
Complete the review questions below. When you are done, review your answers with
your facilitator.
Fill-in the blanks for the following statements:
1. The process of taking digital file data and reducing the file size is called:
______________________________________________________________ .
2. __________________________ are used to perform numerical calculations that
solve repetitive mathematical problems.
3. A wide variety of computer software tools exist on the market designed to reduce
29
Unit 2
Match the following video compression standards to the descriptions below. Write the
terms in the blank spaces provided.
Video Compression
Standards
14. _______
15. ______
16. _______
17. _______
18. _______
19. _______
20. _______
JPEG
MPEG
H.320
M-JPEG
MPEG-1
H.261
WAVELET
MPEG-2
MPEG-4
Unit 3: Networks
Objectives
After completing this unit, you will be able to:
Topics covered
31
Unit 3
Defining Networks
The CCTV market
In the marketplace of security, CCTV video is rarely the only protection component
within the system. The CCTV camera often supplements other security and safety
functions such as: access control, intrusion detection, fire protection, and intercom
communications. For security/safety management and cost control reasons, most of
these diverse signals are sent to centralized monitoring and control centers.
Bosch Security
Systems provides a
total integrated product:
Business Integration
System (BIS)
The great diversity of safety devices and their signals transmitted often creates
obstacles to streamlined, cost effective system integration. Proprietary designs and
the lack of a single standard of such diverse systems usually results in parallel data
transmission links, each with their own receiving components. Customer demand and
competition has also expanded this safety net function to include building energy
management tasks, such as HVAC and lighting. IT network infrastructures are
becoming more important in achieving a single integrated, low cost, system that can
incorporate visual and access security, fire safety, and building management
functions.
Digital technologies and computer networked system standards represents the most
logical solution to such system diversity. The potential to not only integrate signal
data, but to also decentralize the collection and monitoring locations opens new
opportunities in creating system designs. The impact of digital networked
security/safety/building systems effects component designs, system connectivity,
communications, and even the business model for staffing and managing such
functions.
For CCTV to be a part of this industry evolution towards a computer networked
infrastructure, a digital video signal is required. As reviewed in Unit 2, compression of
that video signal is necessary for efficient and practical signal transmission, data
storage, and archiving purposes. This also requires a fundamental understanding of
network systems and their communication protocols.
The evolution of enterprise class security systems allows for interconnection of
multiple facilities worldwide. Video transmission is now possible through telephone
lines (telco), a wide variety of corporate IT network systems, and the internet.
U3-3
A number of factors are to be considered when integrating digital CCTV into any
network system. These include:
y
Unit 3
Network basics
Networks are designed for sharing. With the wide variety of network systems that
exist, some fundamental guidelines must be observed in order to effectively share
information, devices and resources.
Most analog CCTV systems are Closed Circuit, having their own dedicated network
system. One way of going beyond this dedicated closed circuit video network design
is to integrate it into an existing network system. Digital CCTV systems can make use
of a variety of network systems. These are some basic systems that might be used.
y
Local Area Network (LAN) Computer systems that may be at single office
site. LANs can have different designs and configurations.
Network Interface Card (NIC) This circuit board inside computers is designed
for network communications. The digital signals generated by computers are too
low of a voltage for transmitting. The NIC card boosts these signals and properly
packages this data for transmission through the network. It also acts as a
gatekeeper to control access to the network cables.
Network Peripherals A term that describes devices that are a part of the
network, but are not computers or servers. These can include printers, modems,
memory storage devices, and signal control components. These components
have a special processor that allows them to interface with all serves (or
sometimes clients) on a system. Thus a Macintosh and a PC can both use the
same device.
Topology The
schematic description
of a network design.
U3-4
33
Unit 3
U3-5
A server can be set up
as both a client and a
server. As a client, it
will have the ability to
use other computer
resources.
U3-6
Point-to-point
network The most
basic type of network
design that has a
direct connection
between two
computers only.
These are basic
systems, inexpensive
to install, and provide
full cable capacity.
Unit 3
Bandwidth
Bandwidth can have two different meanings within the CCTV environment. This
depends upon if you are referring to the bandwidth or carrying capacity of a digital
network medium, or the frequency of an analog electronic signal (analog video/audio).
U3-7
Transmission Rate or
Throughput are terms
used most often by the
IT world, instead of
bandwidth.
Frequency the
number of cycle
changes per second.
This is measured in
Hertz. An analog term.
A typical analog TV broadcast video signal has a bandwidth of 6 MHz. A cable system
bandwidth occupies 50 to 300 MHz.
35
Unit 3
U3-8
U3-9
There are 8 bits in every Byte, so multiply the Byte file size by 8.
15,000 Bytes x 8 = 120,000 bits (120K)
Bandwidth will be
covered further in
Unit 5 Network
Transmission Medium
U3-10
Example: To calculate a video signal compressed to 15 KB digital file size, and the
scene is captured at 30 images per second, the network bandwidth requirements for
this signal is:
15,000 x 8 x 30 = 3,600,000 bits/sec (3.6 Mbps)
Normal network communication traffic will consume some of the available bandwidth
capabilities of a system. Network managers design in a buffer to account for this
ongoing traffic. Approximately 65% of a network specified bandwidth is usually
available for data traffic, such as video transmission.
Use the camera(s) bps value(s) to determine how many CCTV connections can be
put into a given bandwidth of a video only network.
Example using 3.6 Mbps in video output per camera:
100 Mbps network connection x 65% available = 65 Mbps (bandwidth)
(100,000,000 x 0.65 = 65,000,000 bps)
Network bandwidth / camera bit output
65,000,000 / 3,600,000 = 18 camera connections
Unit 3
Network Communications
If networks are designed to share, then there must be guidelines for operation.
Network standards are rules that describe how things should be. Usually these are
minimum technical requirements that relate to such things as cable specifications,
transmission requirements, hardware component design, interface requirements, file
structure, and software performance.
Protocol interactions
Protocols are sets of rules or standards that controls or enables the connection,
communication, and data transfer between two computing destinations. How a wide
variety of different computers on a network can communicate with each other requires
that they use a common network language. Computers must follow specific
communication protocols to assure this takes place.
Networks use specific communications techniques to share information. There is
continuous communications on networks for the purpose of diagnosing the status and
health of connections, traffic volume, and availability of devices. Much of the invisible
activity of network communications has very little to do with task of moving data from
one point to another, but with the status check of the system.
Whenever data is transmitted through a network, it needs to be reduced into signals
that are native to the language of that network. The computer sending data uses a
network interface to convert its binary data into the language code of that network (i.e.
Ethernet). The data is broken up into packets for sending. The computer(s) on the
receiving end of this transmission must decode and reassemble the received packets,
putting it back into the correct binary code order that is used by its own operating
system (i.e. Window NT).
Communications handshake
Much of the communications traffic that goes across a network is not the actual data
being shared or passed on. The task of the network operating system software is to
continuously inform other applications and users about network status, routing
information and system availability. This is the general network traffic that system
administrators have reserve about 35% of the network bandwidth.
When communications is initiated on the network between two computers, an initial
handshake is required. This communications handshake or package header is sharing
this type of information:
Network Handshake
U3-12
Handshake Response
I am 161.88.162.12 IP address
(nickname training room)
I am a client PC
I am in a subnet of network
161.88.160.10
U3-11
37
Unit 3
Network protocols
U3-13
As you learned earlier, protocols are sets of rules or standards that controls or
enables the connection, communication and data transfer between two computing
destinations. Since there are a wide variety of network types, there also is a wide
variety of network communication and design protocols. Some of the more common
network protocols are described below:
Ethernet
This network suite of protocols is one of the most widely installed LAN technology
standards. Ethernet standards apply to the hardware connectivity, software interface
operating system, and transport medium. It is baseband signalling and usually uses
the star network or tree topology.
The transport medium often used is coaxial cable, or specified grades of twisted pair
wire. Wireless LAN systems can also use Ethernet. Devices compete for network
access, sending a frame (like a packet) of data at a time. It uses a collision detection
protocol, which detects when frames collide on the network. When this occurs, new
replacement frames of data are re-sent on a random access time setting.
Ethernet bandwidth is specified at 10 Mbps (called 10BASE-T). A Fast Ethernet
standard exists specified at 1000 Mbps (1000BASE-T) otherwise known as Gigabit
network/Ethernet. This is typically used for the network backbone.
TCP/IP
This suite of communications protocols is the most widely used in the world. It is the
communications basis not only for the internet, but also many private corporate
networks and in Extranet systems.
Extranet A network
system that uses both
private and public
networks. There are
parts that are open to
the public, and other
network components
that are secure,
encrypted, and
password protected.
Web banking services
are on Extranet
systems.
Unit 3
UDP
UDP (User Datagram Protocol) is a communications protocol that uses IP and is an
option to the TCP protocol. It offers a limited amount of service in that it does not
divide the message into packets and reassemble it at the other end (called datagrams
in UDP). Separate computer programs that use UDP must take on the function of
checking that all the data has been received and is in the right order. Since UDP has
less communication rules to follow (no checking of transmissions), it reduces the
network communications traffic, thus reducing network bandwidth requirements. UDP
is good when communicating very small data packets (like alarm codes).
ISDN
ISDN (Integrated Services Digital Network) is a protocol for digital transmission
over the telephone network, often referred to as POTS (Plan Old Telephone Systems)
It uses the existing telephone lines and required no additional wiring to be run. Voice
and data packets are integrated on the lines using different frequencies to transmit
information simultaneously. An adaptor is required on both ends of the transmission
line, and if on a shared network, an ISDN router is needed. The ISDN configuration
can deliver between 128 Kbps to 384 Kbps. (vs. 56 Kbps modem rate). ISDN are
usually used on WAN telephone networks.
UDP is the
communications
protocol use in the
Bosch Business
Integration Systems
(BIS) product.
U3-14
ISDN is distance sensitive, a factor that impacts transmission rates. The network
range is up to 18,000 ft or 3 miles (5.5 km) without a repeater in use. Since it is a dial
up service, cost of usage will depend upon connection time. ISDN is good for remote
access use: were ever transmission of circuit data or switching data is needed; or
backing up dedicated private lines or LAN-to-LAN connections in case they fail.
Multiple channels (B & D) are setup for transmission. Two B channels at 64 Kbps
each can be segmented (2 to 30), which are used for data, voice and other services.
The single 16 Kbps D-channel carries the control signal information. This protocol is
loosing popularity where higher speed cable modem and DSL network options exists.
DSL
The DSL (Digital Subscription Line) is similar to ISDN service in that it provides
voice, video and data packets in a digital connection over POTS networks. Where it
differs from ISDN is that it is an always on service and has higher transmission
rates. There are two basic types available, depending upon the provider: Symmetric
DSL (SDSL) and Asymmetric DSL (ADSL). The SDSL uses upstream and
downstream capacity to carry data in both directions. ADSL delivers higher speed
downstream and slower speed upstream. For video downloading, ADSL will provide
faster transfer rates. These transmission rates range from 128 Kbps (upstream) to
1.54 8 Mbps
downstream. This
can enable
continuous video
transmission. DSL
is distance sensitive
(18,000 ft or 3 miles
5.5 km, without a
repeater). This can
also be extended by
integrating this local
loop with a fiber
optic network
connection.
Since the service is
always on, the
usage cost will be
fixed.
39
Unit 3
Network devices
Computer network systems are connected and expanded by using a number of
hardware devices that are used to help control network traffic and route it to the
proper destination(s). These are defined here:
U3-15
U3-16
A Switch, like a hub routes data to different nodes. But it does so by reading the
specific IP addresses. The Switch has the capability to read the packet destination IP
address and forward that data only to the correct port(s). The destination IP address
needs to be within the same network group or domain.
Both hubs and switches support any type of packet protocol.
Unit 3
Routers
These are devices that forward data packet to different networks by reading the
destination IP addresses (header) of the packet. Routers are connections between at
least two different network systems (i.e. LANs, WANs, internet) and are located with
gateways the network connection points.
U3-17
The router uses the header data and programmed tables to identify the best path to
forward the data packet to its destination. They use communication protocols (i.e.
ICMP) to communicate with each other and for configuring the best transmission route
between two hosts. Routers do very little filtering.
Gateways
These function as nodes on network and act as an entrance point to other networks.
On large enterprise network systems, the gateway often acts as a proxy server and a
firewall. They also allow different network protocols to interface with each other.
Gateways route the traffic from its own network system to the outside network (i.e.
internet). For home computers, the Internet Service Provider (ISP) performs the
gateway function.
U3-18
The gateway is associated with both a router, which forwards the data packet
according to header data and forwarding tables, and the switch, which provides the
actual path for the packet in and out of the gateway.
41
Unit 3
Modems
Modem is short for modulator/demodulator. They perform the conversion of analog
signals to digital data and digital data to analog signals. Modems can be an internal
board in a computer, or an external component. If external, it often uses a RS232
connector.
At lower data transfer rates, the modem communication protocol to format the data
almost universal. This allows most modems to communicate with each other. At high
transmission rates, more proprietary protocols may exist.
Modems have characteristics that can allow for some configuring options. A
communications software package usually comes with the modem to setup the
following functions:
Bps This is the data transfer rate. At very slow rates, modems are measured in
baud rates (i.e. 300 baud = ~25cps). At higher rates, they use the bps term. Common
transmission rates are 2.4 Kbps, 2.8 Kbps, 56 Kbps up to about 128 Kbps. The data
transfer rate between modems is only as fast as the slowest modem.
Data compression Some modems perform compression techniques to increase
data transfer rates. The modem on the receiving end needs to be able to decompress
the data packet using the same compression technique.
Flash memory This allows for updating the communications protocols. If it doesnt
have flash memory, then it will be using conventional ROM, which can not be
modified.
Unit 3
Review
Complete the review questions below. When you are done, review your answers with
your facilitator.
Match the network type provided below to the proper description for the following 7
questions. Write the word in the blank provided.
Internet
ISDN
LAN
Client/Server
Peer-to-Peer
Point-to-Point
WAN
POTS
ASAP
1. ____________________
directly to each other through a single cross-over cable. This is the most basic
form of computer networking.
2. ____________________
interconnected together.
3. ____________________
its capabilities with the others, acting as either a client or a server. These are
generally small network systems.
4. ____________________
office site. There can be a wide variety of network designs used to meet this
need.
5. ____________________
computer(s) that function as a resource and connection point for the other
computers on the network. The peripheral computers can communicate to each
other through this main computer and use its other resources.
Calculate the following:
7. An 8 bit digital processor produces a digital file that is 30 Kbytes in size. How
many bits is that?
_____________________________________________.
8. A digital camera is capturing images at 20 ips. The 8 bit processor produces a
10 Kbyte file. What is the video bandwidth for this camera?
____________
9. The previous camera bandwidth is connected to a digital network system that has
a total bandwidth of 10 Mbps. Assuming 65% network speed availability. How
many total CCTV cameras can be connected to this network? ______________
43
Unit 3
Match the terms provided below to the proper description. Write the word in the blank
provided.
Ethernet
Handshake
Half-duplex
ISDN
Hub
Full-duplex
UDP
Gateway
Frequency
TCP/IP
Switch
Bandwidth
DSL
Router
Analog
Protocols
Modem
Digital
bps
ips
packets
10. When signal transmission between two computers can travel in only one direction
at a time is called: __________________________ communications.
11. The data that is packaged into small units for network transmission is referred to
as data __________________________________________.
12. Digital bandwidth in measured in _________________________________.
13. The number of cycle changes per second and is measured in Hertz refers to the
_______________________ of an analog signal.
14. The ______________________ bandwidth is determined by the difference
between the highest frequency and lowest frequency of a signal.
15. ___ _________________
and communications.
16. _____ _______________
network design, and software interface standards and options. It is one of the
most widely used LAN protocols.
18. ___ _________________
widely used in the world, such as on the internet and most business networks. A
two layered protocol defines how to assemble data into packets for transmission,
and how those packets are addressed for proper routing.
19. ___ _________________
network system. It offers high transmission rates and its network connection is
always on. One of its transmission options provides for an asynchronous
connection that allows for a good continuous video connection.
Unit 3
20. ____________________
packaging small amounts of data into datagrams. Since it does not perform
checks for transmission success, transmission of basic data is faster and requires
less bandwidth.
21. ____________________
and is the entrance/exit point to other networks. They route traffic from its own
network to outside networks, and often will incorporate a firewall.
22. ____________________
packet destination IP address and forwarding that data to the correct port(s). The
destination needs to be within the same network group or domain.
23. ____________________
26. B: ____________
27. C: ______________
28. D: _______________
29. E: ____________
30. F: ______________
45
Unit 3
There is no content on this page, except for this sentence.
Objectives
After completing this unit, you will be able to:
Topics covered
Subnets
Multicasting
Firewalls
47
Unit 4
00:A0:C9:A1:34:12
The prefix 00A0C9 indicates Intel Corporation
Every device that communicates over a network system requires an IP address
(Internet Protocol). The IP address identifies that device and is a unique to that
component. It is specified as a 32 bit address configuration. This is the actual address
that the network uses to identify the various components on the network. It is their
mailing address.
U4-4
120.160.114.233
The IP address functions as the software address, verses the MAC address being a
hardware address. The IP address can change as the network device moves from
one network to another, or randomly assigned when the device logs-on the network.
The MAC address is usually fixed to that particular network device. A mapping
process is used to correlate the MAC addresses to the IP addresses on network
systems.
The 32 bit IP address standard provides the communications address for all
components on any network. IP addresses are assignment in one of two ways:
U4-5
Unit 4
Dynamic IP addresses are usually used for
LAN and WAN system designs. A bank of IP
addresses reside within the organization or
Internet Service Provider (ISP for the internet,
like AOL). The IP address is randomly
assigned to that users node when they log
onto the network. When the user logs off, the
IP address is returned to the network bank for
use by others as needed.
U4-6
IP address standards
IP addressing specifications (protocols)
require that each system attached to an IPbased network be assigned a unique 32 bit
address value. This address is a two level
hierarchy system for identification. The first part of the internet address value identifies
the network. The second part of the IP address identifies the specific machine (host)
on that stated network.
Two Level IP Address Hierarchy
Network Number or Prefix
U4-7
IP address values
146.10.34.3
There are five basic classes for IP address values. They reflect the type and size of
the network. The first octet values of the IP address identify the network class. These
IP classes are:
Class
Type
Network Types
Class address
range
U4-8
Class A
Class B
U4-9
Class C
U4-10
Class D
Class E
49
Unit 4
There are groups of special IP address classes specified for internal private use
only. These address standards are NOT routable on the internet.
y
The following are reserved IP addresses used for the stated purposes:
y
Subnets
U4-11
As the use of both the internet and corporate networks grew, the existing two-level IP
addressing hierarchy became strained in meeting the diverse needs efficiently.
Without subnets, if an organization that had multiple sites or internal networks, it
would be required to have multiple connections to the internet. Each corporate site
network (LAN) would require its own internet IP address.
Subnets were introduced in 1985 to address these shortcomings. This added another
level of hierarchy to the IP addressing structure to the three IP classes (A, B, C). The
standard host number was divided into two parts: a new subnet number, and the host
number on that subnet.
2 Level
Network Number or Prefix
Host Number
Hierarchy
3 Level
Hierarchy
U4-12
Subnet Number
Host Number
The subnet structure is not visible outside an organizations private network. From the
outside (internet side), the
prefix numbers are the same
for that organization. But with
the internal subnets, an
organization can have
different routers to support
different business needs.
This allows them to add a
new level of complexity to
their private IP address. With
subnetting, an organization is
free to deploy additional
subnets (LANs) to their
network without obtaining a
new network number from
the internet.
The subnet mask is part of
the IP address for that
subnet number. It is a series
of numbers (1 and 0) that
tells the organizations
gateway server which numbers to look at underneath the mask. This will provide the
routing address for the companys internal subnet (LAN routing). Subnet masks are
designated by the IP class:
y
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
Unit 4
U4-13
U4-14
Multicasting
In analog CCTV systems, a video signal could be connected to more than one
receiver. Typically the camera is connected to a monitor for viewing, and in parallel, to
a DVR/VCR for recording. The video could also be fed into a matrix or a transmitting
unit. If the signal requires a larger distribution, then amplifiers are used.
Digital networking allows for different distribution methods of the data packets. These
include: Multicast, Unicast, Broadcast, and Multi-unicast. These are briefly explained
below:
Multicast The data
packets are copied and
those single copies are sent
to specific nodes on the
network using a multicast
(Class D) IP address. The
single copies of data
packets are replicated on
the network on an asneeded basis. Only those
nodes that need the data
will receive it. This is helps
maintain network efficiency.
The number of viewers has
no impact on the camera
nor network bit rate
demands.
51
Unit 4
The efficiencies of multicasting allow for new possibilities in digital CCTV network
system designs. By proper selection and use of video compression techniques,
coupled with multicasting signal distribution, the access of video on most digital
network systems becomes feasible
U4-16
U4-17
Unicast Individual data packets are distributed to each node within a designated
group. For small groups this is easy to implement, but has significant restrictions as
the receiving group grows. Since each node gets its own data packet, the network is
required to carry the packets times the number of receiving nodes. This quickly uses
up bandwidth for the same information.
Broadcast The data packets are copied and those single copies are sent to all
nodes on the network system by use of a broadcast IP address. The single copies of
the data packets go out to all nodes on the network system even those not
needing/requiring the information. This can create unneeded network traffic,
especially if only a small number of users actually need the information.
Multi-unicast This is similar to multicasting, but uses one connection. It functions as
multiple, single users receiving data. I does not require special network equipment
and is limited to the number of users that can be connected to (~5).
U4-18
Firewalls
A firewall is both hardware and software with the function of providing controlled
access into or out of a network system. On the network is a designated gateway
server that acts as an entrance point to a private network. A software program is
installed on the server, which acts as a screening tool for network communications in
and/or out of that network.
The function of the firewall is to protect the private network from outside users and
other networks. It can also control what outside resources and data the internal users
have access to.
Firewalls are the first point of contact into a private network from other networks. This
gateway server and firewall represents the domain IP address for that network. The
server receives the data packets and reads the header information. The server,
working with the network switcher, will forward the incoming data packets to the
appropriate computer node on the network.
There are a number of screening methods that firewalls can employ to limit or restrict
network access, either in or out. Simple tools can use acceptable domain names
(previously approved IP addresses) for access. Other techniques are to skim the data
packets for virus content. Another method of control is by setting threshold levels for
data transfers. Firewalls not only control network access, but can also log network
usage, and provide alarm signals for network overloads or virus attacks.
U4-19
The gateway server provides a set number of access communication ports in and out
of the private network environment. The level of access through these ports can be
customized. Some ports may allow only password access or allow for only encrypted
data. Other ports may only allow one way data flows (i.e. out from, but not into the
network).
Firewalls are essential tools in maintaining the integrity and reliability of a network
system. For a CCTV provider working within a network environment, the awareness of
a firewall is important. Interface early with the IT administrator to understand the level
of access through any firewalls and the bandwidth limitations of both this gateway
server and the network system in general.
Unit 4
Review
Complete the review questions below. When you are done, review your answers with
your facilitator.
Match the network terms provided below to the proper description. Write the word in
the blank provided.
Subnet mask
Muliticast
Network number
DNS
Dynamic IP address
Host number
Gateway server
IP address
Domains
Firewall
Subnets
MAC address
Class A
Class C
Broadcast
1. ____________________
number that identifies it. This number is referred to as the hardware address
when connected to a network.
2. ____________________
used by a node when it logs onto a network. This address is returned to the
database to be used again when the node logs off the network.
3. ____________________
the domain.
4. ____________________
for small networks (<254 devices). The first three octets of the address identify
the network and the assigned decimal ranges are 192 223.
6. ____________________
for large networks. The first octet of the address identifies the network. This class
represents the largest percentage of IP addresses available.
7. ____________________
addresses within organizations. They are not seen outside the local network.
8. ____________________
to lookup and identify domains by either the IP address or the domain name.
9. ____________________
networks. For video data packets, they are replicated as needed by the network
and the number of viewers do not impact the bandwidth needs nor camera ips.
10. __ _________________
main domain IP address. This allows LANs to route data to internal IP addresses
53
Unit 4
12. ___ _________________
network, whether they need to receive the data or not. For video data packets,
they are replicated as needed by the network and the number of viewers does not
impact the bandwidth needs or camera ips.
13. _____ _______________
Objectives
After completing this unit, you will be able to:
Topics covered
Transmission characteristics
55
Unit 5
Network Connections
By definition, the type of network establishes the foundation of protocols (standards)
to be met for defining that network. This establishes the type of communications
language used, the network topology, and the requirements for the interconnectivity of
all components (cables, connectors, termination, bandwidth, etc.)
The integration of CCTV into other existing network systems means that the video
signals will no longer be traveling down their own exclusive, dedicated cable systems.
CCTV signals will be sharing bandwidth and resources with other network traffic.
Understanding the capabilities and limitations of different network mediums is critical
for the CCTV service provider. It is important that the CCTV support person effectively
interfaces and
communicates with
those supporting this IT
network infrastructure.
In most companies, this
will be someone within
the IT department.
In early network
designs, most business
environments were
wired with Bus topology,
using what is called
thinwire or thickwire
Ethernet. Devices were connected using coaxial cables and a BNC style T-pieces. All
devices shared the same bandwidth. If a connection was broken, then all devices
connected to that same trunk went down. This design used 10Base2 cabling.
Bus topology is rarely used today, with preference for efficiency, speed and
connection design redundancy going for star topology, 10Base T, or 100BaseTX
Ethernet protocols.
Cabling Specifications
Network cabling terminology
Ethernet cables are designed to support Ethernet communications and protocols for
computers connected together on LAN systems. 10Base-T is the most popular type of
Ethernet cable, which uses four sets of unshielded twisted pairs (UTP) wire (8 wires
total).
U5-3
Ethernet protocols allow for a wide variety of cable types and connector types. The
different types of cable options include: CAT 2, CAT 3, CAT 5, CAT 5E, CAT 6,
coaxial, fiber optic, RG6/11, triaxial, Type 1, and twisted pair. Ethernet can carry a
wide variety of data, including video, audio, network data, and telecommunications.
Ethernet cabling is specified by bandwidth, carrying distance or specifications, and
material type. The cable description follows this format:
Unit 5
The following table represents the Ethernet cable types and their specifications.
Cable
Type
U5-4
Material
Type
10Base2
10 Mbps
670 ft
185 M
10Base5
10 Mbps
1640 ft.
500 M
Thick Coaxial
BNC (ThickNet)
10BaseT
10 Mbps
328 ft.
100 M
10Base-F
10 Mbps
6000 ft.
2 KM
Fiber Optic
10BaseFL
10 Mbps
1640 ft.
500 M
100BaseT
100 Mbps
328 ft.
100 M
100BaseTX
100 Mbps
328 ft.
100 M
UTP/STP CAT 5
(2pairs)
(Fast Ethernet)
100BaseFX
100 Mbps
6000 ft.
2 KM
1000Base-T
1 Giga bps
328 ft.
100 M
1000Base-LX
1 Giga bps
6560 ft.
2000 M
Fiber Optic
(1300 nm wavelength)
1000Base-SX
1 Giga bps
Fiber Optic
(850 nm wavelength)
57
Unit 5
U5-5
While fiber optic cable can offer faster and longer transmission performance levels,
CAT 5 and 5E cables are more prevalent within most business network systems.
Category
Maximum
Data Rate &
Frequency tested
Usual Application
CAT 2
4 Mbps
CAT 3
16 Mbps
10 MHz
CAT 4
20 Mbps
20 MHz
CAT 5
100 Mbps
1000 Mbps (4 pair)
100 MHz
CAT 5E
1000 Mbps
100 MHz
CAT 6
250 MHz
CAT 6E
10 Gbps
625 MHz
CAT 7
600 MHz
U5-6
Fiber Optic
U5-7
U5-8
U5-9
Fiber optic cabling consists of a center glass core, surrounded by several layers of
protective materials. It transmits pulsating light beams verses the electrical signals
sent through copper wire. Because this transmits light, it is immune to electrical and
RF interference.
Fiber optic has the ability to transmit more data, at faster speeds and over greater
distances than either coaxial or twisted pair cabling. The cost of fiber optic cable has
come down in recent years, making it competitive to copper wire. It is more fragile and
requires special skills and tools to modify and install.
Unit 5
Repeaters
Network protocols define the network standards and capabilities. While cables have
limits in
transmission
distances, a device
called a repeater
allows the network
transmission to
expand beyond
these medium
distance
specifications.
Repeaters in digital
communications are
a device that
receive the digital
signal, removes
unwanted noise,
and regenerates the
signal so it can be sent further on the network system. For electromagnetic binary
data, this is in the form of a voltage being present or absent (on or off). For fiber
optics, this would be in the form of light impulses.
59
Unit 5
Review
Complete the review questions below. When you are done, review your answers with
your facilitator.
Multiple Choice: Circle the correct answer.
1. With digital CCTV signals, you can send the signals using this medium:
Fill in the blank
questions or complete
the activity to reinforce
your understanding.
d) Through RF or microwave
transmission
b) On the internet
e) On an Ethernet network
d) 10Base5
b) Fiber optic
e) Cat 5E
c) Coaxial
d) T-piece
b) BNC connector
e) Patience
c) Modem
7. A network device that extends the transmission range of a signal over cable:
a) Modem
d) Switch
b) Repeater
e) Gateway server
c) Router
f) NIC
8. The transmission distance limit for 1000Base-LX Fiber Optic cable is:
a) No limit with Infrared diode
d) 1 Giga bps
f) 1300 nm
Unit 5
9. For a 10BaseT network system, the maximum transmission distance with the
use of repeaters is:
a) 1640 ft. (500 M)
c) 984 ft (300M)
d) Cross talk
b) Interference
e) Attenuation
c) Resistance
f) weak signal
61
Unit 5
There is no content on this page, except for this sentence.
Unit 6
Objectives
After completing this module, you will be able to:
Identify at least 3 potential factors that can impact CCTV connectivity to networks.
Identify and describe how different network components can limit network
communications.
Topics covered
63
Unit 6
9
9
9
9
9
9
While there are great advantages and possibilities for digital CCTV systems, there are
also issues to be aware of that can prevent the realization of such advantages.
U6-3
Problems that can arise usually fall within one or more of the following categories:
8
8
8
8
8
8
8
8
8
Poor communications with those responsible for the network system(s) that
CCTV is to integrate into
Preventing many of the pitfalls associated with digital CCTV network systems starts
with the planning phase of such a project. Understanding the needs of the customer
and the realities of their expectations is critical for system design considerations.
Since digital CCTV components will probably be integrated into existing network
systems, the designer and/or installer will be interfacing with those responsible for
managing and maintaining such systems.
CCTV integration success hinges around good communications and mutual
understanding by all parties involved for such issues as: network specifications and
capabilities, CCTV component requirements, and video performance expectations.
Much of this shared technology may be new to the parties on both sides of the
equation. For company IT departments, the terminology, and requirements of a CCTV
system on their network will be foreign to them. For a CCTV provider, the technology
and lingo of IT networks may be new to them also.
This Basic training program is the first step in closing that communications gap.
Unit 6
This is usually the starting point for pre-qualifying a network systems compatibility to
absorb CCTV signals.
IT departments usually
refer to network
capacity as
transmission rates
rather than bandwidth
U6-4
U6-5
Factors that will impact the need for digital storage memory space include:
y
Compression options
65
Unit 6
Connectivity
U6-6
The type of network determines the protocols and requirements for cabling, system
capacity, type of network communication, network hardware, and node addresses.
Integrating CCTV cameras and monitoring/control stations requires setting up proper
component addresses on the network. Effective collaboration with the network IT
department is required.
Factors that impact CCTV connectivity include:
U6-7
Connectivity Tests
There are software tools that assist and verify network connectivity issues. The
following tests are performed from the DOS or COMMAND prompt screen.
To use these tools: Click Start, than Run. Type cmd and click OK.
ARP
Address Resolution Protocol (ARP) is a lookup table system for associating IP
addresses to MAC addresses. This allows one to associate a temporary IP/MAC
address relationship for the purpose of permanently assigning an IP address to a
component (node). The ARP tables are part of the software driver within most NICs.
The PC you are working from needs to be on the same subnet as the node you send
the ARP request to.
Unit 6
IPCONFIG
Internet Protocol
Configuration is a
tool used to find
and renew IP
addresses to a
computer, router or
other address
sensitive network
device. Sometimes
when installing a
new component
(node) onto a
network, that
device may be
blind to the
network. The use
of a few DOS
commands can be helpful in setting up a node onto a network.
Type: ipconfig /all This provides all the settings of your node and information on
the network you are connected to.
U6-8
Type: ipconfig /release This releases the assigned IP address for the computer
you are on.
Type: ipconfig /renew The computer you are on will be assigned a new IP
address.
U6-9
PING
By pinging an
IP address,
you are
checking for
communication
response
between two
nodes. (The
one you are
sending from,
and the one
the ping is sent
to.) You can
perform a ping test to anything that has an IP address anywhere in the world.
Computers have a time frame to receiving communication responses (default is
usually about 5 seconds). This communications response timeout is programmable.
U6-10
The command for sending a ping test is: ping IP address here
67
Unit 6
Firewalls
U6-11
Firewalls are can be hardware (i.e. Sonic Wall), a software application (i.e. ISA) or a
combination of both. The purpose of a firewall is to restrict network communications in
and/or out of a network system, usually a LAN. This is done for the purposes of
network security from virus attacks, for information or corporate security reasons, to
monitor/control the types and levels of network traffic, or to totally isolate a private
network system for others.
Several types of firewall techniques can be used to prevent unauthorized
communications. These include:
packet filtering is the most common firewall tool. It monitors each data packet by
looking at the header component of the packet. This contains the source and
destination IP addresses. It uses a programmable access rules list that can filter out
or block message packets based upon certain IP addresses.
Application gateway uses a mechanism that screens specific applications. This can
be from such components as FTP or Telnet servers.
Circuit-level gateway applies the screening for all communications except for a
specific type of connection, such as for TCP or UDP connections. Once these are
made, then the communications is free to flow without further checking.
Proxy server is used to hide a true network address from the open network. The
proxy server intercepts all messages entering and leaving the network, effectively
screening communications and hiding the true network gateway from outside
networks.
U6-12
U6-13
Communicating with IT
When a CCTV project involves integrating video transmission and control through an
IT network system, a collaborative effort is required. Effective communications starts
with understanding the needs and capabilities of both systems to be integrated.
Below is a starting point for issues to discuss:
y
Are the CCTV cameras within network range of the hub (328 ft., 100M)?
What are the IP addresses and port numbers for each camera?
Appendix
The following resources were researched and information from these sources may have been leveraged from in
writing of this training manual. Efforts were made to make this an all inclusive list, but information researched from
other non-listed sources may have also been reviewed.
y
About.com
Distancelearning.ksi.edu
Securityinfowatch.com
Snellwilcox.com
VCS.com
Whatis.com
69