Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Training Course
Training Workbook
Issue 2.0
Every effort has been made to ensure that the information contained in this document is true and correct at the time of going to press. However, the networks, systems,
products, processes, specifications and content in general described in this document are subject to continuous development and Olive Group is entitled to change them at any
time and to expand on them. Olive Group cannot accept liability for any loss or damage of any nature whatsoever arising or resulting from the use of or reliance on information
or particulars in this document.
The information contained in this document is of a general nature. Should you require further advice for your particular business requirements,
please refer to the contact details below.
No part of this document may be reproduced by any means, other than with the express written permission of the copyright holder.
Introduction ...................................................................................................... 4
Aim of the Workbook ............................................................................................................... 4
Course Objectives.................................................................................................................... 4
Course Aims ............................................................................................................................. 4
Course Performance Objective ............................................................................................... 5
Course Performance Conditions............................................................................................. 5
Training Methods ..................................................................................................................... 5
Training and Demonstration.................................................................................................... 5
Lesson Exercises ..................................................................................................................... 5
Course Audience...................................................................................................................... 6
Evaluation criteria .................................................................................................................... 6
Chapter 1
The Purpose of a CCTV & Access Control Training .................................................. 8
Security Awareness Training .............................................................................. 13
Crime Awareness Training ................................................................................ 19
Threat Awareness Training ................................................................................ 26
Overview of CCTV System ................................................................................. 37
Chapter 2
The Evolution of CCTV System ............................................................................................. 46
Getting Started ....................................................................................................................... 49
Components ........................................................................................................................... 49
DVR SYSTEM SURFACE OVERVIEW.................................................................................... 49
System Operation................................................................................................................... 51
Chapter 3
IP based CCTV Systems .................................................................................... 60
Introduction to Video Management Software ...................................................................... 67
Aimetis Symphony Video Analytics...................................................................................... 74
Aimetis Symphony Functions ............................................................................ 77
Chapter 4
Introduction to Access Control System………….………………………………………………94
Types of Access Control Systems ………………………………………………………………..98
Access Control Technologies……………………………………………………………………..104
New Technologies……………………..…………………………………………………………….106
The aim of the workbook is to be a working document, reinforcing the information presented by the
facilitator. Each participant will have a copy of this workbook, which can be taken away and can be
referred to at a later date. It is not designed to provide a detailed explanation of all aspects of a
technology or application, moreover a working document where each delegate can make their own notes.
Course Objectives
By the end of this course, you will be able to:
Understand recorded footage formats, retrieval and archiving of images and storage of recordings for
evidence
Describe codes of practice and policies relating to the role of a CCTV operator & technician.
Understand Health and Safety within a CCTV operational environment and be able to identify
potential Safety hazards through camera views.
Be fully versed in the day-to-day responsibilities for an operative of a CCTV & Access control system.
Course Aims
To introduce security personnel to CCTV & Access control System.
You will take part in Group activities, Group discussions, paper-based quizzes, practical based exercises
and assignments on how to use the capabilities of CCTV & Access control equipment, which will provide
you with an opportunity to practice and review the information presented in the course.
To successfully complete the stated performance goal, you will have access to:
Training Workbook
Practical-Lab environment
Training Workbook
Training Manual
Training Methods
During the course of this training, different training approaches will be used. In this course an emphasis is
placed on explaining fundamental concepts and demonstrating different system functions which are
pertinent to your job.
This course has time allotted for training, demonstrations, activities, exercises and case studies. Care will
be taken to maintain your active involvement. Straight lecturing will be kept to a minimum. Some of the
exercises in this course involve case studies with instructor-led walkthroughs. They allow you to become
familiar with the course content and other source material made available to you during the lesson.
Demonstrations will precede individual practice.
We will solicit information from you to facilitate discovery and verify your grasp of the information already
presented. You will be encouraged to make notes to summarize the process and take down references.
Lesson Exercises
Exercises will be used to simulate task sequences which combine functions already taught with the new
function just demonstrated. You will use CCTV & Access Control Student Unit and case studies to
practice scenarios which allow you to gain knowledge of how to use the system.
This course is exclusively designed for the Access Control & CCTV System Operator & Technician
responsibility.
Evaluation criteria
You will be evaluated on a regular basis to check your understanding of the topics covered. A Written
quiz/Practical assessment will be taken at the beginning of each day, and its scores will be added up into
the final assessment
Activity Weightage
Total 100%
• Security Awareness
• Crime Awareness
• Threat Awareness
CCTV & Access Control operators are regarded as highly knowledgeable regarding their use of the
system.
They are extremely familiar with the system layout and operations.
They continually contribute to identify system weaknesses & make suggestions for improvement.
The CCTV capability is viewed by all stakeholders as an integral part of infrastructure management.
Objectives
1. Restricted Crime
2. …………………………………………………………………………………………………………
3. …………………………………………………………………………………………………………
4. …………………………………………………………………………………………………………
5. …………………………………………………………………………………………………………
6. …………………………………………………………………………………………………………
7. …………………………………………………………………………………………………………
8. …………………………………………………………………………………………………………
9. …………………………………………………………………………………………………………
Usages of CCTV
Notes:
Deterrent
To protect area/building
…………………………………………………
…………………………………………………
…………………………………………………
1. IED’s (Bombs)
2. …………………………………………………………………………………………………………
3. …………………………………………………………………………………………………………
4. …………………………………………………………………………………………………………
5. …………………………………………………………………………………………………………
6. …………………………………………………………………………………………………………
7. …………………………………………………………………………………………………………
8. …………………………………………………………………………………………………………
9. …………………………………………………………………………………………………………
10. …………………………………………………………………………………………………………
Group Discussion
How the criminals operate?
Notes:
1. Information gathering
2. …………………………………………………………………………………………………………
3. …………………………………………………………………………………………………………
4. …………………………………………………………………………………………………………
5. …………………………………………………………………………………………………………
6. …………………………………………………………………………………………………………
7. …………………………………………………………………………………………………………
8. …………………………………………………………………………………………………………
Recap
Things to Remember!
1. ………………………………………………………………………………………………………
2. ………………………………………………………………………………………………………
3. ………………………………………………………………………………………………………
4. ………………………………………………………………………………………………………
5. ………………………………………………………………………………………………………
6. ………………………………………………………………………………………………………
7. ………………………………………………………………………………………………………
8. ………………………………………………………………………………………………………
9. ………………………………………………………………………………………………………
10. ………………………………………………………………………………………………………
11. ………………………………………………………………………………………………………
12. ………………………………………………………………………………………………………
1. …………………………………………………………………………………………………………
2. …………………………………………………………………………………………………………
3. …………………………………………………………………………………………………………
1. ............................ Security
Notes:
Notes:
3. ............................ Security
Notes:
1. DETER
2. ……………………………...
3. ………………………………
4. ………………………………
1. DETER
Notes:
Notes:
3. ………………………..
Notes:
Notes:
The best technology will not give you security without the correct
implementation of the four pillars of security!
Things to Remember!
1. …………………………………………………………………………………………………………
2. …………………………………………………………………………………………………………
3. …………………………………………………………………………………………………………
4. …………………………………………………………………………………………………………
5. …………………………………………………………………………………………………………
6. …………………………………………………………………………………………………………
7. …………………………………………………………………………………………………………
8. …………………………………………………………………………………………………………
9. …………………………………………………………………………………………………………
10. …………………………………………………………………………………………………………
11. …………………………………………………………………………………………………………
12. …………………………………………………………………………………………………………
Team Exercise
Notes:
1. APPRECIATE
2. ASSESS
3. ……………………………
4. ……………………………
5. …………………………...
Opportunity theft
Notes:
Notes:
Notes:
Notes:
Compliance
Notes:
Notes:
3. ……………………………………………..
Notes:
Notes:
4. ………………………………………………………………
Notes:
Notes:
RECAP
Things to Remember!
1. …………………………………………………………………………………………………………
2. …………………………………………………………………………………………………………
3. …………………………………………………………………………………………………………
4. …………………………………………………………………………………………………………
5. …………………………………………………………………………………………………………
6. …………………………………………………………………………………………………………
7. …………………………………………………………………………………………………………
8. …………………………………………………………………………………………………………
9. …………………………………………………………………………………………………………
10. …………………………………………………………………………………………………………
11. …………………………………………………………………………………………………………
12. …………………………………………………………………………………………………………
The goal of this training is to increase your awareness and combat complacency.
Goals:
1. …………………………………………………………………………………………………………
2. …………………………………………………………………………………………………………
3. …………………………………………………………………………………………………………
4. …………………………………………………………………………………………………………
5. …………………………………………………………………………………………………………
6. …………………………………………………………………………………………………………
7. …………………………………………………………………………………………………………
8. …………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
…………………………………………………………………………………………………………
Notes:
3. Robbery
Notes:
Notes:
Think Again!
Notes:
5. Fire
Notes:
Notes:
7. Traffic
Notes:
1. Observation
Body Language
Shapes of Clothing
Dress Sense
Accessories
Body Language
Shape of Clothing
Notes:
Notes:
Accessories
Notes:
Notes:
Notes:
Notes:
RECAP
Things to Remember!
1. …………………………………………………………………………………………………………
2. …………………………………………………………………………………………………………
3. …………………………………………………………………………………………………………
4. …………………………………………………………………………………………………………
5. …………………………………………………………………………………………………………
6. …………………………………………………………………………………………………………
7. …………………………………………………………………………………………………………
8. …………………………………………………………………………………………………………
9. …………………………………………………………………………………………………………
10. …………………………………………………………………………………………………………
11. …………………………………………………………………………………………………………
12. …………………………………………………………………………………………………………
Notes:
Notes:
Notes:
Types of Cameras
1. Fixed Cameras
2. ……………………………………….
3. ……………………………………….
4. ……………………………………….
1. Fixed Cameras
Notes:
Notes:
3. ……………………………………………………
Notes:
4. ……………………………………………………
Notes:
Notes:
Analogue or Digital
Resolution
Notes:
1. C-mount Lens
2. ………………………………………………
1. C-Mount Lens
Notes:
2. ………………………………..
Notes:
Notes:
Fixed lens
Notes:
Fixed Lens
Keyboard
Notes:
Notes:
Monitor
Notes:
Things to Remember!
1. …………………………………………………………………………………………………………
2. …………………………………………………………………………………………………………
3. …………………………………………………………………………………………………………
4. …………………………………………………………………………………………………………
5. …………………………………………………………………………………………………………
6. …………………………………………………………………………………………………………
7. …………………………………………………………………………………………………………
8. …………………………………………………………………………………………………………
9. …………………………………………………………………………………………………………
10. …………………………………………………………………………………………………………
11. …………………………………………………………………………………………………………
12. …………………………………………………………………………………………………………
• System Operations
An analogue CCTV system using a VCR represents a fully analogue system consisting of analogue
cameras with coax output, connected to the VCR for recording. The VCR uses the same type of
cassettes as the ordinary old home VCR. The video is not compressed, and if recording at full frame rate,
one tape lasts a maximum of 8 hours. In larger systems, a quad or multiplexer can be connected in
between the camera and the VCR. The quad/multiplexer makes it possible to record several cameras to
one VCR, but at the cost of a lower frame rate. To monitor the video, an analogue monitor is used.
VCR
Analogue
Camera Analogue Monitor
An analogue CCTV system using a DVR is an analogue system with digital recording. In a DVR, the
videotape is replaced with hard drives for the video recording, which requires the video to be digitized and
compressed in order to store as many day’s worth of video as possible. With early DVR’s, hard disk
space was limited – so recording duration was limited, or a lower frame rate had to be used. Recent
development of hard disks means space is no longer a major problem. Most DVR’s have several video
inputs, typically 4, 9, or 16, which means they also include the functionality of the quad and multiplexers.
Coax Cable
DVR Monitor
Analogue
Camera
An analogue CCTV system using a network DVR is a partly digital system which includes a network DVR
equipped with an Ethernet port for network connectivity. Since the video is digitized and compressed in
the DVR, it can be transported over a computer network to be monitored on a PC in a remote location.
Some systems can monitor both live and recorded video, while some can only monitor recorded.
Furthermore, some systems require a special Windows client to monitor the video, while others use a
standard web browser; the latter making the remote monitoring more flexible.
LAN/
LAN Internet PC
A network video system using video servers includes a video server, a network switch and a PC with
video management software. The analogue camera connects to the video server, which digitizes and
compresses the video. The video server then connects to a network and transports the video via a
network switch to a PC, where it is stored on hard disks. This is a true network video system.
A network video system using video servers adds the following advantages:
Use of standard network and PC server hardware for video recording and management.
The system is scalable in steps of one camera at a time.
Off-site recording is possible.
It is future-proof since the system can easily be expanded by incorporating network cameras.
A network camera combines a camera and computer in one unit, which includes the digitization and
compression of the video, as well as a network connector. The video is transported over an IP-based
network, via network switches, and recorded to a standard PC with video management software. This
represents a true network video system, and is also a fully digital system, where no analog components
are used.
A network video system using network cameras adds the following advantages:
1.1 Components
Analogue Camera
Lens
Digital Video Recorder (DVR)
Coaxial Cable
BNC Connector
Monitor
1.2.2 Rear
Video Input
Connect the coaxial cables from the video sources to the BNC video in Connector
Monitor Out
Video Out
PS/2
Network
DC-12V
Double click the mouse button to change between Split screen and Full screen mode.
1.3.2 Sequence Mode
With sequence mode, a group of cameras are displayed one after the other.
Click the right mouse button on the Live Display screen and Click the SEQUENCE TAB
You can configure the dwell time for these sequences in the SYSTEM SETUP >>> DISPLAY TAB
Video loss
Connection to the camera lost
Camera not configured
Panic recording will override all standard recording settings to provide, by default, continuous recording
on all channels.
Click the right mouse button on the Live Display screen and Press the REC START button. The
top right of the display will show a red square with P to indicate that the DVR is in panic
recording mode.
Click the right mouse button on the Live Display screen and Press the REC STOP button to
return to normal recording mode.
Click the right mouse button on the Live Display screen and Click the SYSTEM SETUP menu
Note: Only operators with ADMIN rights can configure the DVR.
The DISPLAY menu tab contains two sub menus. The first tab is OSD (On Screen Display) and the
second is MONITOR
OSD
STATUS BAR: Turns the status bar ON or OFF at the bottom of the live display.
CAMERA TITLE: Determines whether the camera title is displayed.
EVENT ICON: Determines whether the DVR recording status is shown at the top right of each
channel display window.
BORDER: Determines whether there is a border around each channel in multi screen display mode.
MOTION SENSOR DISPLAY: If false motion recording is occurring, the operator can use this feature
to determine and rectify the cause in real-time.
MOTION COLOR: The color of the blocks displayed when MOTION SENSOR DISPLAY
LANGUAGE: Provides multi language feature.
Monitor
SEQUENCE DWELL: The time that each screen is displayed in a sequence operation.
ALARM POP-UP MODE: When set to ON, an alarm input will cause the associated channel to
display full screen.
ALARM POP-UP DWELL: Determines how long the full screen popup is displayed after an alarm
input. If the alarm condition continues, the popup screen is displayed constantly.
MOTION POP-UP MODE: When set to ON, motion detection will cause the associated channel to
display full screen.
MOTION POP-UP DWELL: Determines how long the full screen popup is displayed after motion
detection. If motion continues, the popup screen is displayed constantly.
1.3.4.2 Camera
The CAMERA menu tab contains four sub menus. The first tab is CAMERA TITLE, the second tab is
COLOR SETUP, the third is PTZ SETUP and the last tab is MOTION SENSOR.
Camera Title
COVERT: This option is used to hide the video feed of a camera. When set to ON, the camera
video is not displayed in live display but the video continues to be recorded.
TITLE: This option is used to change the camera name. For each camera, a title of up to 11
characters can be set using the virtual keyboard.
Color Setup
Click the COLOR SETUP menu and click the value on the BRIGHTNESS, CONTRAST, TINT
and COLOR menu.
Brightness, contrast, tint and color can be adjusted for each individual channel.
Highlight which channel to modify and press ENTER.
SENSITIVITY: Between 1 (Lowest) and 10 (Highest) and determines the degree of motion
required before recording is activated.
AREA SETUP: Choosing this option allows the operator to define which areas of the image are
monitored for motion detection.
1.3.4.3 Sound
The SOUND menu tab contains two sub menus. The first tab is AUDIO and the second tab is BUZZER.
1.3.4.4 Audio
LIVE AUDIO: When set to ON, the selected audio channel can be monitored on the AUDIO
OUTPUT.
AUDIO MONITORING CHANNEL: Specify which one of the 4 AUDIO INPUTS is routed to the
AUDIO OUTPUT.
NETWORK AUDIO TX: When set to ON, live and playback audio is transmitted to a remote PC
connection.
NETWORK AUDIO RX: When set to ON, allows a remote PC connection to send audio back to
the DVR.
1.3.4.5 Buzzer
KEYPAD: When set to ON, each front panel button press is confirmed by a beep.
IR REMOTE: When set to ON, each command received from the IR remote is confirmed by a
beep.
1.3.4.6 System
Date/Time
DATE TIME: Allows the operator to set or modify the current date & time.
DATE FORMAT: Determines how the date is displayed.
TIME FORMAT: Determines how the time is displayed.
NETWORK TIME SERVER SETUP: If the DVR is connected to the Internet, the time and date
can be accurately set by selecting SYNC and pressing ENTER.
TIME ZONE SETUP: should be set according to the region that the DVR is used in.
Network
DHCP: When enabled, the DVR will obtain an IP address automatically if connected to a DHCP
server or router.
DDNS: When enabled, the DVR can be accessed through a Dynamic DNS server. Commonly
IP ADDRESS: If DHCP is not being used, the IP address can be manually set.
GATEWAY: If DHCP is not being used, the gateway IP address can be manually set.
SUBNET MASK: If DHCP is not being used, the subnet mask can be manually set.
1ST DNS SERVER: If DHCP is not being used, the first DNS server can be manually set.
2ND DNS SERVER: If DHCP is not being used, the second DNS server can be manually set.
DDNS SERVER: If DDNS is enabled, the host DDNS server is specified here.
NET CLIENT PORT: The port number that the DVR uses to support remote connection from the
client software.
WEB SERVER PORT: The port number that the DVR uses to support remote connection from
Internet Explorer or other web browsers.
MAX TX SPEED: Specifies the maximum bandwidth that the DVR can use during a remote
connection
Mail
DEFAUT SERVER: Use default mail server for sending email notification.
SERVER: The SMTP outbound email server that should be used to send email notifications.
PORT: The outbound email port number.
SECURITY: Set to OFF if the SERVER does not require a username and password to connect.
USER: Enter a username to identify the DVR in email messages.
PASSWORD: If SECURITY is set to ON, enter the password here.
TEST E-MAIL: Send a test email to registered users.
User Management
Click the USER MANAGEMENT menu and double click the ADMIN on the GROUP menu.
By default, the DVR is configured with a user ID of ADMIN, belonging to the ADMIN group
and with a password of 1234.
As well as the ability to add new users, existing user details can be modified.
To modify user details, highlight the user with the cursor then double click.
And click the PRESS menu for FW Upgrade, Factory Default and System Data.
HDD Event
DISK FULL EVENT: Makes alarm when disk full to recording data
Alarm Input
Action settings
ALARM: Determines whether alarm inputs will trigger the alarm output.
VIDEO LOSS: Determines whether video loss on any of the selected channels will trigger the
alarm output.
MOTION: Determines whether motion detection on any of the selected channels will trigger the
alarm output.
Buzzer Out
OPERATION: The internal buzzer can be enabled or disabled.
MODE: Can be either TRANSPARENT (the buzzer sounds only when the trigger criteria is
present) or LATCHED (the buzzer sounds for a set period of time after the trigger).
DURATION: In LATCHED mode, the time that the buzzer sounds after it has been triggered.
HDD EVENT: Determines whether a hard drive event sounds the buzzer
Action settings
ALARM: Determines whether alarm inputs will sound the buzzer.
VIDEO LOSS: Determines whether video loss on any of the selected channels will sound the
buzzer.
MOTION: Determines whether motion detection on any of the selected channels will sound the
buzzer.
E-Mail Notification
Determines the behavior and actions that will send an email to a remote user
Behavior settings
NOTIFICATION: Email notification can be turned ON or OFF.
HDD EVENT: Determines whether a hard drive event sends an email.
BOOTING EVENT: Determines whether a reboot event sends an email.
Action settings
ALARM: Determines whether alarm inputs will send an email.
VIDEO LOSS: Determines whether video loss on any of the selected channels will send an
email.
MOTION: Determines whether motion detection on any of the selected channels will send an
email.
FORMAT: If necessary, all footage can be erased from the DVR using this option.
During panic recording mode, the DVR will override all other recording settings and record continuously
on all channels at the settings configured here.
Click the right mouse button on the Live Display screen and Click the SEARCH menu.
Click the date that you want.
Drag the time bar by left mouse.
Click the PLAY TAB.
Click the SEARCH BY EVENT menu and each value for query.
Click the START menu.
Double click event on the list.
Now system will show play back mode.
1.3.7 Archive
Click the right mouse button on the Live Display screen and Click the ARCHIVING menu.
Select time and data then press PREVIEW button.
Backup information windows will be popped up.
Press ok to continue backup to external media.
Input title name for backup file and select device then press start.
In order to select the appropriate surveillance system, it is recommended to make comparison of the
various technologies with reference to the planned application area and requirements in terms of cost-
effectiveness, scalability, usability and flexibility.
CCTV (Closed Circuit Television) is still a term in use today; however it is more accurate to describe
modern digital systems as Network video systems. These are also often referred to as IP-Surveillance.
For specific applications within security surveillance and remote monitoring, IP-Surveillance is a system
which gives users the ability to monitor and record video over an IP network (LAN/Internet).
Unlike analogue video systems, network video uses the network, rather than dedicated point-to-point
cabling, as the backbone for transporting information. The term network video refers to both the video
and audio sources available throughout the system. In a network video application, digitized video
streams are transferred via a wired or wireless IP network, enabling video monitoring and recording from
anywhere on the network.
A network or IP camera can be described as a camera and computer combined in one device. It
captures and transmits live images directly over an IP network, enabling authorized users to locally or
remotely view, store, and manage video over standard IP-based network infrastructure.
*Note – A network/IP camera is completely different to a web camera. A web camera is a camera that
requires connection to a PC via a USB or IEEE1394 port and a PC to operate. In addition to video, a
network camera also includes other functionalities and information being transported over the same
network connection, i.e. digital inputs and outputs, audio, serial port(s) for serial data or control of
pan/tilt/zoom mechanisms.
Analogue cameras are one-directional signal carriers which terminate at the Digital Video Recorder
(DVR) and operator level, whereas a network camera is fully bi-directional and integrates with and drives
the rest of the system to a high degree in a distributed and scalable environment. A network camera
communicates with several applications in parallel, to perform various tasks, such as detecting motion or
sending different streams of video.
A video server makes it possible to move toward a network video system without having to discard
existing analogue equipment. It brings new functionality to analogue equipment and eliminates the need
for dedicated equipment such as coaxial cabling, monitors and DVRs – the latter becoming unnecessary
as video recording can be done using standard PC servers.
A video server typically has between one and four analogue ports for analogue cameras to plug into, as
well as an Ethernet port for connection to the network. Like network cameras, it contains a built-in web
server, a compression chip and an operating system so that incoming analogue feeds can be converted
into digital video, transmitted and recorded over the computer network for easier accessibility and
viewing.
Besides the video input, a video server also includes other functionalities and information which are
transported over the same network connection: digital inputs and outputs, audio, serial port(s) for serial
data or control of pan/tilt/zoom mechanisms.
A standard web browser provides adequate viewing for many network video applications, utilizing the web
interface built into the network camera or video server especially if only one or a few cameras are viewed
at the same time.
To view several cameras at the same time, dedicated video management software is required. In its
simplest form, it offers live viewing, storing and retrieving of video sequences.
Image Generation
Image quality is clearly one of the most important features of any camera, if not the most important. This
is especially true of security surveillance where lives and property may be at stake. Unlike traditional
analogue cameras, network cameras are equipped with the processing power not only to capture and
present images, but also to manage and compress them digitally for network transport. Image quality can
vary considerably and is dependent on several factors such as the choice of optics and image sensor, the
available processing power and the level of sophistication of the algorithms in the processing chip.
The image sensor of the camera is responsible for transforming light into electrical signals. When
building a camera, there are two possible technologies for the camera's image sensor:
CCD technology
CCD sensors have been used in cameras for a long time and present many quality advantages, among
which a better light sensitivity than CMOS sensors. This higher light sensitivity translates into better
images in low light conditions. CCD sensors are however more expensive as they are made in a non-
standard process and more complex to incorporate into a camera. Besides, when there is a very bright
object in the scene (such as a lamp or direct sunlight), the CCD may bleed, causing vertical stripes below
and above the object. This phenomenon is called smear.
CMOS technology
Recent advances in CMOS sensors bring them closer to their CCD counterparts in terms of image
quality, but CMOS sensors remain unsuitable for cameras where the highest possible image quality is
required. CMOS sensors provide a lower total cost for the cameras since they contain all the logics
needed to build cameras around them. They make it possible to produce smaller-sized cameras. Large
size sensors are available, providing megapixel resolution to a variety of network cameras. A current
limitation with CMOS sensors is their lower light sensitivity. In normal bright environments this is not an
issue, while in low light conditions this becomes apparent. The result is either a very dark or a very noisy
image.
Image and video compression can be done either in a lossless or lossy approach. In lossless
compression, each and every pixel is kept unchanged resulting in an identical image after
decompression. The price to pay is that the compression ratio, i.e. the data reduction, is very limited. A
well-known lossless compression format is GIF. Since the compression ratio is so limited, these formats
are impractical for use in network video solutions where large amounts of images need to be stored and
transmitted. Therefore, several lossy compression methods and standards have been developed. The
fundamental idea is to reduce things that appear invisible to the human eye and by doing so being able to
increase the compression ratio tremendously.
Compression methods also involve two different approaches to compression standards: still image
compression and video compression.
JPEG
JPEG, a well-known image compression method, was originally standardized in the mid-1980s in a
process started by the Joint Photographic Experts Group. With JPEG, decompression and viewing can
be done from standard web browsers.
JPEG compression can be done at different user-defined compression levels, which determine how much
an image is to be compressed. The compression level selected is directly related to the image quality
requested. Besides the compression level, the image itself also has an impact on the resulting
The two images below illustrate compression ratio versus image quality for a given scene at two different
compression levels.
JPEG2000
Another still image compression standard is JPEG2000. It was developed by the same group that also
developed JPEG. Its main target is for use in medical applications and for still image photographing. At
low compression ratios, it performs similar to JPEG but at really high compression ratios it performs
slightly better than JPEG. The price to pay is that the support for JPEG2000 in web browsers and image
displaying and processing applications is still very limited.
H.263
The H.263 compression technique targets a fixed bit rate video transmission. The downside of having a
fixed bit rate is that when an object moves, the quality of the image decreases. H.263 was originally
designed for video conferencing applications and not for video surveillance where details are more crucial
than fixed bit rate.
Despite higher complexity, applying MPEG video compression leads to lower data volumes being
transmitted across the network than is the case with Motion JPEG. This is illustrated below where only
information about the differences in the second and third frames is transmitted.
H 264
The two groups behind H.263 and MPEG-4 joined together to form the next generation video
compression standard. AVC for Advanced Video Coding, also called H.264. The intent is to achieve very
high data compression. This standard is capable of providing good video quality at bit rates that are
substantially lower than what previous standards would need, and to do so without so much of an
increase in complexity as to make the design impractical or expensive to implement. The leading IP
video solutions almost always use H264 these days.
Video management software running on a Windows or Unix/Linux server, supplies the basis for video
monitoring, analysis, and recording. A wide range of software is available, based on the users'
requirements. A standard Web browser provides adequate viewing for many network video applications,
utilizing the Web interface built into the network camera or video server especially if only one or a few
cameras are viewed at the same time.
To view several cameras at the same time, dedicated video management software is required. A wide
range of video management software is available. In its simplest form, it offers live viewing, storing and
retrieving of video sequences. Advanced software contains features such as:
Aimetis Symphony is an advanced video management software product with integrated video analysis.
Symphony simultaneously enables digital video recording, intelligent video analysis and remote access to
live and recorded images from any networked computer. Symphony analyzes incoming video against
user-defined policies and initiates counter measures when an event violates a Rule.
By using Symphony’s advanced business intelligence reporting and query tools, users can quickly access
information or locate specific video in seconds, saving hours of forensic work. Sample content analysis
applications include:
The Main Console consists of typical Windows application items such as the Title Bar, Menu, Toolbars,
and controls for minimize, maximize, and close. Also included are Video Panels used for live mode,
historical playback, and analyzing still frames. To fully manage Symphony and take advantage of all its
many features there are several other panels available:
Main Console
Address Bar
The Address Bar contains a Symphony link to the last selected video position. Symphony links are very
useful. If you have already installed Symphony Client on a computer you can simply do Start - Run, and
paste in a Symphony link, and Windows XP will automatically start Symphony Client and position to the
link's location.
Timeline
The Timeline is a powerful way to view everything that has happened in a day at a glance. The Timeline
is integrated in the main view of Symphony Client. It can be turned on and off via the Toolbar Timeline
button, and via Menu item View > Timeline. The Timeline is also available in every Video Panel,
accessible by right-clicking on the Video Panel and choosing Timeline.
Figure: Timeline
If you click anywhere on the Timeline, a still image for that time will appear in the main view.
Meaning of the bar colors:
Green - No relevant foreground activity was detected.
Yellow - There is activity (ignores weather conditions and shadows).
Red - A Rule was broken that resulted in an alarm being raised.
Gray - No video signal.
The purple circle always indicates the Timeline position for what is currently being viewed in the Video
Panel.
Video Panels
Video Panels are used to show live video, recorded video, and analyze still frames. All Video Panels,
including the Main Video Panel, can optionally include a Timeline and a Navigation Bar. These options
and others are available via the context menu by right-clicking on the Video Panel (as seen below).
Navigates forward and backward by alarm, activity (motion), 10 seconds, 1 second, 1 frame
Multi View
Multi View allows you to view multiple cameras' views at the same time. Multi View can be configured to
display 1 to 64 cameras at once. It is possible to have more than one multi view dialog open. Since the
Multi View is made up of individual Video Panels, it is possible to configure them individually for
appearance, the activities to perform upon alarm events, whether or not to have Timelines, Navigation
Bars, etc. Simply drag cameras from the Map or Camera Tree onto panes in the Multi View.
PTZ Controls
When working with PTZ cameras, you have the ability to set multiple home positions (camera tour), pan,
tilt and zoom right from Symphony Client using a standard keyboard and mouse.
To move the camera you have three options. You can use the Navigation control (PTZ button on the
toolbar), or use the mouse to drag a box around the region you wish to zoom in on.
To open the control dialog of the dome or PTZ camera, click on the PTZ toolbar button, or click View >
PTZ Controls.
Server List
The Server List is a panel on the right side of the main console that lists the servers that are in the current
server set along with their connection status. The menu item View > Server List Panel toggles its
visibility.
By right clicking on the top title bar (i.e. Server) the context menu appears where the Column Chooser
allows you to customize which fields are displayed.
By right clicking on a server from the Server List panel, a context menu pops up that includes menu items
to Add, Edit, Delete, Enable, Disable, and view properties of the selected servers.
With Aimetis' video analytics it is possible to detect specific events and activities automatically from your
cameras without human intervention. Video analytics makes it possible to filter video and only notify you
when user defined events have been detected, such as vehicles stopping in an alarm zone, or a person
passing through a digital fence. Today's robust video analytics produce far fewer false alarms than the
previous motion detection methods employed in earlier DVRs or cameras. Aimetis offers video analytics
add-ons on a per camera basis in the form of Video Engines (VE).
Some Video Engines (VE) can be run concurrently per camera with others (such as VE150 Motion
Tracking and VE350 Left Item Detection) but others cannot be run concurrently (such as VE160 People
Counting with VE150 Motion Tracking). If the desired video engine is not selectable, de-select the current
engine in order to select any other.
1. From Symphony Client, click Server > Configuration to load the Configuration dialog.
This will allow you to configure devices for the currently selected server
3. Select the camera you wish to configure for use with video analytics and click Edit.
4. Click the Analytics Engines tab. Un-check whatever is currently checked (default is VE130) and
select the desired video analytic to run on the current camera.
5. Finally, click OK to save settings and continue (to configure the chosen analytics), or click OK to
close dialog (and use the default settings for the chosen analytics).
After cameras have been added and analytics have been enabled for cameras, the analytics themselves
need to be configured. The Analytics Configuration dialog allows users to configure the analytics.
1. From Symphony Client, click Server > Configuration to load the Configuration dialog, and
then select Devices from the left pane.
2. Select the camera you wish to configure for use with video analytics and click Edit.
Each video analytic may have slightly different configuration options, however there are many
commonalities. Typically Mask, Analysis FPS / Analysis Resolution and Perspective must be set at a
minimum.
Masks
Masks define where Symphony can track objects. Anytime an object is tracked through the scene,
Symphony will colour that portion of the Timeline yellow. By default, the entire scene is covered in the
yellow mask, meaning everything in the field of view of the camera will be analyzed. Symphony has been
designed to work well in dynamic outdoor environments. Rain or snow would not normally result in
Symphony falsely tracking objects. However, in some cases, you may wish to remove certain portions of
the screen from analysis (such as a neighbor's property, or a swaying tree which is causing false alarms).
The Motion Mask dialog allows you to modify where tracking should and should not occur.
Additional features of the analytic can also be configured. The Analysis FPS field allows you to modify
the frames per second (FPS) that the analytic should analyze. Normally this field should be left at the
default value. It is possible to record at a higher frame rate than what is analyzed by the analytic engine,
to reduce CPU utilization (it is unnecessary to analyze 25 frames per second, for example). The Capture
Resolution text box displays the original video size, while the Analysis Resolution combo box allows
you to specify the image size to be analyzed. To reduce CPU utilization it is common to record at higher
frame rates and resolutions than what the video engine is receiving for analysis
Events
The first Rule Element to configure is the Event. An Event may comprise of one or more sub-events. For
example, the Event may involve a car stopping and a person loitering within 30 seconds before the Event
is triggered. The Event could also be an input from an Alarm IO device, or VMD detected on a network
camera.
To configure the Event dialog when selecting a camera as an input, complete the following steps:
2. Select which video engine to configure from the select video engine from those running on
camera.
3. Next, define what alarming attributes this rule will have, such as an alarm zone, or class of object
(i.e. people, vehicles). Depending on the video engine, different options will be available.
4. If only one event will be used in the Rule, click Next to continue. If other events are to be
included, click New.
5. Repeat steps 1-3 above. It is possible to pick a different analytic engine for the same camera to
combine the Events in the Rule. Now in the Sub Events dialog you will notice 2 events listed (by
clicking inside the Sub Events dialog and selecting the sub-event, it can be renamed to something more
descriptive).
Alarm Inputs include Video Motion Detection (VMD) from network cameras, external IO devices, and
many others. To configure the Events dialog when selecting the IO and Camera Motion Detection as an
input, complete the following steps:
1. Select which Digital I/O Devices (DIO) to assign to this Rule in the dialog shown below
2. Select which Input Number to control, and then define if it should be Activated or Deactivated
to trigger the event.
Actions
Alarm Tab
If Raise Alarm checkbox is selected, the Timeline and Alarm Log will reflect an alarm has occurred.
When this is unchecked the opposite is true. However, all other actions specified will still occur. This is
useful in the case of zooming with PTZ cameras since it may be unnecessary to show an alarm every
time the camera automatically zooms. The Record checkbox will ensure video recording for this camera
occurred, even if the default setting for the camera is No Recording as defined in the Device Setup.
Choose a camera is required in cases an alarm IO event has been selected as the event, and here it is
required to define with camera will be associated with this alarm, for the purposes of adding the event to
the camera's Timeline.
Relays
Use this to automatically send an electrical signal to an external device whenever an alarm occurs. This
would be useful if you setup a Rule that detected when cars were stolen and you wanted Symphony to
automatically close a gate or turn on a light. Symphony has been designed to work with alarm relays
to connect via the serial port of the Symphony Server. The Trigger Relay dialog enables you to set if the
relay should be turned on, off, or toggled, and the Relay # field allows you to define which address of the
relay board to control. The Restore state after field allows you to specify how long the relay should be in
its current state before being reset.
FTP
You can specify Symphony to automatically send a jpg to a FTP site after a Rule is broken. The jpg
features and filenames can be configured in this dialog. The filename can be automatically generated
based on the date, time, Rule and camera information using the symbols shown in the FTP tab.
Examples of filename patterns are shown here:
%d 2004_06_30.jpg
%t 14_01_45_050.jpg
%d-%t 2004_06_30-14_01_45_050.jpg
%m-%a-%h 05-30-14.jpg
Email
In the Email Tab, you can configure Symphony to automatically send email messages whenever an
alarm occurs. You may specify multiple recipients. Each recipient will receive an email with a picture
attached of the event which caused the alarm. Symphony runs its own internal SMTP server, so you do
not need to configure Symphony with another external mail server.
The email will include a hyperlink to the Aimetis Symphony Web Access application that will navigate to
the alarm in question.
The email will also include a hyperlink to the alarm's actual jpg file on the server.
Blackberry
You can configure Symphony to send alerts to Blackberry devices when a Rule is broken. Symphony
sends an email to the Blackberry device which includes a hyperlink. After clicking the hyperlink, it loads a
specially formatted web page for the Blackberry and displays the Alarm information.
TCP
It opens a TCP socket to some IP & port, and sends the specified ASCII message. This is a generic way
to interface with any access control system or other device.
Sounds
In this tab you can configure Symphony to play a pre-recorded sound when a Rule is broken. You can
upload files to Symphony and select which sound file (such as a .wav file) to play when the current Rule
is broken. This might be useful to automatically warn trespassers that the property is under surveillance.
Zoom
The Zoom tab allows you to specify actions for a dome (PTZ) camera after the current Rule Trigger is
detected. By selecting the Zoom radio, the camera will leave its Home Position and automatically zoom
and track the object. If you select the Force a PTZ camera to a location radio, you must specify a
preprogrammed position for the camera to move to. This is useful if you want to create an alarm Rule
where the trigger is a Hardware Alarm input (specified in the Alarm on section). For example, perhaps a
motion detector or even a fixed camera caused an alarm; you could force the PTZ camera to
automatically move to its location for further investigation. This will not work if the Trigger Rule element is
not region specific (such as a Cord Cut alarm).
Instructions
You can bind specific instructions to a Rule. This tells a monitoring agent or operator what to do in case of
alarm. When an alarm occurs it appears in the alarm log of the main console. If the user right clicks on
the alarm in this log, there is an option for viewing the alarm instructions. If there are any instructions set
for the Rule that caused the alarm, it will be shown there. Otherwise the default instructions from the
Server Instructions will be displayed.
Rule
After an alarm occurs, one of the Actions can be to automatically enable or disable other Rules
Schedule
The last Rule Element we define is the Schedule, or time period(s) when this Rule is active. The New
Schedule dialog allows you to specify on a weekly basis when the new Rule should be active or inactive.
You set different alarm schedules for different Rules.
If the Rule is disabled (in the Rules Summary), the schedule is ignored and Actions for that Rule will
not be triggered.
1. Click the Armed or Unarmed radio button, and drag over the alarm schedule to set the schedule.
3. Click View Exceptions to set an exception to this weekly schedule. An example might be
holidays.
The Exceptions dialog allows you to set special exceptions to the main weekly schedule.
To set exceptions, mark each half hour increment in red or green. Red means it is armed, green
means it is disarmed.
If a day already has exceptions it will be displayed in bold in the calendar. The current day is
highlighted in blue. Click OK to save your changes, or the X at the top of the form to close it
without saving changes to the current day.
1. Access the Camera Tour dialog. Select the PTZ camera you wish to configure, and right click on
the live view of the camera and click Camera Tour and then click Edit.
The Camera Tour dialog opens.
3. By default, there is one Camera Tour configuration. It is possible to have multiple Camera Tour
configurations with different tour locations and schedule. Select which Tour to modify.
4. Move the camera to the desired location by using the arrows and the + and - buttons to configure
the zoom level. To save location, click Add Current Live View PTZ Location To The List.
5. By default, Symphony will move the camera between the different Locations every 600 seconds.
To change this value, modify the Pause Time text box.
6. Click Change Motion Mask to modify the Motion Mask for the new Camera Tour location. This
enables you to define where Symphony should track or not track objects. Symphony treats each Camera
Tour location much like a separate camera, since it has its own field of view. As a result, you need to
define the Motion Mask are for each Camera Tour location.
7. Click Change Perspective Settings to modify Perspective information for the new Camera Tour
location (as required, not all video analytic engines require this). As in step 4 above, the Camera
Tour location requires its own Motion Mask and Perspective information (to classify objects
properly).
8. Click Set Schedule for This Tour to define when this Camera Tour is active. Since many Camera
Tours can be configured you may decide to have a Camera Tour sequence that is different during the day
than at night, for example. The Set Schedule for this Tour dialog allows you to configure the Schedule for
this specific Camera Tour. Each Camera Tour can run on a separate schedule.
To add or modify devices, click Server > Configuration. The Configuration dialog appears with the
Devices pane by default. Adding and modifying cameras (and configuring their respective video analytic
engines) is explained below
1. To add a new network camera or video server, click New from the Devices pane. The device
configuration interface opens
On the Network tab, enter the Name you wish to call the camera, URL which is normally the IP Address,
Username and Password and click Connect to Camera to detect the camera type and settings. The
model, resolution, Record FPS and Video Format will be auto-detected. If you wish to manually add the
camera, do not click Connect to Camera but instead manually select the Manufacturer, Camera Type
and set the Resolution, Record FPS and Video Format appropriately. You may also click Discover
Devices to locate devices on the network. The Movability option specifies whether the device will
automatically move to a redundant server under a failover condition. If it is set to movable then this
device can move to another server in the farm during failover. If it is set to unmovable then the device
can't be moved.
Recording Setup
Always: Symphony will also record video for this specific camera
Schedule & Tracked will record video on motion but only during the time period specified by the
Motion: user
video is recorded whenever pixel changes are detected (a tree moving in
Pixel Changes: heavy
wind could cause pixel changes and therefore cause Symphony to record
video)
video is recorded if objects are tracked through the scene (normally a person
Tracked Motion: or vehicle moving through the scene is tracked as motion, but moving tree
branches should not be tracked and therefore video would not be recorded)
video is recorded using motion detection capabilities inside network camera
Motion on Camera: itself, not using a video analytic engine from Symphony (quality of motion
detection similar to Pixel Changes)
Schedule & Motion on Same as Motion on Camera option, however recording will occur if motion is
Camera: detected during a specific time interval as defined by user.
If the network device allows, additional network video streams can be added from the same physical
device. This is useful in the situation where one level of quality of video is defined for recording and
another for live video, for example. To add another video stream for the current network device, click Add
a new Stream. The video recording options available are the same as to what was defined by the default
stream. Further, video resolution can also be defined independently for the additional stream(s).
Finally, the Panoramic Settings section allows users to configure settings related to 360-degree camera
Analytics Engines
By selecting the tab, the individual video engines can be added to the camera. An Enterprise license is
required to enable video engines in the Analytics Engines tab. This step is only necessary if video
analytics are to be configured on this camera.
The default engine is the VE130. Different video (analytic) engines detect different events. When
configuring Rules, the type of analysis available or "Event" is determined by which engine is selected
here. Not all analytic engines can be run in parallel. By selecting the VE250 for example, it will disable
other similar engines (such as VE150 or VE160). If an engine you wish to enable is disabled, try disabling
other engines to allow the selection of the desired engine.
Click Apply to save your settings and move onto the Analytics Configuration tab, or click OK to save
settings and close the dialog without configuring the selected video analytics engines (default
configuration settings will be used).
The VE130 is a general purpose video motion detection engine and is good choice for static
environments (such as indoors or certain outdoor environments). The VE130 is a good alternative over
camera based motion detection due to its simplified configuration and higher accuracy.
Working Scenarios
The VE130 is a good choice in indoor and simple outdoor environments where only motion is to be
detected and the class of object or object count is not required. Camera position, unlike other video
engines, is not heavily constrained, making VE130 a good general purpose video engine in many
applications. If object counting or dwell time is required, use the VE160 or VE161. For outdoor
environments, use VE150 as shadows, lighting changes, etc will cause VE130 to function inaccurately.
4. In the Analytics Configuration tab, select Intel_VE130 from the Analytics Engines combo box.
5. In the Motion Analysis tab, define the area in yellow where objects should be detected. Select the
Erase radio to erase the yellow mask, and select the Draw radio to draw the mask. The Size
slider adjusts the pen thickness.
6. Select the Grid View tab. Normally the default settings and grid spacing is adequate.
Configuring the VE130 is required before creating a Rule that uses the VE130. To configure
a Rule using the VE130, follow the steps below:
2. Select the camera (if it is a PTZ camera, select the camera tour position).
4. Mark the Alarm zone using the Draw and Erase options. The Size slider changes the drawing or
erasing thickness.
Camera Loss
Overview
Working Scenarios
It is a good idea to run the VE140 on all cameras. This analytic is environment independent.
1. Add the VE140 Cord Cut analytic to the camera(s) where you wish to detect signal loss (cord cut)
events.
2. No configuration is required for the VE140 from the Analytics Configuration tab.
Configuring the VE150 (see above) is required before creating a Rule that uses the VE150. To configure
a Rule using the VE150, follow the steps below:
3. Pick the VE140 from the video engine combo box. No further configuration is required.
Working Scenarios
This is a general purpose analytic and should normally run on each camera.
Configuring the VE150 (see above) is required before creating a Rule that uses the VE150. To configure
a Rule using the VE150, follow the steps below:
3. Pick the VE141 from the video engine combo box. No further configuration is required.
Searching Video
Symphony provides two methods of searching video: using the Timeline or the Search Tool.
The Timeline is integrated in the main interface of Symphony Client and summarizes a full day's activity.
This is useful if you want an overview of the entire day on the current camera. The Search Tool allows
your to query video for specific events in specific parts of the video.
Search
Search allows you to search recorded video for motion or alarms in specific areas. Symphony will search
based on your criteria and create a mini movie and thumbnails showing the results. For example, you
may search for all activity around a car for the last 24 hours. Symphony will create a video only containing
activity which occurred in the blue highlighted area (which may result in a 5 minute movie, depending on
how much activity was found).
To access the Search dialog, select Search > Search from Symphony Client or click CTRL-F from the
keyboard.
1. From the Analytics Engines section, select the engine. Depending on which engine is selected,
different search options will be available.
2. Using VE130 as an example, select Draw to mark the area of interest for searching. The area in
blue will be searched for activity. To erase the blue area, select Erase. The Size slider adjusts
the size of the brush when marking or unmarking the image. Alternatively, digital fences can be
used as the search criteria. Select Any fence to draw a digital fences. Selecting All fences
denotes that the object must pass through all fence lines to result in resulting search video.
3. Optional: Select the Class of object you wish to search for, such as People, Vehicles or Unknown
objects (unknown objects are objects that were tracked but were not classified as people or
vehicles).
5. Specify your Search Type. Enter the date and time range. Other Advanced settings:
6. If the Search is being conducted against a PTZ camera, select the Home Position to search in.
Home Positions are configured in the Camera Tour.
7. Click Search to start search. The View Search Results dialog will now open.
There are several operations you can perform on a search result once it is selected from the list:
• To play a search click the Play button in the toolbar. Symphony Player will automatically open
and will play the video of the selected result.
• To delete a search click the Delete button (X) in the toolbar. The corresponding .aira and .mpeg
files will be deleted from the server.
• To save a search to your computer click the Save button in the toolbar. The video will be saved in
.aira format to your PC. You will require Symphony Player to play .aira files.
• To save as an .mpeg format right-click the search from the list and choose the Convert to MPEG
option. This will save it as MPEG4v2 format which can be played in a wide variety of media
players including Microsoft Media Player.
• To email a search result video right-click the search from the list and choose the Email option.
The right pane of the View Search Results window shows snapshots of each event for the currently
selected search. Clicking on a snapshot will force Symphony Client to navigate to that same frame.
Exporting Video
You can export video from the Symphony server two different ways.
1. You can perform a Search and save it to disk from the View Search Results dialog.
2. You can export video by selecting a time period to export using the Save Clip button in the
Toolbar.
1. Click on the Timeline to the location you wish to begin the export.
Alternatively,
1. Choose the Pick start time by clicking on timeline radio button, then click on the timeline at the
location you wish to start the export.
2. Choose the Pick end time by clicking on timeline radio button, then click on the timeline at the
location you wish to end the export.
Carousels (Sequence)
Carousels allow you to loop through multiple cameras across multiple servers, pausing on each camera
for a defined period of time. To access Carousels, click Server > Configuration and select Carousels.
3. Add cameras from the Available Cameras on Servers tree into the Cameras in Current Carousel
tree
6. Click OK to save
Carousels can be accessed from Symphony Client by clicking View > Carousels > select your
Carousel name. Carousels can also be docked directly inside a Multi View by selecting Carousel from
the Multi View navigation bar.
New Symphony Server Registration allows Symphony Client to connect to a Symphony Server over a
network. You need at least one server registered.
Address
Enter the address of the Symphony Server you want to connect to. You can enter the IP address of the
Symphony Server, or the Symphony Dynamic name, which was defined during installation. If the
Symphony Server is running on a nonstandard TCP port, you can suffix the address with a colon followed
by the TCP port number. If you do not suffix with a port, it will try the default port, 50,000.
Name
This is the name that will appear in Symphony Client for this address. This information is not actually
used to connect. Type any descriptive name here.
User
A username with access to connect to the server.
Password
The password that is set up for the User.
• Types of Locks
• New Technologies
Why do we need it
The need for some type of access control in every building is generally accepted. Consider the
number of buildings that do not have so much as a locking door; very few, if any, such
structures exist in civilized society. The obvious reasons for controlling access - to prevent
unauthorized access of someone that may steal or damage property or harm people - is just the
beginning of the rational that justifies the expense of an access control system. Improving
productivity of employees and limiting exposure to liability are two additional reasons that these
systems are commonly deployed.
Improved Productivity
If employees are restricted to those areas of a building that they need to access in order to
accomplish their purpose for the company will, in many cases, help them be more productive.
You can imagine that if the employees assigned to the shop floor or warehouse have access to
the administrative or accounting areas of the business, productivity in both areas may decrease.
By streamlining the distances between the entry points, work areas, break areas, and rest
facilities you can increase the amount of time spent actually performing the employee's
assigned tasks. A system that limits access to certain areas during certain times of day can
accomplish this streamlining and facilitate the desired affect.
There are four processes that make up the foundation of access control.
Regardless of the methods employed to execute these processes, they must always be
included in order to construct a reliable access control system.
Identification
Simply stated, identification is the process by which a person provides information, unique to
himself, as the basis of his request to be granted access.This unique identifier can be generated
and presented in a number of ways, but it's purpose is always the same; it says "this is who I
am and this is how you can tell me from any other individual." This is often a card number or
PIN that has been assigned to a single individual and is recorded in a database
Authentication
The authentication process intends only to determine if the individual requesting access is
telling the truth about who they say they are.
For higher security applications these methods are often used in a cascading hierarchy.
For example, during normal working hours a building access control system may allow entry
using only an access card (something you have) but after hours the authentication process may
escalate to require both a card and a PIN (something you know). The combination of any two
authentication methods will provide a higher level of security than the use of only one method
Authorization
Authorization can take place after the identification and authentication processes have
determined who you say you are and that you are telling the truth. Authorization is often based
on complex rules. Using parameters such as the time of day, the day of the week, the entry
point in question, and other criteria, the access system will either grant (authorize) access or
deny it.
The ability to input complex and customized rules of authorization is routinely what makes the
difference between a commercially popular or unpopular system.
Accountability
Accountability ensures that a record is kept of what actions were allowed or denied by the
system. It should also record and report how the authorization rules were created and by whom.
1. Credential
2. Reader or Keypad
3. Locking Device
4. Door Position Switch
5. Request to Exit Device (REX)
6. Controller
7. User Interface (Software
1. Credentials
Credentials are typically the familiar access card but can also include a personal identification
number (PIN) or a biometric such as a finger print, hand geometry, or iris pattern. Whatever
credential is used, it serves as a method by which identification of an individual is presented to
the system for authentication
2. Reader or Keypad
A reader or keypad is used to receive the information presented by the credential. Most
common is the proximity card reader whereby an access card is presented to within a few
inches of the reader so that the reader can read the identification information from the access
card. The identification information, or card number, is sent upstream to the controller for
processing
3. Locking Device
Locking devices are electrified locks, electric strikes, or even electromagnetic devices
All designed to hold a door closed until such time that the controller has authenticated the
identification information presented via the credential and determined that the circumstances
warrant authorization to access a door or gate.
A door position switch keeps the system apprised as to the status, open or closed, of the entry
point at all times. Without this sometimes neglected device the access system will never know if
the door has been propped open.
5. Request-to-exit Device
Request-to-exit devices are used to alert the system to the fact that someone is about to egress
the secured area. This information is necessary to differentiate between a door forced open
alarm condition and a routine egress opening
6. The controller
The controller is the intelligence of the system and all access decisions are made by the
controller. The controller firmware and database make every decision and remember every user
A well designed access system will distribute all intelligence throughout the controllers in the
system such that the system does not rely on the user Interface software for routine operation.
The user interface is software that is used for human interaction with the access system
Software can include simple set up and reporting commands or very sophisticated graphical
representations of a building with device icons, alarm indications, and even live video feeds.
Regardless of the complexity of the software, its purpose is to allow people to input information,
create authorization rules, and review accountability information about the system.
Standalone systems are ideal for controlling access on one or many independent doors in a
building. Access is gained by using a numeric code, PIN with a keypad, or by presenting a
proximity or magnetic stripe token, depending on the reader type fitted.
These systems are programmed at each door. If tokens need to be barred or codes changed,
this action must be completed at every door on the system.
Typical applications:
Standalone systems are great for smaller sites with a relatively small number of users, token
management is simple, and the system can be extended easily as your requirements change.
These systems control one or many doors in a building. Access is gained by using a numeric
code, PIN with a keypad, by presenting a proximity or magnetic stripe token, or by 'possession'
with hands free tokens depending on which type of reader fitted. PC based access control offers
central control, via a network.
Instructions given at the PC are sent to each of the doors. A token can be barred from all of the
doors instantly. Flexible control allows you to set up different access permissions for individuals
or groups of users.
Reports may also be generated to track movement, who went where and when. Many systems
allow control of additional buildings via existing LAN/WAN. PC based systems are increasingly
being used to control other services within buildings, for example intruder alarms, fire doors, lifts
and lighting.
Typical applications:
1. Small/medium premises
2. Large corporate premises
PC based systems are ideal for medium to large sites providing simple management control of
users and large numbers of doors. The system can be extended very easily, and advanced
features such as event reporting and integration with CCTV and other systems make such a
system much more than just a replacement for a bunch of keys.
Magnetic Strip
Proximity Card
Smart Card
Smart Cards have a much larger storage capacity than proximity cards.
Contactless
Smart Card
Copyright Olive Group 2011. All rights reserved. Page 100 of 108
Access cards
Security managers have never had more options for access control cards and other badging and
credentialing applications. Magnetic stripe, Wiegand and proximity technology all remain popular and
effective.
One new technology many security and IT managers are evaluating is contactless smart cards. Just as
proximity technology brought advantages over Wiegand card technology 20 years ago, contactless smart
card technology today is bringing new advantages over proximity for physical access control as well as
other applications.
Whether installing a new or expanding an existing system, or undertaking a major upgrade, there are
several considerations for using contactless smart cards instead of proximity or other access control card
technologies. The following are the most important benefits of contactless smart cards.
• Contactless smart cards achieve a higher security level of the credential and the overall access
control system
• Contactless smart card technology is optimized to provide highly-secure devices by using
cryptography, encryption and the internal computing power of the smart chip.
Access control data in the card may be protected using 64-bit diversified security keys based on a unique
card serial number. This security can be further customized by the end-user with a card programmer.
The reader never transmits this unique card serial number to the control panel, because it is used
exclusively for key diversification and to prevent data collisions when reading several cards at the same
time.
RF data transmission between the cards and readers is encrypted using a secure algorithm so that with
certain contactless technology, the transaction between the card and reader cannot be “sniffed” and
replayed to a reader. By using diversified unique keys and industry standard encryption techniques, the
risk of compromised data or duplicated cards is reduced. Even if an unauthorized person obtains a
reader, without the keys the reader will not authenticate with the card and data will not be transmitted.
Contactless physical access control credentials can carry secure IT applications such as secure logon to
networks, digital signature, and encryption
Contactless smart card memory capacity ranges from 64 to 64k Bytes while proximity card memory
ranges from eight to 256 Bytes (2k bit).
As a result of contactless reading and writing the chances of failure due to wear are very limited. The
technology of the card ensures 100,000 writing cycles and a ten-year data retention under normal
operating conditions. The capability to add other applications to the card is one of the most important
advantages of contactless smart cards over proximity technology
Depending on the amount of memory available and the number of memory areas, contactless smart
cards can serve as multi-application credentials that are used for many purposes. Since the memory can
securely store any kind of information, physical access control credentials based on contactless
technology can be used for just about anything. These application examples may include:
Copyright Olive Group 2011. All rights reserved. Page 101 of 108
Advantages over smart cards
Contact smart cards never gained acceptance for use in physical access control systems for these main
reasons:
• A contactless presentation of the card is much more user friendly and convenient for physical access
control.
• With contact smart cards, users must properly orient the card to put the contact in the correct
position, find the opening in the reader, insert the card and leave it there until the end of the
transaction before removing it.
• Contactless smart cards and readers are much more durable in harsh, dirty, or outdoor environments
such as those typically found in access control applications.
• Contactless card transactions are designed to be faster than contact transactions.
Contact smart cards were not optimized for fast transactions, but for very high-security applications like
financial services and debit card PIN protection. Since contactless card were targeting high-throughput
applications like transit fare collection and ticketing, fast transactions were mandatory while still
maintaining high levels of security. For that reason, as contactless technology developed it was
optimized for fast reading and authentication, an advantage in access control systems as well.
Card Readers read a credential that allows access through control points. Access control readers
include: magnetic strip readers, proximity readers, smart card readers and a biometric reader. Biometric
readers can be either biometric only or a combination of card and biometrics.
Biometric Reader
• Fingerprint,
• Iris.
• Facial recognition.
Biometrics significantly increases the level of security provided by a system. The readers compare a
template stored in memory to the scan obtained during the process of identification. With biometric only
readers, the templates are stored in the reader itself or on a central database. In comparison a
combined smart card/biometric reader will read the template from the smart card.
Copyright Olive Group 2011. All rights reserved. Page 102 of 108
Facial Recognition
A facial recognition system is a computer application for automatically identifying or verifying a person
from a digital image or a video frame from a video source. One of the ways to do this is by comparing
selected facial features from the image and a facial database.
Fingerprint recognition
Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match
between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify an
individual and verify their identity. A fingerprint sensor is an electronic device used to capture a digital
image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally
processed to create a biometric template (a collection of extracted features) which is stored and used for
matching. This is an overview of some of the more commonly used fingerprint sensor technologies.
Optical fingerprint imaging involves capturing a digital image of the print using visible light. This type of
sensor is, in essence, a specialized digital camera. The top layer of the sensor, where the finger is
placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer which
illuminates the surface of the finger. The light reflected from the finger passes through the phosphor layer
to an array of solid state pixels (a charge-coupled device) which captures a visual image of the fingerprint.
A scratched or dirty touch surface can cause a bad image of the fingerprint. A disadvantage of this type
of sensor is the fact that the imaging capabilities are affected by the quality of skin on the finger. For
instance, a dirty or marked finger is difficult to image properly. Also, it is possible for an individual to
erode the outer layer of skin on the fingertips to the point where the fingerprint is no longer visible.
Retinal Scan
During a retinal scan, the user must stare at a specific point, and hold their head still. A retinal scan is
very difficult to fake because no technology exists that allows the forgery of a human retina, and the retina
of a deceased person decays too fast to be used to fraudulently bypass a retinal scan.
Retinal scanning is part of biometrics, the field of science and engineering which develops ways to
uniquely identify individual persons. The most popular form of biometrics employed today is of course the
fingerprint, though the error rate for fingerprint identification is sometimes as high as 1 in 500. A retinal
scan, on the other hand, boasts an error rate of 1 in 10,000,000. Its close cousin, the iris scan, is slightly
less precise, maintaining an error rate of approximately 1 in 131,000.
Traditionally used to block physical gateways, such as those guarding the cores of power plants or
military installations, the retinal scan has been employed in recent times to safeguard critical computers
and their data. The retinal scan retails at a low price, making it affordable to anyone wanting to maintain
high levels of security. Furthermore, it is probably the most accurate biometric available, far surpassing
the fingerprint in both reliability and accuracy.
Copyright Olive Group 2011. All rights reserved. Page 103 of 108
Types of lock
The lock originated in the Middle East; the oldest known example was found near Nineveh. Possibly
4,000 years old, it is of the pin tumbler type, otherwise known as an Egyptian lock. The Romans were the
first to use metal locks and to make small keys for them. They also invented wards, projections in the
keyhole that prevent a key from turning unless it has slots that avoid the projections. Probably the most
familiar lock today is the cylinder lock, a pin tumbler lock opened by a flat key with a serrated edge; the
serrations raise pins in the cylinder to the proper heights, allowing the cylinder to turn. Also common are
the unit lock, housed within a rectangular notch cut into the edge of a door, and the mortise lock, housed
in a mortise cut into the door edge, the lock mechanism being covered on both sides. Electronic locks that
open with a magnetic card key are popular for banks, hotel rooms, and offices.
Mortise lock
The two main parts of a mortise lock. Left: the lock body, installed in the thickness of a door.
This one has two bolts: a sprung latch at the top, and a locking bolt at the bottom. Right: the box
keep, installed in the door jamb.
A mortise lock is one that requires a pocket—the mortise—to be cut into the door or piece of
furniture into which the lock is to be fitted. In most parts of the world, mortise locks are generally
found on older buildings constructed before the advent of bored cylindrical locks, but they have
recently become more common in commercial and upmarket residential construction.
The parts included in the typical mortise lock installation are the lock body (the part installed
inside the mortise cut-out in the door); the lock trim (which may be selected from any number of
designs of doorknobs, levers, handle sets and pulls); a strike plate, or a box keep, which lines
the hole in the frame into which the bolt fits; and the keyed cylinder which operates the
locking/unlocking function of the lock body. However, in most other countries, mortise locks on
dwellings do not use cylinders, but have lever mechanisms.
Mechanical Locks
There are two basic types of mechanical locks, each with variations. The oldest and simplest is the
warded lock, which is essentially a spring-loaded bolt in which a notch has been cut. The key fits into the
notch and slides the bolt backward and forward. The lock takes its name from the fixed projections, or
wards, inside the lock and around the keyhole. The correct key has notches cut into it that match the
wards, which block the wrong key from operating the lock. The ward lock is the easiest to pick and now is
used only for cheap padlocks.
The tumbler lock contains one or more pieces of metal (called tumblers, levers, or latches) that fall into a
slot in the bolt and prevent it being moved. The proper key has serrations that raise the metal pieces to
the correct height above the slot, allowing the bolt to slide. There are three types of tumbler locks, pin-
Copyright Olive Group 2011. All rights reserved. Page 104 of 108
tumbler, disk-tumbler, and lever-tumbler. Pin-tumbler locks are the most common. The tumblers in this
type of lock are small pins. The modern door lock is a compact pin-tumbler cylinder lock of the type
developed (1860) by the American inventor Linus Yale. Door locks on automobiles and most high-security
locks have pin tumblers. Disk- or wafer-tumbler locks, use flat disks, or wafers, instead of pins. When the
proper key is inserted, the disks retract, releasing the bolt. Disk-tumbler locks are often used in desks and
file cabinets. Lever-tumbler locks employ a series of different-sized levers resting on a bolt pin to prevent
the bolt from moving. When the proper key is inserted, all the levers are raised to the same height,
enabling the bolt pin to release the bolt. Lever-tumbler locks are often used in briefcases, safe-deposit
boxes, and lockers.
Recent lock developments include the magnetic-key lock, in which the pins are actuated by small
magnets on the key, which has no serrations. When the key is inserted into the lock, these magnets repel
magnetized spring-loaded pins, raising them in the same way that the serrations on a tumbler-type key
would. The card-key lock is actuated by a series of magnetic charges; the card-key is popular where
security is vital, because a new series may be electronically defined for each new user, without having to
change the lock itself. Similarly, electronic card access systems are used in many hotels and office
buildings.
In an electromagnetic lock a metal plate is attached to the door and an electromagnet is attached to the
doorframe opposite the plate. When the current flows, the electromagnet attracts the plate, holding the
door closed, When the flow of current is stopped, the door unlocks. A variation places the plate and
electromagnet so that the door is held open when current flows, enabling the door to be closed
automatically when the current stops.
Keyless entry systems, which are common in motor vehicles, rely on a keychain fob that contains a
remote-control unit consisting of an integrated circuit and a radio transmitter. The fob sends a low-
powered radio signal to a receiver in the motor vehicle, and, if the received code is the correct one, the
receiver in the vehicle relays the signal to a microprocessor, which opens the lock. The acceptance of
such entry systems has led to devices that allow additional functions within the vehicle to be activated
remotely.
Copyright Olive Group 2011. All rights reserved. Page 105 of 108
New Technologies
Millimetre-wave
Millimetre-waves lie in the spectral region between radio waves and infrared. This band possesses a
unique property of passing transparently through lightweight materials such as clothing fabrics. Millimetre-
wave imagers have evolved over the past 50 years to live video-like images for use as advanced people
screening portals.
Recently developed is the imager that is suitable for mass people screening.
Millimetre-wave Portals
Takes about 2 seconds. The rest of the time is spent for the screener to observe the resultant
pictures and make a judgment.
Disadvantages - False alarm rates are very high (about 50%) mainly due to people not understanding
that they should empty their pockets completely.
Another problem is the visibility of human genitalia on the images. Even though the face is completely
obscured, the remaining visible genitalia evoke objections in certain areas of the world (mainly Middle
East). This can be solved through software modifications.
Raman Spectroscopy
Raman spectroscopy is a technique that identifies unknown chemicals by recording how they scatter
laser light into distinct frequencies. Key advantage is its ability to penetrate glass and plastic containers to
identify potentially dangerous unknown substances. Extensive Raman libraries allow chemicals to be
identified on the basis of their distinct molecular fingerprint.
Copyright Olive Group 2011. All rights reserved. Page 106 of 108
X-Ray Technology
Modern X-ray inspection units unite the benefits of scanning with state-of-the art image processing. Data
gathered by ultra-sensitive detectors is digitally stored. The detailed and high-contrast image is shown on
a colour monitor.
HI-MAT
The HI-MAT feature allows colour representation unlike the pseudo colour representation, which simply
changes gray values into colours. HI-MAT offers the advantage of an improved detection of items inside a
piece of luggage due to its colour representation as compared to other systems or to the black and white
representation.
Copyright Olive Group 2011. All rights reserved. Page 107 of 108
HI-SPOT
HI-SPOT illuminates dark image areas; it automatically detects sections of high absorption. The detected
area is analyzed by means of special enhancement filter software and then locally illuminated.
HI-SPOT allows an automatic evaluation of dense areas. It works online and in real time without loss of
evaluation time for the operator. HI-SPOT does not require any operator manipulation or stopping of
baggage flow. It allows automated conveyor stops in case of detection of suspicious areas. It also
improves the detection of objects in high absorption areas without deteriorating the image quality of lower
absorption image sections.
Copyright Olive Group 2011. All rights reserved. Page 108 of 108