Вы находитесь на странице: 1из 54

CCTV Endorsement

Inst: Earl Montoute


Fosp, Foi, Fot, CFot, CVQ-L4.

A Little bit of history.


Light is one of the basic and greatest natural phenomena, vital not only for life on this planet, but also very important for the technical advancement. It would be fair at this stage, however, to give credit to at least a few major scientists in the development of physics, and light theorists in particular, without whose work it would have been impossible to attain todays level of technology. Isaac Newton was one of the first physicists to explain many natural phenomena including light. August Fresnel also performed some very convincing experiments that clearly showed that light has a wave nature. James Clerk Maxwell, who in 1873 asserted that light was a form of high-frequency electromagnetic wave, his theory predicted the speed of light as we know it today: 300,000km/s.

A Little bit of history.


Heinrick Hertz was the scientist that discover the phenomena of Frequency.
In explaining the concepts of the lenses used in CCTV, we will be using, most of the time, the wave theory of light, but we should always have in mind that there are principles like the CCD chips operation, for example, base on the light particle behavior.

Hardware Basics
Today we use the term camera in film, photography, television, multimedia. Cameras project images onto different targets, but they all use light and lenses. To understand CCTV you do not need to be an expert in cameras and optics, but it helps if you understand the basic concept.

Hardware Basics
Types of Cameras used by CCTV systems. Dome Cameras. Bullet Cameras. Pan-Tilt-Zoom. Covert Cameras. Miniature Cameras.

Hardware Basics
Camera Housings.
In order to protect the cameras from environmental influences and /or conceal their viewing direction, we use camera housing. Camera housings can be very simple and straightforward to install and use, they are also available in all shapes and sizes, depending on the camera application and length.

Nowadays, CCD cameras are getting smaller, and so are zoom lenses, as a consequence housing are becoming smaller too.

Hardware Basics
Lighting in CCTV
Most of the CCTV systems with outdoor cameras use both day and night light sources for better viewing. Systems for indoor applications use, obviously indoor ( artificial ) light source, although some may mix with daylight, as when sunlight penetrates through a window.

Artificial light source falls into three main groups.


Sources that emit radiation by incandescent-such as candles, electric lamps. Sources that emit radiant energy as a result of an electrical discharge through a gas or vapor-neon lamp, sodium and mercury vapor lamp. Fluorescent tubes. The last two group are very tricky for color cameras, special attention should be paid to the color, temperature and white balance capability of the cameras used with such light.

Hardware Basics
Infrared cameras technology
When events need to be monitored at night, B/W cameras can be used in conjunction with infrared illuminator.

Infrared light is used because B/W CCD cameras have very good sensitivity in and near the infrared region. These are the wavelengths longer than 700 nm. The two typical infrared wavelengths used with halogen lamp illuminators are: one starting from around 715nm and the other from around 830nm.

Hardware Basics
Lenses utilized for CCTV systems.
Fixed lenses Vari-focal lenses.

Hardware Basics
Power supply for CCTV operation.
A typical CCD camera consumes between 3 and 4 W of energy, this means that a 12 V DC camera needs no more than 300mA of current supply. A 24V DC camera needs no more than 200mA, As the technology improves, cameras will consume less current. When powering a number of cameras from a central power supply, it is important to take the voltage drop into account and not to overload the supply.

Recorders- 3.0
Today it seems that recording CCTV video on VCR tapes is nearly over. Five years ago VCRs were still around in big numbers, and DVRs were only starting to appear, today this ratio is reversed. So what are the real benefits of using DVRs in CCTV, as opposed to VCRs?

First, with the VCRs analog method there is no direct and quick access to the desired camera, except when using a reasonably quick alarm search mode (available on most TL VCRs).

In VCRs the information is stored in an analog format and cannot be further processed, the VCR recording video quality is always lower than the actual original source.

Recorders- 3.0
Initially, in CCTV, attempts were made to implement digital video recording on a digital audio tape (DAT ) format. Hard disks have a much higher through-output than other digital storage media and higher capacity.
What was a problem only a few years ago- length of recording , these days is no longer such. Hard disk with capacities of 300GB are readily available and DVRs with internal capacities of 1200 GB ( 1.2 TB ) are not a rarity. Multi-week recording of a number of cameras is no longer a problem. Hard disk drives (HDD) now have fast access time and by using good compression it is possible to record and play back multiple images from one- in real time ( meaning Live video rate).

Recorders- 3.0
How many days or weeks of video recording can be stored on a 300GB, for example, depends first on the type of compression and quality of images elected for such compression. Also, an important factor would be if the recording were made permanent or if it was based on video motion detection.
The latter one has become very popular in CCTV as it extends the recording capacity at least two or threefold. Certainly, extending the Hard drive storage is also possible, but providing redundancy ( safety) as well might be an important request by a customer.

Main Monitor Panel


Camera Snapshot Screen Division Date / Time Message Alarm on/off Video Backup Screen lock P/T/Z Video Playback Camera name Recorded Time Minimum click to minimize the main panel Exit Button click to exit this Program

Cable Design
PlenumCable rating or space between a false floor or ceiling. Riser Vertical shaft between floors. Cable Markings. Wire Insulation / Color Code. Twists- helps to cancel out EMI generated by voltage used to send signal over the wire. Wire Gaugecopper wire diameter is often measured by a unit called AWG. Solid Conductor Vs Stranded Conductors. Cable Length UTP Category 3 / 16Mhz, Cat5 / 100Mhz, Cat6 / 250Mhz

Cabling and the need for Speed


Types of Communications media ( cable ). Twisted-Pair cable Unshielded Twisted-Pair ( UTP) Shielded Twisted-Pair ( STP) Screened Twisted-Pair ( ScTP ) Optical-Fiber Cable (FO ). All UTP, STP and ScTP Category 3, 5, 5e and 6 follows the same standard from ANSI/TIA/EIA/568-B,-A Coaxial Cable / RG-58, RG-59, RG-6U

Types of Cables
There are four major types of communication medium which are available for CCTV networking today. They are: UTP STP/ ScTP Coaxial Fiber Optic It is important to distinguish between backbone cables and horizontal cables. Backbone cables connect network equipment such as servers, switches, and routers and connect equipment rooms and communication closets. Horizontal cables run from the communication closet to the wall outlets.

Transmission Lines

In the Telecommunication Industry the most important sector in your network is the medium or Transmission Lines. There are various types of Transmission lines used base on the application used in the network. The most commonly used ones are Fiber Optic, Ethernet Cables and Coax Cables

Transmission Lines
Fiber Optic Cables are divided into two main groups, SMF and MMF.
SMF- used for high speed and long distance transmission, yellow in color and have a core size of 9 microns / 125 microns cladding size. MMF- used for short distance and backbone application, orange, slate and light blue in color, have a core size of 50 micron and 62.5 micron / 125 micron in cladding size.

Transmission Lines
Ethernet Cables are the most commonly used in today networks, they divided into four main category with transmission speed and bandwidth.

Cat 3 10Mhz 10Mbps ( voice ) Cat 5 100Mhz 100Mbps Cat 5e 150Mhz 100Mbps Cat 6 200Mhz 1000Mbps 1Gbps

Transmission Lines
Coaxial Cable has been around since local area networking was in its infancy, it is well shielded, and has a high bandwidth capabilities and low attenuation and is easy to install.

RG 6 18 AWG 75 ohms solid RG 59 20 AWG 75 ohms solid RG 58 20 AWG 50 ohms - solid

CCTV Connectors
RJ45- This connector is mainly used in IP application where Ethernet technology is used to operate the Network.

BNC This type of connector is the most commonly used one in today application.
Video Balun is used where Ethernet Cables are installed instead of Coax Cables

Computer Network systems.


Bandwidth-does it means maximum frequency or data rate? Frequency-: The number of cycles completed per unit of time / cycle takes one second to complete ( hertz ).

Data rate: Bandwidth is a function of three elements- distance, frequency and SNR. Decibels (db) it is rather express as a ratio of sound pressure IL (db)=10log10 P2/P1

Computer Network systems.


Standardizes Codes. ANSI / TIA / EIA -568 B/A Commercial Building Telecom Cabling. ANSI / TIA / EIA 569 Commercial Pathway and Space. ANSI/TIA/EIA 570 Residential Cabling. ANSI/TIA/EIA - 606 Administration infrastructure of Commercial Buildings ANSI/TIA/EIA 607 Commercial buildings Grounding. ANSI/TIA/EIA 758 Customer-owned outside plant Cabling.

Computer Network systems.


IEEE 802.3 Ethernet Standard. Ethernet Designation Codes 10Base-5 10Mbps, Coaxial 75ohm max 500m. 10Base-2 10Mbps, Coaxial 50ohm, RG58 Max 185m. 10Base-36 10Mbps, broadband, Max 3,600m 10Base-T 10Mbps, Cat 3, UTP Max 100m(outside plant 1800ft) . 100Base-TX 100Mbps Cat 5 UTP Max 100m. 100Base T4 four Cable pair Cat 3 Max 100m. 10Base FB 10Mbps, MMF Backbone, Max 2km. 10Base FL 10Mbps MMF Fiber Link, Max 2km. IEEE 802.4 Token Bus.. IEEE 802.5 Token Ring..

Computer Network systems.


Standards and Specifics Organization.
ANSI American National Standards Institute EIA Electronic Industrial Alliance TIA Telecommunication Industry Association ITU-T International Telecommunication UnionTelecommunication Standardization Sector. OSI Open System Interconnection Application Presentation Session Transport Network Data Link Physical ----T1 , E1, SONET,ATM.

Computer Network systems.


The Cable.
Horizontal and Backbone Cables: The terms horizontal cable and backbone cable have nothing to do with the cable physical orientation toward the horizon. Horizontal cables run between a cross-connect panel in a wiring closet and a wall jacks. Backbone cable run between wiring closets and the main cross-connect points of a building ( equipment room).
Horizontal Cables: Horizontal runs are most often implemented with 100-ohm, four-pair, unshielded twisted-pair (UTP) solid-conductor cable The standard also provides for horizontal cabling to be implemented using 62.5/125micron or 50/125-micron multimode optical fiber

Computer Network systems.


Backbone Cables: Backbone cables can be implemented using 100-ohn UTP, 62.5/125micron or 50/125-micron multimode optical fiber, or 8.3/125-micron single-mode optical fiber. Optical fiber is the preferred installation medium because of distance limitation associated with copper wiring.

Modular patch Cables: Modular patch cables are used to provide the connection between fieldterminated horizontal cables and network-connectivity devices such as switches and hubs and connection between the wall-plate jack and network devices such as computers Whereas horizontal UTP cables contain solid conductors, patch cords are made with stranded conductors because they are more flexible.

Computer Network systems.


UTP-RJ45 Modular plugs & modular jack
UTP-RJ45 & RJ11 Modular plugs and modular jacks are high speed Ethernet Hardware used in today networks. The UTP-RJ45 & RJ11 Modular plugs are terminated at the end of the Ethernet Cables using a crimper. The UTP-RJ45 & RJ11 Modular Jacks are terminated using a punchdown tool. The RJ45 Modular Plugs and Modular Jacks are design with a 8 pin slot in the Plugs & Jacks to accommodate the 4pair Ethernet Cable. ( data, Voice, video ) The RJ11 Modular Plugs & Modular Jacks are design with a 4 pin slot in the plugs & Jacks to accommodate lower speed Ethernet Cables. ( Voice )

Computer Network systems. Cable Pathway.


Conduit
Conduit is pipe, it can be metallic or nonmetallic, rigid or flexible and it runs from a work area to a wiring closet It also runs from the top or ceilings to the 2 x 4 ,4 x 4 boxes. One advantage of using conduit to hold your cable is that it may already exit in your building. A drawback to conduit is that it provides a finite amount of space to house cables.

Cable Trays
As an alternative to conduit, cable trays can be installed to route your cable, they are typically wire racks specially designed to support the weight of a cable infrastructure. Cable trays provide an ideal way to manage a large number of horizontal cable runs.

Computer Network systems


Raceways
Raceways are special type of conduit used for surface mounting horizontal cable and are usually pieced together in a modular fashion with connectors provided by the vendors .

Computer Network systems.


The Network topology refers to the physical layout of the nodes and hubs that make up the network. The right topology can affects the type of network equipments e.g. - Cabling, growth path and network management The three main Topology Categories are: Star Bus Ring

Computer Network systems.


Star Topology
A Star topology is implemented when all computers are connected to a single or centralized point. This point is usually a hub.

Bus Topology
The Bus topology is the simplest network of all three topology. It is also known as a Linear bus, all computers are connected to a contiguous cable. Computers in a bus topology listen only for transmissions from other computers, they do not repeat or forward the transmission on to other computers.

Ring Topology.
A Ring topology required that all computers be connected in a contiguous circle, it has no ends or hub.

Computer Network systems.


The common networking technologies today can all used either UTP or Optical Fiber. Today network technologies / Network Archit. Ethernet Token Ring. FDDI ATM

Ethernet
Ethernet is the most common mature of all the network architectures, it is used in over 80% of all network installation. Ethernet technology has a designated numbering code to help Techs and Engineers about the various transmission rates. Ethernet has been updated to support speeds of 100Mbps and 1000Mbps, currently 10Gigabit Ethernet is being deployed over optical fiber and research is progressing to make it available over UTP. Commonly used Ethernet Designated Codes. 10Base-T, 10Base-FL, 100Base-TX, 100Base-FX, 1000Base-T,-SX,-TX,-LX, 10Gbase,10Gbase-T

Computer Network systems.


Token Ring Technology
Developed by IBM, Token Ring used a ring architecture to pass data from one computer to another. It employs a sophisticated scheme to control the flow of data. If a node needs to transmits data, it must have possession of a free token before it can create a new token ring data frame. The token, along with the data frame is sent along as a busy token.

Fiber Distributed Data Interface ( FDDI)


FDDI is a network specification that was produced as a high speed (100Mbps ),token ring network using fiber optic Cables FDDI can operate as a true ring topology , or it can be physically wired like a star topology.

Computer Network systems.


Asynchronous Transfer Mode ( ATM )
ATM was designed to be a high-speed communication protocol that does not depend on any specific LAN topology. It uses a high-speed cell-switching technology that can handle data as well as real-time voice and video Data rates are scalable and start as low as 1.5Mbps and high as 155Mbps, but the ideal operating rate is 51.84Mbps. SONET and SDH are the preferred operating technology in an ATM network topology

Computer Network systems.


CSMA / CD
In some form, Ethernet has been around for 30 years, a predecessor to Ethernet was developed by the university of Hawaii ( called appropriately the Alohanet ) to connect geographically dispersed computers. This radio-base network operated at 9,600Kbps and used an access method called CSMA/CD ( carrier sense multiple access/collision detection ) in which computers listened to the cable and transmitted data if there was no traffic. If two computers transmitted data at exactly the same time, the nodes needed to detect a collision and retransmit the data Extremely busy CSMA/CD-base networks became very slow when collisions were excessive.

Systems Design
Active Devices ( Overview ).
Network Interface Card ( NIC ) Hub / Switch Repeaters / Amp Bridges Routers Gateways

Systems Design
Network-Connectivity Devices.
Repeaters.
A Repeater is a passive electronics device used in a Coaxial network to regenerate RF and digital signals and send it along in its original state so that it can be travel farther across a wire.

Hubs.
A Hub is a passive electronic device used in a UTP Network to regenerate Ethernet / Digital signals

Bridges
Just like a repeater a bridge is a passive network device used to connect two network segments. The main difference between them is that the bridge operates at the link layer of the OSI where as the Repeater/Hub operates at the physical layer.

Systems Design
Switches.
A Switches is used in the network to combine all the workstations, phones, and videos on one server . Switches also provide the benefit of micro-LAN segmentation, which means that every node connected to a Switches port receive its own dedicated bandwidth.

Routers
Routers are packet-forwarding devices just like switches and bridges, however , routers allow transmission of data between network segments. It operates at the network layer of the OSI model forwarding packets based on a network ID. Routers forward packets base on there 32 bits IP address.

Systems Design
Network Interface Card.
Network Interface Card or NIC as it is universally known is an electronically design Card used to interface a computer/ Printer with a network or the internet. It has a RJ45 Ethernet jack which is used to connect high speed Cables to the Computer ( Cat 5, 5e, 6 ) It replaces the Modem.

Systems Design
Hub
Because repetition of signals is a function of repeating hubs, hubs and repeaters are used interchangeably when referring to twisted-pair networking. The semantic distinction between the two terms is that a repeater joins two backbone coaxial cables whereas a hub joins two or more twisted-pair cables. Hubs work the same as repeaters in that incoming signals are regenerated before they are retransmitted across its port. Like repeaters, hubs operate at the OSI physical layer, which means they do not alter or look at the content of a frame traveling across the wire. When a hub receives an incoming signal, it regenerates it and sends it out over all its ports.

Systems Design
Switch
A switch is the next rung up the evolutionary ladder from bridges. In modern star-topology networking, when you need bridging functionality you often buy a switch. Switches also provide the benefit of micro-LAN segmentation, which means that every node connected to a switch port receives its own dedicated bandwidth. Switches operate at the link layers of the OSI reference model and, in the case of layer-3 switches, extend into the network layer.

Systems Design
Repeaters
Nowadays the terms repeaters and hubs are used almost in the same way but they are not the same. Repeaters are used in a coaxial medium where as hubs are used in an Ethernet application. Repeaters work at the physical layer of the OSI reference model. Digital signals decay due to attenuation and noise, a repeater job is to regenerate the digital signal and send it along in its original state so that it can travel farther across a wire.

Systems Design
Bridges
When we used the terms bridge and bridging, we are generally describing functionality provided by modern switches. A bridge is a network device used to connect two networks segment, the main difference between them is that bridge operate at the link layer of the OSI reference model and can therefore provide translation service required to connect dissimilar media access architectures such as Ethernet and Token Ring. In general, there are four types of bridging Transparent bridging, Source-route bridging, Source-route transparent bridging, Source-route translation bridging.

Systems Design
Routers.
Routers are packet-forwarding devices just like switches and bridges, however, routers allow transmission of data between network segments. Routers operate at the network layer of the OSI reference model, forwarding packets based on a network ID. How do routers work? In the case of the IP protocol, an IP address is 32 bits long. Those 32 bits contain both the network ID and the host ID of a network device. IP distinguishes between network and host bits by using a subnet mask.

Systems Design
Routers
The subnet mask is a set of contiguous bits with values of one from left to right, which IP considers to be the address of a network. Different types of routable protocol suite 1. TCP/IP - Microsoft 2. IPX/SPX Novell 3. Apple Talk Apple Computer.

Systems Design
The OSI reference model-02.

Systems Design
Introduction to TCP/IP
Summary: TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the "Internet"). It was initially successful because it delivered a few basic services that everyone needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems. Several computers in a small department can use TCP/IP (along with other protocols) on a single LAN. The IP component provides routing from the department to the enterprise network, then to regional networks, and finally to the global Internet. On the battlefield a communications network will sustain damage, so the DOD designed TCP/IP to be robust and automatically recover from any node or phone line failure. This design allows the construction of very large networks with less central management. However, because of the automatic recovery, network problems can go undiagnosed and uncorrected for long periods of time.

Systems Design
As with all other communications protocol, TCP/IP is composed of layers:
IP - is responsible for moving packet of data from node to node. IP
forwards each packet based on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world.

TCP - is responsible for verifying the correct delivery of data from


client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received. Sockets - is a name given to the package of subroutines that provide access to TCP/IP on most systems.

Systems Design
TCP Operation
As noted above, the primary purpose of the TCP is to provide reliable, securable logical circuit or connection service between pairs of processes. To provide this service on top of a less reliable internet communication system requires facilities in the following areas: Basic Data, Transfer Reliability, Flow Control, Multiplexing Connections, Precedence and Security.

Systems Design
IP Addresses
Each technology has its own convention for transmitting messages between two machines within the same network. On a LAN, messages are sent between machines by supplying the six byte unique identifier (the "MAC" address). In an SNA network, every machine has Logical Units with their own network address. DECNET, Appletalk, and Novell IPX all have a scheme for assigning numbers to each local network and to each workstation attached to the network. On top of these local or vendor specific network addresses, TCP/IP assigns a unique number to every workstation in the world. This "IP number" is a four byte value that, by convention, is expressed by converting each byte into a decimal number (0 to 255) and separating the bytes with a period. For example, the PC Lube and Tune server is 130.132.59.234.

Systems Design
Commonly Used TCP/IP Classes
Network class Beginning Octet Number of Network Host Addre per net A 1-126 126 16,777,214 B 128-191 >16,000 65,534 C 192-223 >2,000,000 254

Class A network share the first octet of their IP addresses, 23.78.110.109, 23.164.32.97, 23.56.123.45 Class B network share the first two octet of their IP addresses, 168.34.88.29, 168.34.55.41, 168.34.73.49 Class C network share the first three octet of their IP addresses, 204.139.118.7, 204.139.118.54, 204.139.118.31 Because only 126 Class A networks are available on the internet, most Class A networks have already been reserved by large corporations, educational institutions, or government. 127 is not a valid octet for IP addresses, it is used for loopback information.

Systems Design
Commonly Used TCP/IP Classes
An organization begins by sending electronic mail to Hostmaster@INTERNIC.NET requesting assignment of a network number. It is still possible for almost anyone to get assignment of a number for a small "Class C" network in which the first three bytes identify the network and the last byte identifies the individual computer. The author followed this procedure and was assigned the numbers 192.35.91.* for a network of computers at his house. Larger organizations can get a "Class B" network where the first two bytes identify the network and the last two bytes identify each of up to 64 thousand individual workstations. Yale's Class B network is 130.132, so all computers with IP address 130.132.*.* are connected through Yale.

Вам также может понравиться