Overview of the application of telecommunications in large-scale network video surveillance

Overview of the application of telecom technology in large-scale network video surveillance

With the maturity of the security industry market and the improvement of technical level, more and more IT companies, especially those engaged in the development and production of communications products, have entered the security industry. On the surface, it seems that IT companies are trying to avoid the fierce price competition in the IT industry and testing the security industry, hoping to take a slice of the rapid development of the security industry. But think about it carefully. Behind this industry penetration and transfer reflects the security industry's desire for technological upgrading and the inevitable trend of security industry technology development. The technological transformation of the traditional security industry by telecommunication-level technology has quietly started.

Characteristics of carrier-grade technology and services

Carrier-grade technology and services represent the highest standards of IT technology, and it includes the following three aspects:

l Carrier-grade service quality. Carrier-grade service means 7 × 24-hour continuous, stable and reliable service guarantee for equipment and network. It not only requires the device to have high stability and reliability in hardware, but also has robustness and anti-virus capabilities in software.

l Carrier-level operation and management capabilities. A telecommunications network is an operable and manageable network for users. It requires all equipment to be managed objects, not isolated systems. It implements a unified configuration management, performance management, security management, fault management, daily value management and other functions of all devices in the system through a series of protocols and mechanisms. At the same time, the carrier-grade network needs to implement user-oriented management, authentication, billing and other functions to achieve differentiated services. This requires a reliable authentication mechanism to ensure.

l Carrier-grade network architecture and scalability. Carrier-grade network is an open and extensible system, which requires the system to meet the requirements of standardization and modular design, with excellent scalability to meet the network expansion needs, while meeting the economic requirements in terms of cost.

These characteristics and requirements of carrier-grade technology and services are completely consistent with the development trend and internal requirements of network video surveillance technology.

First of all, the security industry represented by video surveillance is an industry that "pays for safety". If you spend money, whether you can really buy "safety" depends on whether the equipment can operate stably and reliably. Therefore, carrier-class service guarantee is the best standard to meet the requirements of users in the security industry for stable and reliable operation of equipment.

Secondly, the advent of the video surveillance network era has completely changed the original closed-circuit surveillance, which is difficult to manage. The monitoring network and unified management have become an inevitable trend. Under large-scale network video surveillance, the management requirements for devices and users are already much higher than the monitored images themselves. Facing tens of thousands of monitoring equipment and users, how to timely understand the working status of the equipment, how to ensure legal users' access to the network and even realize user-based operation charges have become the biggest challenges faced by system administrators.

Carrier-grade device management and user management mechanisms, as a mature IT application, can be easily ported to security industry applications, providing an economical and reliable way for network video surveillance managers.

Finally, networked video surveillance is also facing an open network, and more and more surveillance equipment will be added to it. The construction of video surveillance networks is inseparable from the support of telecommunications transmission networks. At the same time, in the development of network surveillance equipment, only by continuously absorbing and drawing on the successful experience of carrier-grade technology and adopting standardized and modular design can we be competent in a networked environment Under the management requirements.

The specific application of carrier-grade technology in network video surveillance

Carrier-grade technology and services require equipment manufacturers to design products in accordance with carrier-grade architecture, which requires consideration from three aspects of hardware, software, and operation and maintenance.

1. Hardware

(1) Modular hardware design

Carrier-grade equipment emphasizes modular design and requires a modular structure in hardware design.

Modular design has several benefits. The first is that modular design is conducive to improving the stability and reliability of the system. The modular structure design adopts the principle that the business module and the control module are designed separately. Each hardware module is only responsible for completing specific functions, and the hardware implementation and maintenance are simple and reliable; secondly, the modular design facilitates the system upgrade and expansion without the need to purchase new Machine, and only need to increase the interface board; third, the modular design can shorten the development cycle of new products; in addition, the modular design is conducive to improving the yield of the product production process, thereby ensuring the stability and reliability of the product .

With the expansion of the video surveillance network, more and more surveillance points are connected, and the demand for large-capacity network video servers will increase in this case. With a modular, plug-in design, It can easily break the 16-port port limitation of the existing embedded network video server and realize 32-channel or even greater number of accesses, which greatly provides the stand-alone capacity of the network video server. At the same time, the modular and plug-in structure design not only improves the stability of the equipment, but also provides users with more choices in port selection and system expansion.

(2) Redundant design of key components: In addition to the modular design of the hardware, redundant design can be used for key components such as CPU and power supply to provide backup functions, so that the failure of a single interface module will not cause the whole machine to shut down Thereby improving the overall reliability of the product.

2. Software

(1) B / S or C / S structure is adopted in the software architecture, which is convenient for expansion and maintenance, and simple and reliable.

(2) In software design, the modular design is also emphasized. Each module or component must undergo rigorous testing including stress testing; due to the modular design, each software module or component is implemented and tested Relatively easy to implement, thus ensuring the reliability and stability of the entire system

(3) The fatal impact of network viruses and network attacks on the device must be considered in the software; because network video products are also network products in nature, they will be inevitably poisoned by network viruses and network attacks. The software of network video products must have anti-network viruses And cyber attack capabilities.


3. Operation and maintenance


(1) SNMP device management

The SNMP (SingleNetworkManagementProtocol) network management protocol is a standard network management protocol based on the TCP / IP Internet network. It is currently used by the IT industry to monitor and manage devices (such as computers, routers, switches, gateways, servers, and terminals) on the network Open standard protocol.

The advantages of SNMP itself are:

l Open protocol platform, strong scalability, there are many free resources available.

l Simple and clear, easy to implement, it can realize remote intelligent monitoring, control, management and maintenance of equipment on the network through the network.

l Less system resources.

l Can achieve unified management of equipment from different manufacturers

In the design and development of network video servers, the addition of an SNMP agent mechanism enables remote unified management and maintenance of the video surveillance network, timely understanding of equipment operating status, and immediate response to equipment failure and alarm information.

The application of SNMP in network video surveillance will not only greatly improve the management level and scheduling capability of network video surveillance, but also greatly save manpower and improve efficiency.

(2) Centralized user management, networked video equipment requires centralized user management, all user information is configured on a centralized server platform, you can easily add users, delete users, modify user permissions, and assign users to each video device In addition, the user management server can be integrated with the authentication server, and the integrated server can adopt the main and standby management to improve the reliability and stability of the system.

(3) Radius authentication method

Radius authentication is a carrier-grade user authentication method with high security, mature technology, good compatibility, and convenient management. Radius authentication is widely used in user authentication and billing systems in the telecommunications industry.

The process of Radius authentication is shown in Figure 1. Among them, ①②③④⑤ is a process of video surveillance, and ⑥⑦⑧ is a process of accessing recording and alarm data.

The certification process is as follows:

Step â‘ : The client requires the user to enter the user name and password

Step â‘¡: After the user enters the user name and password, it is transmitted to the video server through the network

Step â‘¢: The video server transmits the user name and password to the RadiusServer through the radius protocol for authentication

Step â‘£: RadiusServer will send the decision to the video server, so that the video server can respond to the user's request

All the above interactions are encrypted by MD5, with good confidentiality

Using the Radius authentication method in the multi-level network video surveillance system can easily achieve centralized management of users, including user generation, authorization allocation, user authentication and other functions, and on this basis, an operational level video information service platform can be built Achieving operational charges for video services for commercial users is a new direction for the development of network video surveillance services.

(4) Networked storage solution

(5): The networked storage solution should be a distributed storage and centralized management solution, as shown in the following figure. Distributed storage refers to setting up local storage centers in different locations based on principles such as geographic distribution or data size, and centralized management means that all storage can be managed through a set of centralized software and according to permissions. All storage in all areas is managed uniformly through the network. In addition, the specific storage solution can use the IPSAN solution such as iSCSI to improve the stability and reliability of the entire system.

Zhuoyang Technology's carrier-grade network video surveillance solution

Relying on the accumulation of years of carrier-class network equipment development technology, Shanghai Zhuoyang Technology has integrated carrier-class technology into network video surveillance products, and successfully developed a series of products and videos such as network video servers and network video matrices that meet the requirements of large-scale network video surveillance applications. Management software, the following figure is the networking diagram of the large network video surveillance solution of Zhuoyang Technology.

Zhuoyang Technology's serialized network video server and matrix adopt a modular design and support both SNMP and Radius protocols, which makes it possible for unified user management and device management of the entire network.

At the monitoring front end, the network video server compresses and encodes the images, audio and alarm information collected by cameras, microphones and sensors, and converts them into data packets conforming to the TCP / IP protocol standard, which are sent to Ethernet for local or wide area transmission .

According to the number and density of monitoring points, network video servers with different port numbers can be selected, and leave room for future upgrades and expansion.

In the monitoring center, users are managed through the Radius authentication server, including user generation, user authorization, user authentication, user accounting, and user log management. The management center of the monitoring center is equipped with Zhuoyang Technology VSTAR video management software. The administrator uses this software to complete management functions such as centralized device management, real-time video image monitoring, and distributed video storage. Ordinary users need to install VSTAR video management client software on the monitoring client, or use the built-in WEB server of the network video server for image monitoring. When accessing the device, the user needs to enter the user name and password authorized by the Radius server, and enjoy different operation, browsing, and control ranges according to different permissions.

Zhuoyang Technology's large-capacity network video matrix is ​​designed for pure IP core, supports Ethernet video input and PTZ protocol control, and the single machine supports 24-channel video real-time decoding output and 1024-channel video management. The device provides an economical TV wall solution for centralized monitoring and command in public security, transportation, military, power, water conservancy and other industries.

Zhuoyang Technology's VSTAR video management system supports distributed storage solutions. Remote image information can be transmitted to the monitoring center for centralized storage, or it can be stored in several monitoring centers distributed in the network in subregions to save bandwidth and secure backup. purpose.


postscript

The penetration and transformation of telecommunication-level technology in the security industry will definitely provide a strong impetus for the improvement of the overall technical level of the security industry. Traditional security companies must also actively learn from and introduce mature technologies in the telecommunications industry to complete the upgrading of existing industries and technologies. Only in this way can we seize the opportunities brought about by the informatization and networking to the industry, and protect our country The overall technological level of the industry has advanced to the international advanced ranks.

About Cartoon Luggage Tags:


Lots of different animals live with us ,some of them are very cute ,like dogs ,cats ,monkeys ,many people love to live with them ,they are not only pets but family members ,so they really want to bring them when go for a trip ,but sometimes they are not convenient for travelling ,people will miss them so much ,so why not make a cartoon luggage tag with their figures ? You can see them everywhere,it seems like they go with you!



Cartoon Luggage Tags description:


1.Product name:Cartoon Luggage Tags,Animal Luggage Tags,Personalized Luggage Tags, Custom Luggage Tags , Cute Luggage Tags , Luggage Name Tags

2.Place of origin:Guangdong China

3.Color:any pantone color is available

4.Logo:silk printing,water transfer printing ,heat transfer printing .

5.MOQ:500pcs.

6.Package:1 pcs/opp,customized design is available.

7.Design:Customized

8.Certification:FDA,LFGB,SGS,ROHS,etc.

9.Usage:Gifts/recognizing luggage

10.Cartoon Luggage Tags photos for reference

Cartoon Luggage Tags



Silicone Luggage Tags

Cartoon Luggage Tags,Animal Luggage Tags,Personalized Luggage Tags,Custom Luggage Tags,Cute Luggage Tags,Luggage Name Tags

OK Silicone Gift Co., Ltd. , https://www.oemsiliconegift.com