Wireless-INTERNSHIP PROOJECT
Wireless-INTERNSHIP PROOJECT
SUBMITTED BY
SRINIVAS VASAM
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERING
VISHNU INSTITUTE OF TECHNOLOGY
BHIMAVARAM - 534201 YEAR 2024-2025
RINL VISAKHAPATNAM
DEPARTMENT OF TELECOMMUNICATION
CERTIFICATE
This is to certify that, this internship report entitled,
” STUDY OF WIRELESS COMMUNICATION ”
Bonafide work of SRINIVAS VASAM
submitted in the partial fulfilment of requirements for the award of
degree of B.Tech (ECE) during the period 2024-2025.This work is
carried out in the VISAKHAPATNAM STEEL PLANT (RINL)
during the period of 2nd SEP 2024 to 28th SEP 2024 in the Department
of Telecommunication.
Srinivas vasam
ACKNOWLEDGMENT
We hereby take this opportunity to express our sincere gratitude to the following
eminent personalities whose aid and advice helped us to complete this project work
successfully without any difficulty.
We express our gratitude to our Head of the Department, Mr. K.RAO heart fully
for his encouragement and for providing lab facilities throughout the project.
Last but not the least, we are grateful to our friends for their innovative suggestions
and help for the completion of our project.
Abstract
About Visakhapatnam Steel plant
• Introduction
• Production Flow chart
• Major Departments in VSP
• Product MIX
Telecommunication Department in VSP.
• Role
• Different Communication systems in VSP
Introduction of IP CCTV
• Block diagram of IP CCTV
IP based survelliance CCTV system
• About CCD
• Technical specifications
Design of IP based CCTV System for VSP
• Network architecture
• TCP/IP Protocol
• ethernet 0
Conclusion
ABSTRACT
INTRODUCTION
Visakhapatnam steel plant is the first coastal based integrated steel plant in the country to
become a fully ISO9002 certified company. This certificate covers the quality systems of all
operational, maintenance, service units. Besides purchase systems, training and marketing
functions spreading over regional marketing offices,20 branch offices and 22 stock yards located
at all over the country.
Visakhapatnam steel plant exports quality pig iron and steel products to Sri Lanka,
Myanmar, Nepal, Middle East, and south east areas. Having a total manpower of 17250 RINL-
Visakhapatnam steel plant envisaged a labor productivity not less than 230 tones of liquid steel
per man which is the best in the country and is comparable in the international levels.
Steel comprises one of the most important inputs in all sectors of economy. Steel
industry is both a basic and a core industry. Steel is versatile and indispensable item, which can
be traced to mainly three reasons:
The RMHP receives the basic materials iron ore, fluxes (lime stone, dolomite),coking and
non coking coals etc. required for the steel making process from various sources through wagons
which are stacked and reclaimed by stackers-cum reclaimed and distributed to various
departments of Visakhapatnam steel plant through conveyor systems.
Coke is a hard, porous mass obtained by fractional distillation of coal in the absence of
air at a temperature above 200deg.centegrade for period of 16 hrs to 18 hrs. It is used as a fuel
and reducing agent of iron ore in blast furnace. Three coke oven batteries for production of
2.26MT dry coke, each with 7 meters tall 67 ovens. Each batteryis provided with facilities for
dry cooling of coke using Nitrogen as quenching media for dry cooling of coke as well as for
recovering sensible heat of cock. As a by-product a CO gas is produced in this processes and this
gas is having a very high calorific value for about 2400-2700KCAl and is produced throughout
the plant as a fuel.
SINTER PLANT:
Sintering is one of the most widely used and economic agglomeration techniques. Sinter
is a hard and porous lump obtained by agglomeration of fines of iron ore, coke, limestone, and
metallurgical waste. Sinter increases the productivity of blast furnace, improves the quality of
pig iron and decreases the consumption of coke rate .Two 312 square meter sinter machines with
420 square meter straight stand type coolers for annual production of 5.26 MT sinter.
BLAST FURNACE (BF):
Pig iron or hot metal is produced in the Blast Furnace .The furnace is named as BF as
it is run with blast at high temperature and pressure of 1500 deg. C. Raw materials required for
pig iron and iron are iron making ore, sinter, coke, and lime stone. There are two 3200 cubic
meter blast furnace to meet 3.0 MT annual metal requirements. With bell-Each furnace is
provided with a set of four hot blast furnace stoves designed for supplying air blast up to 1300
deg .C. Three turbo blowers, one for each furnace and one stand by common to both furnaces
are provided with 12 MW top pressure recovery turbo generating power. BF gas is produced
from each furnace is being cleaned in gas cleaning plant comprising dust catcher, high pressure
scrubber and is distributed throughout the plant as a fuel.
Steel is an alloy iron and carbon, where carbon should be less than 2%. Hot metal
produced in B.F contains impurities like carbon, sulphur, phosphorous, silicon etc., these
impurities will be removed in steel making by oxidation process. These are the three L.D
converters to convert hot metal in to steel. The steel melt shop complex comprising two 1300-
ton hot metal mixers, three 130-ton LD converters (two operating) and six 4-stand bloom casters.
Each converter is being provided with gas cleaning plant for cleaning and recovery of LD gas,
which will be used as fuel in plant.
ROLLING MILLS (RM):
Blooms cannot be used as they are in daily like. These blooms have to be reduced in size
and properly shaped to fit for various jobs. Rolling is one of the mechanical processes to reduce
large size sections in to smaller ones. The cast blooms from CCM are heated and rolled in to
long products of different specifications like high capacity, sophisticated high-speed rolling
mills. The rolling mill complex comprises:
The estimated power requirement for V.S.P in 280 at 3.0 MT stages, the peak load being
292 MW essential loads being 49 MW. The generating capacities 286.5 MW. A captive power
having 3x60 MW turbo-generator sets and 5x330 ton/hr steam generators. In this plant, 6000
Nm^3/min turbo blowers are being provided for supplying cold air blast furnaces.
PRODUCT MIX:
Production at VSP comprises mainly of long steel products, such as plain wirerods, rebars,
rounds and structurals, and semi-finished steel products, such as billetsand blooms. The products
are made with 100percent virgin steel, and we haveadopted modernized technology to help
improve product quality.
Blooms:
Blooms are semi-finished products used for the manufacturing of long steel products.
VSP produces blooms at the steel melt shop, which are then rolled to produce billets. Blooms not
used by VSP are sold to downstream steel producers, who further process them into steel
products that are utilized in a wide variety of construction and manufacturing sectors.
Billets:
Billets are one of the first steel products produced in the steel manufacturing chain.
They are semi-finished products used in the manufacturing of long steel products, such as bar
products, rods and wires. Billets can be used as feedstock for rolling mills for the production of
long products. Steel billets are also used extensively in forge shops and machine shops for the
production of engineering goods.
VSP manufactures billets for further rolling into bars and plain wire rods. It sells its non-rollable
billets to downstream steel producers who further process them into steel products that are
utilized in a wide variety of construction and manufacturing sectors.
Plain wire rods are a type of long steel product with a wide variety of functions such as making
wires for welded mesh, nails, hangers, screws, chain link fencing, wire nets and barbed wires.
Plain wire rods are produced both in the mild steel (a type of carbon steel) and value added steel
categories. VSP sells plain wire rods to a broad range of large, medium and small scale users,
who in turn use them for wire drawing, bright bar, fastener and construction purposes. Plain wire
rods are also used in the manufacturing industry.
Rebars:
Rebars are long steel products used for reinforcement in construction and infrastructure projects.
They provide tensile strength to concrete sections subject to a bending load, and they normally
have ribbed profiles on their surface to improve bonding with concrete. VSP have adopted the
quenching and self-tempering technology for making our thermo mechanically treated rebars,
which are marketed under the registered trademark of “VIZAG TMT”. We produce rebars in our
Wire Rod Mill and Light and Medium Merchant Mill, depending on the size of the rebar.
Structurals:
Structurals are long steel products that include angles, channels and beams. Like rebars,
structural products are mainly used in the construction and infrastructure sectors.
Rounds:
Rounds are a type of long steel bar product used mainly in the engineering and automobile
industries. VSP produce rounds in our Light and Medium Merchant Mill and Medium Merchant
and Structural Mill, depending on the size of the round. VSP sell rounds to a broad range of
large, medium and small scale users, many of whom further reroll the rounds to their desired
sizes.
Squares:
Squares are a type of long steel product used for rerolling and forging. VSP produce squares in
our Medium Merchant and Structural Mill. Our Company sells squares to a broad range of large,
medium and small scale users.
Pig Iron:
VSP produce hot metal from high grade iron ore and low ash coke. Surplus hot metal produced
from blast furnaces is cast into pig iron. Our Company sells pig iron to steel manufacturers as
well as foundries. Our installed production capacity for pig iron is 0.6 MTPA.
By-Products:
A number of by-products are generated in the process of steelmaking. These products include
coke products, benzol products, tar products, ammonium sulphate,granulated blast furnace slag,
lime products and gases. Coke by-products are sold to the steel, cement and brick industries.
Benzol by-products are used in the solvent, paint, dye, drugs and detergent industries. Tar by-
products are sold to the aluminum and manufacturing industries. Ammonium sulphate is used as
fertilizer. Granulated blast furnace slag is used for manufacturing slag cement. Lime by-products
are sold to the paper industry. Gases such as liquid oxygen are sold for medical and industrial
purposes while liquid nitrogen is used for industrial purposes. The following Table details the
various products and the by-products of VSP:
Products of VSP
TABLE –1 :
Steel products By-products
Angles Nut coke Granulated slag
Billets Coke dust Lime fines
Channels Coal tar Ammonium sulphatnut
Beams Anthracene oil
Squares HP Naphthalene
Flats Benzene
Rounds Toluene
Re-bars Zylene
Wire Rods Wash oil
Telecommunication Departments in VSP
ROLE:
The following facilities are provided under category of general purpose communication systems:
3000 lines Electronic Exchange in Plant.
2500 Lines Electronic Exchange of Bharat Sanchar Nigam ltd (BSNL) in Project Office is
catering to the needs of Plant area and Sectors-I to VII in township. Another 2000 Lines
Electronic Exchange of Bharat Sanchar Nigam ltd (BSNL) in Township is catering to the needs
of Sectors-VIII to XI in Township.
The 3000 Lines electronic exchange in plant and 2000 lines exchange in township are
having the following facilities:
Extension (subscriber) to extension call, Auto call back, Hot lines, Music on hold,
Reminder Alarm, Automatic line testing facility, Faults man ring back, Call consult facility,
Malicious call tracing facility, 3 party conference Facility and Howler Tone alert etc. All
exchanges working in the steel plant are interconnected by means of junction lines and have
closed numbering scheme.
The 2000 lines exchange in township is interconnected to the BSNL network. Due to this
interconnection all the subscribers of this exchange can receive incoming calls from any part of
the world. A few subscribers are provided with facility to contact subscribers connected to the
BSNL network and cellular and mobile phones in and around Visakhapatnam.
Initially dispatcher communication is provided with cordless switch board type manual
exchanges of electromechanical. Since manufacture of such systems and their spares is
discontinued in the country, these dispatcher systems are being replaced by Electronic exchanges
progressively. Except the ones in CCCP other systems have been replaced. These would also be
replaced very soon.
Production coordination at plant level being conducted by ED (Works) with all HOD s in
the morning every day is facilitated with the help of the digital EXCOM system provided in the
plant control room.
Loudspeaker intercom systems are working LMMM & WRM. These systems are used
for communication between various sections of the same production shop. Communication is
made possible using microphones and loudspeakers provided in the subscriber stations. This
system is very useful in noisy environment where conventional telephones are ineffective. This
system helps to establish communication between any two stations having interconnectivity on
selection basis. By using group call facility it is possible to communicate to all the subscribers in
the group at a time.
This system consists of centralized amplifier rack with amplifiers, desktop micro phone with
press to talk switch and a network of loud speakers connected to the amplifiers .this is useful to
make general announcements to the entire working area as to pass on important instruction from
the control room.
Loudspeaker broad casting systems are provided in C&CCD, BF, SP and SMS
departments.
To ensure direct telephone communication between closely related critical locations hot
lines are provided. By using the hot lines specified locations are connected permanently.
Communication is possible only between these two locations. When one subscriber lifts his
telephone the other will immediately get a ring and communication can be had without any loss
of time.
This is useful to pass-on urgent messages. These hot lines are initially provided with
direct line communication systems which are electro mechanical systems. Due to obsolescence
electronic systems are now being used for most of the locations. Hot lines are working in CCCP,
BF, SMS, LMMM, WRM, MMSM, TPP, PPM, DNW and WMD departments.
G) VHF COMMUNICATION SYSTEMS:
VHF communication systems are used in VSP to establish two way communications
between two or more when either or one of them is moving. There are three models working in
our plant. They are hand-held units (Walkie-talkie), vehicle mounted – mobile units and base
station units.
Walkie-talkies are used by operation and service personnel in almost all of the production
shops. Vehicle mounted units are being used by DNW, CISF (Fire) and CISF (security). Base
station units are used by CISF (fire), CISF (Security), Administration, DNW and largely by
CCCP departments. In CCCP these can be seen in pusher cars, charging cars, door extractors,
electric locos, lifters and CDCP areas.
For monitoring critical operations in different production units continuously from the
concerned control rooms / pulpits CCTV systems are used in SP, BF, SMS, LMMM, WRM and
MMSM departments. CCTV system comprises of CCTV camera with a lens and a CCTV
monitor.
In some cases a video switcher, a central control console, pan and tilt head and zoom
lens are also used. These are interconnected by means of control cables and / or coaxial cables.
Necessary protection is provided for the CCTV equipment depending on the locations where
they are used.
B) CENTRAL FIRE ALARM SIGNALING SYSTEM:
The central fire alarm system is provided for communicating the exact location of
outbreak of fire in any part of the steel plant complex to the central fire station and simultaneous
actuation of sirens to alert personnel of the affected plant zone. The system employs manual call
points located all over the plant.
C) SCADA SYSTEM:
To monitor the consumption of energy by various users in the plant SCADA system is
provided. This is placed at Energy and Telecom centre.
The system comprises of a master station equipment with supervisory consoles and
mimic panels located in the Energy & Telecom Building, 23 Remote Telemetry Units (RTUs)
installed in different plant units and 3 local RTUs for driving the mimic panel in the Energy
centre. The RTUs will be collecting the signals from the local instrumentation & electrical
systems and transmitting to the master station by means of RTUs. The RTUs are connected to
the master station by underground telephone cables.
IPVM is the latest Technology. In this Technology, each CAM is assigned with an IP address
and Internet/Intranet Data Connection as per requirement. We can access the information by IP
address from any part of the world. The functioning is as below.
E) SHIFT CHANGE ANNOUNCEMENT SIREN SYSTEM:
The shift change announcement siren system is provided for ensuring uniform and
accurate shift timings throughout the plant. This system consists of two quartz crystal controlled
master clocks in the Energy & Telecom Centre. The shift timings are programmed in the Master
Clock. At the specified time, the signal will be transmitted for energizing the sirens located at
strategic points in plant area simultaneously at the preset timings.
Apart from the above facilities Telecom department maintains the following cable networks
also
IP CCTV SYSTEM:
1.1 General Background
There are many different types of CCTV systems available—analogue and digital, wired and
wireless and their modes of operation vary; however, the basic components are more or less the
same: a camera, a lens, a monitor, and (for wired systems) cables that carry the signal from one
place to another. Many systems also use video recorders to record the video footage. The camera
picks up the signal from the area being monitored via the lens (which determines how far and
how much the camera can see, and which is often bought separately) and can be either wired or
wireless. In a wired system, the camera sends the signals through a cable to the monitor; in
wireless systems, no cable is needed, and the camera broadcasts the signal straight to the
monitor. The monitor can be either a simple television set (without tuning capacity) or a PC or
laptop. Most wired analogue systems use television monitors, while digital and wireless systems
tend to use computers as monitors for which remote viewing is possible, often via the internet.
For recording purposes, the monitor is accompanied by a video recorder—a VCR for analogue
systems, or a DVR (digital video recorder), or NVR (Network Video Recorder) for digital
systems. A DVR can actually replace the monitor as the receiving device, since many DVRs are
stand-alone units that do everything a computer would do: receive, record, and store the
information for later viewing.
CCTV (Closed Circuit Television) refers to a system of surveillance cameras that sends signals
to a specific location—a monitor, or PC. CCTV systems are commonly used to monitor banks,
shopping malls, and government facilities—and these days, as CCTV technology becomes more
affordable and easier to use, more and more people are installing CCTV cameras in their homes
and businesses.
An IP surveillance digitizes video streams and transmits them over networks, allowing users to
view and manage the video and images remotely with a networked device, such as a PC, anytime
and anywhere. Key components of an IP surveillance system consist of network cameras, video
servers, network video recorders and central management software
1) Lens: light from the illumination scene reflects off the scene. The lens collects the light from
the scene and forms an image of the scene on the light-sensitive camera sensor.
2) Camera: the camera sensor converts the visible scene formed by the lens into an electrical
signal suitable for transmission to the remote monitor
3) Transmission Link: the transmission media. Hard-wired media choices include: - Coaxial, 2-
wire unshielded twisted-pair (UTP), Fiber-optic cable, LAN, WAN, Intranet and Internet
network.
4) Wireless choices include: -Radio frequency (RF), Microwave and Optical infrared (IR)
Signals can be analogue or digital.
5) Monitor: The video monitor or computer screens display (CRT, LCD or plasma) the camera
image by converting the electrical video signal back into a visible image on the monitor screens
7) Camera Switcher, quad Multiplexers. When CCTV security system has multiple cameras, an
electronic switcher, quad, or multiplexer is used to select different cameras automatically or
manually to display the images on a single or multiple monitor, as individual or multiple scenes.
The quad can digitally combine four cameras. The multiplexer can digitally combine 4,9,16, and
even 32 separate cameras.
8) Housings fall under the categories of indoor, outdoor and integral camera/housing assemblies.
a) Dome Housing: the dome camera housing uses a hemispherical clear or tinted plastic dome
enclosing a fixed camera with pan-tilt-zoom lens capability.
b) Plug and play/ housing combinations: to simplify surveillance camera installations many
manufacturers now package the camera-lens housing as a complete assembly. These plus and
play cameras are ready to mount in a wall or ceiling and to connect the power in and the video
out.
9) Pan/Tilt Mechanism: When the camera must view a large area a pan and tilt mount is used to
rotate it horizontally (panning) and to tilt it. Providing a large angular coverage
An IP surveillance digitizes video streams and transmits them over networks, allowing users to
view and manage the video and images remotely with a networked device, such as a PC, anytime
and anywhere. Key components of an IP surveillance system consist of network cameras, video
servers, network video recorders and central management software. . IP surveillance products
are being used in a variety of application fields, which generally fall into the following four
categories:
● Professional applications: transportation, government, industrial, construction, health care,
etc.
● SMB applications: banking, education, retailing, recreation, etc.
● Home applications: residential surveillance, digital home, etc.
● 3GPP applications: mobile surveillance, elder care, baby or pet viewing, etc.
Network Cameras
A network camera, also known as Internet camera, IP camera or Internet video camera, transmits
live digital video over an Ethernet network to back-end devices such as a PC or 3G phone. With
a dedicated IP address, a built-in web server and audio/video streaming protocols, it can work
independently for real-time monitoring. Images from network cameras can be viewed with a web
browser such as Internet Explore, Firefox, Mozilla and Opera, enabling customers to perform
live viewing on different networked devices. In addition, customers can control and manage
multiple cameras at the same time in any places where network connection is available.
Therefore, an IP surveillance system is easier and more convenient to use compared with a
CCTV system.
2
A network camera mainly consists of a lens, an image sensor, an image processor, a video
compression SoC (System on Chip) and an Ethernet chip that offers network connectivity for
data transmission. When light passes through the lens to the sensor, it is converted to digital
signals and then processed by a built-in digital signal processor. The processed video data is then
compressed by a multimedia SoC to achieve a smaller data size for optimal transmission. Finally,
the video images are sent through the Internet to back-end devices to allow for viewing and
storage. Apart from video compression, the SoC is built with a RISC CPU for processing system
and network data.
The general interface of a network camera includes a power cord socket, an Ethernet socket,
audio I/O ports and digital I/O ports
Lens Image
Camera Types
Generally, network cameras can be divided into four types for different applications, including
fixed, pan/tilt/zoom,fixed dome and speed dome.
Fixed Type
A fixed network camera points in a fixed direction to monitor a specific area, such as hallways,
staircases or corridors. Because people can be aware of the camera’s shooting direction, in some
cases, it can deter vandalism and crimes. A fixed network camera usually comes with a RS-
232/422/485 interface that connects the cameras to a pan/tilt scanner for wider coverage. Many
fixed network cameras has exchangeable C/CS-mount lens design, giving users the ability to
change the lens to adapt for different monitoring conditions.
Pan/Tilt/Zoom Type
Capable of changing shooting direction horizontally and vertically to achieve a wide field of
view, a pan/tilt network camera is used in many spacious areas, such as lobbies or parking lots.
Some pan/tilt network cameras are integrated with zoom capability so as to provide close-up
images of distant objects. Users can easily control PTZ functions through a web browser.
Compared with fixed dome type, a speed dome network camera is integrated with pan, tilt and
zoom capabilities, enabling a far greater field of view. With a high zoom capability, image
stabilization and 360-degree endless pan, a speed dome camera is mainly used for professional
applications, such as airports, banks or city security.
A fixed dome network camera, mostly designed for indoor surveillance, has a housing to make
the object of interest less aware of where the camera is pointing at. With a 3-axis mechanism,
images can remain in an upright orientation when it is installed either against the wall or on the
ceiling. Furthermore, the design of a fixed dome network camera can better fit in with the decor.
A fixed dome network camera can be furnished with a weather- or vandal-proof housing for
outdoor applications.
Video Servers
A video server is a device that converts analog signals to digital, allowing users to migrate to a
digital surveillance system without replacing existing CCTV systems. A video server mainly
includes a compression chip and an Ethernet chip, with two main types available: one port or
four ports.
STORAGE MEDIA
Various types of storage media have been developed to meet different demands and purposes,
such as
● Internal buffer
● External memory cards
● DAS (Direct Attached Storage)
● NAS (Network Attached Storage)
● SAN (Storage Area Network)
DAS
Images are transmitted from a camera to a host PC via Ethernet cables and stored directly in the
hard disk drive of the PC. DAS is aimed to enable storage and playback on the same PC and is
mainly used by small- or medium sized businesses.
NAS
Images are transmitted to a purpose-built NAS server via Ethernet cables for storage. NAS
allows storage and playback on different platforms and is especially suitable for enterprises that
need to access and share large volume data
SAN
Images are sent to a purpose-built SAN server via an exclusive fiber optic cable for storage. As
with NAS, storage and playback of images can be performed on different platforms, but SAN
further reduces Ethernet bandwidth usage and offers a faster transfer rate.
An NVR (Network Video Recorder) is an IP-based recorder that operates independently from a
PC or other operation systems. Aimed to store digital video streams from network cameras, an
NVR is usually incorporated with a large-volume hard disk to allow for a long period of
recording. An NVR differs from a traditional DVR in its network connectivity, which allows
digital data to be transmitted to other networked devices over the Internet. Another difference is
that an NVR can be directly connected to a network camera while a DVR is usually connected to
an analog camera.
A system administrator may choose to use MJPEG on certain cameras and MPEG-4 or H.264 on
others, depending on system goals and requirements.
A codec is a device or program that performs encoding and decoding on a digital video stream.
In IP networking, the term frame refers to a single unit of traffic across an Ethernet or other
Layer-2 network. Frame primarily refers to one image within a video stream. A video frame can
consist of multiple IP packets or Ethernet frames. A video stream is fundamentally a sequence of
still images. In a video stream with fewer images per second, or a lower frame rate, motion is
normally perceived as choppy or broken. At higher frame rates up to 30 frames per second, the
video motion appears smoother; however, 15 frames per second video may be adequate for
viewing and recording purposes.
Some of the most common digital video formats include the following:
• MPEG-1 and MPEG-2 formats are Discrete Cosine Transform-based with predictive frames
and scalar quantization for additional compression. They are widely implemented, and MPEG-2
is still in common use on DVD and in most digital video broadcasting systems. Both formats
consume a higher level of bandwidth for a comparable quality level than MPEG-4. These
formats are not typically used in IP video surveillance camera deployments.
• H.264 is a technically equivalent standard to MPEG-4 part 10, and is also referred to as
Advanced Video Codec (AVC). This emerging new standard offers the potential for greater
compression and higher quality than existing compression technologies. It is estimated that the
bandwidth savings when using H.264 is at least 25 percent over the same configuration with
MPEG-4. The bandwidth savings associated with H.264 is important for high definition and
megapixel camera deployments.
MJPEG
An MJPEG codec transmits video as a sequence of Joint Photographic Experts Group (JPEG)
encoded images. Each image stands alone without the use of any predictive compression
between frames. MJPEG is less computation-intensive than predictive codecs such as MPEG-4,
so can be implemented with good performance on less expensive hardware. MJPEG can easily
be recorded at a reduced frame rate by only sampling a subset of a live stream. For example,
storing every third frame of a 30-frame per second video stream will result in a recorded archive
at 10 frames per second. MJPEG has a relatively high bandwidth requirement compared to
MPEG-4. A 640x480 VGA resolution stream running at 30 frames per second can easily
consume 5 to 10 Mbps. The bandwidth required is a function of the complexity of the image, in
conjunction with tuning parameters that control the level of compression. Higher levels of
compression reduce the bandwidth requirement but also reduce the quality of the decoded image.
Since there is no predictive encoding between frames, the amount of motion or change in the
image over time has no impact on bandwidth consumption.
MPEG-4/H.264
An MPEG-4 codec uses prediction algorithms to achieve higher levels of compression than
MJPEG while preserving image quality. Periodic video frames called I-frames are transmitted as
complete, standalone JPEG images similar to an MJPEG frame and are used as a reference point
for the predictive frames. The remaining video frames (P-frames) contain only information that
has changed since the previous frame.
• P-frames (predictive or predicted frames)—This frame type contains only image data that has
changed from the previous frame.
• B-frames (bi-directional predictive frames)—This frame type can reference data from both
preceding frames and future frames. Referencing of future frames requires frame reordering
within the codec.
The use of P-frames and B-frames within a video stream can drastically reduce the consumption
of bandwidth compared to sending full image information in each frame. However, the resulting
variance of the video frames' size contributes to the fluctuation in the bandwidth that a given
stream uses. This is the nature of most codecs because the amount of compression that can be
achieved varies greatly with the nature of the video source.
PoE
Conventional network cameras require a power cable for power supply and an Ethernet cable for
data transmission. PoE (Power-over-Ethernet), developed by the IEEE802.3af task force, enables
power to be supplied over the same Ethernet cable, and thus eliminates the use of power cables.
By connecting a PoE-supported camera to a PoE switch, you need not deploy additional power
cables A PoE switch can provide 48 volts of direct current over two out of four pairs on an
Ethernet cable, with maximum current of 400mA and maximum output power of 15.4W. IEEE
has developed a new IEEE 802.3at standard, known as PoE+ to provide maximum output power
of 30W
Unicast
With unicast, data is transmitted to the designated PC only and other PCs on the same network
will not receive the data. If more than one PC request for the same piece of data, the source PC
has to send the data repeatedly to different destinations. This is the most popular transmission
method and is also known as One-to-One transmission.
Broadcast
Broadcast is mainly used on the LAN. Compared with unicast, all network devices in broadcast
on the same network will receive data whether they need it or not. The source PC sends data to a
router where data is replicated and sent to multiple destination PCs requesting for the same data.
It is also called One-to-All transmission.
Multicast
With multicast, data is transmitted to a multicast group consisting of PCs requesting for the same
data on the Internet. Once the data reaches the multicast group, it is duplicated and delivered
separately to each PC in that group. Multicast significantly reduces bandwidth usage and is
suitable for web video applications such as VoD, e-learning and video conferencing. It is also
called One-to-Many or Many-to-Many transmission.
VIDEO MANAGEMENT
Apart from network cameras, a successful IP surveillance system must include powerful central
management software to achieve reliability, flexibility, scalability and high efficiency. Video
management software provides basic monitoring, recording and management function as well as
advanced functions such as intelligent surveillance and integration with other systems.
PC-based
A PC-based platform is implemented by installing video management software on a PC or
server, a standard hardware component. Before the installation, users have to figure out the
system requirements such as CPU capability and operating system so as to achieve the expected
performance. Since it is easier for users to operate, upgrade, integrate, most large organizations,
institutes, or enterprises build up their surveillance systems by adopting PC-based platforms,
integrated with IT or MIS management. As a result, many advantages such as scalability,
integration, and flexibility are all included.
NVR-based
Monitoring
Users can view live video images with a web browser such as Internet Explorer, on a mobile
device or via software. More than one users can access the camera to view the images at the
same time. Through the management software, users can use different viewing modes like split
windows to simultaneously view the transmitted images from multiple cameras
Recording
Recording can be performed in different modes such as continuous, on schedule or on event
trigger according to their needs. On-schedule or event-triggered recording is highly needed
because the storage requirements will be reduced; so is the bandwidth. In an IP surveillance
system, the frame rate is changeable. Therefore, users can set the system to use a lower
frame rate during live monitoring for low bandwidth usage while shifting to a full frame rate
during event-triggered recording to ensure good image quality
Playback
Recorded video images can be viewed in multiple split windows and by several users at the same
time. The recorded database can also be searched in a more efficient way such as by date, time,
region or event
Advantages of IP Surveillance
● Remote monitoring/storage
Since video data can be transmitted to remote networked devices over Ethernet networks, users
can view camera images in any place where IP network connection is available.
● Cost efficiency
Video surveillance systems can leverage existing IP network infrastructure, significantly
reducing overall installation costs.
● High scalability
Adding new network cameras or other networked devices in an IP surveillance system is easy by
simply connecting them to a router.
● Superior image quality
Network cameras provide high image quality; many of them even offer megapixel resolutions. In
addition, IP surveillance has no signal degradation problems during transmission, and thus can
ensure steady image quality
CCTV systems are broadly divided into two known types, namely: wired CCTV systems and
wireless CCTV systems. Wired systems bind all three key components of a CCTV system with
cables while a wireless system comprises of a wireless camera that need not be connected to the
recording device and monitor. Both of these systems have distinct advantages and disadvantages
associated as different types of technology are employed to provide security and reliable
monitoring.
Wireless CCTV systems are increasingly becoming a popular choice on account of the ease of
installing such a system, lack of cabling requirements and assured mobility. The key advantages
are:
a) A wireless camera can be moved to other locations requiring observation while it is difficult to
move a wired camera.
b) Best suited for locations requiring temporary observation or in a temporary location.
d) Wireless recording and monitoring device need not be in the same line of sight allowing
observation of any place from another remote location.
At the same time, there are some disadvantages of wireless CCTV systems,
a) Wireless systems require a dedicated frequency to transmit signals from the camera to the
receiving and recording station.
b) Frequencies may be subject to various interruptions by use of electric motored products, air
conditioning, fluorescent lighting or cordless telephones which affect the picture quality.
c) Wireless camera may not provide the best picture quality as such systems are susceptible to
picture distortion while wired cameras provide relatively better picture quality.
d) Wireless CCTV cameras may need electric power which implies a wire runs through to the
camera though the video connection is wireless.
e) Wireless systems require wireless technology-specific expertise to diagnose and fix break
downs in the system.
Wired CCTV Systems
Wired CCTV systems connect the camera to the recording device and monitor with the help of
standard coaxial cables or Unshielded Twisted Pair (UTP) cables or fibre optic cables.
a) Cabling and installing can be a tedious task, requiring help from experts
b) Observation is fixed to a specific area and the camera cannot be easily moved to another
location.
Overall, wireless cameras are relatively more expensive than traditional wired cameras.
Wireless CCTV systems are a preferred choice in specific locations devoid of easy cabling
facilities and for individuals requiring an easy-to-install solution.
The wired CCTV system is a preferred choice when good picture quality and economy
considerations gain precedence.
LTE technology was designed to significantly improve the low data rates and roaming
issues with older phone protocols. The protocol can carry more than 100 Mbps of data, although
the network bandwidth is normally regulated to levels below 10 Mbps for individual users. Due
to the significant cost of equipment, plus some government regulatory challenges, phone carriers
have not yet deployed LTE in many locations. LTE is also not suitable for home and other local
area networking, being designed to support a larger number of customers across much longer
distances (and corresponding higher cost).
Bluetooth
One of the oldest wireless protocols still broadly available, Bluetooth was created in the
1990s to synchronize data between phones and other battery-powered devices. Bluetooth
requires a lower amount of power to operate than Wi-Fi and most other wireless protocols. In
return, Bluetooth connections only function over relatively short distances, often 30 feet (10 m)
or less and support relatively low data rates, usually 1-2 Mbps. Wi-Fi has replaced Bluetooth on
some newer equipment, but many phones today still support both of these protocols.
Wi-Fi
Wi-Fi is a local area wireless computer networking technology that allows electronic devices to
connect to the network, mainly using the 2.4 gigahertz UHF and 5 gigahertz SHF ISM radio
bands.
IEEE 802.11, developed by the IEEE LAN/MAN Standards Committee, is a set of standards for
wireless local area network computer communication. 802.11b, 802.11g, and 802.11n are widely
used in wireless network devices.
802.11b
802.11b operates in the 2.4GHz band with a transfer rate of 11Mbps and a range of 35 meters
indoors and 100 meters outdoors. The drawback of 802.11b is that signals can be blocked by
walls. The 2.4GHz is also subject to interference caused by electronics or Bluetooth signals. . The
802.11a transmit data-at a frequency level of 5GHz.
802.11g
802.11g, the same as 802.11b, operates in the 2.4GHz band. It has a transfer rate of 54Mbps,
similar to that of 802.11a, and a range of 25 meters indoors and 75 meters outdoors. 802.11g has
the same weaknesses as 802.11b; however, it outperforms 802.11b in transfer rate.
802.11n
The cornerstone of a wireless network is a device known as an access point (AP). The primary
job of an access point is to broadcast a wireless signal that computers can detect and "tune" into.
Since wireless networks are usually connected to wired ones, an access point also often serves as
a link to the resources available on the wired network, such as an Internet connection. In order to
connect to an access point and join a wireless network, computers must be equipped with
wireless network adapters. These are often built right into the computer, but if not, just about any
computer or notebook can be made wireless-capable through the use of an add-on adapter
plugged into an empty expansion slot, USB port, or in the case of notebooks, a PC Card slot.
3GPP
3GPP is a set of open standard protocols for audio and video bitstreams to be viewed on a 3G
mobile phone. This standard is widely supported by major mobile phone vendors
WiMAX
WiMAX is a wireless digital communications system intended for broadband wireless access up
to 50 kilometers or 30 miles for fixed stations, and 5 to 15 kilometers (3 to 10 miles) for mobile
stations. Designed primarily for wireless telecommunication service providers, WiMAX operates
on both licensed and non-licensed frequencies, providing a regulated environment and a viable
economic model for wireless carriers. WiMAX, developed by the 802.16 group of IEEE, is also
called the 802.16 standard. WiMAX offers a transfer rate of 70Mbps in a range of 70 kilometers,
making it ideal for long-distance and outdoor connection.
While WiMAX provides Wi-Fi-like data rates, it provides significantly better coverage and
quality of service (QoS) controls. Although suitable for low- to mid-performance video
surveillance, WiMAX is designed to deliver high downlink rates and low uplink rates, the
opposite of the requirements of what high performance video surveillance networks require.
Further, WiMAX has quite large latency, in the order of 20 – 40 msec, which can impact video
quality.
Specialized Networks
The use of 802.16-based networks provides important characteristics for video surveillance
networks:
1. Fixed amounts of bandwidth can be allocated to each camera to guarantee video images will
be transmitted regardless of network traffic loading.
2. Latency is low and not variable. High latency can be disastrous for video surveillance, making
camera control functions such as PTZ frustratingly slow, and making advanced video
surveillance functions such as license plate recognition completely unusable. With constantly
low latency, network designers are assured of consistent performance despite significant
variations in traffic loading.
3. The routes are fixed. Images from cameras always take the same route, which ensures
consistent performance over all operating conditions and as the network grows.
4. Specialized networks scale well. The radios are used in point-to-point (PTP) and point-to-
multipoint (PMP) configurations to build networks that scale very well for large area coverage
with many cameras, much like a cell phone network. They have deterministic performance and a
hierarchical structure. Thus, adding more cameras does not impact the performance of existing
cameras.
5. Memory allocation and processing power can be increased to accommodate the “bursty”
nature of data compression. Data showers during high-activity periods can often overflow the
memory buffers of standards-based radios.
WPA
With the increasing computing capability of a PC, WEP, which uses a fixed encryption key,
becomes vulnerable to be attacked. Hence, the Wi-Fi Alliance developed WPA (Wi-Fi Protected
Access) /WPA2 standard based on WEP. WPA uses TKIP (Temporal Key Integrity Protocol)
that dynamically changes the key for each packet during transmission. With a 128-bit key, WPA
offers a higher level of security than WEP. WPA provides data protection via user
authentication, encryption and packet inspection. It also improves wireless network management.
WPA2 indicates compliance with an advanced protocol that implements the full standard. In
addition, WPA defines the use of AES (Advanced Encryption Standard) as an additional
replacement for WEP encryption
Fast Deployment
Wireless networking eliminates the time-consuming installation of data cables. The small,
lightweight radios and cameras simplify mounting requirements, making installation quick and
easy. Modern wireless equipment employs non-line-of-sight (NLOS) technology, eliminating
most building-related issues and simplifying outdoor deployment.
Cost Efficient
Video surveillance saves money and uses resources effectively. For example, a prominent police
department estimates that 30 cameras are equivalent to 30 surveillance officers on the street,
while the central monitoring station requires only two officers. The cost and time of acquiring
rights-of-way, digging trenches, and installing and testing a wired network are prohibitively high
compared to the cost of installing a wireless network. A wireless network can be operational and
delivering benefits for a fraction of the time and cost.
Wide Coverage
Public safety video surveillance systems must cover hundreds of miles of road and many square
miles of a city and link remote video surveillance systems to a central monitoring station. The
long range and the high throughput provided by wireless (more than 80 km at 100s of Mbps)
allow quick, easy and cost-effective surveillance.
Flexibility
Wireless is the leader in flexibility. You can easily move or add cameras, and you can quickly
reconfigure a network to allocate bandwidth to locations requiring higher resolution images.
Wireless lets you react in real time without waiting for a wired network to catch up to your
needs.
The amount of bandwidth used by video surveillance cameras is determined by the number of
cameras, the image resolution, the compression ratio, the movement or activity being monitored,
and the frame rate. Clearly the more cameras you have, the more bandwidth you will use on the
network. A single frame can contain from 30 kilobytes to more than 160 kilobytes for high-
resolution images. At multiple frames per second (fps), each camera could easily require 10
megabits per second (Mbps), excluding any network protocol overhead. Fortunately, there are
ways to reduce this.
Image Resolution
The higher the resolution, the greater amount of detail you can capture in a video image. A
standard-definition TV image has a resolution of 352x240, and your PC typically 704x480.
High-resolution cameras deliver up to 2592 x1944 and enable digital pan, tilt and zoom (PTZ)
around an image even after the video has been stored. As the amount of bandwidth required rises
with image quality, it is best to find a level that meets your needs.
Compression
Compression technologies have a major impact on image quality, bandwidth usage, storage
space and system loading. A high compression ratio can significantly reduce file size, and thus
cut down bandwidth usage and storage space. However, a high compression ratio may cause a
trade-off between bandwidth and image quality. Video compression is an important tool for
easing strain on a network. It allows high-quality video transmission without hoarding
bandwidth. Video surveillance systems typically use MJPEG, MPEG-4 or H.264 compression
technology. Your choice depends on your application and your needs. MPEG-4, which provides
better compression but lower resolution, is usually used when you need to conserve bandwidth
and storage. MJPEG compression is usually used by the higher resolution cameras and offers the
advantage of very clear screen shots when a photograph is preferred over a video clip. H.264, the
latest compression technique, offers an excellent trade-off between quality and bandwidth. H.264
provides about twice the compression of MPEG-4 for the same video quality.
Modern compression algorithms work by comparing the differences between frames, which
means the bandwidth requirement is directly related to motion in the monitored area. For
example, monitoring a static scene requires less bandwidth than monitoring traffic or a public
area where there is a lot of motion. The latter requires higher network bandwidth because the
compression rates are low.
Frame Rate
The number of fps relates to how smooth motion appears in the video. Standard TV runs at 30
fps, providing excellent motion but at a high bandwidth cost. Fortunately, in most video
surveillance applications, there is little motion. For example, a frame rate of four fps would be
sufficient for a person walking through a room. Many cameras minimize bandwidth by
increasing the frame rate only when motion is detected.
Due to the many factors that contribute to video bit rate, there is no exact method to calculate
total bandwidth requirements. Each camera manufacturer and each encoder model has different
requirements, and every installation introduces unique variables. Most wireless video
surveillance systems are installed outdoors. Weather conditions, topography, line-of-sight
conditions, and interference spectrum impact the amount of bandwidth on a given link. Careful
planners provide an additional 20 per cent bandwidth to mitigate the impact of these variations.
The following charts provide a starting point for planning a camera network:
WIRELESS IS DIFFERENT
Wireless is an open medium, which means others could easily listen in if precautions are not
taken. For example, many Wi-Fi networks are unsecured allowing easy connection of your
laptop. It is critical that any wireless network used for video surveillance have sufficient
encryption and authentication controls to prevent unauthorized persons from seeing images of
your operations, your people or your customers.
Most of the time, video surveillance cameras watch a static scene. During periods where little or
no motion is detected, the cameras send very little information over the network. However, when
a large amount of motion or a major change in a scene occurs, the amount of data sent can
skyrocket, resulting in what is called a data shower. Wireless networking gear that does not
include data shower caching will drop frames, potentially losing the most important moments of
an incident.
Latency
Latency in wireless can be quite high compared to a wired network. For real-time applications
such as video, latency can result in lost detail or a jumpy or pixelated picture. High latency will
also make PTZ camera operation difficult or frustratingly slow. If your wireless video
surveillance network carries other applications such as voice or control system data like SCADA,
then high latency can result in expensive and time-consuming reconfiguration and testing, in
some cases making the application unusable.
Throughput
When designing the wireless network for video, the question will arise of how much throughput
(sometimes called bandwidth) is needed and more throughput always translates into more radios.
Getting a solid estimate of throughput requirements up front will ensure excellent performance
within budget. All radio manufacturers specify throughput; however, it is critical to understand
how it is measured. Most manufacturers specify throughput using only large packet sizes, which
inflates the throughput available. For example, a radio processing 1,500-byte packets might have
a throughput of 48 Mbps. However, the same radio processing 60-byte packets might provide
less than 2 Mbps. Since the compression process results in varying packet sizes, selecting radios
that provide consistently high throughput under varying packet sizes is critical.
Management
Network management tools used in wireless networks are similar to those used in wired
networks, except that wireless network management tools must be capable of providing over-the-
air (OTA) management, not only for configuration and monitoring but also for software updates.
Being able to update or load new software OTA is critical for maximizing uptime while
minimizing support costs.
Comprehension Challenges
From an engineering perspective, wireless is harder to understand. Instead of a simple wire that
provides a huge amount of throughput regardless of most other conditions, wireless is teaming
with jargon and changing operating conditions affects performance. You need to understand the
geography of the installation in relation to the characteristics of radio frequency signals. You
need to understand that leaves, rain, fog, snow, buildings and nearby wireless users all provide
interference that can degrade video quality. All of this means that wireless systems must perform
additional functions to ensure fair and efficient use of the wireless link. It is all about balancing
performance and reliability in varying link conditions (fading, distance, movement).
Wireless security camera systems consist of a wireless transmitter and receiver antennas
and allow closed-circuit cameras or IP security cameras to transmit a wireless signal using a 5.8
GHz signal up to 4 miles. These systems are used in situations where cable dredging is not
practical or is cost prohibitive. They are made for long distance outdoor use with a direct line of
sight between the transmitting and receiving antennas.
POINT-TO-POINT WIRELESS
The point-to-point wireless topology (also called P2P) is the simplest network architecture you
can set up in order to connect two locations using a wireless radio link. Point-to-point wireless
links can go from a short-range link connecting two locations just a few hundreds meters apart to
a long range point-to-point wireless link that connects two locations tens of miles away from
each other. In a point to-point-wireless link, distance is affected by the height of each Ethernet
radio device, the frequency used, the power level, and environmental interference.
Point-to-point wireless links are often used for telecom, security and networking
applications. In the telecom space, point-to-point wireless links are deployed to backhaul cellular
base stations. Cellular backhauls typically employ licensed spectrum and high capacity long-
range point-to point microwave links. However, with the widespread deployment of small cells,
license-free, long-range point-to-point wireless links are being used more and more often,
particularly in rural areas where interference is not a significant concern. In security and public
safety projects, point-to-point outdoor wireless connections are deployed to backhaul outdoor
wireless video-surveillance systems. The video streams coming from outdoor field cameras are
collected using a point-to multipoint wireless network to a central location, often located on a
high point (e.g., a tall building or a mountaintop). From this central location, all the video
streams are transmitted over an outdoor point-to-point wireless link to the control room.
In wireless networking applications, two buildings can be interconnected using a point-
to- point wireless Ethernet connection and two IP Ethernet networks can be therefore
interconnected without trenching the area. This point-to-point wireless Ethernet solution is very
often used in campus environments or to connect two buildings owned by the same organisation
sitting on two different sides of a street, railway, or river. Point-to-point wireless links are
usually deployed between two locations that are in clear line of sight (LOS) with each other in
other to maximise the performance of the wireless link. For point-to-point wireless links working
in the license free 5 GHz band (for example in the 5.8 GHz or 5.4 GHz license-free bands) or in
the 4.9 GHz public safety band we suggest to deploy the link in clear line of sight (LOS)
because, above 2.4 GHz, line of sight (LOS) operations provide a much more reliable wireless
link. Point to point wireless link at frequencies around 900 MHz or in the UHF band (400 MHz)
can work reliably in near line of sight (NLOS) or in non line of sight conditions (NLOS point to
point wireless links).
POINT-TO-MULTIPOINT WIRELESS
The Point-to-Multipoint topology (also called star topology or simply P2MP) is a common
network architecture for outdoor wireless networks to connect multiple locations to one single
central location. In a point-to-multipoint wireless Ethernet network, all remote locations do not
communicate directly with each other but have a single connection towards the center of the star
network where one or more base station is typically located. The remote locations at the edge of
the networks are typically called “client” locations and the central location is called the “access
point” or “base station”. Point-to-multipoint wireless networks have been studied in the 1990s
and in the early 2000s and discussed in many academic publications because they can be affected
by certain issues such as the hidden terminal issues or the exposed terminal issues, depending on
the point-to-multipoint protocol implemented to coordinate the transmissions over the wireless
medium. Most outdoor point-to-multipoint networks implement a centralized medium access
control protocol or employ a TDMA-based protocol synchronizing all radio devices with a GPS
device in order to avoid the hidden terminal and exposed terminal issues.
Outdoor point-to-multipoint wireless solutions are very common both for wireless
Internet service providers (WISPs) and for outdoor video-surveillance systems. In a WISP
network, subscribers are connected at the edge of the network using a client device typically
mounted on the roof of their house. One or more central base stations are mounted on a high
building, or on a mountaintop or on a water tower in line of sight with as many client devices as
possible.
In outdoor wireless video-surveillance systems, each camera in the field is connected to a
wireless client device and then a base station is mounted on top of a tall building and acts as the
central device and coordinator of the point-to-multipoint wireless network. In a point-to-
multipoint wireless CCTV system, all video streams from the remote cameras are collected at
this central location at the center of the point-to-multipoint wireless system and then transmitted
to a control room using a point-to-point wireless fiber backhaul. Point-to-multipoint wireless
links are deployed between locations where the client wireless devices are in clear line of sight
(LOS) with the device acting as the base station. In a point-to-multipoint wireless network that
works using the license free 5 GHz band (for example in the 5.8 GHz or 5.4 GHz license-free
bands) or using the 4.9 GHz public safety band it is suggested to deploy the link in clear line of
sight (LOS) because, above 2.4 GHz, line of sight (LOS) operations provide more reliable
performances. Point to multipoint networks working on frequencies around 900 MHz or in the
UHF band (400 MHz) can operate reliably in near line of sight (NLOS) or in non line of sight
conditions (NLOS point to point wireless links).
WIRELESS MESH NETWORKS
In outdoor wireless networking, wireless mesh networks are the third topology after point-to-
point and point-to-multipoint in order to build a wireless network infrastructure. Each device in
a wireless mesh network is typically called a mesh node and is connected with multiple other
mesh nodes at the same time. Wireless mesh networks are also multi hop networks because
each mesh node can reach another node going through multiple hops and leveraging other nodes
as repeaters. The major advantage of a wireless mesh networks is the intrinsic redundancy and,
consequently, reliability because a mesh network is able to reroute traffic through multiple paths
to cope with link failures, interference, power failures or network device failures
Two types of wireless mesh networks are usually implemented for commercial and
government applications: Unstructured or omni-directional wireless mesh networks and
Structured wireless mesh networks.
In an unstructured wireless mesh network, each mesh node typically uses an omni-
directional antenna and is able to communicate with all the other mesh nodes that are within the
transmission range. Wireless links in an unstructured wireless mesh network are not planned and
link availability is not always guaranteed. Depending on the density of the mesh network, there
may be many different links available to other mesh nodes or none at all. Unstructured mesh
networks are usually implemented with non-line of sight radios (NLOS) using low frequency and
low bandwidth radios operating, for example, in the UHF bands, such as 400 MHz or in the
license-free band at 900 MHz. Unstructured wireless mesh networks leverage one single channel
shared by all the radios. Therefore, the higher the number of hops a transmission requires, the
lower the overall throughput of the network will be.
Structured wireless mesh networks are planned networks typically implemented using
multiple radios at each node location and multiple directional antennas. A ring topology using
multiple directional wireless links is commonly used in a structured wireless mesh network to
enable each radio to seamlessly reroute traffic through different paths in the event of node or link
failures. Structured wireless mesh networks can provide two or more alternative paths from each
mesh node location and typically use high frequency radios and microwave links with directional
antennas. The distance between nodes in a structured wireless mesh network can be up to tens of
miles using long-range directional microwave links. Structured wireless mesh networks are often
used for mission-critical applications such as wireless video surveillance, public safety, and
industrial automation. They provide the ideal network architecture in case a site requires a highly
reliable and available wireless network for a broadband application such as video, voice and data
streaming. Each link in a structured wireless mesh network operates on an independent channel
and, therefore, the number of hops for a specific transmission does not affect the overall
throughput of the network.
There are multiple government and commercial applications for wireless mesh networks:
Temporary wireless mesh video surveillance: military and government organisations use
wireless mesh networks frequently for rapid deployment of wireless video surveillance in war
zones or during hostage situations. Wireless mesh networks have also been used to provide
temporary video surveillance to protect major sporting or political events. Urban wireless video
surveillance and public safety: law enforcement agencies have been using wireless mesh
networks to create city-wide wireless network infrastructure and stream high resolution video
across large cities without compromising reliability or needing to trench large portions of the city
area. At present, most mesh networks for public safety work on the 4.9 GHz public safety band.
Wireless Industrial Automation and Condition Monitoring: large industrial plants and oil &
gas facilities have been using low-frequency unstructured mesh networks for condition
monitoring and sensor data collection. At the same time, industrial automation has leveraged
structured mesh networks operating at 5 GHz (5.4 GHz, 5.7 GHz and 5.8 GHz license-free
bands) to high-throughput applications such as video and voice streaming. Mining Automation:
Mines have been pushing to constantly increase their efficiency leveraging automaton and
technology. Large open pit mines have been using outdoor wireless mesh networks for video
surveillance, truck automation and condition monitoring. Both low throughput and high
throughput applications in mines often rely on a wireless mesh network due to the lack of any
other telecom infrastructure.
This project helped us to know about Video surveillance system. We learnt about
types of cameras, cables, storage, antennas, wireless protocols. We also learnt
about advantages and disadvantages of Wireless surveillance system, challenges
involved in designing and maintenance of it.