0% found this document useful (0 votes)
47 views57 pages

Wireless-INTERNSHIP PROOJECT

Wireless Communication Projects use for Interns who are doing their internships on wireless communication on telecommunication department
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views57 pages

Wireless-INTERNSHIP PROOJECT

Wireless Communication Projects use for Interns who are doing their internships on wireless communication on telecommunication department
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

Internship Report on

STUDY OF WIRELESS COMMUNICATION


An internship report is submitted in partial fulfilment of the
requirement for award of the degree of
Bachelor of Technology
ELECTRONICS AND COMMUNICATION ENGINEERING

SUBMITTED BY
SRINIVAS VASAM
DEPARTMENT OF ELECTRONICS AND COMMUNICATION
ENGINEERING
VISHNU INSTITUTE OF TECHNOLOGY
BHIMAVARAM - 534201 YEAR 2024-2025
RINL VISAKHAPATNAM
DEPARTMENT OF TELECOMMUNICATION

CERTIFICATE
This is to certify that, this internship report entitled,
” STUDY OF WIRELESS COMMUNICATION ”
Bonafide work of SRINIVAS VASAM
submitted in the partial fulfilment of requirements for the award of
degree of B.Tech (ECE) during the period 2024-2025.This work is
carried out in the VISAKHAPATNAM STEEL PLANT (RINL)
during the period of 2nd SEP 2024 to 28th SEP 2024 in the Department
of Telecommunication.

INTERNSHIP GUIDE : Mr.G.Jitendra Kumar


Sr.Manager(Telecom)
(signature) RINL Visakhapatnam
DECLARATION

We hereby declare that the internship report entitled “STUDY OF WIRELESS


COMMUNICATION” under the guidance of MR.G.Jitendra Kumar ,
Sr.Manager(Telecom), at VSP/RINL is an original work done by me,for the
award of B.Tech Degree by Vishnu Institute of Technology

Srinivas vasam
ACKNOWLEDGMENT
We hereby take this opportunity to express our sincere gratitude to the following
eminent personalities whose aid and advice helped us to complete this project work
successfully without any difficulty.

We express our gratitude to our Head of the Department, Mr. K.RAO heart fully
for his encouragement and for providing lab facilities throughout the project.

We thank to our beloved project guide Mr.G.Jitendra Kumar, Sr.Manager


(Telecom) for his valuable guidance, constant encouragement. We feel it be
a great privilege to work under his guidance.

Last but not the least, we are grateful to our friends for their innovative suggestions
and help for the completion of our project.

As a token of our feeling, We would like to acknowledge my sincere regards to


Mr. M.SIMHACHALAM Sr.Manager (Telecom) and officers of the Telecom
department who have directly or indirectly helped us in completing this project.
CONTENTS

 Abstract
 About Visakhapatnam Steel plant
• Introduction
• Production Flow chart
• Major Departments in VSP
• Product MIX
 Telecommunication Department in VSP.
• Role
• Different Communication systems in VSP
 Introduction of IP CCTV
• Block diagram of IP CCTV
 IP based survelliance CCTV system
• About CCD
• Technical specifications
 Design of IP based CCTV System for VSP
• Network architecture
• TCP/IP Protocol
• ethernet 0
 Conclusion
ABSTRACT

The project is based on the “Video surveillance on transportation of raw materials


through road from Gangavaram port to Visakhapatnam steel plant”. Visakhapatnam Steel Plant
has expanded its production capacity to 7.3 MT of crude steel and is further going to expand to
20 MT in due course of time. So, raw material requirement has also increased. Most of the raw
materials are transported to Visakhapatnam Steel Plant by Indian Railway, some by road and
some of them through Gangavaram port. At present raw materials are transported to
Visakhapatnam Steel Plant from Gangavaram port through Closed Conveyor (CC) belt system.
Indian Railway and Gangavaram Port may not be able to meet the increasing demand for
transportation of raw material to steel plant. So, inorder to meet the additional of raw material
from Gangavaram port, VSP and Gangavaram port management have decided to transport the
raw material through road also. So, for surveillance and video monitoring the truck movement
from Gangavaram port road weigh bridge to raw material yard inside the Steel plant premises,
Steel plant wants to install CCTV system. Since the area where cameras are to be installed for
surveillance are not suitable for trenching and laying cables, so wireless surveillance system is
proposed.The present work is to design a complete solution for this purpose.
About Visakhapatnam Steel plant

INTRODUCTION

Visakhapatnam steel plant is the first coastal based integrated steel plant in the country to
become a fully ISO9002 certified company. This certificate covers the quality systems of all
operational, maintenance, service units. Besides purchase systems, training and marketing
functions spreading over regional marketing offices,20 branch offices and 22 stock yards located
at all over the country.

Visakhapatnam steel plant exports quality pig iron and steel products to Sri Lanka,
Myanmar, Nepal, Middle East, and south east areas. Having a total manpower of 17250 RINL-
Visakhapatnam steel plant envisaged a labor productivity not less than 230 tones of liquid steel
per man which is the best in the country and is comparable in the international levels.

Steel comprises one of the most important inputs in all sectors of economy. Steel
industry is both a basic and a core industry. Steel is versatile and indispensable item, which can
be traced to mainly three reasons:

• It is the only material item, which can be conveniently and economically


produced and tonnage qualities.
• It has got very good strength coupled with ductility and malleability.
• Its property can be changed over a wide range. It alloys easily with many of
common elements.
The properties can be manipulated to any extent by proper heat treatment techniques.
Taking these factors into consideration it can be said that the types of steel available are
innumerable.
Production flow chart:
MAJOR DEPARTMENTS IN VSP:

RAW MATERIAL HANDLING PLANT (RMHP):

The RMHP receives the basic materials iron ore, fluxes (lime stone, dolomite),coking and
non coking coals etc. required for the steel making process from various sources through wagons
which are stacked and reclaimed by stackers-cum reclaimed and distributed to various
departments of Visakhapatnam steel plant through conveyor systems.

COKE OVENS (CO):

Coke is a hard, porous mass obtained by fractional distillation of coal in the absence of
air at a temperature above 200deg.centegrade for period of 16 hrs to 18 hrs. It is used as a fuel
and reducing agent of iron ore in blast furnace. Three coke oven batteries for production of
2.26MT dry coke, each with 7 meters tall 67 ovens. Each batteryis provided with facilities for
dry cooling of coke using Nitrogen as quenching media for dry cooling of coke as well as for
recovering sensible heat of cock. As a by-product a CO gas is produced in this processes and this
gas is having a very high calorific value for about 2400-2700KCAl and is produced throughout
the plant as a fuel.

SINTER PLANT:

Sintering is one of the most widely used and economic agglomeration techniques. Sinter
is a hard and porous lump obtained by agglomeration of fines of iron ore, coke, limestone, and
metallurgical waste. Sinter increases the productivity of blast furnace, improves the quality of
pig iron and decreases the consumption of coke rate .Two 312 square meter sinter machines with
420 square meter straight stand type coolers for annual production of 5.26 MT sinter.
BLAST FURNACE (BF):

Pig iron or hot metal is produced in the Blast Furnace .The furnace is named as BF as
it is run with blast at high temperature and pressure of 1500 deg. C. Raw materials required for
pig iron and iron are iron making ore, sinter, coke, and lime stone. There are two 3200 cubic
meter blast furnace to meet 3.0 MT annual metal requirements. With bell-Each furnace is
provided with a set of four hot blast furnace stoves designed for supplying air blast up to 1300
deg .C. Three turbo blowers, one for each furnace and one stand by common to both furnaces
are provided with 12 MW top pressure recovery turbo generating power. BF gas is produced
from each furnace is being cleaned in gas cleaning plant comprising dust catcher, high pressure
scrubber and is distributed throughout the plant as a fuel.

STEEL MELT SHOP (SMS):

Steel is an alloy iron and carbon, where carbon should be less than 2%. Hot metal
produced in B.F contains impurities like carbon, sulphur, phosphorous, silicon etc., these
impurities will be removed in steel making by oxidation process. These are the three L.D
converters to convert hot metal in to steel. The steel melt shop complex comprising two 1300-
ton hot metal mixers, three 130-ton LD converters (two operating) and six 4-stand bloom casters.
Each converter is being provided with gas cleaning plant for cleaning and recovery of LD gas,
which will be used as fuel in plant.
ROLLING MILLS (RM):

Blooms cannot be used as they are in daily like. These blooms have to be reduced in size
and properly shaped to fit for various jobs. Rolling is one of the mechanical processes to reduce
large size sections in to smaller ones. The cast blooms from CCM are heated and rolled in to
long products of different specifications like high capacity, sophisticated high-speed rolling
mills. The rolling mill complex comprises:

 Light and medium merchant mill (LMMM)


 Wire rod mill (WRM)
 Medium merchant and structured mill (MMSM).
Each mill is well equipped with required number of walking beam furnaces for heating
of walking beam furnaces for heating of blooms or billets and except for wire rod mills, each
furnace is provided with evaporative cooling system for generation of steel for plant
consumption.
THERMAL POWER PLANT (TPP):

The estimated power requirement for V.S.P in 280 at 3.0 MT stages, the peak load being
292 MW essential loads being 49 MW. The generating capacities 286.5 MW. A captive power
having 3x60 MW turbo-generator sets and 5x330 ton/hr steam generators. In this plant, 6000
Nm^3/min turbo blowers are being provided for supplying cold air blast furnaces.
PRODUCT MIX:

Production at VSP comprises mainly of long steel products, such as plain wirerods, rebars,
rounds and structurals, and semi-finished steel products, such as billetsand blooms. The products
are made with 100percent virgin steel, and we haveadopted modernized technology to help
improve product quality.

Blooms:

Blooms are semi-finished products used for the manufacturing of long steel products.
VSP produces blooms at the steel melt shop, which are then rolled to produce billets. Blooms not
used by VSP are sold to downstream steel producers, who further process them into steel
products that are utilized in a wide variety of construction and manufacturing sectors.

Billets:

Billets are one of the first steel products produced in the steel manufacturing chain.
They are semi-finished products used in the manufacturing of long steel products, such as bar
products, rods and wires. Billets can be used as feedstock for rolling mills for the production of
long products. Steel billets are also used extensively in forge shops and machine shops for the
production of engineering goods.

VSP manufactures billets for further rolling into bars and plain wire rods. It sells its non-rollable
billets to downstream steel producers who further process them into steel products that are
utilized in a wide variety of construction and manufacturing sectors.

Plain Wire Rods:

Plain wire rods are a type of long steel product with a wide variety of functions such as making
wires for welded mesh, nails, hangers, screws, chain link fencing, wire nets and barbed wires.
Plain wire rods are produced both in the mild steel (a type of carbon steel) and value added steel
categories. VSP sells plain wire rods to a broad range of large, medium and small scale users,
who in turn use them for wire drawing, bright bar, fastener and construction purposes. Plain wire
rods are also used in the manufacturing industry.

Rebars:

Rebars are long steel products used for reinforcement in construction and infrastructure projects.
They provide tensile strength to concrete sections subject to a bending load, and they normally
have ribbed profiles on their surface to improve bonding with concrete. VSP have adopted the
quenching and self-tempering technology for making our thermo mechanically treated rebars,
which are marketed under the registered trademark of “VIZAG TMT”. We produce rebars in our
Wire Rod Mill and Light and Medium Merchant Mill, depending on the size of the rebar.

Rebars are mainly sold to project users.

Structurals:

Structurals are long steel products that include angles, channels and beams. Like rebars,
structural products are mainly used in the construction and infrastructure sectors.

Rounds:

Rounds are a type of long steel bar product used mainly in the engineering and automobile
industries. VSP produce rounds in our Light and Medium Merchant Mill and Medium Merchant
and Structural Mill, depending on the size of the round. VSP sell rounds to a broad range of
large, medium and small scale users, many of whom further reroll the rounds to their desired
sizes.

Squares:

Squares are a type of long steel product used for rerolling and forging. VSP produce squares in
our Medium Merchant and Structural Mill. Our Company sells squares to a broad range of large,
medium and small scale users.

Pig Iron:

VSP produce hot metal from high grade iron ore and low ash coke. Surplus hot metal produced
from blast furnaces is cast into pig iron. Our Company sells pig iron to steel manufacturers as
well as foundries. Our installed production capacity for pig iron is 0.6 MTPA.

By-Products:

A number of by-products are generated in the process of steelmaking. These products include
coke products, benzol products, tar products, ammonium sulphate,granulated blast furnace slag,
lime products and gases. Coke by-products are sold to the steel, cement and brick industries.
Benzol by-products are used in the solvent, paint, dye, drugs and detergent industries. Tar by-
products are sold to the aluminum and manufacturing industries. Ammonium sulphate is used as
fertilizer. Granulated blast furnace slag is used for manufacturing slag cement. Lime by-products
are sold to the paper industry. Gases such as liquid oxygen are sold for medical and industrial
purposes while liquid nitrogen is used for industrial purposes. The following Table details the
various products and the by-products of VSP:

Products of VSP
TABLE –1 :
Steel products By-products
Angles Nut coke Granulated slag
Billets Coke dust Lime fines
Channels Coal tar Ammonium sulphatnut
Beams Anthracene oil
Squares HP Naphthalene
Flats Benzene
Rounds Toluene
Re-bars Zylene
Wire Rods Wash oil
Telecommunication Departments in VSP

ROLE:

• Telecom’s main role is surveillance and communication.


• Since Steel Plant is a production industry, Communication is in Three Phases.

COMMUNICATION SYSTEMSIN VSP:

In this modern age of industrialization telecommunications plays a very important role in


coordinating the activities of various departments / sections and in achieving the set targets and
also in improving the performance of any organization. In Visakhapatnam Steel Plant, different
types of communication systems are being used to meet the internal and external communication
needs. These are broadly classified as follow:

a. General purpose communication systems.

b. Process communication systems.

c. Monitoring & Signalling Systems.

1)GENERAL PURPOSE COMMUNICATION SYSTEMS:

The following facilities are provided under category of general purpose communication systems:
3000 lines Electronic Exchange in Plant.

2000 lines Electronic Exchange in Township.

100 lines Electronic Exchange in Visakha Steel General Hospital.

44 lines Electronic exchange in Hill Top Guest House

2500 Lines Electronic Exchange of Bharat Sanchar Nigam ltd (BSNL) in Project Office is
catering to the needs of Plant area and Sectors-I to VII in township. Another 2000 Lines
Electronic Exchange of Bharat Sanchar Nigam ltd (BSNL) in Township is catering to the needs
of Sectors-VIII to XI in Township.

The 3000 Lines electronic exchange in plant and 2000 lines exchange in township are
having the following facilities:

Extension (subscriber) to extension call, Auto call back, Hot lines, Music on hold,
Reminder Alarm, Automatic line testing facility, Faults man ring back, Call consult facility,
Malicious call tracing facility, 3 party conference Facility and Howler Tone alert etc. All
exchanges working in the steel plant are interconnected by means of junction lines and have
closed numbering scheme.

The 2000 lines exchange in township is interconnected to the BSNL network. Due to this
interconnection all the subscribers of this exchange can receive incoming calls from any part of
the world. A few subscribers are provided with facility to contact subscribers connected to the
BSNL network and cellular and mobile phones in and around Visakhapatnam.

2) PROCESS COMMUNICATION SYSTEMS:

To facilitate coordination, operation & management activities of production,


maintenance& service departments, the following process communication systems are provided:

a) Dispatcher communication system

b) Loudspeaker intercom systems


c) Loudspeaker broadcasting systems

d) Loudspeaker conference communication system

e) Industrial public address system

f) Hotline communication systems

g) VHF communication systems

A) DISPATCHER COMMUNICATION SYSTEMS:

Initially dispatcher communication is provided with cordless switch board type manual
exchanges of electromechanical. Since manufacture of such systems and their spares is
discontinued in the country, these dispatcher systems are being replaced by Electronic exchanges
progressively. Except the ones in CCCP other systems have been replaced. These would also be
replaced very soon.

Production coordination at plant level being conducted by ED (Works) with all HOD s in
the morning every day is facilitated with the help of the digital EXCOM system provided in the
plant control room.

B) LOUD SPEAKER INTERCOM SYSTEMS:

Loudspeaker intercom systems are working LMMM & WRM. These systems are used
for communication between various sections of the same production shop. Communication is
made possible using microphones and loudspeakers provided in the subscriber stations. This
system is very useful in noisy environment where conventional telephones are ineffective. This
system helps to establish communication between any two stations having interconnectivity on
selection basis. By using group call facility it is possible to communicate to all the subscribers in
the group at a time.

C) LOUDSPEAKER BROADCASTING SYSTEMS:

This system consists of centralized amplifier rack with amplifiers, desktop micro phone with
press to talk switch and a network of loud speakers connected to the amplifiers .this is useful to
make general announcements to the entire working area as to pass on important instruction from
the control room.

Loudspeaker broad casting systems are provided in C&CCD, BF, SP and SMS
departments.

D) LOUDSPEAKER CONFERENCE COMMUNICATION SYSTEMS:

Loudspeaker conference communication systems are working in CCCP. These systems


are provided with both paging and private channel communication facilities. In case of paging a
general announcement can be made which is heard on all the stations. In the private mode
communication is possible between two selected stations only. Here also communication is
carried out by means of microphones and loudspeakers provided in the subscriber stations.

E) INDUSTRIAL PUBLIC ADDRESS SYSTEM:

Industrial Public Address System is working in TPP. It is a combination of loudspeaker


broadcasting system and conference communication system. From the main control room it is
possible to make announcements which are heard on the shop floor. From certain locations the
communication can also be established through handsets in private mode with the main control
room.

F) HOTLINE COMMUNICATION SYSTEMS:

To ensure direct telephone communication between closely related critical locations hot
lines are provided. By using the hot lines specified locations are connected permanently.
Communication is possible only between these two locations. When one subscriber lifts his
telephone the other will immediately get a ring and communication can be had without any loss
of time.

This is useful to pass-on urgent messages. These hot lines are initially provided with
direct line communication systems which are electro mechanical systems. Due to obsolescence
electronic systems are now being used for most of the locations. Hot lines are working in CCCP,
BF, SMS, LMMM, WRM, MMSM, TPP, PPM, DNW and WMD departments.
G) VHF COMMUNICATION SYSTEMS:

VHF communication systems are used in VSP to establish two way communications
between two or more when either or one of them is moving. There are three models working in
our plant. They are hand-held units (Walkie-talkie), vehicle mounted – mobile units and base
station units.

Walkie-talkies are used by operation and service personnel in almost all of the production
shops. Vehicle mounted units are being used by DNW, CISF (Fire) and CISF (security). Base
station units are used by CISF (fire), CISF (Security), Administration, DNW and largely by
CCCP departments. In CCCP these can be seen in pusher cars, charging cars, door extractors,
electric locos, lifters and CDCP areas.

3) SIGNALING AND MONITORING SYSTEMS:

To facilitate monitoring production, maintenance & service activities, the following


monitoring and signalling systems are provided:

a) I.P.V.M- Internet Protocol Video Monitoring.


b) C.C.T.V- Closed Circuit Television.
c) SCADA system
d) Shift change Announcement Siren System

A) CLOSED CIRCUIT TELEVISION SYSTEMS (CCTV):

For monitoring critical operations in different production units continuously from the
concerned control rooms / pulpits CCTV systems are used in SP, BF, SMS, LMMM, WRM and
MMSM departments. CCTV system comprises of CCTV camera with a lens and a CCTV
monitor.

In some cases a video switcher, a central control console, pan and tilt head and zoom
lens are also used. These are interconnected by means of control cables and / or coaxial cables.
Necessary protection is provided for the CCTV equipment depending on the locations where
they are used.
B) CENTRAL FIRE ALARM SIGNALING SYSTEM:

The central fire alarm system is provided for communicating the exact location of
outbreak of fire in any part of the steel plant complex to the central fire station and simultaneous
actuation of sirens to alert personnel of the affected plant zone. The system employs manual call
points located all over the plant.

C) SCADA SYSTEM:

To monitor the consumption of energy by various users in the plant SCADA system is
provided. This is placed at Energy and Telecom centre.

The system comprises of a master station equipment with supervisory consoles and
mimic panels located in the Energy & Telecom Building, 23 Remote Telemetry Units (RTUs)
installed in different plant units and 3 local RTUs for driving the mimic panel in the Energy
centre. The RTUs will be collecting the signals from the local instrumentation & electrical
systems and transmitting to the master station by means of RTUs. The RTUs are connected to
the master station by underground telephone cables.

D) INTERNET PROTOCOL VIDEO MONITORING:

IPVM is the latest Technology. In this Technology, each CAM is assigned with an IP address
and Internet/Intranet Data Connection as per requirement. We can access the information by IP
address from any part of the world. The functioning is as below.
E) SHIFT CHANGE ANNOUNCEMENT SIREN SYSTEM:

The shift change announcement siren system is provided for ensuring uniform and
accurate shift timings throughout the plant. This system consists of two quartz crystal controlled
master clocks in the Energy & Telecom Centre. The shift timings are programmed in the Master
Clock. At the specified time, the signal will be transmitted for energizing the sirens located at
strategic points in plant area simultaneously at the preset timings.

Apart from the above facilities Telecom department maintains the following cable networks
also

a) DATACOM cable network in plant


b) Telephone cable network in plant and township
INTRODUCTION

IP CCTV SYSTEM:
1.1 General Background

There are many different types of CCTV systems available—analogue and digital, wired and
wireless and their modes of operation vary; however, the basic components are more or less the
same: a camera, a lens, a monitor, and (for wired systems) cables that carry the signal from one
place to another. Many systems also use video recorders to record the video footage. The camera
picks up the signal from the area being monitored via the lens (which determines how far and
how much the camera can see, and which is often bought separately) and can be either wired or
wireless. In a wired system, the camera sends the signals through a cable to the monitor; in
wireless systems, no cable is needed, and the camera broadcasts the signal straight to the
monitor. The monitor can be either a simple television set (without tuning capacity) or a PC or
laptop. Most wired analogue systems use television monitors, while digital and wireless systems
tend to use computers as monitors for which remote viewing is possible, often via the internet.
For recording purposes, the monitor is accompanied by a video recorder—a VCR for analogue
systems, or a DVR (digital video recorder), or NVR (Network Video Recorder) for digital
systems. A DVR can actually replace the monitor as the receiving device, since many DVRs are
stand-alone units that do everything a computer would do: receive, record, and store the
information for later viewing.

CCTV (Closed Circuit Television) refers to a system of surveillance cameras that sends signals
to a specific location—a monitor, or PC. CCTV systems are commonly used to monitor banks,
shopping malls, and government facilities—and these days, as CCTV technology becomes more
affordable and easier to use, more and more people are installing CCTV cameras in their homes
and businesses.
An IP surveillance digitizes video streams and transmits them over networks, allowing users to
view and manage the video and images remotely with a networked device, such as a PC, anytime
and anywhere. Key components of an IP surveillance system consist of network cameras, video
servers, network video recorders and central management software

Hardware components of a video surveillance system

1) Lens: light from the illumination scene reflects off the scene. The lens collects the light from
the scene and forms an image of the scene on the light-sensitive camera sensor.

2) Camera: the camera sensor converts the visible scene formed by the lens into an electrical
signal suitable for transmission to the remote monitor
3) Transmission Link: the transmission media. Hard-wired media choices include: - Coaxial, 2-
wire unshielded twisted-pair (UTP), Fiber-optic cable, LAN, WAN, Intranet and Internet
network.

4) Wireless choices include: -Radio frequency (RF), Microwave and Optical infrared (IR)
Signals can be analogue or digital.

5) Monitor: The video monitor or computer screens display (CRT, LCD or plasma) the camera
image by converting the electrical video signal back into a visible image on the monitor screens

6) Recorder: Camera scene is permanently recorded by a real-time or TL VCR onto magnetic


tape cassette or by a DVR using a magnetic disk hard drive or by a NVR.

7) Camera Switcher, quad Multiplexers. When CCTV security system has multiple cameras, an
electronic switcher, quad, or multiplexer is used to select different cameras automatically or
manually to display the images on a single or multiple monitor, as individual or multiple scenes.
The quad can digitally combine four cameras. The multiplexer can digitally combine 4,9,16, and
even 32 separate cameras.

8) Housings fall under the categories of indoor, outdoor and integral camera/housing assemblies.

a) Dome Housing: the dome camera housing uses a hemispherical clear or tinted plastic dome
enclosing a fixed camera with pan-tilt-zoom lens capability.

b) Plug and play/ housing combinations: to simplify surveillance camera installations many
manufacturers now package the camera-lens housing as a complete assembly. These plus and
play cameras are ready to mount in a wall or ceiling and to connect the power in and the video
out.

9) Pan/Tilt Mechanism: When the camera must view a large area a pan and tilt mount is used to
rotate it horizontally (panning) and to tilt it. Providing a large angular coverage

An IP surveillance digitizes video streams and transmits them over networks, allowing users to
view and manage the video and images remotely with a networked device, such as a PC, anytime
and anywhere. Key components of an IP surveillance system consist of network cameras, video
servers, network video recorders and central management software. . IP surveillance products
are being used in a variety of application fields, which generally fall into the following four
categories:
● Professional applications: transportation, government, industrial, construction, health care,
etc.
● SMB applications: banking, education, retailing, recreation, etc.
● Home applications: residential surveillance, digital home, etc.
● 3GPP applications: mobile surveillance, elder care, baby or pet viewing, etc.
Network Cameras
A network camera, also known as Internet camera, IP camera or Internet video camera, transmits
live digital video over an Ethernet network to back-end devices such as a PC or 3G phone. With
a dedicated IP address, a built-in web server and audio/video streaming protocols, it can work
independently for real-time monitoring. Images from network cameras can be viewed with a web
browser such as Internet Explore, Firefox, Mozilla and Opera, enabling customers to perform
live viewing on different networked devices. In addition, customers can control and manage
multiple cameras at the same time in any places where network connection is available.
Therefore, an IP surveillance system is easier and more convenient to use compared with a
CCTV system.
2
A network camera mainly consists of a lens, an image sensor, an image processor, a video
compression SoC (System on Chip) and an Ethernet chip that offers network connectivity for
data transmission. When light passes through the lens to the sensor, it is converted to digital
signals and then processed by a built-in digital signal processor. The processed video data is then
compressed by a multimedia SoC to achieve a smaller data size for optimal transmission. Finally,
the video images are sent through the Internet to back-end devices to allow for viewing and
storage. Apart from video compression, the SoC is built with a RISC CPU for processing system
and network data.

The general interface of a network camera includes a power cord socket, an Ethernet socket,
audio I/O ports and digital I/O ports

Lens Image
Camera Types
Generally, network cameras can be divided into four types for different applications, including
fixed, pan/tilt/zoom,fixed dome and speed dome.

Fixed Type

A fixed network camera points in a fixed direction to monitor a specific area, such as hallways,
staircases or corridors. Because people can be aware of the camera’s shooting direction, in some
cases, it can deter vandalism and crimes. A fixed network camera usually comes with a RS-
232/422/485 interface that connects the cameras to a pan/tilt scanner for wider coverage. Many
fixed network cameras has exchangeable C/CS-mount lens design, giving users the ability to
change the lens to adapt for different monitoring conditions.

Pan/Tilt/Zoom Type

Capable of changing shooting direction horizontally and vertically to achieve a wide field of
view, a pan/tilt network camera is used in many spacious areas, such as lobbies or parking lots.
Some pan/tilt network cameras are integrated with zoom capability so as to provide close-up
images of distant objects. Users can easily control PTZ functions through a web browser.

Speed Dome Type

Compared with fixed dome type, a speed dome network camera is integrated with pan, tilt and
zoom capabilities, enabling a far greater field of view. With a high zoom capability, image
stabilization and 360-degree endless pan, a speed dome camera is mainly used for professional
applications, such as airports, banks or city security.

Fixed Dome Type

A fixed dome network camera, mostly designed for indoor surveillance, has a housing to make
the object of interest less aware of where the camera is pointing at. With a 3-axis mechanism,
images can remain in an upright orientation when it is installed either against the wall or on the
ceiling. Furthermore, the design of a fixed dome network camera can better fit in with the decor.
A fixed dome network camera can be furnished with a weather- or vandal-proof housing for
outdoor applications.

Video Servers

A video server is a device that converts analog signals to digital, allowing users to migrate to a
digital surveillance system without replacing existing CCTV systems. A video server mainly
includes a compression chip and an Ethernet chip, with two main types available: one port or
four ports.
STORAGE MEDIA

Various types of storage media have been developed to meet different demands and purposes,
such as
● Internal buffer
● External memory cards
● DAS (Direct Attached Storage)
● NAS (Network Attached Storage)
● SAN (Storage Area Network)

DAS

Images are transmitted from a camera to a host PC via Ethernet cables and stored directly in the
hard disk drive of the PC. DAS is aimed to enable storage and playback on the same PC and is
mainly used by small- or medium sized businesses.

NAS
Images are transmitted to a purpose-built NAS server via Ethernet cables for storage. NAS
allows storage and playback on different platforms and is especially suitable for enterprises that
need to access and share large volume data

SAN
Images are sent to a purpose-built SAN server via an exclusive fiber optic cable for storage. As
with NAS, storage and playback of images can be performed on different platforms, but SAN
further reduces Ethernet bandwidth usage and offers a faster transfer rate.

Network Video Recorders

An NVR (Network Video Recorder) is an IP-based recorder that operates independently from a
PC or other operation systems. Aimed to store digital video streams from network cameras, an
NVR is usually incorporated with a large-volume hard disk to allow for a long period of
recording. An NVR differs from a traditional DVR in its network connectivity, which allows
digital data to be transmitted to other networked devices over the Internet. Another difference is
that an NVR can be directly connected to a network camera while a DVR is usually connected to
an analog camera.

Video Compression CODECS

A system administrator may choose to use MJPEG on certain cameras and MPEG-4 or H.264 on
others, depending on system goals and requirements.
A codec is a device or program that performs encoding and decoding on a digital video stream.
In IP networking, the term frame refers to a single unit of traffic across an Ethernet or other
Layer-2 network. Frame primarily refers to one image within a video stream. A video frame can
consist of multiple IP packets or Ethernet frames. A video stream is fundamentally a sequence of
still images. In a video stream with fewer images per second, or a lower frame rate, motion is
normally perceived as choppy or broken. At higher frame rates up to 30 frames per second, the
video motion appears smoother; however, 15 frames per second video may be adequate for
viewing and recording purposes.

Some of the most common digital video formats include the following:

• Motion JPEG (MJPEG) is a format consisting of a sequence of compressed Joint Photographic


Experts Group (JPEG) images. These images only benefit from spatial compression within the
frame; there is no temporal compression leveraging change between frames. For this reason, the
level of compression reached cannot compare to codecs that use a predictive frame approach.

• MPEG-1 and MPEG-2 formats are Discrete Cosine Transform-based with predictive frames
and scalar quantization for additional compression. They are widely implemented, and MPEG-2
is still in common use on DVD and in most digital video broadcasting systems. Both formats
consume a higher level of bandwidth for a comparable quality level than MPEG-4. These
formats are not typically used in IP video surveillance camera deployments.

• MPEG-4 introduced object-based encoding, which handles motion prediction by defining


objects within the field of view. MPEG-4 offers an excellent quality level relative to network
bandwidth and storage requirements. MPEG-4 is commonly deployed in IP video surveillance
but will be replaced by H.264 as it becomes available. MPEG-4 may continue to be used for
standard definition cameras.

• H.264 is a technically equivalent standard to MPEG-4 part 10, and is also referred to as
Advanced Video Codec (AVC). This emerging new standard offers the potential for greater
compression and higher quality than existing compression technologies. It is estimated that the
bandwidth savings when using H.264 is at least 25 percent over the same configuration with
MPEG-4. The bandwidth savings associated with H.264 is important for high definition and
megapixel camera deployments.

MJPEG

An MJPEG codec transmits video as a sequence of Joint Photographic Experts Group (JPEG)
encoded images. Each image stands alone without the use of any predictive compression
between frames. MJPEG is less computation-intensive than predictive codecs such as MPEG-4,
so can be implemented with good performance on less expensive hardware. MJPEG can easily
be recorded at a reduced frame rate by only sampling a subset of a live stream. For example,
storing every third frame of a 30-frame per second video stream will result in a recorded archive
at 10 frames per second. MJPEG has a relatively high bandwidth requirement compared to
MPEG-4. A 640x480 VGA resolution stream running at 30 frames per second can easily
consume 5 to 10 Mbps. The bandwidth required is a function of the complexity of the image, in
conjunction with tuning parameters that control the level of compression. Higher levels of
compression reduce the bandwidth requirement but also reduce the quality of the decoded image.
Since there is no predictive encoding between frames, the amount of motion or change in the
image over time has no impact on bandwidth consumption.

MPEG-4/H.264

An MPEG-4 codec uses prediction algorithms to achieve higher levels of compression than
MJPEG while preserving image quality. Periodic video frames called I-frames are transmitted as
complete, standalone JPEG images similar to an MJPEG frame and are used as a reference point
for the predictive frames. The remaining video frames (P-frames) contain only information that
has changed since the previous frame.

To achieve compression, MPEG-4 relies on the following types of video frames:

• I-frames (intra-frames, independently decodable)—These frames are also referred to as key


frames and contain all of the data that is required to display an image in a single frame.

• P-frames (predictive or predicted frames)—This frame type contains only image data that has
changed from the previous frame.

• B-frames (bi-directional predictive frames)—This frame type can reference data from both
preceding frames and future frames. Referencing of future frames requires frame reordering
within the codec.

The use of P-frames and B-frames within a video stream can drastically reduce the consumption
of bandwidth compared to sending full image information in each frame. However, the resulting
variance of the video frames' size contributes to the fluctuation in the bandwidth that a given
stream uses. This is the nature of most codecs because the amount of compression that can be
achieved varies greatly with the nature of the video source.

PoE

Conventional network cameras require a power cable for power supply and an Ethernet cable for
data transmission. PoE (Power-over-Ethernet), developed by the IEEE802.3af task force, enables
power to be supplied over the same Ethernet cable, and thus eliminates the use of power cables.
By connecting a PoE-supported camera to a PoE switch, you need not deploy additional power
cables A PoE switch can provide 48 volts of direct current over two out of four pairs on an
Ethernet cable, with maximum current of 400mA and maximum output power of 15.4W. IEEE
has developed a new IEEE 802.3at standard, known as PoE+ to provide maximum output power
of 30W

Video Transmission Methods

Unicast
With unicast, data is transmitted to the designated PC only and other PCs on the same network
will not receive the data. If more than one PC request for the same piece of data, the source PC
has to send the data repeatedly to different destinations. This is the most popular transmission
method and is also known as One-to-One transmission.
Broadcast
Broadcast is mainly used on the LAN. Compared with unicast, all network devices in broadcast
on the same network will receive data whether they need it or not. The source PC sends data to a
router where data is replicated and sent to multiple destination PCs requesting for the same data.
It is also called One-to-All transmission.

Multicast
With multicast, data is transmitted to a multicast group consisting of PCs requesting for the same
data on the Internet. Once the data reaches the multicast group, it is duplicated and delivered
separately to each PC in that group. Multicast significantly reduces bandwidth usage and is
suitable for web video applications such as VoD, e-learning and video conferencing. It is also
called One-to-Many or Many-to-Many transmission.

VIDEO MANAGEMENT
Apart from network cameras, a successful IP surveillance system must include powerful central
management software to achieve reliability, flexibility, scalability and high efficiency. Video
management software provides basic monitoring, recording and management function as well as
advanced functions such as intelligent surveillance and integration with other systems.

VIDEO MANAGEMENT PLATFORMS


There are two types of video management platforms: PC- and NVR-based.

PC-based
A PC-based platform is implemented by installing video management software on a PC or
server, a standard hardware component. Before the installation, users have to figure out the
system requirements such as CPU capability and operating system so as to achieve the expected
performance. Since it is easier for users to operate, upgrade, integrate, most large organizations,
institutes, or enterprises build up their surveillance systems by adopting PC-based platforms,
integrated with IT or MIS management. As a result, many advantages such as scalability,
integration, and flexibility are all included.

NVR-based

An NVR is a standalone recording device, in which video management software is pre-installed,


providing easy-to use interface and video management platform. It functions as a DVR with a
network interface for the connection of a set of network cameras. However, unlike PC-based, an
NVR does not allow changing or upgrading components, nor does it allow for the installation of
additional applications. Due to limited scalability and compatibility, this platform is widely
adopted in small- and medium-sized surveillance systems.

Basic Features of Software


Video management software mainly includes web-based software and central management
software. Web based software is built in the camera, allowing users to perform basic functions
such as recording, monitoring and configurations. Relatively, central management software
offers more powerful functions such as playback, remote monitoring in multiple monitors etc., to
achieve efficient, flexible video management.

Monitoring
Users can view live video images with a web browser such as Internet Explorer, on a mobile
device or via software. More than one users can access the camera to view the images at the
same time. Through the management software, users can use different viewing modes like split
windows to simultaneously view the transmitted images from multiple cameras

Recording
Recording can be performed in different modes such as continuous, on schedule or on event
trigger according to their needs. On-schedule or event-triggered recording is highly needed
because the storage requirements will be reduced; so is the bandwidth. In an IP surveillance
system, the frame rate is changeable. Therefore, users can set the system to use a lower
frame rate during live monitoring for low bandwidth usage while shifting to a full frame rate
during event-triggered recording to ensure good image quality

Playback
Recorded video images can be viewed in multiple split windows and by several users at the same
time. The recorded database can also be searched in a more efficient way such as by date, time,
region or event

Central Management Software


Central management software, often provided by the camera vendors or individual software
vendors, enables customers to manage and control cameras from remote site. Typically, central
management software is windows based, and thus can be installed in almost any PC. Central
management software employs client-server architecture where server software, client viewing
software and playback software is installed in separate PCs. Customers can perform live
viewing, event-triggered recording or playback on the client PC while managing cameras and
performing constant recording with the server PC. Each server PC can be scaled up to include
several subordinate server PCs, and thus expand the number of managed cameras.

Advantages of IP Surveillance
● Remote monitoring/storage
Since video data can be transmitted to remote networked devices over Ethernet networks, users
can view camera images in any place where IP network connection is available.
● Cost efficiency
Video surveillance systems can leverage existing IP network infrastructure, significantly
reducing overall installation costs.
● High scalability
Adding new network cameras or other networked devices in an IP surveillance system is easy by
simply connecting them to a router.
● Superior image quality
Network cameras provide high image quality; many of them even offer megapixel resolutions. In
addition, IP surveillance has no signal degradation problems during transmission, and thus can
ensure steady image quality

Types of CCTV Systems

CCTV systems are broadly divided into two known types, namely: wired CCTV systems and
wireless CCTV systems. Wired systems bind all three key components of a CCTV system with
cables while a wireless system comprises of a wireless camera that need not be connected to the
recording device and monitor. Both of these systems have distinct advantages and disadvantages
associated as different types of technology are employed to provide security and reliable
monitoring.

Wireless CCTV systems

Wireless CCTV systems are increasingly becoming a popular choice on account of the ease of
installing such a system, lack of cabling requirements and assured mobility. The key advantages
are:

a) A wireless camera can be moved to other locations requiring observation while it is difficult to
move a wired camera.
b) Best suited for locations requiring temporary observation or in a temporary location.

c) Wireless camera can be hidden to detect theft or pilferage

d) Wireless recording and monitoring device need not be in the same line of sight allowing
observation of any place from another remote location.

e) Wireless systems are cost effective, re-deployable and portable.

At the same time, there are some disadvantages of wireless CCTV systems,

a) Wireless systems require a dedicated frequency to transmit signals from the camera to the
receiving and recording station.

b) Frequencies may be subject to various interruptions by use of electric motored products, air
conditioning, fluorescent lighting or cordless telephones which affect the picture quality.

c) Wireless camera may not provide the best picture quality as such systems are susceptible to
picture distortion while wired cameras provide relatively better picture quality.

d) Wireless CCTV cameras may need electric power which implies a wire runs through to the
camera though the video connection is wireless.

e) Wireless systems require wireless technology-specific expertise to diagnose and fix break
downs in the system.
Wired CCTV Systems

Wired CCTV systems connect the camera to the recording device and monitor with the help of
standard coaxial cables or Unshielded Twisted Pair (UTP) cables or fibre optic cables.

The key advantages of wired CCTV systems are:

a) Provides the best picture quality with zero interference


b) The camera can be located hundreds of meters away from the recording or monitoring
equipment.

c) All sensors can be run from a single power supply

The key disadvantages are:

a) Cabling and installing can be a tedious task, requiring help from experts

b) Observation is fixed to a specific area and the camera cannot be easily moved to another
location.

Overall, wireless cameras are relatively more expensive than traditional wired cameras.

Wireless CCTV systems are a preferred choice in specific locations devoid of easy cabling
facilities and for individuals requiring an easy-to-install solution.

The wired CCTV system is a preferred choice when good picture quality and economy
considerations gain precedence.

Wireless Networks Protocols

LTE (Long Term Evolution):

Before newer smart phones adopted so-called fourth-generation (“4G”) wireless


networking, phones utilized a dizzying variety of older generation cellular communication
protocols with names such as HSDPA, GPRS, and EV-DO. Phone carriers and the industry have
invested large sums of money to upgrade cell towers and other network equipment to support
4G, standardizing on a communication protocol called Long Term Evolution (LTE) that emerged
as a popular service starting in 2010.

LTE technology was designed to significantly improve the low data rates and roaming
issues with older phone protocols. The protocol can carry more than 100 Mbps of data, although
the network bandwidth is normally regulated to levels below 10 Mbps for individual users. Due
to the significant cost of equipment, plus some government regulatory challenges, phone carriers
have not yet deployed LTE in many locations. LTE is also not suitable for home and other local
area networking, being designed to support a larger number of customers across much longer
distances (and corresponding higher cost).

Bluetooth

One of the oldest wireless protocols still broadly available, Bluetooth was created in the
1990s to synchronize data between phones and other battery-powered devices. Bluetooth
requires a lower amount of power to operate than Wi-Fi and most other wireless protocols. In
return, Bluetooth connections only function over relatively short distances, often 30 feet (10 m)
or less and support relatively low data rates, usually 1-2 Mbps. Wi-Fi has replaced Bluetooth on
some newer equipment, but many phones today still support both of these protocols.

Wi-Fi

Wi-Fi is a local area wireless computer networking technology that allows electronic devices to
connect to the network, mainly using the 2.4 gigahertz UHF and 5 gigahertz SHF ISM radio
bands.

Wireless Technology is an alternative to Wired Technology, which is commonly used, for


connecting devices in wireless mode. Wi-Fi (Wireless Fidelity) is a generic term that refers to the
IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). Wi-Fi
Network connects computers to each other, to the internet and to the wired network. Wi-Fi works
on physical and data link layer. It describes network components that are based on one of the
802.11 standards developed by the IEEE and adopted by the Wi-Fi Alliance.

IEEE 802.11, developed by the IEEE LAN/MAN Standards Committee, is a set of standards for
wireless local area network computer communication. 802.11b, 802.11g, and 802.11n are widely
used in wireless network devices.

802.11b

802.11b operates in the 2.4GHz band with a transfer rate of 11Mbps and a range of 35 meters
indoors and 100 meters outdoors. The drawback of 802.11b is that signals can be blocked by
walls. The 2.4GHz is also subject to interference caused by electronics or Bluetooth signals. . The
802.11a transmit data-at a frequency level of 5GHz.

802.11g

802.11g, the same as 802.11b, operates in the 2.4GHz band. It has a transfer rate of 54Mbps,
similar to that of 802.11a, and a range of 25 meters indoors and 75 meters outdoors. 802.11g has
the same weaknesses as 802.11b; however, it outperforms 802.11b in transfer rate.

802.11n

802.11n is a wireless standard certified in 2008. Based on MIMO (Multi-input Multi-output),


802.11n boasts an amazing transfer rate of 600Mbps and a range of 50 meters indoors and 300
meters outdoors. It can operate in the 2.4GHz or 5GHz band and is ideal for applications
demanding high bandwidth such as high-definition video streaming.
The Basic Concept Of How Wi-Fi Works:
Basic concept is same as Walkie talkies. A Wi-Fi hotspot is created by installing an access point
to an internet connection. An access point acts as a base station. When Wi-Fi enabled device
encounters a hotspot the device can then connect to that network wirelessly. A single access
point can support up to 30 users and can function within a range of 100 up to 300 feet. Many
access points can be connected to each other via Ethernet cables to create a single large network.
A wireless network or Wi-Fi Network usually transmits at a frequency level of 2.4 GHz or 5
GHz to adapt to the amount of data that is being sent by the user.
Wireless networks operate using radio frequency (RF) technology, a frequency within the
electromagnetic spectrum associated with radio wave propagation. When an RF current is
supplied to an antenna, an electromagnetic field is created that then is able to propagate through
space.
Fig 1: Wi-Fi Working-Concepts

The cornerstone of a wireless network is a device known as an access point (AP). The primary
job of an access point is to broadcast a wireless signal that computers can detect and "tune" into.
Since wireless networks are usually connected to wired ones, an access point also often serves as
a link to the resources available on the wired network, such as an Internet connection. In order to
connect to an access point and join a wireless network, computers must be equipped with
wireless network adapters. These are often built right into the computer, but if not, just about any
computer or notebook can be made wireless-capable through the use of an add-on adapter
plugged into an empty expansion slot, USB port, or in the case of notebooks, a PC Card slot.

3GPP

3GPP is a set of open standard protocols for audio and video bitstreams to be viewed on a 3G
mobile phone. This standard is widely supported by major mobile phone vendors

WiMAX

WiMAX is a wireless digital communications system intended for broadband wireless access up
to 50 kilometers or 30 miles for fixed stations, and 5 to 15 kilometers (3 to 10 miles) for mobile
stations. Designed primarily for wireless telecommunication service providers, WiMAX operates
on both licensed and non-licensed frequencies, providing a regulated environment and a viable
economic model for wireless carriers. WiMAX, developed by the 802.16 group of IEEE, is also
called the 802.16 standard. WiMAX offers a transfer rate of 70Mbps in a range of 70 kilometers,
making it ideal for long-distance and outdoor connection.

While WiMAX provides Wi-Fi-like data rates, it provides significantly better coverage and
quality of service (QoS) controls. Although suitable for low- to mid-performance video
surveillance, WiMAX is designed to deliver high downlink rates and low uplink rates, the
opposite of the requirements of what high performance video surveillance networks require.
Further, WiMAX has quite large latency, in the order of 20 – 40 msec, which can impact video
quality.

Specialized Networks

Specialized networks are specifically designed to provide high-capacity, high-performance,


wide-coverage networks that support hundreds of cameras, including high-resolution cameras.
These wireless networks are typically based on a high performance wireless standard such as
802.16, the basic air interface technology used in WiMAX and LTE, but with additional
hardware and software specifically designed for video surveillance.

The use of 802.16-based networks provides important characteristics for video surveillance
networks:
1. Fixed amounts of bandwidth can be allocated to each camera to guarantee video images will
be transmitted regardless of network traffic loading.

2. Latency is low and not variable. High latency can be disastrous for video surveillance, making
camera control functions such as PTZ frustratingly slow, and making advanced video
surveillance functions such as license plate recognition completely unusable. With constantly
low latency, network designers are assured of consistent performance despite significant
variations in traffic loading.

3. The routes are fixed. Images from cameras always take the same route, which ensures
consistent performance over all operating conditions and as the network grows.

4. Specialized networks scale well. The radios are used in point-to-point (PTP) and point-to-
multipoint (PMP) configurations to build networks that scale very well for large area coverage
with many cameras, much like a cell phone network. They have deterministic performance and a
hierarchical structure. Thus, adding more cameras does not impact the performance of existing
cameras.

5. Memory allocation and processing power can be increased to accommodate the “bursty”
nature of data compression. Data showers during high-activity periods can often overflow the
memory buffers of standards-based radios.

Table 1 Network speeds based on Network Technology

Security Wireless Transmission


WEP
WEP (Wired Equivalent Privacy), also known as Wireless Equivalent Privacy, is designed to
protect data on a wireless network because data transmitted by radio wave can be easily
intercepted. A key must be set in the wireless access point and when a user connects to the
access point, he has to enter the same key to connect to the Internet. WEP can provide a security
level comparable to cable networks. WEP encrypts data from wireless access points with a
shared key that contains 40 to 256 bits. The longer the key, the more difficult it is to crack, and
the higher security it offers.

WPA
With the increasing computing capability of a PC, WEP, which uses a fixed encryption key,
becomes vulnerable to be attacked. Hence, the Wi-Fi Alliance developed WPA (Wi-Fi Protected
Access) /WPA2 standard based on WEP. WPA uses TKIP (Temporal Key Integrity Protocol)
that dynamically changes the key for each packet during transmission. With a 128-bit key, WPA
offers a higher level of security than WEP. WPA provides data protection via user
authentication, encryption and packet inspection. It also improves wireless network management.
WPA2 indicates compliance with an advanced protocol that implements the full standard. In
addition, WPA defines the use of AES (Advanced Encryption Standard) as an additional
replacement for WEP encryption

BENEFITS OF WIRELESS FOR OUTDOOR VIDEO SURVEILLANCE SYSTEMS

Fast Deployment

Wireless networking eliminates the time-consuming installation of data cables. The small,
lightweight radios and cameras simplify mounting requirements, making installation quick and
easy. Modern wireless equipment employs non-line-of-sight (NLOS) technology, eliminating
most building-related issues and simplifying outdoor deployment.

Cost Efficient

Video surveillance saves money and uses resources effectively. For example, a prominent police
department estimates that 30 cameras are equivalent to 30 surveillance officers on the street,
while the central monitoring station requires only two officers. The cost and time of acquiring
rights-of-way, digging trenches, and installing and testing a wired network are prohibitively high
compared to the cost of installing a wireless network. A wireless network can be operational and
delivering benefits for a fraction of the time and cost.

Wide Coverage

Public safety video surveillance systems must cover hundreds of miles of road and many square
miles of a city and link remote video surveillance systems to a central monitoring station. The
long range and the high throughput provided by wireless (more than 80 km at 100s of Mbps)
allow quick, easy and cost-effective surveillance.

Flexibility
Wireless is the leader in flexibility. You can easily move or add cameras, and you can quickly
reconfigure a network to allocate bandwidth to locations requiring higher resolution images.
Wireless lets you react in real time without waiting for a wired network to catch up to your
needs.

CONSIDERATIONS FOR NETWORKING CAMERAS

The amount of bandwidth used by video surveillance cameras is determined by the number of
cameras, the image resolution, the compression ratio, the movement or activity being monitored,
and the frame rate. Clearly the more cameras you have, the more bandwidth you will use on the
network. A single frame can contain from 30 kilobytes to more than 160 kilobytes for high-
resolution images. At multiple frames per second (fps), each camera could easily require 10
megabits per second (Mbps), excluding any network protocol overhead. Fortunately, there are
ways to reduce this.

Image Resolution

The higher the resolution, the greater amount of detail you can capture in a video image. A
standard-definition TV image has a resolution of 352x240, and your PC typically 704x480.
High-resolution cameras deliver up to 2592 x1944 and enable digital pan, tilt and zoom (PTZ)
around an image even after the video has been stored. As the amount of bandwidth required rises
with image quality, it is best to find a level that meets your needs.

Compression

Compression technologies have a major impact on image quality, bandwidth usage, storage
space and system loading. A high compression ratio can significantly reduce file size, and thus
cut down bandwidth usage and storage space. However, a high compression ratio may cause a
trade-off between bandwidth and image quality. Video compression is an important tool for
easing strain on a network. It allows high-quality video transmission without hoarding
bandwidth. Video surveillance systems typically use MJPEG, MPEG-4 or H.264 compression
technology. Your choice depends on your application and your needs. MPEG-4, which provides
better compression but lower resolution, is usually used when you need to conserve bandwidth
and storage. MJPEG compression is usually used by the higher resolution cameras and offers the
advantage of very clear screen shots when a photograph is preferred over a video clip. H.264, the
latest compression technique, offers an excellent trade-off between quality and bandwidth. H.264
provides about twice the compression of MPEG-4 for the same video quality.

Movement and Activity

Modern compression algorithms work by comparing the differences between frames, which
means the bandwidth requirement is directly related to motion in the monitored area. For
example, monitoring a static scene requires less bandwidth than monitoring traffic or a public
area where there is a lot of motion. The latter requires higher network bandwidth because the
compression rates are low.

Frame Rate

The number of fps relates to how smooth motion appears in the video. Standard TV runs at 30
fps, providing excellent motion but at a high bandwidth cost. Fortunately, in most video
surveillance applications, there is little motion. For example, a frame rate of four fps would be
sufficient for a person walking through a room. Many cameras minimize bandwidth by
increasing the frame rate only when motion is detected.

The Bottom Line

Due to the many factors that contribute to video bit rate, there is no exact method to calculate
total bandwidth requirements. Each camera manufacturer and each encoder model has different
requirements, and every installation introduces unique variables. Most wireless video
surveillance systems are installed outdoors. Weather conditions, topography, line-of-sight
conditions, and interference spectrum impact the amount of bandwidth on a given link. Careful
planners provide an additional 20 per cent bandwidth to mitigate the impact of these variations.

The following charts provide a starting point for planning a camera network:

Resolution Image Rate Activity Level Bit Rate (Kbps)

Table 1: Typical CIF to 4CIF Bandwidth Requirements


Compression Megapixel Resolution Image Rate Bit Rate (Mbps)

Table 2: Typical Megapixel Camera Bandwidth Requirements

WIRELESS IS DIFFERENT

Security in an “Open” Medium

Wireless is an open medium, which means others could easily listen in if precautions are not
taken. For example, many Wi-Fi networks are unsecured allowing easy connection of your
laptop. It is critical that any wireless network used for video surveillance have sufficient
encryption and authentication controls to prevent unauthorized persons from seeing images of
your operations, your people or your customers.

Camera Operation Impacts Wireless Performance

Most of the time, video surveillance cameras watch a static scene. During periods where little or
no motion is detected, the cameras send very little information over the network. However, when
a large amount of motion or a major change in a scene occurs, the amount of data sent can
skyrocket, resulting in what is called a data shower. Wireless networking gear that does not
include data shower caching will drop frames, potentially losing the most important moments of
an incident.

Latency

Latency in wireless can be quite high compared to a wired network. For real-time applications
such as video, latency can result in lost detail or a jumpy or pixelated picture. High latency will
also make PTZ camera operation difficult or frustratingly slow. If your wireless video
surveillance network carries other applications such as voice or control system data like SCADA,
then high latency can result in expensive and time-consuming reconfiguration and testing, in
some cases making the application unusable.

Throughput

When designing the wireless network for video, the question will arise of how much throughput
(sometimes called bandwidth) is needed and more throughput always translates into more radios.
Getting a solid estimate of throughput requirements up front will ensure excellent performance
within budget. All radio manufacturers specify throughput; however, it is critical to understand
how it is measured. Most manufacturers specify throughput using only large packet sizes, which
inflates the throughput available. For example, a radio processing 1,500-byte packets might have
a throughput of 48 Mbps. However, the same radio processing 60-byte packets might provide
less than 2 Mbps. Since the compression process results in varying packet sizes, selecting radios
that provide consistently high throughput under varying packet sizes is critical.

Management

Network management tools used in wireless networks are similar to those used in wired
networks, except that wireless network management tools must be capable of providing over-the-
air (OTA) management, not only for configuration and monitoring but also for software updates.
Being able to update or load new software OTA is critical for maximizing uptime while
minimizing support costs.

Comprehension Challenges

From an engineering perspective, wireless is harder to understand. Instead of a simple wire that
provides a huge amount of throughput regardless of most other conditions, wireless is teaming
with jargon and changing operating conditions affects performance. You need to understand the
geography of the installation in relation to the characteristics of radio frequency signals. You
need to understand that leaves, rain, fog, snow, buildings and nearby wireless users all provide
interference that can degrade video quality. All of this means that wireless systems must perform
additional functions to ensure fair and efficient use of the wireless link. It is all about balancing
performance and reliability in varying link conditions (fading, distance, movement).

Wireless Camera Systems

Wireless security camera systems consist of a wireless transmitter and receiver antennas
and allow closed-circuit cameras or IP security cameras to transmit a wireless signal using a 5.8
GHz signal up to 4 miles. These systems are used in situations where cable dredging is not
practical or is cost prohibitive. They are made for long distance outdoor use with a direct line of
sight between the transmitting and receiving antennas.
POINT-TO-POINT WIRELESS

The point-to-point wireless topology (also called P2P) is the simplest network architecture you
can set up in order to connect two locations using a wireless radio link. Point-to-point wireless
links can go from a short-range link connecting two locations just a few hundreds meters apart to
a long range point-to-point wireless link that connects two locations tens of miles away from
each other. In a point to-point-wireless link, distance is affected by the height of each Ethernet
radio device, the frequency used, the power level, and environmental interference.

Point-to-point wireless links are often used for telecom, security and networking
applications. In the telecom space, point-to-point wireless links are deployed to backhaul cellular
base stations. Cellular backhauls typically employ licensed spectrum and high capacity long-
range point-to point microwave links. However, with the widespread deployment of small cells,
license-free, long-range point-to-point wireless links are being used more and more often,
particularly in rural areas where interference is not a significant concern. In security and public
safety projects, point-to-point outdoor wireless connections are deployed to backhaul outdoor
wireless video-surveillance systems. The video streams coming from outdoor field cameras are
collected using a point-to multipoint wireless network to a central location, often located on a
high point (e.g., a tall building or a mountaintop). From this central location, all the video
streams are transmitted over an outdoor point-to-point wireless link to the control room.
In wireless networking applications, two buildings can be interconnected using a point-
to- point wireless Ethernet connection and two IP Ethernet networks can be therefore
interconnected without trenching the area. This point-to-point wireless Ethernet solution is very
often used in campus environments or to connect two buildings owned by the same organisation
sitting on two different sides of a street, railway, or river. Point-to-point wireless links are
usually deployed between two locations that are in clear line of sight (LOS) with each other in
other to maximise the performance of the wireless link. For point-to-point wireless links working
in the license free 5 GHz band (for example in the 5.8 GHz or 5.4 GHz license-free bands) or in
the 4.9 GHz public safety band we suggest to deploy the link in clear line of sight (LOS)
because, above 2.4 GHz, line of sight (LOS) operations provide a much more reliable wireless
link. Point to point wireless link at frequencies around 900 MHz or in the UHF band (400 MHz)
can work reliably in near line of sight (NLOS) or in non line of sight conditions (NLOS point to
point wireless links).

POINT-TO-MULTIPOINT WIRELESS
The Point-to-Multipoint topology (also called star topology or simply P2MP) is a common
network architecture for outdoor wireless networks to connect multiple locations to one single
central location. In a point-to-multipoint wireless Ethernet network, all remote locations do not
communicate directly with each other but have a single connection towards the center of the star
network where one or more base station is typically located. The remote locations at the edge of
the networks are typically called “client” locations and the central location is called the “access
point” or “base station”. Point-to-multipoint wireless networks have been studied in the 1990s
and in the early 2000s and discussed in many academic publications because they can be affected
by certain issues such as the hidden terminal issues or the exposed terminal issues, depending on
the point-to-multipoint protocol implemented to coordinate the transmissions over the wireless
medium. Most outdoor point-to-multipoint networks implement a centralized medium access
control protocol or employ a TDMA-based protocol synchronizing all radio devices with a GPS
device in order to avoid the hidden terminal and exposed terminal issues.

Outdoor point-to-multipoint wireless solutions are very common both for wireless
Internet service providers (WISPs) and for outdoor video-surveillance systems. In a WISP
network, subscribers are connected at the edge of the network using a client device typically
mounted on the roof of their house. One or more central base stations are mounted on a high
building, or on a mountaintop or on a water tower in line of sight with as many client devices as
possible.
In outdoor wireless video-surveillance systems, each camera in the field is connected to a
wireless client device and then a base station is mounted on top of a tall building and acts as the
central device and coordinator of the point-to-multipoint wireless network. In a point-to-
multipoint wireless CCTV system, all video streams from the remote cameras are collected at
this central location at the center of the point-to-multipoint wireless system and then transmitted
to a control room using a point-to-point wireless fiber backhaul. Point-to-multipoint wireless
links are deployed between locations where the client wireless devices are in clear line of sight
(LOS) with the device acting as the base station. In a point-to-multipoint wireless network that
works using the license free 5 GHz band (for example in the 5.8 GHz or 5.4 GHz license-free
bands) or using the 4.9 GHz public safety band it is suggested to deploy the link in clear line of
sight (LOS) because, above 2.4 GHz, line of sight (LOS) operations provide more reliable
performances. Point to multipoint networks working on frequencies around 900 MHz or in the
UHF band (400 MHz) can operate reliably in near line of sight (NLOS) or in non line of sight
conditions (NLOS point to point wireless links).
WIRELESS MESH NETWORKS
In outdoor wireless networking, wireless mesh networks are the third topology after point-to-
point and point-to-multipoint in order to build a wireless network infrastructure. Each device in
a wireless mesh network is typically called a mesh node and is connected with multiple other
mesh nodes at the same time. Wireless mesh networks are also multi hop networks because
each mesh node can reach another node going through multiple hops and leveraging other nodes
as repeaters. The major advantage of a wireless mesh networks is the intrinsic redundancy and,
consequently, reliability because a mesh network is able to reroute traffic through multiple paths
to cope with link failures, interference, power failures or network device failures

Two types of wireless mesh networks are usually implemented for commercial and
government applications: Unstructured or omni-directional wireless mesh networks and
Structured wireless mesh networks.
In an unstructured wireless mesh network, each mesh node typically uses an omni-
directional antenna and is able to communicate with all the other mesh nodes that are within the
transmission range. Wireless links in an unstructured wireless mesh network are not planned and
link availability is not always guaranteed. Depending on the density of the mesh network, there
may be many different links available to other mesh nodes or none at all. Unstructured mesh
networks are usually implemented with non-line of sight radios (NLOS) using low frequency and
low bandwidth radios operating, for example, in the UHF bands, such as 400 MHz or in the
license-free band at 900 MHz. Unstructured wireless mesh networks leverage one single channel
shared by all the radios. Therefore, the higher the number of hops a transmission requires, the
lower the overall throughput of the network will be.
Structured wireless mesh networks are planned networks typically implemented using
multiple radios at each node location and multiple directional antennas. A ring topology using
multiple directional wireless links is commonly used in a structured wireless mesh network to
enable each radio to seamlessly reroute traffic through different paths in the event of node or link
failures. Structured wireless mesh networks can provide two or more alternative paths from each
mesh node location and typically use high frequency radios and microwave links with directional
antennas. The distance between nodes in a structured wireless mesh network can be up to tens of
miles using long-range directional microwave links. Structured wireless mesh networks are often
used for mission-critical applications such as wireless video surveillance, public safety, and
industrial automation. They provide the ideal network architecture in case a site requires a highly
reliable and available wireless network for a broadband application such as video, voice and data
streaming. Each link in a structured wireless mesh network operates on an independent channel
and, therefore, the number of hops for a specific transmission does not affect the overall
throughput of the network.

There are multiple government and commercial applications for wireless mesh networks:
Temporary wireless mesh video surveillance: military and government organisations use
wireless mesh networks frequently for rapid deployment of wireless video surveillance in war
zones or during hostage situations. Wireless mesh networks have also been used to provide
temporary video surveillance to protect major sporting or political events. Urban wireless video
surveillance and public safety: law enforcement agencies have been using wireless mesh
networks to create city-wide wireless network infrastructure and stream high resolution video
across large cities without compromising reliability or needing to trench large portions of the city
area. At present, most mesh networks for public safety work on the 4.9 GHz public safety band.
Wireless Industrial Automation and Condition Monitoring: large industrial plants and oil &
gas facilities have been using low-frequency unstructured mesh networks for condition
monitoring and sensor data collection. At the same time, industrial automation has leveraged
structured mesh networks operating at 5 GHz (5.4 GHz, 5.7 GHz and 5.8 GHz license-free
bands) to high-throughput applications such as video and voice streaming. Mining Automation:
Mines have been pushing to constantly increase their efficiency leveraging automaton and
technology. Large open pit mines have been using outdoor wireless mesh networks for video
surveillance, truck automation and condition monitoring. Both low throughput and high
throughput applications in mines often rely on a wireless mesh network due to the lack of any
other telecom infrastructure.

Environmental monitoring and precision agriculture: farming is using increasingly more


automation and technology to increase profitability. Farmers are adding sensors to their fields,
tractors and vineyards to be able to act in a more precise and timely manner, spending less
money and wasting less resources. Low frequency wireless mesh networks using sensor
networks have been deployed frequently for environmental conditional monitoring both in
vineyards and industrial crop farming. At the same time, high frequency wireless mesh networks
in the 5 GHz band 5.4 GHz, 5.7 GHz and 5.8 GHz license-free bands) are getting more traction
for tractor automation and precision agriculture as high resolutions cameras become a critical
component in automating tractors and in collecting aerial images from drones.
Conclusion:

This project helped us to know about Video surveillance system. We learnt about
types of cameras, cables, storage, antennas, wireless protocols. We also learnt
about advantages and disadvantages of Wireless surveillance system, challenges
involved in designing and maintenance of it.

Wireless video surveillance system can be used wherever trenching work is


difficult. It can be economical and easy and fast deployment of system. In
Visakhapatnam Steel Plant, there are many areas where in future surveillance
requirement shall be there. To meet this requirement economically, wireless
surveillance system can be installed.

You might also like