Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Supervisor: Erez Zilber Semester:Spring 2004 Characterization Presentation.

Slides:



Advertisements
Similar presentations
Fall IM 2000 Evfolution of Presence Based Networks Evolution of Presence Based Networks Jonathan Rosenberg Chief Scientist.
Advertisements

Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Four Winds Digital Signage Nathan Byrer, MCITP:EA Technology Director University College, IUPUI 1.
RFID Access Control System March, 2003 Softrónica.
Communications Systems
A new Network Concept for transporting and storing digital video…………
Week 6: Chapter 6 Agenda Automation of SQL Server tasks using: SQL Server Agent Scheduling Scripting Technologies.
Multi-DNC Data Collection/Monitoring
Introduction of iVMS-4200 v2.0
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Team: Maya Zalcberg Diana Attar Levona Hershtik Academic advisor: Prof. Ehud Gudes ADD Presentation.
Access Control System Presented by : Alex Badyan Oren Shalgi Oren Shalgi Instructor : Erez Zilber April 2004 April 2004.
Access Control System Characterization Presenting: Ehud Bahat Amir Levy Instructor: Erez Zilber November 2003.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Number:D1123 Supervisor: Erez Zilber Semester:Spring 2004 Mid Semester Presentation.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Access Control System Midterm Report Presenting: Ehud Bahat Amir Levy Instructor: Erez Zilber December 2003.
Performed by: Gadi Marcu & Tomer Alon Instructor: Erez Zilber המעבדה למערכות ספרתיות מהירות High speed digital systems laboratory הטכניון - מכון טכנולוגי.
Remote User Authentication. Module Objectives By the end of this module participants will be able to: Describe the methods available for authenticating.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Number:D1123 Supervisor: Erez Zilber Semester:Spring 2004 Final Presentation.
Access Control System Final Report Presenting: Ehud Bahat Amir Levy Instructor: Erez Zilber March 2003.
Remote Surveillance Vehicle Design Review By: Bill Burgdorf Tom Fisher Eleni Binopolus-Rumayor.
SYSLOG Real-Time Monitoring of System i Events. What is SYSLOG? Multi server environments are now the reality at most sites; however the number of operators.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Review of the test results and plan for the final TC ESR 5 ELENI ADAMIDI IASA, NTUA SUPERVISOR: PROF.EVANGELOS GAZIS WORK PACKAGE 3: SAFETY SYSTEM MODULARITY.
1 Enabling Secure Internet Access with ISA Server.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Automatic Software Testing Tool for Computer Networks ARD Presentation Adi Shachar Yaniv Cohen Dudi Patimer
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
Introduction Mobile Switch is a device which will be helpful to switch on and off any electrical/electronic devices through a SMS. The parameters of these.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2006 Global Knowledge Training LLC All rights reserved. Deploying Outlook 2003 Configuring Clients Outlook 2003 Security and Performance New Outlook.
Hands-On Microsoft Windows Server 2008
Project 1 Online multi-user video monitoring system.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 9 Configuring Messaging Policy and Compliance.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Building Information Exchange with First Responders (BIEFR) David Holmberg, NIST June 11, 2009 Slides credit to Alan Vinh.
3 rd Party Registration & Account Management SMT Update To AMWG Status February 24, 2014.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
1 Action Automated Security Breach Reporting and Corrections.
Module 9 Configuring Messaging Policy and Compliance.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
Your Car Safeguard System Riding on a GSM mobile network.
Telesnap UMS 2009 Product presentation. Introduction Doc.No.: ASE/APP/PLM/ 0162 / EN.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
Module 7 Planning and Deploying Messaging Compliance.
SMS Software Distribution. Overview  Explaining How SMS Distributes Software  Managing Distribution Points  Configuring Software Distribution and the.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
1 Objectives Discuss the basics of Dynamic Host Configuration Protocol (DHCP) Describe the components and processes of DHCP Install DHCP in a Windows Server.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Apex Dispatch (Orders for today, tomorrow, next few days) Vehicle Dispatching Weigh Master Customer Service.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
OPERATING SYSTEM REVIEW. System Software The programs that control and maintain the operation of the computer and its devices The two parts of system.
Retele de senzori EEMon Electrical Energy Monitoring System.
1 Example security systems n Kerberos n Secure shell.
SMS module HDL-MGSM.431.
Working at a Small-to-Medium Business or ISP – Chapter 8
Implementing TMG Server Publishing
To Join the Teleconference
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Cisco Real Exam Dumps IT-Dumps
Windows Server Administration Fundamentals
Presentation transcript:

Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Supervisor: Erez Zilber Semester:Spring 2004 Characterization Presentation

Project Goals Designing and implementing a management system for data, originating from cameras, sensors and possibly other devices. This system will enable viewing the data and storing it.

System Specifications Real – Time Data Access Stored Data Access Device Configuration Dynamic Response Configuration Users Hierarchy & Permission Management

Real – Time Data Access Controlling cameras in real – time:  Issuing commands (turn on, turn off, zoom, etc…)  Viewing live broadcast Optional:  Displaying live broadcasts from several cameras, at the same time (split screen / automatic rotation)

Stored Data Access Providing a user – friendly access:  Filtered / sorted by: Time & Date Devices / Device Groups Alarms & Severity

Device Configuration Adding / removing devices Grouping devices into device-groups Setting working profile:  Device activity periods  Data storing policy  Stored data classification (alarm severity)

Dynamic Response Configuration Assigning responses to signals received from other devices / systems:  Camera activation  Data recording and classification  Sending / SMS

Users Hierarchy & Permission Management Authorized users access only Different permission levels: a)Real – Time data view only b)Viewing stored data + a c)Deleting stored data + b d)Device configuration + c e)Users management + d

Users Hierarchy & Permission Management (cont.) Adding / removing users Setting permission levels Grouping users into user-groups

System Design Server End User Device Other System

System Design Considerations Communication Protocols:  TCP / UDP  Structure of different messages sent among the different devices Network Traffic:  Video & data compression  Multiple network adapters Database Storage:  Compression  Quota alert

System Implementation Microsoft.NET Microsoft SQL Server 2000

Project Schedule Estimated End Date Phase May 1 st Analysis April 25 th  Devices working profile  Communication with devices  Familiarizing with the CANOpen system May 1 st  Communication protocols  Network traffic  Data storage handling

Project Schedule (cont.) Estimated End Date Phase May 15 th Design May 8 th  Basic GUI design  Database schemas  Class design May 15 th  Class design (cont.)  Mid-semester presentation

Project Schedule (cont.) Estimated End Date Phase End of June Implementation (1 st Iteration) End of July Implementation (2 nd Iteration)

Thank You