Presentation is loading. Please wait.

Presentation is loading. Please wait.

The Hybrid DVR and IT Convergence: Optimizing IP ‐ Based Video.

Similar presentations


Presentation on theme: "The Hybrid DVR and IT Convergence: Optimizing IP ‐ Based Video."— Presentation transcript:

1 The Hybrid DVR and IT Convergence: Optimizing IP ‐ Based Video

2 Video Compression Technologies Deployment Models Remote Clients IP Cameras Storage IT Security What this Course Covers

3 The technique used to decrease the amount of data required to represent individual frames of video during transmission over the network or storage on a disc Terminology: Compression

4 The number of bits of data required for a given unit of time to achieve a desired image resolution and frame rate Often expressed in kilobits or megabits per second (kbps, Mbps) Terminology: Bit Rate

5 The number of pixels per image within each frame of video. Usually represented by an image height and width (i.e, 600x800) or total number of pixels, in millions (i.e, 3 megapixels) Terminology: Resolution

6

7 The amount of data that a network can transmit at any given time. The higher the bandwidth, the more video the network can support. Usually expressed in thousands or millions of bits per second (i.e., Kbps or Mbps) Terminology: Bandwidth

8 Raw video example: 704 x 480 = 337,920 pixels 337,920 pixels x 8 bits/pixel = 2,703,360 bits. 2,703,360 x 30 fps = 81,100,800 bits/sec Raw D1 video would saturate a 100 Mbps network with a single stream, or fill a 250 gigabyte disk in 7 hours. Video Compression

9 MJPEG – Compresses each frame, and transmits entire frames MPEG4 – Compresses each frame, transmits entire frames periodically, but only “what’s changed” in between H264 – Many refinements to MPEG4 to improve efficiency Video Compression Technologies

10 Compression Comparison

11 Each image (frame) is compressed into a JPEG image –Example: 2,703,360 bits becomes 132,482 bits Each image is transmitted at the desired frame rate –Example: 132,482 bits x 30 fps = 4 Mbps Video Compression: MJPEG

12 MJPEG is relatively easy to encode/decode Most megapixel cameras initially supported MJPEG—now are moving to H264 MJPEG bit rates are large relative to more advanced techniques Video Compression: MJPEG

13 Like MJPEG, encodes entire images Transmits entire key “I” frames periodically Analyzes differences between I frames and transmits only changed P frames Clusters pixels into blocks, works in entire blocks Uses motion information to predict what might change Video Compression: MPEG4

14 MPEG4 much lower bit rates than MJPEG Can be more challenging to transmit over poor network conditions reliably than MJPEG Video Compress: MPEG4

15 Large refinements to the basic techniques used in MPEG4 to compress video –Example: Instead of describing the car that moved, says “the car that was in the other frame is now at location x,y in this frame” (great simplification) Video Compression: H.264

16 Greater compression than MPEG4 and much greater than MJPEG Practically enables much higher resolutions Uses more system resources than other MJPEG or MPEG4 to encode/decode Video Compression: H.264

17 Video compression performance is “subjective” Performance varies greatly based on: –Complexity of the imagery –Amount of motion and changes to the imagery –Example: white wall compresses better than a busy parking lot Many options exist in programming and configuration that can affect results –Not all results will be the same Video Compression: Beware

18 As resolutions (and frame rates) increase, bit rates still increase - even with better compression technologies As techniques become more sophisticated, they tend to become more expensive to compute Video Compression: Beware

19 In the analog world a switch or DVR is center of the star Communication is controlled from the center Deployment Models: Star

20 In a digital world there is no center – just peers Each device is its own entity Communication is by standard protocols and convention Deployment Models: Bus

21 System is a distributed collection of components More power/flexibility to: –Mix/match components –Distribute components geographically –Leverage underlying infrastructure (i.e, wireless) Deployment Models

22 “With great power comes great responsibility” - Stan Lee (aka Spiderman) Deployment Models

23

24 Capacity planning is required Network security is a concern Remote Clients

25 Bandwidth requirements depend on the application: –Live monitoring applications require greater bandwidth –Periodic monitoring or forensics requires less Bandwidth required is a function of the number of simultaneous streams to be pulled Generally, insufficient bandwidth doesn’t interrupt mission critical functionality Plan, Plan, Plan Remote Client: Network Capacity

26 Remote clients require a network connection to the DVR When accessing DVR from afar, tempting to put the DVR on the public internet – security risk Recommended solution is the use of a virtual private network (VPN) Remote Clients: Security

27 IP camera discovery – mechanisms to automatically discover existence of an IP camera on the network Bandwidth – requirements are higher for IP cameras than for remote clients Packet loss and network latency – undesirable artifacts within the video can be introduced Interrupted connections – should be expected IP Cameras

28 Peer relationship must be set up between HVR and cameras Camera will use DHCP or statically assigned IP address Some HVRs can discover cameras, others will need to be told the camera’s IP address HVR might have some configuration control over camera, but may not be exclusive IP Cameras: Discovery

29 Bandwidth requirements may be much greater between cameras and HVR than between remote clients and HVR –High quality recordings are required –Full bandwidth stream required for each camera, all the time it is recording –Sufficient bandwidth required to satisfy the mission critical nature of recording IP Camera: Bandwidth

30 Network conditions can affect video recordings originating from IP cameras While remote clients can “retry” during problematic network conditions, IP cameras may record noise instead of events of interest Packet Loss/Latency can result in pixilation, lost frames, or interrupted connection IP Cameras: Packet Loss/Latency

31 IP camera recording is a fairly unique application of network infrastructure—few IT environments stream high bandwidth, mission critical data continuously, 24/7 While network administrators are accustomed to high uptime requirements, they rarely have to work with large numbers of “always on” network connections Understand how system reacts to connection interruptions IP Cameras: Interrupted Connections

32 IP Video Time Normal Traffic Video Compared to “Normal” Traffic

33 Bandwidth used per stream is a function of compression, frame rate, and resolution General Bandwidth Considerations CompressionResolutionFrame rateBit rate MJPEG352x240 (CIF)301.55 Mbps H2641920x1080 (HDTV 1080)52.65 Mbps MPEG4704x480 (4CIF)151.25 Mbps

34 To determine if a network link is adequate to operate remote client: 1.Determine bandwidth available on link 2.Determine compression, frame rate, resolutions 3.Determine number of streams to be viewed simultaneously 4.Multiply the bitrates per stream by the number of streams to be viewed simultaneously General Bandwidth Considerations

35 Storage used on DVR/HVR is directly proportional to the bit rates of video streaming into the device for recording Example: –MPEG4 compression, 640x480 resolution, 25fps = 1.55 Mbps –1.55 Mbps / 8 bits = 0.19375 MB/sec –0.19375 MB/sec * 3600 seconds = 697.5 MB hour –697.5 MB/hour * 24 = 16,740 MB/day = 16.7 GB/day Storage: Retention

36 All bit rates used in storage calculations are approximations Bit rate varies based on the nature and complexity of the scene, lighting conditions, and amount of movement Bit rates often reported as “nominal” Customer can estimate requirements but vendors also provide calculators Where retention is critical – provide a buffer Storage: Retention

37 DVR / HVR’s typically include vendor-qualified storage Additional storage and retention can often be provided with external and/or third party storage –Direct attached, directly to the device (e.g., ESATA, SAS, SCSI, USB) –Network attached, volume available over a network connection Storage: Drive Types

38 Streaming video is not a typical application in IT –Constant/steady writes with few reads –Opposite of typical IT applications: sparse writes in bursts and random reads Storage devices and drives qualified or recommended by your DVR/HVR vendor should be preferred Storage: Video Demands

39

40 Use firewalls to control ports and protocols Ensure devices are not susceptible to known security flaws Require encrypted communication between devices Keep system software up-to-date to protect against recent vulnerabilities Maintain access control, authorization and password policies IT Security: Requirements

41 If possible, physical security networks should be partitioned from corporate or operational networks Physical security networks can enjoy a higher level of security Doesn’t expose physical security systems to risks from corporate systems Physically restrict access to physical security systems IT Security: Networks

42 Open systems require the customer manage the underlying OS and hardware platform themselves, with the physical security system as an application Appliances provide an entire, encapsulated system of hardware/software IT Security is –Customer’s responsibility in open systems –Largely vendor’s responsibility in appliances IT Security: HVR Types

43 Microsoft Patches Windows Anti Virus Windows Active Directory Domain IT Security: Windows Specific

44 Products need to be able to support automatic or at least manual installation of Microsoft patches There is always some risk that updates can change the system. Customers must apply patches at their own risk. IT Security: Microsoft Patches

45 Windows anti-virus software requirements is the customer’s responsibility Vendors should be sure their systems have few if any special requirements as they relate to the functionality of AV software IT Security: Windows Anti Virus

46 Authentication may be to the local machine, or against the authentication directory in Microsoft Active Directory. –However, DVR or VMS software may need administrative control over the device Entitlements (the list of permissions a given user has within an application) are typically stored and maintained within the DVR/HVR software IT Security: Microsoft Active Directory

47 The following e-learning and Pod casts classes are available at the Pelco Learning Center: Sarix Megapixel Camera Principles of Megapixel Technology Introduction to Analytics DX8100 (Pod Cast) DVR5100 (Pod Cast) Digital Sentry (Pod Cast) Spectra IV (Pod Cast) And many more! Continued Learning

48 Technology Guide to Hybrid DVRs


Download ppt "The Hybrid DVR and IT Convergence: Optimizing IP ‐ Based Video."

Similar presentations


Ads by Google