Download presentation
Presentation is loading. Please wait.
Published byChloe Goodwin Modified over 7 years ago
1
The Hybrid DVR and IT Convergence: Optimizing IP ‐ Based Video
2
Video Compression Technologies Deployment Models Remote Clients IP Cameras Storage IT Security What this Course Covers
3
The technique used to decrease the amount of data required to represent individual frames of video during transmission over the network or storage on a disc Terminology: Compression
4
The number of bits of data required for a given unit of time to achieve a desired image resolution and frame rate Often expressed in kilobits or megabits per second (kbps, Mbps) Terminology: Bit Rate
5
The number of pixels per image within each frame of video. Usually represented by an image height and width (i.e, 600x800) or total number of pixels, in millions (i.e, 3 megapixels) Terminology: Resolution
7
The amount of data that a network can transmit at any given time. The higher the bandwidth, the more video the network can support. Usually expressed in thousands or millions of bits per second (i.e., Kbps or Mbps) Terminology: Bandwidth
8
Raw video example: 704 x 480 = 337,920 pixels 337,920 pixels x 8 bits/pixel = 2,703,360 bits. 2,703,360 x 30 fps = 81,100,800 bits/sec Raw D1 video would saturate a 100 Mbps network with a single stream, or fill a 250 gigabyte disk in 7 hours. Video Compression
9
MJPEG – Compresses each frame, and transmits entire frames MPEG4 – Compresses each frame, transmits entire frames periodically, but only “what’s changed” in between H264 – Many refinements to MPEG4 to improve efficiency Video Compression Technologies
10
Compression Comparison
11
Each image (frame) is compressed into a JPEG image –Example: 2,703,360 bits becomes 132,482 bits Each image is transmitted at the desired frame rate –Example: 132,482 bits x 30 fps = 4 Mbps Video Compression: MJPEG
12
MJPEG is relatively easy to encode/decode Most megapixel cameras initially supported MJPEG—now are moving to H264 MJPEG bit rates are large relative to more advanced techniques Video Compression: MJPEG
13
Like MJPEG, encodes entire images Transmits entire key “I” frames periodically Analyzes differences between I frames and transmits only changed P frames Clusters pixels into blocks, works in entire blocks Uses motion information to predict what might change Video Compression: MPEG4
14
MPEG4 much lower bit rates than MJPEG Can be more challenging to transmit over poor network conditions reliably than MJPEG Video Compress: MPEG4
15
Large refinements to the basic techniques used in MPEG4 to compress video –Example: Instead of describing the car that moved, says “the car that was in the other frame is now at location x,y in this frame” (great simplification) Video Compression: H.264
16
Greater compression than MPEG4 and much greater than MJPEG Practically enables much higher resolutions Uses more system resources than other MJPEG or MPEG4 to encode/decode Video Compression: H.264
17
Video compression performance is “subjective” Performance varies greatly based on: –Complexity of the imagery –Amount of motion and changes to the imagery –Example: white wall compresses better than a busy parking lot Many options exist in programming and configuration that can affect results –Not all results will be the same Video Compression: Beware
18
As resolutions (and frame rates) increase, bit rates still increase - even with better compression technologies As techniques become more sophisticated, they tend to become more expensive to compute Video Compression: Beware
19
In the analog world a switch or DVR is center of the star Communication is controlled from the center Deployment Models: Star
20
In a digital world there is no center – just peers Each device is its own entity Communication is by standard protocols and convention Deployment Models: Bus
21
System is a distributed collection of components More power/flexibility to: –Mix/match components –Distribute components geographically –Leverage underlying infrastructure (i.e, wireless) Deployment Models
22
“With great power comes great responsibility” - Stan Lee (aka Spiderman) Deployment Models
24
Capacity planning is required Network security is a concern Remote Clients
25
Bandwidth requirements depend on the application: –Live monitoring applications require greater bandwidth –Periodic monitoring or forensics requires less Bandwidth required is a function of the number of simultaneous streams to be pulled Generally, insufficient bandwidth doesn’t interrupt mission critical functionality Plan, Plan, Plan Remote Client: Network Capacity
26
Remote clients require a network connection to the DVR When accessing DVR from afar, tempting to put the DVR on the public internet – security risk Recommended solution is the use of a virtual private network (VPN) Remote Clients: Security
27
IP camera discovery – mechanisms to automatically discover existence of an IP camera on the network Bandwidth – requirements are higher for IP cameras than for remote clients Packet loss and network latency – undesirable artifacts within the video can be introduced Interrupted connections – should be expected IP Cameras
28
Peer relationship must be set up between HVR and cameras Camera will use DHCP or statically assigned IP address Some HVRs can discover cameras, others will need to be told the camera’s IP address HVR might have some configuration control over camera, but may not be exclusive IP Cameras: Discovery
29
Bandwidth requirements may be much greater between cameras and HVR than between remote clients and HVR –High quality recordings are required –Full bandwidth stream required for each camera, all the time it is recording –Sufficient bandwidth required to satisfy the mission critical nature of recording IP Camera: Bandwidth
30
Network conditions can affect video recordings originating from IP cameras While remote clients can “retry” during problematic network conditions, IP cameras may record noise instead of events of interest Packet Loss/Latency can result in pixilation, lost frames, or interrupted connection IP Cameras: Packet Loss/Latency
31
IP camera recording is a fairly unique application of network infrastructure—few IT environments stream high bandwidth, mission critical data continuously, 24/7 While network administrators are accustomed to high uptime requirements, they rarely have to work with large numbers of “always on” network connections Understand how system reacts to connection interruptions IP Cameras: Interrupted Connections
32
IP Video Time Normal Traffic Video Compared to “Normal” Traffic
33
Bandwidth used per stream is a function of compression, frame rate, and resolution General Bandwidth Considerations CompressionResolutionFrame rateBit rate MJPEG352x240 (CIF)301.55 Mbps H2641920x1080 (HDTV 1080)52.65 Mbps MPEG4704x480 (4CIF)151.25 Mbps
34
To determine if a network link is adequate to operate remote client: 1.Determine bandwidth available on link 2.Determine compression, frame rate, resolutions 3.Determine number of streams to be viewed simultaneously 4.Multiply the bitrates per stream by the number of streams to be viewed simultaneously General Bandwidth Considerations
35
Storage used on DVR/HVR is directly proportional to the bit rates of video streaming into the device for recording Example: –MPEG4 compression, 640x480 resolution, 25fps = 1.55 Mbps –1.55 Mbps / 8 bits = 0.19375 MB/sec –0.19375 MB/sec * 3600 seconds = 697.5 MB hour –697.5 MB/hour * 24 = 16,740 MB/day = 16.7 GB/day Storage: Retention
36
All bit rates used in storage calculations are approximations Bit rate varies based on the nature and complexity of the scene, lighting conditions, and amount of movement Bit rates often reported as “nominal” Customer can estimate requirements but vendors also provide calculators Where retention is critical – provide a buffer Storage: Retention
37
DVR / HVR’s typically include vendor-qualified storage Additional storage and retention can often be provided with external and/or third party storage –Direct attached, directly to the device (e.g., ESATA, SAS, SCSI, USB) –Network attached, volume available over a network connection Storage: Drive Types
38
Streaming video is not a typical application in IT –Constant/steady writes with few reads –Opposite of typical IT applications: sparse writes in bursts and random reads Storage devices and drives qualified or recommended by your DVR/HVR vendor should be preferred Storage: Video Demands
40
Use firewalls to control ports and protocols Ensure devices are not susceptible to known security flaws Require encrypted communication between devices Keep system software up-to-date to protect against recent vulnerabilities Maintain access control, authorization and password policies IT Security: Requirements
41
If possible, physical security networks should be partitioned from corporate or operational networks Physical security networks can enjoy a higher level of security Doesn’t expose physical security systems to risks from corporate systems Physically restrict access to physical security systems IT Security: Networks
42
Open systems require the customer manage the underlying OS and hardware platform themselves, with the physical security system as an application Appliances provide an entire, encapsulated system of hardware/software IT Security is –Customer’s responsibility in open systems –Largely vendor’s responsibility in appliances IT Security: HVR Types
43
Microsoft Patches Windows Anti Virus Windows Active Directory Domain IT Security: Windows Specific
44
Products need to be able to support automatic or at least manual installation of Microsoft patches There is always some risk that updates can change the system. Customers must apply patches at their own risk. IT Security: Microsoft Patches
45
Windows anti-virus software requirements is the customer’s responsibility Vendors should be sure their systems have few if any special requirements as they relate to the functionality of AV software IT Security: Windows Anti Virus
46
Authentication may be to the local machine, or against the authentication directory in Microsoft Active Directory. –However, DVR or VMS software may need administrative control over the device Entitlements (the list of permissions a given user has within an application) are typically stored and maintained within the DVR/HVR software IT Security: Microsoft Active Directory
47
The following e-learning and Pod casts classes are available at the Pelco Learning Center: Sarix Megapixel Camera Principles of Megapixel Technology Introduction to Analytics DX8100 (Pod Cast) DVR5100 (Pod Cast) Digital Sentry (Pod Cast) Spectra IV (Pod Cast) And many more! Continued Learning
48
Technology Guide to Hybrid DVRs
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.