Loading...

Follow GLOBAL IT ZONE on Feedspot

Continue with Google
Continue with Facebook
or

Valid

While devising a great security system, so much thought goes into choosing the right camera model that often critical factors related to backup storage system are over-looked leaving cracks in the system.  Just as there are innumerous cameras available in the market, there are also various CCTV storage options available. Here we try and tackle the cloud based CCTV storage system.

After creation of cloud, storing and backing-up huge amounts of data became very easy and affordable. With the ever increasing crime rate, security systems are now a requisite for any business/home. And thus keeping in mind that a good backup storage is the backbone for any security system, we bring you answers to WHAT, WHEN, WHY and HOW pertaining to Cloud Backup System for Security Cameras.

WHAT is cloud storage?

Cloud refers to the technology of saving data virtually over the internet so that it is easily stored, accessed and shared at any point of time. More specifically, a cloud is a network of servers connected together so that it  allows centralised data storage and access to it remotely. You might be using services like Google drive, dropbox, to upload, store and retrieve data, without realising that this is basically cloud storage. There are many kinds of clouds, but they can be broadly classified into two categories: private and public. While setting up a network or security system a Network Attached Storage(NAS) is installed. A NAS device acts as a central secure location where you can backup or store and access your files. You can connect a variety of devices such as media players, gaming consoles and smart TVs with the NAS device. A full featured operating system is not needed to use a NAS device and hence a simpler OS that focuses on doing a small subset of tasks as efficiently and securely as possible is installed. The streamlined OS in a NAS unit  makes the device easy to set up, and it’s flexibility allows for a wide variety of activities. A NAS device provides only file-based data storage services to other devices on the network. A NAS unit can be installed for setting up a private/personal cloud, hence giving you the control over bandwidth and the device’s physical location.

WHEN should you opt for CCTV cloud storage? 

  • If the security system is to be set up at multiple sites or on different LAN networks, then using the cloud for IP CCTV cameras is the best option.
  • This storage is also preferred on sites with more than 2-3 cameras.

Both DVRs and NVRs are available in the market that support cloud backup such as AD-811CVIT, AD-411CVIT and AD-6008V
WHY is cloud storage a better solution?

  • Remote Access: Cloud systems have easy remote access, i.e. the CCTV/IP camera footage can be accessed in real time and/or later from anywhere using any PC/ laptop/ tablet/ smartphone.
  • Cost Effective: Since for more than one site/ location, only a common storage is used, the installation or setup cost is reduced and hence this is becomes a more cost effective option.
  • Adaptive: As and when the CCTV storage requirements change the storage plans for cloud can also be easily altered, by increasing or decreasing the storage and bandwidth as needed.
  • Security: During a break-in the system/ hard drives storing the security footage are at equal risk of being stolen, rendering the footage unreachable and therefore unusable. This risk is not present in the case of cloud systems.

*However, the cloud is vulnerable to hackers but this can be prevented by taking proper security measures and putting firewalls in place.*

HOW to use a cloud for backing up the CCTV camera system?

Most of the IP cameras available in the market are stand-alone units with a built-in server that doesn’t require a separate computer system to operate. The first and foremost step while setting a backup system over the cloud is to check the hardware compatibility. Does your DVR/NVR model support cloud? If it doesn’t, then you might have to switch to a cloud compatible model such as AD-811CVITAD-1612CVIT for DVR or AD-6004VAD-60016VP for NVR.

Next step is to figure out the best storage plan in terms of space and cost per month, some providers such as Google, Dropbox provide a certain amount of initial space free of charge. Now the final step would be to configure the DVR/NVR to the cloud account.
The strategic use of suitable hardware and cloud options can provide the best security system tailor-made to any set of specific needs.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The security for devices connected to the internet of things (IoT) has been a hot topic, and Internet Protocol (IP) surveillance cameras, in particular, have been the subject of growing scrutiny.

Motivations for targeting IP surveillance cameras

One of the major motivations for hacking IoT devices is financial gain. And when it comes to monetization, IP surveillance cameras are distinct targets for the following reasons:

  • Constant connectivity. Like many other devices, IP cameras need to be internet-connected to function properly. However, exposure to the internet also makes it easy for hackers to find the cameras and potentially exploit the devices. Once hacked, the devices will be able to serve the hackers’ needs.
  • Low hacking investment. Unlike with hacking a PC, once hackers see a way to break the security of an IoT device such as an IP camera, the same approach can usually be applied to other devices of similar models, resulting in a very low per-device hacking cost.
  • Lack of supervision. Unlike PCs, especially those used in offices, IP cameras have low user interaction and are not well-managed in terms of security. Installation of an aftermarket anti-malware application is not available either.
  • High performance. The idle computing power of an IP surveillance camera is usually good enough to perform hacking-related tasks such as cryptocurrency mining, and without being noticed by end users at that.
  • High internet-facing bandwidth. The always-connected, fast, and huge bandwidth designed for video communications makes for a suitable target for hackers to initiate DDoS attacks.
Typical attack chain

The typical attack chain around IP surveillance cameras consists of the following steps.



1. Initial infection. After locating a device with open ports — such as Telnet, Secure Shell, and Universal Plug and Play (UPnP) — the attacker uses the device’s default credentials (as with Mirai) or exploits unpatched system vulnerabilities (as with Persirai and Reaper) to gain access control.
2. Command and control. After gaining control of the device, the attacker downloads and executes malicious scripts or samples that report to the command-and-control (C&C) server. That server issues commands instructing the affected IP camera to perform malicious activities such as cryptocurrency mining or DDoS attacks on other devices via User Datagram Protocol floods.
3. Propagation. Depending on its kind, the malware used can scan the network and employ the same infection methods to propagate itself to other vulnerable devices. The attacker can trigger this action automatically (as in the case of wormlike botnets), or manually by receiving instructions from the C&C server. Risks to public and closed networks

Most home IP cameras offered in the traditional, do-it-yourself (DIY) consumer market are connected directly to the internet. This means that home IP cameras are exposed to the internet at a very similar level as personal computers in homes, but lacking the user capability to install security software. Although home IP cameras amount to only a small portion of all installed devices, they make up a fast-growing market because of their increasing affordability and accessibility to the general public.

On the other hand, many people claim that IP cameras are not exposed to that level of risk because most products are usually designed for enterprises, which basically deploy IP cameras in local area networks and make them unsearchable on the internet. This claim may hold true, but it may overlook several real-world factors:

  • The system integrators may not install the IP cameras as expected. In many cases, people just choose whichever approach is more convenient for them to install everything and get the devices working. Ease of maintenance is another incentive for them to do so. This explains why the IP addresses of many IP cameras that are supposed to stay in a local area network can still be found.
  • The business model around IP cameras is changing. Service providers are using IP cameras to run customized services (such as elderly care), and making the cameras available on the internet is the easiest way for both users and remote operators to access the cameras as needed at the same time.
  • Modern value-adding functions such as video analysis features are often deployed in the cloud to reduce the overall hardware and software costs, with the flexibility to switch specific features on or off, or to add a new feature regardless of the hardware performance of the cameras.

Hooking up IP cameras to the internet at large is a clear trend. Given the considerable numberof IP cameras deployed globally, a small portion of IP cameras that expose themselves on the public domain can serve as a great incentive for hackers.

Another thing to consider is how network isolation is one of the frequently mentioned approaches for cybersecurity. Being in a local area network, though, does not guarantee the protection of IP cameras against hacking. For one thing, well-designed malware can easily spread across the local area network, and any portable device brought into the same local area network can easily turn into an infection vector. Take the infamous Mirai botnet as an example: A Windows-based trojan plays an important role to distribute it, even though the targets are IP cameras that run on Linux.

A layered defense for IP cameras

A complete functionality offered by an IP camera often consists of the camera itself, the network capability, and the cloud services. To offer a secure product, manufacturers need to implement security strategies in an overarching approach — from the device to the cloud:

1. IP camera hardware. Since finding a system vulnerability is one of the most critical factors for hackers to penetrate into an IP camera, leading manufacturers in the industry pay close attention to monitoring the firmware and patching the vulnerable system components of products. However, to raise the bar on security, further enhancements can be applied, such as:

  • Enforcing the changing of default credentials.
  • Applying secure boot to prevent compromised devices from functioning.
  • Implementing firmware over-the-air (FOTA) updates to patch issues if necessary.
  • Employing the principle of least functionality by minimizing open ports on the device if not necessary.

2. Networking. Deploying IP cameras within a closed network is already a highly adopted mechanism to ensure a better level of security. Virtual private networks (VPNs) can be used to enable remote access with a secure connection. Other network-related security implementations include:

  • Encrypting connections to deter attempts at compromise.
  • Connecting with a security tunnel.
  • Using a hardware component to store encryption keys.

3. Cloud. The more features provided by cloud services there are, the more critical cloud security becomes. On the upside, many, if not most, service providers are already aware of this. Most leading service providers have adequate protection on their cloud infrastructures. Highly integrated security products including those from Trend Micro also play an important role for cloud environments.

IoT security accountability and shared responsibility

As with other IoT devices, there are a lot of moving parts in a complete IP camera-based application. Accordingly, no one could and should be held solely responsible in the event of a security incident. From a cybersecurity standpoint, we believe everyone plays a role in making security fully realized.

The traditional business model for an IP surveillance system is a one-time payment. In a DIY market, the end users simply purchase the IP cameras and install them in the existing network environment. More complicated cases will introduce system integrators, who basically handle everything for the users, including selecting the right hardware, fixing them at desired locations, wiring them to outgoing routers, and setting up the network. It’s also a one-time payment if the maintenance contract is not figured in.

As more parties are trying to monetize on the basis of IP surveillance services, many different business models crop up to fulfill different needs. Surveillance service providers now charge users monthly fees instead of a one-time payment, and so do internet service providers (ISPs). New players in this business not only provide video surveillance systems for users, but also offer value-added services such as cloud recording and all sorts of smart features. To this point, the lines between the involved parties in this industry are getting blurred. For example, Nest is not only the manufacturer of the Nest Cam™ security camera, but it’s also the service provider that facilitates the associated cloud recording service.

Regardless of all the working components in the industry, there are groups of people and entities that play critical roles in the cybersecurity of surveillance systems:

  • Device Manufacturers. Responsible manufacturers should always bear the security considerations in mind for every feature designed and delivered. One may argue that users often ignore or forget to adopt basic security measures, and that may just be the root cause of widespread malware across the world today. Governments are paying attention to this now and are working to enforce a certain level of security implementation with their authority. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), operated by the U.S. government, discloses system vulnerabilities of existing IP camera products from time to time in order to create more visibility around cybersecurity issues. In addition, the government of Taiwan, where at least a quarter of IP cameras shipped around the world are produced, is drafting a series of regulations aimed at ensuring the cybersecurity of the devices. Safety science companies like UL are also working on their cybersecurity verification programs to create further visibility on cybersecurity implementations.
  • Service Providers. Those who build the system and operate their services with IP cameras should be responsible for the cybersecurity on a system level. By integrating the essential features of IP cameras and other premium features, service providers basically shape the whole system — from the device to the network to the cloud. Service providers, along with integrators, not only put things together, but they also make sure the devices and systems operate as intended during the entire service life. As they should, service providers have to prioritize cybersecurity along with promised features.
  • System integrators. Those who set up the hardware and the software and initiate everything to start the service of the surveillance system also play a role in employing security. The principle of least functionality is the key guideline here, and enabling just as many features as needed is the goal. Unused features, especially the network functions such as open ports, are normally the shortcut for hackers.
  • End users.There is typically a security guideline or a user manual that goes with an IP camera product. Reading through it and setting up the cameras as instructed play a crucial role in cybersecurity. Mirai’s success, for instance, can be attributed mainly to failure in changing default passwords.

I am providing a simple Video of hacking online CCTV Camera just for awareness purposes and please don’t use this information for any kind of blackhat hacking activities.

Hack any CCTV Camera with your smartphone or pc in hindi - YouTube

Credits :–

I have got this Information from “https://www.trendmicro.com” and saying thanks for making us aware about protection of modern cctv security systems.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Face Recognition : Matches the Face to that in the database.
Alarms: Option to send Alarms whether Face Matching or non Matching to VMS/ Alarm Center

Applications:
  • Black List Alarm (Terrorists, Shoplifters, Known Offenders)
  • VIP Identification
  • Restricted Zone Security / Lobby Management
  • Face Verification based Access Control & Attendance System
  • Forensic Analysis
  • Viewership Analytics (Face Count, Face Presence, Face Frequency)
  • Demographic Profiling(Age Group and Gender Detection)
Features & Options
  • Works with generic IP cameras with good quality.
  • Works even with PC, you don’t need high end systems
  • Works in both indoor as well as outdoor environments.
  • Works with limited pose changes.
  • Works even when people are walking.
  • Works despite camouflage efforts with spectacles, beard or wig.
  • Works for people of different ethnicity.
  • Face recognition time can be as low as 1 sec.
  • Works for up to tens of thousands of registered faces.
  • Works even with one registered image per face.
Specifications
  • People walking towards camera with face visible frontally.
  • The face detection allows ±20 degree tilt in both x and y direction.
  • Indoor/outdoor environment with good constant illumination
  • Works at resolutions 640×480 and above, up to 1080p, and for frame rate above 8 fps.
  • Face recognition time is 1-3 sec.
  • Works for a database of up to 10,000 faces.
  • No of registered image per face: 1-10.
  • Last Seen Time of the recognized face is also shown.
  • The environment is indoor as well as outdoor.
  • The camera is able to track the detected face when it is moving and does not generate multiple alarms.
Architecture
  • Face detected from camera is matched against database
  • Alarms are sent to VMS/Alarm Center
Camera Installation
  • Cameras should be installed at Angular direction.
  • Camera installation height depends on resolution, typically 1.7 meters.
  • Registration: pixel distance between eyes – min 100 pixels
  • Recognition: pixel distance between eyes – min 100 pixels
  • Detects face typically up to a distance of 3 meters from the camera. The actual distance depends on camera installation height and associated angle of incidence.
  • Constant illumination through out the day (> 200 lux).
  • Detection: pixel distance between eyes – min 60 pixels
AllGoVision VMS Integration
  • AllGoVision send recognized/non recognized alarms to VMS Viewer application.
  • AllGoVision application can run as a windows service
  • One machine can be used for registration and other machines for recognition
Software and Hardware
  • OS: Windows Server/8/7/10
  • Database storage: 2 TB
  • Database : MySQL
  • GPU accelerates processing. Nvidia GPU optimization supported
  • NVidia GPU GTX 980 + Core i7 5930 6 core, 32GB RAM, 1TB HDD can support up to 4 Channels

Here is a Sample video to get info about working of FRC(Face Recognition Camera).

Video on Face Recognition Solutions - NeoFace [NEC official] - YouTube

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Today almost every home and small  office has a local network, and an Internet connection.

The home network or small office network enables multiple devices e.g. PCs,tablets etc to connect to each other, and also to connect to the internet.

In this tutorial you will learn how you to build and setup a home or small office network and connect it to the Internet.

Do You Build a wired or Wireless Network?

Early (pre 2008) home networks were predominately wired networks.

Wired networks use Ethernet over UTP cable and tend to be faster than wireless networks, which is an important consideration if you are a gamer. The simple wired home network diagram below shows a minimum setup with a switch and broadband router.

Wired Network Advantages
  • Fast typically 100 Mbps to 10 Gbps
  • Secure and reliable.
Wired Network Dis-Advantages
  • Doesn’t work with devices that don’t have an Ethernet port e.g. tablets and smart phones.
  • Not so easy and fast to setup as it requires running cables. However Homeplug or powerline adapters can be used instead.
  • Not so easy for visitors and mobile devices (laptops) to connect to.
Main Uses

Used for network backbone i.e. connecting between router,network switches and wireless access points on different levels (floors).

Home Wireless Networks

Wireless networks use Wi-Fi. and are quick and easy to install, but are generally slower than wired networks. See Wi-Fi and Wireless networks for more details.

Wireless Network Advantages
  • Easy to setup from an end user perspective.
  • Allows easy access to smart phones, Tablets and mobile devices.
  • No cables to run.
Wireless Network Dis-Advantages
  • Not as Secure as wired networks without proper configuration. and easy to setup insecurely.
  • Not so as fast as wired networks.
  • Not as reliable as wired networks.
Main Uses

Connecting peripheral devices like computers,smart phone,tablets etc.

Most home networks will use a mixture of wired and wireless.

Setting up a Home Network -Components and Structure

Today however most home and small home office networks will use a wireless network or mixed network, as most people use Smart phones, and tablets which don’t have Ethernet support.

The main components required to build a typical home/small office network are:

  • Router or Wireless router – Connects the network to the Internet.
  • Wireless Access Point – Used to Connect Wi-Fi equipped devices to the network.
  • Ethernet HUB or Switch -Used to Connect Ethernet equipped devices.
  • Cable cat 5, cat5e or cat 6 with RJ45 connectors.
  • Telephone Cable with RJ 10 connectors.
  • Broadband Filters.

The home network diagram below shows the structure of a typical small home network

For most home networks the Wireless Router or Hub which connects the network to the Internet will be the main component of the home or small office network, and in many cases the only component.

The Wireless router usually incorporates a Wireless access point,Ethernet switch, DSL modem and Router in a single box.

This short video shows how to use a Wireless Home Hub ( BT) or router to create a home network that is connected to the Internet.

How to Create and Setup a Home Network - YouTube

Video Notes:

DSL Modem– converts digital signals into analogue signals that are suitable for sending over a telephone line. It is usually built into the Internet/broadband router and is not normally purchased as a separate component.

DSL/Broadband Filter– Used to filter out DSL signals from telephone signals so that you can access the internet and use the telephone simultaneously.

See How to Setup and Configure your Home Router

Wireless Router Location

The Wireless router will need to connect to the telephone line, cable or fibre network access point in your home.

Therefore most people locate the Wireless router near to the main telephone socket.

However you can usually change the location by using telephone extension cables or longer WAN cables.

Note: WAN cables use the same connectors (RJ45) and cables as Ethernet cables.

Because the Wireless Router provides the Wireless access point then you should place it in a central location, if possible, to get the best wireless reception.

Don’t

  • Hide it in a cupboard
  • Install it behind the sofa
  • install next to motors,microwaves,cordless telephones

Testing Your Wireless Signal

The easiest way of testing you signal strength in various locations is to use the inSSIDer Wi-Fi checker which is an App that you can install on your Android Tablet or phone.

The general idea is to place the Wireless router in its preferred location and then move around the house with the inSSIDer Wi-Fi checker, and check the signal strength, and then adjust the location if necessary.

Extending Your Home Network

In large homes/offices it may not be possible to connect all devices directly to the Wireless router and so you will need to purchase additional networking components.

You can extend your home network by:

  • extending your Wi-Fi coverage by installing additional Wireless Access Points or a more powerful access point.
  • or you can extend the Wired network by running cables into other rooms
  • or using your power cables by installing home plug adapters. See How to extend a Home Network
Home Router Setup

To administer the router you access it via a web browser, and login using a username and password.

Before you allow devices to connect to your home network you should make some basic changes to the default setup parameters of your router.

The two important one are the SSID used to access the Router and the router admin password as the default username/passwords are well known, and published on the Internet.

See How to Setup and Configure your Home Router and Setting up a secure wi-fi home network.

Connecting Wi-Fi Devices

The standard way of connecting a Wi-fi device to a Wi-fi network is the connect to the network and enter the password when prompted.

However most modern Wi-Fi routers/hubs support a feature called WPS ( Wi-fi protected setup). Which usually involves pressing a button on the wi_fi router and a corresponding WPS connection button on the Device.

The devices then connect without requiring you to enter a password. See Wiki on WPS

Home Network IP Addresses

All of your devices will need an IP address.

This is provided automatically by a service called DHCP which, by default, is provided by the home router.

IP address provided by the DHCP server are known as dynamic address as they can change. You can also assign addresses manually, and these are known as static addresses.

Static Addresses are not normally assigned but are often required when using Port forwarding.

Additionally the addresses used on your home network are known as internal addresses.

When you connect to the Internet your device will use an external IP address. This address is the IP address of the router/hub. See Internal vs external IP addresses for a more detailed explanation.

Finding Your DNS, IP and MAC Addresses

You may need to find out what DNS servers you are using or the IP or MAC address of:

  • Your Home Router.
  • Your own computer/tablet/phone

The main tool you use is the ipconfig (windows) or ifconfig (linux) tool.

The screen shot below shows the ipconfig command use with the /all switch. i.e. ipconfig/all

Your home router is your gateway to the Internet. When viewing your configuration some devices refer to it as the default router whereas other use the term default gateway.

In the screen shot above it is 192.168.1.254

Firewall Configuration on Home Networks

A Firewall functions like a router, and generally what you use on small networks is firewall/NAT router combination in which a single device acts as a NAT router and firewall.

A firewall protects your home or small business network computers and devices from intruders on the Internet.

It effectively acts like a one way digital gate blocking access to your network from devices on the Internet, but at the same time allowing devices on your network to connect to devices on the Internet. (schematic diagram below)

For small home/office networks the firewall is built into, and is part of, the router that connects to the Internet.

Generally there is no configuration required as the default behaviour is only to allow connections from the local network to the Internet, and not from the Internet to the home network.

However if you do require devices on the Internet to connect into your network (often required by gamers) then you can configure port forwarding.

You may also want or need to use dynamic DNS- see What is Dynamic DNS ?  and Why Use Dynamic DNS Services?

Checking Network and Internet Speeds

On any network the speed is restricted by the slowest comp\

onent.

A computer with a Gigabit network card talking to a computer with a 100Mbit/s network card is restricted to 100Mbit/s.

Shared devices like switches and Wireless access points are network choke points just like traffic lights and roundabouts on a road.

LAN Speed test is a very useful tool for testing your local network speeds.

For Internet speeds you can use online speed test sites. See Understanding Internet speeds and speed tests.

Home Network and Internet Connection Problems

You will invariably have connection problems from time to time.

In my experience most problems are easily diagnosed and fixed with a little patience and perseverance.

Having a good understanding of how your network fits together, and works is essential for successful troubleshooting.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 
GLOBAL IT ZONE by Global123 - 2h ago

EPABX (electronic private automatic branch exchange) is an inevitable communication system for big offices where dozens of people work at the same time. If you each of them were to be provided with a telephone line the cost would be so high as to make them prohibitive. With an intercom system in place you can avoid buying a separate connection for each of them. This will save the organization substantially.

EPABX has so many feature that will make users feel as if each user is connected to an independently line from the exchange. Special features enhance user experience beyond description. Yet, another advantage users will enjoy are they can communicate within the EPABX without incurring any call charges. This is where EXPABX scores high and also called an intercom/PBX system for the organization.

With an intercom system you should be able to connect multiples of extensions to a single line from the telephone exchange. Ideally 1exchange line for 6 users is advisable, but if usage is lesser you can connect more extensions as well. Typically an office with 40-50 extensions will be comfortable with 5 lines from the exchange. Smaller offices will be able to manage with 2 or 3 lines connected to 12 intercoms. The final choice of the PBX system depends on how frequently the public exchange line is used and the average length of each conversation.

When you order an EPABX system for your office ensure that it has these minimum features built into it.

  1. Call forwarding – This feature will let users transfer a call received from outside to a user within the organization. In more advanced models users can what is known as follow me? Follow me is a feature that enables users to take calls as they move around different nodes. By keying in their extension number, they will be able to take calls intended for them in another extension
  2. Call accounting – This is a feature that lets the organization keep a tab on the number of calls the employees make, the number the call and the duration of each call. This will help prevent unauthorized use of office phones by dishonest employees.
  3. Selective outgoing calling feature – This is a feature that will help bar the making of calls to numbers outside the organization. This feature is usually provided at the security gate, and other places where it is not advisable to let the extension be used for making outside calls. An extended use is to bar calls to international destinations.
  4. Conference calling – This feature makes it possible for 3 or more users to involve in a conversation simultaneously. All 3 callers can be either within the organization or 2 from outside and 1 from inside. Where there are 5 or more exchange lines connected it should be possible to involve 2 users from outside and more within the organization to engage in a conference.
  5. Voice mail – Only advanced PBX have this feature, though it is becoming common these days. By having voice mail feature it is possible to leave a message rather can back when an extension is engaged. Callers from outside the organization will also be able to access this feature. This feature can substation save time for users.

EPABX system is generally great for saving money, and is also easy to maintain. Failure rates in intercom system are generally low. Some PBX can be connected to computers for monitoring.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

GPS tracker system is one of the best invention done in this world. Prior only army and other government bodies had access to this technology. But in this modern era everyone can use gps products and technology to track his or her valuable stuffs that is moving. A common GPS system is consists of a gps Device + VTS Sim + Software.

To use the whole gps tracking system we have to insert the vts sim in device and connect the device with software.

Now we will talk about the cost and types of gps tracker.  A simple gps system cost up to 3000 INR  and better devices than this cost up to 6000 INR for end user or retail customer.

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

When we have to install any surveillance system or CCTV system then first thing we have to decide is the Brand.

There are many Brands of cctv system but very few has got space in market. these are…..

  1. CP PLUS
  2. HIKVISION
  3. PANASONIC
  4. DAHUA
  5. OTHERS….

CP PLUS and Hikvision has covered almost 80% market in cctv industry. Rest 20% Market is covered by other brands and OEM.  Dahua is considered quality product among all these Brands due to it’s high end performance and robustness. But for small setup uses like in small office and home cp plus and hikvision is prefered.

cctv brands shop in patna bihar , global it zone cctv camera product top brand deals

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Hello Friends …

Myself Vineet Kumar from GLOBAL IT ZONE Patna. I has been running my blog regarding “Digital Security Solution Products” since last three years . But due to discontinuity in my posts and some technical problems i quited.

But late not least. I am doing everything with new Zeal and josh……..

We will talk about all new technology and Products here….

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Face Recognition : Matches the Face to that in the database.
Alarms: Option to send Alarms whether Face Matching or non Matching to VMS/ Alarm Center

Applications:
  • Black List Alarm (Terrorists, Shoplifters, Known Offenders)
  • VIP Identification
  • Restricted Zone Security / Lobby Management
  • Face Verification based Access Control & Attendance System
  • Forensic Analysis
  • Viewership Analytics (Face Count, Face Presence, Face Frequency)
  • Demographic Profiling(Age Group and Gender Detection)
Features & Options
  • Works with generic IP cameras with good quality.
  • Works even with PC, you don’t need high end systems
  • Works in both indoor as well as outdoor environments.
  • Works with limited pose changes.
  • Works even when people are walking.
  • Works despite camouflage efforts with spectacles, beard or wig.
  • Works for people of different ethnicity.
  • Face recognition time can be as low as 1 sec.
  • Works for up to tens of thousands of registered faces.
  • Works even with one registered image per face.
Specifications
  • People walking towards camera with face visible frontally.
  • The face detection allows ±20 degree tilt in both x and y direction.
  • Indoor/outdoor environment with good constant illumination
  • Works at resolutions 640×480 and above, up to 1080p, and for frame rate above 8 fps.
  • Face recognition time is 1-3 sec.
  • Works for a database of up to 10,000 faces.
  • No of registered image per face: 1-10.
  • Last Seen Time of the recognized face is also shown.
  • The environment is indoor as well as outdoor.
  • The camera is able to track the detected face when it is moving and does not generate multiple alarms.
Architecture
  • Face detected from camera is matched against database
  • Alarms are sent to VMS/Alarm Center
Camera Installation
  • Cameras should be installed at Angular direction.
  • Camera installation height depends on resolution, typically 1.7 meters.
  • Registration: pixel distance between eyes – min 100 pixels
  • Recognition: pixel distance between eyes – min 100 pixels
  • Detects face typically up to a distance of 3 meters from the camera. The actual distance depends on camera installation height and associated angle of incidence.
  • Constant illumination through out the day (> 200 lux).
  • Detection: pixel distance between eyes – min 60 pixels
AllGoVision VMS Integration
  • AllGoVision send recognized/non recognized alarms to VMS Viewer application.
  • AllGoVision application can run as a windows service
  • One machine can be used for registration and other machines for recognition
Software and Hardware
  • OS: Windows Server/8/7/10
  • Database storage: 2 TB
  • Database : MySQL
  • GPU accelerates processing. Nvidia GPU optimization supported
  • NVidia GPU GTX 980 + Core i7 5930 6 core, 32GB RAM, 1TB HDD can support up to 4 Channels

Here is a Sample video to get info about working of FRC(Face Recognition Camera).

Video on Face Recognition Solutions - NeoFace [NEC official] - YouTube

Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Today almost every home and small  office has a local network, and an Internet connection.

The home network or small office network enables multiple devices e.g. PCs,tablets etc to connect to each other, and also to connect to the internet.

In this tutorial you will learn how you to build and setup a home or small office network and connect it to the Internet.

Quick Links

Choosing a Wired or Wireless Network

Do You Build a wired or Wireless Network?

Early (pre 2008) home networks were predominately wired networks.

Wired networks use Ethernet over UTP cable and tend to be faster than wireless networks, which is an important consideration if you are a gamer. The simple wired home network diagram below shows a minimum setup with a switch and broadband router.

Wired Network Advantages
  • Fast typically 100 Mbps to 10 Gbps
  • Secure and reliable.
Wired Network Dis-Advantages
  • Doesn’t work with devices that don’t have an Ethernet port e.g. tablets and smart phones.
  • Not so easy and fast to setup as it requires running cables. However Homeplug or powerline adapters can be used instead.
  • Not so easy for visitors and mobile devices (laptops) to connect to.
Main Uses

Used for network backbone i.e. connecting between router,network switches and wireless access points on different levels (floors).

Home Wireless Networks

Wireless networks use Wi-Fi. and are quick and easy to install, but are generally slower than wired networks. See Wi-Fi and Wireless networks for more details.

Wireless Network Advantages
  • Easy to setup from an end user perspective.
  • Allows easy access to smart phones, Tablets and mobile devices.
  • No cables to run.
Wireless Network Dis-Advantages
  • Not as Secure as wired networks without proper configuration. and easy to setup insecurely.
  • Not so as fast as wired networks.
  • Not as reliable as wired networks.
Main Uses

Connecting peripheral devices like computers,smart phone,tablets etc.

Most home networks will use a mixture of wired and wireless.

Setting up a Home Network -Components and Structure

Today however most home and small home office networks will use a wireless network or mixed network, as most people use Smart phones, and tablets which don’t have Ethernet support.

The main components required to build a typical home/small office network are:

  • Router or Wireless router – Connects the network to the Internet.
  • Wireless Access Point – Used to Connect Wi-Fi equipped devices to the network.
  • Ethernet HUB or Switch -Used to Connect Ethernet equipped devices.
  • Cable cat 5, cat5e or cat 6 with RJ45 connectors.
  • Telephone Cable with RJ 10 connectors.
  • Broadband Filters.

The home network diagram below shows the structure of a typical small home network

For most home networks the Wireless Router or Hub which connects the network to the Internet will be the main component of the home or small office network, and in many cases the only component.

The Wireless router usually incorporates a Wireless access point,Ethernet switch, DSL modem and Router in a single box.

This short video shows how to use a Wireless Home Hub ( BT) or router to create a home network that is connected to the Internet.

How to Create and Setup a Home Network - YouTube

Video Notes:

DSL Modem– converts digital signals into analogue signals that are suitable for sending over a telephone line. It is usually built into the Internet/broadband router and is not normally purchased as a separate component.

DSL/Broadband Filter– Used to filter out DSL signals from telephone signals so that you can access the internet and use the telephone simultaneously.

See How to Setup and Configure your Home Router

Wireless Router Location

The Wireless router will need to connect to the telephone line, cable or fibre network access point in your home.

Therefore most people locate the Wireless router near to the main telephone socket.

However you can usually change the location by using telephone extension cables or longer WAN cables.

Note: WAN cables use the same connectors (RJ45) and cables as Ethernet cables.

Because the Wireless Router provides the Wireless access point then you should place it in a central location, if possible, to get the best wireless reception.

Don’t

  • Hide it in a cupboard
  • Install it behind the sofa
  • install next to motors,microwaves,cordless telephones

Testing Your Wireless Signal

The easiest way of testing you signal strength in various locations is to use the inSSIDer Wi-Fi checker which is an App that you can install on your Android Tablet or phone.

The general idea is to place the Wireless router in its preferred location and then move around the house with the inSSIDer Wi-Fi checker, and check the signal strength, and then adjust the location if necessary.

Extending Your Home Network

In large homes/offices it may not be possible to connect all devices directly to the Wireless router and so you will need to purchase additional networking components.

You can extend your home network by:

  • extending your Wi-Fi coverage by installing additional Wireless Access Points or a more powerful access point.
  • or you can extend the Wired network by running cables into other rooms
  • or using your power cables by installing home plug adapters. See How to extend a Home Network
Home Router Setup

To administer the router you access it via a web browser, and login using a username and password.

Before you allow devices to connect to your home network you should make some basic changes to the default setup parameters of your router.

The two important one are the SSID used to access the Router and the router admin password as the default username/passwords are well known, and published on the Internet.

See How to Setup and Configure your Home Router and Setting up a secure wi-fi home network.

Connecting Wi-Fi Devices

The standard way of connecting a Wi-fi device to a Wi-fi network is the connect to the network and enter the password when prompted.

However most modern Wi-Fi routers/hubs support a feature called WPS ( Wi-fi protected setup). Which usually involves pressing a button on the wi_fi router and a corresponding WPS connection button on the Device.

The devices then connect without requiring you to enter a password. See Wiki on WPS

Home Network IP Addresses

All of your devices will need an IP address.

This is provided automatically by a service called DHCP which, by default, is provided by the home router.

IP address provided by the DHCP server are known as dynamic address as they can change. You can also assign addresses manually, and these are known as static addresses.

Static Addresses are not normally assigned but are often required when using Port forwarding.

Additionally the addresses used on your home network are known as internal addresses.

When you connect to the Internet your device will use an external IP address. This address is the IP address of the router/hub. See Internal vs external IP addresses for a more detailed explanation.

Finding Your DNS, IP and MAC Addresses

You may need to find out what DNS servers you are using or the IP or MAC address of:

  • Your Home Router.
  • Your own computer/tablet/phone

The main tool you use is the ipconfig (windows) or ifconfig (linux) tool.

The screen shot below shows the ipconfig command use with the /all switch. i.e. ipconfig/all

Your home router is your gateway to the Internet. When viewing your configuration some devices refer to it as the default router whereas other use the term default gateway.

In the screen shot above it is 192.168.1.254

Firewall Configuration on Home Networks

A Firewall functions like a router, and generally what you use on small networks is firewall/NAT router combination in which a single device acts as a NAT router and firewall.

A firewall protects your home or small business network computers and devices from intruders on the Internet.

It effectively acts like a one way digital gate blocking access to your network from devices on the Internet, but at the same time allowing devices on your network to connect to devices on the Internet. (schematic diagram below)

For small home/office networks the firewall is built into, and is part of, the router that connects to the Internet.

Generally there is no configuration required as the default behaviour is only to allow connections from the local network to the Internet, and not from the Internet to the home network.

However if you do require devices on the Internet to connect into your network (often required by gamers) then you can configure port forwarding.

You may also want or need to use dynamic DNS- see What is Dynamic DNS ?  and Why Use Dynamic DNS Services?

Checking Network and Internet Speeds

On any network the speed is restricted by the slowest component.

A computer with a Gigabit network card talking to a computer with a 100Mbit/s network card is restricted to 100Mbit/s.

Shared devices like switches and Wireless access points are network choke points just like traffic lights and roundabouts on a road.

LAN Speed test is a very useful tool for testing your local network speeds.

For Internet speeds you can use online speed test sites. See Understanding Internet speeds and speed tests.

Home Network and Internet Connection Problems

You will invariably have connection problems from time to time.

In my experience most problems are easily diagnosed and fixed with a little patience and perseverance.

Having a good understanding of how your network fits together, and works is essential for successful troubleshooting.

Read Full Article

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview