IP Video Tips

How CPU's and processor speeds affect system design

All NVR and hybrid recorders are not created equally. Every manufacturer has different CPU and throughput speed specifications. These two factors are key in determining the types and numbers of cameras that can be connected to the recording device.

If your customer requires higher megapixel or HD-resolution cameras, the CPU and throughput speed will limit the number of cameras and/or the frame rates. In turn, a customer requiring a greater number of cameras for an installation will sacrifice resolution and frame rates due to the processor and speed of the device. Check with the manufacturer or contact your local Tri- Ed/Northern Video representative to make sure that your system is capable of meeting the requirements of your installation.

Video Codecs - H.264 vs. M-JPEG

The H.264 codec for compressing and decompressing video comes in several varieties. Blu-ray and broadcast HDTV use the High Profile standard (Level 4.1 of H.264) and can deliver full 1080p resolution. This standard of H.264 is CPU and storage intensive and is rarely used in the IP video surveillance space for this reason.

The Baseline Profile of H.264 is less CPU and storage intensive, but cannot deliver the high-quality video that the High Profile standard delivers. The Baseline Profile is the most commonly used standard in IP video surveillance systems. M-JPEG offers high-quality video but less processing power, and it requires more storage space. With the cost of storage decreasing steadily, M-JPEG is a viable standard for IP video when quality is the most important feature required by the customer.

It is critical to determine the proper codec required of the system design so that the end user ultimately receives the video quality and system performance desired.

Running a Parallel Nework for Better Perform ance

One way to maximize the success of an IP video network is to run a parallel network dedicated to security. There are many reasons to do this, but some of the most important are:

  • a greater level of security when using your own network as opposed to a customer’s network and all of its vulnerabilities;
  • easier network troubleshooting—should issues arise if you do not have to worry about devices on your customer’s existing network;
  • ]parallel network allows for the use of all of the available bandwidth on your switches without interfering with existing network operation; and
  • more IT departments accepting a parallel network because it will not decrease the performance of an existing network and can be easily detached in the event of network issues.

Parallel networks are a “best practice” when implementing an IP-based video system.

How to Capture a License Plate

How many of us have been on a job where the customer is convinced that he or she absolutely must see license plates? Well, here is a good guideline to follow to ensure success on your job.

To capture license plates, users will need 5 pixels per inch or 60 pixels per foot. If users have a driveway that measures 20 feet horizontally, they need a camera that has 1,200 horizontal pixels to capture license plates. A single 1.3-megapixel camera is more than capable of providing that type of resolution.

This article originally appeared in the June 2012 issue of Security Today.

About the Author

Jeff Stout is the network solutions manager at Tri-Ed/Northern Video Distribution.

Featured

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.