ATM TEXT INTEGRATION INTORDUCTION. CurrentSolutionCurrentSolution Method of textintegration textintegration Schedule ATM TEXT INTEGRAION is a very popular.

Slides:



Advertisements
Similar presentations
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
ECE 4110 – Internetwork Programming TCP/IP Protocol (cont’d)
SRX-Pro Server VMS Software Review. VMS Software Reviews Installing new analog cameras onto the system Installing new IP cameras onto the system Set cameras’
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
Senior Design Project 2004/2005 Web Enabled Calling Number Delivery Daniel St. Clair Barron Shurn Professor Soules 10/28/2004.
Internet Technologies Networking / Internet Protocols (TCP/IP) Server/Client Software Communication via Ports Web Page Technology Recipe of Web Page Development.
Hardware & Software Needed For LAN and WAN
ATM Surveillance Solution. LIST Outline & Key Point 1 Solution 1, 2, 3 2 ATM Surveillance Program – E-MAP 33 Conclusion 44.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
Video Management Control-Bit Technologies video system manages various types of video inputs; analog or digital, originated in both analog & IP cameras,
G4 Control and Management Solution for Data- Centers and Computer Rooms.
TCP/IP Protocol Suite 1 Chapter 6 Upon completion you will be able to: Delivery, Forwarding, and Routing of IP Packets Understand the different types of.
IP Addressing Basics LAB 8.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
MicroARM Payment system Routers IТ-outsourcing. Organization of software switch networks based on SV.3 technology and Server monitoring system OnlineEngineering.FrontOffice.
VIP-204 Programming. The summary page allows you to see a brief description of important information currently programmed into the VIP unit.
Chapter 1-3 The Ethernet LAN. Ethernet The networking protocol used in most modern computer networks is Ethernet. Ethernet is a CSMA/CD LAN protocol.
The Network Layer. Network Projects Must utilize sockets programming –Client and Server –Any platform Please submit one page proposal Can work individually.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
ATM/POS INTEGRATION INTORDUCTION
Requirements for an Internet Connection The Internet is the largest data network on earth. Connection to the Internet can be broken down into the physical.
TCP/IP Protocol.
Chapter 7 Low-Level Protocols
Smart PSS Associate Certified Class Dahua Security Certification
HOWTO : Text-Out Function. Connections Link RS-485 Lines –Link DVR 485 Lines with Camera’s RS-485 Port.
Supplementary to Presentation on Kiosk Services ATM System Overview TrigMax Enterprise Solutions Mason Liu, Ph.D.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
TCP/IP Protocols Contains Five Layers
1 Weblite Product Introduction. 2 Control Equipment via the Internet 8 Universal Inputs 8 Universal Outputs software selectable as analog or digital signals.
25-Oct-15Network Layer Connecting Devices Networks do not normally operate in isolation.They are connected to one another using connecting devices. The.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
1 Network Administration Module 3 ARP/RARP. 2 Address Resolution The problem Physical networks use physical addresses, not IP addresses Need the physical.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
TCP/IP Protocol Suite 1 Chapter 10 Upon completion you will be able to: Internet Group Management Protocol Know the purpose of IGMP Know the types of IGMP.
Network layer Accepts messages from the application layer Prepares messages for the data link layer Packetising Addressing Routing.
3.3 Data Networks. Overview Identify the main differences between LAN and WAN. Identify the advantages of using a network over stand-alone computers.
NETWORKING COMPONENTS BY: TRAVIS MARSHALL. HUBS A hub is a device within a network that has multiple Ethernet ports that devices can plug into. The hub.
IP addresses IPv4 and IPv6. IP addresses (IP=Internet Protocol) Each computer connected to the Internet must have a unique IP address.
Networking Material taken mainly from HowStuffWorks.com.
Chapter 7 OSI Data Link Layer.
1 Figure 3-5: IP Packet Total Length (16 bits) Identification (16 bits) Header Checksum (16 bits) Time to Live (8 bits) Flags Protocol (8 bits) 1=ICMP,
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Networking Training (CCENT/CCT/CCNA R&S) Rick Rowe Ron Giannetti.
Computer Network Architecture Lecture 3: Network Connectivity Devices.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
ATMeye.iQ Video security monitoring and dispute management solution ATMeye.iQ.
System Optimization Networking
Run the on your PC to start the firmware configuration process Run IP Config Tool.
September st Evening Vocational School of Trikala our IT lessons …
Software Version: DSS ver up85 Presentation updated: September 2011 Step-by-Step Guide to Asynchronous Data (File) Replication (File Based) within.
Step-by-Step Guide to Asynchronous Data (File) Replication (File Based) over a WAN Supported by Open-E ® DSS™ Software Version: DSS ver up85 Presentation.
Lecture 3 By Miss Irum Matloob.
Part I. Overview of Data Communications and Networking
ATM/POS INTEGRATION INTORDUCTION
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
Network video manage system
Net431:advanced net services
Mobile APP Date: 01,10 ,
Wavestore Integrates…
Chapter 8: Monitoring the Network
ATM/POS INTEGRATION INTORDUCTION
Access eJournals Form Your Home
Delivery, Forwarding, and Routing of IP Packets
Presentation transcript:

ATM TEXT INTEGRATION INTORDUCTION

CurrentSolutionCurrentSolution Method of textintegration textintegration Schedule ATM TEXT INTEGRAION is a very popular function in CCTV field. Specially for bank application, if we can overlay the text information such as card number, amount in the video, and search by card number, it will be very helpful for the security management of bank. Schedule: Close to ATM

MAIN ATM BRAND NCR Diebold IBM WINCOR ATM STRUCTURE Teller System

Method of text integration

Method of text integration A Method A---RS 232 ATM communicates with DVR via RS232 ports. After a draw, ATM send a special data packet,which include of the card number, Transaction number, amount, etc, to DVR followed a protocol that both sides know. So, in this way, the protocol is very important and need customized DVR software. And because the hardware limitation, one RS232 port can only communicate with one device. That means one ATM need one DVR! ATM DVR DATA

Method of text integration A Method A---Solution This solution need a special communication box which pick up the text information and overlay it to the video. The problem is that you can not search the video by the text information.

Method B---SDLC Method of text integration B Synchronous Data Link Control SDLC is developed on IBM industry system, Some ATM system use this, and this system need A special hardware IC supports. This causes the high cost of DVR and a narrow range of application DVR DVR DATA SDLC IC DVR need a special SDLC IC.

Method of text integration C Method C---TCP/IP NETWORK SNIFFER DVR DVR ASCII DATA TCP/IP network is very popular in internet and LAN network, it’s the widest network in this world And, mostly, a standard network communication method. One DVR can communicate with Several ATMs synchronously. We select this method as our solution

Our Solution

Current solution Theory---Capture the data packet Data packet from Bank center to ATM Data packet from ATM to Bank center Monitor from here,we can get all of those data packets between ATM and Bank, and we can copy one AN ASCII DATA PACKET

Current solution Theory--- Analysis of ASCII data packet An ASCII data packet via TCP/IP network There are many data packet in the network, some of them have the useful information that we need. Such as this data packet, we can get Card number,Amount, Transaction number. Content QR Function FLAG CARD NO Amount TRAN NO Offset Length In this Sample: 40 is the FLAG of this data packet, it means what kind of data packet it is. In this data packet, what kind of data packet it is. In this data packet, We can get all of those information that we need from this kind of data packet. Actually, we can find this kind of data packet after Check those data packets between ATM and Center So, if we can find this kind of data packet and set those parameter, such as offset, length, we can get any information that we want.

Current solution Software interface & configurations Sniffer menu ATM NO: Normally, it’s 4, That means one DVR can communicate with 4 ATMs. RECORD CHANNEL: The video channel that TEXT will be overlay on. Source IP: IP of ATM or BANK CENTER Destination IP: IP of BANK CERTER or ATM Frame ID: The flag of data packet the DVR checks every data packets, and pick up the data from the DVR checks every data packets, and pick up the data from offset position, end as length bit, and compare it with the Key, if offset position, end as length bit, and compare it with the Key, if it’s equal to the key, it will look it as the one that we need. it’s equal to the key, it will look it as the one that we need. Account, Trans No, Amount: Account, Trans No, Amount: Take those data as the rule of your setting. Take those data as the rule of your setting. Different interface between different software version. In this way, we can capture any parts of the data packet that we need, For details, please study our operation manual or contact us. We also provide customized software service for actual applications.

Current solution Hardware connection LAN Network LAN Bank server Teller side To ATM 1 To ATM 2 To ATM 3 To BANK NETWORK Logic map Actual connection

Current solution Result & Search Real time monitor Playback video Search menu Input the card number in the green box

Thanks! William Chow Regional manager ZHEJIANG DAHUA TECHNOLOGY NO.1187 Bin An road, Binjiang district, Hangzhou, China