Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Number:D1123 Supervisor: Erez Zilber Semester:Spring 2004 Mid Semester Presentation.

Slides:



Advertisements
Similar presentations
Short introduction to the use of PEARL General properties First tier assessments Higher tier assessments Before looking at first and higher tier assessments,
Advertisements

Enabling Secure Internet Access with ISA Server
Service Manager for MSPs
ESafe Reporter V3.0 eSafe Learning and Certification Program February 2007.
Module 5: Configuring Access for Remote Clients and Networks.
Final Presentation WINTER 2009 – SUMMER 2009 PRESENTED BY: George Kour Hany Danial SUPERVISOR: Victor Kulikov Networked Software Systems Laboratory DEPARTMENT.
Computer Monitoring System for EE Faculty By Yaroslav Ross And Denis Zakrevsky Supervisor: Viktor Kulikov.
Slide 1 Client / Server Paradigm. Slide 2 Outline: Client / Server Paradigm Client / Server Model of Interaction Server Design Issues C/ S Points of Interaction.
Team: Maya Zalcberg Diana Attar Levona Hershtik Academic advisor: Prof. Ehud Gudes ADD Presentation.
Access Control System Presented by : Alex Badyan Oren Shalgi Oren Shalgi Instructor : Erez Zilber April 2004 April 2004.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
EE-Video Yossi Biton Nir Yakobovski Outline  The concept  Main functionality  Challenges & Solutions  Design considerations Layers Class diagram.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
EE-Video Yossi Biton Nir Yakobovski Outline  The concept  Main functionality  Challenges & Solutions  Design considerations Layers Class diagram.
Performed by: Gadi Marcu & Tomer Alon Instructor: Erez Zilber המעבדה למערכות ספרתיות מהירות High speed digital systems laboratory הטכניון - מכון טכנולוגי.
Design and Implementation of a Server Director Project for the LCCN Lab at the Technion.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Lesson 19: Configuring Windows Firewall
Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Number:D1123 Supervisor: Erez Zilber Semester:Spring 2004 Final Presentation.
VSP Video Station Protocol Presented by : Mittelman Dana Ben-Hamo Revital Ariel Tal Instructor : Sela Guy Presented by : Mittelman Dana Ben-Hamo Revital.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Fundamentals of Python: From First Programs Through Data Structures
Service Broker Lesson 11. Skills Matrix Service Broker Service Broker, provides a solution to common problems with message delivery and consistency that.
| Basel Discovering Windows Azure Mobile Services and Media Services Ken Casada
1 Enabling Secure Internet Access with ISA Server.
Overview SAP Basis Functions. SAP Technical Overview Learning Objectives What the Basis system is How does SAP handle a transaction request Differentiating.
Chapter 13: Sharing Printers on Windows Server 2008 R2 Networks BAI617.
Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Supervisor: Erez Zilber Semester:Spring 2004 Characterization Presentation.
Automatic Software Testing Tool for Computer Networks ARD Presentation Adi Shachar Yaniv Cohen Dudi Patimer
1 Chapter Overview Creating Sites and Subnets Configuring Intersite Replication Troubleshooting Active Directory Replication.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Overview What is SQL Server? Creating databases Administration Security Backup.
Students: Nadia Goshmir, Yulia Koretsky Supervisor: Shai Rozenrauch Industrial Project Advanced Tool for Automatic Testing Final Presentation.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
Download & Play E-Learning System PROPOSAL draft1.0.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 11 Case Study 2: Windows Vista Tanenbaum, Modern Operating Systems 3 e, (c) 2008 Prentice-Hall,
Meir Botner David Ben-David. Project Goal Build a messenger that allows a customer to communicate with a service provider for a fee.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
Project 1 Online multi-user video monitoring system.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
Internet Information Server © N. Ganesan, Ph.D. All Rights Reserved.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Module Info Web Application and Development Digital Media Department Unit Credit Value : 4 Essential Learning time : 120 hours
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Example. Outline How to get live stream How to set audio on/off How to get schedule logs How to query events How to get metadata logs How to get DI status.
Module 9 Configuring Messaging Policy and Compliance.
Dr. Mustafa Cem Kasapbaşı Security in ASP.NET. Determining Security Requirements Restricted File Types.
The Socket Interface Chapter 21. Application Program Interface (API) Interface used between application programs and TCP/IP protocols Interface used between.
Client Call Back Client Call Back is useful for multiple clients to keep up to date about changes on the server Example: One auction server and several.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
What's New in Kinetic Calendar 2.0 Jack Boespflug Kinetic Data.
DataFlow Diagram – Level 0
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
JS (Java Servlets). Internet evolution [1] The internet Internet started of as a static content dispersal and delivery mechanism, where files residing.
CSI 3125, Preliminaries, page 1 SERVLET. CSI 3125, Preliminaries, page 2 SERVLET A servlet is a server-side software program, written in Java code, that.
Example. Outline How to get live stream How to set audio on/off How to get schedule Logs How to query events How to get DI/DO status How to control DO.
Module 6: Administering Reporting Services. Overview Server Administration Performance and Reliability Monitoring Database Administration Security Administration.
Final Presentation Smart-Home Smart-Switch using Arduino
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
Securing the Network Perimeter with ISA 2004
Module 4 Remote Login.
Introduction to Triggers
Server Concepts Dr. Charles W. Kann.
Chapter 3: Windows7 Part 4.
Mixed Reality Server under Robot Operating System
IS 4506 Server Configuration (HTTP Server)
Presentation transcript:

Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Number:D1123 Supervisor: Erez Zilber Semester:Spring 2004 Mid Semester Presentation

Project Goals Creating a management system for data, originating from:  Cameras (Movies).  Sensors and possibly other devices (Alerts). This system will enable:  Watching and storing the movies.  On-line response to incoming alerts.

System’s Major Modules Database Server Camera Remote System Sensor Web Server End User Web Application - User Interface The Heart of The System – Main Logic & Algorithms

System Basic Principles Camera Work Profile Schedule  24hrs schedule.  Determines camera’s shooting properties (zoom, pan, tilt, frame rate) and movie storage properties (severity, days to store) in different time slots. Camera Standard Work Profile Schedule  Specifies a standard schedule for specific dates, days of the week and a default schedule.  Lower movie-severity classification (Alerts are of higher priority).

System Basic Principles (cont.) Server – Cameras Interaction  Cameras send data in the following cases only: Data should be stored Real Time watching Movies Storage Policy  Limited by size  New movie upon work profile change  Automatic old data disposal

System Basic Principles (cont.) Alerts Handling Policy  The user specifies which cameras to activate,how (work profiles schedules) and how long - in response to which alerts.  When different alerts occur simultaneously and affect the same camera, the highest severity latest alert will be served, while the others will wait in a special queue.

System Basic Principles (cont.) Problems & Questions Devices Identification:  IP?  Data sent by device? Real Time Watching:  Page reload?  Streaming (WM SDK needed)?  Controlling cameras in Real Time – multiple users? Alerts Initiator Types & Alert Types:  Hard coded?  Entered by user (administrator)?  Received on request?

Web Application – User Interface Users Permissions Hierarchy 1)Real Time Access. 2)Stored Data Access (Read Only) + (1) 3)Devices Working Profiles Configuration Stored Data Removal + (2) 4)Users Hierarchy Management Devices Management System Log Management + (3)

Web Application – User Interface Site Map Login Movie Watching  Watching Real Time Video (Choosing from an authorized list of cameras)  Watching (& Deleting) Stored Video (Choosing from a list of stored videos, filtered / sorted by different parameters)

Web Application – User Interface Site Map (cont.) Devices Configuration  Cameras Configuration (Add / Remove / Edit)  Alerts Initiators Configuration (Add / Remove / Edit)  Alerts Initiators Types Configuration (Add / Remove / Edit)

Web Application – User Interface Site Map (cont.) Cameras Work Profiles Schedules  Work Profiles Schedule Configuration (Add / Remove / Edit)  Cameras Standard Work Profiles Schedules Configuration (Setting a predetermined work profile – default / specific day / specific date)  Alerts Handling Work Profiles Schedules (Setting appropriate responses to various alerts: Which cameras to activate and how)

Web Application – User Interface Site Map (cont.) Users Management (Add / Remove / Edit) Groups Management  Devices Groups (Add / Remove / Edit)  Users Groups (Add / Remove / Edit)  Users Groups Devices Groups Binding (Giving users groups access to certain devices groups)

Web Application – User Interface Site Map (cont.) System Log Watching (Filtered by different parameters / Deleting records) Logout

Database Diagram Users, Devices & Groups Helps enforcing user permissions Stores essential details

Database Diagram (cont.) Work Profiles Schedules & Alerts Handling The schedule consists of different work profiles in different time slots

Database Diagram (cont.) Recorded Movies The recorded movie Severity Classification Days to Store Movie Source Time & Date of Creation

General Class Design Each camera has 1 instance A work profile schedule consists of several work profiles

General Class Design (cont.) Incoming Alerts Creates a communication handling thread Specific handling threads for each camera Implements the camera work profile policy

General Class Design (cont.) Camera Communication Incoming frames Communication handling thread Passing frames to specialized handlers

General Class Design (cont.) Other Important Classes Database connection class:  Connects to the Database.  Executes stored procedures. “Garbage Collection” class:  Removes old movies from database, according to expiration date. AVI movie creator class:  Wraps an existing I263 API.

System View Bandwidth Considerations  QCIF Jpeg takes about 48kb to store.  A camera, filming at 30 fps, consumes 1440kbps worth of bandwidth.  A 10Mbps Bandwidth network can support up to 7 cameras filming at 30 fps simultaneously. Storage Considerations  Using I263 video Codec, storing one second of a 30 fps movie would consume 360kb.  A 20 GB HD could contain 16 hours of video.

System View (cont.) Network Configuration  Two network adapters: Server – Devices Communication Web Server  Transport Layer protocols: TCP for Alerts Initiators communication UDP for incoming video communication

System Implementation Microsoft.NET Microsoft SQL Server 2000

Project Schedule Estimated End Date Phase June 20 th 1 st Iteration May 31 th  Stored procedures  Stored procedures wrapper class  Testing program for the above June 7 th  Server implementation June 14 th  Class testing  Web application skeleton June 20 th  Server testing (simulator)  Release 1.0

Project Schedule (cont.) Estimated End Date Phase July 27 th 2 nd Iteration July 7 th  Improving server implementation July 20 th  Web application improvements July 27 th  Release 1.1  Final Report