Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Number:D1123 Supervisor: Erez Zilber Semester:Spring 2004 Final Presentation.

Slides:



Advertisements
Similar presentations
Everything under control ©ANT Group 2008 Garda System.
Advertisements

RFID Access Control System March, 2003 Softrónica.
ProAssist ® complex assistance services management system Global Assistance & INGENIUM Praha.
Blue Eye T E C H N O L G Y.
Native Monitoring packsOps Mgr SP1Ops Mgr R2Ops Mgr 2012 Ops Mgr 2012 Feature PacksN/AOps Mgr 2012 Product Ship.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
UNIVERSITY OF JYVÄSKYLÄ Peer-to-Peer Studio Server User Interface Chedar node Chedar node Chedar node Chedar node Peer-to-Peer Studio.
Access Control System Presented by : Alex Badyan Oren Shalgi Oren Shalgi Instructor : Erez Zilber April 2004 April 2004.
LYU0101 Wireless Digital Information System Lam Yee Gordon Yeung Kam Wah Supervisor Prof. Michael Lyu Second semester FYP Presentation 2001~2002.
Access Control System Characterization Presenting: Ehud Bahat Amir Levy Instructor: Erez Zilber November 2003.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Number:D1123 Supervisor: Erez Zilber Semester:Spring 2004 Mid Semester Presentation.
Background Info The UK Mirror Service provides mirror copies of data and programs from many sources all over the world. This enables users in the UK to.
Access Control System Midterm Report Presenting: Ehud Bahat Amir Levy Instructor: Erez Zilber December 2003.
Performed by: Gadi Marcu & Tomer Alon Instructor: Erez Zilber המעבדה למערכות ספרתיות מהירות High speed digital systems laboratory הטכניון - מכון טכנולוגי.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Access Control System Final Report Presenting: Ehud Bahat Amir Levy Instructor: Erez Zilber March 2003.
VSP Video Station Protocol Presented by : Mittelman Dana Ben-Hamo Revital Ariel Tal Instructor : Sela Guy Presented by : Mittelman Dana Ben-Hamo Revital.
Remote Surveillance Vehicle Design Review By: Bill Burgdorf Tom Fisher Eleni Binopolus-Rumayor.
Part two. 3.2 operating system architecture  Software have two categories  Application software  System software  Application software: consists of.
Digital Surveillance. Danish Software Company specialized in development of security solutions. Started in year 2000 with HQ in Copenhagen. All solutions.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
NetComm Wireless SMS Forwarding Feature Spotlight.
Client – Server Architecture A Basic Introduction Kathleen R. Murray, Ph.D. May 2002.
Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Supervisor: Erez Zilber Semester:Spring 2004 Characterization Presentation.
WINDOWS SERVICES. Introduction You often need programs that run continuously in the background Examples: – servers –Print spooler You often need.
Modern Software Engineering for Distributed Embedded Systems Joseph Voelmle, Carlos Daboin, Joanne Sirois, Josh Gallegos Mentor: Dr. Janusz Zalewski.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Digital Camera Overview IT 130 Web Graphics and Multimedia.
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story describes.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
©G. Millbery 2003Systems and User Interface SoftwareSlide 1 Self Documenting Systems  Systems where no external documentation is necessary  Includes:
EIDE Design Considerations 1 EIDE Design Considerations Brian Wright Portland General Electric.
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Alarm Network System Supervised by: Dr. Luai Malhis. Prepared by: Mahmoud Musa & Mustafa Assaf.
Home Media Centre Smart Interface Demonstration School of Information Technologies University of Sydney.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
7. CBM collaboration meetingXDAQ evaluation - J.Adamczewski1.
Module 3: Configuring File Access and Printers on Windows 7 Clients
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Wisdom of the Crowed Final Review High Speed Digital Systems Lab.
SATIRE: A Software Architecture for Smart AtTIRE R. Ganti, P. Jayachandran, T. F. Abdelzaher, J. A. Stankovic (Presented by Linda Deng)
Web Technologies Lecture 6 State preservation. Motivation How to keep user data while navigating on a website? – Authenticate only once – Store wish list.
How Web Database Architectures Work CPS181s April 8, 2003.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Client – Server Architecture A Basic Introduction 1.
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
Java’s networking capabilities are declared by the classes and interfaces of package java.net, through which Java offers stream-based communications that.
Horizon Photo-mote. ability to access photographs and images stored online, with the aid of a wireless remote remote enables the user to identify and.
1 Example security systems n Kerberos n Secure shell.
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
What is the database of a server. Web server. Print Server
MODULE – 8 OBJECT-BASED AND UNIFIED STORAGE
Client/Server Databases and the Oracle 10g Relational Database
Module Overview Installing and Configuring a Network Policy Server
Safa’ Futian . Mai Abusalha .
Data Networking Fundamentals
An Introduction to Computer Networking
Tiers vs. Layers.
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story.
Presentation transcript:

Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Number:D1123 Supervisor: Erez Zilber Semester:Spring 2004 Final Presentation

Project Goals Creating a management system for data, originating from:  Cameras (Movies).  Sensors and possibly other devices (Alerts). This system will enable:  Watching and storing the movies.  On-line response to incoming alerts.

System’s Modules Communication Module User Interface Module (Web Server) Data Module

System’s Modules (cont.) End Users – User Interface User Interface Module (Web Server) End Users System Configuration Data

System’s Modules (cont.) Communication Server – Devices Communication Module Camera Frames, Alerts DEVICES Camera Operating Commands

System’s Modules (cont.) Communication Server – Data Server Communication Module Data Module Movies, Alerts Log Cameras operation data, Alerts handling data

System’s Modules (cont.) Data Server – User Interface User Interface Module (Web Server) Data Module Stored Movies, System Configurations System Configurations, Data Manipulation

System’s Modules (cont.) Communication Server – Web Server Communication Module User Interface Module (Web Server) Real Time Movies Real Time Requests, Messages about changes in cameras configurations

Design Considerations Generic devices handling Devices identification by unique ID – sent first when initiating connection Alerts identification by alert numbers Standard camera commands

System Considerations Alerts & camera commands sent over TCP Movie frames sent over UDP Quick frames handling Automatic old movies disposal & smart disposal on critical low disk space

Perfomance Considerations – Cameras Communication Frames passed to the server in JPEG format. Frames size is 640x480, around 50KB. Camera transmitting at 10 fps takes 500KBPS. Theoretically, on a 100MB network, 200 cameras can send 10 fps concurrently. In reality each camera in the system contains carries overhead. Various algorithms that run on the server can reduce the system's performance.

Performance Considerations – Films Storage The size of a frame is around 50KB. The size of a 20 seconds 5fps DIVX compressed movie is around 1400KB 80 GB HD can contain 93 hours of uncompressed movies (at 5 fps), or 332 hours of compressed movies (at 5 fps).

System’s Architecture Communication Server Web Server Database Network Adapter End Users Devices

Possible Future Improvements & Extensions Separate network adapter for communication between data server and communication. Each server will have another network adapter for other sorts of communication.

Possible Future Improvements & Extensions (cont.) Using a better compression method than DIVX (such as H.263). Using a faster HD can improve system performance drastically. Implementation of the SMS messages feature.