Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000003493743 | TH9737 E54 2008 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Due to increased demand, it has become more important than ever for electronic technicians and security management professionals to have a thorough, grounded knowledge of the programming, installation, and functioning of IP-addressed electronic security devices. Guide to Networking for Physical Security Systems provides this information with a practical, straightforward approach. By first providing complete explanations of IP addressing, Ethernet and Wi-Fi, internet connections, and how networks operate; this book then delves into how these technologies can be used for electronic security device applications. With guided tours of common network devices such as DSL adapters, routers, IP security cameras, and detailed explanations of the various types of video compression; readers will gain a wealth of technical information that will prepare them for work in the electronic security industry.Check out our app, DEWALT® Mobile Pro(tm). This free app is a construction calculator with integrated reference materials and access to hundreds of additional calculations as add-ons. To learn more, visit dewalt.com/mobilepro.
Table of Contents
Acknowledgments | p. xix |
About the Author | p. xx |
Introduction | p. xxi |
Chapter 1 The Beginnings of Networking | p. 1 |
The history in brief | p. 1 |
How did these networks develop? | p. 1 |
Telephone networks | p. 2 |
Mainframe computer networks | p. 3 |
Cabling system standardization | p. 4 |
Personal computers | p. 4 |
Network protocols | p. 5 |
The rise of the Internet | p. 6 |
Network history and electronic security | p. 6 |
Chapter 2 Analog and Digital Communications | p. 7 |
Communication methods | p. 7 |
Analog communications | p. 7 |
Problems with analog communications | p. 7 |
Digital communications-zeros and ones | p. 9 |
Interference | p. 10 |
Attenuation | p. 10 |
Signal power | p. 10 |
Summary | p. 10 |
Chapter 3 Overview of Ethernet LANs | p. 11 |
Evolution | p. 11 |
Overview | p. 11 |
Cabling | p. 12 |
Computer hardware | p. 12 |
Firmware | p. 12 |
Individual addressing | p. 12 |
Nodes | p. 13 |
Segments | p. 13 |
How transmission happens | p. 13 |
What about collisions? | p. 13 |
Ethernet data throughput standards | p. 13 |
Ethernet goes turbo | p. 14 |
Ethernet and electronic security | p. 14 |
Chapter 4 Basics of Ethernet | p. 15 |
Why data is reformatted for transmission | p. 15 |
Ethernet packet format | p. 15 |
Packet routing | p. 16 |
Device addressing | p. 16 |
MAC addressing | p. 17 |
IP addressing | p. 17 |
Network classes and the Internet | p. 18 |
Class A networks | p. 18 |
Class B networks | p. 18 |
Class C networks | p. 18 |
Reuse of IP addresses | p. 19 |
Default IP addresses | p. 19 |
Addresses and communication | p. 19 |
Why two types of addresses-IP and MAC? | p. 20 |
Subnet masking | p. 20 |
Summary | p. 20 |
Chapter 5 Ethernet Devices and Components | p. 21 |
Ethernet devices | p. 21 |
Proxy server | p. 26 |
Summary | p. 26 |
Chapter 6 Wire and Cable | p. 27 |
Initial cabling methods | p. 27 |
Rethinking the concept | p. 27 |
Star configuration | p. 28 |
568 standards overview | p. 29 |
Type of cable | p. 29 |
Types of connectors | p. 29 |
Maximum distances of cable runs | p. 32 |
Testing methods | p. 33 |
Ethernet copper connections | p. 33 |
UTP patch cords and jumpers | p. 34 |
Crossover cables | p. 34 |
Copper cable performance enhancements-all those "Cats" | p. 34 |
Copper cable installation and performance | p. 35 |
Summary | p. 35 |
Chapter 7 Fiber Optics | p. 37 |
Why fiber is used in networking | p. 37 |
How fiber works | p. 37 |
Types of fiber and their uses | p. 39 |
Fiber connections | p. 39 |
Fiber testing | p. 39 |
Electrical-to-fiber converters | p. 40 |
Analog transmission on fiber | p. 40 |
Ethernet media converters | p. 41 |
Selection of media converters | p. 42 |
When to use media converters for security applications | p. 43 |
Powering devices | p. 43 |
Summary | p. 43 |
Chapter 8 Wireless LANs | p. 45 |
The history lesson | p. 45 |
The concepts of Wi-Fi | p. 45 |
Use of Shared Frequencies | p. 46 |
Emulation of Ethernet | p. 46 |
Standardization | p. 46 |
Product compatibility | p. 47 |
Data security | p. 47 |
Wi-Fi components | p. 47 |
Access points | p. 47 |
Wi-Fi laptops | p. 48 |
Wi-Fi routers and switches | p. 48 |
Ad hoc mode | p. 48 |
Wi-Fi coverage | p. 49 |
Wi-Fi security concerns | p. 50 |
Bandwidth realities | p. 51 |
Typical Wi-Fi uses for electronic security | p. 52 |
The future of Wi-Fi electronic security | p. 53 |
Summary | p. 53 |
Chapter 9 IP Addressing Technologies | p. 55 |
Host | p. 55 |
Server | p. 55 |
Static IP | p. 55 |
Dynamic host configuration protocol-DHCP | p. 56 |
Static vs. DHCP in electronic security applications | p. 57 |
Domain name server-DNS | p. 58 |
Dynamic domain name server-DDNS | p. 58 |
Ports & network address translation-NAT | p. 59 |
Summary | p. 61 |
Chapter 10 Internet WAN Connections and Services | p. 63 |
What is the Internet? | p. 63 |
Internet service providers | p. 64 |
Dialup | p. 64 |
Definition of broadband | p. 64 |
DSL | p. 64 |
Cable modem | p. 66 |
Broadband connections and electronic security | p. 66 |
Satellite | p. 67 |
T1 leased lines | p. 68 |
Virtual private network | p. 68 |
VPNs and security devices | p. 69 |
Internet options | p. 69 |
Chapter 11 IP Addressing How-To | p. 71 |
Addressing overview | p. 71 |
Checking the IP address of a network-connected device | p. 71 |
PING command | p. 74 |
Exiting command line screen | p. 74 |
Command line functions | p. 74 |
Finding IP information through Windows | p. 74 |
Summary | p. 77 |
Chapter 12 IP Addressing Example | p. 79 |
DSL IP addresses | p. 80 |
VoIP IP addresses | p. 81 |
Wi-Fi gateway router IP addressing | p. 82 |
Computer IP settings | p. 84 |
Putting it all together | p. 84 |
Gateway routers and LAN/WAN addressing | p. 85 |
Summary | p. 86 |
Chapter 13 Working with the IT Department | p. 87 |
IT management responsibilities | p. 87 |
IT management concerns | p. 88 |
IT and network security | p. 88 |
How to work with the IT department | p. 89 |
Going parallel | p. 89 |
Using the enterprise network | p. 89 |
Bandwidth controls | p. 90 |
How much is available? | p. 91 |
What about the future? | p. 91 |
Summary | p. 91 |
Chapter 14 Cabling and Connection Options | p. 93 |
Standardized structured cabling | p. 93 |
Cabling as it stands | p. 93 |
Backbone cabling | p. 94 |
Horizontal cross-connect | p. 95 |
Horizontal cabling | p. 95 |
Network camera installation example | p. 95 |
Camera power | p. 96 |
Connection to the network | p. 97 |
Wait now | p. 97 |
Parallel networking | p. 97 |
Benefits of being alone | p. 97 |
Going parallel-testing | p. 98 |
Parallel network cameras example-copper | p. 98 |
Fiber hookup | p. 100 |
Fiber media converters | p. 100 |
Viewing options | p. 101 |
Pre-installation testing of parallel systems | p. 101 |
10/100 problems | p. 101 |
Security of telecom rooms | p. 102 |
Summary | p. 102 |
Chapter 15 Serial Communications and Ethernet | p. 103 |
How do these technologies communicate? | p. 103 |
RS-422 and -485 | p. 103 |
Why change to Ethernet? | p. 104 |
Ethernet converters/serial servers | p. 105 |
Head-end communications | p. 106 |
Serial tunneling | p. 106 |
Communications integration | p. 107 |
Access control communication links | p. 107 |
Summary | p. 108 |
Chapter 16 Planning a Network Video System Installation | p. 109 |
The cameras | p. 109 |
Network camera benefits | p. 109 |
Network camera concerns or limitations | p. 110 |
Network cameras-the bottom line | p. 111 |
Analog camera and network video server benefits | p. 111 |
Analog camera and network server concerns or limitations | p. 112 |
Analog camera and network server-the bottom line | p. 113 |
Monitoring and recording options | p. 113 |
Summary | p. 114 |
Chapter 17 Video Compression Technologies | p. 115 |
Streams of images | p. 115 |
Basic television | p. 115 |
Resolution lines | p. 116 |
Composite video | p. 116 |
From analog to digital | p. 116 |
Lossy and lossless compression | p. 117 |
Decimation | p. 118 |
Scaling | p. 118 |
Spatial redundancy | p. 119 |
Temporal redundancy | p. 119 |
Further file size reduction | p. 119 |
JPEG compression | p. 119 |
MPEG | p. 119 |
Typical video compression algorithms used in networking | p. 121 |
Compressing the future | p. 121 |
Chapter 18 Video Bandwidth Controls for Shared Networks | p. 123 |
Why bandwidth control is needed | p. 123 |
Network bandwidth availability and variables | p. 123 |
Options for bandwidth control | p. 124 |
Frames per second (fps) | p. 124 |
Image scaling | p. 125 |
Scaling, fps, and Internet connections | p. 126 |
Compression percentages | p. 126 |
Compression method selection | p. 126 |
Variables of bandwidth usage | p. 127 |
Good, better, best | p. 127 |
Calculating bandwidth needs | p. 127 |
Black magic | p. 128 |
Summary | p. 128 |
Chapter 19 Video Control and Recording Options | p. 129 |
Image control | p. 129 |
Camera movement | p. 130 |
Image storage, transmission, and recording | p. 131 |
In the camera | p. 131 |
p. 131 | |
File transfer protocol (FTP) | p. 132 |
Web browser vs. software program control | p. 133 |
Network video recorder (NVR) | p. 133 |
Compression compatibility issues | p. 133 |
Multiple image transfer options | p. 134 |
Sensory overload | p. 134 |
Summary | p. 134 |
Chapter 20 Powering Devices | p. 135 |
Everybody wants some | p. 135 |
Enterprise power concerns | p. 136 |
What does a UPS do? | p. 136 |
Types of UPS | p. 136 |
Standby backup offline UPS | p. 136 |
Line interactive UPS | p. 137 |
On-line UPS | p. 137 |
Battery backup | p. 137 |
Intelligent UPS | p. 138 |
UPS capacity requirements | p. 138 |
UPS application considerations | p. 138 |
Remote control and reset | p. 138 |
Network powering option | p. 138 |
Power over Ethernet ("PoE") | p. 139 |
How PoE works | p. 139 |
PoE power suppliers | p. 139 |
Intelligent discovery | p. 141 |
Advantages of PoE | p. 141 |
Growth of PoE | p. 141 |
DC pickers | p. 141 |
PoE and security systems | p. 142 |
Chapter 21 Network Security | p. 143 |
Introduction | p. 143 |
Why is this important? | p. 143 |
Call the police | p. 143 |
The high chaparral | p. 144 |
Who are the bad guys? | p. 144 |
Inside operators | p. 145 |
Why hackers might attack | p. 145 |
How hackers attack systems | p. 146 |
Brute force attacks | p. 146 |
Computer viruses | p. 147 |
Trojan horses | p. 147 |
Worms | p. 148 |
Denial of service attacks | p. 148 |
Logic bombs | p. 148 |
Spoofing | p. 149 |
A "hole" lot of trouble | p. 150 |
Protecting your network | p. 151 |
Network protection planning | p. 151 |
Physical security equipment | p. 151 |
Security of communications lines | p. 152 |
Defense against outside attack | p. 152 |
Defense against inside attack | p. 153 |
Protection of video data | p. 155 |
Regular backup of system data | p. 155 |
Redundant systems/paths | p. 155 |
Network security is a process, not a goal | p. 156 |
Chapter 22 DSL Adapter Guided Tour | p. 157 |
DSL adapter functions | p. 157 |
Accessing the DSL adapter | p. 157 |
Password access | p. 158 |
Firewalls and hosted applications | p. 158 |
Hosted applications | p. 159 |
Turn on the host | p. 160 |
Select the computer | p. 161 |
Allow individual applications | p. 161 |
More than one camera? | p. 161 |
DMZ mode | p. 161 |
Review the work | p. 162 |
Getting back to normal | p. 162 |
Review of DSL adapter setting adjustments | p. 162 |
DSL adapter review | p. 163 |
Chapter 23 Wi-Fi Router Guided Tour | p. 165 |
The router | p. 166 |
Accessing the device from a PC | p. 166 |
Wireless settings | p. 166 |
Turn on/turn off | p. 166 |
SSID name | p. 167 |
WEP | p. 167 |
WEP encryption and key type | p. 167 |
Disabling SSID transmission | p. 169 |
WAN settings | p. 169 |
Host name | p. 170 |
MAC address | p. 170 |
MAC cloning | p. 170 |
DNS addresses | p. 170 |
LAN settings | p. 171 |
DHCP settings | p. 171 |
Static DHCP | p. 172 |
Advanced settings | p. 172 |
Port forwarding | p. 172 |
Filtering options | p. 173 |
Firewall rules | p. 174 |
DMZ settings | p. 174 |
Router review | p. 175 |
Gimme danger | p. 175 |
Wi-Fi router review | p. 176 |
Chapter 24 Ethernet Camera Guided Tour | p. 177 |
Connecting to an Ethernet camera for initial programming | p. 177 |
Connecting to the camera using default IP address | p. 177 |
Connecting to the camera using MAC search | p. 178 |
Programming network addressing | p. 180 |
IP addressing-MAC search | p. 180 |
IP addressing-default IP connection | p. 180 |
Port address settings | p. 181 |
Host name | p. 181 |
BOOTP | p. 181 |
DHCP | p. 182 |
DNS | p. 182 |
Set up and get out | p. 182 |
Other network settings | p. 182 |
NTP time settings | p. 182 |
File transfer protocol settings | p. 184 |
Ethernet camera tour review | p. 186 |
Chapter 25 Wi-Fi Camera Guided Tour | p. 187 |
Why Wi-Fi? | p. 187 |
Tour camera | p. 187 |
Programming connections | p. 188 |
Accessing the programming settings | p. 188 |
Wi-Fi settings | p. 188 |
IP address settings | p. 190 |
Port settings | p. 190 |
DNS and DDNS settings | p. 191 |
Set and get out | p. 191 |
Image settings | p. 191 |
Email settings | p. 192 |
Wi-Fi camera review | p. 192 |
Chapter 26 Wireless Laptop Surveillance | p. 193 |
Equipment list | p. 194 |
Camera programming | p. 194 |
Accessing the camera's programming fields | p. 194 |
Setting the camera's IP address | p. 195 |
Programming the camera for ad hoc Wi-Fi mode | p. 195 |
Programming the laptop for ad hoc mode | p. 195 |
Security issues | p. 201 |
"Hey, it's not working!" | p. 201 |
Recording software | p. 201 |
Disk space requirement | p. 202 |
Testing for video storage needs | p. 203 |
Onsite installation | p. 203 |
Wi-Fi warning | p. 204 |
Suggestions | p. 204 |
Summary | p. 205 |
Chapter 27 IP Video Server Guided Tour | p. 207 |
Programming access | p. 207 |
IP addressing options | p. 208 |
DDNS functions | p. 208 |
Image settings | p. 208 |
Video image options | p. 209 |
Serial port settings | p. 210 |
Video server tour summary | p. 210 |
Chapter 28 Video Management and Recording Software Guided Tour | p. 211 |
Why use video management software? | p. 211 |
Software details | p. 211 |
Program startup | p. 212 |
Camera connection | p. 212 |
Video and audio compression | p. 213 |
Image scaling and cropping | p. 215 |
Recording options | p. 215 |
Recorded file encryption | p. 216 |
Caption selections | p. 217 |
Motion detection | p. 217 |
Scheduling | p. 218 |
Live camera viewing | p. 218 |
Video management software review | p. 219 |
Chapter 29 Digital Video Recorders | p. 221 |
DVR connections and functions | p. 221 |
Recording options | p. 221 |
Video motion detection | p. 223 |
Disk storage options | p. 224 |
Evidentiary options | p. 224 |
Viewing options | p. 224 |
P/T/Z control | p. 224 |
Networked DVR benefits | p. 225 |
Connection issues for network DVRs | p. 225 |
DVRs and hacker security | p. 225 |
Desktop DVRs-video capture systems | p. 225 |
Benefits of DVRs | p. 226 |
Summary | p. 227 |
Chapter 30 IP Alarm Transmitters | p. 229 |
Why Transmit alarm signals over networks? | p. 229 |
Pick a winner | p. 230 |
Receiver compatibility | p. 230 |
Losing the signals | p. 231 |
Pay to play | p. 231 |
Installing an IP alarm transmitter | p. 231 |
General programming | p. 231 |
IP addressing | p. 232 |
Testing of alarm transmissions | p. 232 |
Digital dialer backup | p. 232 |
Loss of downloading capability | p. 232 |
Transmission options | p. 233 |
Signal encryption and security issues | p. 233 |
Future/now | p. 233 |
Practice, practice | p. 233 |
Summary | p. 234 |
Chapter 31 VoIP and Alarm Communications | p. 235 |
How VoIP works | p. 235 |
Why your customers may switch to VoIP | p. 237 |
VoIP and service quality | p. 237 |
Installation problems with VoIP | p. 237 |
Alarm transmission problems with VoIP | p. 239 |
Connection of digital communicators to VoIP | p. 239 |
Alternatives to digital communications | p. 240 |
Death of the digital dialer | p. 240 |
How dealers can protect their business | p. 240 |
What's the good news? | p. 241 |
It's somebody else's problem | p. 241 |
Summary | p. 242 |
Chapter 32 Tools of the Trade | p. 243 |
Ethernet tools | p. 243 |
Wi-Fi tools | p. 244 |
Product-dependent tools | p. 244 |
Chapter 33 Testing and troubleshooting | p. 245 |
Logical networks | p. 245 |
Communications testing sequence | p. 245 |
Direct laptop testing | p. 246 |
LAN communication testing | p. 247 |
WAN/internet communications | p. 247 |
Problems with video images | p. 248 |
No video | p. 249 |
Slow video | p. 249 |
Summary | p. 250 |
Appendix A Common Networking Terms Glossary | p. 251 |
Appendix B Useful Commands for Troubleshooting Networks and Devices | p. 261 |
Appendix C Internet Connection Information Websites | p. 263 |
Appendix D Web Pages of Interest | p. 265 |
Appendix E Reference Books | p. 267 |
Index | p. 269 |