Cover image for Guide to networking for physical security systems
Title:
Guide to networking for physical security systems
Personal Author:
Publication Information:
Clifton Park, NY : Delmar Cengage Learning, 2008
Physical Description:
xxi, 275 p. : ill. ; 24 cm.
ISBN:
9781418073961

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000003493743 TH9737 E54 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

Due to increased demand, it has become more important than ever for electronic technicians and security management professionals to have a thorough, grounded knowledge of the programming, installation, and functioning of IP-addressed electronic security devices. Guide to Networking for Physical Security Systems provides this information with a practical, straightforward approach. By first providing complete explanations of IP addressing, Ethernet and Wi-Fi, internet connections, and how networks operate; this book then delves into how these technologies can be used for electronic security device applications. With guided tours of common network devices such as DSL adapters, routers, IP security cameras, and detailed explanations of the various types of video compression; readers will gain a wealth of technical information that will prepare them for work in the electronic security industry.Check out our app, DEWALT® Mobile Pro(tm). This free app is a construction calculator with integrated reference materials and access to hundreds of additional calculations as add-ons. To learn more, visit dewalt.com/mobilepro.


Table of Contents

Acknowledgmentsp. xix
About the Authorp. xx
Introductionp. xxi
Chapter 1 The Beginnings of Networkingp. 1
The history in briefp. 1
How did these networks develop?p. 1
Telephone networksp. 2
Mainframe computer networksp. 3
Cabling system standardizationp. 4
Personal computersp. 4
Network protocolsp. 5
The rise of the Internetp. 6
Network history and electronic securityp. 6
Chapter 2 Analog and Digital Communicationsp. 7
Communication methodsp. 7
Analog communicationsp. 7
Problems with analog communicationsp. 7
Digital communications-zeros and onesp. 9
Interferencep. 10
Attenuationp. 10
Signal powerp. 10
Summaryp. 10
Chapter 3 Overview of Ethernet LANsp. 11
Evolutionp. 11
Overviewp. 11
Cablingp. 12
Computer hardwarep. 12
Firmwarep. 12
Individual addressingp. 12
Nodesp. 13
Segmentsp. 13
How transmission happensp. 13
What about collisions?p. 13
Ethernet data throughput standardsp. 13
Ethernet goes turbop. 14
Ethernet and electronic securityp. 14
Chapter 4 Basics of Ethernetp. 15
Why data is reformatted for transmissionp. 15
Ethernet packet formatp. 15
Packet routingp. 16
Device addressingp. 16
MAC addressingp. 17
IP addressingp. 17
Network classes and the Internetp. 18
Class A networksp. 18
Class B networksp. 18
Class C networksp. 18
Reuse of IP addressesp. 19
Default IP addressesp. 19
Addresses and communicationp. 19
Why two types of addresses-IP and MAC?p. 20
Subnet maskingp. 20
Summaryp. 20
Chapter 5 Ethernet Devices and Componentsp. 21
Ethernet devicesp. 21
Proxy serverp. 26
Summaryp. 26
Chapter 6 Wire and Cablep. 27
Initial cabling methodsp. 27
Rethinking the conceptp. 27
Star configurationp. 28
568 standards overviewp. 29
Type of cablep. 29
Types of connectorsp. 29
Maximum distances of cable runsp. 32
Testing methodsp. 33
Ethernet copper connectionsp. 33
UTP patch cords and jumpersp. 34
Crossover cablesp. 34
Copper cable performance enhancements-all those "Cats"p. 34
Copper cable installation and performancep. 35
Summaryp. 35
Chapter 7 Fiber Opticsp. 37
Why fiber is used in networkingp. 37
How fiber worksp. 37
Types of fiber and their usesp. 39
Fiber connectionsp. 39
Fiber testingp. 39
Electrical-to-fiber convertersp. 40
Analog transmission on fiberp. 40
Ethernet media convertersp. 41
Selection of media convertersp. 42
When to use media converters for security applicationsp. 43
Powering devicesp. 43
Summaryp. 43
Chapter 8 Wireless LANsp. 45
The history lessonp. 45
The concepts of Wi-Fip. 45
Use of Shared Frequenciesp. 46
Emulation of Ethernetp. 46
Standardizationp. 46
Product compatibilityp. 47
Data securityp. 47
Wi-Fi componentsp. 47
Access pointsp. 47
Wi-Fi laptopsp. 48
Wi-Fi routers and switchesp. 48
Ad hoc modep. 48
Wi-Fi coveragep. 49
Wi-Fi security concernsp. 50
Bandwidth realitiesp. 51
Typical Wi-Fi uses for electronic securityp. 52
The future of Wi-Fi electronic securityp. 53
Summaryp. 53
Chapter 9 IP Addressing Technologiesp. 55
Hostp. 55
Serverp. 55
Static IPp. 55
Dynamic host configuration protocol-DHCPp. 56
Static vs. DHCP in electronic security applicationsp. 57
Domain name server-DNSp. 58
Dynamic domain name server-DDNSp. 58
Ports & network address translation-NATp. 59
Summaryp. 61
Chapter 10 Internet WAN Connections and Servicesp. 63
What is the Internet?p. 63
Internet service providersp. 64
Dialupp. 64
Definition of broadbandp. 64
DSLp. 64
Cable modemp. 66
Broadband connections and electronic securityp. 66
Satellitep. 67
T1 leased linesp. 68
Virtual private networkp. 68
VPNs and security devicesp. 69
Internet optionsp. 69
Chapter 11 IP Addressing How-Top. 71
Addressing overviewp. 71
Checking the IP address of a network-connected devicep. 71
PING commandp. 74
Exiting command line screenp. 74
Command line functionsp. 74
Finding IP information through Windowsp. 74
Summaryp. 77
Chapter 12 IP Addressing Examplep. 79
DSL IP addressesp. 80
VoIP IP addressesp. 81
Wi-Fi gateway router IP addressingp. 82
Computer IP settingsp. 84
Putting it all togetherp. 84
Gateway routers and LAN/WAN addressingp. 85
Summaryp. 86
Chapter 13 Working with the IT Departmentp. 87
IT management responsibilitiesp. 87
IT management concernsp. 88
IT and network securityp. 88
How to work with the IT departmentp. 89
Going parallelp. 89
Using the enterprise networkp. 89
Bandwidth controlsp. 90
How much is available?p. 91
What about the future?p. 91
Summaryp. 91
Chapter 14 Cabling and Connection Optionsp. 93
Standardized structured cablingp. 93
Cabling as it standsp. 93
Backbone cablingp. 94
Horizontal cross-connectp. 95
Horizontal cablingp. 95
Network camera installation examplep. 95
Camera powerp. 96
Connection to the networkp. 97
Wait nowp. 97
Parallel networkingp. 97
Benefits of being alonep. 97
Going parallel-testingp. 98
Parallel network cameras example-copperp. 98
Fiber hookupp. 100
Fiber media convertersp. 100
Viewing optionsp. 101
Pre-installation testing of parallel systemsp. 101
10/100 problemsp. 101
Security of telecom roomsp. 102
Summaryp. 102
Chapter 15 Serial Communications and Ethernetp. 103
How do these technologies communicate?p. 103
RS-422 and -485p. 103
Why change to Ethernet?p. 104
Ethernet converters/serial serversp. 105
Head-end communicationsp. 106
Serial tunnelingp. 106
Communications integrationp. 107
Access control communication linksp. 107
Summaryp. 108
Chapter 16 Planning a Network Video System Installationp. 109
The camerasp. 109
Network camera benefitsp. 109
Network camera concerns or limitationsp. 110
Network cameras-the bottom linep. 111
Analog camera and network video server benefitsp. 111
Analog camera and network server concerns or limitationsp. 112
Analog camera and network server-the bottom linep. 113
Monitoring and recording optionsp. 113
Summaryp. 114
Chapter 17 Video Compression Technologiesp. 115
Streams of imagesp. 115
Basic televisionp. 115
Resolution linesp. 116
Composite videop. 116
From analog to digitalp. 116
Lossy and lossless compressionp. 117
Decimationp. 118
Scalingp. 118
Spatial redundancyp. 119
Temporal redundancyp. 119
Further file size reductionp. 119
JPEG compressionp. 119
MPEGp. 119
Typical video compression algorithms used in networkingp. 121
Compressing the futurep. 121
Chapter 18 Video Bandwidth Controls for Shared Networksp. 123
Why bandwidth control is neededp. 123
Network bandwidth availability and variablesp. 123
Options for bandwidth controlp. 124
Frames per second (fps)p. 124
Image scalingp. 125
Scaling, fps, and Internet connectionsp. 126
Compression percentagesp. 126
Compression method selectionp. 126
Variables of bandwidth usagep. 127
Good, better, bestp. 127
Calculating bandwidth needsp. 127
Black magicp. 128
Summaryp. 128
Chapter 19 Video Control and Recording Optionsp. 129
Image controlp. 129
Camera movementp. 130
Image storage, transmission, and recordingp. 131
In the camerap. 131
Emailp. 131
File transfer protocol (FTP)p. 132
Web browser vs. software program controlp. 133
Network video recorder (NVR)p. 133
Compression compatibility issuesp. 133
Multiple image transfer optionsp. 134
Sensory overloadp. 134
Summaryp. 134
Chapter 20 Powering Devicesp. 135
Everybody wants somep. 135
Enterprise power concernsp. 136
What does a UPS do?p. 136
Types of UPSp. 136
Standby backup offline UPSp. 136
Line interactive UPSp. 137
On-line UPSp. 137
Battery backupp. 137
Intelligent UPSp. 138
UPS capacity requirementsp. 138
UPS application considerationsp. 138
Remote control and resetp. 138
Network powering optionp. 138
Power over Ethernet ("PoE")p. 139
How PoE worksp. 139
PoE power suppliersp. 139
Intelligent discoveryp. 141
Advantages of PoEp. 141
Growth of PoEp. 141
DC pickersp. 141
PoE and security systemsp. 142
Chapter 21 Network Securityp. 143
Introductionp. 143
Why is this important?p. 143
Call the policep. 143
The high chaparralp. 144
Who are the bad guys?p. 144
Inside operatorsp. 145
Why hackers might attackp. 145
How hackers attack systemsp. 146
Brute force attacksp. 146
Computer virusesp. 147
Trojan horsesp. 147
Wormsp. 148
Denial of service attacksp. 148
Logic bombsp. 148
Spoofingp. 149
A "hole" lot of troublep. 150
Protecting your networkp. 151
Network protection planningp. 151
Physical security equipmentp. 151
Security of communications linesp. 152
Defense against outside attackp. 152
Defense against inside attackp. 153
Protection of video datap. 155
Regular backup of system datap. 155
Redundant systems/pathsp. 155
Network security is a process, not a goalp. 156
Chapter 22 DSL Adapter Guided Tourp. 157
DSL adapter functionsp. 157
Accessing the DSL adapterp. 157
Password accessp. 158
Firewalls and hosted applicationsp. 158
Hosted applicationsp. 159
Turn on the hostp. 160
Select the computerp. 161
Allow individual applicationsp. 161
More than one camera?p. 161
DMZ modep. 161
Review the workp. 162
Getting back to normalp. 162
Review of DSL adapter setting adjustmentsp. 162
DSL adapter reviewp. 163
Chapter 23 Wi-Fi Router Guided Tourp. 165
The routerp. 166
Accessing the device from a PCp. 166
Wireless settingsp. 166
Turn on/turn offp. 166
SSID namep. 167
WEPp. 167
WEP encryption and key typep. 167
Disabling SSID transmissionp. 169
WAN settingsp. 169
Host namep. 170
MAC addressp. 170
MAC cloningp. 170
DNS addressesp. 170
LAN settingsp. 171
DHCP settingsp. 171
Static DHCPp. 172
Advanced settingsp. 172
Port forwardingp. 172
Filtering optionsp. 173
Firewall rulesp. 174
DMZ settingsp. 174
Router reviewp. 175
Gimme dangerp. 175
Wi-Fi router reviewp. 176
Chapter 24 Ethernet Camera Guided Tourp. 177
Connecting to an Ethernet camera for initial programmingp. 177
Connecting to the camera using default IP addressp. 177
Connecting to the camera using MAC searchp. 178
Programming network addressingp. 180
IP addressing-MAC searchp. 180
IP addressing-default IP connectionp. 180
Port address settingsp. 181
Host namep. 181
BOOTPp. 181
DHCPp. 182
DNSp. 182
Set up and get outp. 182
Other network settingsp. 182
NTP time settingsp. 182
File transfer protocol settingsp. 184
Ethernet camera tour reviewp. 186
Chapter 25 Wi-Fi Camera Guided Tourp. 187
Why Wi-Fi?p. 187
Tour camerap. 187
Programming connectionsp. 188
Accessing the programming settingsp. 188
Wi-Fi settingsp. 188
IP address settingsp. 190
Port settingsp. 190
DNS and DDNS settingsp. 191
Set and get outp. 191
Image settingsp. 191
Email settingsp. 192
Wi-Fi camera reviewp. 192
Chapter 26 Wireless Laptop Surveillancep. 193
Equipment listp. 194
Camera programmingp. 194
Accessing the camera's programming fieldsp. 194
Setting the camera's IP addressp. 195
Programming the camera for ad hoc Wi-Fi modep. 195
Programming the laptop for ad hoc modep. 195
Security issuesp. 201
"Hey, it's not working!"p. 201
Recording softwarep. 201
Disk space requirementp. 202
Testing for video storage needsp. 203
Onsite installationp. 203
Wi-Fi warningp. 204
Suggestionsp. 204
Summaryp. 205
Chapter 27 IP Video Server Guided Tourp. 207
Programming accessp. 207
IP addressing optionsp. 208
DDNS functionsp. 208
Image settingsp. 208
Video image optionsp. 209
Serial port settingsp. 210
Video server tour summaryp. 210
Chapter 28 Video Management and Recording Software Guided Tourp. 211
Why use video management software?p. 211
Software detailsp. 211
Program startupp. 212
Camera connectionp. 212
Video and audio compressionp. 213
Image scaling and croppingp. 215
Recording optionsp. 215
Recorded file encryptionp. 216
Caption selectionsp. 217
Motion detectionp. 217
Schedulingp. 218
Live camera viewingp. 218
Video management software reviewp. 219
Chapter 29 Digital Video Recordersp. 221
DVR connections and functionsp. 221
Recording optionsp. 221
Video motion detectionp. 223
Disk storage optionsp. 224
Evidentiary optionsp. 224
Viewing optionsp. 224
P/T/Z controlp. 224
Networked DVR benefitsp. 225
Connection issues for network DVRsp. 225
DVRs and hacker securityp. 225
Desktop DVRs-video capture systemsp. 225
Benefits of DVRsp. 226
Summaryp. 227
Chapter 30 IP Alarm Transmittersp. 229
Why Transmit alarm signals over networks?p. 229
Pick a winnerp. 230
Receiver compatibilityp. 230
Losing the signalsp. 231
Pay to playp. 231
Installing an IP alarm transmitterp. 231
General programmingp. 231
IP addressingp. 232
Testing of alarm transmissionsp. 232
Digital dialer backupp. 232
Loss of downloading capabilityp. 232
Transmission optionsp. 233
Signal encryption and security issuesp. 233
Future/nowp. 233
Practice, practicep. 233
Summaryp. 234
Chapter 31 VoIP and Alarm Communicationsp. 235
How VoIP worksp. 235
Why your customers may switch to VoIPp. 237
VoIP and service qualityp. 237
Installation problems with VoIPp. 237
Alarm transmission problems with VoIPp. 239
Connection of digital communicators to VoIPp. 239
Alternatives to digital communicationsp. 240
Death of the digital dialerp. 240
How dealers can protect their businessp. 240
What's the good news?p. 241
It's somebody else's problemp. 241
Summaryp. 242
Chapter 32 Tools of the Tradep. 243
Ethernet toolsp. 243
Wi-Fi toolsp. 244
Product-dependent toolsp. 244
Chapter 33 Testing and troubleshootingp. 245
Logical networksp. 245
Communications testing sequencep. 245
Direct laptop testingp. 246
LAN communication testingp. 247
WAN/internet communicationsp. 247
Problems with video imagesp. 248
No videop. 249
Slow videop. 249
Summaryp. 250
Appendix A Common Networking Terms Glossaryp. 251
Appendix B Useful Commands for Troubleshooting Networks and Devicesp. 261
Appendix C Internet Connection Information Websitesp. 263
Appendix D Web Pages of Interestp. 265
Appendix E Reference Booksp. 267
Indexp. 269