The monitoring object determines the framing range, camera position, and the type of camera required. The monitoring object is divided into a fine picture and a general observation picture. Subtle images are good for identifying people or specific targets, for example: people's faces, documents, and sales store monitoring; general observation pictures are mainly used to monitor the entire scene or the general flow of the scene. The monitoring target determines the framing range, camera position, and the type of camera required.
Depending on the coverage area, you can determine the type and number of HD network cameras. In a project, the selection of the lens is very important, it depends on whether you can fully cover the scope of the customer's needs.
3. Monitor the environment
Because indoor and outdoor lighting is not the same, sensitivity and lighting effects need to be considered. Infrared lights can be used in outdoor environments, and some need to use day and night surveillance cameras; if it is indoor, you don't need to consider so much, just consider the lighting effect. In addition, if you are outdoors, you must also consider the relevant factors such as dust resistance, moisture resistance, water resistance, and damage resistance. For example, in a dark environment, a camera with a low light function can be used, a camera with a wide dynamic function can be used in an environment with uneven light distribution, a professional camera with a license plate function can be used in a bayonet environment, and an elevator dedicated can be used in an elevator environment Cameras and more.
4.Selection of aggregation switches
National standard super five network cables can be used between IPC and front-end switches, while national standard six network cables and six crystal heads must be used between front-end switches and computer room main switches. Our current projects basically use optical fiber transmission, single-mode and multi-mode, free choice. Fiber optic transceiver or optical module, free choice
5.Core switch selection
Be sure to choose a big brand full Gigabit switch, and do not work at full load. For example, when a 24-port full Gigabit switch is actually used, do not use more than 20 ports, because the amount of network HD monitoring data is relatively large and it is constantly transmitting data. The processing requirements of the switch are relatively high. If a switch has a lot of delays and stalls, you can try adding a switch to solve the problem. As for the core switch with or without routing function, select as needed.
6. Selection of access switch
The actual bandwidth of our commonly used switches is 50% -70% of the theoretical value, so the actual bandwidth of a 100M port is 50M-70M. 4M * 12 = 48M, so it is recommended that one 100M access switch access a maximum of 12 720P network cameras. At the same time, considering the current network monitoring adopts dynamic encoding, the peak value of the camera code stream may exceed 4M bandwidth, and the bandwidth redundancy design is also considered. Therefore, it is better to control one 100M access switch within 8 units. It is recommended to use more than 8 units. Gigabit mouth.
Write addresses in advance
Before construction, the IP addresses of all network domes, network cameras, NVRs, computer masters, storage servers, streaming media servers, high-definition decoders, management servers, etc. in the system need to be modified and registered uniformly. The original devices (such as computers and network printers) in the local network have IP address conflicts. The address of most of the equipment must be drafted, and the address of the camera must also be marked on the drawing, which is convenient for after-sales staff to maintain.
8. Network cable selection
National standard super five network cables can be used between IPC and front-end switches, and six network cables are also gradually applied to security systems.
9.Data encryption security
Some need to consider HTTPS encryption that encrypts the video stream and then transmits it over the network, IP address filtering that allows or denies access to defined IP addresses, IEEE802.1X, IPv6, and wireless functions that control network access. Of course, these functions are not used in general.
Because some places take into account certain specific reasons, it is necessary to install a hidden million high-definition network camera. So in this regard, you must consider choosing a surveillance camera that is not concealed or concealed.