Download 5.2.5 Video

Document related concepts
Transcript
eSpace IVS
V100R001C30
Product Description
Issue
01
Date
2012-07-31
HUAWEI TECHNOLOGIES CO., LTD.
Copyright © Huawei Technologies Co., Ltd. 2012. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior
written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address:
Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website:
http://support.huawei.com/enterprise/
Email:
[email protected]
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
i
eSpace IVS
Product Description
Contents
Contents
1 Product Positioning and Highlights .......................................................................................... 1
1.1 Positioning ....................................................................................................................................................... 1
1.2 Highlights ......................................................................................................................................................... 2
2 System Components ..................................................................................................................... 4
3 Application Scenarios .................................................................................................................. 7
3.1 Safe City ........................................................................................................................................................... 7
3.2 Emergency Command ...................................................................................................................................... 9
3.3 Traffic Surveillance ........................................................................................................................................ 10
3.4 Campus Security ............................................................................................................................................ 11
4 Typical Networks ........................................................................................................................ 14
4.1 Network Overview ......................................................................................................................................... 14
4.2 Medium Network Scheme .............................................................................................................................. 15
4.3 Large Network Scheme .................................................................................................................................. 18
4.4 Extra Large Network Scheme ........................................................................................................................ 19
5 Service Features ........................................................................................................................... 21
5.1 Live Video Surveillance ................................................................................................................................. 22
5.1.1 Live HD Video Browsing...................................................................................................................... 22
5.1.2 PTZ Control .......................................................................................................................................... 23
5.1.3 Camera Sequencing............................................................................................................................... 24
5.1.4 Video Wall............................................................................................................................................. 25
5.2 Video Recording ............................................................................................................................................. 25
5.2.1 Manual Recording ................................................................................................................................. 25
5.2.2 Alarm-Triggered Recording .................................................................................................................. 26
5.2.3 Scheduled Recording ............................................................................................................................ 27
5.2.4 Video Playback ..................................................................................................................................... 27
5.2.5 Video Download ................................................................................................................................... 28
5.3 Video Quality Diagnosis ................................................................................................................................ 29
5.4 Behavior Analysis .......................................................................................................................................... 30
5.4.1 Intrusion Detection ................................................................................................................................ 30
5.4.2 Abandoned Object Detection ................................................................................................................ 31
5.4.3 Removed Object Detection ................................................................................................................... 32
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
ii
eSpace IVS
Product Description
Contents
5.4.4 Presence Detection ................................................................................................................................ 33
5.4.5 Directional Movement Detection .......................................................................................................... 34
5.4.6 Loitering Detection ............................................................................................................................... 35
5.4.7 Crowd Counting .................................................................................................................................... 36
5.4.8 Density Detection.................................................................................................................................. 37
5.4.9 Speed Detection .................................................................................................................................... 38
5.5 Facial Recognition ......................................................................................................................................... 39
5.5.1 Facial Image Library Management ....................................................................................................... 39
5.5.2 Facial Image Retrieval .......................................................................................................................... 40
5.5.3 Facial Image Capturing ......................................................................................................................... 40
5.5.4 Facial Recognition Monitoring ............................................................................................................. 41
5.6 Intelligent Storage .......................................................................................................................................... 42
5.6.1 Frame Extraction Storage ...................................................................................................................... 42
5.6.2 Data Buffering....................................................................................................................................... 42
5.6.3 Video Archiving .................................................................................................................................... 43
5.7 Mobile Surveillance ....................................................................................................................................... 44
5.8 Alarm Services ............................................................................................................................................... 45
5.9 Voice Intercom and Voice Broadcast .............................................................................................................. 47
5.9.1 Voice Intercom ...................................................................................................................................... 47
5.9.2 Voice Broadcast..................................................................................................................................... 47
5.10 Electronic Map ............................................................................................................................................. 48
5.11 Media Security ............................................................................................................................................. 49
5.11.1 Digital Watermark ............................................................................................................................... 49
5.11.2 Secure Media Transmission ................................................................................................................ 50
5.12 System Management .................................................................................................................................... 50
5.12.1 User Management ............................................................................................................................... 50
5.12.2 PU Management .................................................................................................................................. 51
5.12.3 Multi-Level Management ................................................................................................................... 52
5.12.4 Multi-Domain Management ................................................................................................................ 52
5.12.5 Log Management ................................................................................................................................ 53
5.12.6 System Maintenance ........................................................................................................................... 54
6 Reliability and Security ............................................................................................................. 55
6.1 Reliability ....................................................................................................................................................... 55
6.1.1 Network Reliability ............................................................................................................................... 55
6.1.2 Host Reliability ..................................................................................................................................... 56
6.1.3 Application Software Reliability ........................................................................................................... 57
6.1.4 Service Reliability ................................................................................................................................. 58
6.2 Security .......................................................................................................................................................... 59
6.2.1 Security Solution at the Application Layer ........................................................................................... 59
6.2.2 Security Solution at the System Layer .................................................................................................. 59
6.2.3 Security Solution at the Network Layer ................................................................................................ 60
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
iii
eSpace IVS
Product Description
Contents
6.2.4 Security Solution at the Management Layer ......................................................................................... 60
7 Operation and Maintenance ..................................................................................................... 62
7.1 Service Management System ......................................................................................................................... 62
7.2 eSpace NMS ................................................................................................................................................... 63
8 Technical Specifications ............................................................................................................ 67
8.1 Performance Indicators .................................................................................................................................. 67
8.2 Protocols and Standards ................................................................................................................................. 69
8.2.1 International Standards.......................................................................................................................... 70
8.2.2 Industry Standards................................................................................................................................. 70
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
iv
eSpace IVS
Product Description
1 Product Positioning and Highlights
1
Product Positioning and Highlights
About This Chapter
eSpace Intelligent Video Surveillance (IVS) offers customers a video surveillance solution
that features high compatibility, definition, and intelligence. eSpace IVS allows customers to
perform mobile surveillance over diversified mobile terminals.
1.1 Positioning
eSpace IVS offers customers a video surveillance solution with high definition, reliability,
performance, and compatibility. eSpace IVS is easy to maintain, manage, and deploy.
1.2 Highlights
This topic describes eSpace IVS highlights.
1.1 Positioning
eSpace IVS offers customers a video surveillance solution with high definition, reliability,
performance, and compatibility. eSpace IVS is easy to maintain, manage, and deploy.
Based on IP networks with a flexible architecture, eSpace IVS provides a wide assortment of
services for customers, such as:

Live video surveillance

Recording

Video playback

Pan Tilt Zoom (PTZ) control

Alarm detection, linkage, and prevention

Voice intercom

Electronic map

Intelligent analysis
eSpace IVS can be deployed on PCs, Network Video Recorders (NVRs), and blade servers.
Core management and control components are deployed in two-node cluster mode to avoid
single point of failure (SPOF). Media servers are deployed in cluster and load balancing
modes to improve system reliability.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
1
eSpace IVS
Product Description
1 Product Positioning and Highlights
1.2 Highlights
This topic describes eSpace IVS highlights.
Multi-Level and Multi-Domain
eSpace IVS supports multi-level and multi-domain deployment as follows:

A single domain supports a maximum of eight levels or service nodes.

A single domain can directly connect to 128 external domains. Services in different
domains operate independently and are not affected when a cross-domain network
outage occurs.
Intelligence
eSpace IVS leverages intelligent analysis algorithms and high-accuracy analysis technologies
to offer diverse and mature intelligent analysis services. eSpace IVS caters to customers with
unique surveillance needs and changes surveillance from passive to active.

Behavior analysis
Includes intrusion detection, abandoned object detection, removed object detection,
presence detection, directional movement detection, loitering detection, crowd counting,
and speed detection.

Facial recognition
Compares faces in a surveillance area with those in a facial database to quickly identify
people.

Video quality diagnosis
Analyzes video quality by image brightness, definition, and strip.

Intelligent storage
Discards unnecessary frames, buffers data against data loss, and archives essential
videos.
Open and Compatible Design
eSpace IVS features open and compatible design to integrate with an impressive array of
devices and platforms.

Device access
Provides the Device Connection Gateway (DCG) to connect to diversified peripheral
units (PUs) and alarm systems.

−
Complies with the Open Network Video Interface Forum (ONVIF) specification to
connect to PUs from mainstream vendors in the industry.
−
Complies with the standard OLE for Process Control (OPC) protocol and vendors'
proprietary protocols alike to connect to alarm systems from Honeywell, Siemens,
and Conwin. OLE refers to Object Linking and Embedding, a technology that allows
embedding and linking to documents and other objects.
Platform connection
Provides the Platform Connection Gateway (PCG) and complies with T28181 and T669
protocols to connect to heterogeneous third-party platforms and share resources.

Issue 01 (2012-07-31)
Platform capability openness
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
2
eSpace IVS
Product Description
1 Product Positioning and Highlights
Provides the OLE Control eXtension (OCX) controls for third-party video surveillance
systems to customize surveillance capabilities.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
3
eSpace IVS
Product Description
2 System Components
2
System Components
This topic describes the eSpace IVS system architecture and involved components.
Figure 2-1 shows the eSpace IVS system architecture.
Figure 2-1 eSpace IVS system architecture
eSpace IVS consists of presentation, control, media, and management layers.
Table 2-1 describes system layers and components.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
4
eSpace IVS
Product Description
2 System Components
Table 2-1 Components at each layer
Layer
Layer Function
Component
Component
Function
Presentati
on layer
Displays services on
client units (CUs). A CU
can be a mobile client, or
a client in client/server
(C/S) or browser/server
(B/S) structure.
C/S client
Displays services on a
PC client and provides
a user interface for
service operation and
configuration.
B/S client
Displays services on a
web browser client and
provides a user
interface for service
operation and
configuration.
Mobile client
Displays services on a
mobile client and
provides a user
interface for service
operation.
Platform Connection
Gateway (PCG)
Complies with
GA/T669, T28181, and
customized protocols to
connect to third-party
video surveillance
platforms.
Service Control Unit
(SCU)
Controls video
surveillance services,
including service
authentication, logic
processing, and service
control.
Device Connection
Gateway (DCG)
Complies with the
ONVIF specification to
connect to third-party
PUs and Conwin alarm
systems.
Media Distribution
Unit (MDU)
Forwards and
distributes media data.
Media Record Unit
(MRU)
Stores media data.
Media Transcoding
Unit (MTU)
Re-encodes and
distributes media data.
Media Analysis Unit
(MAU)
Performs intelligent
analysis functions, such
as rule settings, task
management, and result
report.
Control
layer
Media
layer
Issue 01 (2012-07-31)
Controls video
surveillance services and
connects to third-party
devices and platforms.
Processes media data,
including media
distribution, storage,
transcoding, and
intelligent analysis.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
5
eSpace IVS
Product Description
2 System Components
Layer
Layer Function
Component
Component
Function
Manage
ment
layer
Maintains and manages
service data.
Service Management
Unit (SMU)
Manages service data,
including users, rights,
video walls, levels, and
domains.
Operation maintenance
Unit (OMU)
Uses the eSpace
Network Management
Server (NMS) to
manage network
elements (NEs) in
eSpace IVS. This
component allows
users to manage the
topology, alarms,
devices, and system
performance.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
6
eSpace IVS
Product Description
3 Application Scenarios
3
Application Scenarios
About This Chapter
This topic describes eSpace IVS applications in the following solutions: safe city, emergency
command, traffic surveillance, and campus security.
3.1 Safe City
eSpace IVS can be applied in a safe city solution to perform real-time video surveillance,
speed up emergency response, and ensure public security.
3.2 Emergency Command
eSpace IVS can be applied in an emergency command solution to effectively link an
emergency command center to remote sites, improve emergency response efficiency, and
consequently reduce casualties and property loss.
3.3 Traffic Surveillance
eSpace IVS can be applied in a traffic surveillance solution to perform video surveillance over
city roads, subways, highways, and railways, which ensures traffic security and efficiency.
3.4 Campus Security
eSpace IVS can be applied in a campus security solution to intelligently monitor campuses
and trigger security actions.
3.1 Safe City
eSpace IVS can be applied in a safe city solution to perform real-time video surveillance,
speed up emergency response, and ensure public security.
Figure 3-1 shows how eSpace IVS is applied in a safe city solution.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
7
eSpace IVS
Product Description
3 Application Scenarios
Figure 3-1 eSpace IVS in a safe city solution
As shown in Figure 3-1, eSpace IVS integrates police and social video surveillance resources
to construct a service-rich video surveillance platform. eSpace IVS also leverages third-party
visualized surveillance platforms and video-assisted investigation technologies to deliver
diversified applications.
eSpace IVS brings the following benefits to a safe city solution:

Real-time video access
Allows users to access police and social video surveillance resources using the video
access gateway, browse live videos, and remotely monitor city dynamics.

Accurate tracking and incident analysis
Leverages video-assisted investigation technologies to search for criminal suspects, track
persons and vehicles, analyze incidents, and improve incident investigation efficiency.

Quick and accurate crime combat
Integrates with Geographic Information System (GIS) and Global Positioning System
(GPS) to visualize video surveillance on electronic maps, quickly locate emergencies,
and effectively combat crimes.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
8
eSpace IVS
Product Description
3 Application Scenarios
3.2 Emergency Command
eSpace IVS can be applied in an emergency command solution to effectively link an
emergency command center to remote sites, improve emergency response efficiency, and
consequently reduce casualties and property loss.
Figure 3-2 shows how eSpace IVS is applied in an emergency command solution.
Figure 3-2 eSpace IVS in an emergency command solution
As shown in Figure 3-2, eSpace IVS integrates with the Universal Application Platform
(UAP), computer telephony integration (CTI), and computer-assisted dispatch (CAD) systems
to construct a collaborative emergency command platform that consists of an emergency
command center and a Telepresence command center. eSpace IVS also integrates with
third-party systems to effectively link an emergency command center to remote sites.
eSpace IVS brings the following benefits to an emergency command solution:

Multiple alarm access modes
Allows people to report alarms in real time by fixed-line phone, mobile phone, and
Internet.

Visual command and dispatch
Integrates with third-party capabilities in static and dynamic video collection, remote
negotiation, and GIS to visualize emergency command and dispatch.

Issue 01 (2012-07-31)
Intelligent analysis and decision making
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
9
eSpace IVS
Product Description
3 Application Scenarios
Integrates with third-party systems, such as disaster management, contingency plan
dispatch, and automatic vehicle tracking, to support decision making and process
emergencies in a timely and correct manner.
3.3 Traffic Surveillance
eSpace IVS can be applied in a traffic surveillance solution to perform video surveillance over
city roads, subways, highways, and railways, which ensures traffic security and efficiency.
Figure 3-3 shows how eSpace IVS is applied in a traffic surveillance solution.
Figure 3-3 eSpace IVS in a traffic surveillance solution
As shown in Figure 3-3, eSpace IVS combines PUs and off-site law enforcement platforms to
construct a collaborative traffic surveillance platform. eSpace IVS also integrates with the
following third-party traffic applications and systems:

Police Geographic Information System (PGIS)

GIS

Traffic guidance and dispatch

Traffic signal control

Vehicle tracking
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
10
eSpace IVS
Product Description
3 Application Scenarios
eSpace IVS brings the following benefits to a traffic surveillance solution:

HD videos and snapshots
Performs all-day HD video surveillance over traffic conditions in real time.
High-resolution and high-color-reproduction cameras function properly in an automatic
day/night switch mode.


Intelligent behavior analysis and tracking
−
Leverages intelligent behavior analysis technologies to monitor key locations all day
and generate warnings in the event of impending danger.
−
Intelligently tracks and seamlessly takes snapshots of traffic violations to provide
substantial evidence for law enforcement and consequently reduce traffic accidents.
−
Allows users to quickly search for and analyze PUs to track vehicles, analyze onsite
conditions, and handle incidents.
Open and compatible platform
Integrates with off-site law enforcement platforms, complies with industry standards, and
provides open interfaces and protocols to enable flexibility in service integration and
system management.
3.4 Campus Security
eSpace IVS can be applied in a campus security solution to intelligently monitor campuses
and trigger security actions.
Figure 3-4 shows how eSpace IVS is applied in a campus security solution.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
11
eSpace IVS
Product Description
3 Application Scenarios
Figure 3-4 eSpace IVS in a campus security solution
As shown in Figure 3-4, eSpace IVS can connect to PUs installed in industrial parks, schools,
prisons, airports, harbors, and financial outlets.
In addition, eSpace IVS provides OCX controls to integrate with the following security
systems from independent software vendors (ISV):

Public address and voice intercom

Access control

Alarm

Electronic patrol

Power and environment monitoring

Parking lot management
eSpace IVS brings the following benefits to a campus security solution:

Speedy emergency response
Quickly triggers video surveillance and locates sites when detecting alarms.

HD video surveillance
Performs HD video surveillance around every corner on campus.

Intelligent warning
Intelligently analyzes videos at key locations to enable active and preventive
surveillance.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
12
eSpace IVS
Product Description

3 Application Scenarios
Easy to deploy
Integrates with diversified PUs to capture and detect alarm incidents anytime anywhere
on campus.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
13
eSpace IVS
Product Description
4 Typical Networks
4
Typical Networks
About This Chapter
eSpace IVS provides medium, large, and extra large network schemes to apply to surveillance
scenarios of different scales.
4.1 Network Overview
eSpace IVS networks can be classified into the following types by the number of connected
cameras: medium, large, and extra-large.
4.2 Medium Network Scheme
In a medium network scheme where 128 to 1024 cameras are installed, eSpace IVS is
deployed in either single-level single-domain mode or multi-level single-domain mode.
4.3 Large Network Scheme
In a large network scheme where 1024 to 5000 cameras are installed, eSpace IVS is deployed
in multi-level single-domain mode.
4.4 Extra Large Network Scheme
In an extra large networking scheme where more than 5000 cameras are installed, eSpace IVS
is deployed in multi-level multi-domain mode.
4.1 Network Overview
eSpace IVS networks can be classified into the following types by the number of connected
cameras: medium, large, and extra-large.
Background
The eSpace IVS system can be deployed in distributed mode, which can be subdivided into
three submodes: single-level single-domain, multi-level single-domain, and multi-level
multi-domain. The two concepts level and domain are described as follows:

Level
Indicates a service node. For example, a public security bureau has installed an eSpace
IVS system, and police stations under this bureau have deployed cameras in important
surveillance areas. Each police station is a service node. Only one set of management
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
14
eSpace IVS
Product Description
4 Typical Networks
units is required for the public security bureau, and one or more media units are required
for each site according to the number of access cameras. After these units are deployed,
the public security bureau can monitor and manage all police stations, and the police
stations can monitor and manage their own areas.

Domain
Indicates a group of interconnected surveillance systems. Domains can be classified into
local and external domains. An external domain can be an eSpace IVS system or a
third-party surveillance system. For example, an eSpace IVS system is installed in the
public security departments of city A and city B. With multi-domain management, users
in the public security departments of city A and city B can view each other's surveillance
videos.
Network Type
Table 4-1 lists the network scales and deployment modes of the eSpace IVS system.
Table 4-1 Network scales and deployment modes of the eSpace IVS system
Network
Scale
Number of
Cameras
Involved
Recommended Deployment Mode
Medium
128–1024
Single-level single-domain or multi-level single-domain
NOTE
 Single-level single-domain: involves a single service node,
and a single service management and control unit.

Large
1024–5000
Multi-level single-domain: involves multiple service nodes,
and a single service management and control unit.
Multi-level single-domain
NOTE
Multi-level single-domain: involves multiple service nodes,
and a single service management and control unit.
Extra large
5000 or above
Multi-level multi-domain
NOTE
Multi-level multi-domain: involves multiple service nodes,
and multiple service management and control units.
4.2 Medium Network Scheme
In a medium network scheme where 128 to 1024 cameras are installed, eSpace IVS is
deployed in either single-level single-domain mode or multi-level single-domain mode.
Figure 4-1 shows a medium network scheme in single-level single-domain mode.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
15
eSpace IVS
Product Description
4 Typical Networks
Figure 4-1 Medium network scheme (single-level single-domain)
A media unit represents a service node. As shown in Figure 4-1, in single-level single-domain
mode, only one management unit and one media unit are deployed, and there is only one
service node. In multi-level single-domain mode, however, multiple media units are deployed
and there are multiple service nodes. Users can choose to deploy eSpace IVS in single-level
or multi-level mode in terms of the number of service nodes.
For example, if eSpace IVS is deployed in a supermarket chain in single-level single-domain
mode, one management unit, one intelligent analysis unit, and one media unit are installed in
its headquarters, and cameras are installed in individual branches of the chain.
Table 4-2 describes the components in a medium network scheme.
Table 4-2 Network components
Componen
t
Description
Management
unit

Controls video surveillance services and connects to third-party devices
and platforms.

Supports active and standby deployment. If a fault occurs on the active
management unit, the standby one automatically takes over services,
which ensures service continuity.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
16
eSpace IVS
Product Description
4 Typical Networks
Componen
t
Description
Intelligent
analysis unit

Diagnoses video quality, analyzes behaviors, recognizes faces, and
triggers video recording if specified conditions are met.

Provides intelligent analysis functions for connected third-party video
surveillance platforms.

Figure 4-2 shows the deployment of an intelligent analysis unit.

Establishes, forwards, and receives media streams.

Allows users to record, play, store, and download videos.

Users can deploy one or more media units.
Media unit
Connection
unit
Connects third-party devices and platforms to eSpace IVS to share video
surveillance resources. Users can deploy one or more connection units in
terms of the number of devices and platforms to be connected.
Network
management
system
(NMS)

Consists of the eSpace NMS server and client.

Monitors the operation and maintenance of devices and servers in
eSpace IVS.

Collects and manages alarm and performance data.
Disk array
(optional)
Stores and reads data in multiple disks to speed up data transmission while
ensuring data security.
Client unit
(CU)
eSpace IVS client, such as C/S client, B/S client, or mobile client.
Decoder
Decompresses and converts digital video signals into analog signals for
video playback on video walls.
Third-party
device
Third-party devices that are connected to eSpace IVS, such as network
cameras or decoders.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
17
eSpace IVS
Product Description
4 Typical Networks
Figure 4-2 Intelligent analysis unit
The multi-level single-domain deployment mode in a medium network scheme is similar to
that in a large network scheme. For details, see Figure 4-3.
The difference between the two lies in the number of media units and connected cameras.
4.3 Large Network Scheme
In a large network scheme where 1024 to 5000 cameras are installed, eSpace IVS is deployed
in multi-level single-domain mode.
Figure 4-3 shows a large network scheme.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
18
eSpace IVS
Product Description
4 Typical Networks
Figure 4-3 Large network scheme (multi-level single-domain)
As shown in Figure 4-3, in multi-level single-domain mode:

One management unit is deployed in the headquarters to manage devices in the
headquarters and branches.

One or more media units are deployed in each branch.
For details about network components, see Table 4-2.
4.4 Extra Large Network Scheme
In an extra large networking scheme where more than 5000 cameras are installed, eSpace IVS
is deployed in multi-level multi-domain mode.
Figure 4-4 shows an extra large network scheme.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
19
eSpace IVS
Product Description
4 Typical Networks
Figure 4-4 Extra large network scheme (multi-level multi-domain)
As shown in Figure 4-4, an extra large network scheme consists of multiple domains and
levels. eSpace IVS is the local domain and third-party video surveillance systems are external
domains. Within a domain, one management unit is deployed at the headquarters, and one or
more media units or media unit sets are deployed at each branch.
For details about network components, see Table 4-2.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
20
eSpace IVS
Product Description
5 Service Features
5
Service Features
About This Chapter
This topic describes eSpace IVS service features.
5.1 Live Video Surveillance
eSpace IVS provides multiple live video surveillance functions, including live HD video
browsing, PTZ control, video sequencing, and video wall.
5.2 Video Recording
eSpace IVS supports manual, alarm-triggered, and scheduled recording. Users can search for
recorded videos in multiple modes and download them to a local computer.
5.3 Video Quality Diagnosis
The eSpace IVS platform automatically generates an alarm when an exception (such as color
cast and image noise) occurs on the video image.
5.4 Behavior Analysis
eSpace IVS can analyze a wide range of object behaviors to efficiently detect exceptions in
various scenarios.
5.5 Facial Recognition
The eSpace IVS platform can automatically identify faces detected in a surveillance area.
5.6 Intelligent Storage
The eSpace IVS platform provides multiple video storage modes to store valuable video files
and save storage space.
5.7 Mobile Surveillance
Users can perform live video surveillance, record videos, and take snapshots with mobile
terminals. Recorded videos and captured snapshots can be stored on a local computer or the
eSpace IVS platform.
5.8 Alarm Services
When a Peripheral Unit (PU) generates an alarm, the eSpace IVS platform automatically
displays live videos from the linked cameras based on a preset alarm linkage rule, notifies
users of the alarm in multiple ways, and displays alarm handling suggestions.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
21
eSpace IVS
Product Description
5 Service Features
5.9 Voice Intercom and Voice Broadcast
If a PU and CU are configured with speakers and microphones, a user can enable the voice
intercom or broadcast function.
5.10 Electronic Map
Users can query surveillance sites and alarm sources on electronic maps. When an alarm
occurs, a user can quickly locate the alarm source, view surrounding situations, find an
appropriate surveillance camera, and browse live videos.
5.11 Media Security
The eSpace IVS system provides a digital watermark and secure media transmission to ensure
the reliability and security of video files.
5.12 System Management
The eSpace IVS platform supports user management, device management, multi-level
management, multi-domain management, log management, and system maintenance.
5.1 Live Video Surveillance
eSpace IVS provides multiple live video surveillance functions, including live HD video
browsing, PTZ control, video sequencing, and video wall.
5.1.1 Live HD Video Browsing
Users can browse live HD videos shot by cameras installed at surveillance areas.
Customer Benefits

HD video experience

High accuracy in video analysis
Scenario
An eSpace IVS system is installed on a campus. Jason, a security guard, is sitting in a duty
room and watching live HD videos from cameras installed at the campus gateway.
Features
Table 5-1 describes the live HD video browsing features.
Table 5-1 Live HD video browsing features
Type
Feature
Unique
feature
Decodes 1080p videos at 60 frames per second.
Basic
features
Allows users to browse videos in multiple screens.
Issue 01 (2012-07-31)
Directly connects to PUs to obtain live videos.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
22
eSpace IVS
Product Description
5 Service Features
Type
Feature
Allows users to mark and add frequently-used cameras to favorites.
Allows users to play live videos on video walls only by a mouse click.
Resumes video playback where users left off.
Allows users to zoom in to view image details. The maximum zoom-in
percentage is 800%.
Manually or automatically takes snapshots of live videos and stores the
snapshots on the eSpace IVS platform or a local computer.
5.1.2 PTZ Control
A PTZ camera consists of the PTZ (an auxiliary device) and lens (installed on the PTZ). Users
can control PTZ cameras to browse live videos from different angles.
Customer Benefits

Browses live videos from different angles.

Adjusts the shooting angle and focal length to widen surveillance coverage and improve
video definition.
Scenario
An eSpace IVS system has been installed in a traffic surveillance center. One day, Jason, an
employee at the center, is watching the live video of intersection A. All of a sudden, two cars
collide into each other. Jason adjusts the shooting angle and focal length of the camera and
zooms in to view details. Jason verifies the traffic accident and sends nearby traffic officers to
the scene.
Features
Table 5-2 describes the PTZ control features.
Table 5-2 PTZ control features
Type
Feature
Unique
feature
3D intelligent location
Basic
features
Controls camera movement in a maximum of eight directions.
Allows users to click on any point or rectangle in a video image to
automatically adjust the shooting angle and focal length of a camera and
zoom in to view details.
Supports zoom, aperture, and focal length adjustment.
Position preset:
Allows users to preset PTZ positions for a PTZ camera so that the camera
can be quickly switched to the preset positions without manual intervention
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
23
eSpace IVS
Product Description
5 Service Features
Type
Feature
when triggered.
Preset tour:
Shoots videos along a line of specified presets.
Horizontal and vertical tour

The horizontal tour allows 360° scan in one direction clockwise or
counter-clockwise or back-and-forth scan at more than 90°.

The vertical tour allows back-and-forth scan at more than 90° clockwise
or counter-clockwise.
PTZ lock:
Allows administrators to grade PTZ control rights so that users with a
higher priority can lock a PTZ camera to prevent other users from
controlling it.
Automatic PTZ unlock:
Automatically unlocks PTZ cameras that have been locked for a specified
time length.
5.1.3 Camera Sequencing
eSpace IVS can play live videos from multiple cameras in the same video pane in a specified
sequence.
Customer Benefits

Automatically plays live videos from multiple cameras, which reduces labor costs.

Allows users to customize camera sequencing plans to meet individual demands.
Scenario
An eSpace IVS system is installed in a shopping mall. Jason, an employee in the shopping
mall, needs to watch live videos from ten counters. Jason enables camera sequencing and sets
the display interval of each camera to 60 seconds. In this case, eSpace IVS automatically and
sequentially plays live videos from the ten counters at an interval of 60 seconds.
Features
Camera sequencing offers the following features:

Camera sequencing in multiple video panes

Up to 512 cameras in a camera sequencing task

Up to 16 camera sequencing tasks

Configurable display interval

Configurable presets for camera sequencing

Pause and resume camera sequencing

Jump to a next camera during live video browsing
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
24
eSpace IVS
Product Description
5 Service Features

Configurable camera sequencing plans

Camera sequencing on a video wall
5.1.4 Video Wall
The eSpace IVS system enables users to play live and recorded videos on a large-screen video
wall.
Customer Benefits
Users can play live and recorded videos on a large-screen video wall, which facilitates
surveillance.
Scenario
An eSpace IVS system and a large-screen video wall have been installed on a campus. Jason,
an employee in the campus, can watch real-time HD videos on the video wall.
Features
The eSpace IVS system supports the following video wall features:

Browses live and recorded videos from the video wall.

Browses camera sequence videos from the video wall.

Customizes the video wall layout.

Manages the video wall. Users can save the configured video wall channel, live video,
and camera sequence information.

Allows users to set a video pane as an alarm window.
5.2 Video Recording
eSpace IVS supports manual, alarm-triggered, and scheduled recording. Users can search for
recorded videos in multiple modes and download them to a local computer.
5.2.1 Manual Recording
Users can record videos during live video surveillance.
Customer Benefits

Provides recorded videos for follow-up video analysis.

Provides evidence for incident handling.
Scenario
An eSpace IVS system is installed on a campus. Jason, an employee on the campus, is
watching the live video of the campus gateway. All of a sudden, a stranger attempts to
trespass on campus. Jason clicks a button and eSpace IVS starts recording videos of the
campus gateway.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
25
eSpace IVS
Product Description
5 Service Features
Features
Table 5-3 describes the manual recording features.
Table 5-3 Manual recording features
Type
Feature
Unique
feature
Stores 1080p videos at 60 frames per second.
Basic
features
Encodes videos in H.264 BP/MP/HP format.
Records and stores videos on the eSpace IVS platform.
Records and stores videos on PUs.
Records and stores videos on a local computer.
Allows users to specify a local path for storing recorded videos.
Allows users to record or stop recording live videos.
Automatically stops recording when a specified recording duration has
elapsed.
5.2.2 Alarm-Triggered Recording
Users can link alarms or events to a recording task by specifying an alarm linkage policy.
When detecting an alarm or event, eSpace IVS triggers a specified camera to record for a
specified length of time.
Customer Benefits

Records videos on the eSpace IVS platform when an alarm is triggered.

Provides recorded videos for follow-up video analysis.

Provides evidence for incident handling.
Scenario
An eSpace IVS system is installed in a warehouse. Jason, an employee in the warehouse,
needs to record video of people entering or exiting the warehouse. Jason links the perimeter
intrusion event to a recording task. If someone enters or exits the warehouse, eSpace IVS
generates an intrusion alarm and triggers a specified camera to record videos.
Features
Alarm-triggered recording provides the following features:

Video recording even before an alarm is triggered

Intelligent analysis rules configurable as alarm rules that trigger video recording

Real-time alarm linkage
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
26
eSpace IVS
Product Description
5 Service Features
5.2.3 Scheduled Recording
Users can create a scheduled recording policy for the eSpace IVS platform to record videos
for a specified length of time.
Customer Benefits

Automatically records videos, which reduces labor costs.

Provides recorded videos for follow-up video analysis.

Provides evidence for incident handling.
Scenario
An eSpace IVS system is installed on a campus. Jason, an employee on the campus, needs to
record videos from 12:00 to 13:00 when a lot of people enter or exit the campus. Jason creates
a scheduled recording policy for this time segment. eSpace IVS automatically records videos
during this time segment.
Features
Scheduled recording enables users to:

Specify the start and end times of a scheduled recording policy.

Allows users to create daily, weekly, and all-day recording plans.

Specify cameras for recording plans.

Specify the storage space size.

Record and store videos on the eSpace IVS platform.

Record and store videos on PUs.
5.2.4 Video Playback
Users can play back recorded videos on the eSpace IVS platform, a PU, and a local computer.
Customer Benefits
Users can watch and analyze videos.
Scenario
An eSpace IVS system is installed on a campus. One day, Lily lost her mobile phone at
District 1 in Building A. Jason, a security guard on the campus, played back the recorded
video of District 1 in Building A, and found that it was Jack who had stolen Lily's mobile
phone.
Features
Table 5-4 describes the video playback features.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
27
eSpace IVS
Product Description
5 Service Features
Table 5-4 Video playback features
Type
Feature
Unique
feature
Allows users to play back a maximum of eight simultaneously recorded
videos.
Basic
features
Allows users to play back a maximum of 25 recorded videos at the same
time.
Allows users to mark recorded videos of different types in different colors
on the timeline.
Allows users to play back videos recorded and stored on the eSpace IVS
platform, a PU, or a local computer.
Allows users to play back recorded videos at a specified time point on the
timeline.
Allows users to bookmark videos, take snapshots, and control audio volume
during video playback.
Allows users to quickly locate videos by alarm event or bookmark.
Allows users to drag a camera from the camera list to a video pane and play
back videos.
Allows users to play back videos on a video wall.
Allows users to play back videos with the following controls: fast-forward,
slow-down, frame-by-frame, and continuous playback.
Allows users to zoom in to view image details. The maximum zoom-in
percentage is 800%.
5.2.5 Video Download
Users can download videos stored on the eSpace IVS system or PUs to a local hard disk.
Customer Benefits
Video download has the following benefits:

The eSpace IVS system provides historical video records that can be used for evidence
collection.

Users can download videos to a local disk and process them accordingly.
Scenario
One day, Lily working at District 1 in Building A on a campus found that her mobile phone
had been stolen from her desk and then reported such theft to Jason, an employee of the
campus property management company. Jason, a security guard on the campus, played back
the recorded video of District 1 in Building A, and found that it was Jack who had stolen
Lily's mobile phone. Then Jason downloaded this video to a local hard disk and submitted it
to the police for processing.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
28
eSpace IVS
Product Description
5 Service Features
Features
The eSpace IVS system supports the following video download features:

Allows users to download videos stored on the eSpace IVS system or PUs.

Creates a maximum of 16 download tasks and 4 concurrent download tasks.

Downloads videos at a normal speed or 4x speed.

Segments the downloaded video by time or by capacity.

Sets a path for storing the downloaded videos.

Displays the download task status, time, download speed, and download process.
5.3 Video Quality Diagnosis
The eSpace IVS platform automatically generates an alarm when an exception (such as color
cast and image noise) occurs on the video image.
Customer Benefits

With the video quality diagnosis function, users do not need to manually check cameras,
saving a lot of manpower.

With the video quality diagnosis function, users can stay informed of their video feed
quality.
Scenario
An eSpace IVS system is installed on a campus. An employee, Jason, sets a video quality
diagnosis rule and a surveillance plan for cameras at the campus gateway. One day, the
eSpace IVS system detects that a camera at the campus gateway is blocked by an object and
generates an alarm. Jason notifies relevant personnel so they can check the camera.
Features
Table 5-5 describes the video quality diagnosis features.
Table 5-5 Video quality diagnosis features
Type
Feature
Unique
features
Detects camera faults and diagnoses video quality.
Basic
features
Allows users to set detection rules and surveillance plans for cameras.
Allows users to add, modify, view, and delete detection rules or
surveillance plans.
Allows users to enable or disable an intelligent video analysis plan.
Automatically detects video signal loss, image brightness, definition, strip
interference, color cast, noise, image freezing, lens block, and image jitter.
Allows users to lower the brightness detection sensitivity when a camera
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
29
eSpace IVS
Product Description
5 Service Features
Type
Feature
works in strong light conditions to prevent a false alarm.
Automatically detects cameras one by one, enhancing the detection
efficiency and server usage.
Automatically generates an alarm and takes snapshots of videos when an
exception occurs on the video image. If a user has subscribed to this alarm,
the eSpace IVS system sends the alarm to the user. The user can view
snapshot thumbnails to check the camera faults.
5.4 Behavior Analysis
eSpace IVS can analyze a wide range of object behaviors to efficiently detect exceptions in
various scenarios.
5.4.1 Intrusion Detection
eSpace IVS automatically generates an alarm when a person enters a specified surveillance
area.
Customer Benefits
Intrusion detection offers 24-hour video surveillance over surveillance areas and generates
alarms when detecting any intrusion behavior. As a result, labor costs are reduced and video
analysis efficiency is improved.
Scenario
An eSpace IVS system is installed in a railway station. Jason, an employee in the railway
station, creates an intrusion detection rule and a surveillance plan in a specified surveillance
area. One day, eSpace IVS detects that a passenger moved to a train track and generates an
alarm. Jason verifies the incident and sends nearby security guards to the scene.
Features
Table 5-6 describes the intrusion detection features.
Table 5-6 Intrusion detection features
Type
Feature
Unique
features
Detects intrusions in a specified surveillance area.
Basic
features
Allows users to set detection rules and surveillance plans.
Issue 01 (2012-07-31)
Supports intelligent analysis on live and recorded videos.
Allows users to add, modify, view, and delete detection rules or
surveillance plans.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
30
eSpace IVS
Product Description
5 Service Features
Type
Feature
Allows users to enable or disable an intelligent video analysis plan.
Allows users to specify surveillance areas (rectangular or polygonal) and
areas that can be ignored.
When a person enters a specified surveillance area, the eSpace IVS system
automatically generates an alarm and takes snapshots. If a user has
subscribed to this alarm, the eSpace IVS system sends the alarm to the user.
The user can view snapshot thumbnails to verify the incident.
Detects and identifies multiple objects that suddenly enter a specified
surveillance area.
Prevents complicated external environments, such as low-illumination and
flashing background, from affecting the video image quality.
5.4.2 Abandoned Object Detection
eSpace IVS automatically generates an alarm when an object is abandoned in a specified
surveillance area.
Customer Benefits
Abandoned object detection offers 24-hour video surveillance over surveillance areas and
generates alarms when detecting any abandoned object. As a result, labor costs are reduced
and video analysis efficiency is improved.
Scenario
An eSpace IVS system is installed in a railway station. Jason, an employee in the railway
station, creates an abandoned object detection rule and a surveillance plan in a specified
surveillance area. One day, eSpace IVS detects that a suitcase has been abandoned in the
surveillance area and generates an alarm. Jason verifies the incident and sends nearby security
guards to the scene.
Features
Table 5-7 describes the abandoned object detection features.
Table 5-7 Abandoned object detection features
Type
Feature
Unique
features
Detects objects that have been abandoned in a specified surveillance area.
Basic
features
Allows users to set detection rules and surveillance plans.
Issue 01 (2012-07-31)
Supports intelligent analysis on live and recorded videos.
Allows users to add, modify, view, and delete detection rules or
surveillance plans.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
31
eSpace IVS
Product Description
5 Service Features
Type
Feature
Allows users to enable or disable an intelligent video analysis plan.
Allows users to specify surveillance areas (rectangular or polygonal) and
areas that can be ignored.
When an object is abandoned in a specified surveillance area, the eSpace
IVS system automatically generates an alarm and takes snapshots. If a user
has subscribed to this alarm, the eSpace IVS system sends the alarm to the
user. The user can view snapshot thumbnails to verify the incident.
Detects and identifies multiple objects that have been abandoned in a
specified surveillance area.
Prevents complicated external environments, such as low-illumination and
flashing background, from affecting the video image quality.
5.4.3 Removed Object Detection
eSpace IVS automatically generates an alarm when an object is removed from a specified
surveillance area.
Customer Benefits
Removed object detection offers 24-hour video surveillance over surveillance areas and
generates alarms when a specified object is removed. As a result, labor costs are reduced and
video analysis efficiency is improved.
Scenario
An eSpace IVS system is installed in a museum. Jason, an employee in the museum, creates a
removed object detection rule and a surveillance plan for antique A in a specified surveillance
area. One day, eSpace IVS detects that antique A has been removed from the surveillance area
and generates an alarm. Jason verifies the incident and sends nearby security guards to the
scene.
Features
Table 5-8 describes the removed object detection features.
Table 5-8 Removed object detection features
Type
Feature
Unique
features
Detects objects that have been removed from a specified surveillance area.
Basic
features
Allows users to set detection rules and surveillance plans.
Issue 01 (2012-07-31)
Supports intelligent analysis on live and recorded videos.
Allows users to add, modify, view, and delete detection rules or
surveillance plans.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
32
eSpace IVS
Product Description
5 Service Features
Type
Feature
Allows users to enable or disable an intelligent video analysis plan.
Allows users to specify surveillance areas (rectangular or polygonal) and
areas that can be ignored.
Allows users to specify a time length when an object can be blocked.
When an object is removed from a specified surveillance area, the eSpace
IVS system automatically generates an alarm and takes snapshots. If a user
has subscribed to this alarm, the eSpace IVS system sends the alarm to the
user. The user can view snapshot thumbnails to verify the incident.
Detects and identifies multiple objects that have been removed from a
specified surveillance area.
Prevents complicated external environments, such as low-illumination and
flashing background, from affecting the video image quality.
5.4.4 Presence Detection
The eSpace IVS platform automatically generates an alarm when an object suddenly appears
in a specified surveillance area.
Customer Benefits

24-hour surveillance over surveillance areas where objects may suddenly appear, which
saves manpower.

Intelligent analysis of video feeds where objects may suddenly appear, which improves
video query and analysis efficiency.
Scenario
An eSpace IVS platform is installed in a bank. An employee, Jason, sets a presence detection
rule and a surveillance plan for cameras at the bank vault. One day, the eSpace IVS platform
detects a person in the bank vault and generates an alarm. Jason views alarm-triggered
snapshots to verify that someone was in fact in the vault and notifies security guards and
police.
Features
Table 5-9 describes the presence detection features.
Table 5-9 Presence detection features
Type
Feature
Unique
features
Detects objects that suddenly enter a specified surveillance area.
Basic
features
Allows users to set detection rules and surveillance plans.
Issue 01 (2012-07-31)
Supports intelligent analysis on live and recorded videos.
Allows users to add, modify, view, and delete detection rules or
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
33
eSpace IVS
Product Description
5 Service Features
Type
Feature
surveillance plans.
Allows users to enable or disable an intelligent video analysis plan.
Allows users to specify surveillance areas (rectangular or polygonal) and
areas that can be ignored.
Automatically generates an alarm and takes snapshots of videos when a
person suddenly appears in a specified surveillance area. If a user has
subscribed to this alarm, the eSpace IVS system sends the alarm to the user.
The user can view snapshot thumbnails to verify that the person has in fact
appeared in the specified surveillance area.
Detects and identifies multiple objects that suddenly appear in the specified
surveillance area.
Prevents complicated external environments, such as low-illumination and
flashing background, from affecting the video image quality.
5.4.5 Directional Movement Detection
The eSpace IVS platform automatically generates an alarm when an object moves in the
wrong direction in a specified surveillance area.
Customer Benefits

24-hour continuous surveillance over objects that move in the wrong direction in a
specified surveillance area, saving manpower.

Intelligent analysis of objects that move in the wrong direction in videos, enhancing the
video query and analysis efficiency.
Scenario
An eSpace IVS platform is installed in a traffic command center. A traffic officer, Jason, sets a
directional movement detection rule and a surveillance plan for cameras on one-way street A.
One day, the eSpace IVS platform detects that a vehicle driving in the wrong direction on A
and generates an alarm. Jason views alarm-triggered snapshots to verify that the vehicle is in
fact driving in the wrong direction and notifies the traffic police.
Features
Table 5-10 describes the directional movement detection features.
Table 5-10 Directional movement detection features
Type
Feature
Unique
features
Detects objects that move in the wrong direction in a specified surveillance
area.
Supports intelligent analysis on live and recorded videos.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
34
eSpace IVS
Product Description
5 Service Features
Type
Feature
Basic
features
Allows users to set detection rules and surveillance plans.
Allows users to add, modify, view, and delete detection rules or
surveillance plans.
Allows users to enable or disable an intelligent video analysis plan.
Allows users to specify surveillance areas (rectangular or polygonal) and
areas that can be ignored.
When an object moves in the wrong direction in a specified surveillance
area, the eSpace IVS platform automatically generates an alarm and takes
snapshots of videos. If a user has subscribed to this alarm, the eSpace IVS
system sends the alarm to the user. The user can view snapshot thumbnails
to verify that the object is moving in the wrong direction.
Detects and identifies multiple objects that move in the wrong direction in a
specified surveillance area.
Prevents complicated external environments, such as low-illumination and
flashing background, from affecting the video image quality.
5.4.6 Loitering Detection
eSpace IVS automatically generates an alarm when a person is loitering in a specified
surveillance area.
Customer Benefits
Loitering detection offers 24-hour video surveillance over surveillance areas and generates
alarms when detecting any loitering behavior. As a result, labor costs are reduced and video
analysis efficiency is improved.
Scenario
An eSpace IVS system is installed in a railway crossroad. Jason, an employee in the railway
crossroad, creates a loitering detection rule and a surveillance plan in a specified surveillance
area. One day, eSpace IVS detects that a person has been loitering in the surveillance area for
a specified length of time and generates an alarm. Jason verifies the incident and sends nearby
security guards to the scene.
Features
Table 5-11 describes the loitering detection features.
Table 5-11 Loitering detection features
Type
Feature
Unique
features
Detects persons that are loitering in a specified surveillance area.
Issue 01 (2012-07-31)
Supports intelligent analysis on live and recorded videos.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
35
eSpace IVS
Product Description
5 Service Features
Type
Feature
Basic
features
Allows users to set detection rules and surveillance plans.
Allows users to add, modify, view, and delete detection rules or
surveillance plans.
Allows users to enable or disable an intelligent video analysis plan.
Allows users to specify surveillance areas (rectangular or polygonal) and
areas that can be ignored.
Allows users to specify an acceptable loitering duration. When the loitering
duration is reached, eSpace IVS generates an alarm.
When a person is loitering in a specified surveillance area, the eSpace IVS
system automatically generates an alarm and takes snapshots. If a user has
subscribed to this alarm, the eSpace IVS system sends the alarm to the user.
The user can view snapshot thumbnails to verify the incident.
Detects and identifies multiple objects that are loitering in a specified
surveillance area.
Prevents complicated external environments, such as low-illumination and
flashing background, from affecting the video image quality.
5.4.7 Crowd Counting
eSpace IVS can count the crowd in a specified surveillance area.
Customer Benefits
eSpace IVS automatically counts the crowd in a specified surveillance area, which saves labor
costs.
Scenario
An eSpace IVS system is installed in a shopping mall. Jason, an employee in the shopping
mall, creates a crowd counting rule and a surveillance plan in a specified surveillance area. In
this case, eSpace IVS automatically counts the crowd in the specified surveillance area.
Features
Table 5-12 describes the crowd counting features.
Table 5-12 Crowd counting
Type
Feature
Unique
feature
Counts the crowd in a specified a specified surveillance area.
Basic
features
Allows users to set detection rules and surveillance plans.
Issue 01 (2012-07-31)
Allows users to add, modify, view, and delete detection rules or
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
36
eSpace IVS
Product Description
5 Service Features
Type
Feature
surveillance plans.
Allows users to enable or disable an intelligent video analysis plan.
Allows users to specify a surveillance area by drawing straight lines or
U-shaped lines.
Allows users to specify the direction of population flows to count.
5.4.8 Density Detection
The eSpace IVS system automatically generates an alarm when the crowd or vehicle density
in a specified surveillance area exceeds a preset threshold.
Customer Benefits
With the density detection function, the eSpace IVS system can automatically detect the
crowd or vehicle density, which improves work efficiency and helps users to predict potential
risks.
Scenario
An eSpace IVS system is installed in an airport. A member of the airport security staff, Jason,
sets a density detection rule and a surveillance plan for cameras at a specified surveillance
area. One day, the eSpace IVS system detects that the crowd density in the specified
surveillance area exceeds a preset threshold and generates an alarm. Jason views
alarm-triggered snapshots to verify that too many personnel are waiting in the surveillance
area and notifies related personnel so they can address the issue.
Features
Table 5-13 describes the density detection features.
Table 5-13 Density detection features
Type
Feature
Unique
features
Detects the crowd or vehicle density in a specified surveillance area.
Basic
features
Allows users to set detection rules and surveillance plans.
Supports intelligent analysis on live and recorded videos.
Allows users to add, modify, view, and delete detection rules or
surveillance plans.
Allows users to enable or disable an intelligent video analysis plan.
Allows users to specify surveillance areas (rectangular or polygonal) and
areas that can be ignored.
Allows users to set the density detection alarm threshold.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
37
eSpace IVS
Product Description
5 Service Features
Type
Feature
Automatically generates an alarm and takes snapshots of videos when the
crowd or vehicle density in a specified surveillance area exceeds a preset
threshold. If a user has subscribed to this alarm, the eSpace IVS system
sends the alarm to the user.
Prevents complicated external environments, such as low-illumination and
flashing background, from affecting the video image quality.
5.4.9 Speed Detection
The eSpace IVS system can detect the speed of an object in real time and check whether the
object exceeds the permitted speed according to the preset thresholds.
Customer Benefits
Speed detection enables users to perform the following tasks:

Check whether an object exceeds the permitted speed in a specified area in real time.

Analyze the recording to check whether an object in the recording exceeds the permitted
speed.
Scenario
An eSpace IVS system has been installed in a highway surveillance center, and Jason (an
employee in the surveillance center) has set the speed detection rules and surveillance plans.
When a vehicle exceeds the permitted speed in the surveillance area, the eSpace IVS system
automatically generates an alarm.
Features
Table 5-14 describes the speed detection features.
Table 5-14 Speed detection features
Type
Feature
Unique
features
Speed detection
Detects vehicles that exceed the permitted speed in a specified surveillance
area.
Supports intelligent analysis on live and recorded videos.
Basic
features
Plan and rule setting
Allows users to set detection rules and surveillance plans.
Allows users to add, modify, view, and delete detection rules or
surveillance plans.
Allows users to enable or disable an intelligent video analysis plan.
Allows users to specify surveillance areas and areas to be ignored. The
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
38
eSpace IVS
Product Description
5 Service Features
Type
Feature
shape of a surveillance area can be rectangular or polygonal.
Allows users to set the minimum and maximum time within which a
vehicle is allowed to pass through the specified area.
Allows users to set the vehicle passing direction to be monitored, for
example, from area A to area B or from area B to area A.
Alarming and snapshot:
When an object exceeds the permitted speed in a specified surveillance
area, the eSpace IVS system automatically generates an alarm and takes
snapshots. If a user has subscribed to this alarm, the eSpace IVS system
sends the alarm to the user.
Allows users to monitor multiple objects at the same time. The eSpace IVS
system can identify and differentiate between objects exceeding the
permitted speed.
Prevents complicated external environments, such as low-illumination and
flashing background, from affecting the video image quality.
5.5 Facial Recognition
The eSpace IVS platform can automatically identify faces detected in a surveillance area.
5.5.1 Facial Image Library Management
The eSpace IVS system allows users to manage the facial image library, including registering,
changing, deleting, and querying facial image information.
Customer Benefits
Users can efficiently manage the facial image library.
Scenario
An eSpace IVS system has been installed in a public security department. Jason is responsible
for maintaining the facial image library. At early stages, Jason imports facial image
information into the library in batches. When a new member comes, Jason registers the new
member's facial information into the library.
Features
The eSpace IVS system supports the following facial image library management features:

Defines different facial image libraries, such as facial image libraries for permanent
residents, wanted fugitives, and VIPs.

Collects facial images through a specified camera and registers these collected facial
images in the library.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
39
eSpace IVS
Product Description
5 Service Features

Registers facial images in the library one by one or in batches.

Queries information about a registered person by the person's facial image ID or name.

Modifies facial image information.

Deletes facial image information.

Moves a facial image from one library type to another (for example, from permanent
resident library to wanted fugitive library).
5.5.2 Facial Image Retrieval
The eSpace IVS system allows users to search specified facial image libraries for persons
with similar faces after specifying a facial picture.
Customer Benefits
Users can search a facial image library for persons with similar faces after specifying a facial
picture, and query detailed information about these persons.
Scenario
An eSpace IVS system has been installed in a public security department. Jason is a police
alarm operator working at the public security department. One day, Jason was alerted of a
suspect wanted in connection with a crime. The person who reported this police alarm also
submitted a picture of the suspect to Jason. Based on this picture, Jason searched the facial
image library and found ten possible suspects. After checking their detailed information,
Jason finally determined two most suspicious persons.
Features
The eSpace IVS system supports the following facial image retrieval features:

Search for facial picture match

Search by facial features and similarities

Search in one or more facial libraries or even all libraries
5.5.3 Facial Image Capturing
The eSpace IVS system captures facial images with snapshots and automatically generates an
alarm.
Customer Benefits
Users can use the eSpace IVS system to capture facial images in the surveillance area. The
captured facial images can be used for post-event evidence collection.
Scenario
An eSpace IVS system has been installed for a bank's vaults. Jason, a bank employee, has set
facial image capturing rules and surveillance plans for a surveillance area. Once a person
enters the surveillance area, the eSpace IVS system automatically captures the person's facial
image and generates an alarm. One day, Jason saw a facial image capturing alarm and
immediately verified the captured pictures, finding that someone had entered the vaults.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
40
eSpace IVS
Product Description
5 Service Features
Features
The eSpace IVS system supports the following facial image capturing features:

Supports facial detection.

Allows users to set detection rules and surveillance plans.

Allows users to add, modify, view, and delete detection rules.

Allows users to enable or disable an intelligent video analysis plan.

Supports alarm and snapshot functions. When a person enters a specified surveillance
area, the eSpace IVS system automatically generates an alarm and takes snapshots. If a
user has subscribed to this alarm, the eSpace IVS system sends the alarm to the user.
5.5.4 Facial Recognition Monitoring
The eSpace IVS system detects facial image information and compares the information with
that in a specified facial image library. If a similar face is found, the eSpace IVS system
automatically generates an alarm.
Customer Benefits
Facial recognition monitoring has the following benefits:

The eSpace IVS system automatically recognizes key persons, such as wanted fugitives
and suspects, in the surveillance area.

Users can use the facial recognition monitoring function to analyze videos and quickly
find whether faces similar to those in the facial image library exist in the videos. The
monitoring function enhances the efficiency of video query and analysis.
Scenario
An eSpace IVS system has been installed in a public security department. Jason, an employee
of the public security department, has set facial recognition monitoring rules and surveillance
plans for a surveillance area. One day, Jason saw a facial recognition alarm. He immediately
verified the captured pictures against the facial image library, finding that someone in the
surveillance area is similar to a suspect. Then, Jason immediately reported this situation to
relevant departments.
Features
The eSpace IVS system supports the following facial recognition monitoring features:

Supports facial detection.

Compares the detected facial information with that in a specified facial image library to
find similar faces.

Allows users to set detection rules and surveillance plans.

Allows users to add, modify, view, and delete detection rules or surveillance plans.

Allows users to enable or disable an intelligent video analysis plan.

Supports alarm and snapshot functions. When detecting a facial image in the surveillance
area, the eSpace IVS system captures the facial image and compares it with that in the
facial image library. If similar faces are found, the eSpace IVS system generates an alarm
and takes snapshots accordingly. If a user has subscribed to this alarm, the eSpace IVS
system sends the alarm to the user.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
41
eSpace IVS
Product Description
5 Service Features
5.6 Intelligent Storage
The eSpace IVS platform provides multiple video storage modes to store valuable video files
and save storage space.
5.6.1 Frame Extraction Storage
Based on a user-defined storage policy, the eSpace IVS platform can periodically extract and
discard non-key frames of stored video files. The reduced file size saves storage space.
Customer Benefits
The ability to store video with frames extracted from the original saves storage space, which
reduces the operating expense (OPEX).
Scenario
An eSpace IVS platform is installed in a campus. A maintenance person, Jack, sets the storage
mode to frame extraction. He sets the duration for storing complete videos to 7 days and the
duration for storing frame-extracted videos to 30 days. With these settings, the eSpace IVS
platform stores a complete video for seven days. When the storage duration exceeds seven
days, the eSpace IVS platform discards non-key frames of the video. When the duration for
storing the frame-extracted video exceeds 30 days, the video is deleted.
Features
The frame extraction function has the following features:

Only videos stored on the eSpace IVS platform can be stored in frame extraction mode.

The storage space can be allocated by storage duration or storage capacity.
−
If the storage space is allocated by duration, the eSpace IVS platform stores complete
videos for a preset period. When the storage duration exceeds the preset period, the
eSpace IVS platform discards non-key frames of the videos and saves the
frame-extracted videos for another specified period. When the storage duration
exceeds that period, the videos are deleted.
−
When the storage space is allocated by storage capacity, the eSpace IVS platform first
stores complete videos. When the remaining storage capacity reaches a specified
value, the eSpace IVS platform discards non-key frames of the earliest videos.
5.6.2 Data Buffering
When cameras are disconnected from the network, the cameras can continue to shoot and
temporarily store the videos in the SD cards. When the network is restored, the eSpace IVS
platform sends a video request to the cameras. The cameras send the videos stored in the SD
cards to the eSpace IVS platform.
Customer Benefits
Uses can obtain complete surveillance videos when cameras are disconnected from the
network.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
42
eSpace IVS
Product Description
5 Service Features
Scenario
An eSpace IVS system is installed on a campus. An employee, Jason, sets a recording plan for
cameras with SD cards that are installed at the campus gateway. One day, the cameras at the
campus gateway are disconnected from the network. The cameras continue to shoot videos
and store the videos in the SD cards. When the network is restored, the eSpace IVS platform
automatically uploads to the server the videos that were temporarily stored in the camera SD
cards.
Features
The data buffering function has the following features:

Only cameras with SD cards can temporarily store videos.

The real-time video stream transmission is not affected when cameras send videos
temporarily stored in SD cards to the eSpace IVS platform.
5.6.3 Video Archiving
The eSpace IVS system allows users to archive important alarm videos based on the preset
storage policies.
Customer Benefits
Video archiving has the following benefits:

The archive saves storage space and reduces operating expense (OPEX).

Archived videos contain valuable video clips that may be used in the future.
Scenario
An eSpace IVS system has been installed on a campus, The system maintenance administrator,
Jack, has set the following video archiving parameters:

Full storage period: 7 days

Alarm video storage period: 30 days

Key frame storage period: 100 days

Pre-alarm and post-alarm recording durations: 6s each
After these parameters are set, the eSpace IVS system saves the recent 7 days of complete
videos and intelligently deletes most of the previous 30 days' videos except for alarm videos
and 6s pre-alarm and post-alarm videos. When video files are more than 37 days old, the
eSpace IVS system discards non-key frames and archives alarm videos left after frame discard.
The eSpace IVS saves key-frame videos for a total of 137 days.
Features
The eSpace IVS system supports the following video archive features:

Supports video archival for platform recordings that are configured with motion
detection alarms.

Supports video archival either using the storage length mode or the storage capacity
mode.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
43
eSpace IVS
Product Description
5 Service Features
−
When the video archival is defined by length, users can set a full storage period,
alarm video storage period, key frame storage period, and pre-alarm and post-alarm
recording duration. The eSpace IVS system stores complete video files for the full
storage period. When the full storage period expires, the eSpace IVS system
intelligently deletes videos in the alarm video storage period and retains motion
detection alarm videos. Alarm videos retain videos recorded within the specified
pre-alarm and post-alarm durations. When the alarm video storage period expires, the
eSpace IVS system begins discarding non-key frames in the key frame storage period
and saves the alarm videos left after frame discard. When the key frame storage
period expires, the videos are completely deleted.
−
When the video archival is defined by storage capacity, the eSpace IVS system
performs full storage first. When the storage volume reaches a certain capacity level,
the eSpace IVS system intelligently deletes the earliest videos based on motion
detection alarm policies and retains motion detection alarm videos. When the storage
volume reaches a certain capacity level again, the eSpace IVS system starts
discarding non-key frames and saves alarm videos left after frame discard.
5.7 Mobile Surveillance
Users can perform live video surveillance, record videos, and take snapshots with mobile
terminals. Recorded videos and captured snapshots can be stored on a local computer or the
eSpace IVS platform.
Customer Benefits

Live video surveillance at any time, any place, enhances the surveillance efficiency.

Surveillance without blind spots enhances the surveillance effectiveness.
Scenario
An eSpace IVS platform is installed in a campus. An employee, Jason, is scheduled to work
the platform, but he cannot go into the surveillance center due to personal reasons. Jason uses
an iPad to perform live video surveillance at home.
Features
The eSpace IVS platform supports the following mobile terminals:

Smartphones, including Huawei Honor, iPhone4, iPhone4s, and other smartphones that
run Android.

Tablet computers, including Huawei MediaPad, iPad2, and new iPad.
Only cameras on Huawei MediaPad can be used to shoot videos and take snapshots remotely.
Table 5-15 describes the mobile surveillance features.
Table 5-15 Mobile surveillance features
Type
Feature
Unique
features
Allows users to use cameras on Huawei MediaPad to shoot videos and send
the videos to the eSpace IVS platform.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
44
eSpace IVS
Product Description
5 Service Features
Type
Feature
Basic
features
Allows users to search for cameras by keyword or organization structure,
browse live videos, and add frequently-used cameras to a favorites folder.
Allows users to search by time or bookmark for videos recorded on the
platform and play back the videos.
Allows users to view alarm-triggered videos and acknowledge or cancel
alarms.
Allows users to take snapshots during live video browsing or video
playback and manage snapshots.
5.8 Alarm Services
When a Peripheral Unit (PU) generates an alarm, the eSpace IVS platform automatically
displays live videos from the linked cameras based on a preset alarm linkage rule, notifies
users of the alarm in multiple ways, and displays alarm handling suggestions.
Customer Benefits
When an alarm is generated, the eSpace IVS responds based on the preset alarm linkage rule,
such as recording videos and taking snapshots, which helps users handle the alarm in a timely
manner.
Scenario
An eSpace IVS platform is installed in a bank. An employee, Jason, sets an intrusion detection
rule for cameras at a bank vault and an alarm linkage rule. One day, the eSpace IVS platform
detects that a suspected person has entered the bank vault, generates an alarm, and invokes a
linked camera to record videos.
Features
Table 5-16 describes the alarm service features.
Table 5-16 Alarm service features
Type
Feature
Unique
features
Automatically performs the following actions when an alarm is triggered:
recording videos, taking snapshots, invoking presets, providing Boolean
value output, displaying videos on clients or video walls, and linking Short
Message Service (SMS) and Multimedia Messaging service (MMS).
Notifies users of alarms in various ways, including displaying a window,
playing alarm sound, blinking alarm information, and blinking
alarm-triggered videos. An alarm audio file is in .wav format and must be
less than 10 MB.
Basic
Issue 01 (2012-07-31)
Allows users to set modes for executing alarm linkage actions. The
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
45
eSpace IVS
Product Description
5 Service Features
Type
Feature
features
execution modes include instant execution, execution after
acknowledgement, and delayed execution.
Allows users to enable the function to block an alarm window all the time
or the function to block an alarm window only in full-screen mode.
Allows users to set a video pane as an alarm window. Alarm-triggered
videos can be played only in alarm windows. Other static alarm windows
cannot be used to play live videos.
Allows users to play alarm-triggered videos in the last alarm window one
by one or in all alarm windows in sequence if the number of
alarm-triggered videos exceeds the number of open alarm windows.
Allows users to set alarm types and alarm severities.
Allows users to set the alarm acknowledgement modes, including automatic
acknowledgement, manual acknowledgement, and delayed
acknowledgement.
Allows the administrator to specify types of alarm source devices and alarm
severities that users can subscribe to.
Allows users to query historical alarms.
Allows users to acknowledge and cancel alarms.
Allows the administrator to grant alarm handling permissions to users.
Offers users alarm handling suggestions.
Allows users to preview snapshots.
Automatically generates an alarm when a digital watermark in a video is
tampered.
Regards alarms of the same type reported by the same alarm source within a
specified duration as one alarm and records the number of the repeated
alarms.
Provides an alarm help document for an alarm or an alarm group. When an
alarm is generated, users can open the help document to obtain alarm
handling suggestions.
Supports protection zone management that provides the following features:
Issue 01 (2012-07-31)

Allows users to create and configure protection zones.

Allows users to manually deploy or withdraw alarms in protection
zones.

Deploys or withdraws alarms in protection zones at a specified interval.

Reports an alarm when alarm deployment changes.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
46
eSpace IVS
Product Description
5 Service Features
5.9 Voice Intercom and Voice Broadcast
If a PU and CU are configured with speakers and microphones, a user can enable the voice
intercom or broadcast function.
5.9.1 Voice Intercom
With the voice intercom function, users on the CU side can talk with users at the surveillance
sites.
Customer Benefits

Improves the communication efficiency and enhances emergency preparedness and
response capabilities.

Provides voice transmission services for users without wireless voice communication
equipment.

Reduces the costs of constructing a dedicated broadcast system.
Scenario
An eSpace IVS system is installed on a campus. One day, an employee, Jason, found that an
object was blocking a camera at the campus gateway. Jason used the voice intercom function
to talk with Jack, a security guard at the gateway. Jack checked the camera and removed the
object.
Features
The voice intercom function has the following features:

Supports G.711 audio encoding format.

Supports bidirectional voice intercom.

Supports volume adjustment during voice intercom.

Transmits voice streams over the IP network.
5.9.2 Voice Broadcast
With the voice broadcast function, users on the CU side can broadcast to PUs at surveillance
sites.
Customer Benefits

Improves the communication efficiency and enhances emergency preparedness and
response capabilities.

Reduces the costs of constructing a dedicated broadcast system.
Scenario
An eSpace IVS platform is installed in a railway station. An employee, Jason, wants to
broadcast prerecorded security precautions to the ticket office. Jason uses the voice broadcast
function to add all PUs in the ticket office to a broadcast group and play an audio file in .wav
format.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
47
eSpace IVS
Product Description
5 Service Features
Features
The voice broadcast function has the following features:

Supports G.711 audio encoding format.

Supports real-time voice broadcast.

Allows users on the CU side to broadcast to multiple PUs.

Allows users to manage broadcast groups made up of PUs.

Allows users to manage audio files that can be broadcast.
5.10 Electronic Map
Users can query surveillance sites and alarm sources on electronic maps. When an alarm
occurs, a user can quickly locate the alarm source, view surrounding situations, find an
appropriate surveillance camera, and browse live videos.
Customer Benefits
Users can quickly locate an alarm and browse alarm-triggered videos on electronic maps,
which enhances the alarm handling efficiency.
Scenario
An eSpace IVS platform is installed in a traffic command center. A traffic officer, Jason,
imports a map of City A into the eSpace IVS platform and adds camera icons to the map
where cameras are located. One day, a traffic accident happens on Road B. The eSpace IVS
platform displays a blinking alarm icon on the map. Jason views the alarm and invokes the
live surveillance video of Road B.
Features
Table 5-17 describes the electronic map features.
Table 5-17 Electronic map features
Type
Feature
Unique
features
Blinks alarms on the map even when the alarm layer is hidden.
Basic
features
Allows users to zoom in and out on a map in a box-shaped area or by
scrolling the mouse wheel, drag and move the map, view the map in
full-screen or eagle-eye mode, pan up, down, left, and right, and control the
map scale.
Allows users to import map images in .jpg, .png, and .bmp formats, name
and delete imported maps, and set a map as the default map for the next
login.
Allows users to switch between maps, while cameras and alarm sources
remain correctly marked on each map.
Allows users to select a surveillance site or alarm source from the
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
48
eSpace IVS
Product Description
5 Service Features
Type
Feature
organization tree and mark it on the map.
Allows users to create a hotspot on a map and bind it to other maps.
Allows users to create hotspot maps to quickly switch to desired maps.
Allows users to display or hide map layers, including an alarm source layer
and a camera layer.
Allows users to click a surveillance site on the map and enable live video
browsing in the displayed window.
Allows users to bookmark key areas on maps to quickly locate the key areas
at next login, name and delete a bookmark, and change the position of the
bookmark.
5.11 Media Security
The eSpace IVS system provides a digital watermark and secure media transmission to ensure
the reliability and security of video files.
5.11.1 Digital Watermark
Users can enable the watermark function for a specified camera in the eSpace IVS system and
check the added watermarks on the eSpace IVS client. The watermark function can prevent
videos from being forged, tampered with, repudiated, or copied to some extent.
Customer Benefits
The watermark check ensures video reliability.
Scenario
An eSpace IVS system has been installed in a city for the safe city project. One day, Tom (an
employee in the legal affairs department) asked Jason (an administrator who has the
watermark check and management right) to check the validity of the video file recorded by
camera A between 00:00 and 08:00 on May 20, 2012. Jason logged in to the eSpace IVS client,
enabled watermark check for camera A, and found the desired video file by specifying the
time segment. Jason dragged the video file to the video pane for watermark checking. When it
detected watermark tampering, the eSpace IVS system automatically generated an alarm
record in the alarm window and displayed an alarm notification.
Features
The eSpace IVS system supports the following digital watermark features:

Adds digital signatures or watermarks to the videos of specified cameras.

Verifies watermarks on the videos.

Generates an alarm in real time when a watermark is tampered.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
49
eSpace IVS
Product Description

5 Service Features
Provides query capability for historical alarms generated during watermark check.
5.11.2 Secure Media Transmission
The eSpace IVS system takes certain security measures on videos to be transmitted.
Customer Benefits
Video security is ensured during transmission.
Scenario
An eSpace IVS system and cameras that support secure media transmission have been
installed in some key surveillance points in a safe city project. After initializing the cameras,
Jason (an administrator) enabled secure media transmission. Jim (a hacker) captured the
transmitted code streams but failed to play the video because he could not crack the algorithm
and key information.
Features
The eSpace IVS system supports the following secure media transmission features:

The platform takes security measures on encoded video data before transmitting the data.

The server restores and saves the videos.

The server takes the security measures on the videos requested by users before
transmitting the videos.

The client restores and plays the videos.
5.12 System Management
The eSpace IVS platform supports user management, device management, multi-level
management, multi-domain management, log management, and system maintenance.
5.12.1 User Management
With the eSpace IVS platform, the administrator can manage users in a centralized manner.
Customer Benefits

The administrator can assign multiple roles with different rights to a user.

The administrator can manage roles, which improves the efficiency of managing user
rights.
Scenario
Jason is the administrator of the eSpace IVS platform installed in a campus. Jason adds a new
employee, Mary, to the platform and assigns common user roles to Mary.
Features
Table 5-18 describes the user management features.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
50
eSpace IVS
Product Description
5 Service Features
Table 5-18 User management features
Type
Feature
Unique
features
Allows the administrator to assign multiple roles with different rights to a
user, which facilitates user rights management.
Basic
features
Allows the administrator to add, modify, and delete users.
Allows the administrator to add, modify, and delete roles.
5.12.2 PU Management
The eSpace IVS platform allows users to manage PUs that are connected to the platform. PUs
include IP cameras (IPCs), Digital Video Recorders (DVRs), and Digital Video Servers
(DVSs).
Customer Benefits

Users can manage PUs in a centralized manner.

User can add and configure PUs in batches, which enhances the efficiency of device
configuration.

Users can allocate PUs to organizations and bind the organizations to service nodes,
which maximizes the device usage.
Scenario
Jason is the administrator of the eSpace IVS platform installed in a campus. Jason can manage
PUs on a client.
Features
Table 5-19 describes the PU management features.
Table 5-19 PU management features
Type
Feature
Unique
features
Allows users to use a Microsoft Excel template to add multiple PUs at a
time to the eSpace IVS platform.
Automatically allocates IP addresses to PUs by enabling the Dynamic Host
Configuration Protocol (DHCP) service.
Basic
features
Allows the administrator to add and delete devices and set device
parameters.
Allows users to allocate PUs to organizations and bind the organizations to
service nodes when only a small number of Media Units (MUs) or Device
Connection Gateways (DCGs) exist. Service nodes include media service
nodes and service access nodes. An organization can be bound to a
maximum of two types of service nodes.
Allows users to upload upgrade files and remotely upgrade PUs in batches
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
51
eSpace IVS
Product Description
5 Service Features
Type
Feature
on clients.
Allows users to allocate devices (under external or local domains) and
organizations (under external domains) in batches and cancel device
allocation in batches.
5.12.3 Multi-Level Management
The eSpace IVS platform allows users to manage organizations by level.
Customer Benefits

Decreases the data transmission distance, improves the device usage, and ensures that
other organization nodes are running properly when one node is faulty.

Helps users to better manage a large-scale eSpace IVS platform.
Scenario
An eSpace IVS platform is installed in the public security departments of a city, a district, and
a county. Users at the city level can manage all surveillance areas. Users at the district or
county level can manage surveillance areas within their permissions and report device status
to users at the city level.
Features
Table 5-20 describes the multi-level management features.
Table 5-20 Multi-level management features
Type
Feature
Unique
features
Allows the administrator to add, modify, and delete organization nodes and
bind or unbind organization nodes.
Basic
features
Manages surveillance devices by level.
Manages user rights by level.
Allows upper-level users to view surveillance videos of lower-level users.
Allows lower-level users to report device status to upper-level users.
5.12.4 Multi-Domain Management
Domains include local domains and external domains. A local domain is an eSpace IVS
platform. An external domain can be an eSpace IVS platform or a third-party surveillance
platform. Users with domain management rights can configure local domains to connect to
external domains.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
52
eSpace IVS
Product Description
5 Service Features
Customer Benefits

Lightens the service management load on the central platform, separates domains from
each other, and improves the management efficiency.

Helps users to better manage a large-scale eSpace IVS platform.
Scenario
An eSpace IVS platform is installed in the public security departments of City A and City B.
Users in the public security department of City A can view the surveillance videos of the
public security department of City B. However, when the eSpace IVS platform in City A is
faulty, the eSpace IVS platform in City B is not affected.
Features
Table 5-21 describes the multi-domain management features.
Table 5-21 Multi-domain management features
Type
Feature
Unique
features
Allows users under the local domain to use external domain services, such
as live video browsing, PTZ control, video playback, and alarm reporting.
Basic
features
Managing organizations:
Manages surveillance devices and user rights by domain.
Allocating devices and organizations under external domains:

Allows users to allocate devices under an external domain to the local
domain.

Allows users to allocate shared organizations under an external domain
to the local domain.

Allows users to cancel the device or organization allocation.
5.12.5 Log Management
Users can query operation logs and PU logs.
Customer Benefits
Users can view operation logs to monitor operators.
Users can also view run logs to monitor the running status of the eSpace IVS platform.
Scenario
An eSpace IVS platform is installed in a campus. As the supervisor, Jason views operation
logs on a client to monitor employees.
Features
With the log management function, users can:
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
53
eSpace IVS
Product Description
5 Service Features

Record, query, filter, sort, and export operation logs.

Record, query, and export run logs.

Query logs by camera name, log type, and time.
5.12.6 System Maintenance
The eSpace IVS system allows users to configure parameters for and manage service servers
in the system.
Customer Benefits
The eSpace IVS system provides GUIs for configuration and management of server
parameters to help users efficiently manage the system.
Scenario
An eSpace IVS system is installed on a campus. Jason is the administrator of the eSpace IVS
system. Jason uses the client to uniformly configure and manage parameters for servers in the
system.
Features
The eSpace IVS system supports the following system maintenance features:

Classifies server parameters and queries them in fuzzy mode.

Modifies server parameters uniformly.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
54
eSpace IVS
Product Description
6 Reliability and Security
6
Reliability and Security
About This Chapter
The eSpace IVS platform features high reliability and security.
6.1 Reliability
The eSpace IVS platform uses various technologies to ensure network, host, application, and
service reliability.
6.2 Security
To ensure the system security, the security maintenance on the eSpace IVS system is
conducted at different layers, and each layer has a security solution.
6.1 Reliability
The eSpace IVS platform uses various technologies to ensure network, host, application, and
service reliability.
6.1.1 Network Reliability
The eSpace IVS system uses various redundancy approaches to ensure comprehensive system
reliability.
Customer Benefits
The eSpace IVS system provides a highly reliable network for users. Upon detecting a
component failure, the system automatically switches services to the available component.
Scenario
An eSpace IVS system has been installed in a traffic surveillance center, and the management
unit of the eSpace IVS system is deployed in two-node cluster mode. One day, the active host
housing the management unit became faulty. Thirty seconds later, the standby host detected
the active host failure and automatically took over the services.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
55
eSpace IVS
Product Description
6 Reliability and Security
Implementation Mechanism
Table 6-1 describes the implementation mechanism of network reliability.
Table 6-1 Implementation mechanism of network reliability
Implement
ation
Mechanis
m
Description
Networking
redundancy
Involves network redundancy and host redundancy:

Network redundancy
All network devices (such as routers and firewalls) have a backup. A
heartbeat mechanism is used between routers. When the active router
fails, all hosts automatically switch to the standby router.

Host redundancy
All hosts are deployed in two-node cluster mode. A heartbeat
mechanism is used between two hosts. When the active host fails, the
standby host takes over services automatically.
Data
synchronizat
ion
In two-node cluster mode, files and databases on an active host need to be
synchronized to the standby host. The eSpace IVS system supports two data
synchronization schemes:

High reliability scheme with a mounted disk array
When a disk array is mounted, the eSpace IVS system stores the data in
the disk array, and such data does not need to be synchronized to the
standby host. When the standby host takes over services of the active
host, the disk array is automatically mounted to the standby host (that is,
the new active host).

Less high reliability scheme without a mounted disk array
When no disk array is mounted, the active and standby hosts of the
eSpace IVS system synchronize data in milliseconds.
6.1.2 Host Reliability
A single host uses redundancy design for its components, such as the network adapter and
hard disk, to ensure its reliability.
Customer Benefits
The reliability of a single host is improved. The failure of a single component does not affect
the system operation.
Scenario
An eSpace IVS system has been installed in a traffic surveillance center. One day, the host
that houses the management unit encountered a hard disk failure, but the system continued to
run properly because the hard disk had a backup.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
56
eSpace IVS
Product Description
6 Reliability and Security
Implementation Mechanism
Table 6-2 describes the implementation mechanism of host reliability.
Table 6-2 Implementation mechanism of host reliability
Implement
ation
Mechanis
m
Description
Component
redundancy
Component redundancy is deployed as follows:
Host
monitoring

Two network adapters are configured. When the active network adapter
fails, the standby network adapter automatically takes over the services.

Two hard disks are configured, and they are mirrored in Redundant
Array of Independent Disks 1 (RAID 1) mode. The failure of one hard
disk does not affect data reading or writing.
The host operating system is monitored, and thresholds for monitored items
are set. The monitored items include disk usage, CPU usage, memory
usage, and I/O status. When a monitored item exceeds the preset threshold
(for example, the disk usage reaches 95%), an alarm is generated,
prompting users to handle the alarm in time. If an alarm for disk usage is
generated, users can delete unnecessary files or add a hard disk.
6.1.3 Application Software Reliability
The eSpace IVS system ensures the reliability of application software by software
programming.
Customer Benefits
Application software reliability has the following benefits:

The application software can automatically recover from a fault (for example, massive
access, memory access violation, or other exceptions), improving the running reliability
of a single host.

A notification is sent to users when an application software fault needs manual
processing.
Scenario
An eSpace IVS system has been installed in a traffic surveillance center. One day, the eSpace
IVS system was attacked by massive malicious access. When detecting this attack, the eSpace
IVS software automatically denied the excess access traffic, ensuring the proper running of
the eSpace IVS system.
Implementation Mechanism
Table 6-3 describes the implementation mechanism of application software reliability.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
57
eSpace IVS
Product Description
6 Reliability and Security
Table 6-3 Implementation mechanism of application software reliability
Implement
ation
Mechanis
m
Description
Traffic
control

The maximum number of live videos and the maximum number of
video recordings are preset on the media server according to the server's
performance. When the number of video requests exceeds the preset
maximum, the media server rejects additional requests, ensuring its
stable running.

The maximum number of concurrent requests is preset on the
management server according to the server's performance. When the
number of concurrent requests exceeds the preset maximum, the
management server rejects additional requests, ensuring its stable
running.

The application software automatically starts upon system startup.

The monitoring program monitors the application software status. Upon
detecting that the software is not found or does not respond, the
monitoring program automatically restarts the software.

An alarm is generated and sent to the eSpace IVS client when the
application software encounters any exception. Users then can handle
the fault in time.

Some application software alarms can be automatically cleared. The
application software periodically detects whether an alarm is cleared.
Upon detecting that an alarm has cleared, the application software
generates a clear alarm, with no need for manual confirmation.

Periodic database backup and recovery
Application
software
monitoring
Backup and
recovery
When the database encounters an exception (for example, file damage),
users can restore the latest backup data, mitigating data loss.

Log compression and backup
When disk space occupied by log files reaches the preset maximum, the
system automatically compresses and saves the earliest logs. When the
size of the saved log files exceeds the preset threshold, the system
automatically deletes the earliest files.
6.1.4 Service Reliability
After the eSpace IVS system recovers from a fault, its services automatically restore.
Customer Benefits
Service reliability has the following benefits:

Ensures that services are stable.

Complies with the operation habits of users.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
58
eSpace IVS
Product Description
6 Reliability and Security
Scenario
An eSpace IVS system has been installed in a traffic surveillance center. One day, Jason (an
employee in the surveillance center) checked camera A in a video wall and found that it
suddenly went offline due to a network connectivity issue. Under such circumstances, Jason
did not need to take any further action because the eSpace IVS system would automatically
restore this camera after detecting that the network connectivity for camera A recovered.
Implementation Mechanism
The eSpace IVS system restores the video playing of a camera after the camera recovers from
a network connectivity issue, power outage, and other faults.
6.2 Security
To ensure the system security, the security maintenance on the eSpace IVS system is
conducted at different layers, and each layer has a security solution.
The eSpace IVS system is divided into the following layers:

Application layer

System layer

Network layer

Management layer
6.2.1 Security Solution at the Application Layer
To secure data transmission, exchange, storage, and processing, the eSpace IVS platform
provides the following measures:

Authenticates user login by means of Hypertext Transfer Protocol Secure (HTTPS).

Empowers users to set strong passwords.

Encrypts all passwords.

Prevents user accounts and passwords from being cracked (an account will be locked if a
user fails to log in for three consecutive times).

Authenticates all service requests.

Transmits sensitive data, such as user passwords, through HTTPS channels or in key
negotiation mode.

Records security events and operation events in logs.

Authenticates all access modes.

Illustrates all communication ports in the communication matrix.
6.2.2 Security Solution at the System Layer
The eSpace IVS platform provides various measures to secure the operating system, database,
middleware, and Web or Secure File Transfer Protocol (SFTP) servers.
System layer security includes the following solutions:

Overall system security solution

Operating system security solution
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
59
eSpace IVS
Product Description
6 Reliability and Security

Database security solution

Web server security solution
Overall System Security Solution
Users can install the Web server, database server, and Domain Name Server (DNS) on
different servers.
Operating System Security Solution


Antivirus solution
−
Uses OfficeScan to guard the Windows operating system against virus attacks.
−
Uses ServerProtect to guard the SuSE Linux operating system against virus attacks.
Security hardening solution
−
Uses SetWin to harden the Windows operating system.
−
Uses Huawei-developed Breeze MainAst to harden the SuSE Linux operating system.
Database Security Solution
Uses secure PostgreSQL and Oracle databases of the mainstream version and hardens the
databases.
Web Server Security Solution
Hardens the Web server and complies with a series of security regulations for developing web
applications.
6.2.3 Security Solution at the Network Layer
The eSpace IVS platform provides the following measures to ensure network layer security.

Network topology security design: Virtual Local Area Network (VLAN) division,
distributed deployment, security device deployment

Network device hardening

Network isolation: network segment isolation, switched network, and VLAN

Network border protection: firewall technologies, such as packet filtering, application
gateway, and firewall status check

Network security detection: intrusion detection system and log auditing

Network data encryption: data encryption using Secure Shell (SSH) or Secure Sockets
Layer (SSL)

Network security scanning: active preventive mechanisms to prevent various malicious
attacks, such as scanning attacks and malformed packet attacks
6.2.4 Security Solution at the Management Layer
The eSpace IVS platform provides the following measures to ensure management layer
security:
Technical Measures
Technical measures include but are not limited to the following aspects:
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
60
eSpace IVS
Product Description
6 Reliability and Security

Allows only the administrator to delete operation, security, and run logs generated by the
eSpace IVS platform.

Uses the antivirus software, OfficeScan, to scan software and patch packages.

Verifies the integrity of software and patch packages to avoid data tampering.
Non-Technical Measures
The eSpace IVS platform provides technical support documents, such as a communication
matrix, security technology white paper, security hardening guide, and antivirus guide.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
61
eSpace IVS
Product Description
7 Operation and Maintenance
7
Operation and Maintenance
About This Chapter
The operation and maintenance meet the requirements on various scenarios such as
deployment, routine maintenance, troubleshooting, and system expansion.
7.1 Service Management System
Users can log in to eSpace IVS clients to perform routine maintenance.
7.2 eSpace NMS
The eSpace Network Management System (NMS) manages all network elements (NEs)
deployed in the eSpace IVS platform in a centralized manner. The NEs include PUs, server
software, Network Video Recorders (NVRs), eSpace IVS servers, and network devices.
7.1 Service Management System
Users can log in to eSpace IVS clients to perform routine maintenance.
Table 7-1 describes the service management systems for the two default roles: system
administrator and operator.
Table 7-1 Service management systems
Role
Service
Management
System
Description
System
administrator
and operator
C/S client
Users can log in to CUs in C/S structure to perform
the following video surveillance services:
Issue 01 (2012-07-31)

Live video browsing

Video playback

Electronic map

Video wall

Intelligent video analysis

Alarm management
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
62
eSpace IVS
Product Description
7 Operation and Maintenance
Role
Service
Management
System
B/S client
Operators
Mobile clients
Description

Video management

Snapshot management

Local parameter settings

Alternating display management

PU management

Service node management

Organization management

Role management

User management

Device allocation management

Domain management

External system management

Storage space management

Plug and play

Device upgrade

System maintenance

Log query
Users can log in to CUs in B/S structure to perform
the following video surveillance services:

Live video browsing

Video playback

Alarm management

Parameter settings
Users can use Huawei MediaPad, iPad2, new iPad,
and smartphones including Huawei Honor, iPhone4,
iPhone4s, and other smartphones that run Android to
perform the following video surveillance services:

Live video browsing

Video playback

Alarm management

Parameter settings
7.2 eSpace NMS
The eSpace Network Management System (NMS) manages all network elements (NEs)
deployed in the eSpace IVS platform in a centralized manner. The NEs include PUs, server
software, Network Video Recorders (NVRs), eSpace IVS servers, and network devices.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
63
eSpace IVS
Product Description
7 Operation and Maintenance
Figure 7-1 shows the management scope of the eSpace NMS.
Figure 7-1 Management scope
Based on the B/S structure, the eSpace NMS consists of eSpace NMS clients and eSpace
NMS servers. eSpace NMS servers can manage alarms, tracing, performance, devices, and
logs of NEs in a centralized manner and report associated information to eSpace NMS clients.
The eSpace NMS client provides a graphical user interface (GUI) for users to manage
topologies, alarms, configurations, devices, and logs.
The eSpace NMS provides the following functions:

Device access

Topology management

Alarm management

Performance management

Statistical reports

Log management

Database management
Device Access
The eSpace NMS supports the unified access of NEs, such as NVRs, IPCs, Surveillance Data
Unit (SDUs), servers, and network devices, which helps to collect and manage device alarms,
performance, and topologies in a centralized manner.
Topology Management
The eSpace NMS obtains device topology information using Uniform Operation and
Maintenance Agent (UOA), Alarm Monitor of Outsourcing System (AMOS), or Simple
Network Management Protocol (SNMP) and displays the topology information on eSpace
NMS clients. Users can perform the following operations on eSpace NMS clients:

View topologies: Allows users to view a topology that shows the links between NEs.

Query NEs in a topology view: Allows users to query basic information about NEs in a
topology view.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
64
eSpace IVS
Product Description
7 Operation and Maintenance

Edit NEs in a topology view: Allows users to add NEs, create links between NEs, and
move NEs in a topology view.

Locate NEs a topology view: Allows users to quickly locate NEs by type, content, and
search range.
A subnet is a group of devices or NEs. Lower-level subnets can be created under a subnet. Each subnet
corresponds to an organization.
Alarm Management
The eSpace NMS obtains device alarm information using UOA, AMOS, or SNMP and
provides the following functions:

Alarm collection: Collects alarms reported by PUs, eSpace IVS modules, servers,
operating system, and database.

Alarm handling: Allows users to acknowledge and clear alarms.

Alarm help: Allows users to view the help document if needed to quickly locate the fault
when an alarm is generated.

Alarm query: Allows users to query alarms by NE name, NE type, alarm severity, and
alarm generation time.

Alarm browsing: Allows users to browse the latest alarms.

Alarm acknowledgement and unacknowledgement: Allows users to acknowledge an
alarm, indicating that measures have been taken to handle the alarm, such as delivering a
trouble ticket (TT) or rectifying a fault. If a user finds that no measure has not been taken
to handle an acknowledged alarm, the user can unacknowledge the alarm, indicating that
the alarm has not been handled.

Remote alarm notification: (A short message service center (SMSC) or mail server has
been configured.) Allows users to set user information such as user name, fixed-line
phone number, email address, and mobile phone number and remote alarm notification
conditions such as alarm type and alarm severity. When an alarm occurs, the eSpace
NMS notifies users of the alarm by SMS message or email, which helps maintenance
personnel monitor alarms in real time when they are away from the equipment room.

Alarm clearance: Allows users to clear alarms when faults are rectified.
Performance Management
The eSpace NMS obtains device performance information using UOA, AMOS, or SNMP and
provides the following functions:

Collects statistics on device performance: The eSpace NMS can periodically collect key
performance data from NEs based on conditions set by users, such as the measurement
unit and statistical cycle.

Monitor device performance: The eSpace NMS displays the monitoring results in bar
charts or line charts to clearly show the performance trend. Maintenance personnel can
avoid potential risks by taking active measures before a performance counter reaches its
threshold.
Statistical Reports
The eSpace NMS can collect statistics on video surveillance device status by manufacturer,
PU type, or area, and collect statistics on device fault rate (such as SD card, hard disk, or
video diagnosis fault rate) and generate statistical reports.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
65
eSpace IVS
Product Description
7 Operation and Maintenance
Log Management
On the eSpace NMS clients, users can manage operation logs, system logs, and security logs
recorded in the eSpace NMS. By viewing the logs, maintenance personnel can quickly
analyze and locate faults.

Operation logs: record information about all operations performed by eSpace NMS users,
including user name, operation name, operation time, operation, and result.

System logs: record important events in the eSpace NMS, for example, system running
exceptions, network faults, and system attacks. With these logs, users can analyze the
system running status and rectify faults.

Security logs: record information about eSpace NMS security operations, such as server
login, password change, NE creation, and server logout.
Database Overflow Alarm Settings
Users can set the database capacity threshold in the eSpace NMS. When the size of stored
data files exceeds the preset threshold, the eSpace NMS generates an alarm, indicating a
database overflow and reminding users to back up and clear the data files.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
66
eSpace IVS
Product Description
8 Technical Specifications
8
Technical Specifications
About This Chapter
This topic describes the performance indicators and standards compliance of the eSpace IVS
system.
8.1 Performance Indicators
This topic describes the performance indicators of the eSpace IVS system.
8.2 Protocols and Standards
This topic describes the international protocols and industry standards that the IVS eSpace
system complies with.
8.1 Performance Indicators
This topic describes the performance indicators of the eSpace IVS system.
Table 8-1 describes the performance indicators of the eSpace IVS system.
Table 8-1 Performance indicators
Performance
Indicator
Specification
Overall server
performance

Maximum of 100,000 operation logs. If the server has
insufficient space, the system overwrites the earliest logs.

Maximum of 100,000 alarm logs. If the server has insufficient
space, the system overwrites the earliest logs.

One license per management server.

Maximum of 16 accounts per client.

Up to eight levels of catalogs and 256 cameras per catalog in the
favorites folder.

One channel-associated voice played per client.

Maximum of 64 decoders per client.
Overall client
performance
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
67
eSpace IVS
Product Description
8 Technical Specifications
Performance
Indicator
Specification
Access performance
Device access:

Maximum of 5000 main devices or 10,000 cameras per
management server. The smaller value of these two parameters
is used.

Maximum of 128 MDUs and 128 MRUs per management
server.

Maximum of 128 MU POP nodes per management server.

Maximum of 128 DCGs per management server.

Maximum of 1000 alarm sources per DCG.

Maximum of 128 external domains, 100,000 cameras in external
domains, and eight levels of inter-domain connections per
management server.

Maximum of 100,000 alarm sources from external domains per
management server.
User access: maximum of 2000 login users per management server.
Alarm performance
Real-time browsing
Camera sequence
Tour
Issue 01 (2012-07-31)

Maximum of 100,000 alarm records.

Up to 500 alarms of a specified alarm type per subscriber.

30s alarm suppression by default.

200 real-time alarms displayed on the client.

Up to eight levels of definable alarm severity. A smaller value
indicates a higher alarm severity.

Maximum of 1000 surveillance areas per management server
and maximum of 128 alarm sources per surveillance area.

Maximum of 64 decoders per C/S client.

Maximum of 32 decoding channels during video switching with
the network digital keyboard.

Real-time browsing enabled within 3s on average.

One channel-associated voice played per client.

One voice intercom or voice broadcast enabled per client.

Maximum of 256 PUs per voice broadcast.

Camera sequencing at an 8s to 600s interval.

Maximum of 16 camera sequence resources, each of which can
contain a maximum of 512 cameras.

One camera sequence plan, which supports a maximum of 16
camera sequence resources.

Maximum of 16 tour tracks per camera.

Maximum of 20 presets per tour track.

Dwell time from 0s to 3600s at each preset. The value 0s
indicates no dwell, and the default value is 30s.

One tour plan per tour track.

Maximum of 16 tour plans per camera.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
68
eSpace IVS
Product Description
8 Technical Specifications
Performance
Indicator
Specification
PTZ

Maximum of 128 presets per camera.

Waiting duration from 30s to 3600s at a home position. The
default value is 300s.

Automatic unlock time from 0s to 300s. The value 0s indicates
that the PTZ is not automatically unlocked, and the default value
is 300s.

Pictures in .bmp or .jpg format. The default format is .jpg.

Manual snapshot interval of at least 0.5s.

Automatic snapshot interval from 1s to 10s. The default value is
5s.

Automatic capture of 1-1000 snapshots. The default value is 10.

320 TB storage device per MRU.

Successive recording for 1-365 days per camera.

Alarm-linked recording duration from 60s to 3600s. The default
value is 300s.

Recording files saved in units of 30 minutes.

Up to eight recordings played concurrently.

Maximum of 256 cameras per broadcast.

One local audio file per broadcast.

Map pictures in .bmp, .jpg, or .tif format.

Maximum size of 128 MB and resolution of 4096*4096 for each
map.

Maximum of 64 maps.

Maximum of 10 levels of organization (excluding top
organizations) and a maximum of 99 organizations under each
organization level.

Maximum of 5000 organizations managed per Service Control
Center (SCC).
Snapshot capturing
Video recording
Voice broadcast
Electronic map
Organization
management
User management
Maximum of 5000 users managed per SCC.
Role management
Maximum of 5000 roles managed per SCC.
8.2 Protocols and Standards
This topic describes the international protocols and industry standards that the IVS eSpace
system complies with.
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
69
eSpace IVS
Product Description
8 Technical Specifications
8.2.1 International Standards
This topic provides the international protocols and standards that the eSpace IVS system
complies with.
Table 8-2 lists the protocols and standards supported by the eSpace IVS system.
Table 8-2 International protocols and standards
Protocol Type
Protocol/Standard
Digital video encoding standard
ITU-T H.264 (MPEG 4 part 10)
Transmission Control Protocol (TCP)
RFC0872
Internet Protocol (IP)
RFC1356
TCP and User Datagram Protocol (UDP)
Hypertext Transfer Protocol (HTTP), version 1.1,
January 1999
ISOC/RFC2068
Pulse Code Modulation (PCM) of audio signals
CCITT G.711 Recommendations
(1988)
Real-Time Transport Protocol (RTP) and Real-Time
Transport Control Protocol (RTCP)
RFC1889/RFC1890
IP-based audio and video communication protocol
suite
H.323
Real-Time Streaming Protocol (RTSP)
RFC2326
Session Description Protocol (SDP)
RFC2327
Session Initiation Protocol (SIP)
RFC3261
Network video interface standard protocol
ONVIF
8.2.2 Industry Standards
This topic provides the industry standards that the IVS eSpace system complies with.
Security Protection Engineering Procedure and RequirementsGA/T75-94
Universal Graphic Symbols for Security Protection SystemGA/T 74-2000
Technical Requirements for the Monitor and Control System for Video Security
ProtectionGA367-2001
Technical Standard of City Area Monitoring And Alarming NetworkGA/T669–2008
User Terminal Device Resistance Over-Voltage and Over-Current Capacity Requirements and
Test MethodsYD/T870-906
Safety of Information Technology Equipment Including Electrical Business
EquipmentGB4943-95
Electrical Installations Design Code for Explosive Atmospheres and Fire HazardGB50058-92
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
70
eSpace IVS
Product Description
8 Technical Specifications
China Mobile Video Surveillance Service SpecificationQB-009QB-D-009-2011
Security and Protection Video Monitoring Network System Technical Specification for
Information Transport, Switch and ControlGB/T 28181-2011
Issue 01 (2012-07-31)
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
71