Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
eSpace IVS V100R001C30 Product Description Issue 01 Date 2012-07-31 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China Website: http://support.huawei.com/enterprise/ Email: [email protected] Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. i eSpace IVS Product Description Contents Contents 1 Product Positioning and Highlights .......................................................................................... 1 1.1 Positioning ....................................................................................................................................................... 1 1.2 Highlights ......................................................................................................................................................... 2 2 System Components ..................................................................................................................... 4 3 Application Scenarios .................................................................................................................. 7 3.1 Safe City ........................................................................................................................................................... 7 3.2 Emergency Command ...................................................................................................................................... 9 3.3 Traffic Surveillance ........................................................................................................................................ 10 3.4 Campus Security ............................................................................................................................................ 11 4 Typical Networks ........................................................................................................................ 14 4.1 Network Overview ......................................................................................................................................... 14 4.2 Medium Network Scheme .............................................................................................................................. 15 4.3 Large Network Scheme .................................................................................................................................. 18 4.4 Extra Large Network Scheme ........................................................................................................................ 19 5 Service Features ........................................................................................................................... 21 5.1 Live Video Surveillance ................................................................................................................................. 22 5.1.1 Live HD Video Browsing...................................................................................................................... 22 5.1.2 PTZ Control .......................................................................................................................................... 23 5.1.3 Camera Sequencing............................................................................................................................... 24 5.1.4 Video Wall............................................................................................................................................. 25 5.2 Video Recording ............................................................................................................................................. 25 5.2.1 Manual Recording ................................................................................................................................. 25 5.2.2 Alarm-Triggered Recording .................................................................................................................. 26 5.2.3 Scheduled Recording ............................................................................................................................ 27 5.2.4 Video Playback ..................................................................................................................................... 27 5.2.5 Video Download ................................................................................................................................... 28 5.3 Video Quality Diagnosis ................................................................................................................................ 29 5.4 Behavior Analysis .......................................................................................................................................... 30 5.4.1 Intrusion Detection ................................................................................................................................ 30 5.4.2 Abandoned Object Detection ................................................................................................................ 31 5.4.3 Removed Object Detection ................................................................................................................... 32 Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. ii eSpace IVS Product Description Contents 5.4.4 Presence Detection ................................................................................................................................ 33 5.4.5 Directional Movement Detection .......................................................................................................... 34 5.4.6 Loitering Detection ............................................................................................................................... 35 5.4.7 Crowd Counting .................................................................................................................................... 36 5.4.8 Density Detection.................................................................................................................................. 37 5.4.9 Speed Detection .................................................................................................................................... 38 5.5 Facial Recognition ......................................................................................................................................... 39 5.5.1 Facial Image Library Management ....................................................................................................... 39 5.5.2 Facial Image Retrieval .......................................................................................................................... 40 5.5.3 Facial Image Capturing ......................................................................................................................... 40 5.5.4 Facial Recognition Monitoring ............................................................................................................. 41 5.6 Intelligent Storage .......................................................................................................................................... 42 5.6.1 Frame Extraction Storage ...................................................................................................................... 42 5.6.2 Data Buffering....................................................................................................................................... 42 5.6.3 Video Archiving .................................................................................................................................... 43 5.7 Mobile Surveillance ....................................................................................................................................... 44 5.8 Alarm Services ............................................................................................................................................... 45 5.9 Voice Intercom and Voice Broadcast .............................................................................................................. 47 5.9.1 Voice Intercom ...................................................................................................................................... 47 5.9.2 Voice Broadcast..................................................................................................................................... 47 5.10 Electronic Map ............................................................................................................................................. 48 5.11 Media Security ............................................................................................................................................. 49 5.11.1 Digital Watermark ............................................................................................................................... 49 5.11.2 Secure Media Transmission ................................................................................................................ 50 5.12 System Management .................................................................................................................................... 50 5.12.1 User Management ............................................................................................................................... 50 5.12.2 PU Management .................................................................................................................................. 51 5.12.3 Multi-Level Management ................................................................................................................... 52 5.12.4 Multi-Domain Management ................................................................................................................ 52 5.12.5 Log Management ................................................................................................................................ 53 5.12.6 System Maintenance ........................................................................................................................... 54 6 Reliability and Security ............................................................................................................. 55 6.1 Reliability ....................................................................................................................................................... 55 6.1.1 Network Reliability ............................................................................................................................... 55 6.1.2 Host Reliability ..................................................................................................................................... 56 6.1.3 Application Software Reliability ........................................................................................................... 57 6.1.4 Service Reliability ................................................................................................................................. 58 6.2 Security .......................................................................................................................................................... 59 6.2.1 Security Solution at the Application Layer ........................................................................................... 59 6.2.2 Security Solution at the System Layer .................................................................................................. 59 6.2.3 Security Solution at the Network Layer ................................................................................................ 60 Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. iii eSpace IVS Product Description Contents 6.2.4 Security Solution at the Management Layer ......................................................................................... 60 7 Operation and Maintenance ..................................................................................................... 62 7.1 Service Management System ......................................................................................................................... 62 7.2 eSpace NMS ................................................................................................................................................... 63 8 Technical Specifications ............................................................................................................ 67 8.1 Performance Indicators .................................................................................................................................. 67 8.2 Protocols and Standards ................................................................................................................................. 69 8.2.1 International Standards.......................................................................................................................... 70 8.2.2 Industry Standards................................................................................................................................. 70 Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. iv eSpace IVS Product Description 1 Product Positioning and Highlights 1 Product Positioning and Highlights About This Chapter eSpace Intelligent Video Surveillance (IVS) offers customers a video surveillance solution that features high compatibility, definition, and intelligence. eSpace IVS allows customers to perform mobile surveillance over diversified mobile terminals. 1.1 Positioning eSpace IVS offers customers a video surveillance solution with high definition, reliability, performance, and compatibility. eSpace IVS is easy to maintain, manage, and deploy. 1.2 Highlights This topic describes eSpace IVS highlights. 1.1 Positioning eSpace IVS offers customers a video surveillance solution with high definition, reliability, performance, and compatibility. eSpace IVS is easy to maintain, manage, and deploy. Based on IP networks with a flexible architecture, eSpace IVS provides a wide assortment of services for customers, such as: Live video surveillance Recording Video playback Pan Tilt Zoom (PTZ) control Alarm detection, linkage, and prevention Voice intercom Electronic map Intelligent analysis eSpace IVS can be deployed on PCs, Network Video Recorders (NVRs), and blade servers. Core management and control components are deployed in two-node cluster mode to avoid single point of failure (SPOF). Media servers are deployed in cluster and load balancing modes to improve system reliability. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 1 eSpace IVS Product Description 1 Product Positioning and Highlights 1.2 Highlights This topic describes eSpace IVS highlights. Multi-Level and Multi-Domain eSpace IVS supports multi-level and multi-domain deployment as follows: A single domain supports a maximum of eight levels or service nodes. A single domain can directly connect to 128 external domains. Services in different domains operate independently and are not affected when a cross-domain network outage occurs. Intelligence eSpace IVS leverages intelligent analysis algorithms and high-accuracy analysis technologies to offer diverse and mature intelligent analysis services. eSpace IVS caters to customers with unique surveillance needs and changes surveillance from passive to active. Behavior analysis Includes intrusion detection, abandoned object detection, removed object detection, presence detection, directional movement detection, loitering detection, crowd counting, and speed detection. Facial recognition Compares faces in a surveillance area with those in a facial database to quickly identify people. Video quality diagnosis Analyzes video quality by image brightness, definition, and strip. Intelligent storage Discards unnecessary frames, buffers data against data loss, and archives essential videos. Open and Compatible Design eSpace IVS features open and compatible design to integrate with an impressive array of devices and platforms. Device access Provides the Device Connection Gateway (DCG) to connect to diversified peripheral units (PUs) and alarm systems. − Complies with the Open Network Video Interface Forum (ONVIF) specification to connect to PUs from mainstream vendors in the industry. − Complies with the standard OLE for Process Control (OPC) protocol and vendors' proprietary protocols alike to connect to alarm systems from Honeywell, Siemens, and Conwin. OLE refers to Object Linking and Embedding, a technology that allows embedding and linking to documents and other objects. Platform connection Provides the Platform Connection Gateway (PCG) and complies with T28181 and T669 protocols to connect to heterogeneous third-party platforms and share resources. Issue 01 (2012-07-31) Platform capability openness Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 2 eSpace IVS Product Description 1 Product Positioning and Highlights Provides the OLE Control eXtension (OCX) controls for third-party video surveillance systems to customize surveillance capabilities. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 3 eSpace IVS Product Description 2 System Components 2 System Components This topic describes the eSpace IVS system architecture and involved components. Figure 2-1 shows the eSpace IVS system architecture. Figure 2-1 eSpace IVS system architecture eSpace IVS consists of presentation, control, media, and management layers. Table 2-1 describes system layers and components. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 4 eSpace IVS Product Description 2 System Components Table 2-1 Components at each layer Layer Layer Function Component Component Function Presentati on layer Displays services on client units (CUs). A CU can be a mobile client, or a client in client/server (C/S) or browser/server (B/S) structure. C/S client Displays services on a PC client and provides a user interface for service operation and configuration. B/S client Displays services on a web browser client and provides a user interface for service operation and configuration. Mobile client Displays services on a mobile client and provides a user interface for service operation. Platform Connection Gateway (PCG) Complies with GA/T669, T28181, and customized protocols to connect to third-party video surveillance platforms. Service Control Unit (SCU) Controls video surveillance services, including service authentication, logic processing, and service control. Device Connection Gateway (DCG) Complies with the ONVIF specification to connect to third-party PUs and Conwin alarm systems. Media Distribution Unit (MDU) Forwards and distributes media data. Media Record Unit (MRU) Stores media data. Media Transcoding Unit (MTU) Re-encodes and distributes media data. Media Analysis Unit (MAU) Performs intelligent analysis functions, such as rule settings, task management, and result report. Control layer Media layer Issue 01 (2012-07-31) Controls video surveillance services and connects to third-party devices and platforms. Processes media data, including media distribution, storage, transcoding, and intelligent analysis. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 5 eSpace IVS Product Description 2 System Components Layer Layer Function Component Component Function Manage ment layer Maintains and manages service data. Service Management Unit (SMU) Manages service data, including users, rights, video walls, levels, and domains. Operation maintenance Unit (OMU) Uses the eSpace Network Management Server (NMS) to manage network elements (NEs) in eSpace IVS. This component allows users to manage the topology, alarms, devices, and system performance. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 6 eSpace IVS Product Description 3 Application Scenarios 3 Application Scenarios About This Chapter This topic describes eSpace IVS applications in the following solutions: safe city, emergency command, traffic surveillance, and campus security. 3.1 Safe City eSpace IVS can be applied in a safe city solution to perform real-time video surveillance, speed up emergency response, and ensure public security. 3.2 Emergency Command eSpace IVS can be applied in an emergency command solution to effectively link an emergency command center to remote sites, improve emergency response efficiency, and consequently reduce casualties and property loss. 3.3 Traffic Surveillance eSpace IVS can be applied in a traffic surveillance solution to perform video surveillance over city roads, subways, highways, and railways, which ensures traffic security and efficiency. 3.4 Campus Security eSpace IVS can be applied in a campus security solution to intelligently monitor campuses and trigger security actions. 3.1 Safe City eSpace IVS can be applied in a safe city solution to perform real-time video surveillance, speed up emergency response, and ensure public security. Figure 3-1 shows how eSpace IVS is applied in a safe city solution. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 7 eSpace IVS Product Description 3 Application Scenarios Figure 3-1 eSpace IVS in a safe city solution As shown in Figure 3-1, eSpace IVS integrates police and social video surveillance resources to construct a service-rich video surveillance platform. eSpace IVS also leverages third-party visualized surveillance platforms and video-assisted investigation technologies to deliver diversified applications. eSpace IVS brings the following benefits to a safe city solution: Real-time video access Allows users to access police and social video surveillance resources using the video access gateway, browse live videos, and remotely monitor city dynamics. Accurate tracking and incident analysis Leverages video-assisted investigation technologies to search for criminal suspects, track persons and vehicles, analyze incidents, and improve incident investigation efficiency. Quick and accurate crime combat Integrates with Geographic Information System (GIS) and Global Positioning System (GPS) to visualize video surveillance on electronic maps, quickly locate emergencies, and effectively combat crimes. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 8 eSpace IVS Product Description 3 Application Scenarios 3.2 Emergency Command eSpace IVS can be applied in an emergency command solution to effectively link an emergency command center to remote sites, improve emergency response efficiency, and consequently reduce casualties and property loss. Figure 3-2 shows how eSpace IVS is applied in an emergency command solution. Figure 3-2 eSpace IVS in an emergency command solution As shown in Figure 3-2, eSpace IVS integrates with the Universal Application Platform (UAP), computer telephony integration (CTI), and computer-assisted dispatch (CAD) systems to construct a collaborative emergency command platform that consists of an emergency command center and a Telepresence command center. eSpace IVS also integrates with third-party systems to effectively link an emergency command center to remote sites. eSpace IVS brings the following benefits to an emergency command solution: Multiple alarm access modes Allows people to report alarms in real time by fixed-line phone, mobile phone, and Internet. Visual command and dispatch Integrates with third-party capabilities in static and dynamic video collection, remote negotiation, and GIS to visualize emergency command and dispatch. Issue 01 (2012-07-31) Intelligent analysis and decision making Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 9 eSpace IVS Product Description 3 Application Scenarios Integrates with third-party systems, such as disaster management, contingency plan dispatch, and automatic vehicle tracking, to support decision making and process emergencies in a timely and correct manner. 3.3 Traffic Surveillance eSpace IVS can be applied in a traffic surveillance solution to perform video surveillance over city roads, subways, highways, and railways, which ensures traffic security and efficiency. Figure 3-3 shows how eSpace IVS is applied in a traffic surveillance solution. Figure 3-3 eSpace IVS in a traffic surveillance solution As shown in Figure 3-3, eSpace IVS combines PUs and off-site law enforcement platforms to construct a collaborative traffic surveillance platform. eSpace IVS also integrates with the following third-party traffic applications and systems: Police Geographic Information System (PGIS) GIS Traffic guidance and dispatch Traffic signal control Vehicle tracking Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 10 eSpace IVS Product Description 3 Application Scenarios eSpace IVS brings the following benefits to a traffic surveillance solution: HD videos and snapshots Performs all-day HD video surveillance over traffic conditions in real time. High-resolution and high-color-reproduction cameras function properly in an automatic day/night switch mode. Intelligent behavior analysis and tracking − Leverages intelligent behavior analysis technologies to monitor key locations all day and generate warnings in the event of impending danger. − Intelligently tracks and seamlessly takes snapshots of traffic violations to provide substantial evidence for law enforcement and consequently reduce traffic accidents. − Allows users to quickly search for and analyze PUs to track vehicles, analyze onsite conditions, and handle incidents. Open and compatible platform Integrates with off-site law enforcement platforms, complies with industry standards, and provides open interfaces and protocols to enable flexibility in service integration and system management. 3.4 Campus Security eSpace IVS can be applied in a campus security solution to intelligently monitor campuses and trigger security actions. Figure 3-4 shows how eSpace IVS is applied in a campus security solution. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 11 eSpace IVS Product Description 3 Application Scenarios Figure 3-4 eSpace IVS in a campus security solution As shown in Figure 3-4, eSpace IVS can connect to PUs installed in industrial parks, schools, prisons, airports, harbors, and financial outlets. In addition, eSpace IVS provides OCX controls to integrate with the following security systems from independent software vendors (ISV): Public address and voice intercom Access control Alarm Electronic patrol Power and environment monitoring Parking lot management eSpace IVS brings the following benefits to a campus security solution: Speedy emergency response Quickly triggers video surveillance and locates sites when detecting alarms. HD video surveillance Performs HD video surveillance around every corner on campus. Intelligent warning Intelligently analyzes videos at key locations to enable active and preventive surveillance. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 12 eSpace IVS Product Description 3 Application Scenarios Easy to deploy Integrates with diversified PUs to capture and detect alarm incidents anytime anywhere on campus. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 13 eSpace IVS Product Description 4 Typical Networks 4 Typical Networks About This Chapter eSpace IVS provides medium, large, and extra large network schemes to apply to surveillance scenarios of different scales. 4.1 Network Overview eSpace IVS networks can be classified into the following types by the number of connected cameras: medium, large, and extra-large. 4.2 Medium Network Scheme In a medium network scheme where 128 to 1024 cameras are installed, eSpace IVS is deployed in either single-level single-domain mode or multi-level single-domain mode. 4.3 Large Network Scheme In a large network scheme where 1024 to 5000 cameras are installed, eSpace IVS is deployed in multi-level single-domain mode. 4.4 Extra Large Network Scheme In an extra large networking scheme where more than 5000 cameras are installed, eSpace IVS is deployed in multi-level multi-domain mode. 4.1 Network Overview eSpace IVS networks can be classified into the following types by the number of connected cameras: medium, large, and extra-large. Background The eSpace IVS system can be deployed in distributed mode, which can be subdivided into three submodes: single-level single-domain, multi-level single-domain, and multi-level multi-domain. The two concepts level and domain are described as follows: Level Indicates a service node. For example, a public security bureau has installed an eSpace IVS system, and police stations under this bureau have deployed cameras in important surveillance areas. Each police station is a service node. Only one set of management Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 14 eSpace IVS Product Description 4 Typical Networks units is required for the public security bureau, and one or more media units are required for each site according to the number of access cameras. After these units are deployed, the public security bureau can monitor and manage all police stations, and the police stations can monitor and manage their own areas. Domain Indicates a group of interconnected surveillance systems. Domains can be classified into local and external domains. An external domain can be an eSpace IVS system or a third-party surveillance system. For example, an eSpace IVS system is installed in the public security departments of city A and city B. With multi-domain management, users in the public security departments of city A and city B can view each other's surveillance videos. Network Type Table 4-1 lists the network scales and deployment modes of the eSpace IVS system. Table 4-1 Network scales and deployment modes of the eSpace IVS system Network Scale Number of Cameras Involved Recommended Deployment Mode Medium 128–1024 Single-level single-domain or multi-level single-domain NOTE Single-level single-domain: involves a single service node, and a single service management and control unit. Large 1024–5000 Multi-level single-domain: involves multiple service nodes, and a single service management and control unit. Multi-level single-domain NOTE Multi-level single-domain: involves multiple service nodes, and a single service management and control unit. Extra large 5000 or above Multi-level multi-domain NOTE Multi-level multi-domain: involves multiple service nodes, and multiple service management and control units. 4.2 Medium Network Scheme In a medium network scheme where 128 to 1024 cameras are installed, eSpace IVS is deployed in either single-level single-domain mode or multi-level single-domain mode. Figure 4-1 shows a medium network scheme in single-level single-domain mode. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 15 eSpace IVS Product Description 4 Typical Networks Figure 4-1 Medium network scheme (single-level single-domain) A media unit represents a service node. As shown in Figure 4-1, in single-level single-domain mode, only one management unit and one media unit are deployed, and there is only one service node. In multi-level single-domain mode, however, multiple media units are deployed and there are multiple service nodes. Users can choose to deploy eSpace IVS in single-level or multi-level mode in terms of the number of service nodes. For example, if eSpace IVS is deployed in a supermarket chain in single-level single-domain mode, one management unit, one intelligent analysis unit, and one media unit are installed in its headquarters, and cameras are installed in individual branches of the chain. Table 4-2 describes the components in a medium network scheme. Table 4-2 Network components Componen t Description Management unit Controls video surveillance services and connects to third-party devices and platforms. Supports active and standby deployment. If a fault occurs on the active management unit, the standby one automatically takes over services, which ensures service continuity. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 16 eSpace IVS Product Description 4 Typical Networks Componen t Description Intelligent analysis unit Diagnoses video quality, analyzes behaviors, recognizes faces, and triggers video recording if specified conditions are met. Provides intelligent analysis functions for connected third-party video surveillance platforms. Figure 4-2 shows the deployment of an intelligent analysis unit. Establishes, forwards, and receives media streams. Allows users to record, play, store, and download videos. Users can deploy one or more media units. Media unit Connection unit Connects third-party devices and platforms to eSpace IVS to share video surveillance resources. Users can deploy one or more connection units in terms of the number of devices and platforms to be connected. Network management system (NMS) Consists of the eSpace NMS server and client. Monitors the operation and maintenance of devices and servers in eSpace IVS. Collects and manages alarm and performance data. Disk array (optional) Stores and reads data in multiple disks to speed up data transmission while ensuring data security. Client unit (CU) eSpace IVS client, such as C/S client, B/S client, or mobile client. Decoder Decompresses and converts digital video signals into analog signals for video playback on video walls. Third-party device Third-party devices that are connected to eSpace IVS, such as network cameras or decoders. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 17 eSpace IVS Product Description 4 Typical Networks Figure 4-2 Intelligent analysis unit The multi-level single-domain deployment mode in a medium network scheme is similar to that in a large network scheme. For details, see Figure 4-3. The difference between the two lies in the number of media units and connected cameras. 4.3 Large Network Scheme In a large network scheme where 1024 to 5000 cameras are installed, eSpace IVS is deployed in multi-level single-domain mode. Figure 4-3 shows a large network scheme. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 18 eSpace IVS Product Description 4 Typical Networks Figure 4-3 Large network scheme (multi-level single-domain) As shown in Figure 4-3, in multi-level single-domain mode: One management unit is deployed in the headquarters to manage devices in the headquarters and branches. One or more media units are deployed in each branch. For details about network components, see Table 4-2. 4.4 Extra Large Network Scheme In an extra large networking scheme where more than 5000 cameras are installed, eSpace IVS is deployed in multi-level multi-domain mode. Figure 4-4 shows an extra large network scheme. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 19 eSpace IVS Product Description 4 Typical Networks Figure 4-4 Extra large network scheme (multi-level multi-domain) As shown in Figure 4-4, an extra large network scheme consists of multiple domains and levels. eSpace IVS is the local domain and third-party video surveillance systems are external domains. Within a domain, one management unit is deployed at the headquarters, and one or more media units or media unit sets are deployed at each branch. For details about network components, see Table 4-2. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 20 eSpace IVS Product Description 5 Service Features 5 Service Features About This Chapter This topic describes eSpace IVS service features. 5.1 Live Video Surveillance eSpace IVS provides multiple live video surveillance functions, including live HD video browsing, PTZ control, video sequencing, and video wall. 5.2 Video Recording eSpace IVS supports manual, alarm-triggered, and scheduled recording. Users can search for recorded videos in multiple modes and download them to a local computer. 5.3 Video Quality Diagnosis The eSpace IVS platform automatically generates an alarm when an exception (such as color cast and image noise) occurs on the video image. 5.4 Behavior Analysis eSpace IVS can analyze a wide range of object behaviors to efficiently detect exceptions in various scenarios. 5.5 Facial Recognition The eSpace IVS platform can automatically identify faces detected in a surveillance area. 5.6 Intelligent Storage The eSpace IVS platform provides multiple video storage modes to store valuable video files and save storage space. 5.7 Mobile Surveillance Users can perform live video surveillance, record videos, and take snapshots with mobile terminals. Recorded videos and captured snapshots can be stored on a local computer or the eSpace IVS platform. 5.8 Alarm Services When a Peripheral Unit (PU) generates an alarm, the eSpace IVS platform automatically displays live videos from the linked cameras based on a preset alarm linkage rule, notifies users of the alarm in multiple ways, and displays alarm handling suggestions. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 21 eSpace IVS Product Description 5 Service Features 5.9 Voice Intercom and Voice Broadcast If a PU and CU are configured with speakers and microphones, a user can enable the voice intercom or broadcast function. 5.10 Electronic Map Users can query surveillance sites and alarm sources on electronic maps. When an alarm occurs, a user can quickly locate the alarm source, view surrounding situations, find an appropriate surveillance camera, and browse live videos. 5.11 Media Security The eSpace IVS system provides a digital watermark and secure media transmission to ensure the reliability and security of video files. 5.12 System Management The eSpace IVS platform supports user management, device management, multi-level management, multi-domain management, log management, and system maintenance. 5.1 Live Video Surveillance eSpace IVS provides multiple live video surveillance functions, including live HD video browsing, PTZ control, video sequencing, and video wall. 5.1.1 Live HD Video Browsing Users can browse live HD videos shot by cameras installed at surveillance areas. Customer Benefits HD video experience High accuracy in video analysis Scenario An eSpace IVS system is installed on a campus. Jason, a security guard, is sitting in a duty room and watching live HD videos from cameras installed at the campus gateway. Features Table 5-1 describes the live HD video browsing features. Table 5-1 Live HD video browsing features Type Feature Unique feature Decodes 1080p videos at 60 frames per second. Basic features Allows users to browse videos in multiple screens. Issue 01 (2012-07-31) Directly connects to PUs to obtain live videos. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 22 eSpace IVS Product Description 5 Service Features Type Feature Allows users to mark and add frequently-used cameras to favorites. Allows users to play live videos on video walls only by a mouse click. Resumes video playback where users left off. Allows users to zoom in to view image details. The maximum zoom-in percentage is 800%. Manually or automatically takes snapshots of live videos and stores the snapshots on the eSpace IVS platform or a local computer. 5.1.2 PTZ Control A PTZ camera consists of the PTZ (an auxiliary device) and lens (installed on the PTZ). Users can control PTZ cameras to browse live videos from different angles. Customer Benefits Browses live videos from different angles. Adjusts the shooting angle and focal length to widen surveillance coverage and improve video definition. Scenario An eSpace IVS system has been installed in a traffic surveillance center. One day, Jason, an employee at the center, is watching the live video of intersection A. All of a sudden, two cars collide into each other. Jason adjusts the shooting angle and focal length of the camera and zooms in to view details. Jason verifies the traffic accident and sends nearby traffic officers to the scene. Features Table 5-2 describes the PTZ control features. Table 5-2 PTZ control features Type Feature Unique feature 3D intelligent location Basic features Controls camera movement in a maximum of eight directions. Allows users to click on any point or rectangle in a video image to automatically adjust the shooting angle and focal length of a camera and zoom in to view details. Supports zoom, aperture, and focal length adjustment. Position preset: Allows users to preset PTZ positions for a PTZ camera so that the camera can be quickly switched to the preset positions without manual intervention Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 23 eSpace IVS Product Description 5 Service Features Type Feature when triggered. Preset tour: Shoots videos along a line of specified presets. Horizontal and vertical tour The horizontal tour allows 360° scan in one direction clockwise or counter-clockwise or back-and-forth scan at more than 90°. The vertical tour allows back-and-forth scan at more than 90° clockwise or counter-clockwise. PTZ lock: Allows administrators to grade PTZ control rights so that users with a higher priority can lock a PTZ camera to prevent other users from controlling it. Automatic PTZ unlock: Automatically unlocks PTZ cameras that have been locked for a specified time length. 5.1.3 Camera Sequencing eSpace IVS can play live videos from multiple cameras in the same video pane in a specified sequence. Customer Benefits Automatically plays live videos from multiple cameras, which reduces labor costs. Allows users to customize camera sequencing plans to meet individual demands. Scenario An eSpace IVS system is installed in a shopping mall. Jason, an employee in the shopping mall, needs to watch live videos from ten counters. Jason enables camera sequencing and sets the display interval of each camera to 60 seconds. In this case, eSpace IVS automatically and sequentially plays live videos from the ten counters at an interval of 60 seconds. Features Camera sequencing offers the following features: Camera sequencing in multiple video panes Up to 512 cameras in a camera sequencing task Up to 16 camera sequencing tasks Configurable display interval Configurable presets for camera sequencing Pause and resume camera sequencing Jump to a next camera during live video browsing Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 24 eSpace IVS Product Description 5 Service Features Configurable camera sequencing plans Camera sequencing on a video wall 5.1.4 Video Wall The eSpace IVS system enables users to play live and recorded videos on a large-screen video wall. Customer Benefits Users can play live and recorded videos on a large-screen video wall, which facilitates surveillance. Scenario An eSpace IVS system and a large-screen video wall have been installed on a campus. Jason, an employee in the campus, can watch real-time HD videos on the video wall. Features The eSpace IVS system supports the following video wall features: Browses live and recorded videos from the video wall. Browses camera sequence videos from the video wall. Customizes the video wall layout. Manages the video wall. Users can save the configured video wall channel, live video, and camera sequence information. Allows users to set a video pane as an alarm window. 5.2 Video Recording eSpace IVS supports manual, alarm-triggered, and scheduled recording. Users can search for recorded videos in multiple modes and download them to a local computer. 5.2.1 Manual Recording Users can record videos during live video surveillance. Customer Benefits Provides recorded videos for follow-up video analysis. Provides evidence for incident handling. Scenario An eSpace IVS system is installed on a campus. Jason, an employee on the campus, is watching the live video of the campus gateway. All of a sudden, a stranger attempts to trespass on campus. Jason clicks a button and eSpace IVS starts recording videos of the campus gateway. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 25 eSpace IVS Product Description 5 Service Features Features Table 5-3 describes the manual recording features. Table 5-3 Manual recording features Type Feature Unique feature Stores 1080p videos at 60 frames per second. Basic features Encodes videos in H.264 BP/MP/HP format. Records and stores videos on the eSpace IVS platform. Records and stores videos on PUs. Records and stores videos on a local computer. Allows users to specify a local path for storing recorded videos. Allows users to record or stop recording live videos. Automatically stops recording when a specified recording duration has elapsed. 5.2.2 Alarm-Triggered Recording Users can link alarms or events to a recording task by specifying an alarm linkage policy. When detecting an alarm or event, eSpace IVS triggers a specified camera to record for a specified length of time. Customer Benefits Records videos on the eSpace IVS platform when an alarm is triggered. Provides recorded videos for follow-up video analysis. Provides evidence for incident handling. Scenario An eSpace IVS system is installed in a warehouse. Jason, an employee in the warehouse, needs to record video of people entering or exiting the warehouse. Jason links the perimeter intrusion event to a recording task. If someone enters or exits the warehouse, eSpace IVS generates an intrusion alarm and triggers a specified camera to record videos. Features Alarm-triggered recording provides the following features: Video recording even before an alarm is triggered Intelligent analysis rules configurable as alarm rules that trigger video recording Real-time alarm linkage Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 26 eSpace IVS Product Description 5 Service Features 5.2.3 Scheduled Recording Users can create a scheduled recording policy for the eSpace IVS platform to record videos for a specified length of time. Customer Benefits Automatically records videos, which reduces labor costs. Provides recorded videos for follow-up video analysis. Provides evidence for incident handling. Scenario An eSpace IVS system is installed on a campus. Jason, an employee on the campus, needs to record videos from 12:00 to 13:00 when a lot of people enter or exit the campus. Jason creates a scheduled recording policy for this time segment. eSpace IVS automatically records videos during this time segment. Features Scheduled recording enables users to: Specify the start and end times of a scheduled recording policy. Allows users to create daily, weekly, and all-day recording plans. Specify cameras for recording plans. Specify the storage space size. Record and store videos on the eSpace IVS platform. Record and store videos on PUs. 5.2.4 Video Playback Users can play back recorded videos on the eSpace IVS platform, a PU, and a local computer. Customer Benefits Users can watch and analyze videos. Scenario An eSpace IVS system is installed on a campus. One day, Lily lost her mobile phone at District 1 in Building A. Jason, a security guard on the campus, played back the recorded video of District 1 in Building A, and found that it was Jack who had stolen Lily's mobile phone. Features Table 5-4 describes the video playback features. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 27 eSpace IVS Product Description 5 Service Features Table 5-4 Video playback features Type Feature Unique feature Allows users to play back a maximum of eight simultaneously recorded videos. Basic features Allows users to play back a maximum of 25 recorded videos at the same time. Allows users to mark recorded videos of different types in different colors on the timeline. Allows users to play back videos recorded and stored on the eSpace IVS platform, a PU, or a local computer. Allows users to play back recorded videos at a specified time point on the timeline. Allows users to bookmark videos, take snapshots, and control audio volume during video playback. Allows users to quickly locate videos by alarm event or bookmark. Allows users to drag a camera from the camera list to a video pane and play back videos. Allows users to play back videos on a video wall. Allows users to play back videos with the following controls: fast-forward, slow-down, frame-by-frame, and continuous playback. Allows users to zoom in to view image details. The maximum zoom-in percentage is 800%. 5.2.5 Video Download Users can download videos stored on the eSpace IVS system or PUs to a local hard disk. Customer Benefits Video download has the following benefits: The eSpace IVS system provides historical video records that can be used for evidence collection. Users can download videos to a local disk and process them accordingly. Scenario One day, Lily working at District 1 in Building A on a campus found that her mobile phone had been stolen from her desk and then reported such theft to Jason, an employee of the campus property management company. Jason, a security guard on the campus, played back the recorded video of District 1 in Building A, and found that it was Jack who had stolen Lily's mobile phone. Then Jason downloaded this video to a local hard disk and submitted it to the police for processing. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 28 eSpace IVS Product Description 5 Service Features Features The eSpace IVS system supports the following video download features: Allows users to download videos stored on the eSpace IVS system or PUs. Creates a maximum of 16 download tasks and 4 concurrent download tasks. Downloads videos at a normal speed or 4x speed. Segments the downloaded video by time or by capacity. Sets a path for storing the downloaded videos. Displays the download task status, time, download speed, and download process. 5.3 Video Quality Diagnosis The eSpace IVS platform automatically generates an alarm when an exception (such as color cast and image noise) occurs on the video image. Customer Benefits With the video quality diagnosis function, users do not need to manually check cameras, saving a lot of manpower. With the video quality diagnosis function, users can stay informed of their video feed quality. Scenario An eSpace IVS system is installed on a campus. An employee, Jason, sets a video quality diagnosis rule and a surveillance plan for cameras at the campus gateway. One day, the eSpace IVS system detects that a camera at the campus gateway is blocked by an object and generates an alarm. Jason notifies relevant personnel so they can check the camera. Features Table 5-5 describes the video quality diagnosis features. Table 5-5 Video quality diagnosis features Type Feature Unique features Detects camera faults and diagnoses video quality. Basic features Allows users to set detection rules and surveillance plans for cameras. Allows users to add, modify, view, and delete detection rules or surveillance plans. Allows users to enable or disable an intelligent video analysis plan. Automatically detects video signal loss, image brightness, definition, strip interference, color cast, noise, image freezing, lens block, and image jitter. Allows users to lower the brightness detection sensitivity when a camera Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 29 eSpace IVS Product Description 5 Service Features Type Feature works in strong light conditions to prevent a false alarm. Automatically detects cameras one by one, enhancing the detection efficiency and server usage. Automatically generates an alarm and takes snapshots of videos when an exception occurs on the video image. If a user has subscribed to this alarm, the eSpace IVS system sends the alarm to the user. The user can view snapshot thumbnails to check the camera faults. 5.4 Behavior Analysis eSpace IVS can analyze a wide range of object behaviors to efficiently detect exceptions in various scenarios. 5.4.1 Intrusion Detection eSpace IVS automatically generates an alarm when a person enters a specified surveillance area. Customer Benefits Intrusion detection offers 24-hour video surveillance over surveillance areas and generates alarms when detecting any intrusion behavior. As a result, labor costs are reduced and video analysis efficiency is improved. Scenario An eSpace IVS system is installed in a railway station. Jason, an employee in the railway station, creates an intrusion detection rule and a surveillance plan in a specified surveillance area. One day, eSpace IVS detects that a passenger moved to a train track and generates an alarm. Jason verifies the incident and sends nearby security guards to the scene. Features Table 5-6 describes the intrusion detection features. Table 5-6 Intrusion detection features Type Feature Unique features Detects intrusions in a specified surveillance area. Basic features Allows users to set detection rules and surveillance plans. Issue 01 (2012-07-31) Supports intelligent analysis on live and recorded videos. Allows users to add, modify, view, and delete detection rules or surveillance plans. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 30 eSpace IVS Product Description 5 Service Features Type Feature Allows users to enable or disable an intelligent video analysis plan. Allows users to specify surveillance areas (rectangular or polygonal) and areas that can be ignored. When a person enters a specified surveillance area, the eSpace IVS system automatically generates an alarm and takes snapshots. If a user has subscribed to this alarm, the eSpace IVS system sends the alarm to the user. The user can view snapshot thumbnails to verify the incident. Detects and identifies multiple objects that suddenly enter a specified surveillance area. Prevents complicated external environments, such as low-illumination and flashing background, from affecting the video image quality. 5.4.2 Abandoned Object Detection eSpace IVS automatically generates an alarm when an object is abandoned in a specified surveillance area. Customer Benefits Abandoned object detection offers 24-hour video surveillance over surveillance areas and generates alarms when detecting any abandoned object. As a result, labor costs are reduced and video analysis efficiency is improved. Scenario An eSpace IVS system is installed in a railway station. Jason, an employee in the railway station, creates an abandoned object detection rule and a surveillance plan in a specified surveillance area. One day, eSpace IVS detects that a suitcase has been abandoned in the surveillance area and generates an alarm. Jason verifies the incident and sends nearby security guards to the scene. Features Table 5-7 describes the abandoned object detection features. Table 5-7 Abandoned object detection features Type Feature Unique features Detects objects that have been abandoned in a specified surveillance area. Basic features Allows users to set detection rules and surveillance plans. Issue 01 (2012-07-31) Supports intelligent analysis on live and recorded videos. Allows users to add, modify, view, and delete detection rules or surveillance plans. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 31 eSpace IVS Product Description 5 Service Features Type Feature Allows users to enable or disable an intelligent video analysis plan. Allows users to specify surveillance areas (rectangular or polygonal) and areas that can be ignored. When an object is abandoned in a specified surveillance area, the eSpace IVS system automatically generates an alarm and takes snapshots. If a user has subscribed to this alarm, the eSpace IVS system sends the alarm to the user. The user can view snapshot thumbnails to verify the incident. Detects and identifies multiple objects that have been abandoned in a specified surveillance area. Prevents complicated external environments, such as low-illumination and flashing background, from affecting the video image quality. 5.4.3 Removed Object Detection eSpace IVS automatically generates an alarm when an object is removed from a specified surveillance area. Customer Benefits Removed object detection offers 24-hour video surveillance over surveillance areas and generates alarms when a specified object is removed. As a result, labor costs are reduced and video analysis efficiency is improved. Scenario An eSpace IVS system is installed in a museum. Jason, an employee in the museum, creates a removed object detection rule and a surveillance plan for antique A in a specified surveillance area. One day, eSpace IVS detects that antique A has been removed from the surveillance area and generates an alarm. Jason verifies the incident and sends nearby security guards to the scene. Features Table 5-8 describes the removed object detection features. Table 5-8 Removed object detection features Type Feature Unique features Detects objects that have been removed from a specified surveillance area. Basic features Allows users to set detection rules and surveillance plans. Issue 01 (2012-07-31) Supports intelligent analysis on live and recorded videos. Allows users to add, modify, view, and delete detection rules or surveillance plans. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 32 eSpace IVS Product Description 5 Service Features Type Feature Allows users to enable or disable an intelligent video analysis plan. Allows users to specify surveillance areas (rectangular or polygonal) and areas that can be ignored. Allows users to specify a time length when an object can be blocked. When an object is removed from a specified surveillance area, the eSpace IVS system automatically generates an alarm and takes snapshots. If a user has subscribed to this alarm, the eSpace IVS system sends the alarm to the user. The user can view snapshot thumbnails to verify the incident. Detects and identifies multiple objects that have been removed from a specified surveillance area. Prevents complicated external environments, such as low-illumination and flashing background, from affecting the video image quality. 5.4.4 Presence Detection The eSpace IVS platform automatically generates an alarm when an object suddenly appears in a specified surveillance area. Customer Benefits 24-hour surveillance over surveillance areas where objects may suddenly appear, which saves manpower. Intelligent analysis of video feeds where objects may suddenly appear, which improves video query and analysis efficiency. Scenario An eSpace IVS platform is installed in a bank. An employee, Jason, sets a presence detection rule and a surveillance plan for cameras at the bank vault. One day, the eSpace IVS platform detects a person in the bank vault and generates an alarm. Jason views alarm-triggered snapshots to verify that someone was in fact in the vault and notifies security guards and police. Features Table 5-9 describes the presence detection features. Table 5-9 Presence detection features Type Feature Unique features Detects objects that suddenly enter a specified surveillance area. Basic features Allows users to set detection rules and surveillance plans. Issue 01 (2012-07-31) Supports intelligent analysis on live and recorded videos. Allows users to add, modify, view, and delete detection rules or Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 33 eSpace IVS Product Description 5 Service Features Type Feature surveillance plans. Allows users to enable or disable an intelligent video analysis plan. Allows users to specify surveillance areas (rectangular or polygonal) and areas that can be ignored. Automatically generates an alarm and takes snapshots of videos when a person suddenly appears in a specified surveillance area. If a user has subscribed to this alarm, the eSpace IVS system sends the alarm to the user. The user can view snapshot thumbnails to verify that the person has in fact appeared in the specified surveillance area. Detects and identifies multiple objects that suddenly appear in the specified surveillance area. Prevents complicated external environments, such as low-illumination and flashing background, from affecting the video image quality. 5.4.5 Directional Movement Detection The eSpace IVS platform automatically generates an alarm when an object moves in the wrong direction in a specified surveillance area. Customer Benefits 24-hour continuous surveillance over objects that move in the wrong direction in a specified surveillance area, saving manpower. Intelligent analysis of objects that move in the wrong direction in videos, enhancing the video query and analysis efficiency. Scenario An eSpace IVS platform is installed in a traffic command center. A traffic officer, Jason, sets a directional movement detection rule and a surveillance plan for cameras on one-way street A. One day, the eSpace IVS platform detects that a vehicle driving in the wrong direction on A and generates an alarm. Jason views alarm-triggered snapshots to verify that the vehicle is in fact driving in the wrong direction and notifies the traffic police. Features Table 5-10 describes the directional movement detection features. Table 5-10 Directional movement detection features Type Feature Unique features Detects objects that move in the wrong direction in a specified surveillance area. Supports intelligent analysis on live and recorded videos. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 34 eSpace IVS Product Description 5 Service Features Type Feature Basic features Allows users to set detection rules and surveillance plans. Allows users to add, modify, view, and delete detection rules or surveillance plans. Allows users to enable or disable an intelligent video analysis plan. Allows users to specify surveillance areas (rectangular or polygonal) and areas that can be ignored. When an object moves in the wrong direction in a specified surveillance area, the eSpace IVS platform automatically generates an alarm and takes snapshots of videos. If a user has subscribed to this alarm, the eSpace IVS system sends the alarm to the user. The user can view snapshot thumbnails to verify that the object is moving in the wrong direction. Detects and identifies multiple objects that move in the wrong direction in a specified surveillance area. Prevents complicated external environments, such as low-illumination and flashing background, from affecting the video image quality. 5.4.6 Loitering Detection eSpace IVS automatically generates an alarm when a person is loitering in a specified surveillance area. Customer Benefits Loitering detection offers 24-hour video surveillance over surveillance areas and generates alarms when detecting any loitering behavior. As a result, labor costs are reduced and video analysis efficiency is improved. Scenario An eSpace IVS system is installed in a railway crossroad. Jason, an employee in the railway crossroad, creates a loitering detection rule and a surveillance plan in a specified surveillance area. One day, eSpace IVS detects that a person has been loitering in the surveillance area for a specified length of time and generates an alarm. Jason verifies the incident and sends nearby security guards to the scene. Features Table 5-11 describes the loitering detection features. Table 5-11 Loitering detection features Type Feature Unique features Detects persons that are loitering in a specified surveillance area. Issue 01 (2012-07-31) Supports intelligent analysis on live and recorded videos. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 35 eSpace IVS Product Description 5 Service Features Type Feature Basic features Allows users to set detection rules and surveillance plans. Allows users to add, modify, view, and delete detection rules or surveillance plans. Allows users to enable or disable an intelligent video analysis plan. Allows users to specify surveillance areas (rectangular or polygonal) and areas that can be ignored. Allows users to specify an acceptable loitering duration. When the loitering duration is reached, eSpace IVS generates an alarm. When a person is loitering in a specified surveillance area, the eSpace IVS system automatically generates an alarm and takes snapshots. If a user has subscribed to this alarm, the eSpace IVS system sends the alarm to the user. The user can view snapshot thumbnails to verify the incident. Detects and identifies multiple objects that are loitering in a specified surveillance area. Prevents complicated external environments, such as low-illumination and flashing background, from affecting the video image quality. 5.4.7 Crowd Counting eSpace IVS can count the crowd in a specified surveillance area. Customer Benefits eSpace IVS automatically counts the crowd in a specified surveillance area, which saves labor costs. Scenario An eSpace IVS system is installed in a shopping mall. Jason, an employee in the shopping mall, creates a crowd counting rule and a surveillance plan in a specified surveillance area. In this case, eSpace IVS automatically counts the crowd in the specified surveillance area. Features Table 5-12 describes the crowd counting features. Table 5-12 Crowd counting Type Feature Unique feature Counts the crowd in a specified a specified surveillance area. Basic features Allows users to set detection rules and surveillance plans. Issue 01 (2012-07-31) Allows users to add, modify, view, and delete detection rules or Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 36 eSpace IVS Product Description 5 Service Features Type Feature surveillance plans. Allows users to enable or disable an intelligent video analysis plan. Allows users to specify a surveillance area by drawing straight lines or U-shaped lines. Allows users to specify the direction of population flows to count. 5.4.8 Density Detection The eSpace IVS system automatically generates an alarm when the crowd or vehicle density in a specified surveillance area exceeds a preset threshold. Customer Benefits With the density detection function, the eSpace IVS system can automatically detect the crowd or vehicle density, which improves work efficiency and helps users to predict potential risks. Scenario An eSpace IVS system is installed in an airport. A member of the airport security staff, Jason, sets a density detection rule and a surveillance plan for cameras at a specified surveillance area. One day, the eSpace IVS system detects that the crowd density in the specified surveillance area exceeds a preset threshold and generates an alarm. Jason views alarm-triggered snapshots to verify that too many personnel are waiting in the surveillance area and notifies related personnel so they can address the issue. Features Table 5-13 describes the density detection features. Table 5-13 Density detection features Type Feature Unique features Detects the crowd or vehicle density in a specified surveillance area. Basic features Allows users to set detection rules and surveillance plans. Supports intelligent analysis on live and recorded videos. Allows users to add, modify, view, and delete detection rules or surveillance plans. Allows users to enable or disable an intelligent video analysis plan. Allows users to specify surveillance areas (rectangular or polygonal) and areas that can be ignored. Allows users to set the density detection alarm threshold. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 37 eSpace IVS Product Description 5 Service Features Type Feature Automatically generates an alarm and takes snapshots of videos when the crowd or vehicle density in a specified surveillance area exceeds a preset threshold. If a user has subscribed to this alarm, the eSpace IVS system sends the alarm to the user. Prevents complicated external environments, such as low-illumination and flashing background, from affecting the video image quality. 5.4.9 Speed Detection The eSpace IVS system can detect the speed of an object in real time and check whether the object exceeds the permitted speed according to the preset thresholds. Customer Benefits Speed detection enables users to perform the following tasks: Check whether an object exceeds the permitted speed in a specified area in real time. Analyze the recording to check whether an object in the recording exceeds the permitted speed. Scenario An eSpace IVS system has been installed in a highway surveillance center, and Jason (an employee in the surveillance center) has set the speed detection rules and surveillance plans. When a vehicle exceeds the permitted speed in the surveillance area, the eSpace IVS system automatically generates an alarm. Features Table 5-14 describes the speed detection features. Table 5-14 Speed detection features Type Feature Unique features Speed detection Detects vehicles that exceed the permitted speed in a specified surveillance area. Supports intelligent analysis on live and recorded videos. Basic features Plan and rule setting Allows users to set detection rules and surveillance plans. Allows users to add, modify, view, and delete detection rules or surveillance plans. Allows users to enable or disable an intelligent video analysis plan. Allows users to specify surveillance areas and areas to be ignored. The Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 38 eSpace IVS Product Description 5 Service Features Type Feature shape of a surveillance area can be rectangular or polygonal. Allows users to set the minimum and maximum time within which a vehicle is allowed to pass through the specified area. Allows users to set the vehicle passing direction to be monitored, for example, from area A to area B or from area B to area A. Alarming and snapshot: When an object exceeds the permitted speed in a specified surveillance area, the eSpace IVS system automatically generates an alarm and takes snapshots. If a user has subscribed to this alarm, the eSpace IVS system sends the alarm to the user. Allows users to monitor multiple objects at the same time. The eSpace IVS system can identify and differentiate between objects exceeding the permitted speed. Prevents complicated external environments, such as low-illumination and flashing background, from affecting the video image quality. 5.5 Facial Recognition The eSpace IVS platform can automatically identify faces detected in a surveillance area. 5.5.1 Facial Image Library Management The eSpace IVS system allows users to manage the facial image library, including registering, changing, deleting, and querying facial image information. Customer Benefits Users can efficiently manage the facial image library. Scenario An eSpace IVS system has been installed in a public security department. Jason is responsible for maintaining the facial image library. At early stages, Jason imports facial image information into the library in batches. When a new member comes, Jason registers the new member's facial information into the library. Features The eSpace IVS system supports the following facial image library management features: Defines different facial image libraries, such as facial image libraries for permanent residents, wanted fugitives, and VIPs. Collects facial images through a specified camera and registers these collected facial images in the library. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 39 eSpace IVS Product Description 5 Service Features Registers facial images in the library one by one or in batches. Queries information about a registered person by the person's facial image ID or name. Modifies facial image information. Deletes facial image information. Moves a facial image from one library type to another (for example, from permanent resident library to wanted fugitive library). 5.5.2 Facial Image Retrieval The eSpace IVS system allows users to search specified facial image libraries for persons with similar faces after specifying a facial picture. Customer Benefits Users can search a facial image library for persons with similar faces after specifying a facial picture, and query detailed information about these persons. Scenario An eSpace IVS system has been installed in a public security department. Jason is a police alarm operator working at the public security department. One day, Jason was alerted of a suspect wanted in connection with a crime. The person who reported this police alarm also submitted a picture of the suspect to Jason. Based on this picture, Jason searched the facial image library and found ten possible suspects. After checking their detailed information, Jason finally determined two most suspicious persons. Features The eSpace IVS system supports the following facial image retrieval features: Search for facial picture match Search by facial features and similarities Search in one or more facial libraries or even all libraries 5.5.3 Facial Image Capturing The eSpace IVS system captures facial images with snapshots and automatically generates an alarm. Customer Benefits Users can use the eSpace IVS system to capture facial images in the surveillance area. The captured facial images can be used for post-event evidence collection. Scenario An eSpace IVS system has been installed for a bank's vaults. Jason, a bank employee, has set facial image capturing rules and surveillance plans for a surveillance area. Once a person enters the surveillance area, the eSpace IVS system automatically captures the person's facial image and generates an alarm. One day, Jason saw a facial image capturing alarm and immediately verified the captured pictures, finding that someone had entered the vaults. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 40 eSpace IVS Product Description 5 Service Features Features The eSpace IVS system supports the following facial image capturing features: Supports facial detection. Allows users to set detection rules and surveillance plans. Allows users to add, modify, view, and delete detection rules. Allows users to enable or disable an intelligent video analysis plan. Supports alarm and snapshot functions. When a person enters a specified surveillance area, the eSpace IVS system automatically generates an alarm and takes snapshots. If a user has subscribed to this alarm, the eSpace IVS system sends the alarm to the user. 5.5.4 Facial Recognition Monitoring The eSpace IVS system detects facial image information and compares the information with that in a specified facial image library. If a similar face is found, the eSpace IVS system automatically generates an alarm. Customer Benefits Facial recognition monitoring has the following benefits: The eSpace IVS system automatically recognizes key persons, such as wanted fugitives and suspects, in the surveillance area. Users can use the facial recognition monitoring function to analyze videos and quickly find whether faces similar to those in the facial image library exist in the videos. The monitoring function enhances the efficiency of video query and analysis. Scenario An eSpace IVS system has been installed in a public security department. Jason, an employee of the public security department, has set facial recognition monitoring rules and surveillance plans for a surveillance area. One day, Jason saw a facial recognition alarm. He immediately verified the captured pictures against the facial image library, finding that someone in the surveillance area is similar to a suspect. Then, Jason immediately reported this situation to relevant departments. Features The eSpace IVS system supports the following facial recognition monitoring features: Supports facial detection. Compares the detected facial information with that in a specified facial image library to find similar faces. Allows users to set detection rules and surveillance plans. Allows users to add, modify, view, and delete detection rules or surveillance plans. Allows users to enable or disable an intelligent video analysis plan. Supports alarm and snapshot functions. When detecting a facial image in the surveillance area, the eSpace IVS system captures the facial image and compares it with that in the facial image library. If similar faces are found, the eSpace IVS system generates an alarm and takes snapshots accordingly. If a user has subscribed to this alarm, the eSpace IVS system sends the alarm to the user. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 41 eSpace IVS Product Description 5 Service Features 5.6 Intelligent Storage The eSpace IVS platform provides multiple video storage modes to store valuable video files and save storage space. 5.6.1 Frame Extraction Storage Based on a user-defined storage policy, the eSpace IVS platform can periodically extract and discard non-key frames of stored video files. The reduced file size saves storage space. Customer Benefits The ability to store video with frames extracted from the original saves storage space, which reduces the operating expense (OPEX). Scenario An eSpace IVS platform is installed in a campus. A maintenance person, Jack, sets the storage mode to frame extraction. He sets the duration for storing complete videos to 7 days and the duration for storing frame-extracted videos to 30 days. With these settings, the eSpace IVS platform stores a complete video for seven days. When the storage duration exceeds seven days, the eSpace IVS platform discards non-key frames of the video. When the duration for storing the frame-extracted video exceeds 30 days, the video is deleted. Features The frame extraction function has the following features: Only videos stored on the eSpace IVS platform can be stored in frame extraction mode. The storage space can be allocated by storage duration or storage capacity. − If the storage space is allocated by duration, the eSpace IVS platform stores complete videos for a preset period. When the storage duration exceeds the preset period, the eSpace IVS platform discards non-key frames of the videos and saves the frame-extracted videos for another specified period. When the storage duration exceeds that period, the videos are deleted. − When the storage space is allocated by storage capacity, the eSpace IVS platform first stores complete videos. When the remaining storage capacity reaches a specified value, the eSpace IVS platform discards non-key frames of the earliest videos. 5.6.2 Data Buffering When cameras are disconnected from the network, the cameras can continue to shoot and temporarily store the videos in the SD cards. When the network is restored, the eSpace IVS platform sends a video request to the cameras. The cameras send the videos stored in the SD cards to the eSpace IVS platform. Customer Benefits Uses can obtain complete surveillance videos when cameras are disconnected from the network. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 42 eSpace IVS Product Description 5 Service Features Scenario An eSpace IVS system is installed on a campus. An employee, Jason, sets a recording plan for cameras with SD cards that are installed at the campus gateway. One day, the cameras at the campus gateway are disconnected from the network. The cameras continue to shoot videos and store the videos in the SD cards. When the network is restored, the eSpace IVS platform automatically uploads to the server the videos that were temporarily stored in the camera SD cards. Features The data buffering function has the following features: Only cameras with SD cards can temporarily store videos. The real-time video stream transmission is not affected when cameras send videos temporarily stored in SD cards to the eSpace IVS platform. 5.6.3 Video Archiving The eSpace IVS system allows users to archive important alarm videos based on the preset storage policies. Customer Benefits Video archiving has the following benefits: The archive saves storage space and reduces operating expense (OPEX). Archived videos contain valuable video clips that may be used in the future. Scenario An eSpace IVS system has been installed on a campus, The system maintenance administrator, Jack, has set the following video archiving parameters: Full storage period: 7 days Alarm video storage period: 30 days Key frame storage period: 100 days Pre-alarm and post-alarm recording durations: 6s each After these parameters are set, the eSpace IVS system saves the recent 7 days of complete videos and intelligently deletes most of the previous 30 days' videos except for alarm videos and 6s pre-alarm and post-alarm videos. When video files are more than 37 days old, the eSpace IVS system discards non-key frames and archives alarm videos left after frame discard. The eSpace IVS saves key-frame videos for a total of 137 days. Features The eSpace IVS system supports the following video archive features: Supports video archival for platform recordings that are configured with motion detection alarms. Supports video archival either using the storage length mode or the storage capacity mode. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 43 eSpace IVS Product Description 5 Service Features − When the video archival is defined by length, users can set a full storage period, alarm video storage period, key frame storage period, and pre-alarm and post-alarm recording duration. The eSpace IVS system stores complete video files for the full storage period. When the full storage period expires, the eSpace IVS system intelligently deletes videos in the alarm video storage period and retains motion detection alarm videos. Alarm videos retain videos recorded within the specified pre-alarm and post-alarm durations. When the alarm video storage period expires, the eSpace IVS system begins discarding non-key frames in the key frame storage period and saves the alarm videos left after frame discard. When the key frame storage period expires, the videos are completely deleted. − When the video archival is defined by storage capacity, the eSpace IVS system performs full storage first. When the storage volume reaches a certain capacity level, the eSpace IVS system intelligently deletes the earliest videos based on motion detection alarm policies and retains motion detection alarm videos. When the storage volume reaches a certain capacity level again, the eSpace IVS system starts discarding non-key frames and saves alarm videos left after frame discard. 5.7 Mobile Surveillance Users can perform live video surveillance, record videos, and take snapshots with mobile terminals. Recorded videos and captured snapshots can be stored on a local computer or the eSpace IVS platform. Customer Benefits Live video surveillance at any time, any place, enhances the surveillance efficiency. Surveillance without blind spots enhances the surveillance effectiveness. Scenario An eSpace IVS platform is installed in a campus. An employee, Jason, is scheduled to work the platform, but he cannot go into the surveillance center due to personal reasons. Jason uses an iPad to perform live video surveillance at home. Features The eSpace IVS platform supports the following mobile terminals: Smartphones, including Huawei Honor, iPhone4, iPhone4s, and other smartphones that run Android. Tablet computers, including Huawei MediaPad, iPad2, and new iPad. Only cameras on Huawei MediaPad can be used to shoot videos and take snapshots remotely. Table 5-15 describes the mobile surveillance features. Table 5-15 Mobile surveillance features Type Feature Unique features Allows users to use cameras on Huawei MediaPad to shoot videos and send the videos to the eSpace IVS platform. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 44 eSpace IVS Product Description 5 Service Features Type Feature Basic features Allows users to search for cameras by keyword or organization structure, browse live videos, and add frequently-used cameras to a favorites folder. Allows users to search by time or bookmark for videos recorded on the platform and play back the videos. Allows users to view alarm-triggered videos and acknowledge or cancel alarms. Allows users to take snapshots during live video browsing or video playback and manage snapshots. 5.8 Alarm Services When a Peripheral Unit (PU) generates an alarm, the eSpace IVS platform automatically displays live videos from the linked cameras based on a preset alarm linkage rule, notifies users of the alarm in multiple ways, and displays alarm handling suggestions. Customer Benefits When an alarm is generated, the eSpace IVS responds based on the preset alarm linkage rule, such as recording videos and taking snapshots, which helps users handle the alarm in a timely manner. Scenario An eSpace IVS platform is installed in a bank. An employee, Jason, sets an intrusion detection rule for cameras at a bank vault and an alarm linkage rule. One day, the eSpace IVS platform detects that a suspected person has entered the bank vault, generates an alarm, and invokes a linked camera to record videos. Features Table 5-16 describes the alarm service features. Table 5-16 Alarm service features Type Feature Unique features Automatically performs the following actions when an alarm is triggered: recording videos, taking snapshots, invoking presets, providing Boolean value output, displaying videos on clients or video walls, and linking Short Message Service (SMS) and Multimedia Messaging service (MMS). Notifies users of alarms in various ways, including displaying a window, playing alarm sound, blinking alarm information, and blinking alarm-triggered videos. An alarm audio file is in .wav format and must be less than 10 MB. Basic Issue 01 (2012-07-31) Allows users to set modes for executing alarm linkage actions. The Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 45 eSpace IVS Product Description 5 Service Features Type Feature features execution modes include instant execution, execution after acknowledgement, and delayed execution. Allows users to enable the function to block an alarm window all the time or the function to block an alarm window only in full-screen mode. Allows users to set a video pane as an alarm window. Alarm-triggered videos can be played only in alarm windows. Other static alarm windows cannot be used to play live videos. Allows users to play alarm-triggered videos in the last alarm window one by one or in all alarm windows in sequence if the number of alarm-triggered videos exceeds the number of open alarm windows. Allows users to set alarm types and alarm severities. Allows users to set the alarm acknowledgement modes, including automatic acknowledgement, manual acknowledgement, and delayed acknowledgement. Allows the administrator to specify types of alarm source devices and alarm severities that users can subscribe to. Allows users to query historical alarms. Allows users to acknowledge and cancel alarms. Allows the administrator to grant alarm handling permissions to users. Offers users alarm handling suggestions. Allows users to preview snapshots. Automatically generates an alarm when a digital watermark in a video is tampered. Regards alarms of the same type reported by the same alarm source within a specified duration as one alarm and records the number of the repeated alarms. Provides an alarm help document for an alarm or an alarm group. When an alarm is generated, users can open the help document to obtain alarm handling suggestions. Supports protection zone management that provides the following features: Issue 01 (2012-07-31) Allows users to create and configure protection zones. Allows users to manually deploy or withdraw alarms in protection zones. Deploys or withdraws alarms in protection zones at a specified interval. Reports an alarm when alarm deployment changes. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 46 eSpace IVS Product Description 5 Service Features 5.9 Voice Intercom and Voice Broadcast If a PU and CU are configured with speakers and microphones, a user can enable the voice intercom or broadcast function. 5.9.1 Voice Intercom With the voice intercom function, users on the CU side can talk with users at the surveillance sites. Customer Benefits Improves the communication efficiency and enhances emergency preparedness and response capabilities. Provides voice transmission services for users without wireless voice communication equipment. Reduces the costs of constructing a dedicated broadcast system. Scenario An eSpace IVS system is installed on a campus. One day, an employee, Jason, found that an object was blocking a camera at the campus gateway. Jason used the voice intercom function to talk with Jack, a security guard at the gateway. Jack checked the camera and removed the object. Features The voice intercom function has the following features: Supports G.711 audio encoding format. Supports bidirectional voice intercom. Supports volume adjustment during voice intercom. Transmits voice streams over the IP network. 5.9.2 Voice Broadcast With the voice broadcast function, users on the CU side can broadcast to PUs at surveillance sites. Customer Benefits Improves the communication efficiency and enhances emergency preparedness and response capabilities. Reduces the costs of constructing a dedicated broadcast system. Scenario An eSpace IVS platform is installed in a railway station. An employee, Jason, wants to broadcast prerecorded security precautions to the ticket office. Jason uses the voice broadcast function to add all PUs in the ticket office to a broadcast group and play an audio file in .wav format. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 47 eSpace IVS Product Description 5 Service Features Features The voice broadcast function has the following features: Supports G.711 audio encoding format. Supports real-time voice broadcast. Allows users on the CU side to broadcast to multiple PUs. Allows users to manage broadcast groups made up of PUs. Allows users to manage audio files that can be broadcast. 5.10 Electronic Map Users can query surveillance sites and alarm sources on electronic maps. When an alarm occurs, a user can quickly locate the alarm source, view surrounding situations, find an appropriate surveillance camera, and browse live videos. Customer Benefits Users can quickly locate an alarm and browse alarm-triggered videos on electronic maps, which enhances the alarm handling efficiency. Scenario An eSpace IVS platform is installed in a traffic command center. A traffic officer, Jason, imports a map of City A into the eSpace IVS platform and adds camera icons to the map where cameras are located. One day, a traffic accident happens on Road B. The eSpace IVS platform displays a blinking alarm icon on the map. Jason views the alarm and invokes the live surveillance video of Road B. Features Table 5-17 describes the electronic map features. Table 5-17 Electronic map features Type Feature Unique features Blinks alarms on the map even when the alarm layer is hidden. Basic features Allows users to zoom in and out on a map in a box-shaped area or by scrolling the mouse wheel, drag and move the map, view the map in full-screen or eagle-eye mode, pan up, down, left, and right, and control the map scale. Allows users to import map images in .jpg, .png, and .bmp formats, name and delete imported maps, and set a map as the default map for the next login. Allows users to switch between maps, while cameras and alarm sources remain correctly marked on each map. Allows users to select a surveillance site or alarm source from the Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 48 eSpace IVS Product Description 5 Service Features Type Feature organization tree and mark it on the map. Allows users to create a hotspot on a map and bind it to other maps. Allows users to create hotspot maps to quickly switch to desired maps. Allows users to display or hide map layers, including an alarm source layer and a camera layer. Allows users to click a surveillance site on the map and enable live video browsing in the displayed window. Allows users to bookmark key areas on maps to quickly locate the key areas at next login, name and delete a bookmark, and change the position of the bookmark. 5.11 Media Security The eSpace IVS system provides a digital watermark and secure media transmission to ensure the reliability and security of video files. 5.11.1 Digital Watermark Users can enable the watermark function for a specified camera in the eSpace IVS system and check the added watermarks on the eSpace IVS client. The watermark function can prevent videos from being forged, tampered with, repudiated, or copied to some extent. Customer Benefits The watermark check ensures video reliability. Scenario An eSpace IVS system has been installed in a city for the safe city project. One day, Tom (an employee in the legal affairs department) asked Jason (an administrator who has the watermark check and management right) to check the validity of the video file recorded by camera A between 00:00 and 08:00 on May 20, 2012. Jason logged in to the eSpace IVS client, enabled watermark check for camera A, and found the desired video file by specifying the time segment. Jason dragged the video file to the video pane for watermark checking. When it detected watermark tampering, the eSpace IVS system automatically generated an alarm record in the alarm window and displayed an alarm notification. Features The eSpace IVS system supports the following digital watermark features: Adds digital signatures or watermarks to the videos of specified cameras. Verifies watermarks on the videos. Generates an alarm in real time when a watermark is tampered. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 49 eSpace IVS Product Description 5 Service Features Provides query capability for historical alarms generated during watermark check. 5.11.2 Secure Media Transmission The eSpace IVS system takes certain security measures on videos to be transmitted. Customer Benefits Video security is ensured during transmission. Scenario An eSpace IVS system and cameras that support secure media transmission have been installed in some key surveillance points in a safe city project. After initializing the cameras, Jason (an administrator) enabled secure media transmission. Jim (a hacker) captured the transmitted code streams but failed to play the video because he could not crack the algorithm and key information. Features The eSpace IVS system supports the following secure media transmission features: The platform takes security measures on encoded video data before transmitting the data. The server restores and saves the videos. The server takes the security measures on the videos requested by users before transmitting the videos. The client restores and plays the videos. 5.12 System Management The eSpace IVS platform supports user management, device management, multi-level management, multi-domain management, log management, and system maintenance. 5.12.1 User Management With the eSpace IVS platform, the administrator can manage users in a centralized manner. Customer Benefits The administrator can assign multiple roles with different rights to a user. The administrator can manage roles, which improves the efficiency of managing user rights. Scenario Jason is the administrator of the eSpace IVS platform installed in a campus. Jason adds a new employee, Mary, to the platform and assigns common user roles to Mary. Features Table 5-18 describes the user management features. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 50 eSpace IVS Product Description 5 Service Features Table 5-18 User management features Type Feature Unique features Allows the administrator to assign multiple roles with different rights to a user, which facilitates user rights management. Basic features Allows the administrator to add, modify, and delete users. Allows the administrator to add, modify, and delete roles. 5.12.2 PU Management The eSpace IVS platform allows users to manage PUs that are connected to the platform. PUs include IP cameras (IPCs), Digital Video Recorders (DVRs), and Digital Video Servers (DVSs). Customer Benefits Users can manage PUs in a centralized manner. User can add and configure PUs in batches, which enhances the efficiency of device configuration. Users can allocate PUs to organizations and bind the organizations to service nodes, which maximizes the device usage. Scenario Jason is the administrator of the eSpace IVS platform installed in a campus. Jason can manage PUs on a client. Features Table 5-19 describes the PU management features. Table 5-19 PU management features Type Feature Unique features Allows users to use a Microsoft Excel template to add multiple PUs at a time to the eSpace IVS platform. Automatically allocates IP addresses to PUs by enabling the Dynamic Host Configuration Protocol (DHCP) service. Basic features Allows the administrator to add and delete devices and set device parameters. Allows users to allocate PUs to organizations and bind the organizations to service nodes when only a small number of Media Units (MUs) or Device Connection Gateways (DCGs) exist. Service nodes include media service nodes and service access nodes. An organization can be bound to a maximum of two types of service nodes. Allows users to upload upgrade files and remotely upgrade PUs in batches Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 51 eSpace IVS Product Description 5 Service Features Type Feature on clients. Allows users to allocate devices (under external or local domains) and organizations (under external domains) in batches and cancel device allocation in batches. 5.12.3 Multi-Level Management The eSpace IVS platform allows users to manage organizations by level. Customer Benefits Decreases the data transmission distance, improves the device usage, and ensures that other organization nodes are running properly when one node is faulty. Helps users to better manage a large-scale eSpace IVS platform. Scenario An eSpace IVS platform is installed in the public security departments of a city, a district, and a county. Users at the city level can manage all surveillance areas. Users at the district or county level can manage surveillance areas within their permissions and report device status to users at the city level. Features Table 5-20 describes the multi-level management features. Table 5-20 Multi-level management features Type Feature Unique features Allows the administrator to add, modify, and delete organization nodes and bind or unbind organization nodes. Basic features Manages surveillance devices by level. Manages user rights by level. Allows upper-level users to view surveillance videos of lower-level users. Allows lower-level users to report device status to upper-level users. 5.12.4 Multi-Domain Management Domains include local domains and external domains. A local domain is an eSpace IVS platform. An external domain can be an eSpace IVS platform or a third-party surveillance platform. Users with domain management rights can configure local domains to connect to external domains. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 52 eSpace IVS Product Description 5 Service Features Customer Benefits Lightens the service management load on the central platform, separates domains from each other, and improves the management efficiency. Helps users to better manage a large-scale eSpace IVS platform. Scenario An eSpace IVS platform is installed in the public security departments of City A and City B. Users in the public security department of City A can view the surveillance videos of the public security department of City B. However, when the eSpace IVS platform in City A is faulty, the eSpace IVS platform in City B is not affected. Features Table 5-21 describes the multi-domain management features. Table 5-21 Multi-domain management features Type Feature Unique features Allows users under the local domain to use external domain services, such as live video browsing, PTZ control, video playback, and alarm reporting. Basic features Managing organizations: Manages surveillance devices and user rights by domain. Allocating devices and organizations under external domains: Allows users to allocate devices under an external domain to the local domain. Allows users to allocate shared organizations under an external domain to the local domain. Allows users to cancel the device or organization allocation. 5.12.5 Log Management Users can query operation logs and PU logs. Customer Benefits Users can view operation logs to monitor operators. Users can also view run logs to monitor the running status of the eSpace IVS platform. Scenario An eSpace IVS platform is installed in a campus. As the supervisor, Jason views operation logs on a client to monitor employees. Features With the log management function, users can: Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 53 eSpace IVS Product Description 5 Service Features Record, query, filter, sort, and export operation logs. Record, query, and export run logs. Query logs by camera name, log type, and time. 5.12.6 System Maintenance The eSpace IVS system allows users to configure parameters for and manage service servers in the system. Customer Benefits The eSpace IVS system provides GUIs for configuration and management of server parameters to help users efficiently manage the system. Scenario An eSpace IVS system is installed on a campus. Jason is the administrator of the eSpace IVS system. Jason uses the client to uniformly configure and manage parameters for servers in the system. Features The eSpace IVS system supports the following system maintenance features: Classifies server parameters and queries them in fuzzy mode. Modifies server parameters uniformly. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 54 eSpace IVS Product Description 6 Reliability and Security 6 Reliability and Security About This Chapter The eSpace IVS platform features high reliability and security. 6.1 Reliability The eSpace IVS platform uses various technologies to ensure network, host, application, and service reliability. 6.2 Security To ensure the system security, the security maintenance on the eSpace IVS system is conducted at different layers, and each layer has a security solution. 6.1 Reliability The eSpace IVS platform uses various technologies to ensure network, host, application, and service reliability. 6.1.1 Network Reliability The eSpace IVS system uses various redundancy approaches to ensure comprehensive system reliability. Customer Benefits The eSpace IVS system provides a highly reliable network for users. Upon detecting a component failure, the system automatically switches services to the available component. Scenario An eSpace IVS system has been installed in a traffic surveillance center, and the management unit of the eSpace IVS system is deployed in two-node cluster mode. One day, the active host housing the management unit became faulty. Thirty seconds later, the standby host detected the active host failure and automatically took over the services. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 55 eSpace IVS Product Description 6 Reliability and Security Implementation Mechanism Table 6-1 describes the implementation mechanism of network reliability. Table 6-1 Implementation mechanism of network reliability Implement ation Mechanis m Description Networking redundancy Involves network redundancy and host redundancy: Network redundancy All network devices (such as routers and firewalls) have a backup. A heartbeat mechanism is used between routers. When the active router fails, all hosts automatically switch to the standby router. Host redundancy All hosts are deployed in two-node cluster mode. A heartbeat mechanism is used between two hosts. When the active host fails, the standby host takes over services automatically. Data synchronizat ion In two-node cluster mode, files and databases on an active host need to be synchronized to the standby host. The eSpace IVS system supports two data synchronization schemes: High reliability scheme with a mounted disk array When a disk array is mounted, the eSpace IVS system stores the data in the disk array, and such data does not need to be synchronized to the standby host. When the standby host takes over services of the active host, the disk array is automatically mounted to the standby host (that is, the new active host). Less high reliability scheme without a mounted disk array When no disk array is mounted, the active and standby hosts of the eSpace IVS system synchronize data in milliseconds. 6.1.2 Host Reliability A single host uses redundancy design for its components, such as the network adapter and hard disk, to ensure its reliability. Customer Benefits The reliability of a single host is improved. The failure of a single component does not affect the system operation. Scenario An eSpace IVS system has been installed in a traffic surveillance center. One day, the host that houses the management unit encountered a hard disk failure, but the system continued to run properly because the hard disk had a backup. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 56 eSpace IVS Product Description 6 Reliability and Security Implementation Mechanism Table 6-2 describes the implementation mechanism of host reliability. Table 6-2 Implementation mechanism of host reliability Implement ation Mechanis m Description Component redundancy Component redundancy is deployed as follows: Host monitoring Two network adapters are configured. When the active network adapter fails, the standby network adapter automatically takes over the services. Two hard disks are configured, and they are mirrored in Redundant Array of Independent Disks 1 (RAID 1) mode. The failure of one hard disk does not affect data reading or writing. The host operating system is monitored, and thresholds for monitored items are set. The monitored items include disk usage, CPU usage, memory usage, and I/O status. When a monitored item exceeds the preset threshold (for example, the disk usage reaches 95%), an alarm is generated, prompting users to handle the alarm in time. If an alarm for disk usage is generated, users can delete unnecessary files or add a hard disk. 6.1.3 Application Software Reliability The eSpace IVS system ensures the reliability of application software by software programming. Customer Benefits Application software reliability has the following benefits: The application software can automatically recover from a fault (for example, massive access, memory access violation, or other exceptions), improving the running reliability of a single host. A notification is sent to users when an application software fault needs manual processing. Scenario An eSpace IVS system has been installed in a traffic surveillance center. One day, the eSpace IVS system was attacked by massive malicious access. When detecting this attack, the eSpace IVS software automatically denied the excess access traffic, ensuring the proper running of the eSpace IVS system. Implementation Mechanism Table 6-3 describes the implementation mechanism of application software reliability. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 57 eSpace IVS Product Description 6 Reliability and Security Table 6-3 Implementation mechanism of application software reliability Implement ation Mechanis m Description Traffic control The maximum number of live videos and the maximum number of video recordings are preset on the media server according to the server's performance. When the number of video requests exceeds the preset maximum, the media server rejects additional requests, ensuring its stable running. The maximum number of concurrent requests is preset on the management server according to the server's performance. When the number of concurrent requests exceeds the preset maximum, the management server rejects additional requests, ensuring its stable running. The application software automatically starts upon system startup. The monitoring program monitors the application software status. Upon detecting that the software is not found or does not respond, the monitoring program automatically restarts the software. An alarm is generated and sent to the eSpace IVS client when the application software encounters any exception. Users then can handle the fault in time. Some application software alarms can be automatically cleared. The application software periodically detects whether an alarm is cleared. Upon detecting that an alarm has cleared, the application software generates a clear alarm, with no need for manual confirmation. Periodic database backup and recovery Application software monitoring Backup and recovery When the database encounters an exception (for example, file damage), users can restore the latest backup data, mitigating data loss. Log compression and backup When disk space occupied by log files reaches the preset maximum, the system automatically compresses and saves the earliest logs. When the size of the saved log files exceeds the preset threshold, the system automatically deletes the earliest files. 6.1.4 Service Reliability After the eSpace IVS system recovers from a fault, its services automatically restore. Customer Benefits Service reliability has the following benefits: Ensures that services are stable. Complies with the operation habits of users. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 58 eSpace IVS Product Description 6 Reliability and Security Scenario An eSpace IVS system has been installed in a traffic surveillance center. One day, Jason (an employee in the surveillance center) checked camera A in a video wall and found that it suddenly went offline due to a network connectivity issue. Under such circumstances, Jason did not need to take any further action because the eSpace IVS system would automatically restore this camera after detecting that the network connectivity for camera A recovered. Implementation Mechanism The eSpace IVS system restores the video playing of a camera after the camera recovers from a network connectivity issue, power outage, and other faults. 6.2 Security To ensure the system security, the security maintenance on the eSpace IVS system is conducted at different layers, and each layer has a security solution. The eSpace IVS system is divided into the following layers: Application layer System layer Network layer Management layer 6.2.1 Security Solution at the Application Layer To secure data transmission, exchange, storage, and processing, the eSpace IVS platform provides the following measures: Authenticates user login by means of Hypertext Transfer Protocol Secure (HTTPS). Empowers users to set strong passwords. Encrypts all passwords. Prevents user accounts and passwords from being cracked (an account will be locked if a user fails to log in for three consecutive times). Authenticates all service requests. Transmits sensitive data, such as user passwords, through HTTPS channels or in key negotiation mode. Records security events and operation events in logs. Authenticates all access modes. Illustrates all communication ports in the communication matrix. 6.2.2 Security Solution at the System Layer The eSpace IVS platform provides various measures to secure the operating system, database, middleware, and Web or Secure File Transfer Protocol (SFTP) servers. System layer security includes the following solutions: Overall system security solution Operating system security solution Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 59 eSpace IVS Product Description 6 Reliability and Security Database security solution Web server security solution Overall System Security Solution Users can install the Web server, database server, and Domain Name Server (DNS) on different servers. Operating System Security Solution Antivirus solution − Uses OfficeScan to guard the Windows operating system against virus attacks. − Uses ServerProtect to guard the SuSE Linux operating system against virus attacks. Security hardening solution − Uses SetWin to harden the Windows operating system. − Uses Huawei-developed Breeze MainAst to harden the SuSE Linux operating system. Database Security Solution Uses secure PostgreSQL and Oracle databases of the mainstream version and hardens the databases. Web Server Security Solution Hardens the Web server and complies with a series of security regulations for developing web applications. 6.2.3 Security Solution at the Network Layer The eSpace IVS platform provides the following measures to ensure network layer security. Network topology security design: Virtual Local Area Network (VLAN) division, distributed deployment, security device deployment Network device hardening Network isolation: network segment isolation, switched network, and VLAN Network border protection: firewall technologies, such as packet filtering, application gateway, and firewall status check Network security detection: intrusion detection system and log auditing Network data encryption: data encryption using Secure Shell (SSH) or Secure Sockets Layer (SSL) Network security scanning: active preventive mechanisms to prevent various malicious attacks, such as scanning attacks and malformed packet attacks 6.2.4 Security Solution at the Management Layer The eSpace IVS platform provides the following measures to ensure management layer security: Technical Measures Technical measures include but are not limited to the following aspects: Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 60 eSpace IVS Product Description 6 Reliability and Security Allows only the administrator to delete operation, security, and run logs generated by the eSpace IVS platform. Uses the antivirus software, OfficeScan, to scan software and patch packages. Verifies the integrity of software and patch packages to avoid data tampering. Non-Technical Measures The eSpace IVS platform provides technical support documents, such as a communication matrix, security technology white paper, security hardening guide, and antivirus guide. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 61 eSpace IVS Product Description 7 Operation and Maintenance 7 Operation and Maintenance About This Chapter The operation and maintenance meet the requirements on various scenarios such as deployment, routine maintenance, troubleshooting, and system expansion. 7.1 Service Management System Users can log in to eSpace IVS clients to perform routine maintenance. 7.2 eSpace NMS The eSpace Network Management System (NMS) manages all network elements (NEs) deployed in the eSpace IVS platform in a centralized manner. The NEs include PUs, server software, Network Video Recorders (NVRs), eSpace IVS servers, and network devices. 7.1 Service Management System Users can log in to eSpace IVS clients to perform routine maintenance. Table 7-1 describes the service management systems for the two default roles: system administrator and operator. Table 7-1 Service management systems Role Service Management System Description System administrator and operator C/S client Users can log in to CUs in C/S structure to perform the following video surveillance services: Issue 01 (2012-07-31) Live video browsing Video playback Electronic map Video wall Intelligent video analysis Alarm management Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 62 eSpace IVS Product Description 7 Operation and Maintenance Role Service Management System B/S client Operators Mobile clients Description Video management Snapshot management Local parameter settings Alternating display management PU management Service node management Organization management Role management User management Device allocation management Domain management External system management Storage space management Plug and play Device upgrade System maintenance Log query Users can log in to CUs in B/S structure to perform the following video surveillance services: Live video browsing Video playback Alarm management Parameter settings Users can use Huawei MediaPad, iPad2, new iPad, and smartphones including Huawei Honor, iPhone4, iPhone4s, and other smartphones that run Android to perform the following video surveillance services: Live video browsing Video playback Alarm management Parameter settings 7.2 eSpace NMS The eSpace Network Management System (NMS) manages all network elements (NEs) deployed in the eSpace IVS platform in a centralized manner. The NEs include PUs, server software, Network Video Recorders (NVRs), eSpace IVS servers, and network devices. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 63 eSpace IVS Product Description 7 Operation and Maintenance Figure 7-1 shows the management scope of the eSpace NMS. Figure 7-1 Management scope Based on the B/S structure, the eSpace NMS consists of eSpace NMS clients and eSpace NMS servers. eSpace NMS servers can manage alarms, tracing, performance, devices, and logs of NEs in a centralized manner and report associated information to eSpace NMS clients. The eSpace NMS client provides a graphical user interface (GUI) for users to manage topologies, alarms, configurations, devices, and logs. The eSpace NMS provides the following functions: Device access Topology management Alarm management Performance management Statistical reports Log management Database management Device Access The eSpace NMS supports the unified access of NEs, such as NVRs, IPCs, Surveillance Data Unit (SDUs), servers, and network devices, which helps to collect and manage device alarms, performance, and topologies in a centralized manner. Topology Management The eSpace NMS obtains device topology information using Uniform Operation and Maintenance Agent (UOA), Alarm Monitor of Outsourcing System (AMOS), or Simple Network Management Protocol (SNMP) and displays the topology information on eSpace NMS clients. Users can perform the following operations on eSpace NMS clients: View topologies: Allows users to view a topology that shows the links between NEs. Query NEs in a topology view: Allows users to query basic information about NEs in a topology view. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 64 eSpace IVS Product Description 7 Operation and Maintenance Edit NEs in a topology view: Allows users to add NEs, create links between NEs, and move NEs in a topology view. Locate NEs a topology view: Allows users to quickly locate NEs by type, content, and search range. A subnet is a group of devices or NEs. Lower-level subnets can be created under a subnet. Each subnet corresponds to an organization. Alarm Management The eSpace NMS obtains device alarm information using UOA, AMOS, or SNMP and provides the following functions: Alarm collection: Collects alarms reported by PUs, eSpace IVS modules, servers, operating system, and database. Alarm handling: Allows users to acknowledge and clear alarms. Alarm help: Allows users to view the help document if needed to quickly locate the fault when an alarm is generated. Alarm query: Allows users to query alarms by NE name, NE type, alarm severity, and alarm generation time. Alarm browsing: Allows users to browse the latest alarms. Alarm acknowledgement and unacknowledgement: Allows users to acknowledge an alarm, indicating that measures have been taken to handle the alarm, such as delivering a trouble ticket (TT) or rectifying a fault. If a user finds that no measure has not been taken to handle an acknowledged alarm, the user can unacknowledge the alarm, indicating that the alarm has not been handled. Remote alarm notification: (A short message service center (SMSC) or mail server has been configured.) Allows users to set user information such as user name, fixed-line phone number, email address, and mobile phone number and remote alarm notification conditions such as alarm type and alarm severity. When an alarm occurs, the eSpace NMS notifies users of the alarm by SMS message or email, which helps maintenance personnel monitor alarms in real time when they are away from the equipment room. Alarm clearance: Allows users to clear alarms when faults are rectified. Performance Management The eSpace NMS obtains device performance information using UOA, AMOS, or SNMP and provides the following functions: Collects statistics on device performance: The eSpace NMS can periodically collect key performance data from NEs based on conditions set by users, such as the measurement unit and statistical cycle. Monitor device performance: The eSpace NMS displays the monitoring results in bar charts or line charts to clearly show the performance trend. Maintenance personnel can avoid potential risks by taking active measures before a performance counter reaches its threshold. Statistical Reports The eSpace NMS can collect statistics on video surveillance device status by manufacturer, PU type, or area, and collect statistics on device fault rate (such as SD card, hard disk, or video diagnosis fault rate) and generate statistical reports. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 65 eSpace IVS Product Description 7 Operation and Maintenance Log Management On the eSpace NMS clients, users can manage operation logs, system logs, and security logs recorded in the eSpace NMS. By viewing the logs, maintenance personnel can quickly analyze and locate faults. Operation logs: record information about all operations performed by eSpace NMS users, including user name, operation name, operation time, operation, and result. System logs: record important events in the eSpace NMS, for example, system running exceptions, network faults, and system attacks. With these logs, users can analyze the system running status and rectify faults. Security logs: record information about eSpace NMS security operations, such as server login, password change, NE creation, and server logout. Database Overflow Alarm Settings Users can set the database capacity threshold in the eSpace NMS. When the size of stored data files exceeds the preset threshold, the eSpace NMS generates an alarm, indicating a database overflow and reminding users to back up and clear the data files. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 66 eSpace IVS Product Description 8 Technical Specifications 8 Technical Specifications About This Chapter This topic describes the performance indicators and standards compliance of the eSpace IVS system. 8.1 Performance Indicators This topic describes the performance indicators of the eSpace IVS system. 8.2 Protocols and Standards This topic describes the international protocols and industry standards that the IVS eSpace system complies with. 8.1 Performance Indicators This topic describes the performance indicators of the eSpace IVS system. Table 8-1 describes the performance indicators of the eSpace IVS system. Table 8-1 Performance indicators Performance Indicator Specification Overall server performance Maximum of 100,000 operation logs. If the server has insufficient space, the system overwrites the earliest logs. Maximum of 100,000 alarm logs. If the server has insufficient space, the system overwrites the earliest logs. One license per management server. Maximum of 16 accounts per client. Up to eight levels of catalogs and 256 cameras per catalog in the favorites folder. One channel-associated voice played per client. Maximum of 64 decoders per client. Overall client performance Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 67 eSpace IVS Product Description 8 Technical Specifications Performance Indicator Specification Access performance Device access: Maximum of 5000 main devices or 10,000 cameras per management server. The smaller value of these two parameters is used. Maximum of 128 MDUs and 128 MRUs per management server. Maximum of 128 MU POP nodes per management server. Maximum of 128 DCGs per management server. Maximum of 1000 alarm sources per DCG. Maximum of 128 external domains, 100,000 cameras in external domains, and eight levels of inter-domain connections per management server. Maximum of 100,000 alarm sources from external domains per management server. User access: maximum of 2000 login users per management server. Alarm performance Real-time browsing Camera sequence Tour Issue 01 (2012-07-31) Maximum of 100,000 alarm records. Up to 500 alarms of a specified alarm type per subscriber. 30s alarm suppression by default. 200 real-time alarms displayed on the client. Up to eight levels of definable alarm severity. A smaller value indicates a higher alarm severity. Maximum of 1000 surveillance areas per management server and maximum of 128 alarm sources per surveillance area. Maximum of 64 decoders per C/S client. Maximum of 32 decoding channels during video switching with the network digital keyboard. Real-time browsing enabled within 3s on average. One channel-associated voice played per client. One voice intercom or voice broadcast enabled per client. Maximum of 256 PUs per voice broadcast. Camera sequencing at an 8s to 600s interval. Maximum of 16 camera sequence resources, each of which can contain a maximum of 512 cameras. One camera sequence plan, which supports a maximum of 16 camera sequence resources. Maximum of 16 tour tracks per camera. Maximum of 20 presets per tour track. Dwell time from 0s to 3600s at each preset. The value 0s indicates no dwell, and the default value is 30s. One tour plan per tour track. Maximum of 16 tour plans per camera. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 68 eSpace IVS Product Description 8 Technical Specifications Performance Indicator Specification PTZ Maximum of 128 presets per camera. Waiting duration from 30s to 3600s at a home position. The default value is 300s. Automatic unlock time from 0s to 300s. The value 0s indicates that the PTZ is not automatically unlocked, and the default value is 300s. Pictures in .bmp or .jpg format. The default format is .jpg. Manual snapshot interval of at least 0.5s. Automatic snapshot interval from 1s to 10s. The default value is 5s. Automatic capture of 1-1000 snapshots. The default value is 10. 320 TB storage device per MRU. Successive recording for 1-365 days per camera. Alarm-linked recording duration from 60s to 3600s. The default value is 300s. Recording files saved in units of 30 minutes. Up to eight recordings played concurrently. Maximum of 256 cameras per broadcast. One local audio file per broadcast. Map pictures in .bmp, .jpg, or .tif format. Maximum size of 128 MB and resolution of 4096*4096 for each map. Maximum of 64 maps. Maximum of 10 levels of organization (excluding top organizations) and a maximum of 99 organizations under each organization level. Maximum of 5000 organizations managed per Service Control Center (SCC). Snapshot capturing Video recording Voice broadcast Electronic map Organization management User management Maximum of 5000 users managed per SCC. Role management Maximum of 5000 roles managed per SCC. 8.2 Protocols and Standards This topic describes the international protocols and industry standards that the IVS eSpace system complies with. Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 69 eSpace IVS Product Description 8 Technical Specifications 8.2.1 International Standards This topic provides the international protocols and standards that the eSpace IVS system complies with. Table 8-2 lists the protocols and standards supported by the eSpace IVS system. Table 8-2 International protocols and standards Protocol Type Protocol/Standard Digital video encoding standard ITU-T H.264 (MPEG 4 part 10) Transmission Control Protocol (TCP) RFC0872 Internet Protocol (IP) RFC1356 TCP and User Datagram Protocol (UDP) Hypertext Transfer Protocol (HTTP), version 1.1, January 1999 ISOC/RFC2068 Pulse Code Modulation (PCM) of audio signals CCITT G.711 Recommendations (1988) Real-Time Transport Protocol (RTP) and Real-Time Transport Control Protocol (RTCP) RFC1889/RFC1890 IP-based audio and video communication protocol suite H.323 Real-Time Streaming Protocol (RTSP) RFC2326 Session Description Protocol (SDP) RFC2327 Session Initiation Protocol (SIP) RFC3261 Network video interface standard protocol ONVIF 8.2.2 Industry Standards This topic provides the industry standards that the IVS eSpace system complies with. Security Protection Engineering Procedure and RequirementsGA/T75-94 Universal Graphic Symbols for Security Protection SystemGA/T 74-2000 Technical Requirements for the Monitor and Control System for Video Security ProtectionGA367-2001 Technical Standard of City Area Monitoring And Alarming NetworkGA/T669–2008 User Terminal Device Resistance Over-Voltage and Over-Current Capacity Requirements and Test MethodsYD/T870-906 Safety of Information Technology Equipment Including Electrical Business EquipmentGB4943-95 Electrical Installations Design Code for Explosive Atmospheres and Fire HazardGB50058-92 Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 70 eSpace IVS Product Description 8 Technical Specifications China Mobile Video Surveillance Service SpecificationQB-009QB-D-009-2011 Security and Protection Video Monitoring Network System Technical Specification for Information Transport, Switch and ControlGB/T 28181-2011 Issue 01 (2012-07-31) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 71