You are at : Search > Articles Search Results

Articles Search Results

6 Articles and 28 related Products found for SOA

NXP launches new PoE family

NXP launches new PoE family

Editor / Provider: NXP Semiconductors | Updated: 4/26/2013 | Article type: Component

NXP Semiconductors launched a new family of NextPower Live MOSFETs designed specifically for PoE applications. Building on NXP's strength in power MOSFETs, the new devices – PSMN040-100MSE and PSMN075-100MSE – provide twice the level of inrush current capability of competitive offerings, making them ideal for high-power PoE architectures (30W and above) such as PoE+, UPoE and LTPoE++.

PoE is becoming an increasingly popular way of powering devices through an Ethernet cable/port rather than using a separate mains supply. Initially used for low-power devices such as VoIP phones, new approaches including UPoE and LTPoE++ are enabling higher power devices such as large LCD PoS displays and 3G/4G wireless access points to run at up to 100 W. However, in such high power environments, the power sourcing equipment (PSE) – such as a network router, switch or midspan – can suffer serious damage if a short circuit or fault in the powered device (PD) causes a power surge that is not controlled in time.

These new, higher power systems are placing greater demands on the MOSFETs used to supply and protect such equipment. NXP's new NextPower Live PoE MOSFETs have a safe operating area (SOA) that is twice as capable as existing solutions, providing higher levels of protection and system reliability.

NXP's new PoE devices also offer very low RDS(on) and come in the ultra-reliable LFPAK33 package, which is footprint-compatible with similar devices.

“Power over Ethernet is a rapidly evolving technology that requires every component in the PoE ecosystem to keep up if it's to be more widely adopted,” said Chris Boyce, MOSFET business manager, NXP Semiconductors. “New high-power standards require high-performance protection solutions. This new class of devices from NXP delivers twice the capability of existing PoE MOSFETs and we believe will play an important role in the ongoing adoption of high power PoE.” Links

Service-Oriented Architecture in PSIM Deployment and Processing Part 2

Service-Oriented Architecture in PSIM Deployment and Processing Part 2

Editor / Provider: Submitted by CNL software | Updated: 4/19/2012 | Article type: Tech Corner

- A true SOA PSIM deployment should traverse services in its architecture via messaging queues.
- Each service in an SOA should be kept as light as possible, minimizing resource overhead against performance.

DESIGN MATTERS
A PSIM event pipeline is only as good as the weakest link in the chain, so it is essential to apply the same innovation and attention to detail in the links among its services.

A true SOA PSIM deployment should traverse services in its architecture via messaging queues. These queues ensure that the first message delivered to a service is the first message processed. Most software developers simply select a queuing technology and apply it throughout their solution. Not all messaging technologies are created equal, though.

Some are geared for speed, some for reliability, and some for flexibility. A well-architected SOA solution should utilize the most appropriate technology at each communication boundary, making best use of each to allow the solution to process events smarter, faster and unobstructed. It is essential that each queue is wrapped with intelligence to ensure that every event is processed, analyzed and logged as necessary to provide the best security response in real time. These wrapped, intelligent queues rely on the messaging system that underlines its SOA implementation, thus ensuring every event/ message ends up in the right place at the right time.

Even bad messages are collected, stored and logged, within “poisoned” message queues, allowing for the analysis and reporting of bad messages within a system. In any system that does not provide this functionality, operations would be brought to a standstill as services failed to cope with the corrupted messages. This also brings about an increase in security, as any messages that do not conform precisely to the expected structure and content are isolated and stored, therefore unable to have any performance effect on the overall PSIM solution.

TCO REDUCTION
TCO reduction benefits both integrators and end users. The key benefit here is that each service can be deployed on hardware tailored to suit its needs. This significantly reduces the cost of hardware as overspecified, underutilized hardware becomes a thing of the past. Excess capacity can optionally be utilized by instances of other services, to realize the full ROI on hardware and infrastructure.

SMALL SCALE
Each service in an SOA should be kept as light as possible, minimizing resource overhead against performance. A good PSIM vendor should be constantly refining the performance and resource consumption of its event- and alarm-handling services in order to reduce the footprint on expensive, underlying hardware infrastructure.

SOA offers small security operations the ability to minimize infrastructure requirements by deploying multiple services on the same hardware. Depending on customer requirements, this can be deployed on as little as a single server. As the requirements grow, SOA allows the infrastructure to grow proportionally with it, moving out services to their own dedicated hardware, as demand on the system dictates. This separate hardware needs only to satisfy the specification requirements for the specific service being loaded onto it, rather than requiring multiple expensive core servers for each growth cycle, as is so typical with most non-SOA PSIM deployments.

MEDIUM TO ENTERPRISE
In larger deployments where capacity goes beyond individual units, the cost of scaling is significantly reduced with SOA. Where some deployments require additional core servers to extend capacity, SOA only requires additional service nodes where additional provision is required.

Additional nodes are tailored to requirement, investing only in the necessary hardware to provide the capacity needed. In security, planning is always for a major event, not the day-to-day operation of a system, and this is where SOA shines in the large deployment scenario. Multiple services can be deployed within each hardware region and dynamically activated, increasing capacity in functional areas of the software to suit demand as it occurs.

AFFORDABLE CAPACITY
Simply developing software as separate modules and publishing them as services does not necessarily mean that the developer's architecture is truly service-oriented. In a true SOA product, services are independent, capable of operation without dependency. Services are scalable; additional services can be added to a system, providing immediate increase in capacity, processing power and/or redundancy.

Without a SOA, a PSIM system will not provide sufficient capacity at each stage of the PSIM event pipeline, which in turn causes huge spikes in demand for processing capacity. The system will most likely become unstable during times of high stress, ironically just when there is the greatest need for a PSIM solution.

Service-Oriented Architecture in PSIM Deployment and Processing Part 1

Service-Oriented Architecture in PSIM Deployment and Processing Part 1

Editor / Provider: Submitted by CNL software | Updated: 4/17/2012 | Article type: Tech Corner

- PSIM solution will need to provide the highest level of assurance that all information required will be available when needed.
- Each service within a SOA deployment should have a single functional responsibility
- SOA enables a PSIM application to process event data in real time

In any PSIM deployment, the day-to-day information load is relatively minimal. The challenge is the response to a sudden surge in this load, caused by a critical event or disaster scenario, comprised of multiple events happening at the same time. It is in these scenarios that a PSIM solution will need to provide the highest level of assurance that all information required will be available when needed. In addition, the solution will need to remain highly responsive, providing essential intelligence and data analysis, to enable security operators to react and respond immediately.

Service-oriented architecture (SOA), simply put, is a series of methodologies adopted to create separate software modules which, while interoperable, are independent to one another. This is referred to as “loose coupling” and is essential to an enterprise-grade, SOA-based solution.

Each service within a SOA deployment should have a single functional responsibility; such as reporting, authentication or communication. It is this separation of functional units that drives the benefits of SOA. Loosely coupled services allow developers to increase flexibility across networks and infrastructure boundaries, expanding capacity, distributing load and removing bottlenecks. Secured, published “end points” share the functionality of each service across the deployment, and with linked systems such as accounting or reporting. This enables greater PSIM integration with business systems and processes.

PSIM IN REAL LIFE
SOA enables a PSIM application to process event data in real time, as well as update operators and security personnel with the information they need both in the control room and in the field. The use of independent, stateless services provided by SOA brings new levels of availability, performance and capacity, while also improving disaster recovery of the PSIM solution. These are built into the application architecture, so are intrinsic before considerations are made at the platform or infrastructure level. This same stateless nature reduces the costs of growth and maintenance, and future high availability and disaster recovery (HA/DR) concerns, reducing the overall TCO.

The availability of data and the timely response to it are essential to a successful security operation. Information should be available to operators in real time. However, as deployments and security operations grow, too much information can lead to information overload. This dramatically reduces the effectiveness of security resources.

The follow-up to an incident needs to be tightly aligned to SOP while remaining unobstructed, allowing delivery of mission-critical information and analysis to security personnel, without the need for manual intervention. Security operators need to react as soon as possible to events, and the slightest delay can seriously impact the outcomes. Waiting for a PSIM system to catch up is not an option.

The four key areas that form the PSIM event pipeline are: event collection; event filtration; intelligent analysis; and alarm/response generation. Address each individually, refining and optimizing the way PSIM behaves in each area, to provide complete situational awareness in the fastest possible time.

Implementing SOA in a PSIM deployment ensures each of these vital steps within the event pipeline is separated into individual elements as a part of the greater software solution. Each service is concerned only with that step in the pipeline, and as such is developed and refined to excel in that function, unimpeded by other areas of the system.

Subsequently, each area is independently scalable, allowing PSIM solutions to scale only where additional capacity is required. This dramatically increases the cost effectiveness of upgrades required by growth in the security deployment.

In this SOA environment, each of the services is a completely stateless entity. This means multiples of each service can be added to a deployment to support operational requirements. For example, where HA/DR is needed, it can be added without having to upgrade the whole solution. Services can be added or removed from a deployment, even dynamically, allowing for 100-percent uptime during maintenance or dynamic increases in resource availability during those critical burst demands on the various systems seen during major incidents.

Service-oriented Architecture (SOA) Enables Cloud-based Computing in Security

Service-oriented Architecture (SOA) Enables Cloud-based Computing in Security

Editor / Provider: Submitted by UTC Climate, Controls & Security | Updated: 4/12/2012 | Article type: Tech Corner

- The existing standards: PSIA and ONVIF
- Web services are emerging as the most suitable technology to guarantee interoperability
- The cloud is clearly the emerging example of where openness can take the security industry.

Existing Standards
There is a need for standards written to address interfaces beyond network video products. PSIA has done more work in this area than ONVIF, which originally more narrowly focused on its goal of providing a global open network interface standard for physical IP-based video equipment. Work is ongoing to expand the standard into the access control space. PSIA, alternatively, began with a broader agenda as witnessed by the creation of PSIA's Area Control Working Group in order to develop specifications for independently developed access control and intrusion systems, to interoperate with each other and other PSIA specification-compliant devices.

In late 2011, PSIA announced the release of its Area Control Version 1.0 specification to standardize the communication into access control and intrusion products. The Area Control specification, PSIA's fourth system-oriented specification, was achieved with broad industry collaboration from companies such as Lenel, Mercury and Honeywell, representing more than two-thirds of the access control and intrusion systems market.

Standards allow an industry to agree on the language definitions and grammar acting as a universal translator for everyone, so that vendors can innovate and provide higher functionality in their products. The classic example of a successful standard is networking protocol TCP/IP. Companies are not trying to make a special version of TCP/IP. Using the standard, they instead drive innovation in other areas.

However, standards only expose the basic interactions among systems, databases and devices. Vendors tend to keep their “secret sauce” outside of those standards-based ways of exchanging data. This can be a result of intentional omission to preserve product differentiation or the inherent lag in the standards body's ability to incorporate new technologies and approaches. Ultimately, standards serve as a starting point for integration, but never the end-all, be-all solution.

Opening in the Cloud
In many ways, Web services are emerging as the most suitable technology to guarantee interoperability, allowing for easy and fast integration, thanks to source code generation through the standardized Web Services Definition Language. In addition, several rich and well-tested frameworks already exist in Web services. In fact, ONVIF does not see any other technology on the market providing such broad device support capabilities as Web services. It is not surprising that simple object access protocol (SOAP), an XML-based messaging protocol that Web services utilize for communication, is a popular buzzword currently in the security industry.

ONVIF's Core Specification 1.0 defines a network video communication framework based on relevant IETF and Web services standards, including security and IP configuration requirements. Having this in place will make it easy for manufacturers to develop fully interoperable products. Web services are also very suitable for other applications/devices, including as access control, and can be accessed through an open type of interface and then connected to other applications.

Cloud-based computing, which delivers hosted services over the Internet, is increasingly being held up as a new model of efficiency by the IT industry, and the move to the cloud has its own valuable opportunities for the security industry. Video, in particular, is emerging as a technology area where the cloud holds great promise. As with any key technology advance, the solutions that intend to employ that technology must properly evolve their solutions to appropriately provide the benefits without introducing unnecessary complications.

There are three primary categories of cloud-based computing: infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS). An important area of IaaS for the security industry is cloud-based storage.

Many large global organizations are forced to manage literally thousands of DVRs and NVRs. With cloud computing and server virtualization, that kind of video storage can be centralized and put into the cloud and managed as ubiquitous storage. Video storage can be centralized in the cloud, centrally managed and monitored. That is only doable when you have standards and open architectures. It could never occur in a proprietary environment.

Brave New World
The cloud is clearly the emerging example of where openness can take the security industry. With the cloud, openness is more achievable; or to put it another way: without openness, the cloud is unachievable. Service-oriented architecture (SOA) is a key enabler for cloud-based computing, maximizing IT efficiencies in terms of server management, infrastructure availability and maintenance costs.

What makes SOA attractive is that manufacturers and developers can now create various Web services that are totally uncoupled from the user interface and allow for access from a plethora of platforms. In addition, SOA provides a clear pathway to appliance, cloud, hosted/managed, mobile, PSIM and VMS solutions that the marketplace is demanding.

As the security industry continues to embrace open systems and standards, proponents of “openness” are finding that the integration of disparate systems and devices is a work in progress. Industry consensus is that an open architecture is one of the most important requirements in designing flexible, scalable and interoperable security systems.

A winning solution will be one that appropriately leverages each of these elements into a solution that allows administrators to efficiently configure devices, users and business rules that provide information to operators in intuitive and innovative ways, ensuring the protection of a facility's people, property and assets.

Los Angeles Airports Order Imageware Biometric Credential Solutions

Los Angeles Airports Order Imageware Biometric Credential Solutions

Editor / Provider: ImageWare Systems | Updated: 2/3/2012 | Article type: Infrastructure

ImageWare Systems, a leader in multimodal biometric security solutions, announced that Los Angeles World Airports, a City of Los Angeles department that owns and operates Los Angeles International, LA/Ontario International and Van Nuys airports, has placed an order for a number of biometric identity management and credentialing software products developed by ImageWare Systems. These software products will provide the foundation for a new biometrically enabled identity management and credentialing system used to identify airport employees, contractors, and police at LAX and Ontario airports. Among the products ordered are ImageWare's multi-biometric capture application, as well as multiple identity management and credential issuance modules that are part of ImageWare's SOA-based suite.

Once professional services for customization and implementation have been added, the total value of the LAWA project to ImageWare is expected to be approximately $1 million for the first year.

“ImageWare is proud to play a role in enhancing security at one of the world's busiest airports”, said Jim Miller, Imageware Chairman and CEO. “Using our patented biometric management capability, we look forward to working with LAWA to create a model system for airports around the globe.”

Mega Network Video Management Systems

Mega Network Video Management Systems

Editor / Provider: a&s International | Updated: 2/27/2008 | Article type: China Corner

The reliability of IP solutions is still open to question due to bandwidth limitations and unstable network environments. Network video management systems managing more than 10,000 surveillance sites and systems, however, have been widely implemented in China. The key element is cooperation among leading companies from telecommunications and software to hardware providers.

While network cameras and NVR products were unveiled in China in 2005, early network environments suffered from flaws. To remedy this, partnerships between telecommunication providers and electronic security providers helped deliver complete network video management solutions. Telecommunicat ion providers like China Telecom partnered with Huxinhutong on video management platforms for various MegaEyes projects(name registered by Huxinhutong in 2001). This cooperation encouraged China Netcom to come out with a similar customized bandwidth service: CNC View. Both are meant to provide suitable networking environments for different security demands to manage the huge amount of video data streaming via network infrastructure from public security, enterprise surveillance and personal home security along with supporting 3G mobile image transmission.

MegaEyes and CNC View have further improved their services by dividing product offerings into equipment and system platforms for easy maintenance. All customers have to do is call China Telecom or China Netcom. MegaEyes and CNC View offer telecommunication-based, enterprise-based or home security-based systems. These two nationwide projects have garnered strong backup from device and system platform suppliers.

Major platform providers involved include Huxinhutong, Kedacom and ZTE. These are able to offer complex systems, technical support and hardware via partnerships with suppliers.

In the provinces, cooperation between manufacturers and local telecommunication companies is ongoing as well. Often, this is on Safe City projects, where video monitoring and site management are the main objectives. These system suppliers are often security product makers with excellent software R&D capabilities such as HuangHe, Launch and Skyvision.

Their software platforms focus on surveillance management, unlike MegaEyes or CNC View, which include more optional functions for telecommunication- based calculation of user fees or enterprise-based ones commercial information with images sent to users or notification via SMS.

Multiple System Management Platform

For large network video management platforms connecting numerous systems and sites, MegaEyes solutions and services cover banking, the environment, public security, schools, enterprises and telecom data management. Platforms are differentiated by core functions and customization. Huxinhutong the only platform provider that can use MegaEyes as its trading logohas been working on telecom management platform solutions since 2000; its complex platform is based on mature technology, while customization can be implemented in a short time.

ZTE has multi-service management software to switch platforms and functions. If, for example, the platform is meant to be installed for equipment room surveillance, the unit would include functions to report working device status as well as alarm triggering protection and notification. For customs, the management platform might include mobile surveillance of freight.

"Video Digital technology's true value to security is realized when it is seamlessly integrated into a total security knowledge management solution," said Zhou Shengqiang, Security Product Director at Kedacom. "With seamless integration, there is a single system based on scalable distributed architecture, in which various components can be seamlessly plugged through well-defined open interfaces, behaving as an integral part of this system."

To provide a system that integrates access control, video surveillance and environment monitoring, the system must be open and standard-based to connect with all card readers, cameras, sensors and management consoles. In addition, system architecture should be IP-based to distribute applications and intelligence at the edge of the network, while connecting to backend management consoles. Ideally, it should integrate security, building automation and IT operations as well.

In order to achieve the goal of open architecture, Huxinhutong and Kedacom are working continuously on MegaEyes standards with China Telecom, said Li Yang, General Manager of Huxinhutong. The third version of the standards will enhance development of network video management systems since large applications have strict demands for functionality, stability and compatibility. The guidelines indicate all regulations and specifications of hardware devices connecting to major platforms.

Huxinghutong has also worked with many IT companies like IBM, Nokia and Siemens to make its management systems more compatible and powerful in both hardware and software environments. In 2006, IBM upgraded cooperation with Huxinhutong, providing its powerful BladeCenter HS21 server for MegaEyes.

"For public security or enterprise applications, information is stored in multiple level databases," said Li Chunhua, Security Product Director at ZTE. "Such systems are meant to grant access to information as determined by security administrators to reduce the risk of major system breakdown when one centralized system processes huge data streams at the same time."

Large video management platforms feature powerful transmission with multiple methods (IP, E1, HDSL, CDMA/GPRS, BWA, microwave and 3G) as well as flexible networking methods(P2P and P2MP ) , high-resolution image quality, and easy image switching and display. The platform supports device management functions such as light control, GIS and camera control.

Customers can even rent devices, including IP cameras, storage servers and system platforms; after-sales maintenance is taken care of by telecommunication companies. Mirroring backup is supported in case of router failure. For data security, the platforms feature user log-in protection, USB key lock and MAC lock protection to ensure accessibility at different levels.

Solution providers are also working on different functions for customized applications, combining video data with commercial benefits. Kedacom, for example, stresses customization for educational fields. Established in 1995, Kedacom established its Shanghai R&D center in 2001 to develop video and network communication technologies. It has 31 branches domestically, and one in Singapore.

In 2005, Kedacom was listed on the Singapore stock exchange. Given that its core software has complete functions, it regards customization as simply adding value. The BB online, for example, is a network video management system for kindergartens and parents. The kinder-gartens install cameras (usually 15 to 20 in each school) and network video decoders with VDSL or LAN network environments.

Telecommunication companies support servers and Internet platforms so parents can log onto the video Web page. Kueyan Telecom has deployed the program so parents get real-time images of kids at kindergartens. BB online software connects to the MegaEyes digital surveillance system. The system makes it very practical for teachers to share different teaching methods; it has a database for lessons, food and daily activities. BB online uses fiberoptic transmission and ADSL so hundreds of parents can visit the system at the same time. Value-added functions include video playback of school life, important notifications, forums and instant feedback via SMS or Internet between parents and teachers.

Meanwhile, ZTE specializes in power plant and unmanned site surveillance and management. It manufactures cameras, DVRs and DVSs. The ZTE platform delivers advantages in terms of scalability, security and reliability. The management platform checks working device and user status as well.

Its ViewEye central multimedia surveillance system can be applied to multiple scenarios in the electric power industry from visual dispatch of electric power to image monitoring of unmanned power transformation stations, buildings and equipment rooms. ViewEye also supports five remote functions, including live view, measuring, signaling, control and configuration to reduce management cost.

Security Management Platforms

For small and medium-sized network video management systems implemented in retail stores, supermarkets, enterprises, government and financial associations, customers work with DVR, DVS and IP camera manufacturers since hardware performance depends greatly on good management software.

DVR manufacturers with compatible central management systems (CMS) are able to ensure network video management functionality in small applications. Typically, the self-compatible platform has a client workstation with a user interface to control recording and playback as well as search capabilities and video display in multiple windows similar to a security video matrix view.

These solutions are practical when the primary concern is video backup and other information is secondarythose that require application-friendly functionality, such as ATMs for card number insertion onto video or POS systems for purchase information. Here, control and command of other systems is not the major target.

Suppliers are also launching PC-based NVRs to manage video data from various devices. "Different DVR or IP camera compression algorithms have compatibility problems," said Shu Yubo, Sales Director at Skyvision. "Chinese software platforms support most major brands like Hikvision, Dahua and Dali. Skyvision's NVR provides a platform that is compatible with those brands, and we are working on compatibility for international brands like Axis."

Established in 2003, Skyvision specializes in video coding and decoding, mode identification, IP network video transmission, stream media storage and indexing, software engineering, code reconstruction, AOP, J2EE, SOA, and large customized projects. Its network video management system uses the latest IT technology (J2EE) and supports all OS platform (Windows, Linux, Unix), B/S and C/S modes.

It is a flexible IP surveillance system that enables management of all net video devices (PC-based DVRs, video severs, embedded DVRs and access control) to support streaming media and alarm servers. It manages all cameras by groups with powerful e-maps. The system uploads alarm info onto the NVR system automatically with remote recording and configuration capabilities that support remote decoding of digital video and output to the monitor. IE plug and IE SDK are also provided.

Skyvision's NVR is fully digital networking architecture that provides a security and surveillance management platform for integrating CCTV systems, alarms, sensors and other surveillance devices. It supports video monitoring and recording, event management, video playback and event search. It adopts cascaded management technology and modular architecture for seamless security management and operation.

For users looking for management software to support IP cameras, HuangHe has NVR management software for a maximum of its 1,728 IP cameras. The system supports resolution up to D1, various recording modes, e-map, log lists and efficient event search. The system can be extended up to 10,000 sites.

Meanwhile Linovision's network video management system is an IP-based central management system that manages access of hundreds of cameras. It is the ideal solution for small and medium-sized surveillance applications. It features remote configuration, playback, recording of its branded IP cameras, IP modules, DVRs and DVSs as well as e-map, voice and server status check with multi-level user authentication and authorization.

Export Potential

HuangHe and Launch are quite active in overseas markets, selling mostly IP cameras and DVSs. Meanwhile, ZTE and Kedacom have standalone NVRs for video data delivery and management.

Furthermore, ZTE has more than 100 international offices and 52 R&D centers; its strong telecommunication background has given it a strong advantage in international markets. Localized and customized full-package services, including installation, have helped it promote its network video management system in South America and Africa.

Its ZXVM4100 series multimedia access unit is a standalone NVR device with Linux OS and MPEG-4 compression that is suitable for integrating local surveillance, video recording and network transmission. Video data is transferred via Internet to the ZXNVM C4100, which acts as a multimedia switch for TV wall displays or from relay servers to storage.

Kedacom's KDM8200E standalone NVR supports a maximum of 400 video channel inputs from LAN or WAN. The external IP storage device is optional. KDM8200E features high scalability with matrix infrastructure. Delivery of data streams is according to architecture, and it comes with both receiving and managing functionality.

Finally, Skyvisiona major software providerhas chosen to focus on security applications. According to Skyvision executives, the company's software productsmostly for NVR or hybrid solutionsare sold in more than 40 countries. These are primarily targeted at small and medium-sized applications that manage hundreds of video inputs. Its software is compatible with recommended hardware from Hikvision or Dahua. As a subsidiary of CSST, Skyvision's strategy is to promote its software with a full line of hardware products with support from all the other subsidiaries.

Even though analog systems dominate security applications, the benefits of pure IP solutions and products are gaining greater attention. Chinese suppliers see great potential as their products and solutions mature. When network environments are more affordable and stable, most expect that their IP products will be popular in overseas markets.

1