BN208 Networked Applications Assignment Sample
Here’s the best sample of BN208 Networked Applications Assignment, written by the expert.
IP SURVEILLANCE CAMERAS
Introduction
There is a continuous innovation in the technology that make easy for the firm to protect the data and to operate the business effectively. But at the same time, the increasing use of the tehcohgy also creates the issue for the firms in terms of security. It is because due to advance technology, it is easy for the hackers and the other person to conduct the illegal activities to harm the business of the firm (An et al., 2013). Because of this concern, there are differ ways that are used by the firms and in this, IP cameras are also the major instrument that is used for better security purpose. It is because it provides the clear picture and images, videos with better sound for the firm. These all cameras can be operated by the firm through mobile application, computer, etc from anywhere in the world by using the internet protocol. That is why; they are more demanded in the market.
Background
IP Surveillance Cameras are invented 1996 and to connect this, Ethernet is used by the Axis Communications. At the same time, for better understating of this, the ONVIF and PSIA are used that make easy for the users to use this. But due to continuous innovation in the technology, there were some issues that are also created and affect the use of IP Surveillance Cameras (Gao et al., 2014). So, there are so many change in this technology that are done by the firm in this and finally the all Surveillance Cameras are connected with the internet protocol that also make much easier for the users to operate the these cameras from anywhere thorough WIFI. Because of this, it can be determined that the use of IP Surveillance Cameras is quite effective to the firms for the security purpose.
Deployment and performance issues, Configuration issues
Although, the use of IP Surveillance Cameras is quite effective for the firms as per the security purpose but at the same time, there are various issues related to performance and configuration issues that are also faced by the firms and affect the use of IP Surveillance Cameras. In this, there are different performance issues such as low connectivity, not providing the clear pictures and the views, not proper sounding, not connected to the system, etc are the major performance issues that are faced by the firms in the use of IP Surveillance Cameras (Kim et al., 2011). In like manner, along with this, there are also some configuration issues that are also faced by the firms. In the configuration issues, the minimum RAM, ROM of the system, processor, matching IP address, TCP and IP protocol, system bit operation, etc. These are the configuration issues that firms face in the successful accomplishment of the IP Surveillance Cameras. It is because these issues work like common requirements that are mandatory for the firms to have a successful use of the IP Surveillance Cameras (Rodríguez-Silva et al., 2012). Because of this, it can be determined that there are different performance issues and configuration issues related to the IP Surveillance Cameras that are faced by the firms.
Security Issues
However, the use of IP Surveillance Cameras is effective for the firm to the security purpose but at the same time, the use of IP Surveillance Cameras is also a self security issue for the firms. The reason in this is that due to operating this camera through IP address and the wireless then it make easy for the other person to conduct some unethical practices (An et al., 2016). They can easily hack the camera by theft the IP address of the camera and by hacking the internet also. Because of this, it is also a security issue for the firm despite of providing the better security assurance for the firms (Senst et al., 2011).
Network Growth
There is high network growth in the use of IP Surveillance Cameras. It is because there is continuous innovation in the development of the technology that makes much easy for the firms to make more effective the use of IP Surveillance Cameras and also helps for the customers to use the better and much effective IP Surveillance Cameras (Varcheie, & Bilodeau, 2011). As well as, there are different firms related to the IP Surveillance Cameras that are working to overcome the different issues such as performance, security and configuration issues in order to make more effective and reliable the use of IP Surveillance Cameras.
Centralized Management
For centralized management, there is a vital role of the IT departments of the firm because there are different technical terms that has to identify and to define the IT department of the firm and helps the firm to successful accomplished the establishment of the IP Surveillance Cameras (Gao et al., 2014).
Advantages of the IP Surveillance Cameras
There are various benefits of the IP surveillance camera but at the same time, the one of the major advantage of this is the Image Resolution. It is quite necessary for the all firms that use IP surveillance camera for the security purpose. At the same time, the use of IP surveillance camera is also helpful in the scalability, easy installation, analytics, etc that assists the firm to have an effective use of the IP surveillance cameras as compared to other security cameras (An et al., 2013). Furthermore, there are also some other advantages such as future proof, create efficiencies, secure transmission, system integration, etc.
Socio-Technical Aspects
As pet the social technical aspects, the use of IP surveillance camera is quite better because of providing the full security for the people and the society (Rodríguez-Silva, et al., 2012). It also helps the society to live secure life.
Conclusion
From the above discussion, it can be conclude that IP surveillance camera is one of the effective innovations in the technology of the security. At the same time, it can also be concluded that there are different issues such as performance and configuration issues that is faced by the firm and affect the security issue. Along with this, there are also different advantages that are used by the firm for the security purpose.
References
An, L., Kafai, M., Yang, S., & Bhanu, B. (2013, August). Reference-based person re-identification. In Advanced Video and Signal Based Surveillance (AVSS), 2013 10th IEEE International Conference on (pp. 244-249). IEEE.
Kim, J. S., Yeom, D. H., & Joo, Y. H. (2011). Fast and robust algorithm of tracking multiple moving objects for intelligent video surveillance systems. IEEE Transactions on Consumer Electronics, 57(3).
Rodríguez-Silva, D. A., Adkinson-Orellana, L., Gonz’lez-Castano, F. J., Armino-Franco, I., & Gonz’lez-Martinez, D. (2012, June). Video surveillance based on cloud storage. In Cloud Computing (CLOUD), 2012 IEEE 5th International Conference on (pp. 991-992). IEEE.
Senst, T., Patzold, M., Evangelio, R. H., Eiselein, V., Keller, I., & Sikora, T. (2011, August). On building decentralized wide-area surveillance networks based on ONVIF. In Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on (pp. 420-423). IEEE.
Varcheie, P. D. Z., & Bilodeau, G. A. (2011). Adaptive fuzzy particle filter tracker for a PTZ camera in an IP surveillance system. IEEE Transactions on instrumentation and measurement, 60(2), 354-371.
________________________________________________________________________________
Know more about UniqueSubmission’s other writing services: