Jul,19

AS NZS 62676.1.2 pdf download

AS NZS 62676.1.2 pdf download

AS NZS 62676.1.2 pdf download.Video surveillance systems for use in security applications
1 Scope
This part of IEC 62676 introduces general requirements on video transmission. This standard covers the general requirements for video transmissions on performance, security and conformance to basic IP connectivity, based on available, well-known, international standards. Clauses 4 and 5 of this standard define the minimum performance requirements on video transmission for security applications in IP networks. In surveillance applications the requirements on timing, quality and availability are strict and defined in the last section of this standard. Guidelines for network architecture are given, how these requirements can be fulfilled. Clause 6 and the next clauses of this standard define requirements on basic IP connectivity of video transmission devices to be used in security applications. If a video transmission device is used in security, certain basic requirements apply. First of all a basic understanding of IP connectivity needs to be introduced which requests the device to be compliant to fundamental network protocols. These could be requirements which may be applied to all IP security devices even beyond IP video. For this reason requirements are introduced in a second step for compliance to basic streaming protocols, used in this standard for video streaming and stream control. Since security applications need high availability and reliability, general means for the transmission of the video status and health check events have to be covered. These are defined in general requirements on eventing and network device management. In security proper maintenance and setup is essential for the functioning of the video transmission device. Locating streaming devices and their capabilities is a basic requirement and covered in ´device discovery and description´.
3 Terms, definitions and abbreviations
For the purposes of this document, the following terms, definitions and abbreviations apply. 3.1 Terms and definitions 3.1.1 adaptive jitter buffering queuing of packets in switched networks exposed to unwanted variations in the communications signal to ensure the continuous video transmission over a network supported by the ‘Adaptive’ ability to adjust the size of the jitter buffer based on the measured jitter in the network EXAMPLE: If the jitter increases, the buffer becomes larger and can store more packets; if the jitter decreases, the buffer becomes smaller and stores fewer packets. 3.1.2 advanced encryption standard NIST encryption standard, also known as Rijndael, specified as unclassified, publicly- disclosed, symmetric encryption algorithm with a fixed block size of 1 28 bits and a key size of 1 28, 1 92 or 256 bits according to the Federal Information Processing Standards Publication 1 97 3.1.3 American Standard Code for Information Interchange de-facto world-wide standard for the code numbers used by computers to represent all the upper and lower-case characters 3.1.4 asymmetric algorithm algorithm used in the asymmetric cryptography, in which a pair of keys (a private key and a public key) is used to encrypt and decrypt a message to ensure the privacy of communications 3.1.5 authentication process where an operators or systems identity is checked within a network EXAMPLE: In networks, authentication is commonly done through the use of logon passwords. 3.1.6 authentication server device used in network access control Note 1 to entry: It stores the usernames and passwords that identify the clients logging on or it may hold the algorithms for access. For access to specific network resources, the server may itself store user permissions and company policies or provide access to directories that contain the information. Protocols such as RADIUS, Kerberos and TACACS+, and 802.1 x are implemented in an authentication server to perform user authentications. 3.1.7 authenticity integrity and trustworthiness of data or an entity; validity and conformance of the information, or identity of a user Note 1 to entry: The authenticity can be secured and verified using cryptographic methods. 3.1.8 authorization approval, permission, or empowerment for a user or a component to do something 3.1.9 backbone high-speed line or series of connections that forms a major pathway within a network 3.1.1 0 backbone layer larger transmission line that carries data gathered from smaller communication lines that interconnect with it, e.g. a line or set of lines that local area networks connect to, in order to span distances efficiently e.g. between buildings 3.1.1 1 Bit/s bit per second unit of measurement of how fast data is transferred from one node to another 3.1.1 2 bridge device that is used to connect two networks including passing data packets between them using the same protocols

Download
The previous

AS NZS 61724.1 pdf download

The next

AS NZS 62676.4 pdf download

Related Standards