senior design lab securityseniord.ece.iastate.edu/projects/archive/may0302/design …  · web...

32
Senior Design Lab Security Design Report Team May03-02 Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE) Robert Smith Josh Hale Ryan Peterson Ryan Parnow Brad Wilson

Upload: others

Post on 15-Apr-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

Senior Design Lab Security

Design ReportTeam May03-02

Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

Robert SmithJosh Hale

Ryan PetersonRyan ParnowBrad Wilson

November 19, 2002

Page 2: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

Table of Contents:

List of Figures.....................................................................................................................iiiList of Tables......................................................................................................................iv1 Abstract.............................................................................................................................12 Introduction

2.1 General Background..........................................................................................22.2 Technical Problem.............................................................................................22.3 Operating Environment......................................................................................22.4 Intended User(s) and Use(s)...............................................................................22.5 Assumptions.......................................................................................................22.6 Limitations.........................................................................................................3

3 Design Requirements3.1 Design Objectives..............................................................................................43.2 Functional Requirements...................................................................................43.3 Design Constraints.............................................................................................43.4 Measurable Milestones......................................................................................5

4 End Product Description...................................................................................................65 Approach and Design

5.1 Technical Approaches5.1.1 Video System......................................................................................75.1.2 ibutton System....................................................................................75.1.3 Door Alarm System............................................................................75.1.4 Psychological System.........................................................................7

5.2 Technical Design5.2.1 Video System

5.2.1.1 Six-Camera System..............................................................85.2.1.2 Eight-Camera System..........................................................85.2.1.3 Digital Video Recording System.........................................9

5.2.2 ibutton System....................................................................................95.2.3 Door Alarm System..........................................................................105.2.4 Psychological System.......................................................................10

5.3 Testing Description5.3.1 ibutton System..................................................................................115.3.2 Door Alarm System..........................................................................115.3.3 Psychological System.......................................................................115.3.4 Psychological System.......................................................................11

5.4 Risks and Risk Management............................................................................126 Financial Budget.............................................................................................................137 Personnel Effort Budget..................................................................................................138 Project Schedule..............................................................................................................149 Project Team Information

9.1 Clients/Faculty Advisors..................................................................................15........................................................................................................................................................................................................................................................................9.2 Team Members................................................................................................15

i

Page 3: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

10 Summary.......................................................................................................................1611 References.....................................................................................................................1712 Appendices

Appendix 1: Definition - Senior Design Laboratory.............................................18Appendix 2: Part Descriptions...............................................................................19Appendix 3:

Figure A3.1: Six-Camera Lab 322 Layout and Camera field of view.......20Figure A3.2: Six-Camera Lab 316 Layout and Camera field of view.......21Figure A3.3: Eight-Camera Lab 322 Layout and Camera field of view. . .22Figure A3.4: Eight-Camera Lab 316 Layout and Camera field of view. . .23

Appendix 4: Micro-controller layout for ibutton system.......................................24

ii

Page 4: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

List of Figures:

8.1 Project Schedule A3.1 Six-Camera Lab 322 Layout and Camera field of view.A3.2 Six-Camera Lab 316 Layout and Camera field of view.A3.3 Eight-Camera Lab 322 Layout and Camera field of view.A3.3 Eight-Camera Lab 316 Layout and Camera field of view.A4.1 Micro-controller layout for ibutton system.

iii

Page 5: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

List of Tables:

6.1 Financial Budget7.1 Personnel Effort Budget

iv

Page 6: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

1 Abstract:

The intention of this project is to provide additional security for the electrical and computer engineering senior design labs located in 322 and 316 Town Engineering. A high occurrence of theft in these rooms necessitates the need for additional security measures. The combination of security protocols and equipment are to be evaluated and selected for the protection of equipment and tools. The new measures are to aid in the prevention of theft and the apprehension of guilty parties. Due to the limited budget of the Department of Electrical and Computer Engineering, loss of items resulting from theft has become a major concern that provides reason for increasing security measures in the labs.

1

Page 7: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

2 Introduction:

2.1 General Background:

Over the past few semesters the senior design labs located in Town 316 and 322 have been the targets of numerous thefts. Most of the items taken include memory and small tools. The purpose of this project is to provide additional security to the labs to reduce the incidence of theft.

2.2 Technical Problem:

The basic technical problem is to keep the inventory in Town 316 and 322 from intentionally leaving. The type of inventory that is to be kept within the lab includes items ranging from screwdrivers to computer components. Many different types of hardware to increase the security of the senior design labs are being evaluated. Possible hardware includes motion-activated cameras, Ibutton brand access to tools, door alarm, and automated inventory control systems.

2.3 Operating Environment:

The operating environment for the security system is nearly identical to the conditions that exist within all of Town Engineering. The only variable condition is the amount of light present in the room. The system will need to operate 24 hours a day, 365 days a year. The Town 322 and 316 are labs typical of the department.

2.4 Intended Users and Use:

There will be two types of user interaction with the system. One group is the people being monitored, and the other group is the people in charge of lab security. The system will be used to enhance security through deterrence and apprehension.

2.5 Assumptions:

The following assumptions have been made: No variable weather conditions inside the lab, to include snow, fog,

rain, or extreme temperature variances. The appropriate personnel will be available to monitor the video

surveillance if used. Timely discovery of missing equipment will occur. A limited number of personnel will have access to the

computer/recording equipment. There will be a location given for the computer/recording equipment. No major modifications can be made to the senior design labs.

2

Page 8: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

2.6 Limitations:

The following limitations are assumed to be present: Not all thefts will be prevented. Not all thieves will be apprehended. Limited amount of time for system administration. No direct lab monitors will be present. The project is limited to the budget provided by the department.

3

Page 9: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

3 Design Requirements:

3.1 Design Objectives:

The following is a list of design objectives for the end system: A monitoring system – A system that is designed to monitor the movement

of people and tools in the lab through the use of video, RF-tags, or another media.

An ibutton access control system to tools – The use of ibuttons to limit access to the toolbox.

A computer storage system – Use of a digital video recording card in a computer to store the recorded information from the cameras.

A door alarm – An alarm that sounds if the door has been left open for an extended amount of time. This is to prevent the door being propped open with a trashcan, chair, or other object.

3.2 Functional Requirements:

The following is a list of functional requirements for the end system: A deterrence effect – This system needs to be able to present a

psychological effect that one would get caught for stealing items from the lab.

Identification – This system should provide a way to identify people who remove items illegally from the lab using high quality video, RF tags, or another media.

Adequate storage – The media on which video or other information is stored, such as video tape or computer hard drive should be adequate in size to store a reasonable amount of coverage time.

Motion activation – If a video system is chosen it will need to be able to take into account for a large amount of time where no one is present in the labs.

Inventory management – The ideal system will identify missing items and notify administrators.

3.3 Design Constraints:

The following is a list of design constraints functional requirements for the end system: Light condition independent – This system should be able to function

adequately with the lights both on and off or have some way of provided light on its own.

Low overhead – This system should be easy to use for the lab administrators, and not require much, if any, time from them.

Budget – The system must cost less than the amount allotted for equipment. Power supply – The system should be able to operate without building

power for at least one hour.

4

Page 10: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

3.4 Measurable Milestones:The following are the milestones that will be used to measure the progress

of the project:

Problem definition – This milestone has been reached when the definition of the problem has been completely defended and understood.

Final design – This milestone has been reached when the design for the system is complete and the system is ready to be installed/implemented.

Completion of installation/implementation – This milestone will be complete when the security system is completely installed in the rooms and the system is ready to be tested.

Completion of testing – This milestone is complete when the system is capable of providing the coverage and requirements set fourth in the requirements section.

5

Page 11: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

4 End Product Description:

The senior design laboratory security system located in 322 and 316 Town Engineering has been designed to enhance the security of the rooms to reduce the number of thefts occurring during the year, and also to aid in the apprehension or identification of persons responsible for the thefts. It consists of a monitoring system to record or log movement of people and tools within the lab, and protocols that are used to keep up to date inventory, timely discovery of missing items, and correct use of the system.

6

Page 12: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

5 Approach and Design:

5.1 Technical Approaches:

5.1.1 Video System:The video system will consist of a set of video cameras and a

computer controlled recording and storage system. For each of the senior design labs, at least one camera will be an infrared type, at least one camera will have color capabilities, and the remaining cameras will be high-resolution black and white. For the Cy-Bot lab one low light, high-resolution black and white camera will be used.

5.1.2 ibutton System:This system will consist of an ibutton reader linked to a locked

box, which contains the key for the toolbox. The reader will be linked to a computer and will log the users of people who access the key.

5.1.3 Door Alarm System:This system will consist of a door sensor, a timer, and an audible

alarm. When the door is open the timer will start. If the door remains open long enough for the timer to timeout the alarm will sound until the door is closed.

5.1.4 Psychological SystemThis system will consist of signs posted in the labs informing

patrons that the lab is being monitored. Additional effect will come from the cameras themselves. The idea of this system is to cause people to think that they will be caught stealing from the lab in effect reducing theft.

7

Page 13: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

5.2 Technical Design

5.2.1 Video System: This will consist of either the six-camera system or the eight-

camera system and the digital video recording system.

5.2.1.1 Six-Camera System:In the 322 lab, three cameras will be used. Camera 1 will

be a color camera with an infrared array (see Appendix 2, Part #1) and will be placed on the center of the north wall of the lab facing toward the center of the south wall which includes the door. Cameras 2 and 3 will be low light high-resolution black and white cameras (see Appendix 2, Part #2). Camera 2 will be placed on the southwest corner of the lab facing north-northeast. Camera 3 will be placed on the southeast corner of the lab facing north-northwest. See Appendix 3, Figure A3.1 for a detailed lab layout and camera placement. All cameras have a fifty-degree field of view.

In the 316 lab, two cameras will be used. Camera 1 will be a color camera with infrared array (see Appendix 2, Part #1) which will be placed on the northeast corner of the lab facing south-southwest. Camera 2 will be a low light high-resolution black and white camera (see Appendix 2, Part #2), which will be placed on the southwest corner of the lab facing east-northeast. See Appendix 3, Figure A3.2 for a detailed lab layout and camera placement.

In the CyBot lab one camera will be used. This camera will be a low light high-resolution black and white camera (see Appendix 2, Part #2), which will be placed on the northeast corner of the lab facing southwest.

5.2.1.2 Eight-Camera System:In the 322 lab, four cameras will be used. Camera 1 will be

a color camera with an infrared array (see Appendix 2, Part #1) and will be placed on the center of the north wall of the lab facing toward the center of the south wall. Cameras 2, 3, and 4 will be low light high-resolution black and white cameras (see Appendix 2, Part #2). Camera 2 will be placed on the southwest corner of the lab facing north-northeast. Camera 3 will be placed on the southeast corner of the lab facing north-northwest, and camera 4 will be placed on the southeast corner of the lab facing west-northwest, which will give a profile shot of anyone at the tool cabinet. See Appendix 3, Figure A3.3 for a detailed lab layout and camera placement.

In the 316 lab, three cameras will be used. Camera 1 will be a color camera with infrared array (see Appendix 2, Part #1) which will be placed on the north east corner of the lab facing

8

Page 14: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

south. Cameras 2 and 3 will be a low light high-resolution black and white camera (see Appendix 2, Part #2). Camera 2 will be placed on the southwest corner of the lab facing north, and camera 3 will be placed on the southwest corner of the lab facing east toward the tools to provide a profile shot of anyone at the tool cabinet. See Appendix 3, Figure A3.4 for a detailed lab layout and camera placement.

In the CyBot lab one camera will be used. This camera will be a low light high-resolution black and white camera (see Appendix 2, Part #2), which will be placed on the northeast corner of the lab facing southwest.

5.2.1.3 Digital Video Recording System (Computer System)The video information that is taken from the cameras will

be stored on a computer located in the senior design storeroom. The cameras will be connected to the computer through a digital video recording (DVR) card with either six or eight ports depending on the video system used. See Appendix 2, Part #3 for complete specifications on the DVR card, and for minimum requirements for the computer.

The DVR card comes with software that allows for management and recording of the video information. It also allows for web/remote access to the video feed so that Professors Lamont and Patterson may view the labs from home, if needed. The software has a built in compression system to increase the amount of storage and a built in motion activation system that is based on differences in frames as opposed to the detection of infrared energy as used in most motion detection systems. Estimated disk space per amount of time can be found with the part specification located in Appendix 2, Part #3.

The computer system itself should have an uninterruptible power supply that the computer and the cameras should be connected to in order to account for a power outage. The monitor does not need to be connected to this power supply. The supply should be able to power the computer and the cameras without building power for at least one hour. The supply should also have the ability to interface with the computer so that the system would be shut down gracefully to prevent data corruption.

5.2.2 ibutton System:The ibutton system will consist of three parts. The first part is an

ibutton. An ibutton is a small device that looks similar to a watch battery. The ibutton contains a 64-bit number that is laser etched so that it cannot be changed. The second part of the system is an ibutton reader. The ibutton reader will consist of a microprocessor that reads the information from the ibutton, and then it will send it to the central computer via a RS-

9

Page 15: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

232 serial link. The computer will check the number against its list of accepted numbers and send a response whether it is accepted or not. After the microprocessor gets the response it will unlock the key box if the response is positive or the box will remain locked if the response is negative. The last part of the system is the key box itself. The key box will be locked via an electromechanical interface. See Appendix 4 for a schematic of the micro-controller system.

5.2.3 Door Alarm System:This system will consist of a door sensor, either magnetic or push

button, hooked to an electronic timer. When the door is opened the timer will start counting down from a recommended value, which will be determined in testing. When the timer times out, an audible alarm will be produced from a peso-electric buzzer and continue to sound until the door is closed.

5.1.4 Psychological SystemThis system will consist of signs posted in the labs stating that,

“This lab is monitored by a 24 hour surveillance system”, “Theft will be prosecuted”, “We are watching you”, or a similar wording. Additional effect will come from the cameras themselves. The idea of this system is to cause people to think that they will be caught stealing from the lab in effect reducing theft. This should be the major deterrence factor for the lab and should reduce theft.

10

Page 16: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

5.3 Testing Description:

5.3.1 Video System TestingThe camera system will be evaluated under the criteria of operation

under different light conditions, different numbers of people in the labs, different types of theft as in big items versus small items, and different attempts to hide from the cameras.

The recording system will be evaluated for ease of use, picture quality, ease of retrieval of an image or timeframe, and ability to operative without building power.

This system will also be tested using outside sources such as random people and investigators to evaluate the coverage of the cameras and the quality of the images produced on the computer system.

5.3.2 ibutton System TestingThe testing for this system will consist of normal operation, and

trying to break into the tool cabinet using any option accept brute physical force. Some of these may include trying to access the micro-controller, and forge or alter a button. This system will also be tested for loss of building power.

5.3.3 Door Alarm System TestingThe testing for this system will be normal operation, and trying to

defeat the alarm using tape or magnets. This system will also be tested for loss of building power.

5.3.4 Psychological System TestingTesting of this system will consist of watching the behavior of

people in the lab as it is recorded over the video system. This should be a contrast from the behavior without the cameras.

11

Page 17: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

5.4 Risks and Risk management:

False Identificationo Will be managed by appropriate personnel through whatever

means that are appropriate. Failure to discover theft/missing items

o Routine inventories will reduce this, but nothing can be done to eliminate this.

Loss of Team member(s)o Project may need to be scaled back or changed.

Lead times of needed equipmento Necessary items will need to be purchased well ahead of time.

Structural problemso Mounting locations may need to be changed to facilitate the

structure present in the room. Power failure

o System will need to be fully operational during short-term power outages.

o System will need to recover automatically after long-term power outages.

Theft of security system

12

Page 18: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

6 Financial Budget:

This table is an estimated budget for the security system. The majority of the budget is allocated for a video surveillance system and computer parts to support the video cameras.

Table 6.1 Estimated BudgetItem Estimated

CostRevised Estimate

Cost to Date

Computer Equipment $0 $1,000 $0Cameras $500 $1,100 $0DVR Card $500 $500.00 $0Wires and power supplies

$0 $200 $0

Ibutton setup $0 $100 $0Door Alarm $0 $100 $0Total $1,000 $3,000 $0

7 Personnel Time Budget:

This table is an estimated time budget for the senior design project. The team leader is expected to have the most hours applied to the project.

Table 7.1 Estimated Personnel EffortTeam Member Original

Estimated EffortRevised Estimated Effort

Effort to Date

Robert Smith 80 Hours 80 Hours 35 HoursRyan Parnow 88 Hours 88 Hours 38 HoursRyan Peterson 70 Hours 89 Hours 40 HoursBrad Wilson 85 Hours 85 Hours 33 HoursJosh Hale 93 Hours 93 Hours 45 Hours

13

Page 19: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

8 Project Schedule:

The overall project schedule was determined by taking the required tasks into consideration. Then an estimated number of hours were calculated for each task. Tasks include, but are not limited to, writing documents, developing new template creation and modification software, expanding on original software, repairs to original software, and testing the system.

Figure 8.1 Semester Project Schedule

Page 20: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

9 Project Team Information:

9.1 Clients/Faculty Advisors:Prof. John Lamont324 Town EngineeringAmes, IA 50011Office: (515) 294-3600Fax: (515) [email protected]

9.2 Team Members:Robert Smith

258 N. Hyland Apt 16Ames, IA 50010(515) 296-0234 or [email protected]

Ryan Parnow4912 Mortensen #632Ames, IA 50014(563) [email protected]

Brad Wilson215 Beach Apt 1Ames, IA 50014(515) [email protected]

Prof. Ralph Patterson III326 Town EngineeringAmes, IA 50011Office: (515) 294-2428Fax: (515) [email protected]

Ryan Peterson300 Stanton Ave #210Ames, IA 50014(515) [email protected]

Josh Hale311 Ash AveAmes, IA 50014(515) [email protected]

Page 21: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

10 Summary:

Intentional theft is generally a crime of opportunity, so by introducing a system to reduce the perceived opportunity of getting away with the crime, the overall occurrences are effectively reduced. This system will be designed not only to reduce the perceived opportunity, but also to increase the chance timely discovery of missing items, and increase the chance of identification and apprehension of the offender. With a substantial reduction of the amount of theft in the labs, the system will be saving the Department of Electrical and Computer Engineering an amount on the order of $3,000 per year.

Page 22: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

11 References:

Lamont, John, Senior Design — Course Information and Notes, 2001, version 3.51

Page 23: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

Appendix 1:

2.13 SENIOR DESIGN LABORATORY

The senior design laboratory is located in Rooms 316 and 322 in Town Engineering. Room 322 is the general senior design laboratory. Four computers and associated equipment are located in this laboratory for the use of senior design students working on their projects. Some bench workspace and lockable storage space is also available in the senior design laboratory. This room is available to senior design students who do not have other space in which to work on their project(s). If a senior design project is affiliated with a research project or an instructional laboratory, it is assumed that those projects will be conducted in the corresponding research or laboratory space.

Room 316 is a specially equipped laboratory for the building and testing of electronic circuits. Only teams with special needs will be given the combination to this room. This laboratory contains both a digital work area and an analog work area. This equipment in this laboratory was acquired new during the summer of 2001.

The senior design course coordinator is responsible for these laboratories. If you need special equipment or special space for your senior design project, please discuss your needs with the senior design course coordinator. The course coordinator should also be contacted if you have need for specific instruments, tools, etc. Limited locked storage space is available. You should contact the course coordinator is you need such space.

The door to this laboratory has a combination lock. Each project team will be assigned its own combination. The following rules apply to both laboratories:

Please do not share door combinations with persons outside of your senior design team. Please be sure that the door is locked when you leave this laboratory. This is an instructional laboratory for senior design project work. Do not use the room as

a general-purpose study room. No beverages and no food are to be consumed in this room. Please do your part to keep the room neat and clean. Do not leave valuable items laying around in laboratories; they will disappear.

If you have project materials in this room—either on a bench on any shelf of one of the cabinets, please label your materials clearly; include the names, phone numbers and e-mail addresses of all team members and your project advisor. Please note that any unmarked materials may be discarded during laboratory cleanup by the senior design coordinators. Such clean-ups will occur without notice.

Software available on the personal computers includes:

Adobe Acrobat Reader 3.0 MicroSim Pspice Evaluation Copy Release 8 Microsoft Office 2000 (Word, Excel, Power Point, & Access) Microsoft Project 2000 Microsoft Front Page 2000 Microsoft Photo Editor 3.0 Student MATLAB 5.0.0.4073 Smartdraw Visio Technical 4.5 Winzip 6.2

Page 24: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

Appendix 2: Hardware specification

Part #1: Color Infrared Micro Video Camera – 330 lines resolution, uses an infrared LED array to record in 0 LUX light conditions with a max infrared range of 30 feet, size 1.75" in diameter by 2.2" deep. Part number PC-163IR from Super Circuits, list price $159.95, catalogue page number 85.

Part #2: High Resolution Black and White Micro Video Camera – 600 lines resolution, built in variable shutter, Sony chipset, minimum light amount is 0.0003 LUX, size 1.2" deep and 0.98" by 0.98". Part number PC182XS from Super Circuits, list price $119.95, catalogue page number 22.

Part #3: Remote Video Surveillance/Digital Video Recording Card – 30fps divided among the number of cameras connected. Number of ports will be six or eight depending on the camera system chosen. Software that comes with the card manages the compression, motion activation, and lifetime of the files.

Computer Minimum Requirements:

O/S Windows 98 SE/ME/2000/XP

CPU Pentium PIII 500 (min)

Memory 64 MB RAM (min)

Hard Drive 30 GB (recommended)

VGA Card 16 MB

Video Input 4, 6, 8, 10, 12, 14, 16

Audio Supports 1 Channel Audio

Screen Display Rate 30 fps / system (NTSC)25 fps / system (PAL)

Recording Rate 30 fps / system (NTSC)25 fps / system (PAL)

Playback Rate 30 fps / system (NTSC)25 fps / system (PAL)

Compression Format Wavelet/MPEG4

Video Format avi

Image Format bmp, jpeg, tif

Networking LAN, TCP/IP, ISDN, PSTN, ADSLRemote Monitoring Software

Remote View, IP MultiCast, WebCam, GeoCenter

Sensor Input Input pin 8, extendable to 72 (optional)

Relay Output Output pin 8, extendable to 72 (optional)

Backup Function HDD, CD-R, MO, ZIP

Page 25: Senior Design Lab Securityseniord.ece.iastate.edu/projects/archive/may0302/Design …  · Web viewDesign Report. Team May03-02. Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)

** 600 - Series **

1. P4 CPU is required for running 640 x 480 resolution for display/recording or Real-time display, Audio recording.

2. Support mix of Color and B/W camera- B/W camera are in a series or Color camera are in a series- CH 1, 3, 5, 7, 9, 11, 13, 15 a First Series, CH 2, 4, 6, 8, 10, 12, 14, 16 a 2nd Series.

3. Does not support VIA VT1611A Audio on board chipsets, the system will crash when the alarm is activated. The onboard sound has to be disabled in the bios.

Disk Space/Time Ratio: (independent of number of cameras)

20GB 30GB 40GB 60GB 80GB 100GB 120GB

600 Series  30 fps 65 hrs 100 hrs 135 hrs 200 hrs 265 hrs 335 hrs 400 hrs

Part name and number: GeoVision GV600 6 cameras or 8 cameras. Listed online at http://www.dvrkits.com/dvr_cards.htm. List price 6 camera $410, 8 camera $450.