Network Design Basics
Network Design Basics
Network Basics
Network Device
Network Planning
Bandwidth Planning
Network Security
Network Introduction
Network is a collection of computers, servers, mainframes, network devices, peripherals, or other
devices connected to one another to allow the sharing of data.
In video surveillance area, the network includes core switch, Ethernet cable, fiber, IP cameras,
servers, etc.
192.168.1.8
192.168.1.4
192.168.1.5
192.168.1.3 laptop
192.168.1.2
WIFI AP
PC
192.168.1.6
90 meter rule 90 meter rule
switch
WEB PC
switch 192.168.1.10
IP Address
An IP address is the only way to identify a device in the network.
Host A
Host B
Private IPv4 Address
10.0.0.0/8— 10.255.255.255/8
172.16.0.0/12— 172.31.255.255/12
192.168.0.0/16— 192.168.255.255/16
Why IPv6?
Explosive growth of Internet users, devices, apps creates demand for more IP
addresses.
IPv4 uses 32-bit addresses and can support 4.3 billion devices connected directly to
the Internet.
The replacement protocol IPv6 uses 128-bit addresses and provides such a vast
number of addresses that it can only be expressed mathematically: 3.4 x 10 to the
38th power.
IPv6
• An IPv6 address is written in hexadecimal notation with colons subdividing the
address into eight blocks of 16 bits each.
• For example: 2001:0da8:65b4:05d3:1315:7c1f:0461:7847
• For Hikvision camera, it supports IPv6 with three mode:
• Manually: Configure IPv6 address manually
• DHCP: Get IPv6 address automatically from DHCP server
• Route Advertisement: Get IPv6 address combining with route advertisement and its mac address.
TCP
TCP (Transmission Control Protocol ) is communication protocol of transmission layer which is
connected and reliable based on a stream of bytes.
Load level of TCP is decided by MSS (maximum segment size). The transmitting end notices the
maximum TCP data of each segmentation that receiving end can get.
MSS value is the difference that MTU value subtracts IPV4 Header (20 Byte) and TCP header (20
Byte). MTU(maximum transmission unit) is defined by hardware, for example, MTU of Ethernet
is 1500 bytes.
Connect after three times handshake Disconnect after four times handshake
TCP UDP
• Connection oriented • Connectionless
• Provide reliable transmission • Provide unreliable transmission
• FTP, HTTP • SNMP
Common Port Number
• 20 File Transfer Protocol [Default Data]
• 21 File Transfer Protocol [Control]
• 25 Simple Mail Transfer Protocol
• 80 World Wide Web HTTP
• 443 HTTPS
• 8000 Server( for software access)
• 554 RTSP
In the computer network, NAT (Network Address Translation) is a technique which rewrites
the source/destination IP address when the IP packets pass through a router.
As the private IP address of local host can’t be routed in public network, NAT can also “hide”
the private IP address in the LAN so that it can protect internal network.
The basic principle of NAT
NAT
1. Static NAT
One-to-one mapping between public and private IP address——static configuration.
2. Dynamic NAT
Setting a mapping between a public IP address and private IP address, it can build a shared IP
address pool. We can select an IP address from the IP address pool and assign to a certain host,
and the host will release the IP address after use.
3. NAPT (Network Address Port Translation)
Based on “IP + Port” address translation, building a mapping between {private IP, private Port }
and {public IP, public Port}, so as to realize that multiple private IP can use a public IP to access the
Internet.
Full Cone NAT
NAPT Classification
Port Restricted Cone NAT
Symmetric NAT
The basic principle of NAT
NAT
Server A
Internet
Server B IP C : Port D
PC1: 192.168.1.100:5000
WAN IP&Port:
187.15.85.75:3000
Server C
NAT will convert client address {192.168.1.100:5000} into a public address {187.15.85.75:3000} and
bind them.
Only after the internal host 192.168.1.100 sends a data packet to the server A, then 192.168.1.100
can receive data packet sent by Server A to 187.15.85.75:3000.
Port Forwarding
What’s Port Forwarding?
Due to the presence of NAT, the initiative access data flow of the external network will be
discarded by NAT. In order to let the external initiative access reach the server behind NAT
by Port Forwarding.
In short, Port Forwarding allows remote computer to connect to the certain computer or
service in the internal network.
Port Forwarding
UPNP
UPNP can open the specific ports automatically by UPNP protocol, but it can only support
monolayer NAT. You can see this function on hardware device, such as NVR and IPC.
Contents
Network Basics
Network Device
Network Planning
Bandwidth Planning
Network Security
Common Transmission Media
Hikvision
PC DNS Server
website
Network Basics
Network Device
Network Planning
Bandwidth Planning
Network Security
Network Structure-Full Mesh
Advantage
Disadvantage
Need more switches and cables .
Network Structure-Star
Advantage
Advantage
Disadvantage
Advantage
Disadvantage
Access Switch
Core Switch
Contents
Network Basics
Network Device
Network Planning
Bandwidth Planning
Network Security
How To Calculate Bandwidth and Storage
Hikvison design tool
Contents
Network Basics
Network Device
Network Planning
Bandwidth Planning
Network Security
HTTPS
• Hyper Text Transfer Protocol over Secure Socket Layer
• communications protocol for secure communication over a computer network, with especially wide
deployment on the Internet. It adds the security capabilities of SSL/TLS to standard HTTP
communications.
• The main motivation for HTTPS is to prevent wiretapping and man-in-the-middle attacks.
• Default port number: 443
• The HTTPS port can be changed if desired (port numbers range from 1-65535)
Application: HTTPS
HTTP Default port:80
SSL / TLS
Data
TCP
IP
Data MAC
HTTPS – Create Self-signed Certificate
• 1. In the web UI, enter HTTPS configuration menu by going to Configuration -> Network ->
Advanced Configuration -> HTTPS.
• 2. Click on Create button “Create self-signed certificate”
HTTPS – Create Self-signed Certificate
• 3. Type in parameters such as country, hostname/IP, and validity as shown below, then Click
on OK (there is no need to provide any other information, just the first three fields, as
specified).
HTTPS – Create Self-signed Certificate
• 4. Check Enable HTTPS checkbox, and then click on Save button
HTTPS – Create Self-signed Certificate
• When using HTTPS to access the device, type https://IP address:port number into the web
browser address bar (e.g. https://192.0.0.64:443 ).
• If self-signed certificate is used, web browser may pop up warning notification like shown
below.
IP Address Filter
• Hikvision network products provide IP address filtering, which allows or forbids access
rights to defined IP address(es).
• A typical configuration is to configure the device to allow only the IP address of the server
that is hosting the VMS to access.
IP address filter
Server
PC
Firewall/IP Table
Camera
Internet
Laptop
Mobile Client
IP Address Filter
• Configuration -> System->Security-> IP Address Filter
Digital Watermark
• Digital watermark technology embeds the device information onto the recorded video.
• Digital watermarks may be used to verify the authenticity or integrity of the video or to show
the identity of its owners.
Watermark
• Open VSPlayer and play one video clip from Hikvision camera.
• Right click on the video: Image Control -> Watermark
• The watermark information will be displayed on the video.
64