Figure 1. Example of a Security System

Similar documents
Lab Testing Summary Report

Linksys Voice over IP Products Guide: SIP CPE for Massive Scale Deployment

Intel NetStructure Host Media Processing Software Release 1.0 for the Windows * Operating System

Secure VoIP for optimal business communication

How to choose the right IP gateway for your VoIP migration strategy. Deployment note

presentation Our customers & Partners AE

Panasonic NCP Features and Functions

User Manual. SIP Analog Telephone Adaptor SIP-GW2. Sedna Advanced Electronics Ltd.

Security and the Mitel Teleworker Solution

Need for Signaling and Call Control

IP PBX using SIP. Voice over Internet Protocol

How To Create An Intelligent Infrastructure Solution

Affordable Building Automation System Enabled by the Internet of Things (IoT)

The software is sold on an AS IS basis. ALVARION, its affiliates or its licensors MAKE NO

Application Note 132. Introduction. Voice Video and Data Communications using a 2-Port Switch and Generic Bus Interface KSZ MQL/MVL

Virtualizing Open Text Fax Server with Realtime Fax over IP and Open Text Fax Gateway

Cisco EtherSwitch Network Modules

Choosing a Dialogic Product Option for Creating a PSTN-HMP Interface

Cisco Unified Survivable Remote Site Telephony Version 8.0

SIP Trunking: Enabling Wideband Audio for the Enterprise

Connect your Control Desk to the SIP world

Make the green IP switch Low-energy semiconductor solutions for VoIP

CASE STUDY CASE STUDY. Synway Asterisk Cards and SuPerForm Voice Enhancement Technologies to Empower

Part Number: HG253s V2 Home Gateway Product Description V100R001_01. Issue HUAWEI TECHNOLOGIES CO., LTD.

Cisco ATA 186 Analog Telephone Adaptor

Cyber Threats in Physical Security Understanding and Mitigating the Risk

High Definition PoE IP Phone

How To Get A Cell Phone With A Video Camera And A Speaker Phone (For A Premium) For A Small Price (For An Extra $100) (For The Premium) ( For A Long Time) (With A Long Distance) (To

Power over Ethernet Solutions for Campus Environments. White Paper

An XOP Networks White Paper

APPLICATION NOTE Microsoft Unified Communications Network Architectures

IP Telephony Deployment Models

RAISING THE BAR. Voice Over IP Technology for: COMPLETE NETWORK-BASED SCHOOL COMMUNICATIONS SOLUTION

Cisco Unified IP Phone Solutions

3 Specification. Master Chip Broadcom Keys Direct-button 1. Microphone 1. Amplifier 0.5W Speaker 0.5W. Voice

Cisco Unified Survivable Remote Site Telephony Version 7.1

MS Series: VolP Deployment Guide

Inter-Tel 5000 Network Communications Solutions

Advanced Business Communications for IP Networks. A Converged IP Platform offering advanced business solutions for single or multi-site networks.

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Make the green IP switch Low-energy semiconductor solutions for VoIP

Synapse Simplicity without Sacrifice

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

Cisco Survivable Remote Site Telephony Version 7.0

Cisco Unified Communications System Release 6.1 Enriches Collaboration Through a Unified Workspace

Huawei One Net Campus Network Solution

Communications Management within Your Security Platform

Challenging Communication Boundaries. Dispatch Solutions for VoIP Networks

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Layer 3 Network + Dedicated Internet Connectivity

IP-Based Communications Solutions

With 360 Cloud VoIP, your company will benefit from more advanced features:

Cisco Smart Business Communications System: A New Way for Small Business to Communicate

User Manual. Page 2 of 38

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

CISCO SPA3102 PHONE ADAPTER WITH ROUTER

Wireless Video Best Practices Guide


Lab Testing Summary Report

Integrated Communications Platform

Intel Processors in Industrial Control and Automation Applications Top-to-bottom processing solutions from the enterprise to the factory floor

Interfacing ISONAS Access Control to an IVC-controlled Video Surveillance System

Linphone based Video Door Entry Intercom System

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

MULTIPOINT VIDEO CALLING

Big Solutions for Small Business

CTX OVERVIEW. Ucentrik CTX

Intel NetStructure PBX-IP Media Gateway

How Does Fax over IP Work?

Configuring CyberData Devices for Intermedia Hosted PBX

Cisco SPA525G2 5-Line IP Phone

Meraki MX50 Hardware Installation Guide

IIUC Implementing Cisco IOS Unified Communications (IIUC) Version: Demo. Page <<1/9>>

1 Bluetooth VoIP Gateway Solution 3 Bluetooth VoIP Gateway Solution for Non-RUIM Type CDMA Network 5 GSM Gateway Solution 8 GSM VoIP Gateway Solution

ZyXEL IP PBX Support Note. ZyXEL IP PBX (X2002) VoIP. Support Notes

NeoGate TA Series Quick Installation Guide

Managed Migration to IP Telephony in a PBX Environment: Intel NetStructure PBX-IP Media Gateway Can Provide the Critical Link

Frequently Asked Questions

P-2602HWNLI. Quick Start Guide g Wireless ADSL2+ 4-port VoIP IAD. Version /2006 Edition 1

Equipment Overview. Overview of the KXNS700

HD Voice Conference IP Phone with PSTN

Interactive Intelligence Customer Interaction Center with Polycom

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Technical Report DSL Forum TR-110

White Paper Increase Flexibility in Layer 2 Switches by Integrating Ethernet ASSP Functions Into FPGAs

2100 Series VoIP Phone

Cisco Emergency Responder 9.0

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

LEASED-LINE REPLACEMENT

How To Set Up A Gxp280 Ip Phone On A Cell Phone On Your Computer Or Ip Phone (Siphone) On A Sim Sim Sim Or Ipro (Cell Phone) On Your Ipro Or Ipo (Cellphone) On

MITEL Communications Platform

Power over Ethernet for VoIP Applications. White Paper

Cisco Unified Survivable Remote Site Telephony Version 4.2

Internet Telephony PBX System

FRAFOS GmbH Windscheidstr. 18 Ahoi Berlin Germany

Overcoming Security Challenges to Virtualize Internet-facing Applications

HP E-PCM Plus Network Management Software Series

Transcription:

Security Systems: Migration to Cloud-Enabled IP-Based Solutions Introduction Security systems are used in a variety of locations, such as residential homes, office buildings, hospitals, industrial facilities, schools, and universities. In general, security systems include a wide range of functions including access control, computer security, video surveillance, and public safety. This application note focuses on security systems intended to prevent harm to assets and persons from accidental or malicious causes. Legacy security systems typically consist of multiple monitoring elements connected to a monitoring unit which is managed from a control panel (see Figure 1). The monitoring unit is connected via an analog phone line to a remote monitoring station, which operates 24x7 and responds to alarm conditions. Figure 1 also shows a local area network (LAN) connected to the Internet; but the security system is not connected to the LAN (and hence grayed out). These systems can have a wide range of installation locations, starting with one unit, such as in a single-family home, to many tens of units, such as in a multi-site commercial deployment. Migration to IP-Based System Security system manufacturers are changing their products to meet customer demand, evolving from traditional analog systems to IP-based products to leverage widespread innovation in IP-based communication systems and to make them ready for cloud services. Emerging security systems are much more than just intruder alarms; their functionality, connectivity, and access options continue to evolve as new technologies emerge. They provide a much richer set of features including voice-over-ip (VoIP), call routing, rule-based response, and access via mobile devices. Figure 1. Example of a Security System Micrel Inc. 2180 Fortune Drive San Jose, CA 95131 USA tel +1 (408) 944-0800 fax + 1 (408) 474-1000 http://www.micrel.com February 11, 2014 Revision 1.0

Migration Paths to IP-Based Systems Customers want the features of IP-based security system but also often want to leverage their investment in installed security system; hence, manufacturers are providing migration and upgrade paths which enable existing analog components to coexist with new IP-based components in multiple ways. For example: 1. Basic upgrade: in this scenario, the legacy system is upgraded to use a VoIP connection to the external monitoring station (see Figure 2). There is significant market pull in this direction since many customers are already moving away from landlines and using their cellular phones. 2. Advanced upgrade: in this scenario, the local monitoring unit and control panel are upgraded to an IP-based system while leveraging existing monitoring elements (see Figure 3). This option allows customers to enjoy a full complement of IP-based monitoring services since the monitoring unit and control panel can be access over the internet allowing a wider range of services. Basic Upgrade: VoIP Connection An immediate migration path to an IP-based security system is to connect the local monitoring unit to the remote monitoring station via Internet. In this scenario, rather than using an analog phone line, customers can leverage their existing internet connection to connect the monitoring unit to an analog telephone adaptor (ATA) as shown in Figure 2. Security system manufacturers realize that there is significant market pull in this direction since many customers are moving away from landlines and using their cellular phones instead. In addition, many customers already have a connection to the Internet making installation an easy process. Figure 2. Example of Basic Upgrade VoIP Connection February 11, 2014 2 Revision 1.0

Advanced Upgrade IP-Based Monitoring Often customers want to remotely verify and control status of the security system in addition to simply receiving alarms and text messages. This scenario calls for an advanced migration where the monitoring unit and control panel are upgraded to an IP-based system; however, the new components continue to leverage the existing analog monitoring elements thus reducing installation cost. As shown in Figure 3, an IP-based monitoring unit is deployed and connected directly to the LAN; legacy monitoring elements already installed are simply connected to the new monitoring unit since the wiring is already in place. The new IP-based control unit is also directly connected to the LAN. This option allows customers to enjoy a full complement of IP-based monitoring services since the monitoring unit and control panel can be accessed over the internet allowing a wider range of services. Figure 3. Example of Advanced Upgrade IP-Based Monitoring February 11, 2014 3 Revision 1.0

IP-Based Security Solutions For new construction or major remodeling, a complete IP-based security system can be deployed. Components of an IP-based security system are network-enabled including the monitoring unit, control panel, access control, and monitoring elements (see Figure 4). Advances in wireless technologies are also enabling easy integration of a variety of wireless monitoring elements. In addition, IP-based system also allow for integration with a range of other home automation functions including intercoms, appliances, and thermostats. IP-based security systems provide a much richer set of features including VoIP, call routing, rule-based response, and access via mobile devices. More importantly, IP-based systems enable use of emerging cloud-based services. Cloud-based services include: Multi-Modal Communication: Text, e-mail, instant messaging, in addition to voice communication. Access Control: Enable or disable access to assets or buildings. Remote Control: Ability to remotely configure and monitor. In general, these services allow customers to remotely configure and control the system from any web browser or internet enabled smartphone. They can send out instant text message and/or email notifications based on any system event. Figure 4. Example of IP-Based Security System February 11, 2014 4 Revision 1.0

Benefits of IP-Based Security Solutions IP-based security systems provide significant benefits in terms of new services, deployment efficiency, and operational efficiency; for example: Services: Access: Remote access and control via mobile and network devices. Real-Time Information: Status, alarms, and alerts delivered in real-time. Cloud Services: Enables a variety of services delivered via the cloud. Deployment Efficiency: Lower Cost: Use power-over-ethernet (PoE) to simplify installation and reduced wiring cost. Ease-of-Integration: Internet and LAN standards make integration easy. Scalability: Can be scaled from a single site to multiple sites and functionality. Operational Efficiency: Lower Cost: Reduced power consumption through the use of EEE and other green enabling standards. Lower Operation Cost: Eliminates recurring cost of analog telephone connection. Lower Maintenance Cost: Fewer disparate elements to maintain and monitor. Components of IP-Based Security Systems IP-based security systems employ a range of components depending on the requirements for a particular installation. At the core of these components is the ability to provide network connectivity and VoIP functionality. These components can be broadly classified as follows: Embedded components: these are components that bridge operating domains, such as analog-to-digital, and are often configured via a web or serial port interface and usually do not require a local interface. Examples of such components include an ATA, which is used to connect analog phone systems to an IP network. Endpoint components: these components are connected to the network and provide a rich user interface often including display, keypad, microphone, and speaker. Examples of these components include control panels, access control, and intercoms. Embedded Components Embedded components bridge operating domains, such as analog-to-digital, and are often configured via a web or serial port interface and usually do not require a local interface. Examples of such components include an ATA, which is used to connect analog phone systems to an IP network. ATAs can have one or more FXS ports where the analog phone line is plugged in (instead of the phone jack), a network connection to connect to the Internet, and may have an additional network connection to connect a local device for convenience (see Figure 5). Many units are built with a PoE option in which case the unit can be powered using a PoE-enabled Ethernet switch. February 11, 2014 5 Revision 1.0

Figure 5. Example Analog Telephone Adaptor for an IP-Based Security System Endpoint Components Endpoint components are connected to the network and provide a rich user interface often including display, keypad, microphone, and speaker. Examples of these components include control panels, access control, and intercoms. For example, consider a basic control panel for an IP-based security system shown in Figure 6; the control panel consists of an LCD display used to indicate status and alarm conditions, a keypad for configuration and control, and a microphone and speaker which are typically driven via VoIP for communication. Typically, the back panel has one or two network interfaces to connect to a LAN. Some endpoints also include digital control of external devices, such as door lock, sensors, cameras, and other security devices. Figure 6. Example Control Panel for an IP-Based Security System February 11, 2014 6 Revision 1.0

Another example is an intercom endpoint (see Figure 7). The form factors and functions are different than the control panel, but the basic architecture still consist of a display, keypad, microphone, speaker, and network connections. These endpoints can typically be installed efficiently since they only need Cat 5 wiring with PoE. Figure 7. Example Intercom for an IP-Based Security System Micrel s System-on-Chip (SoC) for IP-Based Security Systems Micrel s KSZ8342 and KSZ8382 families of system-on-chip (SoC) provide complete solutions for components of an IP-based security system. These SoCs have built-in support for interfaces required for these components hence only a few additional external devices are needed to create a fully functional component. Micrel s SoCs are the ideal choice for IP-based security systems, backed by Micrel s high-reliability and solution robustness proven in commercial, industrial, and automotive applications around the globe. Both the SoC families implement a multiprocessor architecture with embedded RISC CPU and powerful DSP, providing a flexible VoIP platform with narrowband and wideband voice processing and excellent voice quality. Embedded Processing Resources CPU and Memory: Micrel s SoCs embed MIPS32 RISC processor for configuration and network protocol processing, SDRAM and DDR2 interfaces, and Flash interface. DSP: Micrel s SoCs embed a ZSP400 digital signal process which offers high-quality voice/audio processing, 8kHz/16kHz 16-bit ADC/DAC with integrated amplifiers, narrowband and wideband CODECs. Network Network: 3-port 10/100BaseT Ethernet Switch; Integrated low-power PHY transceivers IGMP snooping to handle multicast traffic (RFC 4541) VLAN support (IEEE 802.1Q) Energy Efficient Ethernet (IEEE 802.3az) February 11, 2014 7 Revision 1.0

KSZ8342 SoC Family Micrel s KSZ8342Q SoC provides a complete solution for embedded components of an IP-based security system. The chip bridges digital and analog systems enabling IP-based communication. It addresses a wide range of applications including ATAs and gateways. The highly-integrated SoC has built-in support for interfaces which reduces the need for external components. As shown in Figure 8, the KSZ8342 includes a PCM Controller which can be coupled with a SLIC interface to create FXS and FXO ports as needed. Figure 8. Micrel s KSZ8342 SoC Block Diagram KSZ8382 SoC Family The KSZ8382 SoC is the ideal choice for endpoints components of an IP-based security system. The chip s extensive integration increases performance and reduces BOM cost, featuring a high-performance audio subsystem, LCD interface, keypad scanner, memory controllers for both SDRAM and DDR2, and flexible GPIO. The LCD Interface supports SPI (8-bit parallel interface). The keypad scanner can be used to support push buttons and even a full telephony keypad. GPIO can be used for a variety of functions including monitoring elements, door controls, indicators, etc. February 11, 2014 8 Revision 1.0

Figure 9. Micrel s KSZ8382 SoC Block Diagram Firmware: CPU and DSP The firmware for Micrel s KSZ8382 has a modular architecture to provide developers with variety of choices in developing their endpoint applications. Access at Call Control: For a turnkey solution, developers can leverage the built-in SIP call manager from the Endpoint Application. The layers below handle media transport and DSP functionality. Access at Media Transport: For developers who have their own SIP software (or want to implement other call control protocols) can use the RTP/RTCP access for media transport. As described above, the layers below handle network and DSP functionality. Access at DSP Resources: For developers who want their own call control and media transport (standardsbased or even proprietary) can access the DSP resources directly. The firmware supports a wide range of security features including signaling protection using SIP TLS, media encryption using SRTP, and STUN for working across firewalls. February 11, 2014 9 Revision 1.0

Conclusion Innovation in IP-based communication systems is driving the rapid pace of migration from analog to IP-based security systems. Micrel s KSZ8342 and KSZ8382 families of SoC provide a complete solution for IP-based security system components that can be used to upgrade legacy security systems in an efficient and costeffective manner and to add cloud services or to build a completely new IP/VoIP based application. These SoCs have a high level of integration through the integration of a 3-Port switch, PHY, amplifiers, audio interface, and PCM interface. Because of their built-in support for interfaces required for embedded and endpoint components, only a few additional external devices are needed to create a full-featured component. The firmware for these SoCs has a modular architecture to enable developers many choices in developing application software for these IP-based security components. Together, these SoCs and associated firmware can be used to create a wide range of IP-based security solutions. MICREL, INC. 2180 FORTUNE DRIVE SAN JOSE, CA 95131 USA TEL +1 (408) 944-0800 FAX +1 (408) 474-1000 WEB http://www.micrel.com Micrel makes no representations or warranties with respect to the accuracy or completeness of the information furnished in this data sheet. This information is not intended as a warranty and Micrel does not assume responsibility for its use. Micrel reserves the right to change circuitry, specifications and descriptions at any time without notice. No license, whether express, implied, arising by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Micrel s terms and conditions of sale for such products, Micrel assumes no liability whatsoever, and Micrel disclaims any express or implied warranty relating to the sale and/or use of Micrel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Micrel Products are not designed or authorized for use as components in life support appliances, devices or systems where malfunction of a product can reasonably be expected to result in personal injury. Life support devices or systems are devices or systems that (a) are intended for surgical implant into the body or (b) support or sustain life, and whose failure to perform can be reasonably expected to result in a significant injury to the user. A Purchaser s use or sale of Micrel Products for use in life support appliances, devices or systems is a Purchaser s own risk and Purchaser agrees to fully indemnify Micrel for any damages resulting from such use or sale. 2014 Micrel, Incorporated. February 11, 2014 10 Revision 1.0