7.1. Overview7.1.1. Migration from Analog to Digital7.1.2. Local Area Network (LAN), Wide Area Network (WAN), Wireless LAN (WiFi)7.1.3. Internet7.1.4. Wireless 802.11, Spread Spectrum Modulation (SSM)7.1.5. Digital Video Recorder (DVR), Network DVR (NDVR)7.1.6. Network Security, Hackers, Viruses, Reliability7.2. Communication Channels7.2.1. Wired Channels7.2.1.1. Local Area Network (LAN)7.2.1.2. Power over Ethernet (PoE)7.2.1.3. Wide Area Network (WAN)7.2.1.4. Internet, World Wide Web (WWW)7.2.1.5. Leased Land Lines, DSL, Cable7.2.1.5.1. PSTN-ISDN Link7.2.1.5.2. DSL Link7.2.1.5.3. T1 and T3 Links7.2.1.5.4. Cable7.2.1.6. Fiber Optic7.2.2. Wireless Channels7.2.2.1. Wireless LAN (WLAN, WiFi)7.2.2.2. Mesh Network7.2.2.3. Multiple Input/Multiple Output (MIMO)7.2.2.4. Environmental Factors: Indoor–Outdoor7.2.2.5. Broadband Microwave7.2.2.6. Infrared (IR)7.3. Video Image Quality7.3.1. Quality of Service (QoS)7.3.2. Resolution vs. Frame Rate7.3.3. Picture Integrity, Dropout7.4. Video Signal Compression7.4.1. Lossless Compression7.4.2. Lossy Compression7.4.2.1. Direct Cosine Transform (DCT)7.4.2.2. Discrete Wavelet Transform (DWT)7.4.3. Video Compression Algorithms7.4.3.1. Joint Picture Experts Group: JPEG7.4.3.2. Moving—Joint Picture Experts Group: M-JPEG7.4.3.3. Moving Picture Experts Group: MPEG-2, MPEG-4, MPEG-4 Visual7.4.3.3.1. MPEG-2 Standard7.4.3.3.2. MPEG-4 Standard7.4.3.3.3. MPEG-4 Visual Standard7.4.3.4. MPEG-4 Advanced Video Coding (AVC)/H.2647.4.3.5. JPEG 2000, Wavelet7.4.3.6. Other Compression Methods: H.263, SMICT7.4.3.6.1. H.263 Standard7.4.3.6.2. SMICT Standard7.5. Internet-Based Remote Video Monitoring—Network Configurations7.5.1. Point to Multi-Point7.5.2. Point to Point7.5.3. Multi-Point to Point7.5.4. Video Unicast and Multicast7.6. Transmission Technology Protocols: WiFi, Spread Spectrum Modulation (SSM)7.6.1. Spread Spectrum Modulation (SSM)7.6.1.1. Background7.6.1.2. Frequency Hopping Spread Spectrum Technology (FHSS)7.6.1.3. Slow Hoppers7.6.1.4. Fast Hoppers7.6.1.5. Direct Sequence Spread Spectrum (DSSS)7.6.2. WiFi Protocol: 802.11 Standards7.6.2.1. 802.11b Standard7.6.2.2. 802.11a Standard7.6.2.3. 802.11g Standard7.6.2.4. 802.11n Standard7.6.2.5. 802.11i Standard7.6.3. Asynchronous Transfer Mode (ATM)7.7. Transmission Network Security7.7.1. Wired Equivalent Privacy (WEP)7.7.2. Virtual Private Network (VPN)7.7.3. WiFi Protected Access (WPA)7.7.4. Advanced Encryption Standard (AES), Digital Encryption Standard (DES)7.7.5. Firewalls, Viruses, Hackers7.8. Internet Protocol Network Camera, Address7.8.1. Internet Protocol Network Camera7.8.2. Internet Protocol Camera Protocols7.8.3. Internet Protocol Camera AddressMethod 1Method 2Method 37.9. Video Server, Router, Switch7.9.1. Video Server7.9.2. Video Router/Access Point7.9.3. Video Switch7.10. Personal Computer, Laptop, PDA, Cell Phone7.10.1. Personal Computer, Laptop7.10.2. Personal Digital Assistant (PDA)7.10.3. Cell Phone7.11. Internet Protocol Surveillance Systems: Features, Checklist, Pros, Cons7.11.1. Features7.11.2. Checklist7.11.3. Pros7.11.4. Cons7.12. Summary