I. Background introduction

With the rapid development of mobile communication industry, more and more unattended communication base stations will be established by various operators. Most of them have the disadvantages of remote location, sparsely populated and inconvenient transportation, which brings a lot of inconvenience to the daily maintenance of the base station. Many base stations, especially those installed in open areas, are often stolen, such as air conditioners and batteries.

The current communication base station is facing the following problems:

1, can not timely alarm: after the base station is stolen, the equipment failure or regular inspection was found after the incident, the base station, the machine room anti-theft work seems helpless, tired to deal with;

2. Difficulty in obtaining evidence: Sufficient and effective evidence is left at the scene of theft, which cannot provide favorable help for the public security organs to fight criminals.

Therefore, in order to ensure the security of communication, it is recommended to install monitoring and anti-theft system for each base station, which can deter and combat theft crimes.

Second, demand analysis

Establish a unified monitoring platform, install video monitoring terminals in each base station, realize the information supervision of base station, timely detect and deal with violations of laws and regulations, and ensure the safety of base station production. Therefore, the system as a whole has the following requirements:

1. Tower related departments can conduct real-time supervision of all base stations within their jurisdiction;

2. The real-time construction operation of each base station can be viewed through the HD webcam;

3. Alarm hints can be given through the camera’s movement detection and boundary crossing detection functions;

4. Adopt real-time video, when the case can be timely forensics, and keep the video for 30 days;

5. Leaders at all levels and the person in charge of the unit can watch it at any time through the Internet or mobile phone, which can reduce the workload and avoid the hidden danger without the knowledge of the leaders.

Iii. Plan deployment

In response to the above requirements, TSINGSEE Video suggests deploying Hikon cameras in base stations, inserting TF cards, using our EasyCVR integrated intelligent security system for the platform, and using HIKSDK/GB/Ehome protocol for device access according to the situation. EasyCVR can be output to client or third party systems through various protocols such as HLS/RTMP/RTSP.

Implementation process:

1. Install and arrange cameras in the base station;

2. Through configuration, connect related devices to EasyCVR platform (mainly used for video playback and cloud video) through corresponding protocols;

3. Videos watched through computer client;

3. Share the video with relevant personnel through wechat or APP;

4. Business systems can be integrated through API interfaces.

4. System functions

1. Real-time monitoring: through the camera system, relevant personnel can remotely check the situation of the base station in time.

2. Cloud recording: The system can conduct cloud recording to avoid video loss caused by equipment damage.

3. Video sharing: Share the video with relevant personnel through wechat or APP, and integrate the system into the business system through API to achieve unified management.

4, video review: when there is a problem, you can view the situation of the video through the video review.

EasyCVR video structured platform has a wide range of protocol compatibility, can be through hikang SDK, Onvif/RTSP, GB28181, Ehome protocol access to EasyCVR; Proprietary agreements with major manufacturers are also expanding. And the advantage of EasyCVR is that it can flexibly expand and shrink resources as needed, eliminating the conditions of plug-in installation and browser limitation, and realizing free viewing playback without plug-ins and multi-platform.

As a strong open video platform, EasyCVR also has rich secondary development interface, interface can be freely called secondary development, welcome to test understanding.