Professional Documents
Culture Documents
HCIP-Intelligent Vision V1.0 Lab Guide
HCIP-Intelligent Vision V1.0 Lab Guide
HCIP-Intelligent Vision V1.0 Lab Guide
ISSUE:1.0
1
Copyright © Huawei Technologies Co., Ltd. 2020. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means
without prior written consent of Huawei Technologies Co., Ltd.
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their
respective holders.
Notice
The purchased products, services and features are stipulated by the contract made
between Huawei and the customer. All or part of the products, services and features
described in this document may not be within the purchase scope or the usage scope.
Unless otherwise specified in the contract, all statements, information, and
recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been
made in the preparation of this document to ensure accuracy of the contents, but all
statements, information, and recommendations in this document do not constitute a
warranty of any kind, express or implied.
Overview
This document is applicable to the candidates who are preparing for the HCIP-Intelligent
Vision exam and the readers who want to learn the intelligent vision basics, installation
and deployment, and standard protocols.
Description
This document consists of seven chapters. Chapter 1 describes how to install the
PowerCube500, Chapter 2 describes how to install and deploy cameras, and Chapter 3
describes how to install the photovoltaic (PV) module, lightning rod, and pole. Chapter 5–
7 describe how to commission an integrated video site, including how to commission the
PowerCube 500D, situation awareness camera, facial recognition camera, and license plate
recognition camera.
Networking
This experiment environment is intended for video site engineers who are preparing for
the HCIP-Intelligent Vision exam. Each experiment environment consists of two to six
cameras, one to two PowerCube 500s, one access switch, and one to four computers, and
is applicable to four to 12 trainees.
Device
The following table lists the recommended device configurations in each experiment
environment, including the device name, model, and software version:
Checking Devices
Before starting the experiment, check whether all required devices are ready. The following
table lists the required devices.
PowerCube 500 1
Experiment Topology
HCIP-Intelligent Vision V1.0 Experiment Guide Page 6
Contents
1.1 Introduction
1.1.1 About This Experiment
This experiment uses Huawei integrated video site as an example to describe how to install
and deploy components of a video site.
1.1.2 Objectives
Understand how to install and deploy the PowerCube 500.
Item Description
PMP microwave cables can be used only in scenarios where the PMP microwave is adopted.
The cables routed from the pole cable hole have a length of 1.5 m reserved.
The object where the pole is placed should be able to bear a load of at least 700 kg and at
least 850 mm high.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 12
There are three types of screw rods for installing the pole mounting kit. Choose the screw rods
that fit the pole diameter at the installation position.
Pole Diameter at the Installation Position (mm) Screw Rod Length (mm)
105–140 150
140–175 190
175–210 230
HCIP-Intelligent Vision V1.0 Experiment Guide Page 15
PMP microwave cables can be used only in scenarios where the PMP microwave is adopted.
Reserve a length of 1.5 m for the cable routed out of the pole cable hole, and reserve a length
of 0.5 m for the cable routed out of the cantilever cable hole.
The object where the pole is placed should be able to bear a load above 700 kg.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 16
Installing cantilevers
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 17
2 Camera Installation
2.1 Introduction
2.1.1 About This Experiment
This experiment uses Huawei integrated video site as an example to describe how to install
and deploy cameras at an integrated video site.
2.1.2 Objectives
Understand how to install and deploy different types of cameras during integrated video
site installation.
Step 1 Place the wall-mount bracket in the desired installation position. Use a marker to
mark the screw installation locations. Use a claw hammer to install white expansion
sleeves into the holes.
----End
Step 1 Install the universal joint in hole 2 of the pole-mount bracket. Fix the camera on the
universal joint using the screws marked with 1, adjust the horizontal and vertical
shooting angles, and tighten all the screws on the universal joint.
Step 2 Route three hose clamps through the installation holes on the pole-mount bracket,
place the hose clamps around the beam, and tighten them up. Adjust the shooting
angle and tighten all screws on the universal joint to secure the universal joint. Then
adjust the position of the sun shield marked with d.
----End
Step 1 Align the tapped holes on the wall-mount bracket with those on the pole-mount
bracket, and tighten the screws.
Step 2 Open up the three hose clamps and thread them through the installation holes on
the pole mount.
Step 3 Thread the cables that need to connect to the pigtails of the PTZ dome camera
through the pole-mount bracket and wall-mount bracket. Place the clamps around
the pole, tighten the clamps, and secure the pole-mount bracket to the pole.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 19
----End
Step 1 Thread the cables that need to connect to the pigtails of the fixed dome camera
through the pendant-mount bracket. Thread the four expansion bolts through the
four screw holes on the base of the pendant-mount bracket and tighten the nuts.
Step 2 Align the screw holes on the camera base with the installation slots on the mounting
plate. Thread the screws through the screw holes and tighten the screws.
Step 3 Connect the cables to the camera pigtail and insulate the cables. Align the screw
holes on the side of the mounting plate with the four screw holes on the mount
bracket, and then use a Phillips screwdriver to tighten the screws.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 20
3.1 Introduction
3.1.1 About This Experiment
This experiment describes how to install pole components at Huawei integrated video sites.
This experiment helps you understand how to install PV modules, lightning rods, and poles
for video sites.
3.1.2 Objectives
Understand how to install pole components at an integrated video site.
2 GE7 -
3 GE8/DI -
PV input power cables are used only in the solar-grid hybrid scenario.
PV input cables and battery cables are finished cables. You only need to strip the cables and
then insert them into the cable terminals.
AC input cables need to be prepared onsite. Multi-core cables must be used. Otherwise, water
leakage may occur on the waterproof connectors.
Before assembling cables with waterproof connectors, ensure that the connections between
the cables and terminals are secure and reliable.
Ensure that caps and waterproof connectors are installed at all idle ports on the
modules.
Install an RJ45 communications cable for a lithium battery.
Figure 3-12 Cable connection between the functional module and lithium batteries
Install a cable cover for lithium batteries (mains power scenario or solar-grid hybrid
scenario).
4.1 Introduction
4.1.1 About This Experiment
This experiment describes how to commission the PowerCube 500, helping you understand
indicator definition of the PowerCube 500 and the corresponding commissioning methods.
Step 1 Power on the lithium battery of the PowerCube 500 and check its status.
Step 2 Power on the function module of the PowerCube 500 and check its status.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 33
5.1 Introduction
5.1.1 About This Experiment
This experiment describes how to commission a situation awareness camera.
The field of view of the situation awareness camera must meet the following requirements:
The image angle shall be horizontal.
The shooting object shall be in the middle of the image.
During lens focusing, place an object for verifying focus (such as a sight meter) in a
position where pedestrians appear. Adjust the focus ring until the image becomes
the sharpest.
Connect the camera to the computer using a network cable. Set the computer IP
address to be in the same network segment as the camera's default IP address
(192.168.0.120), open Internet Explorer, enter the camera IP address https://
192.168.0.120 in the address bar, and press Enter to go to the camera web system.
You must change the user name and password when you log in to the camera web system for
the first time.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 37
− Time zone: Set the local time zone. For China, select (UTC+08:00) Beijing.
− Synchronization: You can select either Manual or NTP. To ensure the accuracy of
the clock, the network time protocol (NTP) is adopted in this experiment.
− NTP server: Enter the IP address of the NTP server. If the camera is registered with
the surveillance platform, enter the IP address of the surveillance platform.
− Synchronization interval (min): Retain the default value, which is 60 minutes.
Click Save.
d) Change the camera IP address.
On the View page, click the Network/Time tab, and set the parameters under Set IP
Address. Select Use the following IP address for IPv4 address assignment, change the
IP address, subnet mask, gateway, and domain name server (DNS) of the camera,
and click Save. Then use a network cable to connect the camera to the switch.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 38
After the IP address is changed, use the new IP address to log in to the camera. The figure
shown below is displayed.
You can use the buttons on the toolbar at the bottom of the live video pane to set live
video.
Button Function
Stop live video viewing. Click this button again to enable live video viewing.
Start or stop local recording. Click this button to start local recording. After
local recording is started, click the button again to stop local recording.
1. Click .
2. Draw a box on the video image. The area inside the box is automatically
displayed at the center of the video image.
Zooming in: Drag a box from left to right on a video image.
Zooming out: Drag a box from right to left on a video image.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 41
Button Function
1. Click .
2. Click a location on a video image to display the point at the center of
the video image.
The electronic PTZ (ePTZ) adjusts the focal length or shooting angle
through software, instead of by using lens zooming or PTZ rotation. The
ePTZ is mainly used to zoom in on high-resolution images to show more
details. Zooming in too far on low-resolution images may result in artifacts
due to the limited pixels.
The ePTZ function can be used only after the area cropping function is
enabled and live video is switched to the required secondary stream type.
A shorter distance between the arrow and the cross indicates a slower
rotation speed.
You can scroll the mouse wheel to control the zoom. The image zooms in
when the mouse wheel is scrolled up and zooms out when it is scrolled
down.
Button Function
Display the video stream resolution. The icon changes based on the video
resolution.
Toggle among Full Screen, Actual Size, 16:9, 4:3, and 1:1.
View real-time camera information, including the protocol type, frame rate,
resolution, current bit rate, and packet loss rate.
6.1 Introduction
6.1.1 About This Experiment
This experiment uses an X series SDC as an example to describe how to commission a facial
recognition camera.
Figure 6-7 Siemens star chart in the middle or slightly lower part of the image
In some special scenarios, you can enable wide dynamic range (WDR), draw a region of
interest (ROI), or make a profile plan to optimize the image effect. The common
troubleshooting methods for captured face images are as follows:
1. Dark face image in backlight conditions
Symptom: In backlight scenarios such as a lobby, face images are too dark.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 48
Solutions:
Method 1
Decrease the zoom ratio to enable the image view to cover more indoor areas,
reducing the impact of backlight on the image.
When the zoom ratio is reduced, the resolution of captured faces also decreases.
Check whether the horizontal resolution of captured faces reaches 120 pixels. If not,
the facial recognition effect is affected.
Method 2
Increase the face brightness compensation coefficient. If the face image is still dark,
enable WDR. This method can improve the brightness of faces, but may cause
overexposure of the background.
Increase brightness compensation: Choose Settings > Intelligent Analysis > Face
Detection, set the face compensation coefficient to about 60 (default value: 50), and
check the effect.
Enable WDR: Choose Settings > Video/Audio/Image > Image. Click Backlight and set
WDR/HLC/BLC to Wide dynamic range. Adjust the WDR coefficient to about 40.
3. Motion blur
Symptom: As the object moves fast and the shutter speed is slow, the captured
image is blurred.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 50
Solution: Adjust the shutter limit or decrease the noise reduction level.
Adjust the shutter limit: Choose Settings > Video/Audio/Image > Image. Click
Exposure and set Shutter limit (s) to 1/100.
Decrease the denoising level: If the problem persists, choose Settings >
Video/Audio/Image > Image > Image Enhancement. Decrease the noise reduction
level. Generally, the value is greater than or equal to 30. The default value is 50.
----End
Huawei WLAN Certification Training Lab Guide Page 51
7.1 Introduction
7.1.1 About This Experiment
This experiment uses an X series SDC as an example to describe how to commission a
license plate recognition camera.
Table 7-1 Key points for selecting a position for the ePolice camera
Traffic light
Pole height: 6 m
Stop line
8m L 9m
3.75m
X=20m
红绿灯
杆高6m
补光灯光斑位置
停止线
8m L 9m
X=20m
3.75m
摄像机 架杆高度
d 2m d 2m H=6m
频闪灯 频闪灯
车道2补光 车道1补光
Traffic light
Pole height: 6 m
Illuminator light spot
Stop line
8m L 9m
X=21.5m
3.75m
Traffic light
Pole height:
6m
Stop line
8m L 9m
X=21.5m
3.75m
Camera
Pole height
(H)=6 m
Strobe lights Strobe lights
(supplement light for d 2m d 2m (supplement light for
lanes 3 and 4) lanes 1 and 2)
Mode Description
External This detection mode can be selected if the camera has been connected
device to an external device (such as a loop detector). In this mode, only traffic
access behavior detected by external devices can trigger snapshot taking.
Video- The camera uses intelligent algorithms to analyze video images and
based determines whether to trigger traffic detection based on the vehicle
detection behavior.
Huawei WLAN Certification Training Lab Guide Page 55
Mode Description
Traffic light Obtains the status of the traffic light in Red light running
detector real time, and then transmits the
information to the camera so that the
camera can learn the status of the
traffic light in real time.
In ePolice mode, the external devices supported are the induction-loop vehicle detector
and traffic light detector.
a) Configure the RS-485 induction-loop vehicle detector.
Click the Vehicle Detector tab. Set related parameters based on the site
requirements, as shown in the following figure. To copy settings for a lane to other
lanes, select the lanes under Copy settings to and click Save.
----End
Huawei WLAN Certification Training Lab Guide Page 57
Figure 7-8 Key points for selecting a position for the standard checkpoint camera
Parameter Description
Device type Select a type from the drop-down list box based on the current
radar type. For Huawei radar detectors, select ACC7310 (A)
single-lane radar. For WHST radar detectors, select ACC7310 (B)
single-lane radar.
Serial port Port through which the radar connects to the camera.
Angle When the speed estimated by the radar differs greatly from the
actual vehicle speed, you can set this parameter to correct the
estimated speed. The specific value of this parameter can be
obtained from the commissioning software provided by the
radar vendor. The value ranges from 0 to 70.
Triggering distance Maximum distance from the radar to the position where the
(cm) speed estimation is triggered. Set this parameter based on the
site requirements. The default value 2400 is recommended.
Parameter Description
Height (cm) Installation height of the radar. The value ranges from 0 to
1000.
Speed correction In some special scenarios, the speed detected by radar needs to
be corrected to ensure the accuracy of the detection data.
Set this parameter based on the site requirements. The unit is
km/h. The value ranges from –50 to +50. The default value is –
2.
Non-motor vehicle Indicates whether to filter out non-motor vehicles based on the
filtration actual scenario. The options are as follows:
0: Reserve non-motor vehicles.
1: Filter out non-motor vehicles.
Huawei WLAN Certification Training Lab Guide Page 62
Parameter Description
Operating mode Detection and snapshot mode of the ACC7310 (B) radars. The
options are as follows:
Front trigger: Only approaching vehicles can be detected.
Data is sent only once for each vehicle that enters the
detection area. Data is not sent if no vehicle enters the
detection area.
Rear trigger: Only leaving vehicles can be detected. Data is
sent only once for each vehicle that enters the detection
area. Data is not sent if no vehicle enters the detection area.
Double touch mode: Both approaching and leaving vehicles
can be detected. Data is sent only once for each vehicle that
enters the detection area. Data is not sent if no vehicle
enters the detection area.
Continuous mode: When a vehicle enters the detection area,
data is sent. Data is not sent if no vehicle enters the
detection area.
Parameter Description
Parameter Description
Device type External device type. Set this parameter to Single I/O loop detector.
Snapshot Scheme for vehicle capture after the detector detects the vehicle. The
scheme options are as follows:
None: No snapshot is taken when a vehicle violates regulations.
One_Into loop 1: Only one loop is deployed. The camera takes a
snapshot of the vehicle when the vehicle enters the loop.
One_Out of loop 1: Only one loop is deployed. The camera takes a
snapshot of the vehicle when the vehicle leaves the loop.
Alarm Input Select the alarm input port that a single I/O loop vehicle detector
connects to. For example, if the single I/O loop vehicle detector is
connected to alarm input port 1 of the camera, set this parameter to
Alarm input 1.
Trigger Set this parameter based on the output signal triggering mode when
mode the vehicle passes the vehicle detector. The options are as follows:
None: The snapshot is not triggered when a vehicle passes the
vehicle detector.
Rising edge: When a vehicle passes the vehicle detector, the output
signal of the vehicle detector is rising edge-triggered.
Falling edge: When a vehicle passes the vehicle detector, the output
signal of the vehicle detector is falling edge-triggered.
ISSUE: 1.0
1
Copyright © Huawei Technologies Co., Ltd. 2020. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any
means without prior written consent of Huawei Technologies Co., Ltd.
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of
their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made
between Huawei and the customer. All or part of the products, services and features
described in this document may not be within the purchase scope or the usage scope.
Unless otherwise specified in the contract, all statements, information, and
recommendations in this document are provided "AS IS" without warranties,
guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has
been made in the preparation of this document to ensure accuracy of the contents, but
all statements, information, and recommendations in this document do not constitute
a warranty of any kind, express or implied.
Overview
This document is a training course for HCIP-Intelligent Vision certification. It is intended
for trainees who are going to take the HCIP-Intelligent Vision exam or readers who want
to understand Huawei Intelligent Vision platform construction, advanced service
commissioning, SDC technical principles, intelligent algorithm management and
application, and Intelligent Vision technologies such as video cloud.
Content Description
This document, which consists of seven parts, uses Huawei HoloSens IVS3800 (IVS3800)
as an example to provide the Intelligent Vision platform construction method step by
step.
Experiment 1 lists materials to be obtained (including software packages and
process files to be downloaded) before the experiment and describes how to
provide the LLD.
Experiment 2 describes how to install the IVS3800 platform server and
corresponding switches and how to connect the hardware.
In experiment 3, the network is configured (including configuration of switches
connected to servers and VLAN division) after experiment 2.
In experiment 4, basic data about hardware servers (including system time
setting and RAID creation) is configured.
In experiment 5, the CSP is installed. CSP installation determines the
architecture of the whole environment and lays a foundation of IVS
applications.
In experiment 6, the IVS application system is deployed. The IVS3800 is
installed and deployed in the experiment.
In experiment 7, system basic configuration is performed, including changing
the host name and configuring floating IP addresses, on the Intelligent Vision
platform. In addition, the surveillance platform and analysis platform are
connected.
Device Introduction
To meet the HCIP-Intelligent Vision experiment requirements, you are advised to use the
configurations described in the following table in each environment.
The following table describes the mapping among devices, models, and versions.
Desktop or laptop One for each group A PC must have a wireless network
adapter.
Experiment Topology
Requirements on switches
Device management Top of Rack (TOR): TOR access switch on the device
management plane. The management port of each hardware device is
connected to the switch. S5700 series switches are recommended.
Management TOR: TOR access switch on the management plane. The GE
electrical port on the management plane is connected to the switch. CE5800
series switches are recommended.
Service TOR: TOR access switch on the service plane. The 10GE optical port or
GE electrical port on the service plane is connected to the switch. CE6800 series
switches are recommended.
End of Row (EOR): aggregation switch. The networks of the service plane and
management plane are aggregated through the aggregation switch and then
connected to the customer's network.
Network requirements:
The GE electrical ports connected to the management TOR switch are bonded
in active-standby (Bond=1) mode. The 10GE optical ports or GE electrical ports
connected to the service TOR switch are bonded in LACP (Bond=4) mode. The
service TOR switch must support static LACP, and an Eth-Trunk must be
configured for the service TOR switch.
Management TOR switches and service TOR switches must be stacked.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 6
Contents
1 Preparations ........................................................................................................................................... 8
1.1 Introduction ................................................................................................................................................................................ 8
1.1.1 About This Experiment........................................................................................................................................................ 8
1.1.2 Objectives ................................................................................................................................................................................ 8
1.2 Configuration Procedure........................................................................................................................................................ 8
1.2.1 Downloading Software Packages and Process Files ................................................................................................ 8
1.2.2 Verifying Software Package Integrity ............................................................................................................................ 9
1.2.3 Obtaining Installation Tools ...........................................................................................................................................13
1.2.4 Changing the Power Plan on the Local Computer .................................................................................................13
1.2.5 Default IP Addresses, User Names, and Passwords ...............................................................................................14
1.2.6 Obtaining Project Configurations .................................................................................................................................15
1.2.7 Generating the LLD ............................................................................................................................................................17
2 Hardware Installation........................................................................................................................23
2.1 Introduction ..............................................................................................................................................................................23
2.1.1 About This Experiment......................................................................................................................................................23
2.1.2 Objectives ..............................................................................................................................................................................23
2.2 Configuration Procedure......................................................................................................................................................23
2.2.1 Installing the Switch Hardware .....................................................................................................................................23
2.2.2 Installing the Server Hardware ......................................................................................................................................29
2.2.3 Physical Network Connections .......................................................................................................................................30
3 Network Configuration .....................................................................................................................38
3.1 Introduction ..............................................................................................................................................................................38
3.1.1 About This Experiment......................................................................................................................................................38
3.1.2 Objectives ..............................................................................................................................................................................38
3.2 Configuration Procedure......................................................................................................................................................38
3.2.1 Configuring Basic Data .....................................................................................................................................................38
3.2.2 Configuring Stacking .........................................................................................................................................................43
3.2.3 Configuring the Switch Network ...................................................................................................................................44
4 Basic Configuration of the CSP.......................................................................................................50
4.1 Introduction ..............................................................................................................................................................................50
4.1.1 About This Experiment......................................................................................................................................................50
4.1.2 Objectives ..............................................................................................................................................................................50
4.2 Configuration Procedure......................................................................................................................................................50
4.2.1 Configuring the iBMC ........................................................................................................................................................50
HCIP-Intelligent Vision V1.0 Experiment Guide Page 7
1 Preparations
1.1 Introduction
1.1.1 About This Experiment
This experiment provides guidance on how to install devices, including downloading the
installation package and process file, obtaining project information, and generating the
LLD.
1.1.2 Objectives
Understand the platform installation software download path.
Master the LLD configuration method.
Download the software packages and process files to the local computer.
Step 1 Click the version package. The file download page is displayed. Select the public
key file KEYS and tool program VerificationTools and download them. The
signature verification guide is the operation guide, which can be downloaded as
required.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 11
Step 2 Click Select Public Key and select the downloaded KEYS file.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 12
----End
Serial Used to connect your computer Obtain the serial cable from the
cable to the console port of a switch delivered accessories of the switch or
for initial configuration of the purchase it separately. Before
switch. installing the CloudIVS 3000, ensure
that the driver is installed and
commissioned.
KVM Used to log in to the remote To download the KVM, visit the
console of the server following website:
independently. You can use this http://support.huawei.com/onlinetools
tool if login to the iBMC WebUI web/itexpress/kvmclient/cn.html
fails.
Step 3 Click Change settings for the plan, set Put the computer to sleep to 3 hours, and
click Save changes. The following page is displayed.
----End
To log in to the operating system in SSH mode, log in as the cspexpert user, and then run the su
- root command to switch to the root user.
Step 2 In the quotation list, find the corresponding project configuration list and click it
to enter the quotation list.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 16
Step 3 Find the corresponding server. The product parameter details page is displayed.
Step 5 Wait until the configuration is complete. The system exports the corresponding
Excel file, which contains the detailed configuration of the project.
----End
Step 2 Choose Tool Application Market, enter CloudDesign IVS, and click the search
result. The tool page is displayed.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 18
Step 3 Click Create. The Project Info page is displayed. Enter project information based on
the project requirements. Click Confirm to go to the next step.
Set parameters based on the site requirements. The following table describes the
parameters.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 19
Delivery Scenario The options are Capacity expansion Select New Deployment.
and
New Deployment.
Step 5 Click Next. The page for importing the configurator parameter file is displayed.
Step 6 Click Add File, select the file generated in the preceding step for obtaining the
project configurations, and click Next.
Step 7 When an import success dialog box is displayed, click OK. The following page is
displayed.
The BMC logical network and Outer_OM logical network can be on the same VLAN and the same
network segment. The setting method is as follows:
a In the navigation tree on the left, choose NE Logical Network Design.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 20
b Set Logical Network Name in the records whose Logical Network Type is
BMC_OM1 and Outer_OM1 to the same value, for example,
Outer_OM1_IVS3800_01.
c Click Next and then click Next.
Step 8 Set the network segment address and IP address range according to the network
plan, and click Next, as shown in the following page.
Do not change the Inner_OM and Inner_Service addresses. If you change the addresses, the
operation will fail and capacity expansion cannot be performed.
The following table describes the IP address input modes.
Click Next and perform the following steps to adjust the network configuration if
necessary:
a In the IP Network Segment Assignment area, adjust the values of Start IP and End IP
based on the value of IP Required Num, and click Next.
b In the Detailed IP Address Design area, adjust the value of IP based on the value of
IP Network Segment and click Next.
c In the NE Account Management area, record the user name, password, IP address,
and login URL, and click Next.
d In the Interconnection Design area, record the eSight connection information and
click Next.
e In the CSP Design area, set App Name and App ID, and click Next.
Step 10 Set VNF Version (CSP) to V100R019Cxx and VNF Scene (CSP) to
VERTICAL_AUTO_ARM.
Step 11 Select. The system automatically generates a configuration file. When the
configuration file is generated, the dialog box shown in the following figure is
displayed.
Step 12 Click this dialog box to download the configuration file. Then decompress the file
to obtain the JSON file.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 22
Step 13 Click Next. In the Generate Report area that is displayed, click Generate LLD
report. The system automatically generates a low level design (LLD) report, as
shown in the following figure.
Step 14 Click this dialog box to download the LLD report package. Then decompress the
package to obtain the LLD report (Excel file).
Step 15 Open the LLD report. When the message shown in the following figure is
displayed, click Enable Content.
Step 16 On the Cabinet Layout sheet, click Please click. The system automatically
generates the plan.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 23
2 Hardware Installation
2.1 Introduction
2.1.1 About This Experiment
In this experiment, you will master how to install Intelligent Vision-related hardware and
devices and physically connect them.
2.1.2 Objectives
Understand how to install Intelligent Vision-related hardware.
Master the installation method of Intelligent Vision-related network hardware.
Step 2 On a switch, the side with power modules and fan modules installed is the power
supply side, and the side with service ports is the port side. To leave sufficient
space for cabling, the vertical distance from the port side to the interior side of the
cabinet door must be no less than 130 mm, and the distance from the power
supply side to the interior side of the cabinet door must be no less than 70 mm.
Step 3 The cabinet must have reliable ground points to ground the switches.
Step 4 When the CE8800&7800&6800&5800 series switches need to be installed in the
same cabinet with a CE12800 switch, keep the distance between the front and
rear mounting rails in the range of 700 mm to 800 mm.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 24
----End
Step 1 Measure the distance between the front and rear mounting bars in the cabinet.
The mounting brackets, mounting bracket installation methods, and mounting
bracket guide rails vary depending on the obtained distance. For details, see Table
2-2
HCIP-Intelligent Vision V1.0 Experiment Guide Page 25
Step 2 Use M4 screws to install mounting brackets on the switch. The following table
lists the installation methods for different distances between mounting bars.
Table 2-2 Selection of mounting brackets and rear mounting bracket guide rails
HCIP-Intelligent Vision V1.0 Experiment Guide Page 26
Step 3 Install two floating nuts on each mounting bar on the front and rear sides of the
cabinet. A total of eight floating nuts are installed.
Step 4 Connect the ground cable to the switch and place the other end of the ground
cable on the top of the switch. The ground points of the CE6850HI, CE6855-
48T6Q-HI, CE6856-48T6Q-HI, CE6850U-HI, and CE6875EI are located at the front
of the switch (power supply side).
Step 5 Use M6 screws to install guide rails on the front mounting bars.
Step 6 Hold the switch with both hands, align the mounting ears on both sides of the
switch with the guide rails, and slowly insert the switch into the cabinet.
----End
Fixed by latches
Horizontally insert the power module into the slot until the power module is completely
inserted into the slot. Then, the latch is automatically locked.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 28
The silkscreen of the slot where the 10GE network adapter is located is SLOT7.
The silkscreen of the slots for GE network adapters on the left is OCP(NIC)1, and that on the
right is OCP(NIC)2.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 31
The silkscreen of the slot where the 10GE network adapter is located is SLOT1.
The silkscreen of the slots for GE network adapters on the left is OCP(NIC)1, and that on the
right is OCP(NIC)2.
The following table describes the logical numbers.
Ports 1 and 2 must be bonded in LACP mode, and ports 3 and 4 must be bonded in
active/standby mode to improve network reliability.
The PoE function must be disabled for the switch to ensure server network connectivity.
The silkscreen of the slot where the 10GE network adapter is located is SLOT3.
The silkscreen of the slots for GE network adapters on the left is OCP(NIC)1, and that on the
right is OCP(NIC)2.
The following table describes the logical numbers.
Ports 1 and 2 must be bonded in LACP mode, and ports 3 and 4 must be bonded in
active/standby mode to improve network reliability.
The PoE function must be disabled for the switch to ensure server network connectivity.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 33
The IVS3800S V2 and IVS3800SH V2 support GE electrical ports or 10GE optical ports for
the service plane. If a server is configured with 10GE optical ports, you must use the 10GE
optical ports for connection to ensure network connectivity of the service plane after the
installation.
Before the arrival of service optical switches or server optical modules, you can use GE
electrical ports for service commissioning. After the arrival of service optical switches
or server optical modules, you can switch back to 10GE optical ports.
The IVS3800S V2 is a 4 U server. The server provides two GE electrical ports for the
management plane and a maximum of six GE electrical ports for the service plane. When
only one server is deployed, the number of electrical service ports can be flexibly
configured based on service requirements. When two or more servers are deployed, all
the six GE ports on the service plane must be connected to switches.
Figure 2-9 Physical connection diagram (GE electrical ports for the service plane)
The silkscreen of the slots for GE network adapters on the left is OCP(NIC)1, and that on the
right is OCP(NIC)2.
The following table describes the logical numbers.
The IVS3800S V2 also allows you to use 10GE optical ports to replace six GE electrical
ports on the service plane.
Figure 2-10 Physical connection diagram (10GE optical ports for the service plane)
The silkscreen of the slot where the 10GE network adapter is located is SLOT7.
The silkscreen of the slots for GE network adapters on the left is OCP(NIC)1, and that on the
right is OCP(NIC)2.
In the physical connection diagram, ports 1 and 2 must be bonded in LACP mode, and ports
3 and 4 must be bonded in active/standby mode to improve network reliability.
The PoE function must be disabled for the switch to ensure server network connectivity.
Figure 2-11 Physical connection diagram (GE electrical ports for the service plane)
The silkscreen of the slots for GE network adapters on the left is OCP(NIC)1, and that on the
right is OCP(NIC)2.
The IVS3800SH V2 also allows you to use 10GE optical ports to replace six GE electrical
ports on the service plane.
Figure 2-12 Physical connection diagram (10GE optical ports for the service plane)
The silkscreen of the slot where the 10GE network adapter is located is SLOT3.
The silkscreen of the slots for GE network adapters on the left is OCP(NIC)1, and that on the
right is OCP(NIC)2.
In the physical connection diagram, ports 1 and 2 must be bonded in LACP mode, and ports 3
and 4 must be bonded in active/standby mode to improve network reliability.
The PoE function must be disabled for the switch to ensure server network connectivity.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 38
3 Network Configuration
3.1 Introduction
3.1.1 About This Experiment
After completing this experiment, you will be able to configure switches during the
construction of the Intelligent Vision platform.
3.1.2 Objectives
Master the basic data configuration of the switch.
Learn how to configure switch stack.
Learn how to divide VLANs of switches.
Step 1 Use a serial cable to connect the local computer to the console port of the switch.
Connect the DB9 connector of the console cable delivered with the product to
the 9-pin serial port on the computer, and connect the RJ-45 connector to the
console port on the switch.
Portable computers do not have DB-9 COM ports. In this case, a USB-to-COM converter is
required.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 39
Step 2 Use PuTTY to log in to the console port of the switch. In the PuTTY window,
configure the following login information and click Open.
Parameter Value
"Speed" "9600"
Step 3 (Optional) Set a password for logging in to the switch through the serial port. This
password is required only when you log in to the switch for the first time.
An initial password is required for the first login via the console.
Continue to set it? [Y/N]: y
Set a password and keep it safe! Otherwise you will not be able to login via the console.
Please configure the login password (8-16)
Enter Password: // The password is in ciphertext and is not displayed on the GUI.
Confirm Password:
The password is a string of 8 to 16 case-sensitive characters. The password must contain at least two
types of the following characters: uppercase letters, lowercase letters, digits, and special characters.
The special characters do not include the question mark (?) or space character.
Step 5 Optional: Configure data for the user to log in based on STelnet. Configure the
expert user and the password Changeme_123. After the configuration is
successful, use the PuTTY to log in to the switch management port. You need to
change the password upon first login based on STelnet. Configure the information
only when you need to remotely access a switch on the live network.
Step 6 Optional: Configure the switch time zone. You need to configure this information
only when the time zone on the live network is different from the default time
zone.
Step 7 (Optional) Connect to the NTP server. You need to connect to the NTP server only
when an independent NTP server is planned on the live network.
When an external NTP server is connected, the client and server passwords are authenticated (NTP
authentication). Then, the client synchronizes data only with devices that pass the authentication,
improving the network security. If NTP authentication is not configured on the NTP server, you do not
need to configure NTP authentication on the client. The following describes the configuration in the
two scenarios:
NTP authentication not configured on the NTP server
<S1_LSW_EOR01>system-view // Going to the system view
[~S1_LSW_EOR01]ntp unicast-server 10.1.1.1 vpn-instance VRF_OM
HCIP-Intelligent Vision V1.0 Experiment Guide Page 42
// Connecting to the external NTP server. In this example, the IP address of the external NTP server is
10.1.1.1. vpn-instance VRF_OM: VPN instance used for interworking with the NTP server. If no VPN
instance is available, you do not need to add this parameter.
[~S1_LSW_EOR01]commit // Submitting the configuration
NTP authentication configured on the server
<S1_LSW_EOR01>system-view // Going to the system view
[~S1_LSW_EOR01]ntp authentication enable // Enabling NTP authentication
[*S1_LSW_EOR01]ntp authentication-keyid 42 authentication-mode hmac-sha256 Hello@123456 //
Configuring the NTP authentication key
[*S1_LSW_EOR01]ntp trusted authentication-keyid 42 // Claiming a trusted key
[*S1_LSW_EOR01]commit // Submitting the configuration
[~S1_LSW_EOR01]ntp unicast-server 10.1.1.1 authentication-keyid 42 vpn-instance VRF_OM//
Connecting to an external NTP server and using the key with the ID 42 for encryption
[*S1_LSW_EOR01]commit // Submitting the configuration
Step 8 (Optional) Configure the daylight saving time (DST). This step is performed only
when the DST is configured in the local place of the carrier.
Run clock daylight-saving-time to configure the DST. The following configurations are supported:
You can run commands to modify the current configuration of the device. However, the modifications
will be lost after a restart. To make your modifications valid after a restart, run save configuration-file
in the user view to save your configurations in the configuration file.
<S1_LSW_EOR01>save
The current configuration will be written to the device.
Are you sure to continue?[Y/N]y
Now saving the current configuration to the slot 0...
Save the configuration successfully.
No stacking cable is connected between the switches before they are stacked. If stacking cables
are connected before stacking is configured, network loops may occur.
Before the configuration, ensure that you have obtained the stack data plan of the switch.
Step 1 Use the local computer to connect to the console port of the active switch.
Step 2 Use serial cables to connect standby switches and configure stacks. Use stacking
ports 10GE 1/0/1 and 10GE 1/0/2 as an example.
<S1_LSW_EOR01>display stack
--------------------------------------------------------------------------------
MemberID Role MAC Priority DeviceType Description
--------------------------------------------------------------------------------
1 Master 006c-2003-0740 100 CE5855-48T4S2Q-EI # Active switch
+2 Standby 006c-2003-0780 50 CE5855-48T4S2Q-EI # Standby switch
Step 6 Configure DAD. After stacking, configure DAD to check and process the dual-
active conflicts during stack split.
<S1_LSW_EOR02>system-view
[~S1_LSW_EOR02]interface ge1/0/48
[~S1_LSW_EOR02-GE1/0/48]dual-active detect mode direct
Warning: The interface will block common data packets, except BPDU packets. Continue? [Y/N]:Y
[*S1_LSW_EOR02-GE1/0/48]commit
[~S1_LSW_EOR02-GE1/0/48]return
<S1_LSW_EOR02>save
----End
10GE optical Service optical Internal service Configure trunk 600 Inner_ Network
service port/GE port network/Inner_ interfaces on the Servic segment:
electrical switch/service Service switch. e 172.18.0.0/16
service port electrical port Plan an
independent VLAN
ID.
For details about the switch port plan, see the Server Cable Connection sheet in the LLD
report.
This section uses the default VLAN IDs as an example. The actual switch configuration
may vary.
<S1_LSW_EOR01>system-view
HCIP-Intelligent Vision V1.0 Experiment Guide Page 46
[~S1_LSW_EOR01]vlan 200
[*S1_LSW_EOR01-vlan200]description BMC_OM
[*S1_LSW_EOR01-vlan200]quit
[*S1_LSW_EOR01]commit
Use the same method to configure other interfaces on the switch based on physical
connections.
[~S1_LSW_EOR01]quit
<S1_LSW_EOR01>save
The current configuration will be written to the device.
Are you sure to continue?[Y/N]y
Now saving the current configuration to the slot 0...
Save the configuration successfully.
<S1_LSW_EOR01>display current-configuration
----End
<S1_LSW_EOR02>system-view
[~S1_LSW_EOR02]vlan 400
[*S1_LSW_EOR02-vlan300]description Inner_OM
[*S1_LSW_EOR02-vlan300]quit
[*S1_LSW_EOR02]vlan 300
[*S1_LSW_EOR02-vlan400]description Outer_OM
[*S1_LSW_EOR02-vlan400]quit
[*S1_LSW_EOR02]commit
The network plane (Inner_OM) of VLAN 400 does not have a gateway. Therefore, you do not
need to configure the VLAN IF interface.
Use the same method to configure other interfaces on the switch based on physical
connections.
Two GE ports on the physical node are bonded in active/standby (bond=1) mode, so you
do not need to configure LACP on the switch.
[~S1_LSW_EOR02]quit
<S1_LSW_EOR02>save
The current configuration will be written to the device.
Are you sure to continue?[Y/N]y
Now saving the current configuration to the slot 0...
Save the configuration successfully.
----End
<S1_LSW_EOR03>system-view
[~S1_LSW_EOR03]vlan 600
[*S1_LSW_EOR03-vlan500]description Inner_Service
[*S1_LSW_EOR03-vlan500]quit
[*S1_LSW_EOR03]vlan 500
HCIP-Intelligent Vision V1.0 Experiment Guide Page 48
[*S1_LSW_EOR03-vlan600]description Outer_Service
[*S1_LSW_EOR03-vlan600]quit
[*S1_LSW_EOR03]commit
The network plane (Inner_Service) of VLAN 600 does not have a gateway. Therefore, you do not
need to configure the VLAN IF interface.
For a server that uses 10GE optical ports, add the two switch ports connected
to the server to an Eth-Trunk.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 49
For a server that uses GE electrical ports, add the six switch ports connected to
the server to an Eth-Trunk.
Add all switch ports connected to each server to an Eth-Trunk. Configure
different Eth-Trunks for different servers.
If LACP (bond=4) has been configured for the service plane of the server, you
need to configure static LACP on the switch.
If the switch does not support the lacp-static mode, run the mode lacp command.
If the switch does not support the src-dst-ip mode, you are advised to use the src-ip mode.
If NAT is configured between the system and other components and the switch supports NAT, the
user-defined enhanced load balancing mode is recommended. If the switch cannot calculate hash
based on the port number of the Layer 4 protocol to implement load balancing, the network
bandwidth performance may deteriorate.
[~S1_LSW_EOR03]quit
<S1_LSW_EOR03>save
The current configuration will be written to the device.
Are you sure to continue?[Y/N]y
Now saving the current configuration to the slot 0...
Save the configuration successfully.
<S1_LSW_EOR03>display current-configuration
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 50
4.1 Introduction
4.1.1 About This Experiment
After completing this experiment, you can master how to set basic parameters of the
Intelligent Vision platform, for example, configuring the remote access IP address of the
iBMC, time zone, time, and RAID card mode, ensuring that the systems deployed later
can run properly.
4.1.2 Objectives
Master the iBMC configuration method.
Learn how to set the server time and memory mode.
Learn how to configure RAID for system disks and data disks.
If you cannot access the iBMC login page on the computer, use either of the following methods
to rectify the fault:
Add a route to the same network segment as the iBMC on the computer.
If the computer is configured with a proxy server, disable the proxy server.
d Choose iBMC Settings > Network Settings and configure a new IP address as
planned, as shown in the following figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 51
e Click Save.
f Use a network cable to connect the iBMC port to the switch based on the network
plan.
g Change the computer IP address to one in the same network segment as the new
iBMC IP address.
h Visit https://Newly configured iBMC IP address.
b Choose Virtual Console. Set Timeout Period (min) to 0 to avoid forced logout during
CSP installation.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 53
Step 4 (Skip this step for the IVS3800SH V2 server.) Set the RAID controller card to work
in JBOD mode.
----End
invalid during image package loading and the system may run abnormally after the
installation.
− If the iBMC firmware version is not 5.62, upgrade or downgrade the iBMC
firmware.
− If the BIOS firmware version is not 1.25, upgrade or downgrade the BIOS
firmware.
− If the CPLD firmware version is not 3.12, upgrade or downgrade the CPLD
firmware.
− If the versions do not meet the requirements, download the firmware and
install the firmware at http://support.huawei.com/.
----End
b Click and select BIOS Setup to display the BIOS Setup menu upon server startup.
c Click and select Forced Restart. In the dialog box that is displayed, click OK to
forcibly restart the system.
d During the restart, when the interface shown in the following figure is displayed,
press Delete to enter the password input interface.
e Enter the password and press Enter. The default password is Admin@9000. If the
system prompts you to change the password, press Enter.
The interface shown in the following figure is displayed.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 56
f Click the Main tab and set the system time. The CSP requires that the server time be
set to the UTC time.
For example, if Beijing time is 08:00, set the system time to 00:00 because the Beijing
time zone is UTC+8.
If New York time is 08:00, set the system time to 13:00 because the New York time zone
is UTC-5.
− Use the arrow keys on the keyboard to select System Time. Then set the time
in HH:MM:SS format.
− Use the arrow keys on the keyboard to select System Date. Then set the date in
MM/DD/YYYY format.
To switch among the hour, minute, and second settings, press Enter. To change a value, use the
following methods:
HCIP-Intelligent Vision V1.0 Experiment Guide Page 57
b Set Die Interleaving, Channel Interleaving 3Way, and NUMA to Enable, Rank
Interleaving to 4-way Interleave, One Numa Per Socket to Disabled, and
Memory Test to Disable.
b Verify that Support Smmu and CPU Prefetching Configuration are set to
Disabled.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 60
b Select the required RAID controller card and press Enter. The main interface
shown in the following figure is displayed.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 62
d Select Advanced Controller Properties and press Enter. The Advanced Controller
Properties interface is displayed, as shown in the following figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 63
e Select Spare and press Enter. The Spare interface is displayed, as shown in the
following figure.
Physical Node Configure RAID Configure RAID Groups for Data Disks
Type Groups for System (Yes/No)
Disks (Yes/No)
IVS3800C V2 Yes. RAID 1 with two Yes. RAID 5 with six 3.84 TB SSDs.
960 GB SSDs. Yes. RAID 1 with two 3.84 TB SSDs.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 64
Physical Node Configure RAID Configure RAID Groups for Data Disks
Type Groups for System (Yes/No)
Disks (Yes/No)
There are no SATA disks.
IVS3800R V2 Yes. RAID 1 with two Yes. RAID 5 with six 3.84 TB SSDs.
960 GB SSDs. Yes. RAID 1 with two 3.84 TB SSDs.
There are no SATA disks.
The NVMe disks automatically form a
RAID 0 group. No configuration is
required.
IVS3800F V2 Yes. RAID 1 with two Yes. RAID 5 with four 3.84 TB SSDs.
960 GB SSDs. Yes. RAID 1 with two 3.84 TB SSDs.
No for SATA disks. However, the
firmware state of SATA disks must be set
to JBOD.
The NVMe disks automatically form a
RAID 0 group. No configuration is
required.
----End
Figure 4-22 Setting the firmware state for the hard disk
b Click OK.
c Set Firmware State to UNCONFIGURED GOOD for the other system disk in the
same way.
By default, you need to set Disk0 and Disk1 for the IVS3800S V2, IVS3800C V2, and
IVS3800R V2, and Disk40 and Disk41 for the IVS3800F V2.
The following table describes the parameters. Set the parameters according to the setting
method in the following table.
Strip Size Size of a data stripe on each physical drive. Use the default value.
Read Policy Data read policy of the logical drive. Use the default value.
Write Policy Data write policy of the logical drive. Use the default value.
IO Policy I/O policy for reading data from special Use the default value.
logical drives. This policy does not affect
cache pre-reading.
Drive Cache Cache policy of the physical drive. Use the default value.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 69
Access Access policy of the logical drive. Use the default value.
Policy
Initialization Indicates whether to initialize the logical Select Quick Init. In the
State drive. dialog box that is
displayed, click OK.
Number of Number of physical disks per span when You do not need to set
Drives per the RAID level is 10, 50, or 60. this parameter.
Span
Physical Disks to be added to the logical drive. Select the system disks,
Drive for example, Disk0 and
Disk1.
By default:
Select Disk0 and Disk1
for the IVS3800S V2,
IVS3800C V2, and
IVS3800R V2.
Select Disk40 and
Disk41 for the
IVS3800F V2.
----End
Figure 4-27 Setting the system boot drive
Figure 4-28 Setting the firmware state for the hard disk
b Click OK.
c Set Firmware State to UNCONFIGURED GOOD for other data disks in the same
way.
The following table describes the parameters. Set the parameters by referring to the
Setting column.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 73
Strip Size Size of a data stripe on each Use the default value.
physical drive.
Read Policy Data read policy of the logical Use the default value.
drive.
Write Policy Data write policy of the logical Use the default value.
drive.
IO Policy I/O policy for reading data from Use the default value.
special logical drives. This policy
does not affect cache pre-
reading.
Drive Cache Cache policy of the physical Use the default value. Select
Policy drive. Disk's Default.
Access Policy Access policy of the logical drive. Use the default value.
RAID Level RAID level of the logical drive. If you select Disk0 to Disk3,
select 5.
If you select Disk4 to Disk5,
select 1.
Number of Drives Number of physical disks per You do not need to set this
per Span span when the RAID level is 10, parameter.
50, or 60.
----End
Figure 4-32 Setting the firmware state for the hard disk
b Click OK.
c Set Firmware State to UNCONFIGURED GOOD for other data disks in the same
way.
In full configuration, you need to set this parameter for data disks from Disk2 to Disk9.
Strip Size Size of a data stripe on each Use the default value.
physical drive.
Read Policy Data read policy of the logical Use the default value.
drive.
Write Policy Data write policy of the logical Use the default value.
drive.
IO Policy I/O policy for reading data Use the default value.
from special logical drives. This
policy does not affect cache
pre-reading.
Drive Cache Cache policy of the physical Use the default value. Select
HCIP-Intelligent Vision V1.0 Experiment Guide Page 76
Access Policy Access policy of the logical Use the default value.
drive.
RAID Level RAID level of the logical drive. If Disk2 to Disk7 are selected,
select 5.
If Disk8 and Disk9 are
selected, select 1.
Number of Drives Number of physical disks per You do not need to set this
per Span span when the RAID level is 10, parameter.
50, or 60.
a Click Add on the right of RAID Card1. Select Disk2 to Disk7 and manually change the
capacity to 101 GB, as shown in the following figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 77
d Use the same method to create the common logical drive. Select Disk2 to
Disk7. The capacity and RAID level are automatically displayed. After the
configuration is complete, view the configuration result.
e Create the mp logical drive. Create RAID 1 based on the parameter description,
set RAID Level to 1, and select Disk8 and Disk9. The following figure shows the
configuration.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 79
f After the configuration is complete, click Save and check whether the
configuration is correct, as shown in the following figure.
----End
Figure 4-36 Setting the firmware state for the hard disk
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 80
5.1 Introduction
5.1.1 About This Experiment
This experiment provides guidance on how to install the cloud service platform (CSP).
5.1.2 Objectives
Learn how to install the active and standby management nodes using an ISO
file.
Learn how to install service nodes.
b. Click and select BIOS Setup to display the BIOS Setup menu upon server startup.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 81
c. Click and select Forced Restart. In the dialog box that is displayed, click OK to
forcibly restart the system.
d. During the restart, when the interface shown in the following figure is displayed, press
Delete and then enter the password on the password input page. Press Enter to enter the
BIOS interface.
Step 4 Save the system settings. Press F10. The message "Save configuration changes and
reset and exit?" is displayed. Click Yes to save the settings. The system
automatically restarts to complete the settings.
----End
Step 2 In the Virtual Console area on the Home page, choose Start > HTML5 Integrated
Remote Console (Shared). The interface shown in the following figure is displayed.
Step 4 Mount the DVD-ROM image file, as shown in the following figure.
During the installation, do not disconnect the mounted DVD-ROM image. Otherwise,
the CSP installation will fail.
----End
5.2.2.1.3 Installing the CSP Using an ISO File
Step 1 Click and select Forced Restart. In the dialog box that is displayed, click OK
to forcibly restart the system.
If the information shown in the following figure is displayed, the CSP installation starts.
Step 2 Wait for 2 to 3 minutes. The CSP configuration page is displayed. Complete the
CSP configuration according to the process shown in the following figure.
The data used in the configuration example is for reference only. Use the data
specified in the live network plan during the installation.
The following figure describes the parameters and data required for installing the
CSP.
Is New Installation New Installation: Install the CSP for the Select New
first time. Installation.
Reinstallation: Reinstall the CSP.
Install Mode Single Install: Install the service server Select Single Install.
in single-node system mode.
Cluster Install: Install the service server
in cluster mode.
Install Mode Include CSP: Install the CSP Select Include CSP.
management node.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 85
During installation, you can press the up and down arrow keys to switch parameters,
press Tab to switch the parameter area, press Enter to select a parameter, and press Esc
to exit the installation interface. If you press any other keys, there will be no response.
Exercise caution when pressing Esc.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 88
HCIP-Intelligent Vision V1.0 Experiment Guide Page 89
Step 3 Check whether the system automatically restarts after the installation. The restart
takes about 5 minutes. After the restart, the remote login page is displayed, as
shown in the following figure. For the IVS3800S V2 or IVS3800SH V2, the system
does not automatically restart. Press Enter to switch to the remote login page. If a
blank screen is displayed on the remote login page, press Enter.
If the message "Installation Successful" is not displayed during the installation and the
page shown in the following figure is displayed, perform the following steps to check
system deployment logs. Ensure that the installation is successful and then perform
subsequent operations.
a Log in to the system background as the cspexpert user. The default password
of the cspexpert user is mt2017@cspos@RD.
b Run the su - root command to switch to the root user. The default password of
the root user is cnp200@cspos@RD.
c Run the cat /opt/csp/csp_edge_log/edge_install.log command to check the
installation progress. If 100% is displayed in the command output, the CSP or
service operating system is installed successfully.
CSP-OM install process 100%
HCIP-Intelligent Vision V1.0 Experiment Guide Page 90
Step 4 On the remote login page of the server, click Disconnect to disconnect the
CD/DVD-ROM image, as shown in the following figure.
Step 5 On the iBMC WebUI, choose System > BIOS Settings, set Effective to Permanent
and Boot Medium to Hard Drive, and click Save.
Step 2 Open a browser, enter https://Floating IP address:31943 in the address box, and
press Enter. Ignore the displayed security warning. The CSP login page is
displayed. Enter the default user name (admin) and password (Changeme_123).
Change the default password as prompted upon your first login.
Wait about 2 to 3 minutes after the installation is complete. Then log in to the CSP OM portal.
Use Google Chrome v46.0 or a later version to log in to the CSP OM portal.
You are advised to disable the translation function of the browser. Otherwise, garbled characters
may appear.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 91
Step 3 Check for faulty servers and containers at the bottom of the Home page. If there
is no faulty server or container, the CSP is successfully installed.
----End
During the installation, set the parameters in strict accordance with the LLD report.
Otherwise, the installation may fail or O&M exceptions may occur after the installation.
The following table describes the parameters and data required for installing a service
node.
Is New New Installation: Install the CSP for the first Select New
Installation time. Installation.
Reinstallation: Reinstall the CSP.
Install Mode Single Install: Install the service server in Select Single Install.
single-node system mode.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 92
Install Mode Include CSP (First Node): Install the CSP Select Exclude CSP.
master management node.
Include CSP (Other Node): Install the CSP
slave management nodes.
Exclude CSP: Install a service node.
Step 2 In the Virtual Console area on the Home page, choose Start > HTML5 Integrated
Remote Console (Shared). The interface shown in the following figure is displayed.
Step 4 Mount the DVD-ROM image file, as shown in the following figure.
During the installation, do not disconnect the mounted DVD-ROM image. Otherwise,
the CSP installation will fail.
----End
5.2.2.2.3 Installing the Operating System on a Service Node Using an ISO Image
Step 1 Click and select Forced Restart. In the dialog box that is displayed, click OK
to forcibly restart the system.
If the information shown in the following figure is displayed, the CSP installation starts.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 94
Step 2 Wait for 2 to 3 minutes. The CSP configuration page is displayed. Complete the
service node configuration according to the process shown in the following figure.
The data used in the configuration example is for reference only. Use the data
specified in the live network plan during the installation.
During installation, you can press the up and down arrow keys to switch
parameters, press Tab to switch the parameter area, press Enter to select a
parameter, and press Esc to exit the installation interface. If you press any
other keys, there will be no response.
Exercise caution when pressing Esc.
It takes about 20 to 60 minutes for the CSP to complete the configuration after you specify
required parameters. You are advised to pay attention to the installation progress and do not
switch to other pages to ensure successful installation.
Step 3 Check whether the system automatically restarts after the installation. The restart
takes about 5 minutes. After the restart, the remote login page is displayed, as
shown in the following figure. If a blank screen is displayed on the remote login
page, press Enter.
If the message "Installation Successful" is not displayed during the installation and the page
shown in the preceding figure is displayed, perform the following steps to check system
deployment logs. Ensure that the installation is successful and then perform subsequent
operations.
Log in to the system background as the cspexpert user. The default password of the cspexpert
user is mt2017@cspos@RD.
Run the su - root command to switch to the root user. The default password of the root user is
cnp200@cspos@RD.
Run the cat /opt/csp/csp_edge_log/edge_install.log command to check the installation progress. If
100% is displayed in the command output, the CSP or service operating system is installed
successfully.
CSP-OM install process 100%
Step 4 On the remote login page of the server, click Disconnect to disconnect the
CD/DVD-ROM image, as shown in the following figure.
Step 5 On the iBMC WebUI, choose System > BIOS Settings, set Effective to Permanent
and Boot Medium to Hard Drive, and click Save.
----End
You need to install the CSP master management node after all CSP slave
management nodes.
The IVS3800C V2 and IVS3800R V2 can only be used as service nodes.
During the installation, set the parameters in strict accordance with the LLD report.
Otherwise, the installation may fail or O&M exceptions may occur after the installation.
Step 2 In the Virtual Console area on the Home page, choose Start > HTML5 Integrated
Remote Console (Shared). The interface shown in the following figure is displayed.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 98
Step 4 Mount the DVD-ROM image file, as shown in the following figure. Click Connect.
During the installation, do not disconnect the mounted DVD-ROM image. Otherwise,
the CSP installation will fail.
----End
5.2.3.1.3 Installing the CSP Using an ISO File
Step 1 Click and select Forced Restart. In the dialog box that is displayed, click OK
to forcibly restart the system.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 99
If the information shown in the following figure is displayed, the CSP installation starts.
Step 2 Wait for 2 to 3 minutes. The CSP configuration page is displayed. Complete the
CSP configuration according to the process shown in the following figure.
The data used in the configuration example is for reference only. Use the data
specified in the live network plan during the installation.
The following figure describes the parameters and data required for installing the
CSP.
Is New Installation New Installation: Install the CSP for the Select New
first time. Installation.
Reinstallation: Reinstall the CSP.
Install Mode Single Install: Install the service server in Select Cluster
single-node system mode. Install.
Cluster Install: Install the service server in
cluster mode.
Install Mode Include CSP (First Node): Install the CSP Select Include CSP
master management node. (Other Node).
Include CSP (Other Node): Install the CSP
slave management nodes.
Exclude CSP: Install a service node.
CSP Network Internal VLAN ID: VLAN ID corresponding Obtain the values
Configurations to the CSP internal management plane from the
(Inner_OM). Installation
Parameter Value
Host IP: IP address used by the CSP host to sheet in the LLD
communicate with the internal report.
management plane (Inner_OM).
During installation, you can press the up and down arrow keys to switch parameters,
press Tab to switch the parameter area, press Enter to select a parameter, and press
Esc to exit the installation interface. If you press any other keys, there will be no
response.
Exercise caution when pressing Esc.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 101
HCIP-Intelligent Vision V1.0 Experiment Guide Page 102
It takes about 20–60 minutes for the CSP to complete the configuration after you specify required
parameters. You are advised to pay attention to the installation progress and do not switch to
other pages to ensure successful installation.
Step 3 Check whether the system automatically restarts after the installation. The restart
takes about 5 minutes. After the restart, the remote login page is displayed, as
shown in the following figure. If a blank screen is displayed on the remote login
page, press Enter.
If the message "Installation Successful" is not displayed during the installation and the page
shown in the following figure is displayed, perform the following steps to check system
deployment logs. Ensure that the installation is successful and then perform subsequent
operations.
a Log in to the system background as the cspexpert user. The default password
of the cspexpert user is mt2017@cspos@RD.
b Run the su - root command to switch to the root user. The default password of
the root user is cnp200@cspos@RD.
c Run the cat /opt/csp/csp_edge_log/edge_install.log command to check the
installation progress. If 100% is displayed in the command output, the CSP or
service operating system is installed successfully.
CSP-OM install process 100%
Step 4 On the remote login page of the server, click Disconnect to disconnect the
CD/DVD-ROM image, as shown in the following figure.
Step 5 On the iBMC WebUI, choose System > BIOS Settings, set Effective to Permanent
and Boot Medium to Hard Drive, and click Save.
During the installation, set the parameters in strict accordance with the LLD report.
Otherwise, the installation may fail or O&M exceptions may occur after the installation.
Step 2 In the Virtual Console area on the Home page, choose Start > HTML5 Integrated
Remote Console (Shared). The interface shown in the following figure is displayed.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 104
Step 4 Mount the DVD-ROM image file, as shown in the following figure.
----End
During the installation, do not disconnect the mounted DVD-ROM image. Otherwise,
the CSP installation will fail.
Step 1 Click and select Forced Restart. In the dialog box that is displayed, click OK
to forcibly restart the system.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 105
If the information shown in the following figure is displayed, the CSP installation
starts.
Step 2 Wait for 2 to 3 minutes. The CSP configuration page is displayed. Complete the
CSP configuration according to the process shown in the following figure.
The data used in the configuration example is for reference only. Use the data
specified in the live network plan during the installation.
Is New New Installation: Install the CSP for the Select New Installation.
Installation first time.
Reinstallation: Reinstall the CSP.
Install Mode Single Install: Install the service server in Select Cluster Install.
single-node system mode.
Cluster Install: Install the service server in
cluster mode.
Install Mode Include CSP (First Node): Install the CSP Select Include CSP (First
master management node. Node).
Include CSP (Other Node): Install the
CSP slave management nodes.
Exclude CSP: Install a service node.
CSP Network Internal VLAN ID: VLAN ID Obtain the values from
Configurations corresponding to the CSP internal the Installation
management plane (Inner_OM). Parameter Value sheet
in the LLD report.
Internal Network Segment: network
segment and subnet mask length of the
CSP internal management plane
(Inner_OM).
The value is in Network segment/Prefix
length format.
Example:
If the subnet mask is 255.255.255.0, the
prefix length is 24.
If the subnet mask is 255.255.0.0, the
prefix length is 16.
If the subnet mask is 255.0.0.0, the prefix
length is 8.
During installation, you can press the up and down arrow keys to switch
parameters, press Tab to switch the parameter area, press Enter to select a
parameter, and press Esc to exit the installation interface. If you press any
other keys, there will be no response.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 108
It takes about 20–60 minutes for the CSP to complete the configuration after you specify required
parameters. You are advised to pay attention to the installation progress and do not switch to
other pages to ensure successful installation.
Step 3 Check whether the system automatically restarts after the installation. The restart
takes about 5 minutes. After the restart, the remote login page is displayed, as
shown in the following figure. If a blank screen is displayed on the remote login
page, press Enter.
If the message "Installation Successful" is not displayed during the installation and the page
shown in the preceding figure is displayed, perform the following steps to check system
deployment logs. Ensure that the installation is successful and then perform subsequent
operations.
Log in to the system background as the cspexpert user. The default password of the cspexpert
user is mt2017@cspos@RD.
Run the su - root command to switch to the root user. The default password of the root user is
cnp200@cspos@RD.
Run the cat /opt/csp/csp_edge_log/edge_install.log command to check the installation progress. If
100% is displayed in the command output, the CSP or service operating system is installed
successfully.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 111
Step 4 On the remote login page of the server, click Disconnect to disconnect the
CD/DVD-ROM image, as shown in the following figure.
Step 5 On the iBMC WebUI, choose System > BIOS Settings, set Effective to Permanent
and Boot Medium to Hard Drive, and click Save.
----End
5.2.3.2.4 Logging In to the CSP OM Portal
Step 1 Connect your computer to the Outer_OM network of the service management
switch with electrical ports.
Step 2 Open a browser, enter https://Floating IP address:31943 in the address box, and
press Enter. Ignore the displayed security warning. The CSP login page is
displayed. Enter the default user name (admin) and password (Changeme_123).
Change the default password as prompted upon your first login.
Wait about 2 to 3 minutes after the installation is complete. Then log in to the CSP OM
portal.
Use Google Chrome v46.0 or a later version to log in to the CSP OM portal.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 112
You are advised to disable the translation function of the browser. Otherwise, garbled
characters may appear.
Step 3 Check for faulty servers and containers at the bottom of the Home page. If there
is no faulty server or container, the CSP is successfully installed.
----End
During the installation, set the parameters in strict accordance with the LLD report.
Otherwise, the installation may fail or O&M exceptions may occur after the installation.
The following table describes the parameters and data required for installing a service
node.
Is New New Installation: Install the CSP for the first Select New
Installation time. Installation.
Reinstallation: Reinstall the CSP.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 113
Install Mode Single Install: Install the service server in Select Cluster Install.
single-node system mode.
Cluster Install: Install the service server in
cluster mode.
Install Mode Include CSP (First Node): Install the CSP Select Exclude CSP.
master management node.
Include CSP (Other Node): Install the CSP
slave management nodes.
Exclude CSP: Install a service node.
Step 2 In the Virtual Console area on the Home page, choose Start > HTML5 Integrated
Remote Console (Shared). The interface shown in the following figure is displayed.
Step 4 Mount the DVD-ROM image file, as shown in the following figure.
During the installation, do not disconnect the mounted DVD-ROM image. Otherwise,
the CSP installation will fail.
----End
5.2.3.3.3 Installing the Operating System on a Service Node Using an ISO Image
Step 1 Click and select Forced Restart. In the dialog box that is displayed, click OK
to forcibly restart the system.
If the information shown in the following figure is displayed, the CSP installation
starts.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 115
Step 2 Wait for 2 to 3 minutes. The CSP configuration page is displayed. Complete the
service node configuration according to the process shown in the following figure.
The data used in the configuration example is for reference only. Use the data
specified in the live network plan during the installation.
During installation, you can press the up and down arrow keys to switch parameters,
press Tab to switch the parameter area, press Enter to select a parameter, and press Esc
to exit the installation interface. If you press any other keys, there will be no response.
Exercise caution when pressing Esc.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 116
HCIP-Intelligent Vision V1.0 Experiment Guide Page 117
It takes about 20–60 minutes for the CSP to complete the configuration after you specify required
parameters. You are advised to pay attention to the installation progress and do not switch to
other pages to ensure successful installation.
Step 3 Check whether the system automatically restarts after the installation. The restart
takes about 5 minutes. After the restart, the remote login page is displayed, as
shown in the following figure. If a blank screen is displayed on the remote login
page, press Enter.
If the message "Installation Successful" is not displayed during the installation and the page
shown in the preceding figure is displayed, perform the following steps to check system
deployment logs. Ensure that the installation is successful and then perform subsequent
operations.
Log in to the system background as the cspexpert user. The default password of the cspexpert
user is mt2017@cspos@RD.
Run the su - root command to switch to the root user. The default password of the root user is
cnp200@cspos@RD.
Run the cat /opt/csp/csp_edge_log/edge_install.log command to check the installation progress. If
100% is displayed in the command output, the CSP or service operating system is installed
successfully.
CSP-OM install process 100%
Step 4 On the remote login page of the server, click Disconnect to disconnect the
CD/DVD-ROM image, as shown in the following figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 118
Step 5 On the iBMC WebUI, choose System > BIOS Settings, set Effective to Permanent
and Boot Medium to Hard Drive, and click Save.
----End
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 119
Step 4 Click Save. When the system displays a message, indicating that the automatic
backup policy is set, click OK.
Parameter Description
DST Start/DST End This parameter is valid only when DST is set to Yes.
By Date: start and end dates of the DST. The start date cannot
be later than the end date. The DST starts from March by
HCIP-Intelligent Vision V1.0 Experiment Guide Page 120
default.
By·Week: start and end weeks of the DST. The start week
cannot be later than the end week. The DST starts from March
by default.
Offset (min) Time offset after the DST is used. The offset cannot be shorter
than 1 minute, and cannot be longer than the whole DST
period.
Set the time zone to the local time zone according to the preceding table. You need to
set the DST only when the DST is specified in the local time zone.
For the values of the NTP server parameters, see the Cloud Mgmt
Interconnection sheet of the LLD document.
The authentication key ID and value are set based on the configured NTP
server. Only SHA-1-type values are supported.
The system supports a maximum of four NTP servers. If multiple NTP servers
are available, the system selects the one with the least time offset from the
system time for time synchronization.
If a single NTP server is available, it serves as the external clock source and its
IP address is displayed in green.
If multiple NTP servers are available, the server with the least time offset from
the system time is the optimal external clock source, and the IP address of that
server is displayed in green.
If an NTP server is available and forced time synchronization is enabled, the
system can synchronize time from the NTP server even when the time
difference between the NTP server and the system exceeds 3s (preset
threshold).
If an NTP server is available but forcible time synchronization is disabled, and
the time difference between the system and the NTP server exceeds 3s, the
system reports the alarm "ALM-6501 Abnormal NTP Connection Status" and
does not synchronize time from the NTP server.
If an NTP server is available and the time difference between the NTP server
and the system is less than 3s, the system can synchronize time from the NTP
server regardless of whether forcible synchronization is enabled or not.
6.1 Introduction
6.1.1 About This Experiment
This experiment provides guidance on how to deploy IVS applications, including
managing service nodes, uploading a software package and a process file, and deploying
applications.
6.1.2 Objectives
Learn how to configure service nodes to be managed.
Learn how to upload software packages and process files.
Learn how to deploy applications and verify the deployment.
Learn how to create a RAID group and import a license.
During the installation, set the parameters in strict accordance with the LLD report.
Otherwise, the installation may fail or O&M exceptions may occur after the installation.
Server Name Server name of a service node. Server name of a service node.
The value is a string of up to 63 The value is a string of up to
characters. 63 characters.
The value must start and end The value must start and end
HCIP-Intelligent Vision V1.0 Experiment Guide Page 124
Server IP Address Host IP address of a service node. Use the value of HOSTIP on
the Server Node sheet in the
LLD report.
Step 1 Log in to the CSP OM portal and choose Resources > Edge Site Resources >
Servers.
Step 3 Select a mode to add servers based on the number of service nodes.
Manually adding servers one by one:
a Select manually next to Add Servers.
b Set Server Name and Server IP Address based on the description in the
preceding table and click Save. If there are multiple service nodes, click to
add them one by one.
c After all service nodes are added, click Add Servers. When Status is Available,
the management is successful.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 125
Do not switch the page during the upload. Otherwise, the upload may fail.
When adding a process file for the first time, click Add a Process File.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 126
Step 3 Click Select upload file and upload the process file of the application. Then,
configure basic information about the process file, including the version, publisher,
and description.
After the process file is imported, the process file name is automatically generated. Do not
change the file name.
Step 4 Click Create. After being added, the process file is automatically displayed on the
process file list.
On the page that is displayed, select the process file uploaded in Uploading a Process
File. The system automatically finds the matching software package, as shown in the
following figure.
Step 4 Click Next. The following page is displayed. Click Import Configuration File, select
the JSON file generated in the LLD design guide, and import the configuration file.
After the configuration file is imported, you only need to change the value of appname.
The following table describes the parameters.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 128
Step 9 Click the Execute Logs tab to view the installation progress, as shown in the
following figure.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 129
----End
----End
When Role is Single-node system, the container is deployed in single-node system mode. In a
single-node system, single point of failures (SPOFs) may occur and services are interrupted
during capacity expansion.
The cluster is automatically created after the application is installed. No manual intervention is
required.
----End
Step 1 Choose Application Configuration > Configuration Management > Configuration >
Application Name > Storage > Cloud Edge Storage.
a Select a SafeVideo group and click Create RAID Group or Recreate RAID Group.
b Set RAID Configuration. Open the LLD report and check the value of RAID
Mode on the Solution Information sheet. If the value is Economic mode, set
RAID Configuration to Economic. If the value is Recommendation mode, set
RAID Configuration to Standard.
The following table lists the rules for creating RAID groups.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 131
c Click Start to start a route test. The system starts to create RAID groups.
b Click Enable or Disable in the lower part of the Configure Writable upon RAID
Failure dialog box.
c Click OK.
Step 4 If there are multiple SafeVideo groups, repeat the preceding steps to create RAID
groups.
Step 5 View the newly created RAID groups on the RAID group list, as shown in the
following figure. If Status is Normal, the RAID groups are successfully created.
Click Details to view the status of member disks and LUNs.
Procedure
Step 1 Choose Application Lifecycle > Licenses > License Management. The License
Management page is displayed.
Step 3 Record the obtained ESN and apply for a license file by referring to the license
application guide released with the software version.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 136
Parameter Description
Set this parameter to 03:00 to ensure that the backup task can be
completed correctly.
Step 4 Select SFTP for Network Backup and set parameters for the SFTP server.
If the backup data needs to be stored on a remote SFTP server, set the parameters based
on the site requirements, in which SFTP Server IP Address is set to an SFTP server IP
address that is on the same network segment as the CSP internal management network.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 138
If the backup data needs to be stored on a local data disk of the server, set the
parameters according to the following table.
Parameter Description
SFTP Server IP Address Set this parameter to the host IP address of the CSP
management node. You can perform the following
operations to obtain the value:
Choose Resources > Cloud Resources > Container List.
Enter ServiceCenter in the search box and obtain the
value of Host IP of the ServiceCenter container.
SFTP Server Port No. SFTP server port number. Use the default value 22.
SFTP Password SFTP password. Set this parameter based on the site
requirements. The initial value is ps2017@cspos@RD.
Public Key Authentication If this parameter is selected, the backup server will be
authenticated to eliminate spoofing risks and improve
system reliability.
Parameter Description
the values corresponding to the selected disk
directory.
Step 5 Click Save. The system displays a message, indicating that the policy is successfully
set. Click OK.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 140
7 System Configuration
7.1 Introduction
7.1.1 About This Experiment
This experiment provides guidance on how to perform other configurations after the IVS
is installed, including configuring floating gateways, changing host names, and
configuring storage policies.
7.1.2 Objectives
Learn how to configure floating gateways and storage policies.
Learn how to configure domains/clusters and host names.
Learn how to configure NTP time synchronization for cameras.
Learn how to configure the connection between the surveillance platform and
analysis platform.
Learn how to install and start the client.
For example, if the server whose Server Name is ivs3800sv2-01 is installed in slot 5 of
cabinet A of the customer (customer code: hz), you can customize Host Name as hz-A-5.
1. Choose Resources > Edge Site Resource > Servers.
2. Select a server from the server list, click More, and choose Change Host Name.
3. Enter a host name in the Custom Host Name text box.
If the server is performing operations such as backup, the system displays a message indicating
that the host name cannot be changed. In this case, change the host name after the server
backup is complete.
You can obtain the floating IP addresses from the Floating Gateway IP Addresses of a
Cluster table on the Installation Parameter Value sheet in the LLD report.
Select any containers of the same type as those in the LLD report and enter the floating
gateway IP addresses. For example, three floating gateway IP addresses have been planned
for the MPUR containers in the LLD report, and there are five MPUR nodes on the CSP OM
portal. Then you can select any three of the MPUR nodes and enter the planned floating
gateway IP addresses.
Step 2 Select the service node for which you want to configure a storage policy.
Batch configuration: Select service nodes and click Batch Edit.
Single configuration: Click Edit next to a service node.
Step 3 Configure storage policies. The following table describes the parameters.
Parameter Description
Space Full Policy used when the recording storage space is used up. The options
Policy are as follows:
Stop: Only recordings or images that have been stored for a period
longer than the storage period are recycled. When the storage space
is used up, the recording and image storage is stopped.
Overwrite: Recordings or images are overwritten based on the
following sequence: recordings or images whose storage period
expires > recordings or images for which no storage period is
configured > earliest recordings or images within the storage period.
Parameter Description
Image Storage the northbound SDK.
Period (days)
Operation Edit: Button for modifying the storage policy for the corresponding
node.
Step 2 Click Edit in the Operation column and configure Cluster Name and the load
balancing policy, as shown in the following figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 144
Figure 7-3 Configuring the cluster name and load balancing policy
Parameter Description
Cameras automatically synchronize time with the connected node, and the node
automatically synchronizes time with the management node, ensuring time consistency.
Choose Application Configuration > Configuration Management >
Configuration > Application Name > Local Domain > IPC NTP Service.
ChooseSan NTP synchronization policy based on the site requirements.
The following table describes the parameters.
Parameter Description
Default The node does not deliver the NTP time synchronization
configuration to cameras, and the NTP time synchronization
configuration of cameras is used.
The surveillance platform and analysis platform are two service modules of the IVS
platform. The surveillance platform provides the image management service, including video
and image access, storage, and forwarding. The analysis platform provides the image
analysis and image search services, including intelligent service processing.
Only the IVS platform of V100R019C20 or later versions supports unified management of
the surveillance platform and analysis platform on the iClient.
A surveillance platform can connect to only one analysis platform, and an analysis platform
can connect to only one surveillance platform.
b Record the value of Version for the ivs application on the home page.
c Choose Application Configuration > Configuration Management >
Configuration > Application Name > Two-Node Cluster, and record the value of
External Service IP of the VCNAPI and BMU nodes if they exist.
d Choose Application Configuration > Configuration Management >
Configuration > Application Name > Node, enter VCNAPI in the search box, and
press Enter to search for the VCNAPI node. Record the external service IP
address of the VCNAPI node. If the VCNAPI is deployed in a two-node cluster,
record the external service IP addresses of the two VCNAPI nodes.
a Log in to the CSP OM portal of the surveillance platform as the admin user.
b Choose Application Configuration > Configuration Management >
Configuration > Application Name > Unified Configuration. Click the
Surveillance Platform tab.
c Select VCNSvcMgrService from the Service drop-down list box.
d Set CUServerConnection.
i. Locate the row in which the value of Name is CUServerConnection and
click Edit on the right, as shown in the following figure.
ii. Enter the IP address, port number, and version information of the
surveillance platform, in IP address,Port number,Version information
format. The following table describes the parameters.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 147
Parameter Description
IP Address Set this parameter to the external service IP address of the VCNAPI
node recorded in c .
In the NAT scenario, use NAT to separate the pre-NAT surveillance platform
information from the post-NAT surveillance platform information and
supplement VCNAPISurveillance Platform IP address,9900. Example:
10.10.10.11,18531,V100R019C50SPCxxxNAT10.164.151.211,15831,V100R019C50S
PCxxxVCNAPI10.10.10.11,9900
iii. Click Save.
e Set VCMConnection.
i. Locate the row in which the value of Name is VCMConnection and click
Edit on the right, as shown in the following figure.
ii. Enter the IP address, port number, and version information of the analysis
platform, in IP address,Port number,Version information format. The following
table describes the parameters.
Parameter Description
IP Address Set this parameter to the external service IP address of the NGINX
node recorded in c .
In the NAT scenario, use NAT to separate the information about the analysis platform before and
after NAT. Example:
10.10.10.10,443,V100R019C50SPCxxxNAT10.164.151.211,223,V100R019C50SPCxxx
iii. Click Save.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 148
Step 4 Configure the VCMAPIService service on the analysis platform and add an IP
address authentication whitelist.
Log in to the CSP OM portal of the analysis platform as the admin user.
Choose Application Configuration > Configuration Management >
Configuration > Application Name > Unified Configuration > Analysis Platform.
Select VCMAPIService from the Service drop-down list box.
Click New on the right of IP Authentication Whitelist, as shown in the following
figure. The New dialog box is displayed.
Set Type to IP, enter External Service IP of the VCNAPI node recorded in d , and
click Save.
If the VCNAPI is deployed in a two-node cluster, add the external service IP
addresses of the two VCNAPI nodes to the whitelist.
Repeat the preceding steps to add the values of External Service IP of the
VCNAPI and BMU nodes recorded in c to the IP address whitelist.
Click Apply.
For a single-node system that integrates the storage, compute, and search capabilities, you do
not need to add the IP address authentication whitelist. You only need to enable the IP address
authentication bypass function.
You are advised to set the monitor resolution to 1920 x 1080. Otherwise, the display may
be abnormal.
Recommended configuration
CPU: eighth-generation Intel Core CPU or higher for desktop computers or
laptops
Memory: at least 8 GB (DDR3 1600 MHz or higher)
Hard disk: at least 500 GB
Operating system: 32-bit or 64-bit Windows 7 or Windows 10
Video card: Intel integrated graphics card with a display memory of more than
2.0 GB (Intel® HD Graphics 520 or higher is recommended)
Network port: at least one 1000 Mbit/s (or higher) network port
Monitor: at least 21.5-inch; recommended optimum resolution: 1920 x 1080
You are advised to set the monitor resolution to 1920 x 1080. Otherwise, the display may
be abnormal.
Live video specifications
The following table describes the number of live video channels supported under
different configurations.
Configuration A: I5-2400 CPU @3.10 GHz; 32-bit operating system; memory: 4 GB;
Windows 7 Professional Edition
Configuration B: I7-6600 CPU @3.2 GHz; 64-bit operating system; memory: 16 GB;
Windows 10 Professional Edition (CPU software decoding)
Configuration C: I7-8700 CPU @3.2 GHz; 64-bit operating system; memory: 16 GB;
Windows 10 Professional Edition (hardware decoding based on the integrated graphics
card)
CIF (512 38 38 60 42 64 60
kbit/s)
4CIF/D1 (2 22 22 45 36 50 45
Mbit/s)
720p (2 Mbit/s 12 10 16 14 34 30
at 30 fps)
1080p (4 8 6 14 10 20 14
Mbit/s at 30
fps)
3840 x 2160 1 1 3 1 4 4
(12 Mbit/s at
25 fps)
3840 x 2160 1 1 2 1 4 3
HCIP-Intelligent Vision V1.0 Experiment Guide Page 150
https://support.huawei.com/enterprise/en/intelligent-video-surveillance/ivs3800-
pid-250614775
Step 3 Upload the online help, signature files, client installation packages, and
description files to the CSP OM portal as the administrator.
d Click Upload Signature File and upload the signature files, as shown in the
following figure.
− In the line where the client name is HoloSens_iClient_x86, upload the
signature files (HoloSens_iClient_x86.exe.crl and
HoloSens_iClient_x86.exe.cms) for the 32-bit client.
− In the line where the client name is HoloSens_iClient_x64, upload the
signature files (HoloSens_iClient_x64.exe.crl and
HoloSens_iClient_x64.exe.cms) for the 64-bit client.
e Click Upload Client and upload the HoloSens iClient installation package. For a
32-bit operating system, upload the installation package to
HoloSens_iClient_x86. For a 64-bit operating system, upload the installation
package to HoloSens_iClient_x64.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 152
Step 5 Double-click the iClient installation program and complete iClient installation as
prompted.
----End
If the system does not display the iClient installation page, double-click the
installation program to install the iClient.
If the system displays a message indicating that the Microsoft Visual C++ 2010
Redistributable Package fails to be installed during the installation, the software of a
later version may have been installed on the computer. Ignore the message and
continue with the installation. To check whether the software of a later version is
installed, choose Control Panel > Programs and Features on the computer.
7.2.6.2.3 Logging In to the iClient
Step 1 Start the iClient.
On Windows 10, right-click the shortcut icon on the desktop, choose Properties
from the shortcut menu, click the Compatibility tab, select Run this program as an
administrator, and click OK. Then double-click the shortcut icon on the desktop.
The iClient login page is displayed, as shown in the following figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 153
Parameter Description
After changing the password, exercise caution when using the Remember
password function to ensure information security.
Remember If this check box is selected, the current user does not need to enter
password the password when logging in to the system again.
The Remember password check box exists only when the server supports the
function of remembering the password.
Parameter Description
Enable TLS After TLS is enabled, signaling data between the iClient and server is
encrypted to prevent data from being captured and cracked. If TLS is
not enabled, a risk warning will be displayed.
Enable You need to select Enable security certificate only when Enable TLS is
security selected. After the security certificate is enabled, security verification
certificate is performed on backend services.
If the security certificate is not enabled, the system may be attacked.
Port When Enable TLS is not selected, the default value is 9900. When
Enable TLS is selected, the default value is 9910. You are advised to
use the default value.
If NAT has been configured, the port number is a post-NAT port
number.
2. Click Login. The iClient home page is displayed, as shown in the following
figure.
If the analysis platform fails to be connected, the message indicating that the user name or
password of the intelligent account is left empty is displayed and only the Intelligent Recognition
tab page is displayed in Intelligent Applications on the home page.
Step 1 Log in to the iClient of the surveillance platform as the admin user.
Step 2 Choose System Management > User Management > Role Management on the
iClient home page.
The account and password rules are enabled by default. Disabling the
account password rule may bring account security risks.
The default password validity period of a role is 90 days. The password
validity period of the account is the same as that of the role to which the
account is bound. Users need to change their passwords periodically to
ensure account security.
When the account and password rules are enabled for a role, if the
password of the connection user expires, the connection user cannot
access cameras or perform operations on these cameras. The user cannot
perform intelligent analysis operations on cameras on the IVS platform.
d Click OK.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 156
Step 4 Choose System Management > User Management > User Maintenance on the
iClient home page.
b Select the role created in Step 3 from the Surveillance Role drop-down list.
c Set User Type to IVS common user.
d Set Account, Password, and Confirm Password.
e (Optional) Enter the IP address and MAC address.
You can bind a user account to the IP addresses and MAC addresses of a maximum of four
computers.
After the account is bound to the IP addresses and MAC addresses of computers, you can log in
to the iClient only on these computers.
f Click Add.
The system allows you to create multiple users simultaneously. When you create other users, the
role selected for Surveillance Role must be the same as that selected during the first user
creation.
g Click Next.
The permission setting dialog box is displayed.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 157
Parameter Description
PTZ Control PTZ control priority when the PTZ device is locked. The value ranges
Priority from 1 to 32. A smaller value indicates a higher priority.
When the PTZ device is unlocked, the PTZ control priority is not
distinguished.
Max Login Maximum number of connections between the analysis platform and
Sessions surveillance platform for an account. You can set this parameter based
on the site requirements. The maximum value 2000 is recommended.
i Use the default value of Validity Period. By default, Validity Period is disabled.
In this case, the user is permanently valid.
j Select cameras and assign the device viewing permission. You are advised to
select the root directory of cameras. Otherwise, the analysis platform cannot
perform intelligent analysis on cameras that are not selected.
k Click Next.
If the value of Result is Successful, the user is successfully created.
l Click OK.
Step 6 (Mandatory) Log in to the iClient as the new user to activate the account. You are
forced to change the password at the first login.
----End
Parameter Description
Post-NAT IP Set the IP address and port number of the surveillance platform
after NAT mapping based on the site requirements.
Post-NAT Port
The default password validity period of a role is 90 days. The password validity period
of the account is the same as that of the role to which the account is bound. Users
need to change their passwords periodically to ensure account security.
When the account and password rules are enabled for a role, if the password of the
connection user expires, the connection user cannot access cameras or perform
operations on these cameras. The user cannot perform intelligent analysis operations
on cameras on the IVS platform.
Perform the following steps even if cameras have not been connected.
Step 1 Log in to the iClient of the surveillance platform as the admin user.
Step 2 Choose System Management > Analysis Platform Configuration > Surveillance
Platform.
Step 3 Click Synchronize. The system automatically synchronizes the camera information
from the surveillance platform.
----End
Step 1 Log in to the iClient of the surveillance platform as the admin user.
Step 2 Choose System Management > User Management > Role Management > Analysis
Role on the iClient home page.
− Enabling the account password rules can improve account security. The default
password validity period is 90 days. You must periodically change the password
to ensure account security.
The account and password rules are enabled by default. Disabling the account
password rule may bring account security risks.
The default password validity period of a role is 90 days. The password validity period
of the account is the same as that of the role to which the account is bound. Users
need to change their passwords periodically to ensure account security.
d Click OK.
Step 4 Choose System Management > User Management > User Maintenance on the
iClient home page.
b Select the role created in section 7.2.6.3 "Creating a User on the Surveillance
Platform" from the Surveillance Role drop-down list.
c Set Analysis Role to the role created in this section.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 161
You can bind a user account to the IP addresses and MAC addresses of a maximum of four
computers.
After the account is bound to the IP addresses and MAC addresses of computers, you can log in
to the iClient only on these computers.
g Click Add.
Multiple users can be created simultaneously. When you create other users, the roles selected for
Surveillance Role and Analysis Role must be the same as those selected during the first user
creation.
h Click Next. The permission setting dialog box is displayed.
i Set PTZ Control Priority and Max Login Sessions.
Parameter Description
PTZ Control PTZ control priority when the PTZ device is locked. The value ranges
Priority from 1 to 32. A smaller value indicates a higher priority.
When the PTZ device is unlocked, the PTZ control priority is not
distinguished.
Max Login Maximum number of connections between the analysis platform and
Sessions surveillance platform for an account. You can set this parameter based
on the site requirements. The maximum value 2000 is recommended.
j Use the default value of Validity Period. By default, Validity Period is disabled.
In this case, the user is permanently valid.
k Select cameras and assign the device viewing permission. You are advised to
select the root directory of cameras.
l Click Next.
If the value of Result is Successful, the user is successfully created.
m Click OK.
Step 6 (Mandatory) Log in to the iClient as the new user to activate the account. You are
forced to change the password at the first login.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 162
Parameter Description
IP Address External service IP address of the NGINX. Set this parameter to the
value of External Service IP obtained in Step 1.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 163
Parameter Description
User Name User name and password created in Creating an Intelligent User.
Password Note:
The user name cannot be the default user admin. You need to use
other user names.
d Click Save.
----End
Huawei Intelligent Vision Certification Training
ISSUE: 1.0
1
Copyright © Huawei Technologies Co., Ltd. 2020. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any
means without prior written consent of Huawei Technologies Co., Ltd.
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of
their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made
between Huawei and the customer. All or part of the products, services and features
described in this document may not be within the purchase scope or the usage scope.
Unless otherwise specified in the contract, all statements, information, and
recommendations in this document are provided "AS IS" without warranties,
guarantees or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has
been made in the preparation of this document to ensure accuracy of the contents, but
all statements, information, and recommendations in this document do not constitute
a warranty of any kind, express or implied.
Overview
This document is applicable to the candidates who are preparing for the HCIP-Intelligent
Vision exam and the readers who want to understand intelligent vision technologies,
including Huawei IVS establishment and advanced service commissioning, technical
principles of Huawei HoloSens SDCs, intelligent algorithm management and application,
and video cloud technologies.
Description
This document introduces six experiments step by step, including camera access, intelligent
analysis configuration, domain management, and backup management, to help trainees
master the advanced service commissioning of the IVS. For basic service commissioning
not described in this document, trainees can learn by themselves by referring to the HCIA-
Intelligent Vision course.
Experiment 1 describes how to configure video management services, including
camera management and intelligent camera metadata subscription on the platform.
It aims to help trainees understand and operate the Matrix Intelligence.
Experiment 2 describes how to install and configure algorithm plug-ins, preparing for
subsequent intelligent service configuration.
Experiment 3 describes how to configure intelligent analysis services, including facial
analysis, person analysis, and vehicle analysis.
Experiment 4 describes how to connect upper- and lower-level domains and external
domains, laying a foundation for subsequent experiments.
Experiment 5 describes how to configure video backup and image backup in detail.
Experiment 6 describes how to implement algorithm collaboration and
resource/task/data collaboration when an external domain or an upper- and lower-
level domain is connected to the platform.
Networking
This experiment environment is intended for intelligent vision engineers who are preparing
for the HCIP-Intelligent Vision exam. Each experiment environment consists of 2 to 7
intelligent vision servers and 2 to 4 access switches, and is applicable to 4 to 12 trainees.
Device
The following table lists the recommended device configurations in each experiment
environment of HCIP-Intelligent Vision, including the device name, model, and software
version:
Checking Devices
Before starting the experiment, check whether all required devices are ready. The following
table lists the required devices.
Twisted pair 1 for each group The twisted pair must be 2 meters long at
least.
Experiment Topology
Requirements on switches:
Device management Top of Rack (TOR): TOR access switch on the device
management plane. The management port of each hardware device is connected to
the switch. S5700 series switches are recommended.
Management TOR: TOR access switch on the management plane. The Gigabit
Ethernet (GE) electrical port on the management plane is connected to the switch.
CE5800 series switches are recommended.
Service TOR: TOR access switch on the service plane. The 10GE optical port or GE
electrical port on the service plane is connected to the switch. CE6800 series switches
are recommended.
End of Row (EOR): aggregation switch. The networks of the service plane and
management plane are aggregated through the aggregation switch and then
connected to the customer's network.
Requirements on the network:
The GE electrical ports connected to the management TOR switch are bonded in
active-backup (Bond=1) mode. The 10GE optical ports or GE electrical ports
connected to the service TOR switch are bonded in LACP (Bond=4) mode. The service
TOR switch must support static LACP, and an Eth-Trunk must be configured for the
service TOR switch.
Management TOR switches and service TOR switches must be stacked.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 6
Contents
Overview ............................................................................................................................................................................................. 3
Description ......................................................................................................................................................................................... 3
Background Knowledge Required ............................................................................................................................................. 3
Experiment Environment Overview .......................................................................................................................................... 4
Experiment Environment Preparation ...................................................................................................................................... 4
1 Configuration of Video Management Services ............................................................................ 8
1.1 Introduction ................................................................................................................................................................................ 8
1.1.1 About This Experiment........................................................................................................................................................ 8
1.1.2 Objectives ................................................................................................................................................................................ 8
1.2 Configuration Procedure........................................................................................................................................................ 8
1.2.1 Installing the PU Access Plug-in ...................................................................................................................................... 8
1.2.2 Connecting Cameras ............................................................................................................................................................ 9
1.2.3 Viewing Live Video .............................................................................................................................................................28
1.2.4 Configuring the Recording Function ............................................................................................................................31
2 Installation and Configuration of Algorithms ............................................................................39
2.1 Introduction ..............................................................................................................................................................................39
2.1.1 About This Experiment......................................................................................................................................................39
2.1.2 Objectives ..............................................................................................................................................................................39
2.2 Configuration Procedure......................................................................................................................................................39
2.2.1 Checking Before Installation ...........................................................................................................................................39
2.2.2 Obtaining Plug-in Packages ............................................................................................................................................40
2.2.3 Verifying Software Package Integrity ..........................................................................................................................42
2.2.4 Uploading Plug-in Packages ...........................................................................................................................................45
2.2.5 Installing algorithm plug-ins ..........................................................................................................................................46
3 Intelligent Analysis .............................................................................................................................66
3.1 Introduction ..............................................................................................................................................................................66
3.1.1 About This Experiment......................................................................................................................................................66
3.1.2 Objectives ..............................................................................................................................................................................66
3.2 Configuration Procedure......................................................................................................................................................66
3.2.1 Intelligent Analysis Service Configuration on PUs ..................................................................................................66
3.2.2 Intelligent Facial Analysis on the IVS Platform........................................................................................................72
3.2.3 Intelligent Person Analysis on the IVS Platform ................................................................................................... 100
3.2.4 Intelligent Vehicle Analysis on the IVS Platform .................................................................................................. 110
4 Domain Management .................................................................................................................... 139
HCIP-Intelligent Vision V1.0 Experiment Guide Page 7
1.1 Introduction
1.1.1 About This Experiment
After installing the system software and hardware, you can configure basic services by
referring to this document. After the configuration is complete, you can view live video
from connected cameras, record live video, and view multiple live video feeds on the video
wall.
1.1.2 Objectives
Master basic service operations such as adding cameras, viewing live video, and configuring
recording.
You can click Uninstall to uninstall the device communication gateway (DCG) plug-in. By default,
the plug-in is installed or uninstalled on all nodes in the domain.
----End
Automatic batch If a large number of online cameras that support HWSDK and
access HWSDK or ONVIF need to connect to the IVS ONVIF
(recommended) platform, you can use the automatic batch
connection function to quickly add the cameras
in batches.
This method requires that cameras be online but
does not require that the IP address of each
camera be specified. This method applies to
HCIP-Intelligent Vision V1.0 Experiment Guide Page 10
Manual single If only a few cameras need to connect to the IVS HWSDK,
access platform, you can add the cameras one by one. ONVIF, GB/T
Both online and offline cameras can be added, 28181, and GB
but you must specify the IP address of each 35114.
camera.
Camera access If you want to add cameras connected to a DVR, ONVIF and
through a DVR, a a DVS, or an NVR to the IVS platform, you can GB/T 28181
DVS, or an NVR add the cameras by adding the DVR, DVS, or
NVR.
Active SDK Indicates whether to proactively register a camera. If you select this
registration check box, the camera will be proactively registered with the IVS
platform using the HWSDK protocol.
Port number Generally, the default port number 5060 is used. If another port is
planned for the camera, set this parameter to that port number.
If Two-factor authentication is selected, change the port number to
5062. Otherwise, the camera cannot proactively register with the
IVS platform.
Enable SDK Select this check box when the camera is passively registered with
the IVS platform through the HWSDK protocol. You do not need to
set all the preceding parameters.
Step 3 Choose Settings > Network > Platform Connection > Second Protocol Parameters.
Enable the ONVIF protocol.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 12
Step 4 Choose Settings > Network > Platform Connection > Password Management.
Configure the registration user name and password. The procedure for configuring
the user name and password for HWSDK-compliant cameras is similar to that for
ONVIF-compliant cameras. This section describes how to configure the user name
and password for HWSDK-compliant cameras, as shown in the following figure.
User name User name for logging in to the web page and user name
registered with the platform.
New password Set a complex password for the registration user. For details
about password complexity, refer to the password maintenance
Confirm password suggestions.
----End
It is recommended that you specify a proper network segment to shorten the search time.
If a network segment is set, the system searches this network segment for cameras in unicast
mode. You can set multiple network segments so that you can search multiple VLANs for
cameras.
If you do not set the network segment, the system searches for cameras in broadcast mode.
In this case, the system can only search for cameras located on the same network segment as
the IP address of the local server. You are advised to search for cameras by number segment
or add cameras in batches.
4. Click Next to search for cameras.
− Set Port for each camera, set Account and Password respectively to the
registration user name and password of the camera, and click Verify.
− If all cameras to be added have the same registration user name and password,
you can use the batch verification function.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 14
Port number: If you add a camera through ONVIF, you do not need to set the port number. If
you add a camera through HWSDK, you are advised to set the port number to 6061. After the
camera is connected, messages are encrypted for transmission, improving security.
User name and password for camera registration: Generally, the registration user name and
password of the camera are the user name and password for logging in to the camera web
system. The registration user name and password may be different from the web login user
name and password for some cameras. In this case, use the actual registration user name and
password of the camera. If the default password of a camera is changed, do not consecutively
click Verify. If you consecutively click Verify for five times or more, the client will be locked.
You need to wait for the password lock duration to elapse or restart the camera before
adding the camera again.
2. View the verification result.
− If the verification result is , the camera passes the verification. The system
automatically selects the cameras that pass the verification.
− If the verification result is , the camera does not pass the verification. When
you move the cursor to , the verification failure cause is displayed.
Step 5 Select the cameras to be added and click Next. The camera adding result is
displayed, as shown in the following figure.
3. Select one or more cameras in the camera list to move or copy the cameras to the
target group.
To move multiple cameras in batches to another group, hold down Ctrl or Shift, select
cameras (you can press Ctrl+A to select all cameras), and click Move To to move them to the
target group.
To share multiple cameras in batches to another group, hold down Ctrl or Shift, select
cameras (you can press Ctrl+A to select all cameras), and click Copy To to share them with
the target group.
By default, a maximum of 5000 cameras can be added to one group. If you need to add more
cameras to a group, choose Settings > Local Parameters > Others and change the value of
Max. devices displayed for a device group.
----End
The number of cameras to be added in batches using a template cannot exceed the maximum
number of cameras supported by a single server or cluster. Otherwise, the excess cameras will
fail to be added.
To import master cameras in the master-slave camera surveillance (1+N) solutions by using a
template, perform the following steps:
HCIP-Intelligent Vision V1.0 Experiment Guide Page 16
Specify the model for each master camera in the template. The system reserves 1+N
channels for each of them. After the batch import is complete, the number of occupied
channels equals the number of channels that are actually reported by the online master
cameras plus the number of channels reserved for the offline master cameras.
If the number of slave cameras connected to a master camera is less than N, free channels
will be released after these cameras go online. Then you can import more cameras in
batches.
For example, a single server supports the import of up to 256 camera channels at a time.
When you add master cameras in 1+2 solutions in batches by using a template:
The system reserves three channels for each master camera, and a maximum of 85
(256/3 ≈ 85.3) master cameras can be imported at a time.
Assume that 80 master cameras are online and five are offline after they are
imported. If only one slave camera is connected to each of these online master
cameras, the number of occupied channels is 175 (80 x 2 + 5 x 3). In this case, 81
(256 – 175) channels are available and you can add 81 more cameras.
Step 3 Open the Device Batch Import.xlsx file and fill in the corresponding sheet based on
the access protocol. For details about whether a parameter needs to be filled in, see
Table 1-4 and Table 1-5.
In Table 1-4, M indicates that the parameter is mandatory, O indicates that the parameter is
optional, and - indicates that the parameter is not involved or required.
KEDASDK is not a protocol certified by Huawei and may bring security risks.
Camera M M M M
Name
Vendor O O O O
Camera O O M O
Type
Camera O O O O
HCIP-Intelligent Vision V1.0 Experiment Guide Page 17
Cluster or M M M M
NVR Code
Platform O O O O
Code
Connection O O M O
Code
IP - M - M
Port M M - M
User Name M M - M
Password M M M M
Enable RTSP - - - -
RTSP Port - - - -
Intelligent O O - -
Attribute
Registration M M - -
Method
Floating - - M -
Gateway IP
Enable - - - -
HTTPS
GA/T 1400 - - - -
Gateway
Code
VIID Code - - - -
Collection - - - -
System Code
GA/T 1400 - - - -
User Name
HCIP-Intelligent Vision V1.0 Experiment Guide Page 18
Parameter Description
Camera Type Camera type. The camera type can be IPC, DVR, DVS, or
eNVR. This parameter is optional.
Only specific cameras can serve as the master camera on the 1+N
network. For details, refer to the compatibility list of the correct
version.
Cluster or NVR Code Obtain the value of Cluster or NVR Code of the current
domain from the Guidance sheet in the same template.
Platform Code Unique 16-digit code of the IVS platform. This parameter
is optional. The first 10 digits of the platform code must
be the same as the 10-digit HW code configured on the
CSP OM portal.
Parameter Description
Do not set this parameter when cameras are connected
through GB/T 28181, GB 35114, or HWSDK (proactive
registration).
Port Access port of the device, which must be the same as the
setting on the camera side. You are advised to use the
default port number. If the port number is changed on the
camera side, set this parameter based on the site
requirements.
User Name/Password User name and password used by the camera to register
with the platform.
Parameter Description
GB/T 28181 or GB 35114: Choose Settings > Network >
Platform Connection > Second Protocol Parameters. The
value of Password is the registration password.
Parameter Description
GA/T 1400 Gateway Code Code of the GA/T 1400 floating gateway of the cluster to
which a collection device is connected.
This parameter is optional. If this parameter is not set, the
collection device can still be added.
Step 4 Click Browse and select the template file, or directly drag the template file to the
Drag file here area. Import the template file to the system.
Cameras to be added are displayed on different tab pages based on their protocols, as
shown in the following figure.
3. Select one or more cameras on the camera list to move or copy the cameras to the
target group.
To move multiple cameras in batches to another group, hold down Ctrl or Shift, select these
cameras (you can press Ctrl+A to select all cameras), and click Move To move them to the
target group.
To share multiple cameras in batches to another group, hold down Ctrl or Shift, select these
cameras (you can press Ctrl+A to select all cameras), and click Copy To to share them with
the target group.
By default, a maximum of 5000 cameras can be added to one group. If you need to add more
cameras to a group, choose Settings > Local Parameters > Others and change the value of
Max. devices displayed for a device group.
----End
Step 3 Set related parameters. The parameters to be set vary according to the protocol. For
details, see Table 1-6.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 23
In Table 1-6, M indicates mandatory, O indicates optional, and - indicates not required or
involved.
Name M M M M
User Name M M - M
Password/Co M M M M
nfirm
Password
IP Address - M - M
Device Login M M - M
Port
Vendor O O O O
Model O O O O
Driver M M M M
Platform O O O O
Code
Connection - - M -
Code
NVR List M M M M
Enable - - - -
RTSP/Port
Include - - - -
Video/Image
Channel
(Enable
HTTPS/VIID
Code)
HCIP-Intelligent Vision V1.0 Experiment Guide Page 24
Parameter Description
Name Camera name to be displayed on the iClient. You are advised to set
this parameter to the device installation location or surveillance area.
User User name and password used by the camera to register with the
Name/Passwor platform.
d/Confirm
Password
Generally, the registration user name and password of a camera are the user
name and password for logging in to the camera web system. The registration
user name and password may be different from the web login user name and
password for some cameras. In this case, use the actual registration user name
and password of the camera.
When a camera is connected through GB/T 28181 or GB 35114, the
user name is unconfigurable, and you simply need to enter the
camera registration password in the Password and Confirm Password
text boxes.
For Huawei cameras, the navigation path of the registration
password in the camera web system varies depending on the
protocol.
HWSDK protocol: Choose Settings > Network > Platform
Connection > Password Management. On the SDK Password tab
page, the value of Current password is the registration password.
The default value is HuaWei123.
ONVIF protocol: Choose Settings > Network > Platform
Connection > Password Management. On the ONVIF Password tab
page, the value of Current password is the registration password.
The default value is HuaWei123.
GB/T 28181 or GB 35114: Choose Settings > Network > Platform
Connection > Second Protocol Parameters. The value of Password is
the registration password.
Device Login Access port of the device, which must be the same as the setting on
Port the camera side. You are advised to use the default port number. If
the port number is changed on the camera side, set this parameter
based on the site requirements.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 25
Parameter Description
If the HWSDK protocol is used for passive registration, set the port number
to 6061. After the camera is connected, messages are encrypted for
transmission, which improves the security of information transmission.
If you change the port number after a camera is connected, the camera will
be disconnected and reconnected within 1 to 5 seconds. The reconnection
duration depends on the network conditions.
Vendor This parameter is optional. If this parameter is not set, the camera
can still be added.
If Vendor and Model are set, the camera vendor and model will be
displayed after a camera is added on the platform.
If the Model drop-down list box does not contain the required model,
you can select the corresponding protocol from the Model drop-
down list box.
Model
Platform Code Unique 16-digit code of the IVS platform. This parameter is optional.
The first 10 digits of the platform code must be the same as the 10-
digit HW code configured on the CSP OM portal.
Connection User-defined code, which is used for connecting a camera to the IVS
Code platform.
The connection code requirements vary depending on the connection
protocol.
GB/T 28181 and GB 35114: This parameter is mandatory.
− Camera access: This parameter is mandatory and the value
must be the same as the value of Device ID for Huawei
cameras or SIP Authentication ID for Hikvision cameras. The
HCIP-Intelligent Vision V1.0 Experiment Guide Page 26
Parameter Description
eleventh to thirteenth digits must be 132.
− DVR access: This parameter is mandatory and its value must be
the same as the value of SIP Authentication ID for Hikvision
DVRs. The eleventh to thirteenth digits must be 111.
Other protocols: Leave the parameter empty.
Include Select this parameter only when you add a collection device to the
Video/Image VIID. Only after this parameter is selected, the mandatory
Channel parameters Enable HTTPS and VIID Code are available.
Enable HTTPS Indicates whether to use HTTPS for data transmission between a
collection device and the IVS platform.
Enable: HTTPS is used for data transmission.
Disable: HTTP is used for data transmission.
To enhance data security, you are advised to select Enable.
3. Select one or more cameras in the camera list to move or copy the cameras to the
target group.
To move multiple cameras in batches to another group, hold down Ctrl or Shift, select these
cameras (you can press Ctrl+A to select all cameras), and click Move To to move them to the
target group.
To share multiple cameras in batches to another group, hold down Ctrl or Shift, select these
cameras (you can press Ctrl+A to select all cameras), and click Copy To to share them with
the target group.
By default, a maximum of 5000 cameras can be added to one group. If you need to add more
cameras to a group, choose Settings > Local Parameters > Others and change the value of
Max. devices displayed for a device group to a larger one.
----End
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 28
1.2.2.7 Verification
If a camera is added successfully, the status of the camera is Online and you can view the
live video from this camera.
If a camera is added successfully but goes offline later, no cause will be displayed on the page
and you need to manually locate the cause.
If the target camera is not displayed in the camera list, click to refresh the camera list.
For cameras connected to the IVS platform through the master-slave camera surveillance
(1+N) solution, only the master camera is listed on the camera list under System
Management > Device Management > Main Devices. On the Live page, both the master and
slave cameras are contained in the camera list and live video from them can be viewed.
----End
Step 1 Choose Basic Operations > Live on the iClient home page.
Step 2 Enable live video viewing.
Viewing live video from a single camera
Double-click an online camera in the device list or drag the camera to a live video pane to
view the live video.
During live video viewing, do not overlap the video pane that is playing live video with the
window or dialog box of another program. The overlap may cause artifacts or even frozen
images.
If the live network is unstable, frame freezing or artifacts may occur on the live video. In this
case, you are advised to enable the bandwidth adaptation function in the camera web system.
After bandwidth adaptation is enabled, the camera can reduce or increase the bit rate based
on the network condition to ensure smooth live video playing.
Viewing live video from cameras in a group (containing more than one camera and excluding
cameras in subgroups)
1. On the iClient home page, choose System Management > Device Management >
Cameras and group cameras, as shown in the following figure.
2. Choose Basic Operations > Live on the iClient home page. Hold down Ctrl, select
multiple cameras from the device tree, and drag them to one or more live video
panes. Alternatively, drag a group to one or more live video panes and select Tile,
Cycling, or Smart Tracking to start viewing live video from cameras in the group.
− In Tile mode, if the number of idle live video panes is less than that of online
cameras in the group, the pane layout is automatically adapted.
− In Cycling mode:
i. Click Advanced and set parameters. Table 1-8 lists the key parameters.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 30
Parameter Description
Arrangement Tile
Custom: In the Customize Panes window that is displayed,
select panes and click Start.
Interval Set the time for playing video from each round of cameras
on the live video image.
Table 1-9 Colors of the recognition frames in the view of the box camera
Color Description
No recognition frame is displayed for the panoramic surveillance device. You can
manually frame an area.
3. (Optional) Enable or disable the manual tracking function of the panoramic
surveillance device.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 31
i. In the live video pane of the panoramic surveillance device, click on the live
video image of the panoramic camera to enter the manual tracking mode.
ii. Click on the live video pane of the panoramic camera to exit the manual
tracking mode.
(Optional) Enable or disable manual positioning.
− Smart tracking device:
i. Click in the live video pane that plays the live video from the box camera
involved in smart tracking to enable manual positioning. Then, draw a rectangle
or click a point on the live video image. The PTZ dome camera will rotate to the
selected position.
ii. Click on the live video pane of the box camera to exit the manual
positioning mode.
− Panoramic surveillance device:
i. Click in the live video pane that plays the live video from a panoramic
surveillance camera to enable manual positioning. Then, draw a rectangle or click
a point on the live video image. The PTZ dome camera will rotate to the selected
position.
ii. Click on the live video pane of the panoramic surveillance camera to exit
the manual positioning mode.
----End
Step 1 On the iClient home page, choose System Management > Storage Management.
Step 2 Click the Storage Policy tab. In the Camera area, select a camera. Alternatively, click
, set search criteria, and obtain the camera whose recording parameters are to be
set. The system interface is shown in the following figure.
If the master-slave camera surveillance (1+N) network changes, the camera list will be updated
accordingly.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 32
Step 3 Set storage policy parameters. Table 1-10 describes the parameters.
The MPUT cannot store recordings. Server recording parameter settings do not take effect for
cameras connected to the MPUT.
Parameter Description
Parameter Description
ascending order of their generation time.
− If the storage period of all recordings is shorter than the
all-frame storage period, the system stops recording
immediately after the storage space is used up.
When Space Full Policy is set to Overwrite on the CSP OM
portal:
− If the storage period of some recordings exceeds the all-
frame storage period, the system deletes these files in
ascending order of their generation time until the
remaining storage space is greater than the threshold.
If the remaining storage space is still less than the threshold after the
system deletes the recordings whose storage period exceeds the all-
frame storage period, the system will first delete recordings that have
not been configured with a storage period and then the earliest
recordings within the all-frame storage period.
− If the storage period of all recordings is shorter than the
all-frame storage period, the system first deletes
recordings that are not configured with a storage period
and then the earliest recordings within the all-frame
storage period until the remaining storage space is
greater than the threshold.
If the remaining storage space is greater than the threshold:
If Recycling Policy is set to By storage space on the CSP OM
portal, the system continues recording as planned.
If Recycling Policy is set to By storage period on the CSP
OM portal:
− If the storage period of some recordings exceeds the all-
frame storage period, the system deletes these files in
ascending order of their generation time until they are
all deleted.
− If the storage period of all recordings is shorter than the
all-frame storage period, the system continues recording
as planned.
This parameter is
available for alarm-
HCIP-Intelligent Vision V1.0 Experiment Guide Page 34
Parameter Description
triggered recordings. The value 0 indicates that the storage period is not fixed and the
storage priority is low. When the storage space is used up, the
Manual Recording recording is recycled first.
Storage (days) Do not set this parameter to 0 for the IVS9000.
This parameter is
available for manual
server recording.
Server Recording Stream type used for scheduled server recording (stored on
Stream server disks). Set this parameter based on the bandwidth and
network quality.
The options are as follows:
Automatic: No stream is specified, and the primary stream
is used by default.
Primary: The primary stream of the camera is used. The
primary stream features high bit rates, definition, and
bandwidth usage.
Secondary: Secondary streams of the camera are used.
Secondary streams feature low bit rates, definition, and
bandwidth usage. If a camera has multiple secondary
streams, the parameter has multiple secondary stream
options such as secondary 1 and secondary 2.
Save Image Indicates whether to store checkpoint images. The options are
Yes and No.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 35
Parameter Description
Full Image (days) The value ranges from 0 to 9999. A larger value indicates that
the video is stored for a longer period of time. The default
value is 90.
You can select a value from the drop-down list box or enter a value.
It is recommended that the storage period of different cameras
be the same to reduce system resource usage. For example,
you are advised to set the storage period of full images to 90
days for all the 10 cameras.
Partial Image (days) The value ranges from 0 to 9999. A larger value indicates that
the video is stored for a longer period of time. The default
value is 365. For details, see the description of Full Image
(days).
Traffic Violation The value ranges from 0 to 9999. A larger value indicates that
Image (days) the video is stored for a longer period of time. The default
value is 365. For details, see the description of Full Image
(days).
----End
Step 1 On the iClient home page, choose System Management > Storage Management.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 36
Step 2 Click the Server Recording Plan tab. The tab page for configuring a server recording
plan is displayed.
3. Move the cursor on the timeline to select the time period of the recording plan.
If you click Continuous, you do not need to select a recording time segment.
4. Click Save.
Configure server recording plans in batches.
1. After configuring a server recording plan, click Apply to Others.
2. Select a batch of cameras for which you want to configure the same recording
plan, as shown in the following figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 37
3. Click OK.
----End
1.2.4.3 Verification
Step 1 On the iClient home page, choose Basic Video > Playback.
Step 2 Set recording playback parameters.
1. Select a camera whose recordings are to be played back in Cameras. Alternatively,
click , set search criteria, and search for a camera.
2. In the Video Search area, set the search time range, click Advanced, set Location, and
then click Search. You can search for video by recording time and storage device.
3. In the search result, drag the slider on a timeline to select the playback start time, as
shown in the following figure. If the recording can be properly played back, the
recording is successful.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 38
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 39
2.1 Introduction
2.1.1 About This Experiment
This experiment describes how to download and install algorithm plug-ins in different
application scenarios, preparing for subsequent intelligent analysis.
2.1.2 Objectives
Master the functions of different algorithm packages.
Know how to download, upload, and install an algorithm package.
MCS algorithm plug-in is installed before the license file is imported, you need to
uninstall and reinstall the plug-in after the license is imported.
Configuration Steps
Step 5 Click on the right of Alarm ID and clear the alarm according to the alarm
handling procedure.
----End
Step 1 Click the version package. The file download page is displayed. Select the public key
file (KEYS) and tool program (VerificationTools.rar) and click Download. The
OpenPGP Signature Verification Guide.pdf file is an operation guide. You can
download it as required.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 43
----End
Step 2 Click Select Public Key and select the downloaded KEYS file.
To verify all files in the directory, click Multiple Verify and select the C:\PGP\ directory. The
tool starts to verify the files. The verification result examples are shown below.
Step 3 Upload the VA intelligent analysis plug-in packages for face, person, and license
plate recognition and the MCS search plug-in package in sequence.
You can upload a maximum of five plug-in packages at a time using Internet Explorer.
You cannot upload a plug-in package that has been uploaded. To update the algorithm plug-
in, replace it instead of uploading its package again.
To delete a plug-in that has been uninstalled or has not been completely installed, click
Delete.
Select Local Algorithms and click Upload Plug-in Package.
Select the plug-in packages to be uploaded and click Open. The plug-in packages must be
in .zip format. The system automatically uploads the plug-in packages, as shown in the
HCIP-Intelligent Vision V1.0 Experiment Guide Page 46
following figure. After the upload is successful, the plug-ins are displayed in the list of the
corresponding type.
You can close the window only when the message "File uploaded successfully" is
displayed. If the upload fails, re-upload the plug-in packages.
----End
Huawei × √ √ √ √
Facial
Recognition
Algorithm
Plug-ins
Huawei × √ √ √ ×
Facial
Recognition
HCIP-Intelligent Vision V1.0 Experiment Guide Page 47
CloudWalk √ √ √ √ √
Facial
Recognition
Algorithm
Plug-ins
CloudWalk √ √ √ √ ×
Facial
Recognition
Algorithm
Plug-ins
(Facial
Recognition
-based
Access
Control)
Huawei × √ √ √ ×
Personal
Feature
Recognition
Algorithm
Plug-ins
Huawei × √ √ √ ×
Vehicle
Recognition
Algorithm
Plug-in
Huawei × √ × × ×
Pedestrian
and Vehicle
Data
Structuring
Algorithm
HCIP-Intelligent Vision V1.0 Experiment Guide Page 48
Behavior × √ × × ×
analysis,
video
synopsis,
and video
search
features
The symbol "√" indicates that the configuration is required, and "×" indicates that the
configuration is not required.
Before applying for a license for the CloudWalk facial recognition algorithm, ensure that
the algorithm plug-in has been uploaded to the IVS platform.
If the business management unit (BMU) is deployed in single-node system mode, there is only
one .c2v file. If the BMU is deployed in two-node cluster mode, there are two .c2v files.
2. Check whether the names of the obtained .v2c license files are the same as that
recorded in 1.
If they are different, change the name of the obtained license file to the file name
recorded in 1, as shown in the following figure.
If the BMU is deployed in two-node cluster mode, there are two .v2c license files. Ensure that the
name of each .v2c file is the same as that of the corresponding .c2v file. If the license activation
fails, exchange the names of the .v2c files, upload them, and activate them again.
Step 8 Import the license file and click Update. If the BMU is deployed in two-node cluster
mode, upload both .v2c files in step 6.
The system automatically backs up the license file every 3 hours. Do not restart the BMU node
within 3 hours after the license is activated. If the value of License Status is Not imported, import
the license file again.
----End
If the installation fails, click Installation failed to view the installation failure details. In the dialog
box that is displayed, click Retry.
----End
If the resident memory mode is not configured, the reverse image search, person list
record adding, and facial recognition-based access control of the algorithm are
unavailable.
To use the reverse image search function of the Huawei vehicle recognition algorithm,
you need to configure the VA plug-in. Otherwise, skip the operation.
Modifying the resident memory configuration will cause the VA algorithm plug-in to
restart. Exercise caution when performing this operation.
Each AI accelerator card configured on one GPUVA compute node has four AI chips,
and each AI chip supports one available node for which the resident memory mode
can be configured.
If an available node is configured to work in resident memory mode, the node cannot
be used by other algorithms. The value of Available Nodes is reduced by one.
3. Set resident memory parameters. You can set the parameters using either of the
following methods (automatic configuration is used in this experiment):
Automatic configuration: Use this method when you only need to pay attention to the
number of nodes for which the resident memory mode needs to be enabled but do not need
to specify each GPUVA node. This section uses this method as an example to describe how to
set resident memory parameters.
Customized configuration: Use this method when you need to configure resident memory
parameters for specified nodes. Table 2-3 describes the customized configuration parameters.
i. Set Nodes to Enable Resident Mode. Table 2-3 describes the parameters.
Parameter Description
Available Nodes Number of nodes for which the resident memory mode can
be configured. The value is related to the number of GPUVA
nodes deployed on the IVS platform.
Each AI accelerator card configured on one GPUVA compute
node has four AI chips, and each AI chip supports one
available node for which the resident memory mode can be
configured.
Nodes to Enable Total number of nodes for which resident memory will be
Resident Mode enabled. Set this parameter to 1.
Nodes to Enable Total number of available nodes for which the exclusive
Exclusive Mode mode will be enabled.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 52
Parameter Description
ii. Click Apply. In the dialog box that is displayed, click Yes. The system displays a
message, indicating that the operation is successful.
iii. Click Customized Configuration and check whether the number of nodes enabled
with the resident memory is the same as the configured value.
If they are the same, the resident memory mode is configured successfully.
When installing a third-party algorithm VA plug-in, you need to set the number of
algorithm licenses. Otherwise, the functions of the algorithm are unavailable.
Parameter Description
Parameter Description
----End
Parameter Description
Copies The default value is 1. You are advised to use the default value.
You can query the value of Person Library Capacity in the configurator file. For example, in the
Retrieval Business Configuration area of the configurator file, if Blacklist and Whitelist control
about face recognition is set to 30W, the value of Person Library Capacity is 300,000.
iii. Click OK.
6. Perform this step if Work Mode is set to Tagging in 3.
i. Click OK.
If the selected MCS node is A_MCS_S_D, the Select group dialog box is displayed.
ii. Determine whether to group the nodes.
− If the static list capacity is greater than 3 million, select Yes to group the nodes. If
the static list capacity is between 3 million and 15 million, set Select the members
in group to 1. If the static list capacity ranges from 15 million to 30 million
(excluded), set Select the members in group to 2.
− If the static list capacity is not greater than 3 million, select No, indicating that
records are not grouped.
You can query the value of Closing Library Capacity in the configurator file. For example, in the
Retrieval Business Configuration area of the configurator file, if the face tagging library capability
is set to 30 million, the value of Closing Library Capacity is 30,000,000.
iii. Click OK.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 56
7. When you need to deploy MCS nodes in other work modes, deploy them through
MCS capacity expansion.
i. Click Configure. The installation page is displayed.
ii. Click the Scale-out & Scale-in tab.
iii. Select Expansion.
iv. Set Work Mode and Node Type and select MCS nodes. For details, see 3.
− If you install search nodes for the first time, click Next and configure the service
algorithm table. For details, see 4.
− If you install alert nodes, determine whether to group the nodes. For details, see
5.
− If you install tagging nodes, determine whether to group the nodes. For details,
see 6.
8. Check whether the plug-in is successfully installed.
Select MCS from the Plug-in Type drop-down list box and check the Status column.
If the status is Installed, the plug-in is successfully installed, as shown in the
following figure. Click the number in the Installed Nodes column and check the
work mode of the nodes.
----End
Parameter Description
4. Click OK.
5. Check whether the plug-in is successfully installed.
Select MCS from the Plug-in Type drop-down list box and view the plug-in status. If
the status is Installed, the plug-in is successfully installed, as shown in the following
figure. Click the number in the Installed Nodes column and check whether the work
mode of the nodes is Face Switch.
----End
Parameter Description
Copies The default value is 1. You are advised to use the default value.
5. Click OK.
6. When you need to deploy MCS nodes in other work modes, deploy them through
MCS capacity expansion.
i. Click Configure. The installation page is displayed.
ii. Click the Scale-out & Scale-in tab.
iii. Select Expansion.
iv. Set Work Mode and Node Type and select MCS nodes. For details, see 3. If you
install search nodes for the first time, click Next and configure the service
algorithm table. For details, see 4 .
7. Check whether the plug-in is successfully installed.
Select MCS from the Plug-in Type drop-down list box and check the Status column. If
the status is Installed, the plug-in is successfully installed, as shown in the following
figure. Click the number in the Installed Nodes column and check whether the work
mode and node quantity are the same as those in the LLD report.
Step 4 Configure license information. When Work Mode in 3 is set to NvN, you need to
configure the license information.
Parameter Description
3. Click Apply.
----End
Parameter Description
4. Click OK.
5. Check whether the plug-in is successfully installed.
Select MCS from the Plug-in Type drop-down list box and view the plug-in status. If
the status is Installed, the plug-in is successfully installed, as shown in the following
figure. Click the number in the Installed Nodes column and check whether the work
mode of the nodes is Face Switch.
----End
4. Click Next.
5. Set parameters.
Select Dynamic table and enter the partition information and number of copies, as
shown in the following figure. Table 2-13 describes the parameters.
Parameter Description
Copies The default value is 1. You are advised to use the default value.
6. Click OK.
7. Check whether the plug-in is successfully installed.
Select MCS from the Plug-in Type drop-down list box and check the Status column. If
the status is Installed, the plug-in is successfully installed, as shown in the following
figure. Click the number in the Installed Nodes column and check the work mode of
the nodes.
----End
2. Select MCS from the Plug-in Type drop-down list box and click Install in the
Operation column corresponding to the algorithm plug-in to be installed.
The installation page is displayed.
3. Set Work Mode and Node Type and select MCS nodes for which the algorithm needs
to be installed. Table 2-14 describes the parameters.
Work Mode Search Set Work Mode and Node Type and
Select this mode when you select MCS nodes according to the LLD
need to use the search report.
function of the algorithm. For details about the MCS node plan,
If this mode is selected, the check the Container Requirements sheet
MCS node can be used in the LLD report.
only for search. For example, if there are four nodes
that are of the A_MCS_N_C type and
Node Type A_MCS_N_C whose Remarks column indicates that
Node of the A_MCS_N_C type. the nodes are used for reverse image
search, set Work Mode to Search, set
Node Type to A_MCS_N_C, and select
four MCS nodes.
4. Click Next.
5. Set parameters.
Select Dynamic table and enter the partition information and number of copies, as
shown in the following figure. Table 2-15 describes the parameters.
Parameter Description
Copies The default value is 1. You are advised to use the default value.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 64
6. Click OK.
7. Check whether the plug-in is successfully installed.
Select MCS from the Plug-in Type drop-down list box and check the Status column. If
the status is Installed, the plug-in is successfully installed, as shown in the following
figure. Click the number in the Installed Nodes column and check the work mode of
the nodes.
----End
2.2.5.5 Configuring the Person Library Capacity and Reference Library Capacity
Step 1 Log in to the CSP OM portal as the admin user.
Step 2 Choose Application Configuration > Configuration Management > Configuration >
Application Name > Unified Configuration > Analysis Platform.
The settings of Person Library Capacity and Closing Library Capacity cannot be rolled
back.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 66
3 Intelligent Analysis
3.1 Introduction
3.1.1 About This Experiment
This experiment provides guidance on how to configure intelligent analysis tasks of faces,
persons and vehicles.
3.1.2 Objectives
To understand the differences between intelligent PUs and the IVS platforms.
To understand how to configure intelligent analysis tasks of faces, persons, and
vehicles.
Subscribed structured data and images Supported: vehicle, face, and person
from checkpoint cameras search and vehicle alert Unsupported:
face alert
Structured data and features obtained by Supported: vehicle, face, and person
intelligent analysis task created on the IVS search and vehicle and face alert
platforms
This section describes how to obtain intelligent data from checkpoint cameras.
PU intelligence refers to that the IVS platform subscribes to checkpoint data from
intelligent cameras for analysis, search, and alert, reducing the analysis pressure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 67
3.2.1.2 Prerequisites
The surveillance platform has been connected to the analysis platform.
Checkpoint cameras have been installed.
Table 3-1 lists reference documentation for the installation of Huawei cameras. For
details about how to install cameras provided by other vendors, see their
documentation.
ePolice camera Quick Guide to Huawei SDC ePolice Camera Site Survey and
Commissioning
Checkpoint camera Quick Guide to Huawei SDC Checkpoint Camera Site Survey
and Commissioning
Face capture camera Quick Guide to Huawei SDC Face Capture Camera Site
HCIP-Intelligent Vision V1.0 Experiment Guide Page 68
Checkpoint cameras have been added. The process for connecting checkpoint
cameras is the same as that for connecting common ones.
Checkpoint cameras can upload snapshots to the IVS platforms only when they are
connected through HWSDK, HIKSDK, or DHSDK.
If the intelligent attribute configured for a checkpoint camera does not take effect, check
whether camera parameters have been correctly set in the web system of the checkpoint
camera.
Snapshots taken by checkpoint cameras can be uploaded to the IVS platform only when
the cameras are connected through HWSDK, HIKSDK, or DHSDK and the intelligent
attribute is configured correctly on the IVS platform.
The intelligent attribute of the checkpoint camera must be the same as the actual
intelligent attribute. Otherwise, snapshots taken by the checkpoint camera cannot be
uploaded to the IVS platform.
Full Image Number of days for storing full You can select a value from the
(days) images, including background drop-down list box or manually
images or scene images. enter a value.
Partial Image Number of days for storing partial It is recommended that the
(days) images, including close-up images storage period of different
of single objects, such as face, cameras be the same to reduce
person, or license plate. system resource usage. For
example, you are advised to set
Traffic Number of days for storing images this parameter to 90 for all the
Violation uploaded by cameras that support 10 cameras.
Image (days) traffic violation detection and
snapshot taking.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 70
----End
Parameter Description
Parameter Description
Object classification: The camera can detect and take snapshots of
motor vehicles, non-motor vehicles, and persons.
Person detection: The camera can detect and take snapshots of
pedestrians.
Vehicle detection+face detection: The camera can detect and take
snapshots of vehicles and faces.
Face detection+person detection: The camera can detect and take
snapshots of faces and persons.
Object classification+face detection: The camera can detect and
take snapshots of motor vehicles, non-motor vehicles, persons, and
faces.
Step 5 Select the camera to be subscribed to and click Subscribe, as shown in the following
figure.
If the system displays a message indicating that the operation is successful and the value
of Subscription Status is changed to Subscribed, the camera is successfully subscribed to.
3.2.1.6 Verification
The following uses vehicle search as an example.
Step 1 Choose Intelligent Applications > Vehicle Search on the home page.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 72
Step 2 Click the Filter by Criteria tab and click Search without setting any search criteria.
Step 3 On the vehicle search page, set search criteria and click Search to quickly search for
subscribed images from cameras.
Condition Setting
Captured Select the period for data subscription. Assume that the data to be
subscribed to is generated on March 24, 2020. You are advised to
set the period to 00:00-23:59 on March 24, 2020.
Source Select data source. This section uses camera data subscription as
an example. Therefore, set this parameter to Camera and select
the camera for which data subscription has been configured.
----End
Allows users to import, view, group, and use personnel information through the face
list management and face search functions.
Enables the system to match the facial features that are analyzed in real time with
the customer's facial feature library to obtain the identification information about
the individual from the customer's facial feature library.
Face blacklists and face whitelists can be invoked during face alert task
creation, while face redlists can take effect directly.
After a face alert task is created, if a face image captured by the camera
matches a blacklisted or non-whitelisted face, the system uses the same
facial recognition algorithm to calculate the similarity between the face
and the redlisted faces. If the similarity exceeds the threshold, the face
image, related trajectory, and generated alarm are pushed only to users
who have the redlist viewing permission.
Temporary Lists Used to store information about persons involved in face alert
tasks.
Step 1 On the iClient home page, choose Intelligent Applications > Face Library.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 74
Step 1 On the iClient home page, choose Intelligent Applications > Face Library.
Step 2 Click New List and select Static list.
Step 3 Set List Name and Description, and set Static List Type to Common.
Step 4 Click OK twice.
Generating a Temporary List
After you create a face alert task for specific individuals, a temporary list and the
individual's information are automatically generated.
You cannot manually add a temporary list on the Face Library page.
Before deleting a person list under Temporary Lists, you must delete the corresponding face
alert task.
----End
Step 3 Select VCMAPIService and set Face List Capacity. Maximum number of blacklisted,
whitelisted, and redlisted persons that can be added to the IVS platform.
200,000: A maximum of 200,000 blacklisted, whitelisted, and redlisted persons can
be added.
300,000: A maximum of 300,000 blacklisted, whitelisted, and redlisted persons can
be added.
900,000: A maximum of 900,000 blacklisted, whitelisted, and redlisted persons can
be added.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 75
You are not allowed to set this parameter back to a smaller value.
----End
Step 1 Click the face list to which person information will be added and click New.
Step 2 Click the profile icon. In the displayed dialog box, select a face image, and click Open.
Then frame the required part, and click OK.
Face images in the face list must meet the following requirements:
Only .BMP, .DIB, .JPE, .JPEG, .JPG, and .PNG images are supported.
Image size: The recommended image size is 35 KB to 200 KB. The size of a single
image cannot exceed 5 MB.
Image quality: Faces in images must be clear. Images support a minimum of 8-bit
grayscale.
Resolution: The recommended face resolution ranges from 80 x 80 pixels to 200 x
200 pixels. The pupillary distance must be not less than 60 pixels, and 90 pixels or
more is recommended.
Brightness and contrast: The ambient illumination must be at least 300 lux with
uniform brightness of images and moderate contrast. The face should not be
shadowed, without backlight, light reflection and overexposure.
Posture: Use proper posture and look straight ahead. The yaw angle, pitch angle, and
roll angle of the face should be within the range of –10° to +10°.
Occluding: The eyebrows, eyes, mouth, nose, and face contours must not be occluded
by hair, mouth mask, accessories, or glasses. If glasses are worn, the lenses should be
clear and non-reflective.
Face: A complete, clear, unretouched image of the face is required. The contour and
facial features should be clear without heavy makeup.
Facial expression: Wear a neutral expression, with eyes open and mouth closed
naturally. Avoid laugh, frown, or other strong expressions.
The Ethnicity parameter is displayed only when Display Ethnicity is set to Yes for the
VCMAPIService service under Application Configuration > Configuration Management >
Configuration > Application Name > Unified Configuration > Analysis Platform on the CSP OM
portal.
You can also set Import Method to Batch import or Quick import.
Batch import: Each image must be named in the format of Name_ID Number_ID
Type_Gender_Date of birth_Nationality_Ethnicity_Occupation.jpg. You can select a
folder to upload all images in the folder. The values of some fields in the image
name must be digits. For details, see Table 3-6. When a field in the middle is
ignored, the enumerated value of this field is not entered and is replaced with an
underscore (_). For example, if the image can contain only the name and gender, the
HCIP-Intelligent Vision V1.0 Experiment Guide Page 77
image is named in the format of Name ___ Gender .jpg (There are three underscores
(_) in the name).
Quick import: Each image must be named in the format of Name.jpg. You can select
a folder to upload all images in the folder.
Gender The values are 0 and 1. (0 indicates male and 1 indicates female.)
Date of birth The value is in the format of YYYY-MM-DD, for example, 2019-09-
30.
Step 3 (Optional) If a large number of persons' information needs to be imported, you can
use Image Batch Import Tool.xlsm to read the IDs of all face images.
1. Create a folder locally and save the face images to be imported to the folder.
2. Open Image Batch Import Tool.xlsm, click Read All Files in Target Folder, select the
face image folder, and click OK.
The tool automatically reads the image IDs, as shown in the following figure.
Step 4 Enter other information in the Image Batch Import Tool.xlsm file.
The image names (including the file name extensions) in the Image ID column must be the
same as the names of the images to be uploaded.
A maximum of 10,000 persons' information can be imported at a time.
Step 6 Place the template.csv file in folder where the face images are stored.
Step 7 Click List File, load the local template.csv file, and click Open.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 78
All person information in the selected face list is displayed on the right.
Step 3 Correctly enter a complete name or ID number in the search box on the right. Fuzzy
match is not supported.
Step 4 (Optional) Click Advanced Search and enter other search parameters. Table 3-7
describes the parameters.
Parameter Description
Step 1 On the iClient home page, choose Intelligent Applications > 1:1 Face Match.
Step 2 Click + on the left, select a face image, and click Open.
Step 3 Enter an ID number in the Enter ID number text box, search for face images in the
face library based on the ID number and select a face image.
Step 5 After you click Match, the 1:1 face match result is displayed.
Step 6 Click Clear to restore the initial page.
----End
Step 1 On the iClient home page, choose Intelligent Applications > Tasks.
Step 2 Click New Task. The New Intelligent Analysis Task page is displayed.
Step 3 Click the Cameras tab and select a camera.
Step 4 Create an intelligent analysis task for the camera. Table 3-8 describes the
parameters. You can select multiple cameras, select Apply to all, and set Video Type
and Task Type for the selected cameras in batches.
Parameter Description
Execution Domain Execution domain type. Select Local domain. Intelligent analysis
Type tasks will be executed on the IVS platform in the local domain.
Task Type Task type. Select Facial recognition and select required facial
recognition algorithms. Multiple algorithms can be selected.
If the CloudWalk facial recognition algorithm is used, the
scheduled snapshot mode can be enabled for video stream
analysis. In this case, the Snapshot parameter needs to be set. In
scheduled snapshot mode, if the same face remains in the video
shot by a camera, the system captures the face image at the
interval specified by Snapshot. Generally, the scheduled snapshot
mode applies to facial recognition–based roll call after whitelist-
based alert.
Advanced Settings Advanced settings. Set Save snapshot. If the snapshot storage
function is enabled, the face images recognized by intelligent
HCIP-Intelligent Vision V1.0 Experiment Guide Page 80
Parameter Description
cameras are stored on the platform server. This parameter is not
valid for common cameras.
3.2.2.3.2 (Optional) Creating an Intelligent Analysis Task for Recorded Video from
Cameras
If a camera is required to recognize faces in video, you can perform the following steps to
create a facial recognition task for recorded video from the camera:
Step 1 On the iClient home page, choose Basic Operations > Information Center.
Step 2 Click the Recordings tab.
Step 3 Click the Camera text box and select the camera from which recordings are to be
searched for.
Parameter Description
Execution Domain Execution domain type. Select Local domain. Intelligent analysis
Type tasks will be executed on the IVS server in the local domain.
Task Type Task type. Select Facial recognition and select the required facial
recognition algorithm. If multiple algorithms are available, you
can select multiple algorithms.
Fast Analysis When Video Type is set to Recorded and Task Type to Facial
recognition, you can select Fast Analysis.
After Fast Analysis is selected, Execution Domain Type can only be set to
Local domain.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 81
Parameter Description
When performing an intelligent analysis task in the Fast Analysis mode,
the system provides a maximum analysis capability of 50x. The analysis
capability in a specific situation depends on the idle GPU resources,
available license channels, and MPUR container download bandwidth.
If the MPUR node is running recording playback services, such as video
viewing and video analysis, the intelligent analysis task with Fast Analysis
selected shares the 256 Mbit/s download bandwidth with these services,
and therefore the speed cannot reach 50x.
If Fast Analysis is selected for a task, a large number of GPU
resources are required to execute this task. As a result, subsequent
intelligent analysis tasks can be executed only after these GPU
resources are released.
Advanced Settings Advanced settings. Set Save snapshot. If the snapshot storage
function is enabled, the face images recognized by intelligent
cameras are stored on the platform server. This parameter is not
valid for common cameras.
3.2.2.3.3 (Optional) Uploading a Local Video File and Creating an Intelligent Analysis
Task
In addition to extracting facial features from live or recorded video from cameras, you can
create a facial recognition task for a video file that is uploaded locally to extract facial
features. The detailed operations are as follows:
Uploading a Video File
Step 1 On the iClient home page, choose Basic Operations > Information Center.
Step 2 Click the Uploads tab.
Step 3 Click Upload. In the dialog box that is displayed, select a video file and click Open.
The system starts uploading the video file. You can view the uploaded video file on
the Uploaded Video tab page.
----End
Step 1 On the iClient home page, choose Basic Operations > Information Center.
Step 2 Click the Uploaded Video tab.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 82
Step 3 Select a video file and click New Analysis Task. Alternatively, you can select multiple
video files, click New Analysis Task, select Apply to all, and set parameters for the
selected video files in batches.
Step 4 Create a facial recognition task for the video file and select one or more required
algorithms. For details about other parameters, see Table 3-9.
Face Search page If images or features (such as sex, glasses, and hat) of the
face to be searched have been obtained, the face images
or facial features can be directly used for face search.
Capturing a face image During live video preview, if you want to search for a face
during live video preview that appears in the video, you can capture the face image
to perform face search.
Capturing a face image During recording playback, if you want to search for a face
during recording playback that appears in the recording, you can capture the face
image to perform face search.
Capturing a face image During person search, you can capture a clear face image
from a person search from a person search result to perform face search.
result
Selecting a face on the When viewing alarms generated by face alert tasks on the
Alarm Center page Alarm Center page, if you want to perform face search on
the person that appears on the alarm detail page, capture
the face, and create and initiate a face search task for the
target face.
Selecting a face snapshot When viewing face snapshots on the Information Center
on the Information page, if you want to perform face search on the person
Center page that appears on the snapshot detail page, capture the
face, and create and initiate a face search task for the
target face.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 83
Step 1 On the iClient home page, choose Intelligent Applications > Face Search.
Step 2 Select the Search by Image tab.
Step 3 (Optional) Click More and enter search criteria based on the site requirements. Table
3-11 describes the parameters.
Parameter Description
Search Domain Search domain. Select the local domain for face search.
Source Video source of the captured face images. The options are
Camera, Video file, and All.
Image Quality The face image quality is affected by factors such as color,
definition, and resolution. You can set this parameter to filter
out face images with poor quality (such as black-and-white,
fuzzy, or low resolution images).
Some algorithms cannot analyze the image quality score. If
you want to search for face snapshots without image quality
score, deselect Image Quality.
Step 5 Click Search. The Snapshot Library tab page is displayed by default with the search
results, as shown in Figure 3-9 and Figure 3-10. The snapshot library contains face
images captured by cameras and extracted by facial recognition tasks.
The recommended face images shown in Figure 3-10 are from the face library and provide
possible identity information for the target face.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 85
Figure 3-9 Face image search result (matched to the face library)
Figure 3-10 Face image search result (not matched to the face library)
Step 6 (Optional) Select multiple face images and click Trajectory Analysis to analyze the
person trajectory. The following figure shows the analysis result.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 86
The prerequisite for successful track analysis is that the camera location information has been
configured.
Step 7 (Optional) Select multiple face images, and select Export Selected. You can also
select Export This Page or Export All from the drop-down list box as required. The
following figure shows the page for exporting files.
You can enable the encrypted export function when exporting files. After this function is enabled,
you need to enter the preset password when opening the file exported to the local computer.
Step 8 Click the Face Library tab and search for faces in the face library (face list).
You can select All, Blacklists, Whitelists, Redlists, or Static lists from the drop-down list box
under the face image to specify the search scope.
----End
Filter by Criteria
Step 1 On the iClient home page, choose Intelligent Applications > Face Search.
Step 2 Click the Filter by Criteria tab.
Step 3 Set the parameters for searching by criteria. Table 3-12 describes the key parameters.
Parameter Description
Source Video source of the captured face images. The options are Camera,
Video file, and All.
Search Search domain. Select the local domain for face search.
Domain
Feature Indicates whether to display the images from which facial features have
Extracted been extracted.
Yes: displays the images from which facial features have been
extracted.
No: displays the images from which facial features have not been
extracted.
All: displays all images.
The Ethnicity parameter is displayed only when Display Ethnicity is set to Yes for
the VCMAPIService service under Application Configuration > Configuration
Management > Configuration > Application Name > Unified Configuration >
Analysis Platform on the CSP OM portal.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 88
Parameter Description
Image Image quality. The face image quality is affected by factors such as
Quality color, definition, and resolution. You can set this parameter to filter out
face images with poor quality (such as black-and-white, fuzzy, or low
resolution images).
Some algorithms cannot analyze the image quality score. If you want to
search for face snapshots without image quality score, deselect Image
Quality.
Step 4 Click Search. The Snapshot Library tab page is displayed by default with the search
results, as shown in the following figure. The snapshot library contains face images
captured by cameras and extracted by facial recognition tasks.
Step 5 (Optional) Use a clear target face image for secondary search to obtain more images
of the target face. The operations are as follows:
Step 6 (Optional) Select multiple face images and click Trajectory Analysis to analyze the
person trajectory.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 89
The trajectory analysis can succeed only when the camera sites have been configured on the
electronic map.
Step 7 (Optional) Select multiple face images, and select Export Selected. You can also
select Export This Page or Export All from the drop-down list box as required. The
following figure shows the page for exporting files.
You can enable the encrypted export function when exporting files. After this function is enabled,
you need to enter the preset password when opening the file exported to the local computer.
----End
Step 1 On the iClient home page, choose System Management > Device Management.
Step 2 Click the Cameras tab, select cameras from the camera list on the right, and click
Virtual Attribute.
You can select multiple cameras, select Apply to all, and set intelligent analysis task
parameters for the selected cameras in batches.
Parameter Description
Video Type Video type. To use the face alert function, set Video Type to Live
to ensure the alert timeliness.
Execution Domain Execution domain type. Select Local domain. Intelligent analysis
Type tasks will be executed on the IVS platform in the local domain.
Task Type Task type. Select Facial recognition and select the required facial
recognition algorithm. Multiple algorithms can be selected.
If the CloudWalk facial recognition algorithm is used, the
scheduled snapshot mode can be enabled for video stream
analysis. In this case, the Snapshot parameter needs to be set. In
scheduled snapshot mode, if the same face remains in the video
shot by a camera, the system captures the face image at the
interval specified by Snapshot. Generally, the scheduled snapshot
mode applies to facial recognition–based roll call after whitelist-
based alert.
Advanced Settings Advanced settings. Set Save snapshot. If the snapshot storage
function is enabled, the face images recognized by intelligent
cameras are stored on the platform server. This parameter is not
valid for common cameras.
Parameter Description
Active Time range for executing a face alert task. Use either of the
following methods to set this parameter:
Select One Week, One Month, or One Year.
Specify a period in the calendar.
Click Set Hours to set the time segment for alert.
Alert Object Alert object. You can select either of the following options at a
time:
Individual: Upload a face image and enter certificate
information. The system automatically adds the person to a
temporary face list in the face library.
List: Select a face blacklist or whitelist.
Note:
A face alert task can be created for only one type of face lists.
Therefore, you can select either blacklists or whitelists.
You can create multiple alert tasks for face blacklists and
whitelists under the same alert scope.
Click New Alert Task and set alert task parameters, as shown in
the following figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 93
Parameter Description
Algorithm Algorithm. You can select For all algorithms or For specified
algorithm.
− If you select For all algorithms, the value of Match
Threshold (%) applies to all algorithms enabled on the
iClient.
− If you select For specified algorithm, select algorithms used
for the alert task and set Match Threshold (%) for the
algorithms.
Match Threshold (%): When the similarity between a passer-by
face and the target face is greater than or equal to the
threshold, the two faces match.
− A smaller threshold indicates more matched faces, lower
false negative rate, and higher false positive rate.
− A higher threshold indicates fewer matched faces, lower
false positive rate, and higher false negative rate.
Alert Level Alert level. Set this parameter based on the importance and
urgency level of the alert task. The severity of alarms generated by
an alert task depends on the importance and urgency of the task.
For example, if this parameter is set to Critical, the severity of
alarms generated by this alert task is also critical.
Alarm Type Alarm type. When listed detected: When the recognized face
matches the target face of the face alert task, an alarm is
generated.
When non-listed detected: When the recognized face does not
match the target face of the face alert task, an alarm is
generated.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 94
You can click to filter alert tasks by Created, Alert Level, Alert Domain, and
False Positive List.
Click a face alert task in the list on the left. The details about the task are displayed
on the right.
Checking the Alert Result on the Intelligent Recognition Page
On the Intelligent Recognition page, you can view the face snapshots and alert alarms of
specific cameras.
Step 1 On the iClient home page, choose Intelligent Applications > Intelligent Recognition.
Step 2 Double-click a camera in Cameras or drag a camera to the video pane. The live video
from the camera is played.
Step 3 View the face snapshots and alert alarms of the camera, as shown in the following
figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 95
Choose More > Face Alarms on the right of Snapshot Alarms to go to the Alarm Center
page and view historical face alert alarms.
Choose More > More Faces on the right of Snapshot Results to go to the Information
Center page and view historical face snapshots.
----End
Step 1 On the iClient home page, choose Basic Operations > Alarm Center > Face Alerts.
The Face Alerts page is displayed.
Step 2 Set alarm search criteria. The Cameras parameter corresponds to Alert Scope, and
the Severity parameter corresponds to Alert Level.
Step 3 Click Search. The search result is displayed, as shown in the following figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 96
Export the face alert alarms to an Excel file and save the file to the local computer.
To export selected alarms, select alarms and select Export Selected from the drop-
down list box.
To export alarms on the current page, select Export This Page from the drop-down
list box.
To export all alarms, select Export All from the drop-down list box.
You are advised to use professional video or image editing tools to shield irrelevant persons in
downloaded video or images and meet the HD requirements of the data subject. The
recommended procedure is as follows:
1. Download the required video to the local computer and extract the common video
from the required video.
2. Use a video editing tool to anonymize irrelevant persons' faces and only retain the
HD part of the data subject.
3. Export the anonymized video to meet the data transfer requirements of the data
subject.
Step 4 Click an alarm in the search result. The alarm details are displayed, as shown in the
following figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 97
Step 1 On the iClient home page, choose System Management > O&M Center.
Step 2 Choose Service Statistics > Analysis Platform and set Statistical Type to Face
snapshot statistics.
Step 3 Set Statistical Method to By time, set View Mode to Real-time passer-by face
statistics, and click Search.
When Statistical Method is set to By time, Data Source is automatically set to All and cannot
be modified.
When View Mode is set to Real-time passer-by face statistics, Queried is from 00:00:00 of the
current day to the current time by default and cannot be modified.
Step 4 Set Statistics Method to By time, set View mode to Historical passer-by face statistics,
click Year, Month, or Date, or click to set Queried, and click Search.
Step 5 (Optional) Click Export to export the statistics to an Excel file and save the file to the
local computer.
You are advised to use professional video or image editing tools to shield irrelevant persons
in downloaded video or images and meet the HD requirements of the data subject. The
recommended procedure is as follows:
1. Download the required video to the local computer and extract the common video
from the required video.
2. Use a video editing tool to anonymize irrelevant persons' faces and only retain the
HD part of the data subject.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 99
3. Export the anonymized video to meet the data transfer requirements of the data
subject.
Step 6 If Statistical Method is set to By device, you need to select a camera from the Data
Source drop-down list box. You can also select Real-time passer-by face statistics or
Historical passer-by face statistics for View Mode. The other operations are similar to
those in 3, 4, and 5 in statistics by time.
----End
Step 1 On the iClient home page, choose System Management > O&M Center.
Step 2 Choose Service Statistics > Analysis Platform and set Statistical Type to Face alarm
statistics.
Step 3 Set Statistical Method to By time, set View Mode to Real-time alarm statistics, and
click Search.
When Statistical Method is set to By time, Data Source is automatically set to All and cannot
be modified.
When View Mode is set to Real-time alarm statistics, Queried is from 00:00:00 of the current
day to the current time by default and cannot be modified.
Step 4 Set Statistical Method to By Time, set View Mode to Historical alarm statistics, click
Year, Month, or Date, or click to set Queried, and click Search.
Step 5 (Optional) Click Export to export the statistics to an Excel file and save the file to the
local computer.
You are advised to use professional video or image editing tools to shield irrelevant persons in
downloaded video or images and meet the HD requirements of the data subject. The
recommended procedure is as follows:
1. Download the required video to the local computer and extract the common video
from the required video.
2. Use a video editing tool to anonymize irrelevant persons' faces and only retain the
HD part of the data subject.
3. Export the anonymized video to meet the data transfer requirements of the data
subject.
Step 6 If Statistical Method is set to By device, you need to select a camera from the Data
Source drop-down list box. You can also select Real-time alarm statistics or Historical
alarm statistics for View Mode. The other operations are similar to those in 3, 4, and
5 in statistics by time.
----End
The personal feature recognition algorithm plug-in has been installed on the CSP
OM portal. For details, see chapter 2 "Installation and Configuration of Algorithms."
3.2.3.1 (Optional) Creating an Intelligent Analysis Task for Live Video from Cameras
To recognize persons in live video, you can create a personal feature recognition task or
pedestrian and vehicle data structuring task for live video from the camera. The procedure
is as follows:
Step 1 On the iClient home page, choose Intelligent Applications > Tasks.
Step 2 Click New Task.
The New Intelligent Analysis Task page is displayed.
You can select multiple cameras and select Apply to all to set parameters for the selected
cameras in batches.
Table 3-15 Intelligent analysis task for live video parameter description
Parameter Description
Execution Domain Select Local domain. Intelligent analysis tasks will be executed
Type on the IVS platform in the local domain.
Priority Task priority for determining the task execution sequence. The
Level 1 (highest) value indicates the highest priority.
Stream When creating an intelligent analysis task for cameras, you can
select the stream type used during intelligent analysis.
Intelligent analysis can be performed only when the video type
is live video.
Execution Period Time segment during which an intelligent analysis task can be
scheduled and executed.
Advanced Settings Area for specifying a region of interest (ROI), as shown in the
following figure.
It is recommended that the ROI avoid areas without human
activities to exclude non-person images and reduce the false
positive rate.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 102
3.2.3.2 (Optional) Creating an Intelligent Analysis Task for Recorded Video from
Cameras
To recognize persons in recorded video, you can create a personal feature recognition task
or pedestrian and vehicle data structuring task for recorded video from the camera. The
procedure is as follows:
Step 1 On the iClient home page, choose Basic Operations > Information Center.
Step 2 Click the Recordings tab.
Step 3 Click the Camera text box and select the camera whose recordings are to be
searched for.
Parameter Description
Analysis Period When the value of Video Type is Recorded, you need to
configure the recording time segment for which personal
feature recognition is to be performed.
Execution Domain Type Select Local domain. Intelligent analysis tasks will be
executed on the IVS platform in the local domain.
Fast Analysis When Video Type is set to Recorded and Task Type is set
to Pedestrian and vehicle data structuring or Personal
feature recognition, you can select Fast Analysis.
Note:
If Fast Analysis is selected, you can set Execution
Domain Type only to Local domain.
An intelligent analysis task with Fast Analysis selected
provides at most 50x analysis. The analysis capability is
restricted by the amount of idle GPU resources, number
of remaining license channels, and MPUR node
download bandwidth.
If the MPUR node is running recording playback
services, such as video viewing and video analysis, the
intelligent analysis task with Fast Analysis selected
shares the 256 Mbit/s download bandwidth with these
services, and therefore the speed cannot reach 50x.
If Fast Analysis is selected for a task, a large number of
GPU resources are required to execute this task. As a
result, subsequent intelligent analysis tasks can be
executed only after these GPU resources are released.
3.2.3.3 (Optional) Uploading a Local Video File and Creating an Intelligent Analysis
Task
In addition to extracting personal features from live or recorded video, you can create a
personal feature recognition task or pedestrian and vehicle data structuring task for an
uploaded video file to extract personal features from the video file. The procedure is as
follows:
Uploading a Video File
Step 1 On the iClient home page, choose Basic Operations > Information Center.
Step 2 Click the Uploads tab.
Step 3 Click Upload. In the dialog box that is displayed, select a video file and click Open.
Step 4 After the video file is uploaded, view the uploaded video file on the Uploaded Video
tab page.
----End
Step 1 On the iClient home page, choose Basic Operations > Information Center.
Step 2 Click the Uploaded Video tab.
Step 3 Select a video file and click New Analysis Task. Alternatively, you can select multiple
video files, click New Analysis Task, select Apply to all, and set parameters for the
selected video files in batches.
Step 4 Create a personal feature recognition task or pedestrian or vehicle data structuring
task for the video file. After setting Task Type, select one or more algorithms as
required.
Step 1 On the iClient home page, choose Intelligent Applications > Person Search.
Step 2 Click the Search by Image tab.
Step 3 (Optional) To specify more restrictions on the search scope, click More and enter
search criteria as required. Table 3-17 describes the parameters.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 105
Parameter Description
Algorithm Algorithm used for personal feature recognition and person search.
Source Video source of the captured person images. The options are
Camera, Video file, and All.
Step 4 Drag a person image to the search box. In the Upload Image dialog box that is
displayed, frame a part of the person body, and click OK.
The image size does not exceed 5 MB, and the image resolution does not exceed
4096 x 3000 pixels.
The resolution of the selected person area ranges from 60 x 60 pixels to 800 x 1200
pixels.
Step 5 Click Search. The Snapshot Library tab page is displayed to search for the target
person. Images in the snapshot library are extracted by the personal feature
recognition task and person and vehicle data structuring task. The following figure
shows the search results.
Step 6 (Optional) Select multiple person images and click Trajectory Analysis to analyze the
person trajectory. The following figure shows the analysis result.
The trajectory analysis can succeed only when the camera sites have been configured on the
electronic map.
Step 7 (Optional) Select multiple face images, and select Export Selected, or select Export
This Page or Export All from the drop-down list box as required. The following figure
shows the export page.
You can enable the encrypted export function. After this function is enabled, you need to enter
the preset password when opening the file exported to the local computer.
----End
Filter by Criteria
Step 1 On the iClient home page, choose Intelligent Applications > Person Search.
Step 2 Click the Filter by Criteria tab.
Step 3 Set desired search parameters. Table 3-18 describes the parameters.
Parameter Description
Source Video source of the captured person images. The options are
Camera, Video file, and All.
Search Domain Search domain. Select the local domain for person search.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 108
Parameter Description
Object Type Type of the target for search, for example, Person or Cyclist.
Step 4 Click Search. The Snapshot Library page is displayed to search for the target person.
Results are shown in the following figure. Images in the snapshot library are
extracted by the personal feature recognition task and person and vehicle data
structuring task.
Step 5 (Optional) Use a clear target person image for secondary search to obtain more
images of the target person. Click the person search result. On the details page that
is displayed, click Search.
Step 6 (Optional) Select multiple person images and click Trajectory Analysis to analyze the
person trajectory. The following figure shows the analysis result.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 109
The trajectory analysis can succeed only when the camera sites have been configured on the
electronic map.
Step 7 (Optional) Select multiple face images and click Export Selected. You can also select
Export This Page and Export All from the drop-down list box as required. The
following figure shows the export page.
You can enable the encrypted export function. After this function is enabled, you need to enter
the preset password when opening the file exported to the local computer.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 110
The default vehicle blacklist is available by default. Global alerts are automatically deployed on
vehicles in this blacklist. You cannot manually create alert tasks for vehicles in the default
blacklist, and cannot delete or modify the blacklist.
Step 1 On the iClient home page, choose Intelligent Applications > Vehicle Library.
Step 2 Click New List, set Name and List Type, and click OK.
Step 3 Click OK.
Generating a Temporary List
After you create a vehicle alert task for specific vehicles, a temporary list and the
corresponding vehicle information are automatically generated.
You cannot manually add a temporary list on the Vehicle Library page.
Before deleting a vehicle list under Temporary Lists, you must delete the corresponding
vehicle alert task.
----End
Step 2 (Optional) Upload a vehicle image. To be specific, click . In the dialog box that is
displayed, draw a box to select the vehicle image for alert, and click OK.
The supported image formats are .JPG, .JPEG, .JPE, .DIB, .BMP, and .PNG. Each image cannot
exceed 5 MB.
Step 3 Fill in the basic information about the vehicle, as shown in the following figure. The
License Plate parameter is mandatory. You can use an asterisk (*) to represent zero,
HCIP-Intelligent Vision V1.0 Experiment Guide Page 111
or more unknown license plate characters. Set other parameters based on the actual
available information.
If you click Download Template, you can click Read All Files in Target Folder in the
downloaded template to automatically read image names. Vehicle images must be stored in
the same folder as the Image Batch Import Tool.xlsm template and the .csv file generated
later.
You must set the License Plate parameter in the template. Otherwise, the .csv file cannot be
generated.
The supported image formats are .JPG, .JPEG, .JPE, .DIB, .BMP, and .PNG. Each image cannot
exceed 5 MB.
A maximum of 10,000 vehicle records can be imported at a time.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 112
4. Click on the right of List File, select a local .csv file, and upload the file.
Batch import
Click on the right of List File and select the folder for storing vehicle images.
The supported image formats are .JPG, .JPEG, .JPE, .DIB, .BMP, and .PNG. Each image cannot
exceed 5 MB.
An image must be named in the format License plate_Vehicle color_Vehicle type_Plate
color_Plate type_Make_Model_Year_Owner_Owner ID number. Fields in each image name
must be by underscores (_). The License plate field is mandatory.
Fields in the image name must be separated by underscores (_). The values of Vehicle color,
Vehicle type, and Plate color must be enumerated values. For details, see Table 3-19.
If a field between two other fields needs to be ignored, use an underscore (_) to replace the
field. For example, if only the license plate and vehicle type can be identified for a vehicle
image, the vehicle image can be named in the format License plate__Vehicle type.File name
extension.
Vehicle type 0: unknown; 1: car; 2: truck; 3: van; 4: bus; 5: small truck; 6: SUV; 7:
medium-sized bus; 8: motorcycle; 9: others.
Quick import
Click on the right of List File and select the folder for storing vehicle images.
The supported image formats are .JPG, .JPEG, .JPE, .DIB, .BMP, and .PNG. Each image cannot
exceed 5 MB.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 113
IVS platform extracts fields from image names. Therefore, images must meet the
following requirements:
An image must be named after the license plate.
A license plate can include 1 to 255 characters, including letters and digits.
Step 3 Ensure that all vehicle information is successfully verified and click Import. If the
verification fails, rectify the fault.
name, or an ID number of a vehicle owner in the search box, and click to search
for the vehicle.
Step 2 Select a vehicle list on the left, click Advanced, set search criteria, and click Search to
search for the vehicle. You can double-click a record in the search result to view the
vehicle details.
----End
After the system is initialized, the vehicle recognition algorithm huawei_cmv takes effect only
after the huawei_cmv algorithm plug-in is manually installed.
Step 1 On the iClient home page, choose System Management > Algorithm Management.
Step 2 Click the huawei_cmv algorithm. The algorithm details are displayed, as shown in the
following figure.
When the algorithm is used, the characters that indicate the provinces to which the license
plates belong need to be adapted in the Plug-In Initialization Parameter text box. Table 3-
20 shows details about the parameters and functions.
Parameter Description
LocalChar Shortened forms of the provinces to which the license plates belong.
If the first character of the license plate is not clear enough, the algorithm
matches it with those configured for this parameter, and selects the
character with the highest similarity as the first character of the license
plate. This helps improve the recognition accuracy of the first character.
The options are the shortened forms of Chinese provinces and cities.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 115
Parameter Description
You can configure one or more characters. (One character is recognized).
If there are multiple values, do not add separators (such as spaces or
commas) between values. When there are more than six characters, only
the first six characters are valid and the repeated characters are counted.
For huawei_cmv, only the LocalChar parameter needs to be adjusted. Use the default
values for other parameters. If other parameters are modified or the XML syntax
structure is modified, license plates cannot be recognized and a large number of
intelligent analysis tasks will fail.
Step 4 After confirming that the parameter settings are correct, click OK.
Step 5 (Optional) If an intelligent analysis task has been created for the algorithm, restart
this task for the parameter settings to take effect.
----End
Step 1 On the iClient home page, choose System Management > Algorithm Management.
Step 2 Click the lpr_qfreeAPI algorithm. The algorithm details are displayed, as shown in the
following figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 116
When the algorithm is used, the characters that indicate the height of license plate
characters, country or region code, and confidence need to be adapted in the Plug-In
Initialization Parameter text box. Table 3-21 shows details about the parameters and
functions.
Parameter Description
Parameter Description
3. Open the snapshots using a drawing software and view the
heights of characters that can be clearly identified.
4. Draw a rectangle tightly close to the license plate characters and
view the vertical pixel value of the selected area, as shown in the
following figure.
When setting a country or region code, fill in also the general license plate
style codes of the country or region, and use commas (,) to separate
multiple style codes. For example, enter T,X_EU for Thailand.
For the lpr_qfreeAPI algorithm, only the parameters in the preceding table need to be
modified. Do not modify other parameters but use their default values. If other
parameters are modified or the XML syntax structure is modified, license plates cannot be
recognized and a large number of intelligent analysis tasks will fail.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 118
Step 4 After confirming that the parameter settings are correct, click OK.
Step 5 (Optional) If an intelligent analysis task has been created for the algorithm, restart
this task for the parameter settings to take effect.
----End
3.2.4.2.2 (Optional) Creating an Intelligent Analysis Task for Live Video from Cameras
To recognize vehicles in video, create an intelligent analysis task for live video from cameras.
The detailed operations are as follows:
Step 1 On the iClient home page, choose Intelligent Applications > Tasks.
Step 2 Click New Task. The New Intelligent Analysis Task page is displayed.
Step 3 Click the Cameras tab and select a camera.
Step 4 Create an intelligent analysis task for the camera. Table 3-22 describes the
parameters. You can select multiple cameras and then select Apply to all to set
intelligent analysis task parameters for cameras in batches.
Parameter Description
Priority Task priority for determining the task execution sequence. The
Level 1 (highest) value indicates the highest priority.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 119
Parameter Description
Stream When creating an intelligent analysis task for cameras, you can
select the stream type used during intelligent analysis. Intelligent
analysis can be performed only when the video type is live video.
Execution Period Time segment during which an intelligent analysis task can be
scheduled and executed.
Task Type When creating a license plate recognition task, select License
plate recognition and select one or more license plate
recognition algorithms.
When creating a vehicle recognition task, select Vehicle
recognition and select one or more vehicle recognition
algorithms. By default, Vehicle attributes is selected. If you
want to use the function of vehicle search by image, select
Vehicle features.
When creating a pedestrian and vehicle data structuring task,
select Pedestrian and vehicle data structuring and select one or
more related algorithms.
3.2.4.2.3 (Optional) Creating an Intelligent Analysis Task for Recorded Video from
Cameras
To recognize vehicles in video, you can create an intelligent analysis task for recordings
from cameras. The detailed operations are as follows:
Step 1 On the iClient home page, choose Basic Operations > Information Center.
Step 2 Click the Recordings tab.
Step 3 Click the Camera text box, and select the camera whose recordings are to be
searched for.
Parameter Description
Fast Analysis When Video Type is set to Recorded and Task Type to Pedestrian
and vehicle data structuring or Vehicle recognition (vehicle
HCIP-Intelligent Vision V1.0 Experiment Guide Page 121
Parameter Description
recognition algorithm: huawei_cmv), you can select Fast Analysis.
If Fast Analysis is selected, you can set Execution Domain Type only to Local
domain.
An intelligent analysis task with Fast Analysis selected provides
at most 50x analysis. The analysis capability is restricted by the
amount of idle GPU resources, number of remaining license
channels, and MPUR node download bandwidth.
If the MPUR node is running recording playback services, such
as video playback and video analysis tasks, the intelligent
analysis task with Fast Analysis selected shares the 256 Mbit/s
download bandwidth with these services, and therefore the
speed cannot reach 50x.
If Fast Analysis is selected for a task, a large number of GPU
resources are required to execute this task. As a result,
subsequent intelligent analysis tasks can be executed only after
these GPU resources are released.
3.2.4.2.4 (Optional) Uploading a Local Video File and Creating an Intelligent Analysis
Task
In addition to extracting vehicle data from live or recorded video, you can create an
intelligent analysis task for an uploaded video file to extract vehicle data from the video
file. The procedure is as follows:
Uploading a Video File
Step 1 On the iClient home page, choose Basic Operations > Information Center.
Step 2 Click the Uploads tab.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 122
Step 3 Click Upload. In the dialog box that is displayed, select a video file and click Open.
The system starts uploading the video file. You can view the uploaded video file on
the Uploaded Video tab page.
----End
Step 4 On the iClient home page, choose Basic Operations > Information Center.
Step 5 Click the Uploaded Video tab.
Step 6 Select a video file and click New Analysis Task. Alternatively, you can select multiple
video files, click New Analysis Task, select Apply to all, and set parameters for the
selected video files in batches.
Step 7 Create an intelligent analysis task for the video file. Table 2-16 describes the
parameters.
Step 1 On the iClient home page, choose Intelligent Applications > Vehicle Search.
Step 2 Select the Search by Image tab.
Step 3 (Optional) To specify more restrictions on the search scope, click More and enter
search criteria as required. Table 3-24 describes the parameters.
Parameter Description
Sort by Similarity Threshold of the similarity to the target for the search.
Source Video source of the captured vehicle images. The options are
Camera, Video file, and All.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 123
Step 5 Click the search icon. The Snapshot Library page is displayed to search for the target
person. Images in the snapshot library are extracted from vehicle feature recognition
tasks. The following figure shows the search results.
Step 6 (Optional) Select multiple vehicle images and click Trajectory Analysis. The following
figure shows the analysis result.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 124
The trajectory analysis can succeed only when the camera sites have been configured on the
electronic map.
Step 7 (Optional) Select multiple face images and select Export Selected. You can also select
Export This Page and Export All from the drop-down list box as required. The
following figure shows the page for exporting files.
You can enable the encrypted export function. After this function is enabled, you need to enter
the preset password when opening the file exported to the local computer.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 125
Filtering by Criteria
Step 1 On the iClient home page, choose Intelligent Applications > Vehicle Search.
Step 2 Click the Filter by Criteria tab.
Step 3 Set the parameters for searching by criteria. Table 3-25 describes the key parameters.
Parameter Description
License Plate License plate characters of the vehicle that is searched for. Fuzzy
search is supported, where the question mark (?) matches exactly one
character, and the asterisk (*) matches zero or more characters.
Unknown If you select this parameter, you cannot set License Plate, and the
plate iClient searches for vehicles without specific license plates.
Click Search. The Snapshot Library page is displayed to search for the target vehicle. The
snapshot library contains vehicle images extracted by vehicle recognition, license plate
recognition, or pedestrian and vehicle data structuring. The following figure shows the
search results.
The vehicle image on the right of the page is found in the vehicle library and contains
related vehicle information.
For more accurate search results, you can click More to set more filter criteria.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 126
Step 4 (Optional) To obtain more accurate vehicle information, you can perform secondary
feature recognition on the images displayed as search results.
Typically, secondary feature recognition applies to the scenario where the vehicle recognition
algorithm of the IVS platform is used to recognize the vehicle images obtained through metadata
subscription again. After secondary feature recognition, if the vehicle information is not
consistent, the results obtained from secondary feature recognition prevails. The analysis result of
secondary feature recognition overwrites the original vehicle metadata.
1. Select the vehicle search result.
2. Click Secondary Feature Recognition.
3. In the Select algorithm dialog box, click the algorithm used for vehicle analysis and
click OK.
4. You can choose Intelligent Applications > Tasks to view the progress of secondary
feature recognition.
Step 5 (Optional) Select multiple vehicle images and click Trajectory Analysis. The following
figure shows the analysis result.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 127
The trajectory analysis can succeed only when the camera sites have been configured on the
electronic map.
Step 6 (Optional) Select multiple face images, and select Export Selected, or select Export
This Page Export All from the drop-down list box as required. The following figure
shows the page for exporting files.
You can enable the encrypted export function. After this function is enabled, you need to enter
the preset password when opening the file exported to the local computer.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 128
Step 7 Click the Vehicle Library tab to view the search results in the vehicle library, as shown
in the following figure.
For more accurate search results, you can click Advanced Search to set more filter criteria.
----End
Step 1 On the iClient home page, choose System Management > Device Management.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 129
Step 2 Click the Cameras tab, select cameras from the camera list on the right, and click
Virtual Attribute.
Step 1 On the iClient home page, choose Intelligent Applications > Tasks.
Step 2 Click New Task. The New Intelligent Analysis Task page is displayed.
Step 3 Click the Cameras tab and select a camera.
Step 4 Create an intelligent analysis task for the camera. Table 3-26 describes the
parameters. You can select multiple cameras, select Apply to all, and set intelligent
analysis task parameters for the cameras in batches.
Parameter Description
Video Type When creating an intelligent vehicle analysis task for alert, set
Video Type to Live to ensure the alert timeliness.
Parameter Description
When creating a pedestrian and vehicle data structuring task,
select Pedestrian and vehicle data structuring and select one or
more related algorithms.
If you select huawei_struct, Personal and vehicle attributes is
selected by default. If you want to use the function of person
search by image, select Personal features.
1. On the iClient home page, choose Basic Operations > Information Center.
2. Click Recordings.
3. Click the Camera text box and select a camera near the incident location.
4. Set search criteria and click Search.
5. Specify a time segment that covers the incident occurrence time on the timeline of
the camera recording, hold down Ctrl, and click the timeline to view the recording.
6. Hold down and drag on the timeline to select a time segment and click to
view related information.
When viewing a recording, you can pause it and take snapshots, and then obtain vehicle
information from the snapshots. For example, the vehicle license plate number is AS*H2,
the vehicle color is black, the license plate color is blue, and the vehicle brand is Volkswagen.
You can search for vehicles based on the preliminary information to obtain more accurate
vehicle information, which helps you find the target vehicle more accurately.
Step 2 (Optional) To create an alert on a vehicle in the vehicle library, create a vehicle
whitelist/blacklist first. For details, see section 3.2.4.1 "Vehicle Library."
Table 3-27 Parameters on the page for creating a vehicle alert task
Parameter Description
Alert Object The vehicle object that the alert task targets. You can select either
of the following options at a time:
Vehicle: You must enter a license plate (or upload a license
plate image). To create a fuzzy alert, you can use an asterisk (*)
to represent zero or more unknown license plate characters.
The vehicle is automatically added to Temporary Lists under
Vehicle Library.
List: You can select a vehicle blacklist. To support fuzzy alerting,
a fuzzy plate number can be included in the list, with zero or
more unknown license plate characters replaced with an
asterisk (*).
Alert Level Set this parameter based on the importance and urgency level of
the alert task. The severity of alarms generated by an alert task
depends on the importance and urgency of the task. For example,
HCIP-Intelligent Vision V1.0 Experiment Guide Page 133
Parameter Description
if this parameter is set to Critical, the severity of alarms generated
by this alert task is also critical.
Alarm Type When listed detected: When the recognized vehicle matches the
vehicle specified by Alert Object, this type of alarm is
generated.
When non-listed detected: When the recognized vehicle does
not match the vehicle specified by Alert Object, this type of
alarm is generated.
----End
Click to filter alert tasks by Created Since, Alert Level, Alert Domain, and List.
Click a vehicle alert task in the list on the left. The details about the task are
displayed on the right.
Checking the Alert Result on the Intelligent Recognition Page
On the Intelligent Recognition page, you can view the vehicle snapshots and alerts of
specific cameras.
Step 1 On the iClient home page, choose Intelligent Applications > Intelligent Recognition.
Step 2 Double-click a camera in Cameras or drag a camera to the video pane. The live video
from the camera is played.
Step 3 View the face snapshots and alert alarms of the camera, as shown in the following
figure.
Click More > Vehicle Alarms on the right of Snapshot Alarms. On the displayed Alarm
Center page, check historical vehicle alert information.
Choose More > More Vehicles on the right of Snapshot Results. The Information Center
page is displayed, showing historical vehicle snapshots.
----End
Step 1 Click More. The Alarm Center page is displayed, showing historical vehicle alerts, as
shown in Figure 3-52.
Export the vehicle alerts to an Excel file and save the file to the local computer.
To export selected alarms, select alarms and select Export Selected from the drop-
down list box.
To export alarms on the current page, select Export This Page from the Export
Selected drop-down list box.
To export all alarms, select Export All from the Export Selected drop-down list box.
You are advised to use professional video or image editing tools to shield irrelevant persons
in downloaded video or images and meet the HD requirements of the data subject. The
recommended procedure is as follows:
1. Download the required video to the local computer and extract the common video
from the required video.
2. Use a video editing tool to anonymize irrelevant persons' faces and only retain the
HD part of the data subject.
3. Export the anonymized video to meet the data transfer requirements of the data
subject.
Step 2 Click an alarm in the search result. The alarm details are displayed, as shown in
Figure 3-53.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 136
Step 1 On the iClient home page, choose System Management > O&M Center.
Step 2 Choose Service Statistics > Analysis Platform and set Statistical Type to Passing
vehicle statistics.
Step 3 Set Statistical Method to By time, set View mode to Real-time passing vehicle
statistics, and click Search.
When Statistical Method is set to By time, Data Source is automatically set to All and cannot
be modified.
When View Mode is set to Real-time passing vehicle statistics, Queried is from 00:00:00 of the
current day to the current time by default and cannot be modified.
Step 4 Set Statistical Method to By time, set View mode to Historical passing vehicle
statistics, click Year, Month, or Date, or click to set Queried, and click Search.
Step 5 (Optional) Click Export to export the statistics to an Excel file and save the file to the
local computer.
You are advised to use professional video or image editing tools to shield irrelevant persons in
downloaded video or images and meet the HD requirements of the data subject. The
recommended procedure is as follows:
1. Download the required video to the local computer and extract the common video
from the required video.
2. Use a video editing tool to anonymize irrelevant persons' faces and only retain the
HD part of the data subject.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 138
3. Export the anonymized video to meet the data transfer requirements of the data
subject.
Step 6 If Statistical Method is set to By device, you need to select a camera from the Data
Source drop-down list box. You can also select Real-time passing vehicle statistics or
Historical passing vehicle statistics for View Mode. The other operations are similar
to those in 3, 4, and 5 in statistics by time.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 139
4 Domain Management
4.1 Introduction
4.1.1 About This Experiment
A typical domain in an intelligent vision system (IVS) is a physical domain such as
surveillance systems of a campus or a city. Different domains, whether they are upper- and
lower-level domains or external domains, can be connected to each other as required. This
experiment is designed to help students understand complex networking configuration by
showing how to configure the connection to upper- and lower-level domains as well as
external domains.
4.1.2 Objectives
Learn how to configure the connection between upper- and lower-level domains and
verify the implementation result.
Understand how to configure the connection to an external domain and verify the
implement result.
Step 1 Log in to the CSP OM portal of the upper-level domain as the admin user.
Step 2 Choose Application Configuration > Configuration Management > Configuration >
Application Name > Network > External Management Network Plane Configuration.
Step 3 Click Edit, set External Management IP Address, Floating IP Address, Gateway IP
Address, and Subnet Mask for the BMU node, and click Save.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 140
You need to set Floating IP Address only when the BMU is deployed in two-node cluster
mode.
Set External Management IP Address and Floating IP Address to those of the Outer_OM
reserved during network design.
The operation can be performed by only one user at a time.
Changing the IP address is a major change operation. Do not perform other operations before
the change takes effect, which may take 5 to 15 minutes.
----End
Step 1 Log in to the CSP OM portal of the lower-level domain as the admin user.
Step 2 Choose Application Configuration > Configuration Management > Configuration >
Application Name > Network > External Management Network Plane Configuration.
Step 3 Click Edit, set External Management IP Address, Floating IP Address, Gateway IP
Address, and Subnet Mask for the BMU node, and click Save.
You need to set Floating IP Address only when the BMU is deployed in two-node cluster
mode.
Set External Management IP Address and Floating IP Address to those of the Outer_OM
reserved during network design.
The operation can be performed by only one user at a time.
Changing the IP address is a major change operation. Do not perform other operations before
the change takes effect, which may take 5 to 15 minutes.
Parameter Description
Parameter Description
Address gateway IP address of the current network.
Network Port Network port used for network communication. The default value
is eth4 and cannot be changed.
3. Click Add Route. In the dialog box that is displayed, click Yes.
----End
Step 2 Choose Application Configuration > Configuration Management > Configuration >
Application Name > Connection > Surveillance Domain Cascading.
Parameter Description
Parameter Description
Configuration > Configuration Management > Configuration >
Application Name > Two-Node Cluster. Check the external
service IP address if the upper-level domain is V100R019C20 or
the external network address if the upper-level domain is
V100R019C30.
If the upper-level domain is the CloudIVS 3000 or IVS3800 and
the external management network is used for upper- and
lower-level domain connection, enter the external management
IP address of the BMU node in the upper-level domain. If the
BMU is deployed in two-node cluster mode, enter the external
management floating IP address of the BMU node.
To obtain the IP address, log in to the CSP OM portal of the
upper-level domain as the admin user first. For upper-level
domain V100R019C10, choose Application Configuration >
Configuration Management > Configuration > Application
Name > Two-Node Cluster and view the external network IP
address of the BMU node. For upper-level domain
V100R019C20 or later, choose Application Configuration >
Configuration Management > Configuration > Application
Name > Network > External Management Network Plane
Configuration and view the external management IP address or
the floating IP address of the BMU node.
If the upper-level domain is VCN3010 or VCN3020
V100R003C10SPC260, enter the IP address of the master server
in the upper-level domain. If the master server in the upper-
level domain is a VMU two-node cluster, enter the floating IP
address of the two-node cluster.
Step 5 Click Apply to complete the connection between the upper- and lower-level domains.
Verification
If the upper-level domain is the CloudVCN named Domain-0001 and the lower-level
domain name is IVS System, perform the following steps to verify the result:
HCIP-Intelligent Vision V1.0 Experiment Guide Page 143
1. Log in to the OMU portal of the master server in the upper-level domain as the
admin user.
2. Choose System Management > Domain Node Config. If the added lower-level
domain is listed under System Domains, the upper- and lower-level domains are
successfully connected.
On the OMU portal of the master server in the upper-level domain, you can view only the name
of the lower-level domain. To view details about the lower-level domain, log in to its CSP OM
portal.
If the upper-level domain is the CloudIVS 3000 or IVS3800 named Domain-0001 and the
lower-level domain name is IVS System, perform the following steps to verify the result:
3. Log in to the CSP OM portal of the upper-level domain as the admin user.
4. Choose Application Configuration > Configuration Management > Configuration >
Application Name > Connection > Surveillance Domain Cascading.
5. Click Surveillance Domain. If the added lower-level domain is listed under Lower-
Level Domains, the upper- and lower-level domains are successfully connected.
Step 6 If the upper-level domain is the VCN3010 or VCN3020 named Domain-0001 and the
lower-level domain name is IVS System, perform the following steps to verify the
result:
1. Log in to the OMU portal of the master server in the upper-level domain as the
admin user.
2. Choose System Management > Local Domain. If the added lower-level domain is
listed under System Domains, the upper- and lower-level domains are successfully
connected.
On the OMU portal of the master server in the upper-level domain, you can view only the name
of the lower-level domain. To view details about the lower-level domain, log in to its CSP OM
portal.
----End
User Role of the Can view alarms in the lower-level Require Manual
Upper-Level domain. Subscription to Service
Domain Alarms
User Role of the Can view alarms in the lower-level Require Manual
Upper-Level domain. Subscription to Service
Domain Alarms
alarms) of the lower-level domain,
refer to this section to subscribe to
the alarms for the operator.
Step 2 Log in to the iClient of the upper-level domain as the admin user.
Step 3 Choose System Management > User Management > User Maintenance.
Step 4 In User Group List on the left, select the user group to which the upper-level domain
user who wants to subscribe to alarms belongs.
Step 5 On the far right side of the target user row, click and select Alarm Subscription.
Step 6 Perform the following steps to subscribe to alarms in the lower-level domain.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 146
1. Select devices for which you want to subscribe to alarms in the lower-level domain.
You can select devices from Camera, Alarm Source, and External Alarm System.
2. Select By alarm type or By alarm severity.
3. Subscribe to alarms.
− If you select By alarm type, check alarm items as needed.
− If you select By alarm severity, configure alarm severity as needed.
4. Click Save.
----End
Step 4 Under Local Domain Connection Info, enter the local domain code in the text box of
the specific protocol and click Apply.
----End
Step 1 Log in to the CSP OM portal of the local domain as the admin user.
Step 2 Choose Application Configuration > Configuration Management > Configuration >
Application Name > Connection.
Step 3 On the External Domain tab, click New to add an external domain.
Step 4 Set Connection Protocol to T28181-2011 or T28181-2016.
Table 3-4 and Table 3-5 describes these parameters.
External Name of an external You are advised to set this parameter based
Domain Name domain. on the external domain type or usage.
Extended To enable the system Table 3-6 describes the function of each bit.
Configuration to be compatible
with third-party
platforms, set the The bits are numbered from left to right. For
required bit to 1. example, the seventh bit is the seventh bit starting
from the left.
Max. Sessions Maximum number of live video Enter a value ranging from 1 to
viewing channels and video 5000.
playback channels supported by
the external domain.
Character Set Character set used for inter- Select the character set agreed
domain connection. The options by both the local domain and an
are as follows: external domain.
UTF-8 The character sets specified in
GB2312 both domains must be the same.
GBK
Stream Type Media stream packaging protocol. The default value is PS.
Service Type Type of the IVS recording that an To allow an external domain
external domain can search for to search only for PU-based
during IVS recording search and recordings, select Device.
playback. To allow an external domain
to search only for server-
based recordings, select
Server.
To allow an external domain
to search for both PU-based
recordings and server-based
recordings, select All.
Enable NAT Indicates whether to enable NAT. The NAT function is disabled by
When an external domain default. You need to enable NAT
connects to the IVS platform only when the local domain (IVS
through the GB/T 28181-2011 or platform) is on an intranet that
GB/T 28181-2016 protocol, you is on a different network from
need to set this parameter. the external domain.
Bit Description
1 When Service Type is set to All and the INVITE TO header field sent by the
third-party platform is a device code:
If the first bit is set to 1, the IVS platform queries the PU-based recordings
when receiving a recording playback or download request from the third-
party platform.
− If the query result is not empty, the PU-based recordings are played
back or downloaded.
− If the query result is empty, the server-based recordings are played back
or downloaded.
If the first bit is set to 0, the IVS platform directly plays back or downloads
PU-based recordings when receiving a recording playback or download
request from the third-party platform. If no PU-based recording is
available, the playback or download fails.
4 When the IVS platform requests live streams from a third-party platform and
the third-party platform sends an INVITE response that does not contain the
media decoding format:
If this bit is set to 1, the IVS platform plays live video from the third-party
platform in H.265 format.
If this bit is set to 0, the IVS platform plays live video from the third-party
platform in H.264 format.
6 When the IVS successfully registers with the third-party platform using GB/T
28181, the IVS sends device catalog information that contains the PTZType
field to the third-party platform.
If this bit is set to 1 and the Extension Type parameter of the camera has a
value, the PTZType field is set to the type code corresponding to Extension
Type.
If this bit is set to 1 and the Extension Type parameter of the camera does
not have a value, the PTZType field is set to the type code corresponding to
Camera Type.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 155
Bit Description
If this bit is set to 0, the PTZType field is set to the type code corresponding
to Camera Type regardless of whether the Extension Type parameter has a
value.
7 When the IVS successfully registers with the third-party platform using GB/T
28181, the IVS sends device catalog information that contains the ParentID
field to the third-party platform.
For a device that belongs to a specific device group:
− If this bit is set to 1, the ParentID field contains both the IVS platform ID
and device group ID, which are separated by a slash (/). That is, the
value format of the ParentID field is IVS platform ID/Device group ID.
− If this bit is set to 0, the value of the ParentID field is in the format
Device group ID.
If a device is directly subordinate to the IVS platform root directory, the
value of the ParentID field is in the format IVS platform ID, regardless of
the value of the seventh bit.
8 When a third-party platform requests video streams from the IVS platform (or
the IVS platform requests video streams from a third-party platform), and the
camera uses the TCP protocol:
If this bit is set to 1, fields b=RS:0 and b=RR:0 are not included in the SDP
stream transmission message on the IVS platform.
If this bit is set to 0, fields b=RS:0 and b=RR:0 are included in the SDP
stream transmission message on the IVS platform.
9 When the IVS platform requests live streams or recordings from a third-party
platform, both the signaling and the video streams that the third-party
platform returns to the IVS platform contain video encoding format
information:
If this bit is set to 1, the IVS platform plays live video or recordings from
the third-party platform in the video encoding format of these video
streams.
If this bit is set to 0:
If the video encoding format carried in the signaling is H.265, the IVS
platform plays the requested live video or recordings in the H.265 format. If
the video encoding format carried in the signaling is H.264, the live video
or recordings playing will fail.
If the video encoding format carried in the signaling is H.264, the IVS
platform plays the requested live video or recordings in the encoding
format carried in video streams.
10 When the IVS platform requests media streams from a third-party platform:
If this bit is set to 1, the default transmission protocol used to request
media streams from external devices is RTP over TCP Passive.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 156
Bit Description
If this bit is set to 0, the default transmission protocol used to request
media streams from external devices is RTP over UDP.
11 When the IVS platform successfully registers with a third-party platform using
GB/T 28181, the IVS sends device catalog information to the third-party
platform.
If this bit is set to 1, all directory items and device items excluding the
administrative division catalog items must contain the CivilCode field, and
the value of CivilCode is the code of the actual parent catalog item.
If this bit is set to 0, device catalog information is sent based on GB/T
28181.
2–3, Reserved.
12–32
Step 1 (Optional) Enable cloned device sharing. To share cloned cameras in the local
domain, perform the following steps:
A cloned camera can be shared only with an external domain connected through GB/T 28181-
2016. When sharing a cloned camera, you can view backup recordings but not live video.
1. Log in to the CSP OM portal as the admin user.
2. Choose Application Configuration > Configuration Management > Configuration >
Application Name > Unified Configuration > Surveillance Platform.
3. Select the VCNSvcMgrService service.
4. Set ShareShadowDevSupport to true.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 157
Step 5 (Optional) If the devices shared with the external domain still need to be shared with
other external domains, select the devices on the shared device list on the right, click
Share with Other Domains, select other external domains, and click OK.
You can change the connection codes of shared devices in batches only when external domains
are connected using the GB/T 28181-2011 or GB/T 28181-2016 protocol. If external domains are
connected using other protocols, the Import and Export buttons are unavailable.
----End
Step 4 Select the external domain or devices to subscribe to and click Edit in the upper right
corner.
Step 5 In the dialog box that is displayed, set event subscription parameters and click OK.
Table 4-7 describes the parameters.
Parameter Description
Parameter Description
All
Device
Video
Step 6 Click Subscribe in the upper right corner. Inter-domain alarm subscription is
completed.
----End
Step 1 Log in to the CSP OM portal of the master server in domain A (provincial police
department) as the admin user.
Step 2 Choose Application Configuration > Configuration Management > Configuration >
Application Name > Local Domain > Forwarding.
Step 3 Under Node, select nodes for which you want to configure external domain
forwarding and click External Domain Forwarding next to Enable.
----End
Step 1 Log in to the iClient of the local domain as the admin user.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 160
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 161
5 Backup Management
5.1 Introduction
5.1.1 About This Experiment
You can back up live video, historical recordings, or images on the server to the backup
domain as required to improve video data reliability. This section describes how to back up
video and images.
5.1.2 Objectives
Understand how to back up video.
Understand how to back up images.
Live video Scheduled Some cameras monitor key areas, and the
backup backup surveillance video is important. Users can
configure a backup plan to automatically back up
live video within the backup task execution time
to other servers.
Step 4 On the device list on the right, select the camera to be cloned and click Clone.
Verification
Step 1 On the iClient home page, choose System Management > Device Management >
Main Devices.
Step 2 In the device tree on the left, select the target server.
Step 3 Check whether the shadow camera is displayed on the device list of the target server.
----End
Step 4 On the device list on the right, select the camera to be cloned in the external domain
and click Clone.
Verification
Step 1 On the iClient home page, choose System Management > Device Management >
Main Devices.
Step 2 In the device tree on the left, select the target server.
Step 3 Check whether the shadow camera is displayed on the device list of the target server.
----End
Parameter Description
Recording Duration for storing backup recordings on the target server. The
Backup default value is 0, indicating that the system overwrites the earliest
Storage recordings when the storage space is full.
(days) In live network projects, this parameter is usually set to 7 or 30 days.
You can set this parameter based on the actual situation (for
example, disk capacity).
Server Backup Rate for backing up server-based recordings. The system can back up
Download recordings at 1x, 2x, 4x, or 8x the camera bit rate. This parameter is
Rate valid only for historical recordings stored on the backup server. The
live video backup function backs up live video of the current camera.
Therefore, the backup download rate is the transmission bit rate of
the current camera.
The recommended configurations are as follows:
During off-peak hours, for example, at night, the backup rate can
be set to a higher value, for example, 4x or 8x.
During peak hours, for example, at daytime, the backup rate can
be set to a smaller value, for example, 1x or 2x, to reduce the
recording backup bandwidth between the source server and the
target server and impact on the existing services.
PU Backup Rate for backing up PU-based recordings. The system can back up
Download recordings at 1x, 2x, 4x, or 8x the camera bit rate. This parameter is
Rate valid only for historical recordings stored on cameras.
The recommended configurations are as follows:
During off-peak hours, for example, at night, the backup rate can
be set to a higher value, for example, 4x or 8x.
During peak hours, for example, at daytime, the backup rate can
be set to a lower value, for example, 1x or 2x, to reduce the
HCIP-Intelligent Vision V1.0 Experiment Guide Page 167
Parameter Description
recording backup download bandwidth and impact on the existing
services.
To copy the backup parameter settings of the current shadow camera to other shadow cameras,
click Apply to Others.
----End
If backup is interrupted on the target server due to a network fault, live video from
cameras on the source server cannot be backed up during network interruption.
the left mouse button and drag the slider rightward to set a time period of backup
execution.
4. Click Save.
Step 4 (Optional) To copy the backup plan to multiple cameras in batches, click Apply to
Others, select the shadow cameras to which you want to copy the backup plan, and
click OK.
----End
Verification
Step 1 On the iClient home page, choose Basic Operations > Playback.
Step 2 Verify that the time segment of the backup recordings on the target server is the
same as that of the recordings to back up on the source server.
----End
If backup is interrupted on the target server due to a network fault, live video from
cameras on the source server cannot be backed up during network interruption.
Step 3 On the iClient home page, choose Basic Operations > Live.
Step 4 Right-click the camera for which you want to back up the live video and select
Manual Backup.
Step 5 On the camera list that is displayed, select a shadow camera and click OK. The
manual live video backup setting is complete.
----End
HCIP-Intelligent Vision V1.0 Experiment Guide Page 170
Verification
Step 1 On the iClient home page, choose Basic Operations > Playback.
Step 2 Verify that the time segment of the backup recordings on the target server is the
same as that of the recordings to back up on the source server.
----End
Step 1 On the iClient home page, choose System Management > Backup Management >
Manual Recording Backup.
The server recording backup function supports recording backup at 1x, 2x, 4x, or 8x the camera
bit rate. To ensure backup integrity, it is recommended that the recording duration to back up do
not exceed the multiple of the backup execution time segment. For example, if recordings are
backed up at 2x and the backup execution time segment is 30 minutes, the recording duration to
back up cannot exceed 1 hour.
5. Click Save.
Parameter Description
Parameter Description
Execution Time period during which backup tasks are scheduled to happen on
Time the target server.
For example, from 17:00 to 17:30 every day, the target server backs
up historical recordings stored on the source server.
Recording A specific time segment of the recorded video that needs to be backed
Segment up. This parameter is mandatory when Backup Type is set to
Recording.
For example, back up recordings in the time segment from 16:00 to
17:00 every day from the source server to the target server.
Start Date Start date of the historical server-based recordings to back up. This
parameter is mandatory when Backup Type is set to Recording.
For example, back up recordings generated on and after September
22, 2019 from the source server to the target server.
Apply to Copies the backup plan of the current shadow camera to other
Others shadow cameras.
----End
Verification
Step 1 On the iClient home page, choose Basic Operations > Playback.
Step 2 Verify that the time segment of the backup recordings on the target server is the
same as that of the recordings to back up on the source server.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 173
If backup is interrupted due to a network fault when the target server is executing backup, the
target server will continue to back up recordings that are not backed up during network
interruption after the network is recovered. For example, based on the backup plan configured in
3, from 17:00 to 17:30 every day, the target server backs up historical recordings of 16:00 to
17:00 every day from the source server. If the network where the target server resides is faulty at
17:00 on Monday, the backup is interrupted. From 17:00 to 17:30 on the day when the network is
recovered or the next day, the target server continues to back up historical recordings of 16:00 to
17:00 on Monday from the source server.
----End
Parameter Description
Later If this option is selected, you need to set Execution Time as needed. If the
backup bandwidth currently available is insufficient, click Later and wait
until you have enough bandwidth.
8. Click OK.
----End
Verification
Step 1 On the iClient home page, choose Basic Operations > Playback.
Step 2 Verify that the time segment of the backup recordings on the target server is the
same as that of the recordings to back up on the source server.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 176
If backup is interrupted due to a network fault when the target server is executing backup, the
target server will continue to back up recordings that are not backed up during network
interruption after the network is recovered.
----End
The PU recording backup function supports recording backup at 1x, 2x, 4x, or 8x the camera bit
rate. To ensure backup integrity, it is recommended that the recording duration to back up do not
exceed the multiple of the backup execution time segment. For example, if recordings are backed
up at 2x and the backup execution time segment is 30 minutes, the recording duration to back
up cannot exceed 1 hour.
5. Click Save.
Table 5-5 describes the parameters of a PU-based recording backup plan.
Parameter Description
Parameter Description
Execution Time segment for the target server to execute the backup.
Time For example, from 17:00 to 17:30 every day, the target server backs up
PU-based recordings stored on a certain camera on the source server.
Apply to Copies the backup plan of the current shadow camera to other
Others shadow cameras.
----End
Verification
Step 1 On the iClient home page, choose Basic Operations > Playback.
Step 2 Verify that the time segment of the backup recordings on the target server is the
same as that of the recordings to back up on the source server.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 179
If backup is interrupted due to a network fault when the target server is executing backup, the
target server will continue to back up recordings that are not backed up during network
interruption after the network is recovered. For example, based on the backup plan configured in
step 3, from 17:00 to 17:30 every day, the target server backs up historical recordings of 16:00 to
17:00 every day from the camera under the source server. If the network where the target server
resides is faulty at 17:00 on Monday, the backup is interrupted. From 17:00 to 17:30 on the day
when the network is recovered or the next day, the target server continues to back up PU-based
recordings of 16:00 to 17:00 on Monday from the camera on the source server.
----End
Parameter Description
Later If this option is selected, you need to set Execution Time as needed. If the
backup bandwidth currently available is insufficient, click Later and wait
until you have enough bandwidth.
8. Click OK.
----End
Verification
Step 1 On the iClient home page, choose Basic Operations > Playback.
Step 2 Verify that the time segment of the backup recordings on the target server is the
same as that of the recordings to back up on the source server.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 182
If backup is interrupted due to a network fault when the target server is executing backup, the
target server will continue to back up recordings that are not backed up during network
interruption after the network is recovered.
----End
Live image Images captured by checkpoint cameras on the source server are
backup immediately stored on the destination server. The real-time backup
policy is full-process backup.
Types of data to be backed up:
Full image: full images (panorama) captured by checkpoint
cameras.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 183
Historical Images that have been stored on the source server are backed up to
backup the destination server.
Types of data to be backed up:
Full image: full images (panorama) captured by checkpoint
cameras.
Partial image: partial images captured by checkpoint cameras.
All: all captured images and structured data stored on the source
server. Structured data refers to the attribute data such as the
license plate, vehicle color, and vehicle type generated after the
camera analyzes the captured images.
Image Backup Download Duration for storing backup images on the target
Rate server.
To copy the backup parameter settings of the current shadow camera to other shadow cameras,
click Apply to Others.
----End
4. In the Image Backup Period area, set the start date for backing up images and drag
the slider on the timeline to set the backup time segment.
5. Click Save.
Table 5-9 describes the parameters.
Parameter Description
Execution Time Time period during which backup tasks are scheduled to
happen on the target server.
For example, from 17:00 to 17:30 every day, the target server
backs up historical recordings stored on the source server.
Image Backup Period Image backup time segment. Images that are captured by
checkpoint cameras in this time segment will be backed up
from the source server, as shown below. This parameter is
mandatory if Backup mode is set to Historical.
For example, back up checkpoint images in the time segment
from 16:00 to 17:00 every day from the source server to the
target server.
Start Date Start date of the checkpoint images to back up. This parameter
is mandatory if Backup mode is set to Historical.
For example, back up checkpoint images generated on and
after September 22, 2019 from the source server to the target
server.
Apply to Others Copies the backup plan of the current shadow camera to other
shadow cameras.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 186
Step 2 Choose System Management > Backup Management > Third-Party Platform Image
Backup.
Step 3 Select the backup target server and create a third-party platform image backup plan,
as shown in the following figure.
1. Set Backup Source NVR List to the third-party platform whose images need to be
backed up.
2. In the Execution Time area, select Enable plan, set the backup execution frequency to
Daily or Weekly. Move your cursor to the slider under the timeline, press and hold
the left mouse button and drag the slider rightward to set a time period of backup
execution.
3. In the Image Backup Period area, set the start date for backing up images and drag
the slider on the timeline to set the backup time segment.
Parameter Description
Execution Time Time segment for the target server to execute the backup.
For example, the target server backs up images stored on a third-
party platform from 17:00 to 17:30 every day.
Parameter Description
Apply to Others You can click Apply to Others to apply the current third-party
platform backup plan to other third-party platforms.
6 Cloud-Edge Collaboration
6.1 Introduction
6.1.1 About This Experiment
In two-level IVS networking, users can utilize analysis resources of both the upper- and
lower-level IVS platforms to create analysis, search, and alert tasks across IVS platforms,
and subscribe to data on the lower-level IVS platform, implementing resource reuse, task
collaboration, and data sharing. Users can also set up an algorithm management channel
between upper- and lower-level algorithm repositories. Through this channel, the upper-
level algorithm repository can query the algorithm plug-in information of the lower-level
algorithm repository, and the lower-level algorithm repository can download and update
algorithm plug-ins from the upper-level algorithm repository. This enables the unified
management of the network-wide algorithm plug-ins and ensures the consistency of
intelligent analysis data throughout the network. This experiment walks you through
configuring algorithm, task, and resource collaboration to help you have a deeper
understanding of cloud-edge synergy.
6.1.2 Objectives
Understand the concept and configuration method of algorithm collaboration.
Understand task, resource, and data collaboration.
Algorithm collaboration between two IVS platforms is unidirectional. For example, if IVS
platform A is the lower-level algorithm repository and IVS platform B is the upper-level
algorithm repository, users cannot set IVS platform A to the upper-level algorithm
repository and IVS platform B to the lower-level algorithm repository at the same time.
Step 3 Click Algorithm Repository Cascading and set parameters for Upper-Level Algorithm
Repository, as shown in the following figure.
Parameter Description
User Account User account and password for accessing the upper-level algorithm
Password repository.
If the upper-level algorithm repository is IVS3800 V100R019C30, enter
the upper-level algorithm repository account that has the analysis
role.
For security purposes, instead of using the admin account, you are advised to
create an upper-level algorithm repository account dedicated for algorithm
repository cascading.
If a password validity period has been configured for the new account, you
need to regularly change the password to ensure account security. If the
password expires, algorithm repository cascading will fail.
Parameter Description
Configuration > Configuration Management > Configuration >
Application Name > Connection > Surveillance Domain Cascading >
Algorithm Repository Cascading, and view the value of IP Address in
the Local Algorithm Repository area. If NAT has been configured for
the upper-level analysis platform, the IP address is the post-NAT IP
address.
Step 3 Click Algorithm Repository, set the plug-in type to VA or MCS, and view algorithms in
the algorithm repository.
Step 4 Click Download next to an algorithm to download the algorithm from the algorithm
repository.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 192
When the download is complete, the system displays a message indicating that the
download is successful.
Step 5 Click Local Algorithms and set the plug-in type to VA or MCS to check for the
downloaded algorithm plug-in.
If the algorithm plug-in exists on this tab page, the algorithm is successfully downloaded.
----End
Step 3 Click Local Algorithms and select a plug-in type to view the local algorithm list.
Step 4 Click Check Version. In the dialog box that is displayed, click Yes.
The lower-level algorithm repository initiates a request to the upper-level algorithm
repository for checking algorithm version updates in batches.
If a later algorithm version is available, the Update button is displayed in the Operation
column corresponding to the algorithm on the local algorithm list.
Step 5 Click Update next to an algorithm plug-in. The IVS automatically updates the
algorithm plug-in.
When updating an algorithm plug-in, the IVS uninstalls the existing algorithm plug-in
first, and then installs the later version of the plug-in. Before updating an algorithm plug-
in, ensure that no running intelligent analysis task uses this algorithm. Otherwise, the
corresponding intelligent analysis task will be interrupted.
----End
Step 2 Choose Application Configuration > Configuration Management > Configuration >
Application Name > Connection > Surveillance Domain Cascading.
----End
Batch algorithm plug-in download occupies network bandwidth. To reduce the impact of batch
algorithm plug-in download on services, you can set the flow control parameters, including the
maximum download bandwidth and maximum number of algorithm plug-ins that can be
concurrently downloaded, in the upper-level algorithm repository.
The value of Max. Download Bandwidth ranges from 1 to 5000, and the default value is
1000. The value of Max. Concurrent Downloads ranges from 1 to 16, and the default value
is 16.
----End
Step 1 Log in to the iClient of the upper-level domain as the admin user.
Step 2 Choose System Management > Domains > Local Domain.
Step 3 Set upper-level domain parameters. Table 6-2 describes the parameters.
Parameter Description
Local Domain Code The value is generated by the system and cannot
be changed.
Upper-Level Domain Port for Inter- This parameter is left empty and cannot be
Domain Communication changed.
----End
Step 5 On the iClient home page, choose System Management > Domains > Inter-Domain
Accounts.
Step 6 A domain account with Domain Type set to Local Domain is the user account for
domain connection. You can click Change Password to change the password of this
account. The default password is huawei@123.
----End
Parameter Description
Local Domain Code The value is generated by the system and cannot be
changed.
User Name Enter the user name and password of the upper-level
domain for domain connection. For details about how to
Password obtain the user name and password, see section 6.2.2.1.1
"Configuring Upper-Level Domain Information."
Upper-Level Domain IP Enter the external service IP address of the NGINX node in
the upper-level domain.
To obtain the IP address, log in to the CSP OM portal of
the upper-level domain as the admin user, choose
Application Configuration > Configuration Management >
Configuration > Application Name > Two-Node Cluster.
Parameter Description
Communication If NAT is configured for the upper-level domain, enter
the port number translated from port 443.
Require NAT Traversal Yes: If the upper- and lower-level domains are on
different networks, select Yes.
No: If the upper- and lower-level domains are on the
same network, select No.
Step 4 Set the maximum number of inter-domain intelligent analysis task channels.
The maximum number of inter-domain intelligent analysis task channels is the maximum number
of cameras for which intelligent analysis tasks can be created by other domains through invoking
the local domain resources. For example, if the maximum number of inter-domain vehicle
recognition channels is set to 10 by the local domain for the upper-level domain, the upper-level
domain can invoke local domain resources to recognize vehicles from at most 10 cameras.
If a synchronization success message is displayed, the connection between the upper- and
lower-level domains is normal.
----End
Step 1 On the iClient home page, choose Intelligent Applications > Tasks.
Step 2 Click New Task. The New Intelligent Analysis Task page is displayed.
Step 3 Click Cameras and select a camera.
Step 4 Create an intelligent analysis task for live video from the camera. Table 6-3 describes
the parameters.
To set intelligent analysis task parameters for cameras in batches, select multiple cameras
and select Apply to all.
Parameter Description
If you will create an alert task for the camera, the execution domain of the alert
task must be the same as that of the intelligent analysis task.
Parameter Description
If this parameter is set to Structured data/Feature/Image URL, the
structured data, features, and image URLs generated by the
intelligent analysis task are returned to the local domain, and all
data and images in the execution domain are retained.
If this parameter is set to Structured data/Feature/Image, the
structured data, features, and images generated by the intelligent
analysis task are returned to the local domain, and all data and
images in the execution domain are deleted.
Intelligent Select Vehicle recognition and select one or more vehicle recognition
Analysis algorithms. To use the image-based vehicle search function, select
Type Vehicle feature.
Fast Do not select this check box because inter-domain intelligent analysis
Analysis tasks do not support fast analysis.
Advanced ROI parameters: You can specify an ROI. It is recommended that the
Settings ROI avoid areas without vehicles to reduce the false positive rate.
Min. Plate Frame and Max. Plate Frame: Determine the sizes of
license plates to be captured.
You can set Save snapshot. If the snapshot storage function is
enabled, the vehicle images recognized and pushed by intelligent
cameras are stored on the platform server. This parameter is invalid
for common cameras.
Click Finish.
----End
Step 1 On the iClient home page, choose Basic Operations > Information Center.
Step 2 Click Uploads.
Step 3 Click Upload. In the dialog box that is displayed, select a video file and click Open.
The system starts to upload the video file. You can view the uploaded video file on
the Uploaded Video tab page.
----End
Step 1 On the home page of the iClient, choose Basic Operations > Information Center.
Step 2 Click Uploaded Video.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 199
Step 3 Select a video file and click New Analysis Task. Alternatively, you can select multiple
video files, click New Analysis Task, and select Apply to all. Then, the settings of
intelligent analysis task parameters can apply for all the selected video files.
Step 4 Create an intelligent analysis task for the video file. Table 6-4 describes the
parameters.
Parameter Description
If you will create an alert task for the camera, the execution domain of the alert
task must be the same as that of the intelligent analysis task.
Intelligent Select Vehicle recognition and select one or more vehicle recognition
Analysis algorithms. If you select huawei_cmv, Vehicle attributes is selected by
Type default. If you want to use the function of vehicle search by image,
select Vehicle features.
Fast Do not select this check box because inter-domain intelligent analysis
Analysis tasks do not support fast analysis.
Advanced ROI parameters: You can specify an ROI. It is recommended that the
Settings ROI avoid areas without vehicles to reduce the false positive rate.
Min. Plate Frame and Max. Plate Frame: Determine the sizes of
license plates to be captured.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 200
Parameter Description
You can set Save snapshot. If the snapshot storage function is
enabled, the vehicle images recognized and pushed by intelligent
cameras are stored on the platform server. This parameter is invalid
for common cameras.
Step 1 (Optional) View the recordings generated around the incident occurrence time to
obtain preliminary information about the target vehicle.
1. On the iClient home page, choose Basic Operations > Information Center.
2. Click Uploaded Video.
3. Click the Camera text box and select a camera near the incident location.
4. Set recording search criteria and click Search.
5. Specify a time segment that covers the incident occurrence time on the timeline of
the camera recording, hold down Ctrl, and click the timeline to view the recording.
6. Hold down the left mouse button and drag on the timeline to select a time segment
and click to view related information.
When viewing a recording, you can pause it and take snapshots, and then obtain vehicle
information, such as the license plate characters, vehicle color, license plate color, and
vehicle make, from the snapshots. You can search for vehicles based on the preliminary
information to obtain more accurate vehicle information, which helps you find the target
vehicle more accurately.
Step 2 (Optional) To create an alert on a vehicle in the vehicle library, create a vehicle
whitelist/blacklist first. For details, see section 3.2.4.1 "Vehicle Library."
Parameter Description
Alert Object Vehicle that the alert task targets. You can select either of the
following options:
Vehicle: You must enter license plate characters (or upload a
license plate image). To create an alert task based on fuzzy
match, you can use an asterisk (*) to represent unknown
characters. The vehicle is automatically added to Temporary
Lists under Vehicle Library.
List: You can select a vehicle blacklist or whitelist. The system
supports alerting based on fuzzy match. Therefore, the list can
HCIP-Intelligent Vision V1.0 Experiment Guide Page 202
Parameter Description
contain fuzzy license plates [unknown characters are
represented by an asterisk (*)].
Approximate The vehicle or license plate recognition algorithm can provide the
License Plate recognition results of license plates whose similarities rank top 3.
If Approximate License Plate is not selected, only the license
plate whose similarity ranks top 1 triggers the alarm.
If Approximate License Plate is selected, license plates whose
similarities rank top 3 trigger the alarm.
Alert Level Set this parameter based on the importance and urgency level of
the alert task. The severity of alarms generated by an alert task
depends on the importance and urgency of the task. For example,
if this parameter is set to Critical, the severity of alarms generated
by this alert task is also critical.
Alarm Type When listed detected: When the recognized vehicle matches the
vehicle specified by Alert Object, this type of alarm is
generated.
When non-listed detected: When the recognized vehicle does
not match the vehicle specified by Alert Object, this type of
alarm is generated.
Alert Scope You can click the Alert Domain tab and select a checkpoint group
in a lower-level domain when creating an alert task.
Verification
On the iClient home page, choose Intelligent Applications > Vehicle Alerts and view the
status and details of each vehicle alert task, as shown in the following figure.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 203
----End
Parameter Description
Parameter Description
To search for faces, persons, and vehicles in the lower-level domain by the upper-
level domain when algorithms used in the two domains are different, you must
log in to the CSP OM portal, choose Application Configuration > Configuration
Management > Configuration > Application Name > Unified Configuration >
Analysis Platform, select VCMAPIService, and set Inter-domain retrieval is a
filtering algorithm to Yes.
Source Video source of vehicle images. The options are Camera, Video file, and
All.
Step 5 The iClient automatically goes to the snapshot library (which contains vehicle images
extracted by vehicle feature recognition tasks) to search for the target vehicle. The
following figure shows the search results.
----End
Parameter Description
License Plate License plate characters of the vehicle that is searched for. Fuzzy
search is supported, where the question mark (?) represents one
character, and the asterisk (*) is a wildcard representing zero or
multiple characters.
Unknown If you select this parameter, you cannot set License Plate, and the
plate iClient searches for vehicles without specific license plates.
Parameter Description
If Approximate matches is not selected, the iClient only compares
the target license plate with the license plate with the highest
confidence.
Step 4 Click Search. The iClient automatically goes to the snapshot library (which contains
vehicle images captured by cameras or extracted by vehicle/license plate recognition
or pedestrian and vehicle data structuring tasks) to search for the target vehicle. The
following figure shows the search results.
The vehicle image on the right of the page is found in the vehicle library and contains
related vehicle information.
For more accurate search results, you can click More to set more filter criteria.
Step 5 (Optional) To obtain more accurate vehicle information, you can perform secondary
feature recognition on the found images.
Typically, secondary feature recognition applies to scenarios where the vehicle recognition
algorithm of the IVS platform is used to further recognize the vehicle images obtained through
metadata subscription. If the recognized vehicle information is inconsistent, the results obtained
from secondary feature recognition prevail. The analysis result of secondary feature recognition
overwrites the original vehicle metadata.
1. Select a vehicle search result.
2. Click Secondary Feature Recognition.
3. In the Select algorithm dialog box, click the algorithm used for vehicle analysis and
click OK.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 207
4. Choose Intelligent Applications > Tasks to view the analysis progress of secondary
feature recognition.
Step 1 Log in to the iClient of the upper-level domain as the admin user.
Step 2 Choose System Management > Domains > Inter-Domain Data Subscription.
Step 3 Select a lower-level domain, set search criteria, and click Search.
Step 4 Click Subscribe to data.
Step 5 Click Common Subscription or Alarm Subscription.
Type Description
If Push Images Between Multi-level Domains is enabled, images in addition to metadata can be
subscribed to. To enable this function, log in to the CSP OM portal as the admin user, choose
Application Configuration > Configuration Management > Configuration > Application Name >
Unified Configuration > Analysis Platform, set Service to VCMPushDataProcCenterService, and
enable Push Images Between Multi-level Domains.
Step 6 Select a lower-level domain, set search criteria, and click Search.
Step 7 Select a camera in the search result and set Returned Data Type.
Step 8 Click Finish.
----End
Restrictions:
After the IVS1800 is connected to the IVS3800, you can only view live video and play back
recordings from cameras connected to the IVS1800.
The IVS3800 needs to proactively obtain the status of cameras connected to the IVS1800.
Currently, the IVS1800 cannot push camera status.
HCIP-Intelligent Vision V1.0 Experiment Guide Page 209
Parameter Description
Parameter Description
User User name and password for connection through ONVIF. You are
Name/Password advised to create a complex password.
----End
Parameter Description
Device Name Device name displayed on the iClient. You are advised
to enter the installation location or surveillance area of
the device.
Parameter Description
User Make sure that the user name and password are the
Name/Password/Confirm same as those you set in Figure 6.3
Password
Device Login Port Access port of the device, which must be the same as
that on the camera side. You are advised to use the
default port number. If the port number has been
changed on the camera side, set this parameter to the
new port number.
----End