Video surveillance systems for use in security applications - Part 1-2: System requirements – Performance requirements for video transmission

IEC 62676-1-2:2013 introduces general requirements on video transmission. This standard covers the general requirements for video transmissions on performance, security and conformance to basic IP connectivity, based on available, well-known, international standards.

Videoüberwachungsanlagen für Sicherungsanwendungen - Teil 1-2: Systemanforderungen - Allgemeine Anforderungen an die Videoübertragung

Systèmes de vidéosurveillance destinés à être utilisés dans les applications de sécurité - Partie 1-2: Exigences systèmes - Exigences de performances pour la transmission vidéo

La CEI 62676-1-2:2013 décrit les exigences générales pour la vidéotransmission. La présente norme couvre les exigences générales pour les vidéotransmissions relatives à la performance, la sécurité et la conformité à la connectivité IP de base, fondées sur les normes internationales existantes bien connues.

Video nadzorni sistemi za varnostne aplikacije - 1-2. del: Prenos videa - Splošne zahteve (IEC 62676-1-2:2013)

Standard EN-IEC 62676-1-2 uvaja splošne zahteve v zvezi s prenosom videa. Ta standard zajema splošne zahteve za video prenose glede zmogljivosti, varnosti in skladnosti z osnovno povezljivostjo IP na podlagi razpoložljivih in dobro poznanih mednarodnih standardov. Točki 4 in 5 tega standarda določata minimalne zahteve za zmogljivost prenosa videa za varnostne aplikacije v omrežjih IP. Zahteve za časovno načrtovanje, kakovost in razpoložljivost nadzornih aplikacij so stroge ter določene v zadnjem oddelku tega standarda. Podane so smernice o izpolnjevanju teh zahtev za omrežno arhitekturo. Točka 6 in nadaljnje točke tega standarda določajo zahteve za osnovno povezljivost IP naprav za prenos videa, ki se uporabljajo v varnostnih aplikacijah. Če se naprava za prenos videa uporablja za varovanje, veljajo nekatere osnovne zahteve. Uvesti je treba predvsem osnovna načela povezljivosti IP, ki zahtevajo, da je naprava skladna s temeljnimi omrežnimi protokoli. To so lahko zahteve, ki se morda uporabljajo za vse varnostne naprave IP, ne le za video IP. Zato se v drugem koraku določijo zahteve za skladnost z osnovnimi pretočnimi protokoli, ki se v tem standardu uporabljajo za pretakanje videa in nadzor pretoka. Ker varnostne aplikacije zahtevajo visoko razpoložljivost in zanesljivost, morajo biti zajeti splošni načini za prenos dogodkov v zvezi s stanjem in nadzorom kakovosti videa. Ti dogodki so določeni v splošnih zahtevah za načrtovanje dogodkov in upravljanje omrežnih naprav. Pri varnosti sta pravilno vzdrževanje in nastavitev ključnega pomena za delovanje naprave za prenos videa. Določitev lokacije pretočnih naprav in njihovih zmogljivosti je osnovna zahteva, ki je opisana v razdelku »odkrivanje in opis naprav«.

General Information

Status
Published
Publication Date
13-Mar-2014
Withdrawal Date
02-Dec-2016
Technical Committee
CLC/TC 79 - Alarm systems
Drafting Committee
IEC/TC 79 - IEC_TC_79
Current Stage
6060 - Document made available - Publishing
Start Date
14-Mar-2014
Completion Date
14-Mar-2014

Relations

Effective Date
29-Jan-2023
Effective Date
29-Jan-2023
Effective Date
28-Jan-2023
Effective Date
28-Apr-2015

Overview

EN 62676-1-2:2014 (IEC 62676-1-2:2013) specifies general video transmission requirements for video surveillance systems used in security applications. The standard focuses on performance, security and conformance to basic IP connectivity, drawing on established international protocols and RFCs. It provides guidance for reliable streaming, timing, network design and device management to ensure interoperable and robust IP video systems.

Key topics and technical requirements

The standard covers a wide range of technical areas needed for professional IP video surveillance:

  • Performance requirements for streaming video

    • Timing, introduction latency, jitter, throughput and packet loss considerations.
    • Monitoring of interconnections and performance levels for reliable video delivery.
  • Network time and synchronization

    • Real-time clock and accurate time services for transport streams and forensic timelines.
  • IP network design and planning

    • Principles for digital network planning, capacity planning, availability, redundancy and wireless links.
    • Scenarios including small unicast, multicast and hierarchical VSS (video surveillance system) networks.
  • Transport and streaming protocols

    • Use of RTP/RTSP and supported payload formats (e.g., JPEG, H.264 payloads referenced).
    • Requirements for HTTP/JPEG streaming and behavior for unsupported or proprietary payloads.
  • IP features and diagnostics

    • Layer 3 requirements, addressing, ICMP diagnostics, IGMP/MLD for multicast and diagnostic monitoring.
  • Device discovery, control and eventing

    • RTSP usage and minimal method/header expectations, device discovery/description and event management.
  • Network management and monitoring

    • SNMP agent/manager expectations, MIB guidance and trap requirements for VSS events.
  • Security

    • Transport-level security considerations and references to TLS/AES and authentication mechanisms.
  • Standards alignment

    • Normative references include many IETF RFCs (RTP, RTSP, SNTP, DHCP, TLS, IGMP, H.264 payload RFC 3984, etc.) and related IEC/ISO standards.

Practical applications - who uses this standard

SIST EN 62676-1-2 is intended for:

  • System architects and network engineers designing IP video infrastructures.
  • Security system integrators specifying performance and interoperability requirements.
  • Manufacturers and device vendors implementing compliant streaming, management and security features.
  • Procurement specialists and facility/security managers creating technical specifications and acceptance tests.
  • Consultants and auditors evaluating network and transmission performance for surveillance deployments.

Adopting this standard helps ensure interoperability, predictable video quality, resilient network design and consistent device management across multi-vendor IP video systems.

Related standards (select)

  • IEC 62676-1-1 / EN 62676-1-1 - video system requirements
  • IEC 62676-2-1 / EN 62676-2-1 - video transmission protocols
  • IETF RFCs referenced: RTP (RFC 3550), RTSP (RFC 2326), H.264 payload (RFC 3984), SNTP (RFC 2030), TLS series

Keywords: EN 62676-1-2, IEC 62676-1-2, video surveillance standard, video transmission requirements, IP video, RTSP, RTP, multicast, SNMP, network security, CCTV network design.

Standard

EN 62676-1-2:2014

English language
61 pages
Preview
Preview
e-Library read for
1 day

Frequently Asked Questions

EN 62676-1-2:2014 is a standard published by CLC. Its full title is "Video surveillance systems for use in security applications - Part 1-2: System requirements – Performance requirements for video transmission". This standard covers: IEC 62676-1-2:2013 introduces general requirements on video transmission. This standard covers the general requirements for video transmissions on performance, security and conformance to basic IP connectivity, based on available, well-known, international standards.

IEC 62676-1-2:2013 introduces general requirements on video transmission. This standard covers the general requirements for video transmissions on performance, security and conformance to basic IP connectivity, based on available, well-known, international standards.

EN 62676-1-2:2014 is classified under the following ICS (International Classification for Standards) categories: 13.320 - Alarm and warning systems. The ICS classification helps identify the subject area and facilitates finding related standards.

EN 62676-1-2:2014 has the following relationships with other standards: It is inter standard links to EN 50132-5-1:2011/AC:2012, EN 50132-5-2:2011/AC:2012, EN 50132-5-1:2011, EN 62676-1-2:2014/AC:2015. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

You can purchase EN 62676-1-2:2014 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of CLC standards.

Standards Content (Sample)


SLOVENSKI STANDARD
01-maj-2014
Video nadzorni sistemi za varnostne aplikacije - 1-2. del: Prenos videa - Splošne
zahteve (IEC 62676-1-2:2013)
Video surveillance systems for use in security applications - Part 1-2: Video transmission
- General video transmission - requirements
Systèmes de video surveillance appliqués à la sécurité - Part 1-2: Exigences générales
concernant la video transmission
Ta slovenski standard je istoveten z: EN 62676-1-2:2014
ICS:
13.320 Alarmni in opozorilni sistemi Alarm and warning systems
33.160.40 Video sistemi Video systems
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD
EN 62676-1-2
NORME EUROPÉENNE
March 2014
EUROPÄISCHE NORM
ICS 13.320
English version
Video surveillance systems for use in security applications -
Part 1-2: System requirements – Performance requirements for video
transmission
(IEC 62676-1-2:2013)
Systèmes de vidéosurveillance destinés à Videoüberwachungsanlagen für
être utilisés dans les applications de Sicherungsanwendungen -
sécurité - Teil 1-2: Allgemeine Anforderungen an die
Part 1-2: Exigences systèmes - Videoübertragung
Exigences de performances pour la (IEC 62676-1-2:2013)
transmission vidéo
(CEI 62676-1-2:2013)
This European Standard was approved by CENELEC on 2013-12-03. CENELEC members are bound to comply
with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this European Standard
the status of a national standard without any alteration.

Up-to-date lists and bibliographical references concerning such national standards may be obtained on
application to the CEN-CENELEC Management Centre or to any CENELEC member.

This European Standard exists in three official versions (English, French, German). A version in any other
language made by translation under the responsibility of a CENELEC member into its own language and notified
to the CEN-CENELEC Management Centre has the same status as the official versions.

CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus,
the Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany,
Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland,
Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom.

CENELEC
European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung

CEN-CENELEC Management Centre: Avenue Marnix 17, B - 1000 Brussels

© 2014 CENELEC - All rights of exploitation in any form and by any means reserved worldwide for CENELEC members.
Ref. No. EN 62676-1-2:2014 E
Foreword
The text of document 79/433/FDIS, future edition 1 of IEC 62676-1-2, prepared by IEC TC 79 "Alarm and
electronic security systems" was submitted to the IEC-CENELEC parallel vote and approved by
CENELEC as EN 62676-1-2:2014.
The following dates are fixed:
(dop) 2014-09-03
• latest date by which the document has
to be implemented at national level by
publication of an identical national
standard or by endorsement
• latest date by which the national (dow) 2016-12-03
standards conflicting with the

document have to be withdrawn
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CENELEC [and/or CEN] shall not be held responsible for identifying any or all such patent
rights.
Endorsement notice
The text of the International Standard IEC 62676-1-2:2013 was approved by CENELEC as a European
Standard without any modification.
In the official version, for Bibliography, the following notes have to be added for the standards indicated:

IEC 62676-2-3 NOTE Harmonised as EN 62676-2-3.
ISO 19111 NOTE Harmonised as EN ISO 19111.
ISO 19115 NOTE Harmonised as EN ISO 19115.

- 3 - EN 62676-1-2:2014
Annex ZA
(normative)
Normative references to international publications
with their corresponding European publications
The following documents, in whole or in part, are normatively referenced in this document and are
indispensable for its application. For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any amendments) applies.
NOTE  When an international publication has been modified by common modifications, indicated by (mod), the relevant EN/HD
applies.
Publication Year Title EN/HD Year
IEC 61709 - Electric components - Reliability - Reference EN 61709 2011
conditions for failure rates and stress models
for conversion
IEC/TR 62380 - Reliability data handbook - Universal model - -
for reliability prediction of electronics
components, PCBs and equipment

IEC 62676-1-1 - Video surveillance systems for use in security EN 62676-1-1 -
applications -
Part 1-1: Video system requirements

IEC 62676-2-1 - Video surveillance systems for use in security EN 62676-2-1 -
applications -
Part 2-1: Video transmission protocols -
General requirements
ISO/IEC 10646 - Information technology - Universal Coded - -
Character Set (UCS)
ISO/IEC 13818-9 - Information technology - Generic coding of - -
moving pictures and associated audio
information -
Part 9: Extension for real time interface for
system decoders
ISO/IEC 14496-2 - Information Technology – Coding of audio- - -
visual objects -
Part 2: Visual
ISO/IEC 14496-3 - Information technology - Coding of audio- - -
visual objects -
Part 3: Audio
ISO/IEC 14496-10 - Information technology - Coding of audio- - -
visual objects -
Part 10: Advanced Video Coding

ITU-T - Pulse code modulation (PCM) of voice - -
Recommendation frequencies
G.711
ITU-T Rec .726 - General Aspects of Digital Transmission - -
Systems, Terminal Equipment - 40, 32, 24, 16
kbit/s Adaptive Differential Pulse Code
Modulation (ADPCM)
IEEE Std 1413.1 - IEEE Guide for Selecting and Using Reliability - -
Predictions Based on IEEE 1413

IETF RFC 1122 - Requirements for Internet Hosts - - -
Communication Layers
IETF RFC 1157 - Simple Network Management Protocol - -
(SNMP)
IETF RFC 1441 - Introduction to version 2 of the Internet- - -
standard Network Management Framework

IETF RFC 2030 - Simple Network Time Protocol (SNTP) - -
Version 4 for IPv4, IPv6 and OSI

Publication Year Title EN/HD Year
RFC 2069 - Digest Access Authentication - -

IETF RFC 2131 - Dynamic Host Configuration Protocol - -

IETF RFC 2246 - The TLS Protocol Version 1.0 - -

IETF RFC 2326 1998 Real time Streaming protocol (RTSP) - -

IETF RFC 2435 - RTP Payload Format for JPEG-compressed - -
Video
IETF RFC 2453 - Routing Information Protocol - -

IETF RFC 2617 - HTTP Authentication: Basic and Digest - -
Access Authentication
IETF RFC 3016 - RTP Payload Format for MPEG-4 - -
Audio/Visual Streams
IETF RFC 3268 - Advanced Encryption Standard (AES) - -
Ciphersuites for Transport Layer Security
(TLS)
IETF RFC 3315 - Dynamic Host Configuration Protocol for IPv6 - -
(DHCPv6)
IETF RFC 3410 - Introduction and Applicability Statements for - -
Internet Standard Management Framework

IETF RFC 3550 - A Transport Protocol for Real-Time - -
Applications
IETF RFC 3551 - RTP Profile for Audio and Video Conferences - -
with Minimal Control
IETF RFC 3984 - RTP Payload Format for H.264 Video - -

IETF RFC 4346 - The Transport Layer Security (TLS) Protocol - -
Version 1.1
IETF RFC 4541 - IGMP and MLD Snooping Switches - -

IETF RFC 4566 - SDP: Session Description Protocol - -

IETF RFC 4607 - Source-Specific Multicast for IP - -

IETF RFC 4862 - IPv6 Stateless Address Autoconfiguration - -

IEC 62676-1-2 ®
Edition 1.0 2013-10
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Video surveillance systems for use in security applications –

Part 1-2: System requirements – Performance requirements for video

transmission
Systèmes de vidéosurveillance destinés à être utilisés dans les applications de

sécurité –
Partie 1-2: Exigences systèmes – Exigences de performances pour la

transmission vidéo
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
PRICE CODE
INTERNATIONALE
CODE PRIX XA
ICS 13.320 ISBN 978-2-8322-1158-8

– 2 – 62676-1-2 © IEC:2013
CONTENTS
FOREWORD . 5
INTRODUCTION . 7
1 Scope . 8
2 Normative references . 8
3 Terms, definitions and abbreviations . 10
3.1 Terms and definitions . 10
3.2 Abbreviations . 24
4 Performance requirements . 26
4.1 General . 26
4.2 Network time services . 27
4.2.1 General . 27
4.2.2 Real-time clock . 27
4.2.3 Accurate time services for the transport stream . 27
4.3 Video transmission timing requirements . 27
4.3.1 General . 27
4.3.2 Connection time . 27
4.3.3 Connection capabilities . 28
4.4 Performance requirements on streaming video . 28
4.4.1 Introduction latency, jitter, throughput . 28
4.4.2 Requirements on network jitter . 29
4.4.3 Packet loss . 29
4.4.4 Level of performance . 30
4.4.5 Packet jitter . 30
4.4.6 Monitoring of interconnections . 31
5 IP video transmission network design requirements . 31
5.1 General . 31
5.2 Overview . 31
5.3 Digital network planning . 32
5.3.1 General . 32
5.3.2 Critical requirements for IP video streaming performance . 32
5.3.3 Availability . 33
5.4 Additional architecture principles . 34
5.5 Network design . 34
5.5.1 Small unicast network . 34
5.5.2 Small multicast video network . 35
5.5.3 Hierarchical VSS network . 35
5.5.4 Effective video IP network capacity planning . 36
5.5.5 Wireless interconnections . 37
5.6 Replacement and redundancy . 37
5.6.1 Redundant network design . 37
5.6.2 Availability . 38
5.7 Centralized and decentralized network recording and video content analytics . 38
6 General IP requirements . 39
6.1 General . 39
6.2 IP – ISO Layer 3 . 39
6.3 Addressing . 39

62676-1-2 © IEC:2013 – 3 –
6.4 Internet control message protocol (ICMP) . 40
6.4.1 General . 40
6.4.2 Diagnostic requirements . 40
6.5 Diagnostics . 41
6.6 IP multicast . 41
6.6.1 General . 41
6.6.2 Internet group multicast protocol (IGMP) requirements . 41
7 Video streaming requirements . 41
7.1 General . 41
7.2 Transport protocol . 42
7.2.1 General . 42
7.2.2 JPEG over RTP . 42
7.2.3 JPEG over HTTP . 42
7.3 Documentation and specification . 43
7.3.1 General . 43
7.3.2 Non-compliant, proprietary and vendor specific payload formats . 43
7.3.3 Receiving unsupported RTP payload formats. 44
7.4 Streaming of metadata . 44
7.4.1 General . 44
7.4.2 XML documents as payload . 44
7.4.3 General . 44
8 Video stream control requirements . 45
8.1 General . 45
8.2 Usage of RTSP in video transmission devices . 45
8.2.1 General . 45
8.2.2 The use of RTSP with multicast . 45
8.3 RTSP standards track requirements . 46
8.3.1 General . 46
8.3.2 High level IP video streaming and control interfaces . 46
8.3.3 Minimal RTSP method and header implementation . 46
8.3.4 RTSP authentication . 46
9 Device discovery and description requirements . 46
10 Eventing requirements . 47
11 Network device management requirements. 47
11.1 General . 47
11.2 IP video MIB example . 48
11.3 The SNMP agent and manager for video transmission devices . 48
11.4 Performance requirements on the SNMP agent . 49
11.5 VSS SNMP trap requirements for event management . 50
12 Network security requirements . 50
12.1 General . 50
12.2 Transport level security requirements for SG4 transmission . 51
Bibliography . 52

Figure 1 – Network buffer . 29
Figure 2 – Network latency, jitter, loss . 33
Figure 3 – System design . 34

– 4 – 62676-1-2 © IEC:2013
Figure 4 – Small network . 35
Figure 5 – Multicast network . 35
Figure 6 – Hierarchical network. 36
Figure 7 – Redundant network . 38
Figure 8 – MIB structure . 48

Table 1 – Time service accuracy for video transport stream . 27
Table 2 – Interconnections – Timing requirements . 28
Table 3 – Video transmission network requirements . 28
Table 4 – Video transmission network requirements . 28
Table 5 – Performance requirements video streaming and stream display . 30
Table 6 – Video stream network packet jitter . 31
Table 7 – Monitoring of interconnections . 31

62676-1-2 © IEC:2013 – 5 –
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
VIDEO SURVEILLANCE SYSTEMS
FOR USE IN SECURITY APPLICATIONS –

Part 1-2: System requirements –
Performance requirements for video transmission

FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
International Standard IEC 62676-1-2 has been prepared by IEC technical committee 79:
Alarm and electronic security systems.
The text of this standard is based on the following documents:
FDIS Report on voting
79/433/FDIS 79/446/RVD
Full information on the voting for the approval of this standard can be found in the report on
voting indicated in the above table.
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2.
A list of all parts in the IEC 62676, published under the general title Video surveillance
systems for use in security applications, can be found on the IEC website.

– 6 – 62676-1-2 © IEC:2013
The committee has decided that the contents of this publication will remain unchanged until
the stability date indicated on the IEC web site under "http://webstore.iec.ch" in the data
related to the specific publication. At this date, the publication will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates
that it contains colours which are considered to be useful for the correct
understanding of its contents. Users should therefore print this document using a
colour printer.
62676-1-2 © IEC:2013 – 7 –
INTRODUCTION
The IEC Technical Committee 79 in charge of alarm and electronic security systems together
with many governmental organisations, test houses and equipment manufacturers have
defined a common framework for video surveillance transmission in order to achieve
interoperability between products.
The IEC 62676 series of standards on video surveillance system is divided into 4 independent
parts:
Part 1: System requirements
Part 2: Video transmission protocols
Part 3: Analog and digital video interfaces
Part 4: Application guidelines (to be published)
Each part has its own clauses on scope, references, definitions and requirements.
This IEC 62676-1 series consists of 2 subparts, numbered parts 1-1 and 1-2 respectively:
IEC 62676-1-1, System requirements – General
IEC 62676-1-2, System requirements – Performance requirements for video transmission
The second subpart of this IEC 62676-1 series applies to video transmission. The purpose of
the transmission system in a Video Surveillance System (VSS) installation is to provide
reliable transmission of video signals between the different types of VSS equipment in
security, safety and monitoring applications.
Today VSS reside in security networks using IT infrastructure, equipment and connections
within the protected site itself.

– 8 – 62676-1-2 © IEC:2013
VIDEO SURVEILLANCE SYSTEMS
FOR USE IN SECURITY APPLICATIONS –

Part 1-2: System requirements –
Performance requirements for video transmission

1 Scope
This part of IEC 62676 introduces general requirements on video transmission. This standard
covers the general requirements for video transmissions on performance, security and
conformance to basic IP connectivity, based on available, well-known, international standards.
Clauses 4 and 5 of this standard define the minimum performance requirements on video
transmission for security applications in IP networks. In surveillance applications the
requirements on timing, quality and availability are strict and defined in the last section of this
standard. Guidelines for network architecture are given, how these requirements can be
fulfilled.
Clause 6 and the next clauses of this standard define requirements on basic IP connectivity of
video transmission devices to be used in security applications. If a video transmission device
is used in security, certain basic requirements apply. First of all a basic understanding of IP
connectivity needs to be introduced which requests the device to be compliant to fundamental
network protocols. These could be requirements which may be applied to all IP security
devices even beyond IP video. For this reason requirements are introduced in a second step
for compliance to basic streaming protocols, used in this standard for video streaming and
stream control. Since security applications need high availability and reliability, general
means for the transmission of the video status and health check events have to be covered.
These are defined in general requirements on eventing and network device management. In
security proper maintenance and setup is essential for the functioning of the video
transmission device. Locating streaming devices and their capabilities is a basic requirement
and covered in ´device discovery and description´.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and
are indispensable for its application. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any
amendments) applies.
IEC 61709, Electric components – Reliability – Reference conditions for failure rates and
stress models for conversion
IEC/TR 62380, Reliability data handbook – Universal model for reliability prediction of
electronics components, PCBs and equipment
IEC 62676-1-1, Video surveillance systems for use in security applications – Part 1-1: System
requirements – General
IEC 62676-2-1, Video surveillance systems for use in security applications – Part 2-1: Video
transmission protocols – General requirements
ISO/IEC 10646, Information technology – Universal multiple-octet coded character set (UCS)

62676-1-2 © IEC:2013 – 9 –
ISO/IEC 13818-9, Information technology – Generic coding of moving pictures and associated
audio information – Part 9: Extension for real time interface for systems decoders
ISO/IEC 14496-2, Information technology – Coding of audio-visual objects – Part 2: Visual
ISO/IEC 14496-3, Information technology – Coding of audio-visual objects – Part 3: Audio
ISO/IEC 14496-10, Information technology – Coding of audio-visual objects – Part 10:
Advanced Video Coding
ITU-T Rec. G.711, Pulse code modulation (PCM) of voice frequencies
ITU-T Rec. G.726, 40, 32, 24, 16 kbit/s adaptive differential pulse code modulation (ADPCM)
IEEE Std 1413.1, IEEE Guide for selecting and using reliability predictions based on
IEEE 1413
IETF RFC 1122, Requirements for Internet Hosts – communication Layers
IETF RFC 1157, Simple Network Management Protocol
IETF RFC 1441, Introduction to version 2 of the Internet-standard Network Management
Framework
IETF RFC 2030, Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI
RFC 2069, Digest Access Authentication
IETF RFC 2131, Dynamic Host Configuration Protocol
IETF RFC 2246, The TLS Protocol Version 1.0
IETF RFC 2326:1998, Real Time Streaming Protocol (RTSP)
IETF RFC 2435, RTP Payload Format for JPEG-compressed Video
IETF RFC 2453, RIP - Routing Information Protocol
IETF RFC 2617, HTTP Authentication Basic and Digest Access Authentication, June 1999.
IETF RFC 3016, RTP Payload Format for MPEG-4 Audio/Visual Streams.
IETF RFC 3268, Advanced Encryption Standard (AES) Cipher suites for Transport Layer
Security (TLS)
IETF RFC 3315, Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
IETF RFC 3410, Introduction and Applicability Statements for Internet Standard Management
Framework
IETF RFC 3550, RTP A Transport Protocol for Real-Time Applications
IETF RFC 3551, RTP Profile for Audio and Video Conferences with Minimal Control

– 10 – 62676-1-2 © IEC:2013
IETF RFC 3984, RTP Payload Format for H.264 Video.
IETF RFC 4346, The Transport Layer Security (TLS) Protocol Version 1.1
IETF RFC 4541, IGMP and MLD Snooping Switches
IETF RFC 4566, SDP Session Description Protocol
IETF RFC 4607, Source Specific Multicast for IP
IETF RFC 4862, IPv6 Stateless Address Auto configuration
3 Terms, definitions and abbreviations
For the purposes of this document, the following terms, definitions and abbreviations apply.
3.1 Terms and definitions
3.1.1
adaptive jitter buffering
queuing of packets in switched networks exposed to unwanted variations in the
communications signal to ensure the continuous video transmission over a network supported
by the 'Adaptive' ability to adjust the size of the jitter buffer based on the measured jitter in
the network
EXAMPLE: If the jitter increases, the buffer becomes larger and can store more packets; if the jitter decreases, the
buffer becomes smaller and stores fewer packets.
3.1.2
advanced encryption standard
NIST encryption standard, also known as Rijndael, specified as unclassified, publicly-
disclosed, symmetric encryption algorithm with a fixed block size of 128 bits and a key size of
128, 192 or 256 bits according to the Federal Information Processing Standards Publication
3.1.3
American Standard Code for Information Interchange
de-facto world-wide standard for the code numbers used by computers to represent all the
upper and lower-case characters
3.1.4
asymmetric algorithm
algorithm used in the asymmetric cryptography, in which a pair of keys (a private key and a
public key) is used to encrypt and decrypt a message to ensure the privacy of
communications
3.1.5
authentication
process where an operators or systems identity is checked within a network
EXAMPLE: In networks, authentication is commonly done through the use of logon passwords.
3.1.6
authentication server
device used in network access control
Note 1 to entry: It stores the usernames and passwords that identify the clients logging on or it may hold the
algorithms for access. For access to specific network resources, the server may itself store user permissions and

62676-1-2 © IEC:2013 – 11 –
company policies or provide access to directories that contain the information. Protocols such as RADIUS,
Kerberos and TACACS+, and 802.1x are implemented in an authentication server to perform user authentications.
3.1.7
authenticity
integrity and trustworthiness of data or an entity; validity and conformance of the information,
or identity of a user
Note 1 to entry: The authenticity can be secured and verified using cryptographic methods.
3.1.8
authorization
approval, permission, or empowerment for a user or a component to do something
3.1.9
backbone
high-speed line or series of connections that forms a major pathway within a network
3.1.10
backbone layer
larger transmission line that carries data gathered from smaller communication lines that
interconnect with it, e.g. a line or set of lines that local area networks connect to, in order to
span distances efficiently e.g. between buildings
3.1.11
Bit/s
bit per second
unit of measurement of how fast data is transferred from one node to another
3.1.12
bridge
device that is used to connect two networks including passing data packets between them
using the same protocols
3.1.13
client
component that contacts and obtains data from a server
3.1.14
client/server
communication system providing services e.g. video streams, storage, logon access, data
communication management and clients (workstations) subscribing these services
3.1.15
codec
compression-decompression or enCOder/DECoder process
3.1.16
common gateway interface
CGI
standardized method of communication between a client, e.g. web browser, and a server, e.g.
web server
Note 1 to entry: This note applies to the French language only.
3.1.17
compression delay
delay caused by the compression of data

– 12 – 62676-1-2 © IEC:2013
3.1.18
congestion
situation in which the traffic presents on the network exceeds available network throughput/
capacity
3.1.19
core layer
part of the network providing optimal transport between sites or system functionality e.g.
recording
3.1.20
data encryption standard
DES
cryptographic algorithm method developed by the US National Bureau Standards
Note 1 to entry: This note applies to the French language only.
3.1.21
dynamic host configuration protocol
DHCP
protocol by which a network component obtains an IP address (and other network
configuration information) from a server on the local network
Note 1 to entry: This note applies to the French language only.
3.1.22
distribution layer
part of the network providing policy-based connectivity
3.1.23
domain name system
DNS
system that translates Internet domain names into IP addresses
Note 1 to entry: This note applies to the French language only.
3.1.24
dual homing
single device offering two or more network interfaces
3.1.25
dynamic jitter buffer
collecting and storing video data packets for processing them in evenly spaced intervals to
reduce distortions in the display
3.1.26
encryption
type of network security used to encode data so that only the intended destination can access
or decode the information
3.1.27
fail-over
the capability of an application to recover from a failure on an entity by automatically
switching over to a surviving instance, providing no loss of data or continuity, also known as
‘run-time failover’ and often used in connection with
3.1.28
forensics
field of science of applying digital technologies to legal questions arising from criminal
investigations
62676-1-2 © IEC:2013 – 13 –
3.1.29
frame
data structure that collectively represents a transmission stream including headers, data, and
the payload and provides information necessary for the correct delivery of the data
3.1.30
gateway
hardware or software set-up that translates between two dissimilar protocols
3.1.31
H.261
ITU video coding standard originally designed for ISDN lines and data rate with multiples of
64 Kbit/s using real time protocol (RTP)
3.1.32
H.263
ITU standard supporting video compression (coding) for streaming video via RTP based on
and replacing the H.261 codec
3.1.33
H.264
ISO ITU-T MPEG-4 Part 10 standard, also named Advanced Video Coding (AVC) supporting
video compression (coding) from low bit-rate network streaming applications to HD video
applications with near-lossless coding for network-friendly video representation
3.1.34
host
computer on a network that is a repository for services available to other components on the
network
3.1.35
hot-swap
property of controller which allows circuit boards or other devices to be removed and replaced
while the system remains powered up and in operation
3.1.36
Hyper Text Mark-up Language
HTML
coding language used to create Hypertext documents for use on the World Wide Web
Note 1 to entry: This note applies to the French language only.
3.1.37
Hypertext Transfer Protocol
HTTP
connection oriented protocol for transmitting data over a network or protocol for moving hyper
text files across the Internet
Note 1 to entry: This note applies to the French language only.
3.1.38
Hypertext Transfer Protocol Secure
HTTPS
encrypts and authenticates communication between server and clients
Note 1 to entry: This note applies to the French language only.

– 14 – 62676-1-2 © IEC:2013
3.1.39
Internet Control Message Protocol
ICMP
error protocol indicating, for instance, that a requested service is not available or that a host
or router could not be reached
Note 1 to entry: This note applies to the French language only.
3.1.40
identification
ID
a machine-readable character string
3.1.41
IEEE 802.1x
method for authentication and authorization in IEEE-802 networks using an authentication
server e.g. RADIUS server
3.1.42
Institute of electrical and electronics engineers
IEEE
professional association of engineers for the advancement of technology
3.1.43
Internet group management protocol
IGMP
communications protocol used to manage the membership of IP multicast groups
Note 1 to entry: This note applies to the French language only.
3.1.44
Internet protocol
IP
network layer 3 protocol in the OSI model containing addressing and control information to
enable data packets to be routed in a network and primary network layer protocol in the
TCP/IP protocol suite according to IETF RFC 791
Note 1 to entry: This note applies to the French language only.
3.1.45
Internet protocol address
IP address
address of a host computer used in the Internet Protocol
Note 1 to entry: The IP address corresponds to a fully qualified domain name. At present, it consists of 32 bits
and is generally represented by a sequence of four decimal numbers (each in the range from 0 to 255), separated
by dots. The IP address of a computer usually comprises two parts: a part corresponding to the network number of
the network on which this computer is located, and a part identifying the computer within its network. In the new
version IPv6 of the Internet Protocol, the IP address consists of 128 bits.
Note 2 to entry: The Internet protocol is not limited to the Internet, and may be used on other networks.
3.1.46
IP
Internet protocol
main protocol used in conjunction with TCP (Transfer Control Protocol)
SEE: TCP/IP.
62676-1-2 © IEC:2013 – 15 –
3.1.47
Images per second
IPS
measurement or unit for the rate of pictures transmitted or displayed to create a video stream
Note 1 to entry: A rate of 25 IPS (PAL) or 30 IPS (NTSC) is considered to be real-time or full motion video.
3.1.48
Internet Protocol, version 4
IPv4
most widely used version of the Internet Protocol (the "IP" part of TCP/IP)
3.1.49
Internet Protocol Version 6
IPv6
successor to IPv4
Note 1 to entry: Already deployed in some cases and gradually spreading, IPv6 provides a huge number of
available IP Numbers – over a sextillion addresses. IPv6 allows every device on the planet to have its own IP
Number.
3.1.50
jitter
delay variation or continuity the packets arrive at their destination
Note 1 to entry: ´The received flow variation or pumping of stream´.
3.1.51
kilobits per second
kbit/s
unit of data transmission rate
3.1.52
latency
time that elapses between the initiation of a network request for data and the start of the
actual data transfer
3.1.53
layer 2 switch
OSI (Open Systems Architecture) data link layer device responsible for transmitting data
across the physical links in a network
3.1.54
layer 3 device
OSI device that determines network addresses, routes for information transport
EXAMPLE: A router is a layer 3 device; switches can also have layer 3 capability.
3.1.55
local area
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

The standard EN 62676-1-2:2014 provides a comprehensive framework for video surveillance systems utilized in security applications, specifically focusing on the performance requirements for video transmission. It aligns with IEC 62676-1-2:2013 and delineates the essential criteria that ensure effective video transmission within these systems. One of the key strengths of this standard is its emphasis on performance requirements that are critical in maintaining optimal video quality during transmission. By adhering to these requirements, organizations can ensure that their security systems function efficiently, delivering high-resolution video streams that are crucial for surveillance. Additionally, the standard covers aspects of security, addressing concerns related to data integrity and protection during video transmission. This aspect is particularly relevant in today's landscape, where the security of transmitted data is paramount due to increasing cyber threats targeting surveillance systems. Furthermore, EN 62676-1-2:2014 mandates conformance to basic IP connectivity, referencing well-established international standards. This requirement not only facilitates interoperability among various devices and systems but also promotes a standardized approach to implementing video surveillance technology. By ensuring compatibility and conformance with international protocols, users can achieve better integration and reliability in their video surveillance systems. In summary, EN 62676-1-2:2014 serves as an essential guideline for performance requirements in video transmission for security applications, enhancing the effectiveness and security of video surveillance systems. Its relevance is underscored by its comprehensive approach to performance, security, and standardization, making it a crucial resource for professionals in the field.

Die Norm EN 62676-1-2:2014 behandelt die Anforderungen an Videosurveillance-Systeme, die in Sicherheitsanwendungen eingesetzt werden. Sie definiert spezifische Leistungsanforderungen für die Videoübertragung, was für die Implementierung und den Betrieb solcher Systeme von entscheidender Bedeutung ist. Diese Norm ist besonders relevant, weil sie sicherstellt, dass die Videoübertragung sowohl in Bezug auf Leistung als auch Sicherheit hohen Standards entspricht. Ein wesentlicher Aspekt dieser Norm ist die Klarheit der Leistungsanforderungen, die auf bekannten internationalen Standards basieren. Dadurch wird eine Konformität zur grundlegenden IP-Konnektivität gewährleistet, was für die Integration und Interoperabilität von Überwachungssystemen von zentraler Bedeutung ist. Die Norm adressiert nicht nur technische Spezifikationen, sondern auch Sicherheitsaspekte, die für die erfolgreiche Nutzung von Videosurveillance-Systemen entscheidend sind. Die EN 62676-1-2:2014 hebt sich durch ihre umfassende Herangehensweise an die Anforderungen an die Videoübertragung hervor. Sie fördert die Einführung von qualitativ hochwertigen Videosignalübertragungen, was in modernen Sicherheitsanwendungen unabdingbar ist. Die Norm bietet nicht nur eine Grundlage für Hersteller von Überwachungsgeräten, sondern auch für Endanwender, die sicherstellen möchten, dass ihre Systeme leistungsfähig und sicher sind. Zusammenfassend lässt sich sagen, dass die EN 62676-1-2:2014 ein unverzichtbares Dokument für die Entwicklung und Implementierung von Videoüberwachungssystemen im Sicherheitsbereich darstellt, indem sie klare, international anerkannte Anforderungen für die Videoübertragung definiert.

La norme SIST EN 62676-1-2:2014 se concentre sur les systèmes de vidéosurveillance pour les applications de sécurité, spécifiquement en ce qui concerne les exigences de performance pour la transmission vidéo. Son champ d'application est essentiel pour assurer que les systèmes de vidéosurveillance répondent aux attentes modernes en matière de performance et de sécurité. Parmi ses forces, cette norme établit des exigences générales claires pour la transmission vidéo, garantissant que les systèmes soient conformes à des critères de performance rigoureux. Cela implique une attention particulière à la sécurité des transmissions, un aspect crucial dans le contexte de la vidéosurveillance, où la vulnérabilité aux cyberattaques est de plus en plus fréquente. En intégrant les normes internationales bien reconnues, la norme 62676-1-2:2014 assure également que les systèmes de vidéosurveillance peuvent interagir efficacement dans un réseau IP, renforçant ainsi leur utilité dans des infrastructures de sécurité existantes. La pertinence de cette norme réside dans sa capacité à fournir un cadre pour l'évaluation et l'optimisation des systèmes de vidéosurveillance, adaptant ainsi la technologie aux besoins contemporains en matière de sécurité. De plus, en mettant l'accent sur la conformité et la connectivité IP de base, elle facilite l'intégration de nouvelles technologies et innovations dans le domaine de la vidéosurveillance. En résumé, la norme SIST EN 62676-1-2:2014 est indispensable pour toute organisation souhaitant déployer un système de vidéosurveillance de manière efficace et sécurisée, tout en respectant des standards de performance rigoureux. Ses solidités en matière de sécurité, de performance et de conformité en font un référentiel incontournable pour les professionnels du secteur.

SIST EN 62676-1-2:2014は、セキュリティアプリケーションにおけるビデオ監視システムに関する標準の一部として、ビデオ伝送に関する性能要件を定めています。この文書の範囲は、IP接続に関する基本的な要件を満たすためのパフォーマンス、セキュリティ、および準拠性に焦点を当てています。 この標準の強みは、国際的に知られている基準に基づいている点です。これにより、さまざまなシステムの相互運用性が保証され、業界内での信頼性が高まります。また、パフォーマンス要件やセキュリティに関する基準が明確に定義されているため、企業や機関がビデオ伝送品質を評価する際の指針となります。 さらに、EN 62676-1-2:2014は、現代のセキュリティニーズに適応できるよう設計されており、ビデオ監視システムの導入や運用において非常に重要なリソースとなります。この標準は、特にビデオ監視システムの性能管理や監視機器の選定に役立ち、ユーザーのニーズに応じた適切なソリューションを提供するために必要な基盤を築いています。

SIST EN 62676-1-2:2014 표준은 보안 응용 프로그램을 위한 비디오 감시 시스템의 성능 요구 사항을 다루고 있으며, 비디오 전송에 관한 기본 요구 사항을 정의하고 있습니다. 이 표준은 비디오 전송의 성능, 보안 및 기본 IP 연결성 준수를 바탕으로 일반적인 요구 사항을 제시합니다. 이 표준의 주요 강점은 국제적으로 인정받는 잘 알려진 기준을 기반으로 하여 개발되었다는 점입니다. 이는 사용자가 신뢰할 수 있는 비디오 전송 시스템을 설계하고 구현하는 데 필요한 기초를 제공하며, 보안 비디오 감시 솔루션의 안정성과 효과성을 보장합니다. SIST EN 62676-1-2:2014는 비디오 전송의 다양한 측면을 다루기 때문에, 보안 응용 프로그램에 있어 필수적인 가이드라인을 제공합니다. 이러한 기준은 비디오 시스템의 성능을 객관적으로 평가하고, 보안을 강화하는 데 중요한 역할을 합니다. 또한, 이 표준은 기술 발전에 발맞추어 향후 시장의 요구에 부합할 수 있도록 지속적으로 업데이트될 수 있는 가능성을 내포하고 있습니다. 따라서, SIST EN 62676-1-2:2014는 비디오 감시 시스템의 성능 개선을 위한 중요한 기준으로 자리 잡고 있으며, 보안 분야에서의 적용 가능성이 매우 높습니다. 이 표준의 준수는 사용자에게 신뢰할 수 있는 비디오 감시 솔루션을 제공할 수 있는 기반을 마련해 줍니다.