Designing a modern security network

Issue 6 2020 IT infrastructure

Infrastructure such as cabling (copper and fibre) will last between 10 and 20 years and is the lifeblood of the network and as such, must be able to handle both the current and future bandwidth demands. In security networks these include the likes of Ultra HD video and voice transmission, database access or backup, and storage that may only be replaced every second or third network refresh cycle.

In earlier years, many installations shied away from using wireless as a transmission medium due to latency and reliability issues. The modern wireless systems now offer secure, multi frequency, low latency and transmission speeds in excess of 300 Mbps and at distances up to 10 km, thus making them ideal for long distance transmission where cabling is not possible or may prove too costly. Wireless deployments should always be subjected to a detailed site survey to confirm line of site, operating distances and potential sources of interference.

Bandwidth and throughput requirements are key metrics for switching and routing design in order to match up the hardware with the infrastructure, thus avoiding bottlenecks and ensuring the shortest route possible for the data packets. The best designs will always include a 25% headroom for future growth and peak network demand.

Risk assessments have indicated an increase in physical and cybersecurity attacks which has forced organisations to re-evaluate their risk profiles and prioritise spending on mission critical hardware. This, along with the advancement of IoT, AI and the need to automate manual tasks such as screening, monitoring, vetting and granting access, has led to the evaluation of current systems and processes.

It is now more critical than ever that all physical and digital entry points into an organisation are assessed for vulnerabilities such as weak and default passwords, unsupported and unpatched hardware and software, unsecured infrastructure such as network cabinets and wall jacks. Personal devices and remote access should form part of this assessment.

Replacement need not necessarily be a wholesale ‘rip and replace’ exercise, but rather a phased approach based on the risks evaluated and identified. Options include upgrades and security patches, reassigning existing equipment where bandwidth and throughput requirements remain low, migrating to a cloud-based solution and equipment rental as an operational budget.

Finally, ensure that you build redundancy and load balancing into your security network by splitting cameras and access control over multiple recorders, controllers and switches so that in the event of failure or damage you still have your key monitoring areas and perimeters covered.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

TRENDnet introduces ONVIF conformant Smart Surveillance switches
Issue 7 2020, TRENDnet , IT infrastructure
Gigabit PoE+ Smart Surveillance switches support PoE self-healing and integrated camera management features, and are ONVIF Profile Q conformant.

Read more...
COVID-19 will foster much needed collaboration in the future of work
Issue 7 2020 , IT infrastructure
Business leaders are starting to discuss the lessons learnt from these challenging times and how they can be used to shape the future world of work.

Read more...
Fake cloud vs true cloud
Issue 7 2020 , IT infrastructure
Many organisations have invested in fake cloud solutions only to find out that the benefits they expected have not materialised.

Read more...
Fibre the key to more effective community security
CCTV Handbook 2020 , IT infrastructure
Bringing reliable, affordable, high-speed fibre connectivity to a community signifies opportunities for upliftment, safety and security.

Read more...
A cloud in your data centre
CCTV Handbook 2020 , IT infrastructure
Fully managed and configurable racks of AWS-designed hardware let customers in South Africa run their workloads on-premises and seamlessly connect with the broad array of AWS services in the cloud.

Read more...
AI and self-healing
Issue 7 2020 , IT infrastructure
Storage infrastructure that has in-built capacity as well as the ability to self-heal and self-tune is critical.

Read more...
Understanding the need to secure your SD-WAN platform
Issue 7 2020 , IT infrastructure
SD-WAN functions need to be virtualised to keep up with evolving security threats and to control the cost of updating and upgrading security elements.

Read more...
Software-defined everything
Issue 7 2020 , IT infrastructure
BCX prepares businesses for the future with the launch of its Multi Domain Software Defined Network, applying intent-based networking throughout the enterprise.

Read more...
Beating the recessionary blues
Issue 6 2020 , IT infrastructure
Most companies are looking to eke out savings by sweating technology assets a bit longer and by trimming operating costs.

Read more...
Home-grown, cloud-based safety and security solutions
Residential Estate Security Handbook 2020 , IT infrastructure, Integrated Solutions
BeSecure has taken security and communications technologies and turned them into what is best described as care and safety solutions for the estate community in South Africa.

Read more...