Wireless technology comes into its own

October 2015 Infrastructure, Integrated Solutions

Luckily the days of trying to transmit video over analogue wireless transmitters are gone. With the advent of modern IP surveillance solutions, data is transmitted over an IP network, irrespective of whether it is hardwired or wireless. Internet Protocol (IP) is designed to be ubiquitous, scalable and universally compatible.

It may be due to the many problems experienced with these early analogue wireless transmitters that so many installers hesitate to become involved with wireless solutions for video surveillance. It is time to relook at wireless networks as a viable solution for your IP surveillance and access control solutions.

There are many benefits to implementing a wireless IP network for video surveillance. This typically includes quick and easy deployment, since one does not need to find cable routes, trench and dig, then rehabilitate. This makes wireless an ideal option even for large-scale temporary applications such as at outdoor events like music festivals. Wireless systems are therefore often more cost effective than wired solutions in terms of eliminating the costs for civil engineering, trenching and rehabilitation.

Flexibility is another added benefit of deploying a wireless system. It is very simple to add new cameras or change the position of existing cameras when using wireless technology.

Bertus van Jaarsveld, CEO of MiRO.
Bertus van Jaarsveld, CEO of MiRO.

Simpler maintenance

Wireless systems are easier to maintain and repair. In hardwired installations, it is incredibly difficult to pinpoint a cable fault, often requiring many hours of hunting and regular re-cabling to resolve the problem. In wireless networks, faults are easily located and in most cases can be addressed through off-site system maintenance or reconfiguration.

All wired installations have limitations on the length and positioning of cables. With wireless deployment, one can easily connect to cameras in remote positions, many kilometres away from the base, or even deploy links in environments where cables are not a feasible option, such as mining or marine applications. The other issue with hardwired solutions is that once money has been invested in a cabling solution, the cabling is fixed and cannot be reused. Therefore, when a company relocates, cabling is almost always left in place or destroyed, whereas wireless systems are easily relocated and recommissioned.

Speed and reliability

In addition to all the outlined benefits, recent developments in wireless technology have made it a much more attractive proposition. New higher-speed standards such as 802.11ac provide cost-effective links by delivering Gigabit speeds rivalling the speed of the fastest hardwired networks. In addition, new proprietary protocols on point-to-multipoint systems allow for guaranteed throughput to wireless clients, ensuring uninterrupted video streams from all cameras.

Enhanced security features provide totally secure wireless links that cannot be compromised and carrier grade features in affordable equipment provide 99.999% availability and reliability.

However, one needs to be realistic. If there are no compelling reasons to migrate existing wired solutions to wireless; the funds may be better utilised in other areas. However, where entirely new IP networks are implemented, or additions/expansions are undertaken to existing IP networks, wireless solutions provide persuasive benefits to form at least part, if not the entire solution.

Integration and upscaling

There are no concerns or issues when integrating IP solutions from various vendors. As a cautionary note, this is simple on an IP communications level, but things become a bit more complicated in areas such as Radio Frequency (RF) and Video Management Systems (VMS). Not all radio systems are compatible on an RF level; most Wi-Fi systems will be able to talk to each other at their most basic level, excluding any proprietary enhancements implemented by the specific manufacturer.

Other wireless systems use proprietary protocols that deliver huge benefits to users.

Scalability is one of the major benefits of a wireless network. When you need to service a new area, deploy a new point-to-point link or a point-to-multipoint system, you simply install another subscriber station. The only concern here is bandwidth availability across the system, which needs to be addressed through systems planning and design.

Ensuring wireless security

Almost every IP security project can benefit from a wireless solution, from a portion of the network through to entire deployment. Traditional issues such as deploying a camera or access control reader at an entry gate is handled quickly, efficiently and cost effectively by instituting a simple wireless link from the building to the gate, without the need for trenching.

Wireless security has evolved to be a 100% secure solution. All modern wireless products provide security features to make the link inaccessible to outside parties. Security features vary from simple, industry-standard WPA2 security to advanced solutions such as Radwin LinkLock and radius authentication.

Almost all modern IP surveillance systems are connected to the Internet for remote monitoring applications, or at the very least they will connect to the corporate network which is somehow connected to the Internet. If a malicious hacker wants to access your security system, it will be easier to access the system remotely via the Internet than it will be to gain access to the RF level security of a wireless implementation. The largest threat to wireless data security is lack of knowledge or disregard for the risk of unsecured wireless links.

For more information contact MiRO Distribution, 086 123 MIRO, riandi@miro.co.za, www.miro.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Understanding shared responsibility
Infrastructure
Data management is increasingly coming under the governance spotlight, yet a significant vulnerability often goes unnoticed. Many businesses operating on Microsoft 365 assume their data is comprehensively backed up.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.