Building a surveillance network

February 2018 Surveillance

When it comes to setting up a network for a surveillance installation, many of the same considerations that pertain to the IT domain still apply. However, it is generally more important to ensure consistent surveillance network traffic than it is for most other applications, particularly when that network might be relied on in an emergency situation.

Roberto Vizcarra.
Roberto Vizcarra.

According to Eurobyte’s Roberto Vizcarra, there are many factors to consider, “But the most fundamental and often overlooked for me is the need to identify the throughput requirement for your surveillance network, as well as when you break out of your network and go through the public domain (i.e. for remote viewing and alarm notifications). What I mean by throughput is knowing how much data is going to be used by each camera point through the entire network. Not tracking this often results in dropped connections and lagging streams, which are very common problems in IP surveillance setups today.”

Vizcarra offers the following tips for setting up an effective IP surveillance network:

1. Surveillance is critical, so always keep the network (physically or virtually) separate from other business communications. Sharing should never be an option.

2. Ensure your NVR can support the amount of bandwidth usage for the cameras provided (especially if you need to include third-party cameras on the NVR).

3. Map out the traffic flow, i.e., calculate how much bandwidth is flowing where. This will enable you to determine the correct media – e.g. what types of switches, and whether to use network cable or fibre – as well as what kind of Internet upload and downloads speeds you require for remote viewing.

4. If a camera is projecting to multiple NVRs, such as with a failover server or even a viewing station, the bandwidth requirement multiplies by the amount of devices the camera is projecting to. So, for example, one camera projecting a main stream of 2 Mbps of data will have to create 4 Mbps if that single camera is being recorded by two NVRs. To avoid bottlenecks use the multi-casting function on your switch.

5. Most routers (for breaking out the network) have priority or QoS capabilities, which allocates a certain amount of bandwidth (upload or download) to the system. Again, map out how many remote devices and alarm streams will be used (sub-stream data) and allocate the required bandwidth. Many new complexes and even crêches today are offering all their tenants and parents mobile apps to access surveillance viewing without actually catering for the bandwidth requirements, resulting in poor quality streams. This can be avoided.

Going wireless

Wireless technologies are attractive, mainly due to their ease of installation and low cost, but Vizcarra advises against taking this easy way out. “I want to use this opportunity to encourage people to avoid it,” he says. “Wireless should be seen as a last resort and only for those really difficult places to reach. Good wireless solutions should be done within your own property; since urban areas today are saturated with wireless transmissions across all frequencies, resulting in poor and dropped connections. Avoiding public spaces is a must.”

If wireless communication is deployed, clear line of sight is essential, since wireless transmissions cannot transmit through trees or walls. “There cannot be anything between the antennas,” explains Vizcarra. “Bridging through multiple antennas results in drastically reduced throughput and should be avoided too. All antennas and receivers have specified angles, distance, throughput and frequencies, so make sure their requirements are well met.”

Due to their ubiquity, cellular networks are often seen as a good option in certain applications, but it is important to bear in mind their limitations. “Cellular networks are used for surveillance purposes, but generally not for recording because of the cost. Rather, they are typically used for live viewing from a central location or via a mobile device. We often use cellular technology to transmit a live feed in mobile surveillance systems used in vehicles/trucks or even body worn cameras. These live feeds enable us to know what is happening on the ground (especially in emergencies), but the actual recording is generally done on the device itself.”

For enterprise applications, to keep data costs down when transmitting via devices through a cellular network, Vizcarra advises users to ensure the control room viewing ­station, i.e., the software where the video feed is being live streamed from, has a blank screen monitoring option so it only livestreams or plays back the video recordings on request.

Summary

In summary, Vizcarra believes the key factors for creating a reliable surveillance network are understanding where your vulnerabilities are, and knowing exactly what you want to achieve from having the system. After that, it is important to scrutinise what the system is capable of. “An example of this is knowing the distance over which each camera will be able to recognise a face – this is often unknown by the end-user until he has the system. You should also know how much recording time you need, as well as other aspects important to your specific use case.

“Lastly, it is important to understand that surveillance systems do not deter criminals from entering premises that have poor security protocols. Pay attention to how you manage visitor entry and exit points, and how security responds when a crime occurs is very important,” he concludes.

For more information contact Eurobyte, +27 (0)11 234 0142, roberto@eurobyte.co.za, www.eurobyte.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Smarter surveillance in a connected world
Securex South Africa Surveillance IoT & Automation
The security sector is moving rapidly towards integrated, intelligence-led environments. Organisations want systems that communicate with each other, deliver meaningful insight, and support operational efficiency without compromising cybersecurity or privacy.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
From surveillance to strategic business infrastructure
Axis Communications SA Surveillance
The Axis Perspectives Report 2026 describes how intelligent IP cameras are evolving beyond traditional surveillance to become an increasingly embedded component of operational infrastructure, supporting security, safety and broader business performance.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
Large-scale AI boosts manufacturing efficiency
Hikvision South Africa Surveillance Industrial (Industry) AI & Data Analytics
Video systems, once used mainly for security, are rapidly becoming one of the most valuable sources of operational data in factories and industrial parks, accelerating smart manufacturing process.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.