Building a surveillance network

February 2018 Surveillance

When it comes to setting up a network for a surveillance installation, many of the same considerations that pertain to the IT domain still apply. However, it is generally more important to ensure consistent surveillance network traffic than it is for most other applications, particularly when that network might be relied on in an emergency situation.

Roberto Vizcarra.
Roberto Vizcarra.

According to Eurobyte’s Roberto Vizcarra, there are many factors to consider, “But the most fundamental and often overlooked for me is the need to identify the throughput requirement for your surveillance network, as well as when you break out of your network and go through the public domain (i.e. for remote viewing and alarm notifications). What I mean by throughput is knowing how much data is going to be used by each camera point through the entire network. Not tracking this often results in dropped connections and lagging streams, which are very common problems in IP surveillance setups today.”

Vizcarra offers the following tips for setting up an effective IP surveillance network:

1. Surveillance is critical, so always keep the network (physically or virtually) separate from other business communications. Sharing should never be an option.

2. Ensure your NVR can support the amount of bandwidth usage for the cameras provided (especially if you need to include third-party cameras on the NVR).

3. Map out the traffic flow, i.e., calculate how much bandwidth is flowing where. This will enable you to determine the correct media – e.g. what types of switches, and whether to use network cable or fibre – as well as what kind of Internet upload and downloads speeds you require for remote viewing.

4. If a camera is projecting to multiple NVRs, such as with a failover server or even a viewing station, the bandwidth requirement multiplies by the amount of devices the camera is projecting to. So, for example, one camera projecting a main stream of 2 Mbps of data will have to create 4 Mbps if that single camera is being recorded by two NVRs. To avoid bottlenecks use the multi-casting function on your switch.

5. Most routers (for breaking out the network) have priority or QoS capabilities, which allocates a certain amount of bandwidth (upload or download) to the system. Again, map out how many remote devices and alarm streams will be used (sub-stream data) and allocate the required bandwidth. Many new complexes and even crêches today are offering all their tenants and parents mobile apps to access surveillance viewing without actually catering for the bandwidth requirements, resulting in poor quality streams. This can be avoided.

Going wireless

Wireless technologies are attractive, mainly due to their ease of installation and low cost, but Vizcarra advises against taking this easy way out. “I want to use this opportunity to encourage people to avoid it,” he says. “Wireless should be seen as a last resort and only for those really difficult places to reach. Good wireless solutions should be done within your own property; since urban areas today are saturated with wireless transmissions across all frequencies, resulting in poor and dropped connections. Avoiding public spaces is a must.”

If wireless communication is deployed, clear line of sight is essential, since wireless transmissions cannot transmit through trees or walls. “There cannot be anything between the antennas,” explains Vizcarra. “Bridging through multiple antennas results in drastically reduced throughput and should be avoided too. All antennas and receivers have specified angles, distance, throughput and frequencies, so make sure their requirements are well met.”

Due to their ubiquity, cellular networks are often seen as a good option in certain applications, but it is important to bear in mind their limitations. “Cellular networks are used for surveillance purposes, but generally not for recording because of the cost. Rather, they are typically used for live viewing from a central location or via a mobile device. We often use cellular technology to transmit a live feed in mobile surveillance systems used in vehicles/trucks or even body worn cameras. These live feeds enable us to know what is happening on the ground (especially in emergencies), but the actual recording is generally done on the device itself.”

For enterprise applications, to keep data costs down when transmitting via devices through a cellular network, Vizcarra advises users to ensure the control room viewing ­station, i.e., the software where the video feed is being live streamed from, has a blank screen monitoring option so it only livestreams or plays back the video recordings on request.

Summary

In summary, Vizcarra believes the key factors for creating a reliable surveillance network are understanding where your vulnerabilities are, and knowing exactly what you want to achieve from having the system. After that, it is important to scrutinise what the system is capable of. “An example of this is knowing the distance over which each camera will be able to recognise a face – this is often unknown by the end-user until he has the system. You should also know how much recording time you need, as well as other aspects important to your specific use case.

“Lastly, it is important to understand that surveillance systems do not deter criminals from entering premises that have poor security protocols. Pay attention to how you manage visitor entry and exit points, and how security responds when a crime occurs is very important,” he concludes.

For more information contact Eurobyte, +27 (0)11 234 0142, roberto@eurobyte.co.za, www.eurobyte.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.