Wireless works for CCTV

CCTV Handbook 2017 Surveillance, Information Security

Wireless networking is nothing new. It’s been used for years in various fields, including the surveillance market, but it hasn’t always had the best reputation. There is also often some misunderstanding about what wireless actually means.

Most people understand wireless as Wi-Fi, the network you set up at home or in the office to make network and Internet access available to anyone. While Wi-Fi certainly has it uses, and may even be perfect for a few cameras in your home, it is not a robust communications medium that companies can rely on for critical surveillance installations of multiple cameras.

Moreover, Wi-Fi has a range of about 100 m, excluding any walls or other obstacles in the way which will reduce the range, which isn’t really enough for most surveillance installations. Of course is can be extended, but the performance does not match what one wants from a critical surveillance infrastructure.

Nick Ehrke.
Nick Ehrke.

The wireless networking we’re talking about in this article is robust, reliable and able to transport multiple high-definition video streams over varying distances. And perhaps most important of all, it is secure. Radwin’s Nick Ehrke says the uptake of wireless networking for surveillance projects has been growing for many years and shows no signs of abating, quite the contrary. Wireless is proving its worth in multiple markets, from city surveillance to residential estates and even mining. In these instances, it is used for voice, video and data transmission.

The benefits of using wireless communications in mission-critical rollouts, according to Ehrke is that, while cables can be cut to disrupt a wired network, wireless is somewhat harder to cut. Apart from that, it’s also much easier to install and presents fewer environmental challenges. It is also more cost-effective.

For long-haul networks, where some people promote fibre over everything else, wireless networks can be installed, in a matter of hours or days without requiring any digging or other time-consuming tasks. In cities where wireless solutions can’t yet deliver the same bandwidth as fibre, these solutions are often used as bridging solutions while fibre is being installed or maintained.

Planning is critical

Riaan Graham from Ruckus Wireless agrees that wireless networking is on a growth path. Ruckus handles wireless communications for offices, campuses, residential estates and so on. However, Graham says the important aspect of a wireless solution is planning.

Whether you are providing Internet access to the residents of an estate or office, or adding CCTV to the same network, planning is the most crucial aspect of the project. Understanding the environment and how to ensure good coverage is available where it’s needed makes all the difference. If you don’t do that, you, as the installer or IT department, end up making many trips to find out why ‘the network is down’ or why specific areas continually seem to give trouble. A properly planned wireless system will not only cover everything it is supposed to over, it will also provide failover should one access point fail or be switched off accidentally.

In addition, when something does go wrong with the network itself, unlike cables which are generally hidden, it’s easy to find where your wireless points are and to determine which one is misbehaving. He also notes that it is harder to cut the cables when there aren’t any.

And on the matter of security, tier-one wireless networks are definitely not the same as the open Wi-Fi networks in your favourite coffee shop.

Security built in

MiRO’s Marco de Ru says users today can rely totally on their wireless networks. He says that most outdoor wireless systems are encrypted, with even mid-range systems using 128-bit encryption and the high-end solutions using up to 256-bits. Some of the higher-end systems even run on proprietary protocols so you can’t even see them unless you have the same equipment that is able to detect the network is there.

As far as reliability and bandwidth is concerned, De Ru says that using TDMA networks divides the radio into timeslots so that each camera (or whatever device) gets the opportunity to communicate with the base station. This switch is sub-second in timing so each camera gets to use all the bandwidth during its ‘turn’. Today these networks are able to support networking at up to 1 Gbps.

Another problem one can come across when using wireless communications is interference from other networks in the vicinity, which can cause problems. Fortunately, there are ways to deal with this, such as Active Frequency Filtering and others. This ensures only the right radios talk to each other and ignore any intrusions.

Ehrke adds that in Radwin installations, only Radwin stations can see each other. There is no SSID or naming convention so if you aren’t a Radwin technology you won’t even know it’s there. Additionally, the communications are encrypted with 256-bit AES encryption, so even if someone does manage to log in somehow, they won’t be able to see anything.

Radwin also offers it new Jet Air wireless communications solution for the residential market. The Jet Air PtMP series includes a base station that delivers 250 Mbps (or up to 750 Mbps) and is built on Radwin’s bi-directional Beamforming technology which has been adopted by tier-1 carriers worldwide. Jet Air enables service providers to deliver bandwidth-demanding services such as TV streaming, gaming and online applications for consumers without having to install cables.

For point-to-point networking, De Ru says Beamforming technology forgoes forming a wireless ‘cloud’ and aims the communications beam at a receiver, which can be kilometres away, depending on the technology chosen. In these scenarios, interference is also eliminated as the transmission only sends and receives from certain registered radios and not to or from anything else. To cater for the growing demand for wireless networking in the surveillance industry, and in other markets, MiRO offers wireless networking products from Radwin, Ligowave and Cambium.

In the case of Ruckus, Graham says the company creates a mesh network in certain environments to boost the reliability and robustness of the network. This means that even if one access point is down or busy, the network automatically reroutes the communications via another route to still get to the intended end point.

He adds that, using specific Ruckus systems, users can get up to 1.7 Gbps. In the 2017 State of the Nation Address (or chaos, depending on your perspective), Ruckus provided communications solutions and made about 270 Mbps available to broadcast the fun and games to the world.

Wireless networking is more than simply and option in the surveillance world, today it is able to handle almost anything surveillance installations can throw at it. However, like any part of a security installation, planning is vital to ensure the network is designed to handle what is thrown at it in a reliable, robust and secure manner. Wireless planning is not any different to planning for camera placements, anyone can do it, but you need someone with the training and experience to do it so that it works as required and is reliable and robust enough to avoid having technicians employed fulltime fixing randomly occurring problems.

For more information:

MiRO: www.miro.co.za,

Radwin: www.radwin.com,

Ruckus: www.ruckuswireless.com

Refer to Hi-Tech Security Business Directory ( www.hsbd.co.za) for further details on these companies.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...