Wireless works for CCTV

CCTV Handbook 2017 Surveillance, Information Security

Wireless networking is nothing new. It’s been used for years in various fields, including the surveillance market, but it hasn’t always had the best reputation. There is also often some misunderstanding about what wireless actually means.

Most people understand wireless as Wi-Fi, the network you set up at home or in the office to make network and Internet access available to anyone. While Wi-Fi certainly has it uses, and may even be perfect for a few cameras in your home, it is not a robust communications medium that companies can rely on for critical surveillance installations of multiple cameras.

Moreover, Wi-Fi has a range of about 100 m, excluding any walls or other obstacles in the way which will reduce the range, which isn’t really enough for most surveillance installations. Of course is can be extended, but the performance does not match what one wants from a critical surveillance infrastructure.

Nick Ehrke.
Nick Ehrke.

The wireless networking we’re talking about in this article is robust, reliable and able to transport multiple high-definition video streams over varying distances. And perhaps most important of all, it is secure. Radwin’s Nick Ehrke says the uptake of wireless networking for surveillance projects has been growing for many years and shows no signs of abating, quite the contrary. Wireless is proving its worth in multiple markets, from city surveillance to residential estates and even mining. In these instances, it is used for voice, video and data transmission.

The benefits of using wireless communications in mission-critical rollouts, according to Ehrke is that, while cables can be cut to disrupt a wired network, wireless is somewhat harder to cut. Apart from that, it’s also much easier to install and presents fewer environmental challenges. It is also more cost-effective.

For long-haul networks, where some people promote fibre over everything else, wireless networks can be installed, in a matter of hours or days without requiring any digging or other time-consuming tasks. In cities where wireless solutions can’t yet deliver the same bandwidth as fibre, these solutions are often used as bridging solutions while fibre is being installed or maintained.

Planning is critical

Riaan Graham from Ruckus Wireless agrees that wireless networking is on a growth path. Ruckus handles wireless communications for offices, campuses, residential estates and so on. However, Graham says the important aspect of a wireless solution is planning.

Whether you are providing Internet access to the residents of an estate or office, or adding CCTV to the same network, planning is the most crucial aspect of the project. Understanding the environment and how to ensure good coverage is available where it’s needed makes all the difference. If you don’t do that, you, as the installer or IT department, end up making many trips to find out why ‘the network is down’ or why specific areas continually seem to give trouble. A properly planned wireless system will not only cover everything it is supposed to over, it will also provide failover should one access point fail or be switched off accidentally.

In addition, when something does go wrong with the network itself, unlike cables which are generally hidden, it’s easy to find where your wireless points are and to determine which one is misbehaving. He also notes that it is harder to cut the cables when there aren’t any.

And on the matter of security, tier-one wireless networks are definitely not the same as the open Wi-Fi networks in your favourite coffee shop.

Security built in

MiRO’s Marco de Ru says users today can rely totally on their wireless networks. He says that most outdoor wireless systems are encrypted, with even mid-range systems using 128-bit encryption and the high-end solutions using up to 256-bits. Some of the higher-end systems even run on proprietary protocols so you can’t even see them unless you have the same equipment that is able to detect the network is there.

As far as reliability and bandwidth is concerned, De Ru says that using TDMA networks divides the radio into timeslots so that each camera (or whatever device) gets the opportunity to communicate with the base station. This switch is sub-second in timing so each camera gets to use all the bandwidth during its ‘turn’. Today these networks are able to support networking at up to 1 Gbps.

Another problem one can come across when using wireless communications is interference from other networks in the vicinity, which can cause problems. Fortunately, there are ways to deal with this, such as Active Frequency Filtering and others. This ensures only the right radios talk to each other and ignore any intrusions.

Ehrke adds that in Radwin installations, only Radwin stations can see each other. There is no SSID or naming convention so if you aren’t a Radwin technology you won’t even know it’s there. Additionally, the communications are encrypted with 256-bit AES encryption, so even if someone does manage to log in somehow, they won’t be able to see anything.

Radwin also offers it new Jet Air wireless communications solution for the residential market. The Jet Air PtMP series includes a base station that delivers 250 Mbps (or up to 750 Mbps) and is built on Radwin’s bi-directional Beamforming technology which has been adopted by tier-1 carriers worldwide. Jet Air enables service providers to deliver bandwidth-demanding services such as TV streaming, gaming and online applications for consumers without having to install cables.

For point-to-point networking, De Ru says Beamforming technology forgoes forming a wireless ‘cloud’ and aims the communications beam at a receiver, which can be kilometres away, depending on the technology chosen. In these scenarios, interference is also eliminated as the transmission only sends and receives from certain registered radios and not to or from anything else. To cater for the growing demand for wireless networking in the surveillance industry, and in other markets, MiRO offers wireless networking products from Radwin, Ligowave and Cambium.

In the case of Ruckus, Graham says the company creates a mesh network in certain environments to boost the reliability and robustness of the network. This means that even if one access point is down or busy, the network automatically reroutes the communications via another route to still get to the intended end point.

He adds that, using specific Ruckus systems, users can get up to 1.7 Gbps. In the 2017 State of the Nation Address (or chaos, depending on your perspective), Ruckus provided communications solutions and made about 270 Mbps available to broadcast the fun and games to the world.

Wireless networking is more than simply and option in the surveillance world, today it is able to handle almost anything surveillance installations can throw at it. However, like any part of a security installation, planning is vital to ensure the network is designed to handle what is thrown at it in a reliable, robust and secure manner. Wireless planning is not any different to planning for camera placements, anyone can do it, but you need someone with the training and experience to do it so that it works as required and is reliable and robust enough to avoid having technicians employed fulltime fixing randomly occurring problems.

For more information:

MiRO: www.miro.co.za,

Radwin: www.radwin.com,

Ruckus: www.ruckuswireless.com

Refer to Hi-Tech Security Business Directory ( www.hsbd.co.za) for further details on these companies.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Claude Mythos wake-up call
Technews Publishing AI & Data Analytics Information Security
AI has crossed a critical cybersecurity threshold and frontier models are accelerating attack lifecycles and will enable attackers to identify and exploit vulnerabilities at scale and speed, through novel methods that were previously the domain of advanced nation-state entities.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Smarter surveillance in a connected world
Securex South Africa Surveillance IoT & Automation
The security sector is moving rapidly towards integrated, intelligence-led environments. Organisations want systems that communicate with each other, deliver meaningful insight, and support operational efficiency without compromising cybersecurity or privacy.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
From surveillance to strategic business infrastructure
Axis Communications SA Surveillance
The Axis Perspectives Report 2026 describes how intelligent IP cameras are evolving beyond traditional surveillance to become an increasingly embedded component of operational infrastructure, supporting security, safety and broader business performance.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.