Wireless works for CCTV

CCTV Handbook 2017 Surveillance, Information Security

Wireless networking is nothing new. It’s been used for years in various fields, including the surveillance market, but it hasn’t always had the best reputation. There is also often some misunderstanding about what wireless actually means.

Most people understand wireless as Wi-Fi, the network you set up at home or in the office to make network and Internet access available to anyone. While Wi-Fi certainly has it uses, and may even be perfect for a few cameras in your home, it is not a robust communications medium that companies can rely on for critical surveillance installations of multiple cameras.

Moreover, Wi-Fi has a range of about 100 m, excluding any walls or other obstacles in the way which will reduce the range, which isn’t really enough for most surveillance installations. Of course is can be extended, but the performance does not match what one wants from a critical surveillance infrastructure.

Nick Ehrke.
Nick Ehrke.

The wireless networking we’re talking about in this article is robust, reliable and able to transport multiple high-definition video streams over varying distances. And perhaps most important of all, it is secure. Radwin’s Nick Ehrke says the uptake of wireless networking for surveillance projects has been growing for many years and shows no signs of abating, quite the contrary. Wireless is proving its worth in multiple markets, from city surveillance to residential estates and even mining. In these instances, it is used for voice, video and data transmission.

The benefits of using wireless communications in mission-critical rollouts, according to Ehrke is that, while cables can be cut to disrupt a wired network, wireless is somewhat harder to cut. Apart from that, it’s also much easier to install and presents fewer environmental challenges. It is also more cost-effective.

For long-haul networks, where some people promote fibre over everything else, wireless networks can be installed, in a matter of hours or days without requiring any digging or other time-consuming tasks. In cities where wireless solutions can’t yet deliver the same bandwidth as fibre, these solutions are often used as bridging solutions while fibre is being installed or maintained.

Planning is critical

Riaan Graham from Ruckus Wireless agrees that wireless networking is on a growth path. Ruckus handles wireless communications for offices, campuses, residential estates and so on. However, Graham says the important aspect of a wireless solution is planning.

Whether you are providing Internet access to the residents of an estate or office, or adding CCTV to the same network, planning is the most crucial aspect of the project. Understanding the environment and how to ensure good coverage is available where it’s needed makes all the difference. If you don’t do that, you, as the installer or IT department, end up making many trips to find out why ‘the network is down’ or why specific areas continually seem to give trouble. A properly planned wireless system will not only cover everything it is supposed to over, it will also provide failover should one access point fail or be switched off accidentally.

In addition, when something does go wrong with the network itself, unlike cables which are generally hidden, it’s easy to find where your wireless points are and to determine which one is misbehaving. He also notes that it is harder to cut the cables when there aren’t any.

And on the matter of security, tier-one wireless networks are definitely not the same as the open Wi-Fi networks in your favourite coffee shop.

Security built in

MiRO’s Marco de Ru says users today can rely totally on their wireless networks. He says that most outdoor wireless systems are encrypted, with even mid-range systems using 128-bit encryption and the high-end solutions using up to 256-bits. Some of the higher-end systems even run on proprietary protocols so you can’t even see them unless you have the same equipment that is able to detect the network is there.

As far as reliability and bandwidth is concerned, De Ru says that using TDMA networks divides the radio into timeslots so that each camera (or whatever device) gets the opportunity to communicate with the base station. This switch is sub-second in timing so each camera gets to use all the bandwidth during its ‘turn’. Today these networks are able to support networking at up to 1 Gbps.

Another problem one can come across when using wireless communications is interference from other networks in the vicinity, which can cause problems. Fortunately, there are ways to deal with this, such as Active Frequency Filtering and others. This ensures only the right radios talk to each other and ignore any intrusions.

Ehrke adds that in Radwin installations, only Radwin stations can see each other. There is no SSID or naming convention so if you aren’t a Radwin technology you won’t even know it’s there. Additionally, the communications are encrypted with 256-bit AES encryption, so even if someone does manage to log in somehow, they won’t be able to see anything.

Radwin also offers it new Jet Air wireless communications solution for the residential market. The Jet Air PtMP series includes a base station that delivers 250 Mbps (or up to 750 Mbps) and is built on Radwin’s bi-directional Beamforming technology which has been adopted by tier-1 carriers worldwide. Jet Air enables service providers to deliver bandwidth-demanding services such as TV streaming, gaming and online applications for consumers without having to install cables.

For point-to-point networking, De Ru says Beamforming technology forgoes forming a wireless ‘cloud’ and aims the communications beam at a receiver, which can be kilometres away, depending on the technology chosen. In these scenarios, interference is also eliminated as the transmission only sends and receives from certain registered radios and not to or from anything else. To cater for the growing demand for wireless networking in the surveillance industry, and in other markets, MiRO offers wireless networking products from Radwin, Ligowave and Cambium.

In the case of Ruckus, Graham says the company creates a mesh network in certain environments to boost the reliability and robustness of the network. This means that even if one access point is down or busy, the network automatically reroutes the communications via another route to still get to the intended end point.

He adds that, using specific Ruckus systems, users can get up to 1.7 Gbps. In the 2017 State of the Nation Address (or chaos, depending on your perspective), Ruckus provided communications solutions and made about 270 Mbps available to broadcast the fun and games to the world.

Wireless networking is more than simply and option in the surveillance world, today it is able to handle almost anything surveillance installations can throw at it. However, like any part of a security installation, planning is vital to ensure the network is designed to handle what is thrown at it in a reliable, robust and secure manner. Wireless planning is not any different to planning for camera placements, anyone can do it, but you need someone with the training and experience to do it so that it works as required and is reliable and robust enough to avoid having technicians employed fulltime fixing randomly occurring problems.

For more information:

MiRO: www.miro.co.za,

Radwin: www.radwin.com,

Ruckus: www.ruckuswireless.com

Refer to Hi-Tech Security Business Directory ( www.hsbd.co.za) for further details on these companies.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
The AI goldrush has a credibility problem
Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.