Wireless works for CCTV

CCTV Handbook 2017 Surveillance, Information Security

Wireless networking is nothing new. It’s been used for years in various fields, including the surveillance market, but it hasn’t always had the best reputation. There is also often some misunderstanding about what wireless actually means.

Most people understand wireless as Wi-Fi, the network you set up at home or in the office to make network and Internet access available to anyone. While Wi-Fi certainly has it uses, and may even be perfect for a few cameras in your home, it is not a robust communications medium that companies can rely on for critical surveillance installations of multiple cameras.

Moreover, Wi-Fi has a range of about 100 m, excluding any walls or other obstacles in the way which will reduce the range, which isn’t really enough for most surveillance installations. Of course is can be extended, but the performance does not match what one wants from a critical surveillance infrastructure.

Nick Ehrke.
Nick Ehrke.

The wireless networking we’re talking about in this article is robust, reliable and able to transport multiple high-definition video streams over varying distances. And perhaps most important of all, it is secure. Radwin’s Nick Ehrke says the uptake of wireless networking for surveillance projects has been growing for many years and shows no signs of abating, quite the contrary. Wireless is proving its worth in multiple markets, from city surveillance to residential estates and even mining. In these instances, it is used for voice, video and data transmission.

The benefits of using wireless communications in mission-critical rollouts, according to Ehrke is that, while cables can be cut to disrupt a wired network, wireless is somewhat harder to cut. Apart from that, it’s also much easier to install and presents fewer environmental challenges. It is also more cost-effective.

For long-haul networks, where some people promote fibre over everything else, wireless networks can be installed, in a matter of hours or days without requiring any digging or other time-consuming tasks. In cities where wireless solutions can’t yet deliver the same bandwidth as fibre, these solutions are often used as bridging solutions while fibre is being installed or maintained.

Planning is critical

Riaan Graham from Ruckus Wireless agrees that wireless networking is on a growth path. Ruckus handles wireless communications for offices, campuses, residential estates and so on. However, Graham says the important aspect of a wireless solution is planning.

Whether you are providing Internet access to the residents of an estate or office, or adding CCTV to the same network, planning is the most crucial aspect of the project. Understanding the environment and how to ensure good coverage is available where it’s needed makes all the difference. If you don’t do that, you, as the installer or IT department, end up making many trips to find out why ‘the network is down’ or why specific areas continually seem to give trouble. A properly planned wireless system will not only cover everything it is supposed to over, it will also provide failover should one access point fail or be switched off accidentally.

In addition, when something does go wrong with the network itself, unlike cables which are generally hidden, it’s easy to find where your wireless points are and to determine which one is misbehaving. He also notes that it is harder to cut the cables when there aren’t any.

And on the matter of security, tier-one wireless networks are definitely not the same as the open Wi-Fi networks in your favourite coffee shop.

Security built in

MiRO’s Marco de Ru says users today can rely totally on their wireless networks. He says that most outdoor wireless systems are encrypted, with even mid-range systems using 128-bit encryption and the high-end solutions using up to 256-bits. Some of the higher-end systems even run on proprietary protocols so you can’t even see them unless you have the same equipment that is able to detect the network is there.

As far as reliability and bandwidth is concerned, De Ru says that using TDMA networks divides the radio into timeslots so that each camera (or whatever device) gets the opportunity to communicate with the base station. This switch is sub-second in timing so each camera gets to use all the bandwidth during its ‘turn’. Today these networks are able to support networking at up to 1 Gbps.

Another problem one can come across when using wireless communications is interference from other networks in the vicinity, which can cause problems. Fortunately, there are ways to deal with this, such as Active Frequency Filtering and others. This ensures only the right radios talk to each other and ignore any intrusions.

Ehrke adds that in Radwin installations, only Radwin stations can see each other. There is no SSID or naming convention so if you aren’t a Radwin technology you won’t even know it’s there. Additionally, the communications are encrypted with 256-bit AES encryption, so even if someone does manage to log in somehow, they won’t be able to see anything.

Radwin also offers it new Jet Air wireless communications solution for the residential market. The Jet Air PtMP series includes a base station that delivers 250 Mbps (or up to 750 Mbps) and is built on Radwin’s bi-directional Beamforming technology which has been adopted by tier-1 carriers worldwide. Jet Air enables service providers to deliver bandwidth-demanding services such as TV streaming, gaming and online applications for consumers without having to install cables.

For point-to-point networking, De Ru says Beamforming technology forgoes forming a wireless ‘cloud’ and aims the communications beam at a receiver, which can be kilometres away, depending on the technology chosen. In these scenarios, interference is also eliminated as the transmission only sends and receives from certain registered radios and not to or from anything else. To cater for the growing demand for wireless networking in the surveillance industry, and in other markets, MiRO offers wireless networking products from Radwin, Ligowave and Cambium.

In the case of Ruckus, Graham says the company creates a mesh network in certain environments to boost the reliability and robustness of the network. This means that even if one access point is down or busy, the network automatically reroutes the communications via another route to still get to the intended end point.

He adds that, using specific Ruckus systems, users can get up to 1.7 Gbps. In the 2017 State of the Nation Address (or chaos, depending on your perspective), Ruckus provided communications solutions and made about 270 Mbps available to broadcast the fun and games to the world.

Wireless networking is more than simply and option in the surveillance world, today it is able to handle almost anything surveillance installations can throw at it. However, like any part of a security installation, planning is vital to ensure the network is designed to handle what is thrown at it in a reliable, robust and secure manner. Wireless planning is not any different to planning for camera placements, anyone can do it, but you need someone with the training and experience to do it so that it works as required and is reliable and robust enough to avoid having technicians employed fulltime fixing randomly occurring problems.

For more information:

MiRO: www.miro.co.za,

Radwin: www.radwin.com,

Ruckus: www.ruckuswireless.com

Refer to Hi-Tech Security Business Directory ( www.hsbd.co.za) for further details on these companies.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...
AI agent suite for control rooms
Milestone Systems News & Events Surveillance AI & Data Analytics
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Proactively enhancing campus safety
Surveillance Products & Solutions
Strengthening security management and proactive alerting have become priorities for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.