To PoE or not to PoE

CCTV Handbook 2018 Editor's Choice, Infrastructure

Power over Ethernet (PoE) is a classic example of a technology that is simple but not straightforward. The ability to carry both data and power along the same cable has proven so transformative that in many industries it has become the norm rather than the exception. There are caveats, however, and a multitude of factors need to be considered when deciding whether it is the best option.

Most security products nowadays support PoE, from powered devices (PD) such as CCTV cameras, access control terminals and passive sensors, to power sourcing equipment (PSE) like DVRs/NVRs, Ethernet switches and midspans. But to say that a device supports PoE is like asking a waiter for a warm meal – there are various flavours to suit different appetites, and a selection of toppings to meet sir’s, or madam’s, particular taste.

Standards, classes and norms

The standard initially created by the Institute of Electrical and Electronic Engineers (IEEE) to standardise PoE – designated 802.3af – is broken down into four sub-classes according to the amount of power required, catering for up to 15,4 W. As the functionalities and capabilities of powered devices correspondingly expanded their hunger for power, standard 802.3at was formalised to support up to 30 W.

In the CCTV market, the majority of IP cameras, for example, are satisfied with 15,4 W, while models such as those with pan-tilt-zoom (PTZ) functionality or integrated heaters happily gobble up the extra power provided by 802.3at. A new standard called 802.3bt is currently in the draft stage, which will allow 100 W for more specialised applications.

To complicate matters further, some equipment vendors do not follow the formally recommended method of stating PoE specifications (which describes both the type and the class) and instead ignore the class modifier. For example, if only the specification ‘802.3af’ is used, this could mean the powered device can be supplied with anything across a wide range of 0,44 W to 15,4 W. Some devices even specify their power level without actually conforming to a specific standard, which can lead to PSEs and PDs not playing nicely together.

The devil’s in the details

Andries Mokoakoe, from industrial connectivity specialist RJ Connect, says that professional-class equipment tends to be more trouble-free than consumer-grade alternatives thanks to their stricter adherence to the prevailing PoE standards. But the question of whether PoE is actually the best option is a grey area. “Many factors need to be weighed up, such as how PoE compares to the cost of having a power supply for each camera, and whether there is just one or several cameras connected to the same switch,” he says.

He summarises the main points to consider as follows:

• Think about how many PoE-powered cameras might be disconnected if the switch powering them loses power.

• Ideally, make sure that PSEs and PDs adhere to the same standard to avoid power mismatches.

• The power budget must cater for all the PDs that will be connected to the PSE, so if for example four 6 W cameras are connected to the same switch, its power budget must be 24 W – which both the switch and its own power supply must support. This power budget must continually be borne in mind, because if extra cameras are added at a later stage, the switch and/or power supply might no longer be able to cope, which could result in loss of power not only to the new camera but also the ones previously connected.

• Unless all equipment is grounded correctly, a lightning surge hitting a camera can take out the connected switch too.

• Adhere to the recommended distance limit of 100 m, or preferably 90 m to be on the safe side.

“The bottom line is, when in doubt, consult a specialist with a deep understanding of PoE, its advantages and its disadvantages,” Mokoakoe says.

According to BT-SA, an ICT infrastructure solutions provider with extensive experience in the fields of access control and CCTV, the ability for different types of equipment, and from different vendors, to work together seamlessly varies from application to application. “In cases where we install our own switches, adaptability is not a problem,” says BT-SA’s Stephan van Aswegen, senior manager: data network and air conditioning, “but if we have to work with existing network switches, it is advisable to rather install an external power source to ensure stable power to equipment. This also avoids unnecessary call-outs in future.”

“Cost is a very big factor when advising a client on going the PoE route or not,” he continues. “Rather spend a little more now and save on call-out fees and upgrades in the future. If the client does not have a PoE switch, PoE injectors are required which further adds to the cost. Long-term maintenance and extra expansions costs must also not be overlooked.”

Although Cat5e has long been the go-to Ethernet cable for PoE applications, Van Aswegen advises that new installations in particular should favour Cat6 or Cat7 cable, as Cat5 and Cat5e are being phased out. When it comes to retrofit projects, therefore, the barriers to adoption of PoE technology should not be underestimated since new cabling might be necessary, or additional power sources and PoE injectors, which carry not inconsiderable cost implications.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.