Breaking the cables

September 2015 Editor's Choice, Infrastructure

As more security solutions are using wireless networking to transfer large files of video and other data over long distances, Hi-Tech Security Solutions asked Bertus van Jaarsveld, CEO of MiRO distribution, to highlight some of the benefits involved in doing away with wires in your security networking, as well as touch on the burning issue of securing wireless systems.

Why should installers, integrator and users look at making the move to wireless?

Van Jaarsveld: There are many benefits to implementing a wireless IP network for video surveillance, such as:

• Quick and easy deployment: Wireless systems are so much faster to deploy, no need to find cable routes, trench and dig, rehabilitate etc. Wireless even makes large-scale temporary solutions an option at events such as outdoor music festivals.

• Cost savings: Wireless systems are often more cost-effective than wired solutions, especially once you include costs for civil engineering, trenching and rehabilitation.

• Flexibility: In a wireless system, it is very simple to add new cameras or change the position of existing cameras. In most cases this can be done at almost zero cost and with no impact to the existing system functionality or configuration.

• New possibilities: Wireless networks allow new solutions, such as cameras on boats that can be monitored from the shore, or cameras on moving vehicles in a mine.

• Easier to maintain and repair: In most cases, it is almost impossible to pinpoint a cable fault, often requiring many hours of hunting and regular recabling to fix the problem. In wireless networks, faults are easily located and in most cases can be addressed through off-site system maintenance or reconfiguration.

• Escape the limitations of cable runs: All wired installations have limitations on the length and positioning of cables. With wireless deployment, you can easily connect to cameras in remote positions many kilometres away or deploy links in environments where cables are not an option such as mining or marine solutions.

• Redeployment: Once money has been invested in a cabling solution, the cabling is fixed – never to be reused. When a company relocates, cabling is almost always removed and destroyed, where wireless systems are easily relocated and recommissioned.

Developments in wireless technology have made wireless a much more attractive proposition over the last number of years. These include:

• New higher-speed standards such as 802.11ac provides for cost-effective links delivering Gigabit speeds rivalling the speed of the fastest wired networks.

• New proprietary protocols on point-to-multipoint systems allow for guaranteed throughput to wireless clients, ensuring uninterrupted video streams from all cameras.

• Enhanced security features provide totally secure wireless links that cannot be compromised.

• Carrier grade features in affordable equipment provides 99.999% availability and reliability.

There are no compelling reasons to migrate existing wired solutions to wireless, however. If there is a wired solution in place, replacing it with a wireless solution will not provide any immediate benefits and the funds may be better utilised in other areas. Where entirely new IP networks are implemented, or additions / expansions are done to existing IP networks, wireless solutions provide compelling benefits to form at least part of the solution, if not the entire deployment.

Are there any specific integration or scalability issues one needs to consider when implementing a wireless solution?

Van Jaarsveld: Luckily the days of trying to transmit video over analogue wireless transmitters are long gone. With modern IP surveillance solutions, data is transmitted over an IP network, whether wired or wireless. Internet Protocol (IP) is designed to be ubiquitous, scalable and universally compatible. There are no concerns or issues to integrate IP solutions from various vendors, you have complete freedom of choice and peace of mind when it comes to selecting hardware solutions and combining and integrating them into your solution. This is simple on an IP communications level, things become a little more tricky in areas such as Radio Frequency (RF) and video management systems (VMS).

Not all radio systems are compatible on an RF level, while most Wi-Fi systems will be able to talk to each other at their most basic level – excluding any proprietary enhancements implemented by the specific manufacturer. Other wireless systems use proprietary protocols that deliver huge benefits to users, such as the Radwin carrier grade point-to-point links that are totally secure with guaranteed throughput.

This means that when you plan to connect radios to each other through the air, use equipment from the same vendor and product family, but you are free to use equipment from different vendors once you connect them to each other via Ethernet cable. For example, use Radwin point-to-point from control room to tower and connect it to a Ubiquity point-to-multipoint system to connect a number of distributed cameras.

Scalability is very easily achieved with wireless deployments. It is one of the major benefits of a wireless network. When you need to service a new area, deploy a new point-to-point link, or in a point-to-multipoint system, simply deploy another subscriber station. The only concern here is bandwidth availability across the system, which needs to be addressed through systems planning and design.

What should installers, integrators and users be aware of in terms of security when it comes to wireless networking?

Van Jaarsveld: There are some cases where wired infrastructure should be selected over wireless:

• Existing infrastructure: If there is a functioning wired network in place, there are no benefits to converting everything to wireless, unless there are specific reasons for using wireless such as mobility applications. Even then, wireless links can easily be used as an extension of the wired network.

• In-building applications are almost always better served by a wired network as wireless solutions do not function well inside buildings, through walls etc. When buildings are designed with sufficient capacity for network cabling, wired networks can be the best option.

• Wireless links rely on line-of-sight to operate. There are cases where a wireless link may not be possible and cable will be required.

Almost every IP security project can benefit from a wireless solution – if not the entire deployment, at least in some part of the network. Traditional headaches such as deploying a camera or access control reader at an entry gate, is handled quickly, efficiently and cost-effectively by a simple wireless link from the building to the gate – no trenching needed. The wireless network provides a simple IP network platform, identical to that of a wired LAN which is perfect to run IP security services across it.

How important is it to secure your wireless security networks?

Van Jaarsveld: It is of vital importance to secure your wireless networks, not only your security networks, but all wireless networks. Which wireless network provides a larger threat to your business or opportunity to criminals? Video streams on your security network or sensitive transaction information on your data LAN?

Luckily, wireless security has evolved to be a 100% secure solution, as well as fast and simple to implement at no added cost. All modern wireless products provide security features to make the link inaccessible to outside parties. We find that the largest threat to wireless data security is the lack of knowledge or disregard for the risk of unsecured wireless links. Security features vary from simple, industry-standard WPA2 security to advanced solutions such as Radwin LinkLock and radius authentication.

For more information contact MiRO distribution, 086 123 MIRO, riandi@miro.co.za, www.miro.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...
Integrated information platform for risk management
Editor's Choice News & Events Security Services & Risk Management
Online Intelligence recently launched version 7 of its CiiMS risk and security platform. Speaking to SMART Security Solutions after the launch event, the company’s Arnold van den Bout described the enhancements in version 7.

Read more...
Unlocking Africa's AI potential
Editor's Choice News & Events AI & Data Analytics
Africa's AI market is set to grow exponentially; by investing in AI education, training, and ethical practices, African nations can harness the power of AI to transform the continent and create a brighter future for its people.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Global Identity Fraud Report revealing eight-month ‘mega-attack’
Editor's Choice Security Services & Risk Management
AU10TIX recently released its Q4 Global Identity Fraud Report, with the research identifying two never-before-seen attack patterns, with the worst case involving 22 000+ AI-generated variations of a single U.S. passport.

Read more...
Entries to southern Africa OSPA Awards now open
Technews Publishing Securex South Africa Editor's Choice News & Events
The southern Africa OSPAs are part of a global awards scheme that recognises and rewards teams, individuals and organisations for their commitment and outstanding performance within the security sector.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...