classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


IP cameras are not always IP network friendly
May 2008, CCTV, Surveillance

The benefits of IP cameras are self evident, however, eager sales people and pressurised security personnel might be tempted into installing a set of cameras without giving due consideration to the impact they will have on the corporate network.

Simply assuming that IP cameras will make use of the corporate network to transmit their images is a serious error that will not only reduce or completely kill the operations of the cameras, but could also affect the running of the business.

Networks were designed to, and are used to, transfer business data in copious amounts, but in some companies even today's networks are straining at all the information people and applications transmit. It is therefore critical to ensure IP camera traffic will not disrupt the flow of business data before installing the cameras.

To prevent any unpleasantness, a network impact analysis needs to be completed before the rollout begins. A network impact analysis is simply a way to determine the health of one's network and its capacity to handle more traffic. There are numerous tools companies can choose from to do the analysis, with certain vendors punting tools they prefer, but the process itself is pretty standard.

Network audits

To start with, a high-level audit is done to obtain a birds-eye view of the network, its components, operations, the opinions of those managing and using it, as well as existing strategies that will place an added strain on it. In this process, each system and hardware component is categorised.

This in itself is a worthwhile exercise as it often highlights weak links in the network where older technology is creating a bottleneck. It also allows management to see exactly what data is traversing the network daily - a discovery that shocks many business leaders. Knowing what data the company is transporting often leads to new company rules disallowing social networking sites and videos (and other unsavoury items found on the Internet), a move that often lowers network utilisation dramatically.

A service provider worth its salt will also review the event logs of its customers' servers, workstations and managed devices to try to squeeze the ultimate performance from their systems. Many service providers will ignore the log because scanning them can be a boring and lengthy task no one really wants to undertake.

Once completed however, the company will have a clear understanding of what its network does and what additional loads it can carry. The next step is to determine what load the new network of IP cameras will add.

Additional image bandwidth

One of the benefits of IP cameras over CCTV systems is that their images can be tweaked to suit the needs of the company. Administrators can, for example, only allow one image to be broadcast every few seconds or have full motion video. New technologies in which cameras manage themselves will prevent the devices from transmitting any images until the camera recognises a problem, sounds an alert and starts broadcasting.

Analysing the needs of the company will assist in designing the optimal camera setup that uses but does not abuse the network. Determining the exact bandwidth usage of a camera is difficult. It depends on factors such as image size, compression ratio, frame rate (images per second) and resolution.

Fortunately, there are many tools available to assist in determining how much bandwidth cameras with specific settings will consume. These tools also offer a good idea of the storage requirements of different camera settings.

If the corporate network cannot handle the traffic, the team responsible for the video images will have to consider either a joint operation with IT to upgrade the network, or to create a separate network specifically for images, or reducing the bandwidth required by reducing the quality and therefore the size of the images transmitted.

A careful analysis of the existing network and the security requirements of the company will empower the management team to make an accurate decision on the best course of action.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • CCTV, crime and consequences
    August 2015, Leaderware, CCTV, Surveillance
    We install CCTV systems because we expect people to be aware that they are under camera surveillance and to adjust their behaviour accordingly.
  • Access control and surveillance gain ground
    August 2015, Axis Communications SA, ASSA ABLOY South Africa, ZKTeco, This Week's Editor's Pick, CCTV, Surveillance, Access Control, Identity Management, Healthcare (Industry)
    While the uptake of security systems in healthcare facilities has been slower than in the commercial and retail sectors, there is a growing awareness of the importance of securing employees, patients and visitors.
  • Management platforms in the spotlight
    August 2015, Milestone Systems, Pelco by Schneider Electric, CCTV, Surveillance, Access Control, Identity Management, Enterprise Solutions, Remote Monitoring
    Management platforms are advancing, incorporating intelligence and generally trying to differentiate themselves. As such, third-party integration is becoming standard and proprietary systems are becoming harder to find.
  • Solution based approach
    August 2015, Security & Communication Warehouse, CCTV, Surveillance, Enterprise Solutions, System Integration
    The most critical approach to any successful solution design should be an open platform approach.
  • Mobile surveillance cameras ­ensure best first response
    August 2015, CCTV, Surveillance, Enterprise Solutions
    Researchers at Cambridge University’s Institute of Criminology report a 59% drop in use-of-force by officers wearing body-worn technology and an 87% drop in complaints against officers.
  • Milestone delivers continuous return on investment
    August 2015, Milestone Systems, News, CCTV, Surveillance, Enterprise Solutions
    Milestone Care is a new support service designed to safeguard smooth operational performance, maintenance, updates and upgrades of a customer’s video solution.
  • CathexisVision integrated with Gallagher
    August 2015, Cathexis Technologies, News, CCTV, Surveillance, Access Control, Identity Management
    CathexisVision Video Surveillance Management software is now fully integrated with the Gallagher Command Centre, providing complete fence monitoring and access control integration.
  • IndigoVision and MASS strengthen ties
    August 2015, MASS, News, CCTV, Surveillance
    MASS and IndigoVision recently announced that IndigoVision has appointed MASS as its preferred supplier in sub-Saharan Africa.
  • 245 million video surveillance cameras installed globally in 2014
    August 2015, This Week's Editor's Pick, CCTV, Surveillance, News
    According to IHS, there were 245 million professionally installed video surveillance cameras active and operational globally in 2014.
  • Hikvision claims top spot
    August 2015, Hikvision, News, CCTV, Surveillance
    Hikvision claims top position in the world CCTV and video surveillance market for fourth year. Company now number 1 in every equipment category, including network and megapixel cameras.
  • Eskom secures mission-critical site
    August 2015, C3 Shared Services, CCTV, Surveillance, Enterprise Solutions
    C3 provided an efficient security system consisting of DVTEL’s Latitude video management solution (VMS) integrated with its in-house thermal technology and ioi video analytics.
  • Keeping a watchful eye on Medupi
    August 2015, MASS, This Week's Editor's Pick, CCTV, Surveillance, Perimeter Security, Alarms & Intruder Detection, Case Studies
    Eskom implemented a thorough security plan to ensure the safety of the Medupi site and its ability to perform uninterrupted once in action.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.