Optimising video across the WAN

CCTV Handbook 2012 Surveillance

Making effective use of your network.

Real-time applications, like video surveillance, video streaming and video conferencing currently account for over 30% of world-wide typical enterprise’s application mix (Source: Gartner 2009), and are expected to grow faster than any other type of traffic. These applications behave quite differently than traditional enterprise applications like file, e-mail and Web services – especially across a wide area network (WAN).

WAN optimisation appliances have several unique architectural advantages that make it ideal for the optimisation of real-time traffic. These include:

* Protocol agnostic approach to WAN optimisation.

* Real-time loss mitigation. Network Integrity features correct for dropped and out of order packets in real-time. This avoids packet re-transmissions, which can severely degrade the quality of real-time applications across the WAN.

* Low insertion latency. WAN optimisation appliances perform all optimisations in real-time, introducing little or no additional latency when handling multimedia traffic.

Video streaming/video on demand

Video streaming involves the transfer of content over the WAN for viewing in real-time. When the content is requested by end users (i.e. subscribers), it is often referred to as video on demand (VoD).

When video content is delivered across a WAN in real-time, there are several technical challenges that must be addressed. For one, even though the streams are often pre-compressed, they still can consume quite a bit of bandwidth. This is especially true when many users are viewing the same content. Secondly, video streaming and real-time VoD is very susceptible to latency and loss on the WAN.

Long distances and/or frequent packet re-transmissions will adversely impact video quality, and subsequently ruin an end user’s experience. WAN optimisation overcomes the above challenges in the following ways:

* WAN Deduplication: WAN optimisation appliances eliminate the transfer of repetitive data across the WAN using real-time disk based deduplication. This works within a stream as well as between video streams. Therefore, if many users are attempting to view the same content from a single location, that content only needs to be delivered once across the WAN. This improves download times and saves on WAN bandwidth expenditures.

WAN optimisation appliances also perform header and payload compression to improve the performance of non-repetitive video traffic. Deduplication and compression techniques are performed on all IP traffic, including video applications that run over UDP.

* Network Integrity: WAN optimisation appliances uses real-time Forward Error Correction (FEC) to correct for dropped packets, and Packet Order Correction (POC) to correct for out of order packets. These avoid packet re-transmissions, which can hurt the performance of real-time video across the WAN. Network Integrity features work on all IP traffic, including video streaming and VoD applications that run over UDP.

* Quality of Service: WAN optimisation appliances robust quality of service (QoS) policies can be used to prioritise video streams and to guarantee these services receive adequate network resources (i.e. bandwidth) across the WAN.

While performance varies depending on traffic patterns and content, the following results are often experienced when WAN optimisation is deployed in conjunction with video streaming and real-time VoD:

* Improved quality of video stream across the WAN (i.e. reduced pixelation).

* Up to 99% deduplication, especially when multiple streams are sent to the same location across the WAN.

* Benefits are most noticeable on ‘lossy’ WANs, such as MPLS or Internet VPNs, and when network congestion is present.

Below are some key questions to ask to determine if WAN optimisation is right for your video streaming environment:

* Have users experienced poor video quality, such as dropped or choppy video streams?

* Are you concerned that the increasing demand video is placing on your network will cause problems with this and other applications going across your WAN?

For more information contact ITgility, 0861IT4ALL (086 1484 255), [email protected], www.itgility.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.