Optimising video across the WAN

CCTV Handbook 2012 Surveillance

Making effective use of your network.

Real-time applications, like video surveillance, video streaming and video conferencing currently account for over 30% of world-wide typical enterprise’s application mix (Source: Gartner 2009), and are expected to grow faster than any other type of traffic. These applications behave quite differently than traditional enterprise applications like file, e-mail and Web services – especially across a wide area network (WAN).

WAN optimisation appliances have several unique architectural advantages that make it ideal for the optimisation of real-time traffic. These include:

* Protocol agnostic approach to WAN optimisation.

* Real-time loss mitigation. Network Integrity features correct for dropped and out of order packets in real-time. This avoids packet re-transmissions, which can severely degrade the quality of real-time applications across the WAN.

* Low insertion latency. WAN optimisation appliances perform all optimisations in real-time, introducing little or no additional latency when handling multimedia traffic.

Video streaming/video on demand

Video streaming involves the transfer of content over the WAN for viewing in real-time. When the content is requested by end users (i.e. subscribers), it is often referred to as video on demand (VoD).

When video content is delivered across a WAN in real-time, there are several technical challenges that must be addressed. For one, even though the streams are often pre-compressed, they still can consume quite a bit of bandwidth. This is especially true when many users are viewing the same content. Secondly, video streaming and real-time VoD is very susceptible to latency and loss on the WAN.

Long distances and/or frequent packet re-transmissions will adversely impact video quality, and subsequently ruin an end user’s experience. WAN optimisation overcomes the above challenges in the following ways:

* WAN Deduplication: WAN optimisation appliances eliminate the transfer of repetitive data across the WAN using real-time disk based deduplication. This works within a stream as well as between video streams. Therefore, if many users are attempting to view the same content from a single location, that content only needs to be delivered once across the WAN. This improves download times and saves on WAN bandwidth expenditures.

WAN optimisation appliances also perform header and payload compression to improve the performance of non-repetitive video traffic. Deduplication and compression techniques are performed on all IP traffic, including video applications that run over UDP.

* Network Integrity: WAN optimisation appliances uses real-time Forward Error Correction (FEC) to correct for dropped packets, and Packet Order Correction (POC) to correct for out of order packets. These avoid packet re-transmissions, which can hurt the performance of real-time video across the WAN. Network Integrity features work on all IP traffic, including video streaming and VoD applications that run over UDP.

* Quality of Service: WAN optimisation appliances robust quality of service (QoS) policies can be used to prioritise video streams and to guarantee these services receive adequate network resources (i.e. bandwidth) across the WAN.

While performance varies depending on traffic patterns and content, the following results are often experienced when WAN optimisation is deployed in conjunction with video streaming and real-time VoD:

* Improved quality of video stream across the WAN (i.e. reduced pixelation).

* Up to 99% deduplication, especially when multiple streams are sent to the same location across the WAN.

* Benefits are most noticeable on ‘lossy’ WANs, such as MPLS or Internet VPNs, and when network congestion is present.

Below are some key questions to ask to determine if WAN optimisation is right for your video streaming environment:

* Have users experienced poor video quality, such as dropped or choppy video streams?

* Are you concerned that the increasing demand video is placing on your network will cause problems with this and other applications going across your WAN?

For more information contact ITgility, 0861IT4ALL (086 1484 255), info@itgility.co.za, www.itgility.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Smarter surveillance in a connected world
Securex South Africa Surveillance IoT & Automation
The security sector is moving rapidly towards integrated, intelligence-led environments. Organisations want systems that communicate with each other, deliver meaningful insight, and support operational efficiency without compromising cybersecurity or privacy.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
From surveillance to strategic business infrastructure
Axis Communications SA Surveillance
The Axis Perspectives Report 2026 describes how intelligent IP cameras are evolving beyond traditional surveillance to become an increasingly embedded component of operational infrastructure, supporting security, safety and broader business performance.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
Large-scale AI boosts manufacturing efficiency
Hikvision South Africa Surveillance Industrial (Industry) AI & Data Analytics
Video systems, once used mainly for security, are rapidly becoming one of the most valuable sources of operational data in factories and industrial parks, accelerating smart manufacturing process.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.