Wireless IP surveillance for the masses

March 2008 Surveillance

From Bluetooth, to Wifi, to WiMax, wireless technologies have become everyone’s preferred means of transmitting data.

Roy Alves
Roy Alves

When it comes to monitoring and surveillance, though, the best way to harness the power of wireless connectivity is with wireless IP surveillance systems.

Unlike most wireless technologies that traditionally come at a premium price, wireless IP surveillance systems are highly flexible and scalable, allowing users the freedom to design a system that is perfect for their needs and budget. This makes wireless surveillance suitable for a wide array of environments including, but not limited to small businesses, factory plants, university campuses, or even mining sites.

How it works

IP surveillance cameras (network cameras) convert images into data packets that can be easily transmitted over the Internet. The wireless cameras positioned at the different locations are then connected to wireless bridges or subscriber units, which send the data back to the wireless base station unit located at an organisation's command and control centre. With high-performance point-to-point solutions, the range between the camera and the command centre could be up to 60 kilometres, which is almost 10 times the maximum length to which Ethernet cables can be laid. With wireless network cameras all that is needed at the camera level is a power source.

Why use wireless IP surveillance

Wireless IP surveillance systems are fast and easy to deploy. They do not require any disruptive and time-consuming excavations. Furthermore, they are well suited for covering large surveillance areas because the cameras can be placed at a considerable distance from the control centre without the need for yards of cabling that can cost a company tens of thousands of rands.

The wireless environment also makes it very easy to upscale the system. Additional wireless IP cameras can just be added without the need to run any Ethernet cables at all. To optimise the system, cameras can also be moved around with ease to ensure that the best possible coverage is received.

Over and above these, wireless IP systems come with the other advantages that are inherent in IP surveillance systems, like remote monitoring from anywhere where there is Internet connectivity, intelligent cameras and superior image quality.

Is it safe?

The idea of transmitting classified information over the Internet has always had its sceptics and the same applies to wireless IP surveillance. Questions have been asked about how safe it is to run an entire surveillance network on the Internet.

The Internet has on many occasions proved itself to be a very reliable medium for transmitting even the most sensitive of information. Proof of this is the popularity of applications such as Internet banking and trading. Companies involved in these industries apply the most stringent security policies to ensure that they and their customers do not fall victim to Internet fraud.

To ensure that the wireless IP surveillance system is also protected from criminals or any other unsolicited visitors, there are several solutions that are available to system administrators. The most basic of these are firewalls and password protection. Firewalls are either software or hardware based. They act as electronic gates to prevent unauthorised entry into a network. In addition to firewalls, administrators can also introduce password protection into the system. This ensures that the system is not only protected from external threats but also from users who have legitimate access to the network, but restricted from accessing certain files.

There is also encryption, a technique that requires that the same make of equipment be used on both the sender's and the receiver's sides in order to decode the data. Data coding is another security feature that can be introduced into wireless IP surveillance systems. This means that potential intruders would have to obtain a unique transmission code set by the system administrator in order to decode the data.

In stark contrast, analogue systems do not allow for any data encryption whatsoever, making it very easy for anyone to tap into the system and view what is supposed to be secure, privileged video data.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...
Innovations in video management
Arteco Global Africa Surveillance
Visitors to Securex Cape Town this year will have the opportunity to experience Arteco’s latest innovations in video management and integrated security technology, including uSee VMS, Arteco’s hybrid-cloud video management platform.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.