Beginners' guide to IP

February 2006 Surveillance

With so much choice of products and services now available from both traditional and new providers, the security marketplace is awash with solutions for what seems an infinite number of applications and uses.

But for the uninitiated, the first question usually asked is "What is IP and how does it work?" Whilst many within the industry are moving forward at a pace with IP technology and its possibilities, consideration needs to be made for those who have not yet been able to investigate it or those who are new, like end-users and customers, who need to know the basics.

This brief 'guide' will hopefully help those new to IP technology.

Introduction

Firstly, the term 'IP' means Internet Protocol, which is a network and transport protocol used for the transfer of data over the Internet. A network is basically a connection between two or a number of computers, providing them with the opportunity to share information or data.

Most networks include a great number of computers, however they all use the same 'rules' for sharing information and we take for granted the technology behind their ability to connect and communicate with each other. This protocol, TCP/IP (Transmission Control Protocol/Internet Protocol) encompasses the acknowledged methods or standards used by the computers (and other appliances such as routers) to manage, send, direct and deliver information over the Internet. To achieve this, each device is given its own IP address which is a series of numbers that act in a similar way to a postcode.

LANs and WANs

A network basically consists of two fundamental elements, nodes and links. A 'node' is a global term for a communication device, a computer for instance. These nodes communicate with each other through 'links' which are simply the cables. The two most commonly known types of networks are LAN and WAN. Local area networks are used to connect a group of computers within a single company office, building or site whereas a Wide Area Network operates over a communication system such as telephone lines and links up a number of LANs or remote computers.

Within the network, there are two methods of communication between computers, the circuit-switched network and the packet-switched network. The circuit-switched method is used for telephone calls where it establishes a dedicated connection between the 'nodes' and provides a constant communication using all the capacity of the 'link' for the time of the call. If the connection fails, then transmission is lost and a new connection needs to be made.

The packet-switched network is used for IP-based communication and provides a far more efficient use of the 'link'. The data or information to be sent is first divided into 'packets' which each contain some of the data along with the destination and source addresses. These packets are then individually forwarded through the network via the intermediate nodes and routers to the final destination. The packets do not have to follow the same route through the network as they are all individually addressed and therefore can be re-routed around malfunctioning or broken links or nodes, making the system both efficient and flexible.

Digital data

Unlike analog information, which is continuous, digital messages consist of a sequence of 'bits'. This binary data (ones or zeros) allows the initial information to be measured and reproduced as digital data.

Therefore, the information, which could be pictures, audio or text, in the format of digital data can be transmitted with no corruption or loss of quality, which occurs in the case of analog information.

Another benefit is that the digital data can be compressed for speedier onward transmission and encrypted to make those transmissions secure.

IP applications

There is no doubt that the IP-based architecture described above offers tremendous opportunity for security applications. The main benefits of an IP-based system are the operational improvements that can be obtained as well as the cost savings that can be achieved. Through convergence, further benefits are possible with new applications and a broadening scope of possible applications and uses.

To grasp a basic understanding of the technology provides a start point for beginners and customers alike, but that understanding is an essential tool if they are to fully appreciate the vast array of ground breaking products and services which have become available through IP technology within the security industry.

Source: IP User Group, www.ipusergroup.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...
Innovations in video management
Arteco Global Africa Surveillance
Visitors to Securex Cape Town this year will have the opportunity to experience Arteco’s latest innovations in video management and integrated security technology, including uSee VMS, Arteco’s hybrid-cloud video management platform.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.