IPV is not CCTV

CCTV Handbook 2005 Surveillance

This article is not about CCTV. It is about surveillance cameras and the solutions that sit behind them. It is about IP video (IPV).

Why do I start with making that point so emphatically? It is because the term CCTV is loosely used to cover all kinds of camera surveillance systems, but the differences between CCTV and IPV are so profound that is very misleading to lump them under one label.

CCTV as we all know is closed circuit television, and the key word is closed. IPV, on the other hand, is transmission of video signals over Internet Protocol (IP). The openness of the Internet is something everyone is familiar with, and indeed that is one of the major differentiators of IPV: video signals can be transmitted as easily to the other side of the planet as to a desk in reception, bandwidth permitting. The pictures can be made available to anyone, anywhere. That is not always desirable of course, but with signal encryption and firewalls, access can be controlled.

Modern businesses, almost without exception, run over IP-based data networks and link to partners and remote offices over the public Internet, and home networks and Internet access are commonplace, so the carrier for IPV is everywhere.

The implications are wide-ranging. A head office can see what is going on in their offices, warehouses and stores around the country or the world; individuals can look in on their homes whilst travelling overseas; parents can monitor their children at playschool; security companies can get automatic feed of video from the premises of their clients as soon as an alarm is triggered; and so on - the openness of the Internet makes myriad applications possible that could not even be thought of with CCTV.

The other big difference between IPV and CCTV has already been mentioned in passing, but needs to be put in clear relief: IPV runs over existing cables and infrastructure. This has positive and negative aspects. On the positive side, it means the physical deployment of IPV is greatly simplified as much of the time the data cabling will already go to or near the points where you want to place your cameras, and the cables themselves are inexpensive. Nearly all networks run over Ethernet as the physical layer, and there is a standard for transmitting power over Ethernet cables known as 802.3af, or more simply, PoE. With PoE, a standard Ethernet cable carries both data and power, making deployment even simpler.

The negative side is that because IPV runs over the existing data networks, the video reticulation has to be designed in conjunction with the IT department as it will affect the network design and will be sharing bandwidth with the existing network traffic. Most modern businesses run 100 Mbps Ethernet, often with 1 Gbps links between hubs. An IPV camera at 5 fps will typically use less than 1 Mbps, but multiple cameras, high resolution or high frame rate requirements, and the fact that not all of the nominal bit-rate of Ethernet is available for use can mean that video has a significant impact on the network. There are many factors that modify this, such as cameras that vary their frame rate depending on motion detected, and different encoding schemes, which need to be understood and borne in mind. There is some learning to be done on the part of the camera installers and the IT departments.

A third difference is that IPV cameras generally have more intelligence in the cameras themselves. For example, a camera can be configured not to send any data back until a trigger occurs, such as motion detection (and perhaps only motion in certain portions of the image), or an input switch from a door or boom contact, whereupon it will send back information for, say, 10 seconds before and 20 seconds after the trigger.

A fourth factor is the always-important bottom line: what does it cost? As a general rule of thumb, the cameras are more expensive because of the technology and intelligence built into them, but the system cost is lower. System cost is reduced by lower installation costs and because the storage and processing of video data uses commodity PC and server hardware, and in particular because standard hard drives are used.

IPV is not CCTV: it is a whole new game with many new possibilities.

Roy Alves
Roy Alves

Roy Alves is the managing director of SCS Distribution, he can be contacted at [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.