Converged vs Dedicated Networks For Surveillance Tutorial

By: IPVM Team, Published on Feb 12, 2020

Use the existing network or deploy a new one?

This is a critical choice in designing video surveillance systems. Though 'convergence' was a big theme of the past decade, deciding what to do has been much harder in practice.

** **** *****, ** break **** *** *** factors ** **** ********, pro *** ****, *********:

  • ********* ******** *********
  • ********* ******** *********
  • ** ** ******** *********
  • ******** ********
  • *********
  • ******* ******* / ***
  • ********* *********
  • ********* ********** & ****** Size
  • ******** ********
  • ******* *********** *****
  • ********* ** ********* **********

Converged ********

********* ******** ***** ******* resources ******* ******* ******** like ************ *******, **** telephones, ** **** ** general **** ******* **** email, ******** *******, *** more. **** *** ** beneficial **** * ********* standpoint **** ***** *** existing *** ***** ********* for *** ******** ** surveillance *********, ******* ***** will ** ********** *** resources. *** ************ ***** demonstrates *** ******* ** varied ******* *** ******** sharing ******* *********.

**** ******** **** *** designed ** ****** *** demands ** ********** ***** surveillance *********. **** ** a ****** ********* ** surveillance ***********.

******* ** ****, ****** surveillance ** ** ******** network *** ***** *********** operational ********, *** **** notable ***** *********. *** this ******, **** ****** dedicated ********.

Dedicated ********

**** ******* **** ***** own ********* ******* **** will *** **** *** same ********** *** ********* since *** ************ ********* will *** ** ******** on *** *** ***. Dedicated ******** **** **** more ** **** **** require ***** *** *** of *********.

*** ************ ***** ***** surveillance ********* *** ***** systems *** ********* ** their *** *** ** a ********* *******.

IT ** ******** *********

*** ** *** ******* factors *** ****** ** do **** ****** ******* infrastructure ** ********, *** politics.

** ** *** ******** are *** ******** ***********, which ** ******, ****** can *****, ********** ** the *** ****** ** not ***** **** *****.

*** '***** ****' *** unfairly ****** ******* ** surveillance **** ** ******** for ***** ******. ********** when ** **** *** have * *** **** in ****** ****** *** selection ** ******* ******** equipment, *** ***** ****** can ** ******* ** the **** ***** ** many ********.

**** * ******** *******, the *********** ** ********* is ********. ********* *********** problems *** ******* *** physically ********, ** *** 'blame ****' ** ***** system ** ******* ******** can ** *******.

*********

****** * *** ******* to ** ******** ****** may **** ****** ****** on ***** ************ ** the *******, **** ** email ** ****, ***** total ***** ********** ** only * ******** ** typical ******* ********. *******, dozens ** ******** ** cameras ****** ********** * facility ** ****** *** overload ******* ************** ***** average ******* ** **** and ******** ***** ******* run ************.

*** ******* ********* ** a ********* ******* **** not **** ** ***** bandwidth. ******** * ********* network *** ************ ****** removes *** ****** ** available ********* ** ****** more ********. *** ******** essentially ***** **** ** cost ** **********, **********, and *********** * *** video-only *******.

*** **** *********** ** bandwidth ****** *** ************ ******************.

VSaaS / *****

***** ************ ** * Service (*****)********* ******** * ********* network ** ****. ********** of ****** (***** ****** in *** *****), ******* video (***** ****** *******) or ****** **********, ***** will ******* ******** ************, and ** **** ****** to ** ********* ** a ********* ******* *****.

************, **** ***** ******** may **** **** ** a ********* *****, **** full ********** *** *******, which ******** *** ****** and ****** ** ** on *** **** ***. Using * ********* ****** network, ******* ** *** main/general ******* ***** *** only ***** ********** "******" streams.

Quality ** *******

** ********* ** *******, concerns ***** **** ***** dropped ** ******** ******** unavailable ****** ** *****. Overloaded ******** *** ****** a ********* *** *** kinds ** *********** ******, both ****, ********, ** unfairly *******.

*** ***** ************* / complexity ** *************** ** ********** ********* ******** ***** at *** ******* ** need **** ******** *** administration ***** ** ******* it. ** * ******** lacks ******, *** ****** of ***** ************ ** other ******* *** ** negative *** *********.

**** * ********* *******, only ***** ** *******, and ***** ** ** fighting **** ***** ******** for *********. *******, **** again ******** *** ********.

Technical *********

** **********, ******** *** range **** ****** ** very ******* **** ** outward *****. *** **** that ********** *** ********* plays ** ******** * surveillance ******* ** ********* different.

***** * ****** ******* to ****** *** **** traffic ***** ***** ** they *** **** ** leverage **** ******** ** managed ******** *** *** network ************* ****-***. *********** 'Quality ** ******* *** VLANs *** ** * practical *** ********* ****, but **** **** ********** by ******* ***********. ******* this ***** ** ************* is ****** ******** *****, and ****** ****** ******* the ****** ********** ** network **************.

** *** *** *******, a ********** ******* ** generally ******* ** ****** and ******** ******* ** handles **** *** *** system ****. *** **** is *** ***** ** configuration ****, *** *** actual ******** ****** ** simpler *** ******* ****** a ****** ******* ******. 'Plug *** ****' ******** with ******* ************** *** commonplace ** ********* ***** networks, **** **** ****** IT ***** ** ****** integrators *** ****** **** and ******** **** **** little **********.

Expansion ********** & ****** ****

** *******, *** ***** and **** ** *** network ** * *** consideration. *** ******** ******** multiple ********* ** ******** sites, *** ************** ********** tying **** ******** *** be * **** ******* and ******** *********** ******* to ******** ***** ** cable ***********.

**** ************* **** ******* invested ** ******** ********** multiple ********* *** ******** together, *** ********* ***** or ******** ***** ******* are ** **********. ********, those ***** *** ***** planned **** **** *********** of ****** ********* ** mind. *** *********** **** of ****** ***** *** be ********** ***********.

*******, *** ********* ********, this ***** ******* *** cables ******* *********, ***** can ** ********* ********* or *********. ** **** cases, ********* ******** **** a ******** *********.

Security ********

*** *** *** ***** or ********* ***** ********* network ******* **** ** a ****** *******. ********** separating ************ ******* ** its *** ******* ***** it ****** ** **** access **. ********, ******* access ** ***** ***** explicitly ******** ****** ** the ******* *** ******* that ******* ****** ** easier. *** **** *********** check *** *** ****** on************* *** ** ***** Surveillance.

Dedicated ******* *************

**** ************ ********* ** installed ** * ********* network ** ******* **** difficult ** ****** ***** it ** *** ** the **** *** ** an ************* ***** *********. To ******** ****, *** servers *** **** *** often ******** **** **** than *** ******* *********, with *** **** ** connect ** *** ****** LAN *** ******* **** to ******* ** *** facility's ******* *******. ***** this ******, ******* ** the ********* *** *** inaccessible ** *** **** network, *** ***** *** be ****** *** *** NVR.

***** ********* ******** *** also ******* ********** *********** and ************* *** ****** access, ** **** **** for *** ******* ******* may *** **** * route ** *** ****** network. **** *** ******* a ******** *** ***** or *** ** ***** connectivity ** *********. *** more *********** ***** *** the****** ******* ****** *** Video ************ *****.

Ongoing *********** *****

*** ******* ** *********** either ****** *** **** as ****, *** ****** a *** ******.

*******, *** ******* ******* of * ********* ******* is * ******** ** programmed **** ******* *********** and ****** ** *** users. ******* *** ******* operational ** * ******** for ** ***********, *** having ***** *** * converged ******* ********* ********** the ******* ** ******* maintenance.

*******, *** ********** *********** of ******* ******* ** grudgingly ******** ** ******** ignored. ***** ***** *********** and ******** ****** *** be ********* ** ********* a ********** *******, ******* it *********** ** ******* responding ** ****** *** be * ******* ****.

*** ******* **** ** a ********* ******* ** that ****** *********** *** upkeep *** ** ******* or **** ** ***** addressed. ********* ** *********** at **** **** *************** problems ** ****** ********* outside ** '***** *******' is * ****, ** well ** * ********** to **** *** ******** vendor *** ******* ** 'minor ******' ** **** might **** ******** ******** once ** ***** *** year.

Integrator ********** **********

** *** *******,*********** **** * ****** preference *** ********* ********* surveillance ********, **** **** * converged ****** ** ********.

Comments (9)

****** **** *** ********* networks.

* **** **** ****** in **** ** ******* all *** ********** ** the ****/**** ** ******* design. ** *** *** of *** *** ** integrator *** *** ************** to ****** *** ******** of *** *******. **'* the ******** *** **** chose ***** **** ** take ***** ** ***** involvement ** *** ******, implementation *** *********** ** the ******.

**** *** **** ** apply ********* ** * medium+ **** ******* *** firewall ******** *** ******** reasons/standards *** ******** ** to ******** (********) ********.

*** "*********" ****** ** indeed * ******* ****** (all **** *** *****...) - ********* *** **** other ******** ******* **** the *********** *********** ******.

*** **** ******* ** have ******** **** ** cases ***** ******** ** SLA ******* *** ******** and *********** ********.

**** ** ******* ***** a *** ****** *** hackers *** ****, ***** cybersecurity **** ********* ***** a ********* ******* ** definitely *** *** ** go. ******** ********, **** IOT *******, ******* ******** complexity *** ************ ******* all ******* ** ****** a **** **** ********* IOT ******* ******* *** main *******, ******** ******* network ******** *** *** enterprise.

* ********* **** ** the ************** ** *** cyber ****. **** **** not **** ********* ******** :-) ***** ****** *** all ** ************ ** the **** ********.

**** ** ****, *** when ** ***** ** a ******* ********, * network ******** **** **** to ** ********* * VLAN, "..*** **** *** velvet **** ** ******* security?"

*** ***** ***** ** hardware, ********* * ****, is **** ****** ******* layer ** ***** ** a ****. **** * VLAN ****** *****, *** you ***'* *** **** disposal **** ******* **** a ****** *** *********** vest.

**! **** **** ** a **** ******* *** it ** ****** *********. There ** * ******* set ** ***** **** to ********** **** ******** and *** *** ********** complex. **** ***** **** to *** **** **** a ****** ********* ******** will *** ** *** way ** ******* ** some *****. ** ******** methods, **** ***** ******* are ********* *** **** the ******* *** ** all **** **** *** actors **** *** ***** path ** **********. ****** there ** * ******* misconfig (********* ****** ********), these ******* *** **** uncommon. ******* ** ***** to ********** ********* *** phishing ** ****** *********** far ****** ***** ***** of ******* **** *** unless ******* "****** *** door ****".

**** ** * *****. :-)

******* ***** * "****** rope ** ********" ** more * ******** ** poor ******* *********** **** technological *******. ** *** vlans *********** ****** *** 120 ********, * ****** enterprise ** ******** *** monitor * ****** ****** network. ******** ******** ******** would ** ********** ** maintain, ******* *** ******. For * ****** ******** a ********** ******** *** may ** ******** ** not ******* *** ****** vlans ** *** ****** enterprise *** *** **** possible *** ********* *** preferable.

*** *** *** **** with *** ** ********** when *** **** ******** packet ****** ******* **** IP ******* *** *** recording ***** ********, *** network ** ********* *******, ICMP ***** **** ****** losses, *** **** ** not ****** **** *** issue ** **** ***** switches ?

Read this IPVM report for free.

This article is part of IPVM's 6,307 reports, 842 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Last Chance - Spring 2020 IP Networking Course - Register Now on May 06, 2020
This is the last chance to register for the only networking course designed specifically for video surveillance professionals, taught...
BICSI For IP Video Surveillance Guide on Feb 11, 2020
Spend enough time around networks and eventually someone will mention BICSI, the oft-referenced but only vaguely known standards body prevalent in...
Network Cabling for Video Surveillance on Jan 15, 2020
In this guide, we explain the fundamentals of network cabling for video surveillance networks, how they should be installed, and the differences in...
2020 IP Networking Book Released on Jan 06, 2020
The new IP Networking Book 2020 is a 280 page in-depth guide that teaches you how IT and telecom technologies impact modern security systems,...
Horizontal Cabling for Video Surveillance Guide on Jan 03, 2020
There are a few options when it comes to professionally installing horizontal cabling for video surveillance networks. The three options examined...
Altronix Claims Tango 'Eliminates Electricians' on Oct 15, 2019
Power supply provider Altronix claims its new Tango power supply 'eliminates the need for an electrician, dedicated conduit and wire runs'. In...
Siklu $400 Compact 60GHz Radio on Jul 24, 2019
Siklu first entered the video surveillance market with a $6,000 per link solution, is now aiming down market with their newest 60GHz wireless...
Favorite Wireless Manufacturers 2019 on Jun 12, 2019
Many wireless options exist for video surveillance but how are integrator's overall favorites? 170 integrators answered the question: What is...
AI Video Tester Released on Apr 02, 2019
IPVM has released the world's first AI video tester that lets you see how various AI models (including from Amazon, Google, Microsoft and YOLO)...
Cambium Wireless Video Surveillance Profile on Mar 27, 2019
Cambium Networks, spun out of Motorola Solutions in 2011, says "outdoor durable radios are in their DNA" and they are targeting video surveillance...

Most Recent Industry Reports

JCI / Tyco Security Products Layoffs on Jun 05, 2020
Johnson Controls / Tyco Security Products has confirmed COVID-19 related layoffs, expanding upon the April coronavirus cuts the company previously...
EyePark Presents Mobile Driver Authentication on Jun 05, 2020
EyePark presented its long-range QR code parking verification platform at the May 2020 IPVM Startups show. A 30-minute video from EyePark...
Bleenco "Under The Tongue" Temperature Detection Examined on Jun 05, 2020
"Say aah", says Bleenco, a PPE detection video analytics company, offering a different method for measuring body temperature with a thermal...
Hikvision and Uniview Entry Level Thermal Handheld Cameras Tested on Jun 05, 2020
While most screening systems cost $10,000 or more, manufacturers such as Hikvision and Uniview have now released handheld models for $1,000 or...
Sequr Presents HID based Cloud Access Control on Jun 04, 2020
Sequr presented HID based Cloud Access Control at the May 2020 IPVM Startups show. Inside this report: A 30-minute video from Sequr...
VergeSense Presents People Tracking Sensor on Jun 04, 2020
VergeSense presented its people tracking sensor and social distancing insights at the May 2020 IPVM Startups show. A 30-minute video from...
FLIR A Series Temperature Screening Cameras Tested on Jun 04, 2020
FLIR is one of the biggest names in thermal and one of the most conservative. While rivals have marketed fever detection, FLIR has stuck to EST...
"Fever Camera" Show On-Demand Watch Now on Jun 03, 2020
IPVM has successfully completed the world's first "Fever Camera" show. Recordings from both days are posted at the end of this report for on-demand...
Cobalt Robotics Presents Indoor Security and Access Robots on Jun 03, 2020
Cobalt Robotics presented indoor security robots at the May 2020 IPVM Startups show. Inside this report: A 30-minute video from Cobalt...
Dahua Sues Ex-North American President, Says Legal Typo on Jun 03, 2020
Dahua's former North American President Frank Zhang claims he is owed almost $11 million but Dahua counter claims it is just a "scrivener's error",...