Converged vs Dedicated Networks For Surveillance Tutorial

By: IPVM Team, Published on Feb 12, 2020

Use the existing network or deploy a new one?

This is a critical choice in designing video surveillance systems. Though 'convergence' was a big theme of the past decade, deciding what to do has been much harder in practice.

** **** *****, ** break **** *** *** factors ** **** ********, pro *** ****, *********:

  • ********* ******** *********
  • ********* ******** *********
  • ** ** ******** *********
  • ******** ********
  • *********
  • ******* ******* / ***
  • ********* *********
  • ********* ********** & ****** Size
  • ******** ********
  • ******* *********** *****
  • ********* ** ********* **********

Converged ********

********* ******** ***** ******* resources ******* ******* ******** like ************ *******, **** telephones, ** **** ** general **** ******* **** email, ******** *******, *** more. **** *** ** beneficial **** * ********* standpoint **** ***** *** existing *** ***** ********* for *** ******** ** surveillance *********, ******* ***** will ** ********** *** resources. *** ************ ***** demonstrates *** ******* ** varied ******* *** ******** sharing ******* *********.

**** ******** **** *** designed ** ****** *** demands ** ********** ***** surveillance *********. **** ** a ****** ********* ** surveillance ***********.

******* ** ****, ****** surveillance ** ** ******** network *** ***** *********** operational ********, *** **** notable ***** *********. *** this ******, **** ****** dedicated ********.

Dedicated ********

**** ******* **** ***** own ********* ******* **** will *** **** *** same ********** *** ********* since *** ************ ********* will *** ** ******** on *** *** ***. Dedicated ******** **** **** more ** **** **** require ***** *** *** of *********.

*** ************ ***** ***** surveillance ********* *** ***** systems *** ********* ** their *** *** ** a ********* *******.

IT ** ******** *********

*** ** *** ******* factors *** ****** ** do **** ****** ******* infrastructure ** ********, *** politics.

** ** *** ******** are *** ******** ***********, which ** ******, ****** can *****, ********** ** the *** ****** ** not ***** **** *****.

*** '***** ****' *** unfairly ****** ******* ** surveillance **** ** ******** for ***** ******. ********** when ** **** *** have * *** **** in ****** ****** *** selection ** ******* ******** equipment, *** ***** ****** can ** ******* ** the **** ***** ** many ********.

**** * ******** *******, the *********** ** ********* is ********. ********* *********** problems *** ******* *** physically ********, ** *** 'blame ****' ** ***** system ** ******* ******** can ** *******.

*********

****** * *** ******* to ** ******** ****** may **** ****** ****** on ***** ************ ** the *******, **** ** email ** ****, ***** total ***** ********** ** only * ******** ** typical ******* ********. *******, dozens ** ******** ** cameras ****** ********** * facility ** ****** *** overload ******* ************** ***** average ******* ** **** and ******** ***** ******* run ************.

*** ******* ********* ** a ********* ******* **** not **** ** ***** bandwidth. ******** * ********* network *** ************ ****** removes *** ****** ** available ********* ** ****** more ********. *** ******** essentially ***** **** ** cost ** **********, **********, and *********** * *** video-only *******.

*** **** *********** ** bandwidth ****** *** ************ ******************.

VSaaS / *****

***** ************ ** * Service (*****)********* ******** * ********* network ** ****. ********** of ****** (***** ****** in *** *****), ******* video (***** ****** *******) or ****** **********, ***** will ******* ******** ************, and ** **** ****** to ** ********* ** a ********* ******* *****.

************, **** ***** ******** may **** **** ** a ********* *****, **** full ********** *** *******, which ******** *** ****** and ****** ** ** on *** **** ***. Using * ********* ****** network, ******* ** *** main/general ******* ***** *** only ***** ********** "******" streams.

Quality ** *******

** ********* ** *******, concerns ***** **** ***** dropped ** ******** ******** unavailable ****** ** *****. Overloaded ******** *** ****** a ********* *** *** kinds ** *********** ******, both ****, ********, ** unfairly *******.

*** ***** ************* / complexity ** *************** ** ********** ********* ******** ***** at *** ******* ** need **** ******** *** administration ***** ** ******* it. ** * ******** lacks ******, *** ****** of ***** ************ ** other ******* *** ** negative *** *********.

**** * ********* *******, only ***** ** *******, and ***** ** ** fighting **** ***** ******** for *********. *******, **** again ******** *** ********.

Technical *********

** **********, ******** *** range **** ****** ** very ******* **** ** outward *****. *** **** that ********** *** ********* plays ** ******** * surveillance ******* ** ********* different.

***** * ****** ******* to ****** *** **** traffic ***** ***** ** they *** **** ** leverage **** ******** ** managed ******** *** *** network ************* ****-***. *********** 'Quality ** ******* *** VLANs *** ** * practical *** ********* ****, but **** **** ********** by ******* ***********. ******* this ***** ** ************* is ****** ******** *****, and ****** ****** ******* the ****** ********** ** network **************.

** *** *** *******, a ********** ******* ** generally ******* ** ****** and ******** ******* ** handles **** *** *** system ****. *** **** is *** ***** ** configuration ****, *** *** actual ******** ****** ** simpler *** ******* ****** a ****** ******* ******. 'Plug *** ****' ******** with ******* ************** *** commonplace ** ********* ***** networks, **** **** ****** IT ***** ** ****** integrators *** ****** **** and ******** **** **** little **********.

Expansion ********** & ****** ****

** *******, *** ***** and **** ** *** network ** * *** consideration. *** ******** ******** multiple ********* ** ******** sites, *** ************** ********** tying **** ******** *** be * **** ******* and ******** *********** ******* to ******** ***** ** cable ***********.

**** ************* **** ******* invested ** ******** ********** multiple ********* *** ******** together, *** ********* ***** or ******** ***** ******* are ** **********. ********, those ***** *** ***** planned **** **** *********** of ****** ********* ** mind. *** *********** **** of ****** ***** *** be ********** ***********.

*******, *** ********* ********, this ***** ******* *** cables ******* *********, ***** can ** ********* ********* or *********. ** **** cases, ********* ******** **** a ******** *********.

Security ********

*** *** *** ***** or ********* ***** ********* network ******* **** ** a ****** *******. ********** separating ************ ******* ** its *** ******* ***** it ****** ** **** access **. ********, ******* access ** ***** ***** explicitly ******** ****** ** the ******* *** ******* that ******* ****** ** easier. *** **** *********** check *** *** ****** on************* *** ** ***** Surveillance.

Dedicated ******* *************

**** ************ ********* ** installed ** * ********* network ** ******* **** difficult ** ****** ***** it ** *** ** the **** *** ** an ************* ***** *********. To ******** ****, *** servers *** **** *** often ******** **** **** than *** ******* *********, with *** **** ** connect ** *** ****** LAN *** ******* **** to ******* ** *** facility's ******* *******. ***** this ******, ******* ** the ********* *** *** inaccessible ** *** **** network, *** ***** *** be ****** *** *** NVR.

***** ********* ******** *** also ******* ********** *********** and ************* *** ****** access, ** **** **** for *** ******* ******* may *** **** * route ** *** ****** network. **** *** ******* a ******** *** ***** or *** ** ***** connectivity ** *********. *** more *********** ***** *** the****** ******* ****** *** Video ************ *****.

Ongoing *********** *****

*** ******* ** *********** either ****** *** **** as ****, *** ****** a *** ******.

*******, *** ******* ******* of * ********* ******* is * ******** ** programmed **** ******* *********** and ****** ** *** users. ******* *** ******* operational ** * ******** for ** ***********, *** having ***** *** * converged ******* ********* ********** the ******* ** ******* maintenance.

*******, *** ********** *********** of ******* ******* ** grudgingly ******** ** ******** ignored. ***** ***** *********** and ******** ****** *** be ********* ** ********* a ********** *******, ******* it *********** ** ******* responding ** ****** *** be * ******* ****.

*** ******* **** ** a ********* ******* ** that ****** *********** *** upkeep *** ** ******* or **** ** ***** addressed. ********* ** *********** at **** **** *************** problems ** ****** ********* outside ** '***** *******' is * ****, ** well ** * ********** to **** *** ******** vendor *** ******* ** 'minor ******' ** **** might **** ******** ******** once ** ***** *** year.

Integrator ********** **********

** *** *******,*********** **** * ****** preference *** ********* ********* surveillance ********, **** **** * converged ****** ** ********.

Comments (9)

****** **** *** ********* networks.

* **** **** ****** in **** ** ******* all *** ********** ** the ****/**** ** ******* design. ** *** *** of *** *** ** integrator *** *** ************** to ****** *** ******** of *** *******. **'* the ******** *** **** chose ***** **** ** take ***** ** ***** involvement ** *** ******, implementation *** *********** ** the ******.

**** *** **** ** apply ********* ** * medium+ **** ******* *** firewall ******** *** ******** reasons/standards *** ******** ** to ******** (********) ********.

*** "*********" ****** ** indeed * ******* ****** (all **** *** *****...) - ********* *** **** other ******** ******* **** the *********** *********** ******.

*** **** ******* ** have ******** **** ** cases ***** ******** ** SLA ******* *** ******** and *********** ********.

**** ** ******* ***** a *** ****** *** hackers *** ****, ***** cybersecurity **** ********* ***** a ********* ******* ** definitely *** *** ** go. ******** ********, **** IOT *******, ******* ******** complexity *** ************ ******* all ******* ** ****** a **** **** ********* IOT ******* ******* *** main *******, ******** ******* network ******** *** *** enterprise.

* ********* **** ** the ************** ** *** cyber ****. **** **** not **** ********* ******** :-) ***** ****** *** all ** ************ ** the **** ********.

**** ** ****, *** when ** ***** ** a ******* ********, * network ******** **** **** to ** ********* * VLAN, "..*** **** *** velvet **** ** ******* security?"

*** ***** ***** ** hardware, ********* * ****, is **** ****** ******* layer ** ***** ** a ****. **** * VLAN ****** *****, *** you ***'* *** **** disposal **** ******* **** a ****** *** *********** vest.

**! **** **** ** a **** ******* *** it ** ****** *********. There ** * ******* set ** ***** **** to ********** **** ******** and *** *** ********** complex. **** ***** **** to *** **** **** a ****** ********* ******** will *** ** *** way ** ******* ** some *****. ** ******** methods, **** ***** ******* are ********* *** **** the ******* *** ** all **** **** *** actors **** *** ***** path ** **********. ****** there ** * ******* misconfig (********* ****** ********), these ******* *** **** uncommon. ******* ** ***** to ********** ********* *** phishing ** ****** *********** far ****** ***** ***** of ******* **** *** unless ******* "****** *** door ****".

**** ** * *****. :-)

******* ***** * "****** rope ** ********" ** more * ******** ** poor ******* *********** **** technological *******. ** *** vlans *********** ****** *** 120 ********, * ****** enterprise ** ******** *** monitor * ****** ****** network. ******** ******** ******** would ** ********** ** maintain, ******* *** ******. For * ****** ******** a ********** ******** *** may ** ******** ** not ******* *** ****** vlans ** *** ****** enterprise *** *** **** possible *** ********* *** preferable.

*** *** *** **** with *** ** ********** when *** **** ******** packet ****** ******* **** IP ******* *** *** recording ***** ********, *** network ** ********* *******, ICMP ***** **** ****** losses, *** **** ** not ****** **** *** issue ** **** ***** switches ?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

BICSI For IP Video Surveillance Guide on Feb 11, 2020
Spend enough time around networks and eventually someone will mention BICSI, the oft-referenced but only vaguely known standards body prevalent in...
Network Cabling for Video Surveillance on Jan 15, 2020
In this guide, we explain the fundamentals of network cabling for video surveillance networks, how they should be installed, and the differences in...
2020 IP Networking Book Released on Jan 06, 2020
The new IP Networking Book 2020 is a 280 page in-depth guide that teaches you how IT and telecom technologies impact modern security systems,...
Horizontal Cabling for Video Surveillance Guide on Jan 03, 2020
There are a few options when it comes to professionally installing horizontal cabling for video surveillance networks. The three options examined...
Altronix Claims Tango 'Eliminates Electricians' on Oct 15, 2019
Power supply provider Altronix claims its new Tango power supply 'eliminates the need for an electrician, dedicated conduit and wire runs'. In...
Save $50 - Register Now - Spring 2020 IP Networking Course on Oct 10, 2019
Save $50 - Register Now - Spring 2020 IP Networking Course. The course starts next week. This is the only networking course designed...
Siklu $400 Compact 60GHz Radio on Jul 24, 2019
Siklu first entered the video surveillance market with a $6,000 per link solution, is now aiming down market with their newest 60GHz wireless...
Favorite Wireless Manufacturers 2019 on Jun 12, 2019
Many wireless options exist for video surveillance but how are integrator's overall favorites? 170 integrators answered the question: What is...
AI Video Tester Released on Apr 02, 2019
IPVM has released the world's first AI video tester that lets you see how various AI models (including from Amazon, Google, Microsoft and YOLO)...
Cambium Wireless Video Surveillance Profile on Mar 27, 2019
Cambium Networks, spun out of Motorola Solutions in 2011, says "outdoor durable radios are in their DNA" and they are targeting video surveillance...

Most Recent Industry Reports

USA's Feevr Thermal Temperature System Examined on Mar 31, 2020
This US company has burst on to the scene, brashly naming itself 'feevr' and branding itself as a "COVID 19 - AI BASED NON CONTACT THERMAL...
JCI Coronavirus Cuts on Mar 31, 2020
JCI has made coronavirus cuts, the company told employees in an email that IPVM has reviewed. Inside this note, we examine the cuts made, the...
Add Door Operators To Fight Coronavirus on Mar 31, 2020
IPVM recommends that integrators advocate and end-users consider adding door operators to fight the spread of coronavirus. This delivers...
Video Surveillance Business 101 on Mar 30, 2020
This report explains the fundamental elements of the video surveillance business for those new to the industry. This is part of our Video...
FDA Gives Guidance on 'Coronavirus' Thermal Fever Detection Systems on Mar 30, 2020
The US FDA has given IPVM guidance on the use of thermal fever detection systems being marketed for coronavirus, as an explosion of such devices...
Worsen: Integrators Hit Even Harder By Coronavirus on Mar 30, 2020
Integrator's problems have worsened over the past 2 weeks, according to new IPVM survey results. Inside this report, we share statistics and...
Pivot3 Mass Layoffs on Mar 27, 2020
Pivot3 has conducted mass layoffs, the culmination of grand hopes, a quarter of a billion dollars in VC funding, and multiple failures to gain...
Athena CEO Criticizes 'Deplorable' 'Nitpicking', IPVM Refutes on Mar 27, 2020
UPDATE: NBC News Report Cites IPVM On Coronavirus 'Fever Detection' Cameras Athena Security's CEO Lisa Falzone has strongly objected to IPVM's...
Hikvision Admits Sanctions Harming Its Financial Performance on Mar 27, 2020
While Hikvision initially downplayed being sanctioned for human rights abuses, the company is now admitting a significant impact in a new PRC...