Dedicated Vs Converged IP Video Networks Statistics

By: IPVM Team, Published on Sep 12, 2017

'Convergence' has been a major industry theme for many years. All organizations have IP networks today with laptops, tablets, phones and more running on them.

But how many actual IP video surveillance systems are running on converged networks with those other devices? There are definitely pros and cons as we explained in our Converged vs. Dedicated Networks For Surveillance Tutorial.

Now, IPVM has the stats on actual usage based on ~150 integrator responses. Their comments, and our analysis of trends in preferences are in this report.

'***********' *** **** * major ******** ***** *** many *****. *** ************* have ** ******** ***** with *******, *******, ****** and **** ******* ** them.

*** *** **** ****** IP ***** ************ ******* are ******* ** ********* networks **** ***** ***** devices? ***** *** ********** pros *** **** ** we ********* ** *** ********* **. ********* ******** For ************ ********.

***, **** *** *** stats ** ****** ***** based ** ~*** ********** responses. ***** ********, *** our ******** ** ****** in *********** *** ** this ******.

[***************]

Results ********

********* ******** *** ** video ************ ******* ******** by **** **** * to *, ** ***** below: 

*******, ********* ******** **** **** common ** ****** ************* with ****** ****** ****** so *** ***** ****** of ******* ******* ** converged ******** ** ** least **** ****** **, if *** ******, **** ***** on ********* ********.

Slow ******** ***** ****

** **********,** ****, *** ***** was **% *** ********* vs **%*** *********. ***** *** gap *** ******, ** has *** ****** **** over **** * **** period.

Dedicated ******* *** - ********* ** *********

******** ********* **** ** departments *** *** *** reason ****** *** ***** dedicated ********. *********** ****** that ********* ******** ********** concerns **** *********/**********, *** made ** ****** *** them ** ***** *** troubleshoot:

  • "***** **% ** ***** surveillance ******* * ****** are ** ********* ********. The ****** ** *** target ****** ******** *** use ** ****** ********* networks. *** ****** ******* includes ********** *** *** Banking ******** , ***** require **** ****** *** dedicated ********."
  • "***% ********* ******** *** performance *******"
  • "********* ********. ********* **** bad ********** **** ********* consumption ** ***** ******** and **** ** ***** that ***** ****** *******."
  • "*********. ** ********** **** not **** ********** ********* on "*****" ********* ********"
  • "**% ***** ** ********* networks. ** *** ******** installing ********** ******* *** the ****** *** ** managers *** **** ** keep **** ********* *** the ********* ***."
  • "**% *** *********. ** like ** ******** *** selves **** ********* ****** and *****. **** ****** for ** ** ****** to *** ** *** trouble *****."
  • "***** **% ** ********* network. ****** ***** *******, maintaining, ** ******** **** IT ********."
  • "** ** ****** ** deploy * ********* ******* and *** **** ** deal **** * ******** IT ******, *******, ** previously ******, **** ** an *****."
  • "**** ****** ***** **% are ** ********* ********. It *** ****** **** easier ** ******** **** a ********* *******, ***** to ******* **** ****** pointing."
  • "**% ** *** ******* our ** ********* ********. We ** **** ** there ** ** ****** pointing *** ** ****** us ** **** ****** since ** ***'* **** to **** *** *** customers ** ********** ** spin ** * ******* port **** *** ******** team ***** ** *** more ********."

Dedicated ******* *** - ********* ******** 

********* ******** **** **** associated **** ********* ********/********** in ******* *** ******* potential. **** *** * new ***** **** ****, when ***** ******** ********* was ********* ***-********:

  • "****** ***% ********* ********, primarily *** ******** *******, but **** ** ***** bandwidth ********* **** ** departments."
  • "********* **% *** **** Security ********."
  • "*********... ******* ********* *** security ********** ********** ********"
  • "**% (********** *****) ********** dedicated - ****** *** small ******* *** **** secure ***** ***** ******* often *** *** ** Dahua-based ****."
  • "**%, ****** ********* ******* for ******** *** *********."
  • "********* ******** *** ******* the **** ** *** network **** *** ********* attacks, ***** **** ****** it ****** ** ****** and ************ *** *** to *** **********."
  • "**% ** *********. **** prone ** *****'*/*******."
  • "**** ******** ********* *** always ** * ********* network."
  • "****** **** ** *** deployments *** ** * dedicated ******* *** ******** and ********* ******"
  • "***** *** ******** *** highly ******, ** *** dedicated *******"

** **********, **** *********** / ********* *** ****** increasingly ******* *** ***** cost ******* ******* **** poor ***** ******** ***** records ** * *** to ****** ***** ** those *******.

Dedicated ******* *** - ********* *****

**** *********** ******** ********* dedicated ********, *** ***** them ** ***** **** prohibitive ** *** ***********:

  • "********** ********* ******** *** rare, *** ** ***** and *********** ** ******* WiFi/IoT ****** ** **** networks. **** **** *%."
  • "**% ** ********* *******, due ** ********* ******* by *** ******** ** implement * ********* *******"
  • "***** *%. **** *** of *** ********* ** not **** ** *** for *** ********** **** of ********** *********. **** would ****** *** ***** own *** **** ***** own ** ******** **** ownership ** **."
  • "***** *** ** *** willing ** ***** ********* and ******* ** *** high ******, ** *** converged ******* ** ****** capital *** *********** *****."
  • "** *** ***** ***** we ***** ****** *** own ******** ******* *** typically **** ***'* ******** due ** ****."
  • "** ** ****** ** deploy * ********* ******* and *** **** ** deal **** * ******** IT ******, *******, ** previously ******, **** ** an *****."
  • "**% ** *** ****** systems *** ** ********* networks. ** ****** ** quote ***** ** ********* but **** ******* ******* due ** ****."

Robust ********* ******** **** ******

******* *********** ***** **** converged ******** **** ******, generally *** ** ******* availability ** ****** ********* and ******* ** ***********:

  • "****** *% ** *** vms ********* ** ******* are ** * ********* network. **** ** *** customers **** ****** ******* infrastructures **** ********* ** place *** **** *** model ** ******** ** be ****."
  • "**% ** **** *** dedicated ******** ** ** have **. ** **** if *** ***’* **** the ******** ********* *** have **** ** ******* in *****."
  • "**% *********. **** ********* use ***** *** ******* infrastructure *** ****** ** manage *** ******** *** the ******* **********."
  • "**/**, ***** ****** ** a ********* *** * lot ** ******** *** mandated ** ******** ** use ******** ************** *** have ***** ** ***** manage *** ******."
  • "**% (********** *****) ********** dedicated - ****** *** small ******* *** **** secure ***** ***** ******* often *** *** ** Dahua-based ****. **% (********** trend) ** ****-********** *******"
  • "*********. ** *** * networking ******* *** ******* that ******** *** ******* of ******** *** ***** of ******* *** ****. We ****** *** ** leverage ******** ************** ** deployments."
  • "**% ********* *** **% dedicated. ********** ******* ********** have ***** *** ******, pricey ******* ** *****. As ****, **** *** less ******** ** ****** twice."

Larger ************* ***** *********

****** ************* / ******* clearly ****** ** ***** converged **** ********* ******** since *** **** *** complexity ** ******** * dedicated ******* ****** ****** footprints / ********* ** much **** ****** / complicated:

  • "**** ***** ************ * work **** ******** ***** existing ******* **** *** infrastructure ** ******* *** security ********* ********* *******."
  • "**** ******. **** ** our ******** **** ***** in ***** ************ *** have ******* ******** ***** switches *** ********* ***** rackspace."
  • "****** ******* ********* *** on *** ********* ******** network **** ********* *****, as **'* ********* *** cost ********* ** ******* a ******** ******* ** the ********."
  • "********* ** *****, ******** sites ***** *** **** to *** **** ** cabling ** *** ***** it *** *** ******."

** ********, **** ******* organizations ** ******* **********, it ***** ** ** relatively ****** *** *********** to *** *** ***** number ** ****** ********* for *** ******* / surveillance ******.

Potential ***** ******* **** *********

******** ** ****, ******* gigabit ******** *** **** cheaper *****, *** *********** the ******* *** *** corporate ** *******. ***** switches **** ******* ** VLANs, *** ******* **/ Security/Telephony *** ** *** same ******** ******* **** more ********* **** ** was ** *** ********* of *** ******. **** may ******* *** ******** in ********* ******* *****, *** shift **** ******* ****** converged ******** ** *** future. 

Remote ****** ** ***? **** **********

**** ****** *** *** ask / ******** **** percentage ** ********* ** video ************ ******** ***** ****** access *** ****** *******. We **** ** ***** this ** ** ******** survey.

Comments (15)

I was excited to read this post, in my wheelhouse sort of so I have a little subject matter expertise.  While I cannot disclose details just imagine a very LARGE ENTERPRISE of thousands of locations and north of 100K cameras.

While a dedicated IP Camera Network was a good practice back in the day before cyber concerns, now what it leaves you in most cases is a Unmanaged Network which can present a even bigger challenge.  It all depends on how you look at it, ease of deployment vs cyber security.  Bandwidth challenges can be overcome since most VMS platforms can utilize some form of local storage in most cases if needed, it all depends on the use case for surveillance and the IT/Business Requirements.

The question is how do you manage and patch all of the devices connected to that unmanaged switch?  You don't unless you have the luxury of using the Switch Configuration Port remotely on a secure WAN.  Now you have potentially tens of thousands of IP Cameras that you cannot patch with ease, you either rely on the VMS platform to provide some sort of camera management utility or you do truck rolls to each location to connect the dedicated network and push patches.  Oh wait, I cannot let the Integrator plug their non-whitelisted computing device into the PoE Switch any longer because of new Policy for cyber concerns, Houston we have a problem!  In my world that mean I am potentially not in compliance with Policy and that is a NO NO!

Here lies the problem, you must depend on the VMS platform to close the gap, this goes for both managed and unmanaged networks.  While we all want a single IP Camera manufacturer to minimize the patching effort that is mandated by Policy, it is not always the case.  Now you have say three manufacturers that you must deal with, that means three separate camera utilities to play with across the Enterprise, this is where the VMS can close the gap and manage those updates from a single UI that is already connected to those cameras. 

Even using say the Axis Camera Management tool (which is pretty darn good btw) you have limitations with things like camera discovery across subnets unless the VLANs are done right, and even with that broadcast traffic from bonjour could be blocked.  The VMS platform can bridge this gap, it likely already discovered the cameras and has an address book.  VMS manufactures just need to make an investment and create a Universal Enterprise Camera Management Utility that can does more than just discover and connect camera, the tools are in many cameras SDK's, many of these things are beyond the standard Image/Recording Settings most deal with today.

A few things Enterprise Organizations need to press the VMS manufactures to do to step it up.

  • Enterprise Device Discovery
    • IP Address assignment in batch by device MAC
  • Enterprise Camera User Management
    • User ID Management
    • Password Management
    • AD/LDAP
  • Asset/Device Management
    • What type of device
    • What type of OS/Version info
    • Patch History/Drift Management
    • Baseline Configuration/Drift Management  
    • uptime since last reboot/restart
  • 802.1x Certificate Management between VMS and IP Camera
  • Firmware/Patch Management
    • Universal tool to push updates to camera connected to Enterprise

Just a few things to mull over, please feel free to chime in and tell me what you think, I am very interested in feedback on how others attempt to tackle this challenge without hiring a FTE just to maintain and patch the IP Cameras.  Even if its a FLAT Managed Network it still takes a ton of resources to do patching and making sure Policy in enforced so it makes sense to find a single UI to do all if this. 

 

IP Address assignment in batch by device MAC

Does this mean you want the VMS to act as a DHCP server?

Brian,

Not necessarily a DHCP Server but that would be a nice to have I am sure for some folks but not applicable to my application.  I would like to see enhanced enterprise tools to manage the devices IP address remotely via a single UI/common platform.  It could be similar to how a tool like Axis Camera Manager does IP addresses after discovery with some tweaks.  With a ever changing network topology and configurations its becomes necessary to have enterprise tools to manage the devices with minimal effort and manpower.

I like the way you think!  I will be bringing this up with my preferred VMS at ASIS in Dallas but I have a feeling that they will already know about your post as most security manufacturers of any size at all are members of IPVM (at least that is my experience).

It only makes sense for a VMS to have this feature.  Certainly would help to establish the need to standardize and truly manage and maintain the system as an enterprise.  

This WILL become a feature in the near future, I am convinced.  Which VMS will be the first?

Good article. I am happy with the converged network what we have.

While we are currently on converged network with close to 1000 cameras, the suppliers keep insisting us to move to dedicated network whenever we complain that few cameras are not recording properly. There is absolutely no conflict with IT department and they are always ready to do the changes as per our supplier's recommendation. Their monitoring system shows that more than desired bandwidth is available and proper QoS is done. Suppliers keep giving funny reasons to separate the network such as security, bandwidth, better management etc etc whenever we complain of distortion in the recording.

I fail to understand why they are not trying to resolve the real issue rather than pin pointing on other things.

When you don't "own" the network it is not easy to troubleshoot issues.  We always recommend dedicated networks.  This way there is no finger pointing between IT and security. Also in our world security might have an issue where they need a camera installed right away and IT might have other things more important to do.  When we have our own network we can get cameras installed as fast as security needs them. 

We always recommend dedicated networks.

Do you recommend even viewing clients sometimes be placed directly on the security network, maybe thru dual-NICs?

Does this mean that if there is absolutely no conflict or ownership or priority issue between IT and Security, converged network is fine. What I understand from your response is that it is convenience and non-technical reasons to go for dedicated network.

If it is dedicated to video viewing only and no WAN access is needed then yes it would get installed on the dedicated security LAN and/or VLANd for a dedicated client network. All depends on what the client machine is being used for. If the client machine needs to have WAN access I would normally recommend the IT department to handle it with the client on their network.  

I would like to note that security is not a Pro dedicated network thing.  More than likely the connection points are not monitored and anyone can jack in without notice.  If IT notices someone on the dedicated gear they might not think anything of it since it's not theirs.  Firmware updates are not typically done on the dedicated equipment.

Dedicated can be secure, but it offers different security (physical to the primary network only!).  The lack of that physical link does not mean it is secure or even more secure.

 If IT notices someone on the dedicated gear they might not think anything of it since it's not theirs.

Even worse, a lot of times IT isn't capable of thinking. Usually when IT is also Advertising, or sales, or HR.......

"Converged. We are a networking company and believe that networks are capable of handling the needs of cameras and data. We always try to leverage existing infrastructure on deployments."

I smell whatcha stepping in.

In today's scenario many applications are integrated with dashboards, incident management, HR/payroll etc where data from security system has to flow in/out. In case security is compromised for one network, it does not guarantee that other network will be completely safe.

I still do not see a strong technical reason for separating network.

I still do not see a strong technical reason for separating network.

What about bandwidth?

In current scenario: On fiber network with fiber slots on switches & routers, ample bandwidth is available even to run cameras on HD/4K. Another point, usually IT applications does not consume bandwidth in gigs so most of the bandwidth is available for cameras.

In the past it used to be issue when we were having bottleneck on switches with copper slots.

Read this IPVM report for free.

This article is part of IPVM's 6,445 reports, 867 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Converged vs Dedicated Networks For Surveillance Tutorial on Feb 12, 2020
Use the existing network or deploy a new one? This is a critical choice in...
Video Surveillance Cameras 101 on Feb 25, 2020
Cameras come in many shapes, sizes and specifications. This 101 examines the...
Video Surveillance Architecture 101 on Feb 18, 2020
Video surveillance can be designed and deployed in a number of ways. This 101...
Favorite Video Analytic Manufacturers 2020 on Feb 25, 2020
Video analytics is now as hot as ever, driven by the excitement of advancing...
Video Surveillance History on May 06, 2020
The video surveillance market has changed significantly since 2000, going...
NetApp Presents Hybrid Cloud Video Archive on May 11, 2020
NetApp presented its hybrid S3 cloud video archive at the April 2020 IPVM New...
VMS 101 on Mar 03, 2020
This guide teaches the fundamentals about video management...
NetApp Video Surveillance Profile on Mar 09, 2020
NetApp is increasing its efforts in video surveillance and told IPVM...
The Next Hot Fever Detection Trend - $100 Wall-Mounted Units on Jul 06, 2020
The first wave of the booming fever detecting market was $10,000+ cameras,...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
Video Surveillance Business 101 on Mar 30, 2020
This report explains the fundamental elements of the video surveillance...
Video Analytics 101 on Mar 16, 2020
This guide teaches the fundamentals of video surveillance...
Glossary / Acronyms for Video Surveillance on Feb 10, 2020
This directory provides definitions and explanations for over 90 common video...
Vivotek Presents AI Analytics and LPR on May 19, 2020
Vivotek presented its AI Analytics and LPR at the April 2020 IPVM New...
IronYun AI Analytics Tested on Feb 17, 2020
Taiwan / US startup IronYun has raised tens of millions for its "mission to...

Recent Reports

Genetec CEO Declares "We Don't Negotiate Payment With Patent Trolls" on Aug 11, 2020
Are patent trolls like terrorists? Genetec's CEO is coming out strongly...
Hanwha AI Analytics Camera Tested on Aug 11, 2020
Hanwha has released their Wisenet P AI camera, adding person and vehicle...
Alabama Schools Million Dollar Hikvision Fever Camera Deal on Aug 11, 2020
The Baldwin County, Alabama public schools purchased a $1 million, 144-camera...
Dahua Taunts Australian Government, Continues To Sell Illegal Fever Cameras on Aug 10, 2020
Dahua is effectively taunting the Australian government by continuing to sell...
HID Releases VertX Replacement Aero on Aug 10, 2020
HID is replacing two established and broadly supported types of access...
NDAA Compliant Video Surveillance Whitelist on Aug 10, 2020
This report aggregates video surveillance products that manufacturers have...
Telpo China Temperature Tablets Tested on Aug 10, 2020
The provider for overseas companies ranging from Canon Singapore to US'...
Dangerous Hikvision Fever Camera Showcased by Chilean City on Aug 07, 2020
Deploying a fever camera outdoors, in the rain, with no black body, is...
"Grand Slam" For Pelco's PE Firm, A Risk For Motorola on Aug 07, 2020
The word "Pelco" and "grand slam" have not been said together for many years....
FLIR Stock Falls, Admits 'Decelerating' Demand For Temperature Screening on Aug 07, 2020
Is the boom going to bust for temperature screening? FLIR disappointed...
VSaaS Will Hurt Integrators on Aug 06, 2020
VSaaS will hurt integrators, there is no question about that. How much...
Dogs For Coronavirus Screening Examined on Aug 06, 2020
While thermal temperature screening is the surveillance industry's most...
ADT Slides Back, Disappointing Results, Poor Commercial Performance on Aug 06, 2020
While ADT had an incredible start to the week, driven by the Google...
AHJ / Authority Having Jurisdiction Tutorial on Aug 06, 2020
One of the most powerful yet often underappreciated characters in all...
SIA Coaches Sellers on NDAA 889B Blacklist Workarounds on Aug 05, 2020
Last month SIA demanded that NDAA 899B "must be delayed". Now that they have...