Using Fiber Optics for Surveillance

Author: Ethan Ace, Published on Dec 07, 2011

In using fiber for surveillance applications, there are typically two scenarios that users must address: backbone between two switches and directly to the camera. In this update, we'll address the separate concerns of each, and provide our recommendations.

General Fiber Limitations

** ********* *****, *** *********** ******** **** **** ** **** is ******* ** *** *****-**** ** ******-**** *****. *****-**** ** more ****** ** ****** ************, ** ** ** **** *********, but *** * ******* ******** ** ***** **** *** ******* Ethernet, ** ***** *** *** ******* ******. ******-****, ** *** other ****, ** **** *********, *** *** ******** **** ** kilometers, ********* ** *** ******** ****, ****** ** *** **** choice ** **** ************. 

** ***** ******* ***********, ** ** *** **** *** **** of ***** **** ** ******, *** **** ** ********** *** equipment, ** ****, ***** ****** *** ***** ***. *** ************, ******-**** is ****** *** ****, ****** ********** ******* ** * ********* infrastructure ****** *** ********* *****-**** *** ******. 

Connecting *******

**** ********** ******* *******, ***** ** ***** *** **** ******. In ***** *****, *** **** ****** *** ** ******* *** camera ** ** *** * ***** ********* ** **** ***. This ******** *** ********* **********:

  • *****, ****** ***, ***** *** ****** ***** **** ********, ***** fiber ***** ******** ***** ** *** ****** ***. ** **** locations ***** ******* *** *********, **** ** ** ***** *****, power ** ******* *********, ****** *** **** * *********** ** provide ******* *******. ** *********** **********, ****-*** **** ******** *********** ******, ***** ** *********** * ***** ***** **** ****** ***** conductors ** ******* *** ** *** *** ***.
  • ******, *** ** ****** **********, ** **** ** ** ** the **** *** ** *** ***** ***. **** **-***** ***** are ****** ** ********** ***** ********** ******* **** ****** ** managed **** *** **** ********* ** ***** ********. ** ***** cases, ** *** ** ********** ** *** * ***** ****** instead ** * **** ** ***** **********. ********** ********, *******, this ** * **** ********* ******.

**** *** *******, *** **** **** ***** *************, ***** ****** fiber ******** ************. ** ******* **********, ** ***** ********** *** **** for *******, *** *** ***** *** ********* ** ** ********* at *** **** ** ***** ********, ********* **-******* ** * power ****** *********. *** **** *** ***** *** ********* ** a **** ***** ***, ***** ******** * ******* ************ *** easier ****** ** *******. **** ***** ******* **** ******** ***** a ***** ******, ******** *** ****** ** ******* ******** ** the ****.

***** *** * ****** ** ****** ********* ** ***** **********:********** ********,**********,******, *********** *** *** ***-****. ***** ****** ****** ** *** $***-*** *** a ***** *********, ** **** ** ** *************** ******** **** is ********.

Connecting ********

*** ****** *********** ** ***** ***** ** ****** ** ********** two ******** ** ******* *********. ***** ****/***', *** ******* *** be **** *** ******** ******* ******** ******* *****. ****** ****, however, ***** ** ******** ****. ***** ***** ********** *** ** used, ** ********* *****, ********* **** *** ***, ****** *** SFP ************ *******.

**** ************-***** ******** ***** *** ******** **** *** (***** ****-****** pluggable) *****, ***** ****** * ***** ***** *********** ***** ***** the ***** ** *** ***** *********. *********, *** ***** *** simply ********** ** ****** ***** (** *** ****** ** *******), and ****** *** ********* ******* *** *** ********. **** ******* simplifies ************, ***** ** ******** ******** ** ********, *** *** ports *** ** ********** **** *** **** ********* ** *** other ****** *****.

***** ****** ****** ** *** $**-*** *** * ******* *** module, ******** **** **** * ***** *********. ******* **** *** single-mode ***** *** *********** ************ (**** ** ***** **** *** SONET ***** ** ****** ***** ************) **** ** ****** ******** higher, *** *** **** ** **** *********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

HID Edge EVO Tested on Jun 07, 2017
HID Edge controllers have been one of most common offerings in IP door controllers for years. The new generation is called Edge EVO. We tested...
Arlo Go Cellular Cloud Camera Tested on May 23, 2017
Totally wireless surveillance cameras are growing but almost all typically depend on a hub and local Internet access. However, many outdoor...
Selling and Valuing Security Integrators on May 12, 2017
This ia a tutorial in how to (1) determine your security integrator's value and (2) to sell your security integrator. If you own an integrator,...
Alarm Circuits Guide on May 09, 2017
Alarm circuits are a fundamental element of wired burglar systems. Designing the alarm circuit greatly affects its performance. In particular,...
Smartphone Controlled Kevo Lock Tested on May 04, 2017
Smartlocks are a growing market, with millions sold. Kwikset's Kevo is one of the most common choices, using the Unikey smart phone access control...
Duress Codes For Alarms Systems on May 02, 2017
An alarm system can call for help in the event of an attempted break in, but only if it is armed. If an adversary forces an authorized user to...
Hack Your Access Control With This $30 HID 125kHz Card Copier on May 01, 2017
You might have heard the stories or seen the YouTube videos of random people hacking electronic access control systems. The tools that claim to do...
Last Day - IP Networking Course May 2017 on Apr 26, 2017
Today is the last day to register for the May IP Networking Course. This is the only networking course designed specifically for video...
Xandem Next Gen Intrusion Tested on Apr 26, 2017
Xandem's "full coverage motion tracking technology" is unlike any intrusion technology we have seen. We bought their new system and tested it...
IPVM First Dean's List W2017 - Thomas Atkinson, Matt Hurly and Fredrik Lundqvist on Apr 24, 2017
IPVM is happy to congratulate and celebrate our first "Dean's List", the top students in our courses. For the Winter 2017 IP Networking course...

Most Recent Industry Reports

Avigilon Announces RADAR-Based Presence Detector on Jun 22, 2017
RADAR is gaining momentum within physical security. Two months after Axis announced a network radar detector, Avigilon has announced a RADAR-Based...
Covert Cloud Camera Service Launching (KJB) on Jun 22, 2017
Cloud IP cameras, for consumers, has become increasingly commonplace. However, covert cameras, lag there, with few options. Now, North America's...
Manufacturers Shipping Unlicensed H.265 Products on Jun 22, 2017
While H.265 support in video surveillance is growing, IPVM's research shows that most surveillance manufacturers are shipping H.265 products with...
Uniview Low-Cost Bullet PTZ Tested on Jun 21, 2017
Uniview is offering a HD zoom bullet camera, the IPC742SR9-PZ30-32G, with an integrated pan / tilt positioner, for the price of a low-cost...
QSR Video Surveillance Best Practices on Jun 21, 2017
Fast food restaurants or QSRs (quick service restaurants), are frequent victims of crime and fraud. Because they are open late, deal with cash, and...
45 Drives 'Lowest Cost' Enterprise Storage Company Profile on Jun 21, 2017
45 Drives claims the "lowest cost per Hard Drive Slot in the industry." But who or what is '45 Drives'? What started as a product design to...
No Hack, Still Liable, Court Finds ADT on Jun 20, 2017
Recently, ADT has been in the news for a $16 million settlement for a cyber security vulnerability class action suit. One of the most important...
Resolver / PPM 2000 Incident Management Platform Profile on Jun 20, 2017
You might have seen the company whose employees wear hockey jerseys at trade shows and wondered "what do they do?" PPM 2000 has been active in...
Axis P3225 Mk II Tested Vs. Original on Jun 20, 2017
Axis has released a number of 'Mk II' versions of their cameras, which are the same fundamental camera but with specific improvements. We tested...
Directory of 40 IP Camera Manufacturer Discovery Tools on Jun 19, 2017
Locating the IP address of a DHCP client or factory defaulted device on a network is often a difficult task.  In another report, we discussed...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact