Where to Install Headend Equipment

Author: Ethan Ace, Published on Mar 14, 2012

Installing surveillance headend equipment in the wrong location can lead to increased failure rates or tampering. Often little thought is given to this decision, since security systems are frequently considered only after a facility is designed and built. In this update, we will look at the three most common locations where equipment is mounted and the advantages and disadvantages or each. Finally, we give our recommendations on how to best protect equipment that must be located "anywhere it fits".

Arbitrary Placement

Likely the most common location for equipment in small installation is "wherever there's room". This often amounts to locating equipment on or under a desk, on top of cabinets or other furniture, or on a wall shelf. If employees are trusted, and the location is not in view of the public, this is often not a problem. However, it may lead to unforeseen complications if not considered carefully:

  • Security: Most often, when system equipment is arbitrarily placed, no security measures are taken to prevent access to it. This makes it easier for settings to be changed and the systems disabled. If equipment is located in a highly visible location, criminals may easily remove or destroy the recorder, eliminating evidence of their crime in the process.
  • Environment: These locations are rarely chosen with consideration of environmental controls. This could contribute to dust and debris entering equipment fans, or internal temperatures being above recommended operating levels for extended periods of time. As we discussed in our hard drive failure statistics, these are the most common reasons for hard drive failure, increasing the probability that archived video will be unavailable when needed.
  • Access: Placing the equipment in an out of the way location may obstruct access to it when it is needed. This may be a problem, for example, if the recorder must be directly accessed to retrieve video. Connecting the recorder to a network and using remote client software alleviates this problem, at least somewhat, but equipment is still difficult to access for servicing, and this "out of sight, out of mind" philosophy may lead to the system falling into disrepair. 

With Monitoring Equipment

In some systems, users prefer to mount equipment in dedicated monitoring furniture, if a central monitoring console exists. These consoles are often made with rack space built-in. This furniture does not suffer from the same security or accessibility issues of arbitrary placement, as the location is generally secure, and staffed much of the day, or 24/7. Locating equipment in furniture does have its own issues:

  • Environment: While monitoring furniture may ship with rack space, it is not intended to have a rack's worth of equipment installed in it. Often, it is not properly ventilated to handle high heat loads.
  • Noise: Fan noise from equipment may become a nuisance to monitoring staff. VMS servers, which routinely are under mid-to-high server load, may be especially loud.

If either of these two points are issues at the monitoring location, equipment should be moved to a remotely located rack, which provides better thermal management, and reduces noise levels near users.

IT Racks

In facilities where space is available, either in existing racks, or new, equipment should be rack mounted. Placing equipment in dedicated spaces alleviates issues of access, environmental control, noise, and security, or at the very least, makes these easier to manage, since the space is not used for other purposes.

In spaces shared with general IT equipment, issues of physical access to security equipment may arise. Short of installing a dedicated locking cabinet for all equipment, there is little that can be done. Locking plexiglass covers are available, which can prevent access to connections and power switches in some cases, but access to power cords and patch cables may be impossible to completely prevent.

Recommendations

Generally speaking, equipment should be rack-mounted whenever possible, in dedicated IT racks. Failing this, if a monitoring station exists, consider placing equipment there. Ad-hoc placement should be considered as a last resort, only if no other space can be made.

If equipment absolutely must be placed arbitrarily, two considerations may contribute greatly to the system's usability:

  • Enclosures: To improve security and offer some protection from dust and debris, equipment in exposed locations should be installed in some sort of enclosure. Lockboxes and small wall-mount cabinets are available for as little as $50 online, and can prevent access by unauthorized parties.
  • Working height: If equipment must be directly accessed to operate and export video, it should be mounted at a working height of no more than approximately 48". Even if the system is network-connected, and these operations can be performed remotely, this height is a good idea, to make servicing and routine maintenance easier.
Comments : PRO Members only. Login. or Join.

Related Reports

Foolish Strategy: OEMing Facial Recognition on Dec 13, 2018
Almost as 'hot' as face recognition marketing right now is OEMing facial recognition. Last year, they were a who's who of company's with...
Startup Sunflower Labs' Autonomous Drone Security System on Dec 11, 2018
Startup Sunflower Labs is claiming a unique design on a home security system, combining autonomous drones and 'Sunflower' sensors. Imagine an...
Ubiquiti $79 Flex IP Camera Tested on Dec 07, 2018
U.S. Manufacturer Ubiquiti has released a 1080p, integrated IR IP camera, selling it directly for $79, making this one of the least expensive IP...
VMS Live Monitoring Shootout - Avigilon, Dahua, Exacq, Genetec, Hikvision, Milestone, Network Optix on Dec 05, 2018
Viewing live video is the first interaction and most common task most users have with a VMS. Who does it best and worst? Who offers the most...
ADT Wins Fire Death Suit But Faces Appeal on Dec 05, 2018
ADT/Protection 1 has won a wrongful death court case in which it was sued by the estate of a deceased customer. However, the attorney for the...
ADT Promotes DIFY - "Do It For You" on Nov 30, 2018
"Do It Yourself" (DIY) is a popular expression and has become such a common word that it has even made the Cambridge English dictionary. But why...
Ideal SecuriTest IP Vs Unbranded IP Camera Install Tool Tested on Nov 21, 2018
In our recent IP camera installation tool shootout, multiple members questioned the Ideal SecuriTest IP's features compared to low-cost unbranded...
Video Surveillance Hard Drive Size Statistics 2018 on Nov 08, 2018
What is the most common hard drive size for video surveillance? 150+ integrators answered: What size hard drive do you most commonly use? What...
Favorite Video Surveillance Hard Drive Manufacturer 2018 on Nov 06, 2018
Who is the favorite hard drive for video surveillance use? 150+ integrators answered: What is your preferred brand/model of hard drive for...
Winter 2019 IP Networking Course on Nov 05, 2018
This is the only networking course designed specifically for video surveillance professionals.  Lots of network training exists but none of it...

Most Recent Industry Reports

Imperial Capital Security Investor Conference 2018 Review - ADT, Resideo, Alarm.com, Arlo, Eagle Eye, ACRE, More on Dec 14, 2018
Imperial Capital Security Investor Conference is an event matching industry executives with financiers that frequently leads to future funding...
Cisco Meraki New Cameras and AI Analytics on Dec 14, 2018
Meraki has released their second generation of video surveillance with 3 new cameras, AI-based video analytics, and 2 cloud-based storage...
Foolish Strategy: OEMing Facial Recognition on Dec 13, 2018
Almost as 'hot' as face recognition marketing right now is OEMing facial recognition. Last year, they were a who's who of company's with...
DVR Examiner - Video Recovery from Recorder Hard Drives on Dec 13, 2018
Bypassing passwords and long download times on-site, DVR Examiner collects and organizes video evidence directly from a hard drive extracted from...
2019 Access Control Book Released on Dec 12, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Huawei Hisilicon Quietly Powering Tens of Millions of Western IoT Devices on Dec 12, 2018
Huawei Hisilicon chips are powering, at least, tens of millions of Western IoT devices, such as IP cameras and surveillance recorders, a fact that...
FLIR Launches Body Cameras Unified With VMS (TruWitness) on Dec 11, 2018
While FLIR is best known for their thermal cameras, now they have expanded into body cameras, launching TruWITNESS, a public safety focused body...
Startup Sunflower Labs' Autonomous Drone Security System on Dec 11, 2018
Startup Sunflower Labs is claiming a unique design on a home security system, combining autonomous drones and 'Sunflower' sensors. Imagine an...
The 2019 Video Surveillance Industry Guide on Dec 10, 2018
The 300 page, 2019 Video Surveillance Industry Guide, covers the key events and the future of the video surveillance market, is now available,...
Multi-Factor Access Control Authentication Guide on Dec 10, 2018
Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact