Training: Bandwidth Basics for Video Surveillance

Author: John Honovich, Published on Apr 19, 2010

Bandwidth is a critical, yet under-emphasized aspect of video surveillance. While some suggest bandwidth is free and unlimited, real world IP video systems deal with bandwidth constraints regularly. If you are going to deploy a solution that is reliable and provides high quality video, understanding and ensuring sufficient bandwidth is critical.

Inside the Pro section, we provide a 20 minute video that explains the fundamentals of bandwidth, providing multiple examples of bandwidth 'in action'.

The video screencast should help you answer the following 18 questions:

  1. How much bandwidth is needed for a given video feed?
  2. How much bandwidth do you have in a given scenario?
  3. How do you measure bandwidth?
  4. What acronyms are used in measuring bandwidth?
  5. What's the difference between bits and bytes?
  6. What problem arises when bits and bytes are confused?
  7. What IT specialists prefer to use the term bits?
  8. What IT specialists prefer to use the term bytes?
  9. What is the least and most bandwidth that is generally available?
  10. Why is the 'symmetry' of bandwidth important?
  11. In what situations, would you have 'asymmetric' bandwidth?
  12. How much bandwidth is generally available inside an office?
  13. How much bandwidth is generally available going to someone's home?
  14. What's the difference between full and half duplex connections?
  15. What network types use half rather than full duplex measurements?
  16. What are the key drivers of IP camera bandwidth consumption?
  17. How much can bandwidth consumption vary for IP cameras?
  18. How do you know if you do not have enough bandwidth available?
 
This screencast is an excerpt of our 2 hour training course on IP Network Basics for Video Surveillance.

********* ** * ********, *** *****-********** ****** ** ***** ************. While **** ******* ********* ** **** *** *********, **** ***** IP ***** ******* **** **** ********* *********** *********. ** *** are ***** ** ****** * ******** **** ** ******** *** provides **** ******* *****, ************* *** ******** ********** ********* ** critical.

****** *** *** *******, ** ******* * ** ****** ***** that ******** *** ************ ** *********, ********* ******** ******** ** bandwidth '** ******'.

*** ***** ********** ****** **** *** ****** *** ********* ** questions:

  1. *** **** ********* ** ****** *** * ***** ***** ****?
  2. *** **** ********* ** *** **** ** * ***** ********?
  3. *** ** *** ******* *********?
  4. **** ******** *** **** ** ********* *********?
  5. ****'* *** ********** ******* **** *** *****?
  6. **** ******* ****** **** **** *** ***** *** ********?
  7. **** ** *********** ****** ** *** *** **** ****?
  8. **** ** *********** ****** ** *** *** **** *****?
  9. **** ** *** ***** *** **** ********* **** ** ********* available?
  10. *** ** *** '********' ** ********* *********?
  11. ** **** **********, ***** *** **** '**********' *********?
  12. *** **** ********* ** ********* ********* ****** ** ******?
  13. *** **** ********* ** ********* ********* ***** ** *******'* ****?
  14. ****'* *** ********** ******* **** *** **** ****** ***********?
  15. **** ******* ***** *** **** ****** **** **** ****** ************?
  16. **** *** *** *** ******* ** ** ****** ********* ***********?
  17. *** **** *** ********* *********** **** *** ** *******?
  18. *** ** *** **** ** *** ** *** **** ****** bandwidth *********?
 
**** ********** ** ** ******* ** *** * **** ******** course **** ******* ****** *** ***** ************.

[***************]

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Automatic Door Operators For Access Tutorial on Sep 20, 2017
Opening and closing doors might sound simple, but it takes a high-tech piece of door hardware to pull it off. Integrating automatic door operators...
September IP Networking Course on Sep 14, 2017
LAST Chance - Registration is ending. Register now. This is the only networking course designed specifically for video surveillance professionals...
Master Keying Tutorial on Sep 14, 2017
Mechanical keys are the most fundamental, albeit unsophisticated, form of access control. Like access control, Master Keying allows large scale use...
Fail Safe vs. Fail Secure Tutorial on Sep 13, 2017
Few terms carry greater importance in access control than 'fail safe' and 'fail secure'. Access control professionals must know how these concepts...
Dedicated Vs Converged IP Video Networks Statistics on Sep 12, 2017
'Convergence' has been a major industry theme for many years. All organizations have IP networks today with laptops, tablets, phones and more...
October Camera Course on Sep 07, 2017
Learn video surveillance and get certified. IPVM provides live online classes, recorded videos, personal help, cutting edge education and...
Dahua 4K IR PTZ Tested on Aug 21, 2017
4K has made its way to IR PTZs. In this report, we examine the Dahua 6AE830VNI, a 4K PTZ with 30x optical zoom, 200m (~650') integrated IR, and...
VLAN For Video Surveillance Usage Statistics on Aug 21, 2017
VLANs (see our tutorial) are an option for networks using video surveillance, but how often are they actually used? 125+ integrators told us how...
Sony Next Gen HD Dome Camera Tested (SNC-EM642R) on Aug 18, 2017
Sony has released their latest generation, claiming improved WDR and low light, increased IR range, and more. We tested the SNC-EM642R outdoor IR...
Cat 5e vs Cat 6 vs Cat 6a Network Cable Usage Statistics on Aug 16, 2017
Cat 5e? Cat 6? Cat 6a? What do integrators use in practice, today? 140+ integrators told IPVM. Here are the results: For those who want to...

Most Recent Industry Reports

Genetec Launches Cloud Access Control (Synergis SaaS) on Sep 21, 2017
Genetec's cloud everything expansion continues, with their announcement of Synergis SaaS edition, joining their cloud video offering Stratocast,...
Genetec CEO Warns Against Insider Threats on Sep 21, 2017
With Dahua and Hikvision cybersecurity issues becoming indisputable, a new counter has emerged. Just put them behind a firewall, buy cheap...
Automatic Door Operators For Access Tutorial on Sep 20, 2017
Opening and closing doors might sound simple, but it takes a high-tech piece of door hardware to pull it off. Integrating automatic door operators...
'Clowns' Allege Ubiquiti 'Completely Fraudulent' on Sep 20, 2017
A short seller has alleged Ubiquiti is 'completely fraudulent'. Ubiquiti's CEO has responded calling them 'clowns'. Here is the short...
Avigilon 'Blue' Cloud Entry Examined on Sep 19, 2017
Avigilon is moving to the cloud. The company announced their Avigilon Blue platform, designed to be a web-managed surveillance system, utilizing...
HID Buys Mercury Security on Sep 19, 2017
One of the biggest access control deals in years. Mercury Security, the most widely used access hardware OEM, and partner to 20+ manufacturers,...
Hikvision Backdoor Exploit on Sep 18, 2017
Full disclosure to the Hikvision backdoor has been released, allowing easy exploit of vulnerable Hikvision IP cameras. As the researcher, Monte...
Avigilon Touting 'Made In America' on Sep 18, 2017
Canadian manufacturer Avigilon, who completed a US manufacturing facility in 2015, is now running a marketing campaign touting 'Made In America',...
Cloud Guy Prints Book, Misses Irony on Sep 15, 2017
On-premise security systems are dead. But $75 print books are alive and well. Such are the lessons from Brivo's CEO new book "The Five...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact