IP video security networking requirements are not the same as those used for data networks
Differences between standard data applications and the requirements of networks designed for IP video security applications are critical for your system's performance

When the need to purchase a network switch arises, many IT directors immediately turn to two favorites, HP or Cisco. They have become to the networking environment what IBM was to computers: “No one ever got fired for buying IBM.” Certainly, switches play a crucial role in enhancing your network by increasing its speed and capacity. However, it is equally important to note that they can also slow down your network and the same is explained in the article by Neil Heller - Vice President, Vigitron, Inc.

With the transition of video security systems from analog to digital, IT network directors overlooked a key point in their rush to expand their jurisdiction over networking by adding the video security element. The fact is, IP video security networking requirements are not the same as those used for data networks. True, video transmitted over a network is data, but that is where the similarities end.

Network switch and its worthiness to IP camera

Nowhere are the differences more apparent than related to network switches and midspans. Let’s start by examining a standard network switch and its non-functional relationship to IP video security cameras.

We will begin at the switch port. In networking, information is transmitted in the form of packets. For most network switches, when the port is set at 100Mbps, the packet size is limited to about 1518 bytes. This is equal to about a two to three megapixel camera depending on the codec used, H.264 generating the smallest packet size and MJPEG the largest. Some switches that have port speeds to 1Gbyte can be programmed up to the Jumbo Frame, which defines packet sizes greater than 1581 bytes. Jumbo Frames are those that range between 1518 bytes and 9600 bytes. This latter ability wouldn’t present a problem with the exception that in networking, the output speed of a device must be matched to the input speed of the port.

As all IP cameras have output bandwidth speeds of 100Mbps, the input speed of the port must be set to 100Mbps. If the switch has an automatic port speed setting, it will sense the input speed from the camera and no manual setting is required. The problem exists when the packet output from the camera exceeds the limitation of the switch port setting at 100Mbps. In short, you can have issues with any cameras that are 3MP or greater.

If an NVR or VMS server is not communicating with an individual camera, you don’t know if the problem exists at control site device or the camera. Little consideration is given to the idea the problem may be the switch port and camera

Switch fabric estimation

The second concern is the internal switch connection between all the ports. This is called the switch fabric or throughput. In most normal data applications, either not all ports are used or the data at each port is far less than the port’s highest capacity. Again, this is not the case with IP video security applications where all ports are used and each port needs to operate at its highest bandwidth capacity. For this requirement, the switch fabric must be able to handle at least two times the total bandwidth of all the ports. For example, if you have a 24 port, each port with the ability to operate at 1Gbytes, the switch fabric must have a bandwidth of at least 48Gbyte.  Please note, there are no standards for switch fabric or port bandwidth packet size capacity. These are both quality issues.

The potential problems become clear as the megapixel size of a camera increases, as does the camera’s codec, and as the number of cameras in your system approach the maximum number of switch ports connected. The problem is often misunderstood. Operators don’t know why they only have good video quality when the camera capacity is less than the switch input maximum.

PoE-related concerns

Just as critical is the interaction between switch functions, or lack thereof, concerning PoE. Many of these center around the lack of protection. This starts with the individual port, which is not fused. Shorts in any individual channel can render the entire switch inoperable when the main power fuse is broken. During normal startup, PoE power required by each connected camera is sensed. If a short exists, or no camera is detected, or the amount of power requested by the camera exceeds the available port, the port will shut down. This is a function of the normal safety built into the 802.3 standards designed for PoE. When this occurs, the port is basically off and remains in the off condition as the physical Ethernet connection between the camera and switch port has already been established and new detection pulses are not generated.

There are several reasons this can occur. Even in properly installed systems, a good port-to-camera connection is not always established on the first try. Again, blame usually is placed on the camera. In some case, removing the Ethernet cable and reinserting will reestablish the connection. However, the first reactions are most likely to request a return authorization from the manufacturer or ask for a service call from the dealer.

The second PoE-related problem is best illustrated by an actual installation. Several schools in a distant had PTZ cameras with more than half their inputs into a single PoE switch. As PoE power was applied, the PTZ domes move to their reference position, resulting in a surge so great that it damaged the switch’s power supply. While the safety built into the 802.3 standard can protect the individual port, it does not account for potential high power surges at the actual startup. For PTZs and other accessory features, the surge occurs only after initial communication is established and PoE power applied. The standard only applies to sensing the need for PoE, and if the PoE power requested is available. There is no protection against surges or the number of ports within a switch that are subject to surges.

During normal operation,
a PoE network switch has
no ability to account for
surges occurring from PTZ,
LED, Day/Night, Auto
Backfocus, and other
accessory features

During normal operation, a PoE network switch has no ability to account for surges occurring from PTZ, LED, Day/Night, Auto Backfocus, and other accessory features. If these occurrences have durations of greater than approximately 40ms or require more power than available at the port, port PoE will simply shut down, rendering the camera useless. This is a concern when the normal operating power of the power of the camera is at the edge of an individual power class and the surge exceeds that class power limit.

Within a network, connected devices pass through the switch. There is no connection accountability between the switch port and device connected to it. As such if an NVR or VMS server is not communicating with an individual camera, you don’t know if the problem exists at control site device or the camera. Little consideration is given to the idea the problem may be the switch port and camera.

Finally, there is the AUPC, or Actual Usable Port Count. A 24-port switch does actually have 24 ports, but when you consider that a least one port is connected to the recording or viewing device, the usable port count is reduced to 23, if the switch is connected in a series then you use two ports and the count is further reduced to 22.

All of these define the differences between standard data applications and the requirements of networks designed for IP video security applications. These differences are not defined by nor part of any of the standards that govern compatibility in networking standards. They are, however, critical in the performance and reliability of your security system.

Download PDF version Download PDF version

Author profile

In case you missed it

What Are New Trends In Residential Security?
What Are New Trends In Residential Security?

Residential security and smart homes are rapidly changing facets of the larger physical security marketplace, driven by advances in consumer technology and concerns about rising crime rates. During the COVID-19 pandemic, many people spent more time at home and became more aware of the need for greater security. As workplaces opened back up, returning workers turned to technology to help them keep watch over their homes from afar. We asked this week’s Expert Panel Roundtable: What are the trends in residential security in 2021?

How Businesses Can Protect Their People In The New Age Of Work
How Businesses Can Protect Their People In The New Age Of Work

Ensuring employee health and safety remains a key priority for organizations this year, especially as we see COVID-19 cases continue to rise in different areas of the world. As an ongoing challenge, COVID-19 has shifted the priorities of many organizations. In fact, “improving health and safety for employees” is the top strategic goal this year of manufacturing and logistics organizations in the U.S. and U.K., according to research conducted by Forrester on behalf of STANLEY Security. But as we think about reopening and as hybrid workforce models and “workspace-on-demand” approaches rise in popularity, leaders need to consider implementing the right technologies to help ensure a safe return to the office. This means investing in health, safety, and security solutions that can help leaders protect their people. The intersection of security technology and health and safety There’s no doubt that the scope of security has expanded in the wake of the global pandemic. What was once an area governed by a select few security or IT professionals within a business has now become a crucial company investment involving many key stakeholders. The role of security has expanded to encompass a broader range of health and safety challenges for businesses Additionally, the role of security has expanded to encompass a broader range of health and safety challenges for businesses. Fortunately, security technologies have made significant strides and many solutions, both existing and new, have been thrust forward to address today’s biggest business challenges. Investment in security technology It’s important to note that businesses are eager to adopt tech that can help them protect their people. Nearly half (46%) of organizations surveyed by Forrester report that they’re considering an increasing investment in technology solutions that ensure employee safety. Technologies like touchless access control, visitor management systems, occupancy monitoring, and installed/wearable proximity sensors are among some of the many security technologies these organizations have implemented or are planning to implement yet this year. Facilitating a safe return to work But what does the future look like? When it comes to the post-pandemic workplace, organizations are taking a hard look at their return-to-work strategy. Flexible or hybrid workforce models require a suite of security solutions to help ensure a safer, healthier environment More than half (53%) of organizations surveyed by Forrester are looking to introduce a flexible work schedule for their employees as they make decisions about returning to work and keeping employees safe post-pandemic. Such flexible – or hybrid – workforce models require a suite of security solutions to help ensure a safer, healthier environment for all who traverse a facility or work on-site. One of the central safety and security challenges raised by these hybrid models is tracking who is present in the building at any one time – and where or how they interact. Leveraging security technology With staggered schedules and what may seem like a steady stream of people passing through, it can be difficult to know who’s an employee and who’s a visitor. Access control will be key to monitoring and managing the flow of people on-site and preventing unauthorized access. When access control systems are properly integrated with visitor management solutions, businesses can unlock further benefits and efficiencies. For instance, integrated visitor management systems can allow for pre-registration of visitors and employees – granting cellphone credentials before people arrive on-site – and automated health screening surveys can be sent out in advance to help mitigate risk. Once someone reaches the premises, these systems can also be used to detect the person’s temperature and scan for a face mask, if needed.  We will likely see these types of visitor management and advanced screening solutions continue to rise in popularity, as 47% of organizations surveyed by Forrester report that they’re considering requiring employee health screening post-pandemic. Defining the office of the future A modern, dynamic workforce model will require an agile approach to office management. It’s imperative to strike the right balance between making people feel welcome and reassuring Businesses want to create an environment in which people feel comfortable and confident – a space where employees can collaborate and be creative. It’s imperative to strike the right balance between making people feel welcome and reassuring them that the necessary security measures are in place to ensure not only their safety but also their health. In many cases, this balancing act has created an unintended consequence: Everyone now feels like a visitor to a building. Protocols and processes With employees required to undergo the same screening processes and protocols as a guest, we’ve seen a transformation in the on-site experience. This further underscores the need for seamless, automated, and tightly integrated security solutions that can improve the employee and visitor experience, while helping to ensure health and safety. Ultimately, the future of the office is not about what a space looks like, but how people feel in it. This means adopting a “safety-always” culture, underpinned by the right technology, to ensure people that their safety remains a business’ top priority. 

Access The Right Areas - Making A Smart Home Genius With Biometrics
Access The Right Areas - Making A Smart Home Genius With Biometrics

Household adoption of smart home systems currently sits at 12.1% and is set to grow to 21.4% by 2025, expanding the market from US$ 78.3 billion to US$ 135 billion, in the same period. Although closely linked to the growth of connectivity technologies, including 5G, tech-savvy consumers are also recognizing the benefits of next-generation security systems, to protect and secure their domestic lives. Biometric technologies are already commonplace in our smartphones, PCs and payment cards, enhancing security without compromising convenience. Consequently, manufacturers and developers are taking note of biometric solutions, as a way of leveling-up their smart home solutions. Biometrics offer enhanced security As with any home, security starts at the front door and the first opportunity for biometrics to make a smart home genius lies within the smart lock. Why? Relying on inconvenient unsecure PINs and codes takes the ‘smart’ out of smart locks. As the number of connected systems in our homes increase, we cannot expect consumers to create, remember and use an ever-expanding list of unique passwords and PINs. Indeed, 60% of consumers feel they have too many to remember and the number can be as high as 85 for all personal and private accounts. Biometric solutions strengthen home access control Biometric solutions have a real opportunity to strengthen the security and convenience of home access control Doing this risks consumers becoming apathetic with security, as 41% of consumers admit to re-using the same password or introducing simple minor variations, increasing the risk of hacks and breaches from weak or stolen passwords. Furthermore, continually updating and refreshing passwords, and PINs is unappealing and inconvenient. Consequently, biometric solutions have a real opportunity to strengthen the security and convenience of home access control. Positives of on-device biometric storage Biometric authentication, such as fingerprint recognition uses personally identifiable information, which is stored securely on-device. By using on-device biometric storage, manufacturers are supporting the 38% of consumers, who are worried about privacy and biometrics, and potentially winning over the 17% of people, who don’t use smart home devices for this very reason. Compared to conventional security, such as passwords, PINs or even keys, which can be spoofed, stolen, forgotten or lost, biometrics is difficult to hack and near impossible to spoof. Consequently, homes secured with biometric smart locks are made safer in a significantly more seamless and convenient way for the user. Biometric smart locks Physical access in our domestic lives doesn’t end at the front door with smart locks. Biometrics has endless opportunities to ease our daily lives, replacing passwords and PINs in all devices. Biometric smart locks provide personalized access control to sensitive and hazardous areas, such as medicine cabinets, kitchen drawers, safes, kitchen appliances and bike locks. They offer effective security with a touch or glance. Multi-tenanted sites, such as apartment blocks and student halls, can also become smarter and more secure. With hundreds of people occupying the same building, maintaining high levels of security is the responsibility for every individual occupant. Biometric smart locks limit entry to authorized tenants and eliminate the impact of lost or stolen keys, and passcodes. Furthermore, there’s no need for costly lock replacements and when people leave the building permanently, their data is easily removed from the device. Authorized building access Like biometric smart locks in general, the benefits extend beyond the front door Like biometric smart locks in general, the benefits extend beyond the front door, but also throughout the entire building, such as washing rooms, mail rooms, bike rooms and community spaces, such as gyms. Different people might have different levels of access to these areas, depending on their contracts, creating an access control headache. But, by having biometric smart locks, security teams can ensure that only authorized people have access to the right combination of rooms and areas. Convenience of biometric access cards Additionally, if building owners have options, the biometric sensors can be integrated into the doors themselves, thereby allowing users to touch the sensor, to unlock the door and enter. Furthermore, the latest technology allows biometric access cards to be used. This embeds the sensor into a contactless keycard, allowing the user to place their thumb on the sensor and tap the card to unlock the door. This may be preferable in circumstances where contactless keycards are already in use and can be upgraded. Smarter and seamless security In tandem with the growth of the smart home ecosystem, biometrics has real potential to enhance our daily lives, by delivering smarter, seamless and more convenient security. Significant innovation has made biometrics access control faster, more accurate and secure. Furthermore, today’s sensors are durable and energy efficient. With the capacity for over 10 million touches and ultra-low power consumption, smart home system developers no longer have to worry about added power demands. As consumers continue to invest in their homes and explore new ways to secure and access them, biometrics offers a golden opportunity for market players, to differentiate and make smart homes even smarter.