Wireless broadband bridges the gaps in wired infrastructure 
Bridging the gaps in wired infrastructure with wireless broadband
Today, public and urban business organisations have sophisticated geographically dispersed infrastructures, which require centralised supervision and the deployment of global security and surveillance networks. As the necessity for public and personal safety increases, the market and demand for multisite surveillance solutions with rigorous, video-based security standards is growing. One of the most recent challenges security professionals are facing is the deployment of viable, cost-effective security network infrastructures over multiple remote sites.  In this article, Alvarion brings to the fore the growing reasons for the adoption of wireless IP based solutions within the security market.

Benefits of IP-based video surveillance systems

In recent years, the video surveillance industry has taken giant steps towards infrastructure digitisation. This trend continues because digitisation enables them to replace the limited capacity and capabilities of analogue transmission networks with the innumerable opportunities provided by IP networks. In particular, IP-based systems offer easy integration and interoperability with a multitude of other systems, enabling the development of a range of innovative telecom infrastructures.

IP-based surveillance systems offer much more than simple visual supervision; starting from a single centralised computer, they offer a range of benefits, which include:
  • Real-time management and simultaneous surveillance of individuals and merchandise at multiple sites i.e. remote monitoring and security management
  • Top quality recording of sound and images
  • Control of traffic systems

The wireless alternative: A world of possibilities for communications networks

Such IP-based systems require an appropriate broadband network infrastructure. Today, there are a number of different options to obtain the necessary broadband access. This includes wireless broadband, which in many cases offers an excellent solution to bridge the digital divide in areas lacking a wired infrastructure, as well as an alternative to DSL.

Wireless broadband opens doors to 24/7 surveillance, which is inaccessible to most advanced wired infrastructures

The availability of wireless broadband technologies (wireless local loop) allows for the deployment of broadband communications networks when wired technologies and infrastructures are either unavailable or cannot provide the required performance. Such networks can also be deployed as a complement to existing wired networks, extending coverage and/or capacity and offering new possibilities for modularity and mobility.

Growing reach of wireless network solutions

Since wireless broadband access became available, IP radio network technologies have been evolving to provide more bandwidth, reach, quality-of-service, and security - all critical parameters for video surveillance applications. It is now possible to quickly and cost-effectively deploy networks of CCTV cameras in a range of areas, such as public places, commercial centres and industrial zones, in order to ensure security as part of urban video surveillance applications. The wireless infrastructure also supports Intelligent Traffic Systems (ITS) including smart video surveillance, enabling cities to deploy a system that allows for bi-directional streamlining - upstream from the surveillance cameras and downstream from the control centre - for enhanced traffic control. The advantage of such networks is that they can be deployed very quickly on affordable budgets, reducing operational costs and present the opportunity for utilising systems which cannot be deployed using wired infrastructure.

Various topologies are available for wireless networks
View larger image
Various topologies are available for different wireless network scenarios

For markets such as public transport or public security, wireless broadband opens doors to 24/7 surveillance, which is inaccessible to most advanced wired infrastructures. Wireless networks allow patrol vehicles to remotely share bidirectional videos, audio transmissions and other types of data with colleagues or management systems located in a single remote monitoring. Additionally, the same infrastructure can be used for Internet access, utilising the VLAN's feature.

Available topologies for wireless communications networks

Wireless communications networks use radio modems mounted on public or private buildings, water towers, poles or any other elevated structure in order to optimise transmissions. Area coverage uses point-to-point (PTP) and point-to-multipoint (PtMP) links, depending on the topology and the required architecture. Coverage can reach several kilometres (up to 30 km and more for a high capacity PTP link) and serve any type of public or private client.

  • PTP topologies only permit communications between two points. This topology is used either for connecting a single remote surveillance camera or for transmitting the flow of a pool of cameras to a remote security PC.
  • PtMP topologies consist of a central base station that concentrates the flow of multiple surveillance cameras on remote sites located at a distance from each other. They involve a modular infrastructure - which can evolve according to needs - in terms of capacity and coverage. Remote monitoring points can be added as required.
    Wireless networks allow patrol vehicles to remotely share bidirectional videos, audio transmissions and other types of data with colleagues  
      Wireless networks allow patrol vehicles to remotely share data and with colleagues
  • Mesh networks are another wireless topology. While these networks can be used for mobility applications, they are not cost efficient. Mesh networks are not suitable for quality video signals due to latency issues and because quality of service (QoS) cannot be guaranteed.

In actuality, all the different topologies mentioned above can be mixed, according to the video surveillance network configuration that will be deployed. In such cases, the project manager is responsible for defining the most appropriate architecture that will provide the best cost/performance ratio.

The following table summarises various scenarios for the deployment of a digital video surveillance network and recommended topologies:

Scenario Recommended Topology Comments
Connection of a single remote camera Wireless PTP system  
Connection of a remote site (on which several cabled cameras are grouped) Wireless PTP system, probably with high capacity This scenario includes connection of wired cameras to a switch installed at the remote site and wireless transportation of all video flows to a control centre located in another building.
Connection of cameras dispersed over an extended urban area Wireless PtMP system-modular system allowing the installation of additional cameras Rather than deploying one PTP link per camera, a simple PtMP system serves all the cameras, thus reducing the size of the central infrastructure and installation operations. This system may be completed by a local mesh network to economically reach cameras grouped over a reduced coverage area.
Deployment of several groups of cameras, with each group in a different area and/or direction in relation to the control station Wireless PtMP system will concentrate the cameras distributed in each area, and a wireless PTP system will carry the flow from groups of cameras to the control station The combination of two topologies allows a system with more available capacity to be built. It bypasses the cameras and the central site as part of a redundancy solution by overlapping the areas covered by the various PtMP base stations.

Wireless digital video surveillance likely to become the norm

Like many industries that depend on the ability to transfer data among multiple remote sites, digitised wireless networks offer the video surveillance market a number of important benefits:

  • Transportation of high quality video and audio signals from remote surveillance cameras
  • Real time sharing of data among all elements in the surveillance chain
  • Real and indisputable alternative to traditional costly wired infrastructures
  • Economical solution which integrates naturally into IP environments and offers flexibility and modularity

Wireless broadband allows security professionals to deploy a viable, cost effective security network infrastructure to ensure that public and personal safety needs are met. No wonder then that the market for wireless infrastructure for video surveillance in EMEA and Americas alone is estimated to be about $175 million in 2009 and projected to grow by 20% in 2010. As wireless broadband penetration grows, we may not be far from the day when wireless video surveillance becomes the norm!  

Alvarion Alvarion
Download PDF version

In case you missed it

Where is it inappropriate to install video cameras?
Where is it inappropriate to install video cameras?

Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”

Development of integrated thermal imaging technology into evolving market verticals
Development of integrated thermal imaging technology into evolving market verticals

Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so.  Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.

Highlighting the importance of security integrations and alliances
Highlighting the importance of security integrations and alliances

Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organisations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emerging components to make their products and services even stronger. Oftentimes, a key aspect necessary to build a comprehensively robust solution involves finding like-minded partners that share a common goal and are willing to work together to create an integration that increases insight and intelligence.The interoperability between systems, devices and different types of applications should be intuitive and fast Key factors for security integrations A basic factor in a partnership is openness. For an integration to perform seamlessly for the end user, the platform through which the technologies converge must follow standard protocols, easily operate with other platforms, allow freedom and customisation, and provide adaptability. The interoperability between systems, devices and different types of applications should be intuitive and fast, enabling more time to be spent on analysing critical data and responding to security events. The puzzle of a complete security solution contains many pieces, and it's often necessary to fuse together aspects from various providers to create a best-in-breed technology offering. When organisations collaborate, the end result is a simplified solution with an increased level of value. As threats become more severe and complex, customers demand solutions that combine different security and business elements into a single interface that can address a wide variety of risks. A unified security system requires a strong collaboration between technology providers and integrated solutions Interconnected security devices Users used to only look at specific security devices - such as cameras or door alarms - as each having a strong, autonomous purpose, but now, every device plays an important interconnected role. And the progression of the Internet of Things (IoT) has made this transition even easier, as maintaining a consistent and uniform communication and interconnectivity between devices has now become the norm. The IoT has also made it so that partnerships must not only exist between manufacturers, but also within the customer's organisational structure. Although exceptionally beneficial, the IoT brings with it an increased amount of cyber vulnerabilities. As security systems are networked to increase flexibility, the door is opened to a number of potential threats that could compromise the entire enterprise. This risk highlights the need for an internal partnership and knowledge sharing between a company's physical security professionals and its IT team. IT experts should be pulled into security decisions and positioned as collaborative partners to assist with software updates, data safety protocols and solving complex network challenges, ultimately leading to a more cyber secure solution.Partnerships are beneficial to both the companies involved and their customers Knowledge sharing and learning Aside from cybersecurity, the latest prominent security attacks and events have focused primarily on soft targets, such as schools, concerts or shopping malls. This has caused many technology providers to venture into different vertical markets, and strong partnerships streamline this crossover. Innovators can extend their geographic reach and purpose through integrations with other like-minded manufacturers or integrators to add new levels of functionalities. Of course, a partnership cannot operate properly and to the best of its ability without a core component: learning. In today's evolving business and risk environment, knowledge is critical. A shared knowledge base can open up new opportunities and lead to the strengthening of security across many levels. A truly powerful, unified security system requires a strong collaboration between technology providers and integrated solutions. Partnerships are beneficial to both the companies involved and their customers, and the results created through these alliances can reach far beyond a user's expectations, offering enhanced flexibility and extensive safety options.