SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

How can IP networked systems adapt to lost connectivity?

How can IP networked systems adapt to lost connectivity?
21 Sep 2016

Editor Introduction

IP network dependability matters in physical security and safety applications, given that a company’s assets and people are at risk. There have been strides in the areas of network dependability, fault-tolerance, reliability, and survivability. However, networks (or affordable ones, at any rate) still cannot ensure near-100 percent uptime, which is why system designers acknowledge and plan for the possibility of a network outage. We asked this week’s Expert Panel Roundtable: How can/should an IP networked system adapt when network connectivity is lost?


Card image cap
Arjan Bouter Nedap Security Management

When connectivity is lost it is still important that your system still functions. That is why it is important that the controllers from an access control system communicate peer-to-peer and can authorise access without communicating with your server. This freedom from the host lessens the load on your network and means your access control system keeps working, even if the connection with your network is lost.

Card image cap
Tom Larson

If we are dealing with an enterprise installation the video network should be designed to accommodate network switch or pathway failures. The optimal solution would be to design a multicast network to support the video management software. The solution should have redundant core switches and all switches should have redundant power supplies. Should a core switch fail, the network should have the ability to re-converge in a sub-second; worst case, the solution loses a few packets. Each edge switch should have multiple pathways back to each of the core switches so if we lose a pathway the video has a secondary path back to the core and that re-convergence should also be sub-second. If we lose an edge POE switch, there is not much that can be done as the camera will lose power and we will have a group of cameras down until the switch is replaced. We have found that the majority of network issues are a result of a poorly engineered network for IP video. The key to near-zero network loss is a properly designed and implemented network.

Card image cap
Jumbi Edulbehram NVIDIA

First and most importantly, if any kind of network connectivity is lost, users and service providers need to get an alert. If users don't want to lose any video, cameras should have on-board camera storage. When the network is functional again, the on-board storage should be off-loaded and put into general video storage. For access control, loss of network connectivity is generally not an issue for system functionality since databases are usually kept at the edge. That is, one would not be able to add/delete users or change access levels, but that can be logged and implemented when the network is back up. If losing external network connectivity to a particular site is an issue in an application that requires remote monitoring and management, the system needs to adapt to allow local monitoring. For example, the system should be able to keep local copies of the central access control database.

Card image cap
Larry Anderson

Assuming localised power, networked video and security edge devices continue to operate in the case of a network outage. Cameras continue to capture video (to an SD card) and access control readers can make decisions based on locally stored information. Then when the network is restored, the local information is shared with the larger network, and the system functions as usual. Concerns surround applications requiring real-time response, which is undermined by an outage. In case of an outage, cameras don’t work with other system components or provide video analytics alerts to the network, for example. Access control doesn’t work with “if-then” scenarios involving other devices on the network. In these applications, an alert system should notify operators of any network problems in a timely manner – system functionality is at risk.

Card image cap
Erron Spalsbury 3xLOGIC, Inc.

There are a couple of schools of thought when discussing IP camera networks and a few precautions to consider. First, separate the networks. The camera network needs to be on its own set of switches so that the camera traffic doesn’t impede existing, day-to-day traffic of the corporate network. On the camera network side, we can always increase uptime by using equipment like battery back-ups to keep the network switches and recording appliance powered up during a power failure. Most cameras nowadays are PoE (Power over Ethernet). This is fantastic for the installer and makes powering the cameras exceptionally easy since only a single Category 5 or 6 cable needs to be pulled. However, should the switch go, so do the cameras. This is why the majority of these cameras still have a separate low-voltage power input, which allows you to utilize the SD card option to maintain recording.

Card image cap
Simon Lambert Lambert & Associates

Networks can, by their nature, be set up in many shapes or topologies. A network’s response to unexpected breaks should be part of its design from the outset. Ethernet strives to get data to its destination even if the route has to change several times mid-flight owing to circumstances. So, resilience can initially come from providing more than one path for all data, e.g. full loops of cable, or alternative networks such as cellular 4G, etc. If that isn’t viable, practically or economically, then maybe memory buffers are placed within data sources such as IP video cameras and network video recorders. These temporarily fill when connection is known to be lost, subsequently releasing the data to seek its destination when the connection is restored. Many cameras have SD memory card slots these days. SD cards currently reach 512GB in volume. As ever, make sure to design failure modes into your system.

Card image cap
Brandon Reich Pivot3, Inc.

Video systems should not be dependent on external or public internet connectivity. This is one of the big challenges of cloud video solutions; Internet connections are notoriously unreliable. If these systems must be connected to the public Internet, some storage should be maintained locally to prevent data loss in the event of a network outage. Private WAN connectivity is typically much more reliable, assuming there is sufficient bandwidth to handle video traffic.


Editor Summary

If there is a downside of IP security systems, it is that they are so dependent on a (sometimes less than perfect) network. Physical security systems must therefore be designed to allow for any limitations of the network. (IP networks are also vulnerable to cybersecurity threats – another topic for another day.) Networks are important tools for today’s security systems, but they should not be an Achilles heel. Rather, system designers must rise to the occasion and maximise system functionality despite any network limitations.

  • Related links
  • Oncam CCTV software
  • Oncam CCTV cameras
  • Pivot3 CCTV software
  • Oncam IP cameras
  • BCDVideo Storage
  • Related categories
  • CCTV cameras
  • CCTV software
  • IP cameras
  • Storage
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

Discover IP-networked systems' adaptability to lost connectivity, enhancing security & maintaining functionality in challenging conditions.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec