Convergence Q&A: Detecting the Gradual Loss of Video Bandwidth

Remote surveillance monitoring poses IT challenges

     1. Document the network requirements. One video system deployment required more than 25 specific requirements for network protocols and network switch port configurations. Make sure you get this information as well as calculate the bandwidth requirements for each network path video will travel on, including redundant paths.
     2. Configure remote views appropriately. If you respect the business by not being wasteful of network bandwidth (and document your approach), IT will respect the network requirements that you provide.
     3. Test and document video network traffic. Many IT departments use Wireshark or similar free network monitoring software to capture and examine 5 minutes of video network traffic from a newly deployed security video system. They examine the traffic log to verify and document the acceptable state of the new system. Video-savvy IT departments or security integrators repeat this exercise annually, from a good sampling of locations where video viewing is desired. This is information to be shared and evaluated by Security and IT.
     4. Document and register the video high availability requirement with IT Security. Maintaining the integrity of security video traffic a standard part of network security, whose job it is to maintain the confidentiality, integrity and availability of critical systems.



Write to Ray about this column at Ray Bernard, PSP, CHS-III is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities. For more information about Ray Bernard and RBCS go to or call 949-831-6788. Mr. Bernard is also a member of the Content Expert Faculty of the Security Executive Council ( Follow Ray on Twitter: @RayBernardRBCS