Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

It’s a Mesh and That’s Good

Texas A&M University

For IP video in dorm elevators, Jason Bone of Texas A&M University found that a wireless mesh solution was a better way to go.

Wireless Mesh

Traditional networks employ wired access points or wireless hotspots. In a wireless mesh network, connections are spread among wireless mesh nodes with packets of information that hop among each other to share the network connection across a large area.

Freeport

For monitoring at Freeport, Texas’s public marina, cameras and the wireless mesh network allow boat owners to log onto an Internet site to check the security of their boats.

Texas A&M University
Wireless Mesh
Freeport
June 6, 2011

Ty Morrow knows that Freeport, Texas, is “where fun happens.” He also knows that bad things could happen; and, as chief of police, it’s his duty to see that fun overpowers the bad. And one recent addition to his staff is a wireless network that supports security video in this coastal city.

Wireless mesh networking is not brand new. Military, local public safety and some businesses use it and networks can carry much more than security video. Unlike wired designs, they can also more easily be moved.

Basically, a wireless mesh network is a communications network made up of radio nodes organized in a mesh topology. They are often made up of mesh clients, mesh routers and gateways. The clients are often laptops, cell phones and other devices while the mesh routers forward traffic to and from the gateways which may, but not have to connect to the Internet.

The coverage area of the radio nodes is called by some a mesh cloud. Access to the cloud depends on the radio nodes working in harmony with each other to create a radio network.

 

Self Healing Abilities

A mesh network is reliable and offers redundancy. When one node can no longer operate, the rest of the nodes can still communicate with each other, directly or through one or more intermediate nodes, a kind of self forming and self healing ability.

Wireless mesh networks can be implemented with various wireless technology including 802.11, 802.15, 802.16, cellular technologies or combinations of more than one type.

One important video charm of wireless mesh is its cost effective and dynamic high bandwidth networking over a specific coverage area. The infrastructure is, when all is said and done, a router network minus the cabling between nodes.

Whatever tech nuts and bolts are hidden behind his network, Morrow sees diverse applications. But he originally proceeded with caution. “We conducted focus groups to understand our city’s needs,” he says.

Integrator ADT Security Services is providing and installing the first phase of the wireless video surveillance system in a public housing project and marina.  Later planned phases of the system will help protect critical infrastructure in one of the nation’s largest ports and home to the fourth largest oil reserve and 29 chemical companies. Adds Morrow, “The video surveillance system will help focus on high-crime locations and to protect critical infrastructure that could be targeted by terrorists.”

For monitoring at Freeport’s public marina, the cameras and network will give boat owners the capability to log onto an Internet site to check the security of their boats. An access control system will be installed to limit entry to the docks, too.

 

Infrastructure and Terrorism Angles

In the second phase, added cameras will monitor three bridges that provide the only vehicular access to the city located between the Gulf of Mexico and an intracoastal waterway. At that time, major chemical companies are also expected to link their surveillance cameras to provide a system capable of monitoring a larger area. Later phases will expand the system to cover a sports complex, area high schools and the downtown shopping district. The entire multimillion dollar project is expected to be completed in 2012.

At its heart, however, is the flexibility and reliable of the wireless mesh network.

Texas A&M University is another mesh believer.

The challenge: to provide administrators and campus police with IP video surveillance visibility in high-rise dormitory elevators. Using wireless mesh networking from Fluidmesh Network, Jason Bone, Lieutenant, Texas A&M Police, reports that “We thought it would be a very expensive undertaking and that we’d have to hire a third party to install cable into these elevator cars. This wireless system proved a much better way to go.”

Jamie Bradford of Lensec Systems Solutions served as the integrator on the project. Coming up with a cost-effective technical solution was a major concern, because there was no pre-existing IP connectivity to the elevator cars. Wireless connectivity had to be attained inside the elevator shafts in order to connect the cameras mounted in the elevator cars to the larger campus network. A definite need existed for video in the cars, but wired connectivity was difficult and very expensive, because of the high cost of traveling cables and the labor rates elevator manufacturers and service companies charge for access to the elevator shaft.

The wireless option was the most cost effective from both equipment costs and installation labor. It also made for a quicker installation and less downtime on the elevator. The installation, Bradford reports, took less than four hours per elevator.

 

Handling HD Video

Cosimo Malesci, a wireless mesh net expert for Fluidmesh, says that the approach is more reliable, easier to install as compared to fiber and copper and able to send more data including high-definition video and H.264 compression.

While government and public safety are among the main drivers, education, parking lots, healthcare and connection among buildings is growing, he says. Configurations can be point-to-point, point-to-multipoint, mesh and combinations.

Mobility is another business benefit.

The growing use of megapixel and HD network cameras and the rising demand for mobility in video surveillance places new demands on wireless network infrastructure to support new applications.

In addition, mobile video surveillance to and from moving vehicles is increasingly popular with law enforcement, first responders and transportation agencies interested in augmenting their fixed security systems. At the April ISC West in Las Vegas, wireless mesh network provider Firetide talked to enterprise security leaders about infrastructure mobility solutions deployed in subways, trains and buses for surveillance and public services. Examples include Amtrak in New York City, Seoul Subway and Mumbai Metro projects.

With mobility controller functionality, devices such as IP video cameras, Wi-Fi access points, or RFID readers, maintain network connectivity while traveling at high speeds by providing the bandwidth and intelligence needed to manage connectivity between the mobile and fixed nodes, ensuring fast and efficient handoff and delivering seamless video surveillance and other services.

 

Mesh in Vehicles

Infrastructure mesh is also being deployed for wireless offload of recorded mobile video. The Town of Los Gatos, Calif., has deployed such a solution. “Prior to deploying wireless offload, police officers had to run over 100 feet of cable to their vehicles to download the video,” says Chris Gjerde, information systems manager for Los Gatos. “As you can imagine, they did not enjoy that part of their daily routine. We also noticed that outdoor connectors often had to be replaced, each failure creating a call for service to our outdoor networking contractor. Wireless mesh saves us both time and money, and the high-tech approach is a hit with our personnel.”

Such nets can cover wide areas, too.

In Melbourne, Australia, an extensive wireless IP video surveillance network boasts 130 square kilometers of mesh coverage. Most importantly, the system needed to meet the requirement to transmit high-resolution and HDTV live video feeds. Forty-two Firetide outdoor mesh nodes form the infrastructure backbone of the project, supporting close to 50 outdoor IP video surveillance cameras.

KEYWORDS: mobile surveillance wireless mesh

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • ATM and Bank Cyber Robber Wants a Security Career: Is that a Good Thing?

    See More
  • Making a ‘Mesh’ of It

    See More
  • Emergency communication boxes

    More Broadcast Choices? It’s a Good Thing

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security book.jpg

    Security Investigations: A Professional’s Guide

See More Products
×
For IP video in dorm elevators, Jason Bone of Texas A&M University found that a wireless mesh solution was a better way to go.
Traditional networks employ wired access points or wireless hotspots. In a wireless mesh network, connections are spread among wireless mesh nodes with packets of information that hop among each other to share the network connection across a large area.
For monitoring at Freeport, Texas’s public marina, cameras and the wireless mesh network allow boat owners to log onto an Internet site to check the security of their boats.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!