Video Surveillance

How Cities Use Mesh Networks for Surveillance

In the past five years, city surveillance has become one of the largest vertical markets in the network surveillance industry. Throughout North America, cities of all sizes are deploying city-wide surveillance solutions. Even cities with populations as small as 10,000 are deploying systems. However, what isn’t widely understood within the industry are the enabling technologies behind the fast growing vertical market of “city surveillance.” One technology, which is very critical to its success, is wireless mesh networking.

 

Wireless Mesh

 Wireless mesh networks are a key enabler to this rapid growth; enabling hundreds of other systems to “go mobile” that traditionally wouldn’t be mobile systems. Systems like network surveillance cameras, emergency response systems and video management software and license plate recognition systems, to name a few, are riding the “wave” of wireless mesh networks. When combined, they are creating such significant value that cities are finding more and more financial resources to invest into these systems. These wireless mesh systems are most frequently deployed along roadways, which often define city boundaries. This allows the coverage area to be separated into zones, which are part of different phases for investment and rollout purposes. This typically allows for cities to prioritize where coverage will start and expand making it a pay as you go type technology. Many high traffic roadways, especially along rail systems or other highly populated or traveled areas, have overlapping city services like law enforcement, fire departments and other services that can all use these networks to better support their operations.

 

Beyond Wi-Fi

Most people today think of wireless as either on their phone or a “Wi-Fi” connected device like a laptop. These networks are highly standardized to support all types of devices. However, wireless “mesh” systems operate very differently and most often are using proprietary technologies and software. The proprietary nature of wireless mesh isn’t a bad thing because it is what creates highly reliable and secure wireless mesh networks. Mesh networks create multiple paths of transmission so that if one of them goes down, another is instantly available to get the information through. This is a critical requirement for the types of city departments like law enforcement, which are dependent upon the wireless network. Another aspect of wireless mesh reliability is that these networks provide automatic network traffic load balancing, so not only will the information get through but it will find the fastest path across the city’s wireless network.

 

Surveillance Application “Persistence”

When deploying city surveillance systems, the applications used to view the cameras are critical. Today’s police cars have instant access to surveillance video or license plate databases, and this is key to the “real-time” nature of law enforcement. A system that would be based upon Wi-Fi would require the law enforcement officer to log in each time they connected to a new Wi-Fi access point. This log in process will use up critical seconds that are needed to respond quickly to emergencies. However, using a wireless mesh radio embedded directly into the police car or fire department vehicle would be able to stay connected to all other wireless mesh radios within range. This creates a constant network connection that allows the application like a video surveillance system to stay “persistent,” meaning they would only have to authenticate once, and they would always have instant access to the video or other system. 

 

Up Speed Vs. Down Speed

Another significant benefit is the ability to upload information at high speed. Cellular systems can be okay at downloading, however uploading speeds are typically one tenth that of the download. This makes it impractical for law enforcement to upload HD video streams from the car back to emergency operation centers and prevents a law enforcement officer from sharing witness or evidence video with other responders. 

 

Immediate Return On Investment

There are hundreds of other benefits that are being developed that include the use of network cameras. One innovative city strategy is for urban development groups to tap into the wireless mesh network to help study the viability of urban development projects. By installing cameras with analytic capabilities, city planners can determine the foot- or vehicle-traffic patterns and use this to better serve the public by developing under utilized areas or services. For example, a significant revenue stream for many urban cities is parking, and by being able to provide real-time usage and payment collection systems over wireless mesh networks, many cities can recoup the initial wireless mesh network investment.

 

Compounding Benefits

While wireless mesh systems continue to expand, all of the above benefits also expand. This has a positive compounding effect that is proving to drive city surveillance and other system with significant growth.

 

READ MORE Surveillance Strategies online at SecurityMagazine.com/Columns/Surveillance

This article was orginally published as "Driving City Surveillance ‘Mesh Behind the Wheel’ in the print magazine.

 

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Bernard Scaglione

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security magazine February 2015 issue cover

2015 February

In the February 2015 issue of Security Magazine, see what other companies have learned from the massive data breach and what they are doing in the now and in the future. Also, what could adding thermal cameras to your operation do for you? and Mohegan Sun at Pocono Downs prepares for the future with security decisions.
Table Of Contents Subscribe

Tougher Cybersecurity Legislation

On January 20, President Barack Obama called for tougher cybersecurity legislation in his 2015 State of the Union address. Which of the following points do you feel is most needed today?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.