Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Bandwidth, Switches and VLANs – Oh My!

January 1, 2011

Understanding Bandwidth

Bandwidth is the amount of data transmitted across a network infrastructure per second. Data, in the case of IP video surveillance, is the transmission or streaming of either live video from cameras or storage playback. With regards to an IP video surveillance system, bandwidth is the sum of all of the data communications flows of all of the various components. Some data flows are for inter-device communications, called overhead, which do not generate enough data bandwidth to be statistically relevant. Calculating the total bandwidth required for an IP video surveillance system can be simplified by following an old IT rule of thumb: “Goes Into.”

Goes Into is basically the process of summing up all of the fixed video streams (live) and all of the potential video streams (storage playback and multiple instances of any live stream) for the entire IP video surveillance system and/or any specific network section. An example is a 32 IP camera system with all storage on a NVR on a dedicated LAN. Each camera’s live stream is 3Mbs and the stored stream is 1.5Mbs. Each camera will require at all times a minimum of 1.5Mbs for a system total minimum of 48Mbs.


Understanding Network Switches

Ethernet network switches are devices that join computers and other network based devices together within a single physical local area network (LAN). Switches are also used to link together multiple network switches. The original benefit of network switches was the ability to isolate the data communications to/from any connected device from any of the other connected devices. Network switches have become increasingly more intelligent and can now provide VLANs as well as some network traffic prioritization or queuing.


Understanding VLANs

VLANs or Virtual Local Area Networks are logical LANs, created within the network switches, too segment multiple networks across a single physical network infrastructure. The benefit of using VLANs is being able to converge the IP video surveillance network (data traffic) onto the same physical network as the corporate data, thus reducing costs and increasing the ROI of the corporate network infrastructure.


Interdependencies – How They All Relate

The interdependency between the bandwidth, network switch and VLANs at first glance appears simple. The network switch isolates the data communications (bandwidth) of connected devices from each other and the VLANs isolate the data communications (bandwidth) of different networks from each other. However; it’s not quite that simple. Even though the network switches and VLANs isolate data communications (bandwidth) and can even prioritize types of data communications, there is still one element that is grossly over looked in network designs for IP video surveillance. That element is maximum performance of the network infrastructure or roadway. The best example is a 16-lane highway (eight lanes in either direction) represents a single network switch. On this six16-lane highway (network switch) there is a maximum of eight lanes in either direction. Mixed across these sixteen lanes are the different VLANs. There is a finite amount of lanes or network switch processing power. There can be no more lanes, just the eight and eight.  If all of the data communications (bandwidth) from all of the VLANs fills are 16 lanes (maximum packets per second for the network switch) the overall network will slow down. Traffic queuing (prioritization) helps, but if the highway is full then there will be a traffic jam.

How to prevent, or in reality to reduce the likelihood, of a network traffic jam impacting your IP video surveillance system is not always to have a separate dedicated video network, but to follow some simple rules of thumb. Always follow “Goes Into.” Know (calculate) the total minimum bandwidth required. Estimate (calculate) the worst case maximum total simultaneous bandwidth. Lastly, design the network or any segment to meet or nearly meet the bandwidth requirements for the worst case scenario. The upfront costs of the network will be slightly higher when designing for the worst case, but the return on the investment is reliability in a time of need. The ROI is in dollars. Dollars saved are varied. Dollars are saved by sharing the cost of the converged network infrastructure, potential loss due to litigation after a catastrophic event (because the system was available during this worst case scenario). In the end, understanding the basics of bandwidth, performance characteristics of network switches/VLANs and designing to the worst case potential is just smart practical business.   

KEYWORDS: infrastructure security video

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Like Peas and Carrots: Keeping Like Technologies Together with VLANs

    See More
  • It’s in the Mail – Oh, Oh!

    See More
  • Manages More Switches on One IP Address

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • threat and detection.jpg

    Surveillance and Threat Detection

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products

Events

View AllSubmit An Event
  • December 5, 2011

    Wireless Bandwidth

    When designing a surveillance system, there are occasions when a wireless connection may make sense for reasons such as cost, time savings, ease of installation, capabilities, or aesthetics. But will there be enough throughout to successfully pass your video on a constant basis? None of the arguments stated here will cause you to utilize a wireless link if it’s going to prove detrimental to the overall solution. In this session, we’ll look at the options and their outcomes under various situations, to help you to make an educated judgment on whether or not to go wireless.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing