Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Bandwidth, Switches and VLANs – Oh My!

January 1, 2011

Understanding Bandwidth

Bandwidth is the amount of data transmitted across a network infrastructure per second. Data, in the case of IP video surveillance, is the transmission or streaming of either live video from cameras or storage playback. With regards to an IP video surveillance system, bandwidth is the sum of all of the data communications flows of all of the various components. Some data flows are for inter-device communications, called overhead, which do not generate enough data bandwidth to be statistically relevant. Calculating the total bandwidth required for an IP video surveillance system can be simplified by following an old IT rule of thumb: “Goes Into.”

Goes Into is basically the process of summing up all of the fixed video streams (live) and all of the potential video streams (storage playback and multiple instances of any live stream) for the entire IP video surveillance system and/or any specific network section. An example is a 32 IP camera system with all storage on a NVR on a dedicated LAN. Each camera’s live stream is 3Mbs and the stored stream is 1.5Mbs. Each camera will require at all times a minimum of 1.5Mbs for a system total minimum of 48Mbs.


Understanding Network Switches

Ethernet network switches are devices that join computers and other network based devices together within a single physical local area network (LAN). Switches are also used to link together multiple network switches. The original benefit of network switches was the ability to isolate the data communications to/from any connected device from any of the other connected devices. Network switches have become increasingly more intelligent and can now provide VLANs as well as some network traffic prioritization or queuing.


Understanding VLANs

VLANs or Virtual Local Area Networks are logical LANs, created within the network switches, too segment multiple networks across a single physical network infrastructure. The benefit of using VLANs is being able to converge the IP video surveillance network (data traffic) onto the same physical network as the corporate data, thus reducing costs and increasing the ROI of the corporate network infrastructure.


Interdependencies – How They All Relate

The interdependency between the bandwidth, network switch and VLANs at first glance appears simple. The network switch isolates the data communications (bandwidth) of connected devices from each other and the VLANs isolate the data communications (bandwidth) of different networks from each other. However; it’s not quite that simple. Even though the network switches and VLANs isolate data communications (bandwidth) and can even prioritize types of data communications, there is still one element that is grossly over looked in network designs for IP video surveillance. That element is maximum performance of the network infrastructure or roadway. The best example is a 16-lane highway (eight lanes in either direction) represents a single network switch. On this six16-lane highway (network switch) there is a maximum of eight lanes in either direction. Mixed across these sixteen lanes are the different VLANs. There is a finite amount of lanes or network switch processing power. There can be no more lanes, just the eight and eight.  If all of the data communications (bandwidth) from all of the VLANs fills are 16 lanes (maximum packets per second for the network switch) the overall network will slow down. Traffic queuing (prioritization) helps, but if the highway is full then there will be a traffic jam.

How to prevent, or in reality to reduce the likelihood, of a network traffic jam impacting your IP video surveillance system is not always to have a separate dedicated video network, but to follow some simple rules of thumb. Always follow “Goes Into.” Know (calculate) the total minimum bandwidth required. Estimate (calculate) the worst case maximum total simultaneous bandwidth. Lastly, design the network or any segment to meet or nearly meet the bandwidth requirements for the worst case scenario. The upfront costs of the network will be slightly higher when designing for the worst case, but the return on the investment is reliability in a time of need. The ROI is in dollars. Dollars saved are varied. Dollars are saved by sharing the cost of the converged network infrastructure, potential loss due to litigation after a catastrophic event (because the system was available during this worst case scenario). In the end, understanding the basics of bandwidth, performance characteristics of network switches/VLANs and designing to the worst case potential is just smart practical business.   

KEYWORDS: infrastructure security video

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Like Peas and Carrots: Keeping Like Technologies Together with VLANs

    See More
  • It’s in the Mail – Oh, Oh!

    See More
  • Manages More Switches on One IP Address

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • threat and detection.jpg

    Surveillance and Threat Detection

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products

Events

View AllSubmit An Event
  • December 5, 2011

    Wireless Bandwidth

    When designing a surveillance system, there are occasions when a wireless connection may make sense for reasons such as cost, time savings, ease of installation, capabilities, or aesthetics. But will there be enough throughout to successfully pass your video on a constant basis? None of the arguments stated here will cause you to utilize a wireless link if it’s going to prove detrimental to the overall solution. In this session, we’ll look at the options and their outcomes under various situations, to help you to make an educated judgment on whether or not to go wireless.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing