Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video SurveillanceGovernment: Federal, State and LocalPorts: Sea, Land, & Air

How Mesh Networks Form the Backbone of Smart Cities

Wireless mesh networking is not for everyone. But, when it makes business sense, it works the best.

By Bill Zalud
December 1, 2013

Wireless mesh networking is not for everyone. But, when it makes business sense, it works the best.

Overall, a wireless mesh network is a communications network made up of radio nodes organized in a mesh topology. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. The mesh clients are often laptops, cellphones and other wireless devices while the mesh routers forward traffic to and from the gateways which may, but need not, connect to the Internet.

The coverage area of the radio nodes working as a single network is sometimes called a mesh cloud. Access to this mesh cloud is dependent on the radio nodes working in harmony with each other to create a radio network. A mesh network offers redundancy. When one node can no longer operate, the rest of the nodes can still communicate with each other, directly or through one or more intermediate nodes – often it is called self-forming and self-healing.

Wireless mesh networks can be implemented with various wireless technologies. Often in the security world, the application is security video. But enterprises and government agencies are going beyond video.

One example is intelligent transportation systems (ITS). And that’s the successful deployment of a state-of-art wireless intelligent transportation system for the Scottsdale, Ariz., Traffic Management Center (Scottsdale TMC). The ITS communications platform connects wirelessly to video cameras, traffic signal controllers and dynamic message signs on arterials throughout the city, so experts at the Scottsdale TMC can continuously monitor traffic activity from a central command center. The ability to view live video feeds from heavy traffic areas enables city officials to make fast, well-informed decisions on how to prevent and reduce daily congestion, improve driver information and manage traffic affected by special events, weather and emergency
situations.

           

Smart City Application

Scottsdale TMC’s wireless ITS network consists of 90 wireless mesh nodes, network management software and 86 pan-tilt-zoom digital video cameras. To monitor traffic flows more effectively, the video cameras are strategically placed on traffic signal poles at intersections throughout the city and connect directly to the city's network via the wireless mesh nodes. Live video feeds of the most heavily trafficked intersections are continuously displayed on a large video wall and on desktop monitors in the command center, where operators can identify congestion and spot incidents as they happen – enabling them to take corrective action and remedy congestion.

Among the wireless mesh benefits:

  • When collisions, spills or stalled vehicles occur, operators can adjust signal timing immediately to reduce the delay.
  • The system enables immediate detection and reporting to police, emergency services, media agencies and the public.
  • Costs are reduced by centralized traffic management and eliminating the need to deploy police officers at various locations.
  • The ITS enables Scottsdale to keep travel time on city streets steady and even reduce travel time as traffic volume increases due to population growth.

Scottsdale is a forward-looking “smart city” that is focused on implementing technology to improve the city’s critical infrastructure while saving taxpayer money. Migrating from its existing leased-line communications network to the newly deployed wireless infrastructure mesh network will save the city approximately $250,000 a year in lease fees alone, enabling the city to achieve full ROI in only four years.

 

Low Latency

The wireless infrastructure network was selected because it proved to be the only solution that could deliver 100 Mbps of very low latency throughput while maintaining “low-sight” (less than 20 feet above the ground) wireless connectivity over long distances. Because the network supports up to 15 consecutive links, or “hops,” it can easily be routed around buildings and trees rather than requiring giant 300-foot towers to operate above these obstacles.

Integrator Ken VandeVeer of Sage Designs believes that wireless mesh is not everyone’s solution, but for his clients with water and waste-water districts and municipalities, it is a natural fit. “These utilities and their life safety needs run on the same mesh network.” With mandated security requirements, as well as inherent operational features, security is becoming more important in the utility sector, says VandeVeer.

Another real-world use of wireless mesh for security and operations spotlights transit applications. For instance, a project with the New York Waterway Ferry raises the bar in situational awareness and emergency preparedness. The NY Waterway has carried more than 65 million passengers and has been an essential source of redundant transit capacity in times of crisis, such as after the 1993 and 2001 attacks on the World Trade Center and the regional blackout of August 2003.

Because the safety and security of passengers has always been a top priority, the NY Waterway wanted a wide-area wireless network and security solution with a coverage area that encompassed almost the entirety of the waterways surrounding Manhattan. This particular geography presents significant challenges for many RF (radio frequency) technologies. Some of these challenges include water, ice, three major nearby airports, constantly changing sites lines, all in one of the most densely populated cities in the country.

 

Covers a Wide Area 

Central to the solution is broadband connectivity in high-speed mobile environments. With it, the NY Waterway now has a high-speed wireless network with connectivity to all ports and ferries anywhere they operate. This wide-area wireless network and security solution has helped the NY Waterway improve communication, emergency response and preparedness throughout their fleet.  

Another application centers on police and transportation dashboard and onboard cameras. In the past, it was cumbersome and expensive to handle recording. With wireless networking, the solution creates results from real-time viewing to ease of storage and retrieval. 

KEYWORDS: city surveillance smart city utilities security wireless security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How Cities Use Mesh Networks for Surveillance

    See More
  • Mesh Networks Multiply Security Resources in Cities, Communities

    See More
  • city1-900px.jpg

    N.Y. State Comptroller Report Examines the Risks of Smart Cities

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing