Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

American Fibertek’s Fernandes Talks Analog to Digital

July 6, 2007


The first factor is that signal transmission continues to migrate from point-to-point cable to a networked platform. In doing so, the traditional network devices traditionally responsible for trafficking signals over a network do not offer the functionality required specifically for video surveillance and security applications.
For example, a conventional network switch will indicate if there’s a valid network connection and if data is present. This is not adequate for networked video surveillance systems. Video streaming requires consistent signal transmission; without that, complete, fluid images cannot be transmitted, viewed and/or recorded. A conventional network switch will not tell you if you are consistently transmitting a D1 quality signal at real-time video rates. There are also other considerations such as input alarms, auxiliary outputs and the ability to handle other forms of communications. The second factor is that digital security systems store their information predominantly on hard disk drives (HDDs). Unfortunately, there is a widespread misconception in the security industry that HDDs and digital signal processing have solved the woes we all once experienced when analog video recorders were the preferred recording media in the industry. Although recording quality and performance have improved immensely with digital video recorders or DVRs, there are still serious issues at hand affecting security systems every day. The truth is that HDDs are very sensitive to environmental conditions, and have been in use by the computer industry for years without much attention to this all-important issue. The reason for this oversight is that HDDs were not developed to rotate non-stop 24/7 in computers as they now do when embedded in a DVR. The result is excessive heat. Combine DVRs in enclosed rack systems, and the problem escalates. Operating at the extreme limits of a DVR’s operating temperature range can reduce life expectancy by as much as 40 percent. In addition to dramatically increasing the total cost of ownership for DVRs, there’s the issue of lost, irreplaceable data if the HDD ceases to operate. These two factors alone have provided the impetus for us to develop more advanced network transmission and environmental monitoring solutions specifically for video surveillance and security applications.
 
Security Magazine: What are the main considerations when planning or evaluating video surveillance and security network infrastructure?
 
Fernandes: Bandwidth is the most important single criterion when designing a networked video surveillance and security system. There are generally two misconceptions our staff encounters frequently. The first is that the specified available port bandwidth of a network is completely available for trafficking video surveillance signals. In reality, only about 50 percent of the specified bandwidth is actually present after system overheads are accounted for. This problem is compounded as network recording and viewing operations and applications both require additional bandwidth further diminishing available bandwidth. The second misconception is that this bandwidth is always available. In many instances, IP video security system operations share a network with traditional IT operations. As a result, there will often be times when an individual camera may not be available for either viewing or recording from lack of “available” bandwidth as a result of network traffic. This is simply not an acceptable situation for video surveillance and security applications.
 
Security Magazine: Can IT and security coexist?
 
Fernandes: Given the continued migration to networked video surveillance and security systems, I believe we will see relationships between IT and security professionals also continue to grow. If only one backbone exists, there will inevitably be issues to be resolved as a result of using a shared network. The best way to achieve this is to divide functionality between IT and security personnel so that each maintains control over their respective functions without affecting the other. “There is a widespread misconception that HDDs and digital signal processing have solved the woes we all once experienced when analog video recorders were the preferred recording media,” observed Jack Fernandes, president and CEO of American Fibertek.

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing