Network Design Fundamentals
A surveillance network is only as reliable as its infrastructure. While cameras and recorders get most of the attention in system design, the network connecting them is what determines whether the system actually works when it matters most. In Egypt, where installations range from small shops to sprawling industrial complexes, proper network design is the difference between a flawless system and one that fails at critical moments.
Bandwidth Calculation
The first step in network design is understanding bandwidth requirements. Each camera generates a continuous data stream whose size depends on resolution, frame rate, compression codec, and scene complexity. Here are typical bitrates:
2 megapixels (1080p) with H.265 at 25 fps: 2–4 Mbps per camera.
4 megapixels with H.265 at 25 fps: 4–8 Mbps per camera. The sweet spot for most professional installations.
8 megapixels (4K) with H.265 at 25 fps: 8–16 Mbps per camera.
Calculate total bandwidth by multiplying the bitrate per camera by the number of cameras, then add 30% for protocol overhead and management traffic. For a 32-camera system at 4 megapixels: 32 × 6 × 1.3 ≈ 250 Mbps required backbone capacity.
Network Topology
Star Topology: Each camera connects directly to a central switch. Simple and easy to troubleshoot. Best for small to medium installations within a single building. This is the most common topology in Egyptian installations.
Hierarchical Topology: Edge switches on each floor connect to distribution switches, then to a core switch. Essential for multi-story buildings and campus environments.
Ring Topology: Switches connect in a ring with redundancy protocols. If any link fails, traffic is automatically rerouted. Recommended for critical installations.
VLAN Segmentation
Always isolate surveillance traffic on its own VLAN. This serves multiple purposes: Security — prevents unauthorized access from the business network; Performance — ensures surveillance traffic does not compete with business applications; Management — simplifies troubleshooting.
A typical VLAN design includes: VLAN 10 for camera traffic, VLAN 20 for access control devices, VLAN 30 for workstations, VLAN 40 for management.
Quality of Service (QoS)
Video surveillance is latency-sensitive and intolerant of packet loss. Configure QoS on all managed switches to prioritize camera traffic. Without QoS, a backup operation can saturate a link and cause cameras to drop frames. With proper QoS, surveillance traffic always gets through.
Storage Network Considerations
The connection between cameras and the recorder is the most bandwidth-intensive link. A 64-camera system at 6 Mbps each generates 384 Mbps of continuous write traffic — requiring at least a Gigabit connection, preferably two with link aggregation.
For larger systems, consider a distributed recording architecture: multiple recorders each handling a subset of cameras. HikCentral from Hikvision supports this distributed approach with unified management.
Redundancy Planning
Identify single points of failure and design them out. Every critical link should have redundancy. For power, use switches with dual power supplies and UPS. For Egyptian installations where power reliability varies, size UPS units for at least 30 minutes.
Cabling Infrastructure
Use Cat6 or Cat6A cables for all new installations. For outdoor runs exceeding 90 meters, use fiber optic with media converters. Fiber is immune to electromagnetic interference and lightning — important considerations in Egyptian industrial environments.
Proper cable management extends system lifespan. Use cable trays, conduits, and organized wiring practices. Label everything. Maintain bend radius specifications. Avoid running network cables parallel to high-voltage power lines.
Documentation and Maintenance
Document your network design thoroughly: topology diagrams, VLAN assignments, IP address schemes, switch configurations, and cable maps. This documentation is invaluable for troubleshooting and expansion planning. FastEgy provides professional network design services for surveillance systems.