Think You Know Jack?

Networked cameras bring an entirely new set of installation standards

Moving from analog to IP creates new cabling challenges for security installers. With networked cameras comes a whole set of installation standards and rules, defined as structured cabling.

Structured cabling includes running Ethernet protocol over network cabling media, which is either twisted pair copper or optical fiber. In a defined structured cabling channel, the horizontal cable that runs from the IDF/telecom room terminates at a workstation outlet at the device end. From there, a patch cord connects to the front of the outlet into the RJ-45 connection on the camera.

In some instances, it is not practical to have a workstation outlet and an exposed patch cord. So, similar to attaching a BNC connector at the end of a coax run, security installers are putting a plug on the end of Cat-5e or -6 cable, known as a direct attach to the camera. This “plug versus jack” quandary is among other differing cabling practices between data/ voice and other electronic safety and security devices, and has created a debate between telecommunications cabling installers and security integrators.

Know the Rules
Structured cabling standards, originally known as TIA-568-A (now “C”), were developed in the early 1980s for data and voice applications. The main premise was to provide consistency in media, connectors and topology to support multi-vendor equipment.

Standards simplified troubleshooting, reduced network downtime and costs, and provided a cabling system that accepted future IP devices and applications.

Ultimately, standards eliminated proprietary systems. Cabling for the security market is taking similar steps in the data and voice evolution. Currently most camera systems are proprietary. The hardware and software differ between manufacturers, which contribute to costs and limits ease of use and scalability, since users are tied to their original manufacturers for upgrades and repairs.

Structured cabling standards are not mandatory, but they include recommended installation practices and define the different copper and fiber cable and connecting hardware performance, channel performance levels and governing cabling distances. These standards provide detailed information on installation procedures for all spaces, including the workstation area, TR and equipment room, and cabling pathways.

Here are some highlights of the TIA-568 standards that security integrators will need to understand when handling copper network cable:

Maximum cable lengths: 90 meters for horizontal UTP or shielded twisted pair, 10 meters for patch cables.

Cable slack: Both ends of the horizontal cable should accommodate future cabling system changes, with 10 feet in the termination room and 12 inches (twisted pair) at the outlet.

Cable bend radius: Four times the cable diameter (or 1 inch) for UTP and 10x the cable diameter for 25-pair.

Cable Management and Pulling:
  • Control tension in suspended cable runs by limiting spans between supports to 5 feet or less.
  • Avoid tightly cinched cable bundles.
  • Avoid kinking during installation.
  • Avoid changing the geometry of the cable.
  • Follow manufacturers’ recommendations for loading of cable trays and j-hooks.
  • Avoid using tie wraps and staples.

Termination: Horizontal cable should not be connected directly to the telecommnications equipment; instead, suitable connector hardware (patch panels) and equipment cable (patch cords) should be used.

At the device/outlet end: Telecommunications outlets should be mounted securely at the work area location, and a patch cord from the jack to the work area equipment should not be more than 5 feet.

Because each security camera location is unique, these guidelines often can not be applied and must be addressed separately, which results in a direct attach.

Bending the Rules
What makes sense in a structured cabling design may not make sense in the real world of security. For instance, when installing the standards-approved outlet/jack scenario, the biggest challenge is placing an outlet in a secure location and protecting the jack and patch cord so it cannot be accessed and unplugged. In many camera installations, a junction box is placed between the horizontal cable and the patch cord to the camera. If this is installed outside, the cable must run through protective conduit -- or be rated for harsh environments -- and the junction box must meet certain safety codes (e.g., IP-67 rating). Another instance where an outlet is not an option pertains to ceiling-mount cameras where the cable and termination is located in plenum spaces. Patch cords and outlets are not plenum-rated.

The alternative method to the outlet/ jack termination is direct attach. But installers need to be aware that those runs may fall outside of cabling and connectivity warranties. Most structured cabling manufacturers, who are not aware of these unique circumstances, will not support this practice since it does not fall within the confines of the current TIA standards.

Best of Both Worlds
Some manufacturers, such Berk-Tek, have become entrenched in learning the differences in cabling practices in security versus data and voice. In looking at these outside-of-the-box scenes, they are taking a leadership role by engaging with security integrators to come up with special considerations. As a result, Berk-Tek offers certified security integrators training, certification and warranty through their OASIS program.

Within this program, Berk-Tek has selected specific Cat-5e and -6 plugs that would be warranted, in the case of a direct- attach channel.

If a plug or direct attach must be used for a horizontal cable run to the camera, make sure to test each cable run with a verification tool. Because a plugended cable channel will eliminate the first connection (the plug) when tested, check with the test equipment or cable manufacturer for the proper steps.

About the Author

Carol Everett Oliver, RCDD, is the marketing analyst with BerkTek, a Nexans Co.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3