Think You Know Jack?

Networked cameras bring an entirely new set of installation standards

Moving from analog to IP creates new cabling challenges for security installers. With networked cameras comes a whole set of installation standards and rules, defined as structured cabling.

Structured cabling includes running Ethernet protocol over network cabling media, which is either twisted pair copper or optical fiber. In a defined structured cabling channel, the horizontal cable that runs from the IDF/telecom room terminates at a workstation outlet at the device end. From there, a patch cord connects to the front of the outlet into the RJ-45 connection on the camera.

In some instances, it is not practical to have a workstation outlet and an exposed patch cord. So, similar to attaching a BNC connector at the end of a coax run, security installers are putting a plug on the end of Cat-5e or -6 cable, known as a direct attach to the camera. This “plug versus jack” quandary is among other differing cabling practices between data/ voice and other electronic safety and security devices, and has created a debate between telecommunications cabling installers and security integrators.

Know the Rules
Structured cabling standards, originally known as TIA-568-A (now “C”), were developed in the early 1980s for data and voice applications. The main premise was to provide consistency in media, connectors and topology to support multi-vendor equipment.

Standards simplified troubleshooting, reduced network downtime and costs, and provided a cabling system that accepted future IP devices and applications.

Ultimately, standards eliminated proprietary systems. Cabling for the security market is taking similar steps in the data and voice evolution. Currently most camera systems are proprietary. The hardware and software differ between manufacturers, which contribute to costs and limits ease of use and scalability, since users are tied to their original manufacturers for upgrades and repairs.

Structured cabling standards are not mandatory, but they include recommended installation practices and define the different copper and fiber cable and connecting hardware performance, channel performance levels and governing cabling distances. These standards provide detailed information on installation procedures for all spaces, including the workstation area, TR and equipment room, and cabling pathways.

Here are some highlights of the TIA-568 standards that security integrators will need to understand when handling copper network cable:

Maximum cable lengths: 90 meters for horizontal UTP or shielded twisted pair, 10 meters for patch cables.

Cable slack: Both ends of the horizontal cable should accommodate future cabling system changes, with 10 feet in the termination room and 12 inches (twisted pair) at the outlet.

Cable bend radius: Four times the cable diameter (or 1 inch) for UTP and 10x the cable diameter for 25-pair.

Cable Management and Pulling:
  • Control tension in suspended cable runs by limiting spans between supports to 5 feet or less.
  • Avoid tightly cinched cable bundles.
  • Avoid kinking during installation.
  • Avoid changing the geometry of the cable.
  • Follow manufacturers’ recommendations for loading of cable trays and j-hooks.
  • Avoid using tie wraps and staples.

Termination: Horizontal cable should not be connected directly to the telecommnications equipment; instead, suitable connector hardware (patch panels) and equipment cable (patch cords) should be used.

At the device/outlet end: Telecommunications outlets should be mounted securely at the work area location, and a patch cord from the jack to the work area equipment should not be more than 5 feet.

Because each security camera location is unique, these guidelines often can not be applied and must be addressed separately, which results in a direct attach.

Bending the Rules
What makes sense in a structured cabling design may not make sense in the real world of security. For instance, when installing the standards-approved outlet/jack scenario, the biggest challenge is placing an outlet in a secure location and protecting the jack and patch cord so it cannot be accessed and unplugged. In many camera installations, a junction box is placed between the horizontal cable and the patch cord to the camera. If this is installed outside, the cable must run through protective conduit -- or be rated for harsh environments -- and the junction box must meet certain safety codes (e.g., IP-67 rating). Another instance where an outlet is not an option pertains to ceiling-mount cameras where the cable and termination is located in plenum spaces. Patch cords and outlets are not plenum-rated.

The alternative method to the outlet/ jack termination is direct attach. But installers need to be aware that those runs may fall outside of cabling and connectivity warranties. Most structured cabling manufacturers, who are not aware of these unique circumstances, will not support this practice since it does not fall within the confines of the current TIA standards.

Best of Both Worlds
Some manufacturers, such Berk-Tek, have become entrenched in learning the differences in cabling practices in security versus data and voice. In looking at these outside-of-the-box scenes, they are taking a leadership role by engaging with security integrators to come up with special considerations. As a result, Berk-Tek offers certified security integrators training, certification and warranty through their OASIS program.

Within this program, Berk-Tek has selected specific Cat-5e and -6 plugs that would be warranted, in the case of a direct- attach channel.

If a plug or direct attach must be used for a horizontal cable run to the camera, make sure to test each cable run with a verification tool. Because a plugended cable channel will eliminate the first connection (the plug) when tested, check with the test equipment or cable manufacturer for the proper steps.

About the Author

Carol Everett Oliver, RCDD, is the marketing analyst with BerkTek, a Nexans Co.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Featured Cybersecurity

Webinars

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3