Think You Know Jack?

Networked cameras bring an entirely new set of installation standards

Moving from analog to IP creates new cabling challenges for security installers. With networked cameras comes a whole set of installation standards and rules, defined as structured cabling.

Structured cabling includes running Ethernet protocol over network cabling media, which is either twisted pair copper or optical fiber. In a defined structured cabling channel, the horizontal cable that runs from the IDF/telecom room terminates at a workstation outlet at the device end. From there, a patch cord connects to the front of the outlet into the RJ-45 connection on the camera.

In some instances, it is not practical to have a workstation outlet and an exposed patch cord. So, similar to attaching a BNC connector at the end of a coax run, security installers are putting a plug on the end of Cat-5e or -6 cable, known as a direct attach to the camera. This “plug versus jack” quandary is among other differing cabling practices between data/ voice and other electronic safety and security devices, and has created a debate between telecommunications cabling installers and security integrators.

Know the Rules
Structured cabling standards, originally known as TIA-568-A (now “C”), were developed in the early 1980s for data and voice applications. The main premise was to provide consistency in media, connectors and topology to support multi-vendor equipment.

Standards simplified troubleshooting, reduced network downtime and costs, and provided a cabling system that accepted future IP devices and applications.

Ultimately, standards eliminated proprietary systems. Cabling for the security market is taking similar steps in the data and voice evolution. Currently most camera systems are proprietary. The hardware and software differ between manufacturers, which contribute to costs and limits ease of use and scalability, since users are tied to their original manufacturers for upgrades and repairs.

Structured cabling standards are not mandatory, but they include recommended installation practices and define the different copper and fiber cable and connecting hardware performance, channel performance levels and governing cabling distances. These standards provide detailed information on installation procedures for all spaces, including the workstation area, TR and equipment room, and cabling pathways.

Here are some highlights of the TIA-568 standards that security integrators will need to understand when handling copper network cable:

Maximum cable lengths: 90 meters for horizontal UTP or shielded twisted pair, 10 meters for patch cables.

Cable slack: Both ends of the horizontal cable should accommodate future cabling system changes, with 10 feet in the termination room and 12 inches (twisted pair) at the outlet.

Cable bend radius: Four times the cable diameter (or 1 inch) for UTP and 10x the cable diameter for 25-pair.

Cable Management and Pulling:
  • Control tension in suspended cable runs by limiting spans between supports to 5 feet or less.
  • Avoid tightly cinched cable bundles.
  • Avoid kinking during installation.
  • Avoid changing the geometry of the cable.
  • Follow manufacturers’ recommendations for loading of cable trays and j-hooks.
  • Avoid using tie wraps and staples.

Termination: Horizontal cable should not be connected directly to the telecommnications equipment; instead, suitable connector hardware (patch panels) and equipment cable (patch cords) should be used.

At the device/outlet end: Telecommunications outlets should be mounted securely at the work area location, and a patch cord from the jack to the work area equipment should not be more than 5 feet.

Because each security camera location is unique, these guidelines often can not be applied and must be addressed separately, which results in a direct attach.

Bending the Rules
What makes sense in a structured cabling design may not make sense in the real world of security. For instance, when installing the standards-approved outlet/jack scenario, the biggest challenge is placing an outlet in a secure location and protecting the jack and patch cord so it cannot be accessed and unplugged. In many camera installations, a junction box is placed between the horizontal cable and the patch cord to the camera. If this is installed outside, the cable must run through protective conduit -- or be rated for harsh environments -- and the junction box must meet certain safety codes (e.g., IP-67 rating). Another instance where an outlet is not an option pertains to ceiling-mount cameras where the cable and termination is located in plenum spaces. Patch cords and outlets are not plenum-rated.

The alternative method to the outlet/ jack termination is direct attach. But installers need to be aware that those runs may fall outside of cabling and connectivity warranties. Most structured cabling manufacturers, who are not aware of these unique circumstances, will not support this practice since it does not fall within the confines of the current TIA standards.

Best of Both Worlds
Some manufacturers, such Berk-Tek, have become entrenched in learning the differences in cabling practices in security versus data and voice. In looking at these outside-of-the-box scenes, they are taking a leadership role by engaging with security integrators to come up with special considerations. As a result, Berk-Tek offers certified security integrators training, certification and warranty through their OASIS program.

Within this program, Berk-Tek has selected specific Cat-5e and -6 plugs that would be warranted, in the case of a direct- attach channel.

If a plug or direct attach must be used for a horizontal cable run to the camera, make sure to test each cable run with a verification tool. Because a plugended cable channel will eliminate the first connection (the plug) when tested, check with the test equipment or cable manufacturer for the proper steps.

About the Author

Carol Everett Oliver, RCDD, is the marketing analyst with BerkTek, a Nexans Co.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3