A Fine Balance: Bandwidth Consumption vs Live Video Monitoring

A Fine Balance: Bandwidth Consumption vs Live Video Monitoring

Managing security along public transit routes comes with many challenges, particularly as more people rely on buses and trains for daily transportation. With so many commuters, and multiple vehicles moving around the clock, the risk factor for accidents, altercations and other issues remains high.

Advanced, real-time video surveillance monitoring is a critical part of protecting the public. When an incident occurs on a transit vehicle, you can immediately see what’s happening, and also share that video with police or other emergency personnel.

Most transportation agencies, however, don’t have an unlimited budget to live stream high resolution megapixel images to their command center. Streaming 1080p video over a 4G LTE network, for example, can be costly, especially when multiplied over hundreds of buses or trains each with multiple surveillance cameras.

So how can transportation agencies maintain regular live access to their mobile surveillance cameras without incurring a massive expense?  Here’s some advice on managing mobile bandwidth consumption.

1. Pre-program your IP cameras

One of the most effective ways to reduce your bandwidth is to pre-program your IP surveillance cameras based on activity level. This takes a bit of time, but it’s well worth the effort. There’s no sense in capturing 1080p images inside of an empty bus, so do a thorough review of your agency’s surveillance needs. When do you absolutely need 720p or 1080p images? And when will a 2CIF or 4CIF image suffice? Remember that the amount of activity the cameras are capturing affects the bit rate, so consider the complexity of your scenes. You can maximize your bandwidth by programming your IP cameras to record at the right bit rates for your vehicles’ activity levels.

Let’s take a closer look at how to do this:

During low activity times (when fewer riders are on board a vehicle, or the vehicle is parked at a depot) you’re capturing mainly static scenes. In this scenario, capturing a 2CIF resolution image at 15 frames per second (fps) would result in a camera bit rate of 0.11 Megabits per second (Mbps).

Capturing this same scene in 1080p, at 30 fps, would result in a camera bit rate of approximately 2.4 Mbps, more than 20 times the bandwidth of the 2CIF image. So you can see how a little adjustment at the right time goes a long way toward reducing your overall bandwidth consumption.

Here are a few more scenarios to consider:

  • During medium activity level times (in between peak hours, for example, when your vehicles are making frequent stops and passengers are getting on and off the vehicle) your cameras are consuming more bandwidth.

 

A 2CIF image captured at 15 fps would result in a camera bit rate of 0.33 Mbps. A 4CIF image, also captured at 15 fps, would result in bit rate of 0.55 Mbps. A 1080p image, also captured at 15 fps, would result in 3.78 Mbps.

  • During your highest activity times (defined as those periods where there are many passengers onboard vehicles and therefore lots of motion) you will be consuming the most bandwidth because the cameras are capturing complex scenes.

 

A 2CIF image captured at 15 fps results in a camera bit of 0.72 Mbps. A 4CIF image captured at 15 fps results in a camera bit rate of 1.22 Mbps while a 1080p image, also captured at 15fps, results in 8.25 Mbps.

Understanding the impact your frame rates have on bandwidth consumption during low, medium and high activity periods is key, and sets you up well for the next step in this process.

2. Strike the right balance

The key here is to find the best balance between image quality and bandwidth consumed. You don’t want to incur bandwidth costs to view high resolution images of empty buses, but you also don’t want grainy, pixelated images when you are trying to decipher important details.

The best approach is to test a few, different resolutions and frame rates at different times to find the right balance.

Remember, the numbers cited above are examples, and factors like the position of your surveillance cameras, the lighting inside your vehicles, and the type of scenes captured all play a part in bandwidth consumption.

3. Take advantage of alternate stream recording

Once you have determined the best bit rates to use throughout the day, you may be asking yourself: “What if an incident occurs on a vehicle at a time when I’ve programmed my cameras to capture only 2CIF images?”

The answer, of course, is to use alternate stream recording. Use the low resolution stream for live viewing, and then record a higher resolution stream to your network video recorder (NVR). This gives your command center the ability to see into buses or light rail trains as needed using much less bandwidth, and still ensures that the system is capturing high quality, evidentiary video that you can pull later for forensic analysis should an incident occur.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3