Is the transmitting and storing of CCTV images using the IP protocol widely used on computer networks. This technology brings integration and infrastructure advantages over legacy analogue networks using dedicated coaxial cabling systems.

When combined with video management systems, along with an array of applications for processing and analysing video images, IP CCTV provides an entire new arena of surveillance capabilities that didn’t previously exist.


While IP CCTV isn’t necessarily the answer to every problem, it provides real benefits over traditional analogue CCTV technology. Some of these benefits can be quantified and deliver measurable cost benefits, while others are more difficult to measure but are convincing nonetheless.

While traditional analogue CCTV systems typically require a dedicated fibre-optic or copper cable for each camera with additional cables required for power and camera control, IP cameras can use standard Cat-5/6 structured network cabling. With PoE (Power over Ethernet) the same cable can be used for video, audio, data, camera control and power, and the network infrastructure can be shared with other network services to achieve IP network convergence.
The use of a standard network infrastructure means that it is relatively easy to add additional devices to the system – cameras, workstations, storage, etc. Adding a new camera just requires connecting the camera to the network, configuring the network settings on the camera, and configuring the NVR or NVMS so that it knows about the new camera. The camera or other device may be on the same physical site, or may be on the other side of the world.

Whereas in the past recorded video has been stored in specialist video recorders, the use of IP CCTV means that we can take advantage of standard IT storage systems. Storing large amounts of data is nothing new in IT systems, and we can now use high-capacity Storage Area Networks (SAN) to reliably store huge amounts of recorded video and provide instant access to this data.
IP CCTV is based on international IT standards so that there is a clear evolution path from current technology to future developments. As new technology is developed for PC hardware, operating systems, data storage, network transmission and video encoding then IP CCTV will be able to ride on the crest of the wave and take advantage of these developments.

Another advantage of using standard IT technology is that it makes it easier to integrate IP CCTV with other applications. CCTV is no longer a separate application, but can be integrated with standard IT systems to provide centralised control and monitoring. Data from other security devices and from business systems can be associated with IP CCTV images and recordings to provide full ‘situational awareness’.

While early video analytics systems were server based with each camera routed back to a central analytics server, the advent of IP video and video encoders has led to edge-based architectures where the analytics is performed in a DSP (Digital Signal Processor) on the video encoder or camera. This distributed architecture has the advantage that high-resolution video does not necessarily have to be transmitted to a central server for processing.
The exponential growth of the Internet has fuelled enormous development in IP transmission technology, and IP video data can be easily and securely transmitted between two devices within the same building or between continents, using any combination of wired and wireless networks. Unlike traditional analogue video signals which lost some quality during transmission, IP video data can be re-transmitted and re-recorded as often as required without any change in quality.

While traditional CCTV systems have always been restricted to a maximum 4CIF interlaced picture resolution, IP CCTV has allowed us to move beyond this limitation and develop megapixel cameras with much higher resolution than traditional cameras.

IP Access Control

E-BIS Ltd partner with many of the industry leading manufacturers for IP Access Control Systems.

The purpose of an access control system is to protect people and assets, as well as to control and record movement of those people and any alarms or events that occur.
Access control systems must perform these tasks reliably, predictably and in a timely manner.

The implementation of these systems must minimize vulnerability to achieve the highest level of reliability and performance.

In a traditional deployment of an access control system to a door, a door controller is connected back to a network (non-IP) or building controller (different manufacturers use different names for these devices). The door controller typically handles two card readers so it can handle one or two doors depending on whether one door is using a card reader for both entrance and exit.
The control frame is a junction box with power that controls each of the devices. The power supply for the controller is providing DC power along with a battery back-up.

In the IP-based systems there is a direct network connection to either the door controller or the card reader and key fobs, card swipes, fingerprint recognition and simple keypad entry are all available depending upon the complexity of your security requirements