Jump to content
Security Installer Community

All Activity

This stream auto-updates

  1. Today
  2. Haha, the 'any old how' approach definitely has its place when you're in a pinch, but physical separation is still my gold standard for sleeping soundly at night. My main reason for pushing physical over VLAN in these multi-node PoE setups is troubleshooting speed. If the client’s IT guy decides to ‘optimize’ the main office network and resets a core switch, I don't want my camera backbone going down with it. There’s nothing quite like the simplicity of a dedicated pipe that doesn't care what the rest of the building is doing. Out of curiosity, when you do go the VLAN route for these, do you usually stick with Layer 2 at the edge or do you prefer routing it at the core to keep the broadcast traffic completely isolated?
  3. Last week
  4. Seperate physical network, occasionally vlan it Or think of how they do it in hull and get it to work any old how lol
  5. Spot on, James. It’s always the STP (Spanning Tree) or IGMP Snooping that bites you when you least expect it with managed gear. In a high-traffic CCTV environment, I’ve seen those 'optimizations' cause more heartaches than they solve. For these types of multi-node builds, I’ve found that a solid, high-backplane unmanaged switch at the edge—and keeping the 'smart' stuff strictly at the core—tends to keep the ghost in the machine away. Appreciate the feedback, guys! Spot on. 'Removing variables' is the best piece of advice anyone can give in this trade. The moment you share a backbone with a client's generic IT traffic, you're at the mercy of their firmware updates and VLAN misconfigurations. I've been pushing for fibre backbones on larger residential and commercial sites specifically for that reason—it future-proofs the bandwidth and eliminates EMI issues in one go. There’s nothing worse than an intermittent 'ghost' lag that only happens when the site IT decides to run a backup during peak monitoring hours. Dedicated is definitely the way to go for peace of mind.
  6. Totally get that. Managed switches can be a nightmare if the IGMP snooping or STP isn't dialed in perfectly for multicast video traffic—suddenly you're chasing 'network' issues that are actually just configuration headaches. For those budget-conscious builds, I've started leaning towards high-bandwidth 'unmanaged plus' or web-managed gear. It gives just enough visibility to see if a port is flapping without the complexity of a full enterprise stack. Keeps the project on budget and the service calls to a minimum. Do you guys usually go with a separate physical network for the CCTV, or just VLAN it off on the main house/office net?
  7. Separate network and unmanaged switches. Consider fibre for backbone. You're removing variables that way. Sharing the sites network will only mean liaising with IT departments and intermittent issues you have no control over. Fine, if your site IT on a job creation scheme not so good for us.
  8. Any switch that works, dlink , hik , anything within a budget , never really had issue except some of the managed switches cause some headaches
  9. Hi al-yeti, not selling anything here! I'm a system integrator focusing on networking and security infrastructure. I just noticed these latency issues recurring in recent multi-node builds and thought sharing some field-tested tweaks might help others facing the same "ghost in the machine." I'm actually curious—in your 16+ channel installs, do you usually stick with dedicated CCTV switches like Hikvision/Dahua, or do you prefer enterprise gear like Cisco/Aruba for the backbone?
  10. Hi everyone, Having worked on several high-end residential and industrial security integrations recently, I’ve noticed a recurring issue with video lag and frame drops when scaling beyond 8+ IP cameras on a single managed switch. A few "field-tested" adjustments that have significantly improved stability for my builds: MTU Tuning: Standard 1500 is usually fine, but in high-traffic VLANs, ensuring your NVR and switches are perfectly synced on Jumbo Frame settings (if supported) can reduce overhead. Subnet Isolation: Never let the security traffic mingle with the home/office guest Wi-Fi. It sounds basic, but broadcast storms from IoT devices are the #1 killer of smooth 4K streams. Power Budgeting: Always calculate the "cold start" draw. Some PTZ cameras spike significantly during initialization, which can cause intermittent reboots if your PoE budget is too tight (even if the "active" draw looks fine). Would love to hear how you guys handle bandwidth management for larger 16-32 channel installs. Any specific switch brands you’ve found to be particularly reliable for 24/7 heavy lifting? Best, Eason
  11. Ajax seem to be pushing their wares to electricians mostly and probably Ariel fitters.. I've seen Youtube videos by Efix and that Cambridge spark that claims his the biggest and best both promoting them. I think they also had an advert in the electricians trade mag as a spark mate was asking about them.
  12. Hi and welcome Just be aware this is a UK forum and tech varies from country to country.
  13. They claimed compliance, but its self certificated which is a bit like your local tyre garage claiming its Ferrari authorised
  14. Round these parts seems they using it for coms, it a cheaper way to give clients coms , I don't really know much about fire and coms but seems it's about it being cheap
  15. Check before you fit it self cert doesn't meet g2. If you cert it that's on you
  16. There appears to be a growing Ajax fire alarm fan club .like the cult of Orisec.... I just don't see why ?
  17. Fire alarm guys love it too lol I think it works better than orisec apparently
  18. The ariel fitters appear to love it ! The cool kids like HKC I use Enforcer as domestic radio alarm
  19. I see people use it, I suppose it's better than having things like ring but it is primarily wireless only , made Ukraine , seems to be expanding Not sure if this version will clean cookers yet tho I am surprised some installers stick by it as its options are limited when facing hybrid situations, but then I assume they install something else when they get stuck
  20. Hi all, I have recently been testing out an AJAX Wireless Alarm System. So far it seems pretty good. Just wondering if anyone here has used these systems? and what are they like in the long term for reliability? ...and how long do the batteries really last in real life use please? Thanks
  21. Earlier
  22. Hello everyone, I'm a new strawberry here. I thought I should create an account as I've read through some threads about questions relevant to me. Seems like this is a good forum Thanks!
  1. Load more activity
  • Who's Online   1 Member, 0 Anonymous, 53 Guests (See full list)

  • Member Statistics

    52,287
    Total Members
    1,664
    Most Online
    IrnBruMan
    Newest Member
    IrnBruMan
    Joined
  • Forum Statistics

    33.5k
    Total Topics
    448k
    Total Posts
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.