SlideShare a Scribd company logo
1 of 7
Download to read offline
Your Best Partner of IP Surveillance 1
Along with the emerging market of IP surveillance, network plays increasingly
important role in a video surveillance system. The network in its turn, determines
the reliability and quality of video delivery. This paper describes the importance of
network redundancy for IP surveillance network. It gives a clear idea of how Korenix
patented MSR redundancy technology outstands from other protocols and describes
all the exceptional benefits that it can give to the IP surveillance system.
Network Redundancy is Critical for IP Surveillance
Legacy IP surveillance network is connected into a star topology where video
streams are transmitted from cameras to the monitoring room. Closer is the link to
the monitoring room, more video streams are carried through a single Ethernet
cable. A single link failure will result in serious loss of images which is not
acceptable for a surveillance system. As a result, network redundancy is critical for
IP surveillance.
 
Figure 1. A link failure occurred in an IP
surveillance network results serious loss of
images.
Ensuring Network
Reliability and Quality
for IP Surveillance
Korenix MSR: The Most Reliable and
High Quality IP Surveillance Network
Your Best Partner of IP Surveillance
Your Best Partner of IP Surveillance
www.korenixsecurity.com
2 
The Best Choice of Network Redundancy Technology
To protect a surveillance network from failure, a redundancy technology is required.
RSTP (Rapid Spanning Tree Protocol, IEEE 802.1w) is commonly chosen for network
redundancy. While RSTP can provide redundancy, its original design is for
interconnectivity: to connect network devices from different vendors in any
topology without problem. Since RSTP requires a complex algorithm to handle this,
it cannot guarantee the failure recovery time which can take up to few seconds. Lots
of images can be lost while RSTP recovers the failure.
Furthermore, the scalability of an RSTP network is limited. According to the standard,
the maximum level of switches connected from the central room to the cameras is
limited to 20. This constrains RSTP from constructing a large scale surveillance
system.   
 
RSTP Korenix MSR
Standard IEEE 802.1w Korenix Patented
Purpose Interconnectivity Redundancy
Topology Any Ring
Algorithm Complex Simple
Failure Recovery Not Deterministic, <5s Deterministic, < 5ms
Failure Restoration
(Upon the failure is fixed)
Packet loss
Topology change
Seamless Restoration
No packet loss
No loop
No topology change
Scalability 20 in depth 250 in a ring
Table 1. Comparison of RSTP and Korenix MSR redundant ring
To solve these problems, Korenix introduces MSR (Multiple Super Ring), the
surveillance redundant ring technology, which is specifically designed for building
the most reliable, high quality and scalable IP surveillance networks. With the
simplest network architecture, Korenix MSR guarantees the failure recovery time
within 5ms. Video streams are protected from any network failure and can be
resumed even without being noticed.
Your Best Partner of IP Surveillance
www.korenixsecurity.com
3 
Figure 2: Korenix MSR protects an IP surveillance network from link failure. Video resumes
from a failure with in 5ms.
The maximum number of switches in a single Korenix surveillance redundant ring is
250. Several rings can be connected together for larger surveillance network. Unlike
RSTP, which treats all LAN devices as a single system, each of Korenix surveillance
redundant rings operates independently. The influence of any network failure is
limited within the ring itself and will not spread to the other parts. As a result, MSR
provides the most scalable IP surveillance network and high quality video
transmission.
 
 
Figure 3: Even with the same topology, RSTP treats all rings as a single network. Any link
failure affects the whole network and the recovery time is longer because of its complexity.
On the contrary, Korenix redundant ring works independently and guarantees the failure
recovery time within 5ms.
In addition, RSTP results in packet loss and topology change when a network failure
is restored. A topology change leads to image loss and packet flooding to
everywhere. This prolongs system downtime, consumes bandwidth and downgrades
the video quality. Korenix MSR introduces an error-free restoration procedure,
Seamless Restoration. There will be no any packet loss, no loop and no topology
change when restoring a broken ring to its original redundant-guarantee state. The
patented mechanism eliminates any unstable status and guarantees the best quality
and smooth video delivery.
Your Best Partner of IP Surveillance
www.korenixsecurity.com
4 
Figure 4. Compared to other protocols, Korenix MSR guarantees the most reliable
and quality video delivery
How Korenix Surveillance Redundant Ring Works
There are 5 stages in the ring operation: Setup, Normal, Failure Recovery, Abnormal,
and Restoration.
1. Setup State: The switches are linked into a ring topology. One of the switches is
selected as RM (Ring Master) to manage the ring. RM blocks one of its ring paths
for redundancy.
2. Normal State: RM starts to monitor the live status of ring in case of any network
failure.
3. Failure Recovery: Following the failure, either caused by a link break, device
down, or system maintenance, RM notices the failure and recovers the network
connectivity by activating its redundant path immediately. The video resumes
through the redundant path. IT staff can be notified of the failure event through
alarm, email, or SNMP trap.
4. Abnormal State: The ring is broken and has no redundancy capability. IT staff
starts trouble shooting and requires restoring the failure in the shortest period.
RSTP and Other Ring Protocols
Failure recovery < 50ms Failure recovery > 1s Broadcast Storm
Other protocols require longer recovery time. The longer it recovers the more images are
loss. During restoration, some ring protocols result in broadcast storm which overwhelms the
network. No images can be seen.
Korenix MSR Technology
Rapid failure recovery < 5ms Seamless Restoration
Video streams resume even without being
noticed.
Restoration time = 0, no packet loss, no
broadcast storm and no topology change.
Video continues smoothly.
Your Best Partner of IP Surveillance
www.korenixsecurity.com
5 
5. Restoration: IT staff fixes the failure and the ring regains its redundant
capability.
The Most Reliable, High Quality and Scalable IP Surveillance
Network
Compared to other protocols, Korenix patented redundant ring is superior in all
stages to provide the most reliable and high quality IP surveillance network.
1. Easy Setup: Korenix MSR provides a simple and time-saving setup mechanism
with auto selection of the RM and of the best redundant route. The deployment of
a ring is easy and does not require professional network knowledge.
2. Efficient Control: Korenix MSR monitors the ring status with minimum
bandwidth consumption, less than 1kbps. The efficient design reserves the
network resources for video surveillance demands.
Korenix MSR Other Rings RSTP
Setup RM auto selection
Redundant path auto
selection
Manual configuration Complex parameter
setting
Link
Failure
5 ms recovery
Multiple redundancy
< 300ms Not deterministicFailure
Recovery
Device
Failure
5 ms recovery
RM redundancy
< 300ms
No RM redundancy
Not deterministic
Failure Detection Failure notification
Failure Positioning
Failure notification Topology change
notification
Failure
Restoration
Seamless Restoration
No packet loss
No broadcast storm
No topology change
Topology change
Broadcast storm
Topology change
Packet loss
Table 2. Comparison of redundancy technologies in all stages of ring operation
3. Rapid Failure Recovery and RM Redundancy: Korenix MSR guarantees the
recovery of a network failure, either link or device failure, within 5ms; video
streams continue smoothly. The exclusive RM redundancy mechanism ensures
the ring’s reliability even when the RM fails.
4. Failure Notification and Positioning: In addition to the event warnings, such as
alarm, email, or SNMP trap, Korenix MSR points out the failure location by the LED
indicator. The Korenix network management software, JetView Pro, also helps IT
staff to do fast trouble-shooting by the visualized network topology layout. All
these management features help to detect and react to the failure promptly.
5. Seamless Restoration: The patented mechanism has 0 ms restoration time and
eliminates the packet loss, loop, and topology change problems of other
protocols when restoring a failed network to its original state. It guarantees the
highest quality video transmission for an IP surveillance system.
Your Best Partner of IP Surveillance
www.korenixsecurity.com
6 
6. Truly Scalable: Korenix MSR includes TrunkRing and MultiRing mechanism to
fit the needs for the increasing bandwidth and the expansion of a surveillance
system.
TrunkRing increases the bandwidth on the ring by link aggregation mechanism.
Multiple gigabit links trunked together are capable of delivering hundreds of
megapixel images in a large surveillance system. TrunkRing also enhances
network reliability; the trunked ring fails only when all the aggregated links are
broken.
MultiRing provides easier connectivity between two ring networks. MultiRing
technology simply extends the network coverage of an IP surveillance network.
 
Figure 5. TrunkRing mechanism
increases the bandwidth and the
reliability as well.
Figure 6. MultiRing can easily expand the
network to form a larger IP surveillance system.
7. Fully Cisco Compatible: Korenix MSR is fully compatible with Cisco switches. It
can connect to Cisco switches easily and flexibly. Multiple redundancies are
achieved by connecting more than one single link. Link aggregation is also
integrated for greater network capacity.
Figure 7. Korenix ring connects to the switches in the central room easily and
flexibly with multiple redundant capabilities.
Your Best Partner of IP Surveillance
www.korenixsecurity.com
7 
Summary
MSR, the Korenix surveillance redundant ring technology, is easy to use and assures
the most reliable, scalable and high quality IP surveillance network. It is applied to
Korenix PoE switches, Ethernet switches, Surveillance and security networking
computers to deliver quality videos in a reliable surveillance network from the IP
cameras to the central room. It is the most suitable for airport surveillance,
transportation surveillance, city surveillance, highway surveillance, casino
surveillance, harbor surveillance, bank surveillance, campus surveillance, retail
surveillance, etc.
Appendix: Korenix Patents for Surveillance Ring Technology
Rapid Super Ring
Dual Homing
Dual Homing II
Multiple Super Ring with MultiRing, TrunkRing, AnyRing
Seamless Ring Restoration with ZERO Restoration Time
Rapid Dual Homing II
Fast Recovery Mechanism for Trunk Ring
A Fast Redundant Path Moving Mechanism for Network Coupling
About Korenix
Korenix, the network leader, is dedicated in providing the most reliable and high quality PoE
switch, Ethernet switch, weatherproof Ethernet switch, wireless outdoor AP and embedded
computer for IP video surveillance anytime, anywhere and for any purpose.
Copyright © 2009 by Korenix Technology Co., Ltd
All rights are reserved. Any redistribution or reproduction of materials herein is prohibited without
the permission from Korenix Technology Co., Ltd.

More Related Content

What's hot

Extricom Corporate Brochure 2009
Extricom Corporate Brochure 2009Extricom Corporate Brochure 2009
Extricom Corporate Brochure 2009MathewEdwards
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Jiunn-Jer Sun
 
Datasheet EWS2910P-Kit-300
Datasheet EWS2910P-Kit-300Datasheet EWS2910P-Kit-300
Datasheet EWS2910P-Kit-300EnGenius Europe
 
Cabling For Next-Generation PoE Applications - BICSI Greece Conference 2015
Cabling For Next-Generation PoE Applications - BICSI Greece Conference 2015Cabling For Next-Generation PoE Applications - BICSI Greece Conference 2015
Cabling For Next-Generation PoE Applications - BICSI Greece Conference 2015Dimitris Filippou
 
ENH200 Engenius
ENH200 EngeniusENH200 Engenius
ENH200 EngeniusOneTel
 
Ruggedcom Rs900G compact switch
Ruggedcom Rs900G compact switchRuggedcom Rs900G compact switch
Ruggedcom Rs900G compact switchashwini reliserv
 
Cn data sheet_cn_pilot_e500_e501s_e502s_family
Cn data sheet_cn_pilot_e500_e501s_e502s_familyCn data sheet_cn_pilot_e500_e501s_e502s_family
Cn data sheet_cn_pilot_e500_e501s_e502s_familyEver Recharte
 
Eap600 engenius
Eap600 engeniusEap600 engenius
Eap600 engeniusOneTel
 
MEC Edge Computing for Utilities - by EDF & Saguna
MEC Edge Computing for Utilities - by EDF & SagunaMEC Edge Computing for Utilities - by EDF & Saguna
MEC Edge Computing for Utilities - by EDF & SagunaSaguna
 

What's hot (17)

Ap300 spec sheet
Ap300 spec sheetAp300 spec sheet
Ap300 spec sheet
 
Extricom Corporate Brochure 2009
Extricom Corporate Brochure 2009Extricom Corporate Brochure 2009
Extricom Corporate Brochure 2009
 
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
 
Communication
CommunicationCommunication
Communication
 
Datasheet EWS2910P-Kit-300
Datasheet EWS2910P-Kit-300Datasheet EWS2910P-Kit-300
Datasheet EWS2910P-Kit-300
 
Cabling For Next-Generation PoE Applications - BICSI Greece Conference 2015
Cabling For Next-Generation PoE Applications - BICSI Greece Conference 2015Cabling For Next-Generation PoE Applications - BICSI Greece Conference 2015
Cabling For Next-Generation PoE Applications - BICSI Greece Conference 2015
 
Igal Rotem Invent Or Die
Igal Rotem  Invent Or DieIgal Rotem  Invent Or Die
Igal Rotem Invent Or Die
 
Ss wlan ap_621
Ss wlan ap_621Ss wlan ap_621
Ss wlan ap_621
 
Ap621 spec sheet
Ap621 spec sheetAp621 spec sheet
Ap621 spec sheet
 
ENH200 Engenius
ENH200 EngeniusENH200 Engenius
ENH200 Engenius
 
Ruggedcom Rs900G compact switch
Ruggedcom Rs900G compact switchRuggedcom Rs900G compact switch
Ruggedcom Rs900G compact switch
 
Cn data sheet_cn_pilot_e500_e501s_e502s_family
Cn data sheet_cn_pilot_e500_e501s_e502s_familyCn data sheet_cn_pilot_e500_e501s_e502s_family
Cn data sheet_cn_pilot_e500_e501s_e502s_family
 
Eap600 engenius
Eap600 engeniusEap600 engenius
Eap600 engenius
 
MEC Edge Computing for Utilities - by EDF & Saguna
MEC Edge Computing for Utilities - by EDF & SagunaMEC Edge Computing for Utilities - by EDF & Saguna
MEC Edge Computing for Utilities - by EDF & Saguna
 
Cisco CCNA module 7
Cisco CCNA module 7Cisco CCNA module 7
Cisco CCNA module 7
 
CCNA Icnd110 s03l01
CCNA Icnd110 s03l01CCNA Icnd110 s03l01
CCNA Icnd110 s03l01
 
Outdoor ap datasheet c78-737416
Outdoor ap datasheet c78-737416Outdoor ap datasheet c78-737416
Outdoor ap datasheet c78-737416
 

Similar to Ensuring Network Reliabilty And Quality For IP Surveillance 2012

Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Jiunn-Jer Sun
 
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Jiunn-Jer Sun
 
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_ENNokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_ENJuan Boggiano
 
PLNOG 6: Maciej Konstantynowicz - Implementing Seamless MPLS
PLNOG 6: Maciej Konstantynowicz - Implementing Seamless MPLS PLNOG 6: Maciej Konstantynowicz - Implementing Seamless MPLS
PLNOG 6: Maciej Konstantynowicz - Implementing Seamless MPLS PROIDEA
 
Ten reasons to buy a network camera
Ten reasons to buy a network cameraTen reasons to buy a network camera
Ten reasons to buy a network cameraAxis Communications
 
10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue cameracnssources
 
5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_ModesAalekh Jain
 
Global Fire Equipment Networking Fire Detection Systems
Global Fire Equipment  Networking Fire Detection SystemsGlobal Fire Equipment  Networking Fire Detection Systems
Global Fire Equipment Networking Fire Detection SystemsMiguel Sousa
 

Similar to Ensuring Network Reliabilty And Quality For IP Surveillance 2012 (20)

BACKBONE NETWORKS
BACKBONE NETWORKSBACKBONE NETWORKS
BACKBONE NETWORKS
 
Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012Enhancing Network Quality for Video Transmission 2012
Enhancing Network Quality for Video Transmission 2012
 
Case study
Case studyCase study
Case study
 
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
 
wp233
wp233wp233
wp233
 
Performance Evaluation of Iptv over Wimax Networks Under Different Terrain En...
Performance Evaluation of Iptv over Wimax Networks Under Different Terrain En...Performance Evaluation of Iptv over Wimax Networks Under Different Terrain En...
Performance Evaluation of Iptv over Wimax Networks Under Different Terrain En...
 
Examen1ccna3v5.0
Examen1ccna3v5.0Examen1ccna3v5.0
Examen1ccna3v5.0
 
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_ENNokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
Nokia_Mission-critical_Utilities_Network_Teleprotection_Application_Note_EN
 
PLNOG 6: Maciej Konstantynowicz - Implementing Seamless MPLS
PLNOG 6: Maciej Konstantynowicz - Implementing Seamless MPLS PLNOG 6: Maciej Konstantynowicz - Implementing Seamless MPLS
PLNOG 6: Maciej Konstantynowicz - Implementing Seamless MPLS
 
dan-web5g.pptx
dan-web5g.pptxdan-web5g.pptx
dan-web5g.pptx
 
5g architecture.pptx
5g architecture.pptx5g architecture.pptx
5g architecture.pptx
 
How to build resilient industrial networks
How to build resilient industrial networksHow to build resilient industrial networks
How to build resilient industrial networks
 
Ten reasons to buy a network camera
Ten reasons to buy a network cameraTen reasons to buy a network camera
Ten reasons to buy a network camera
 
10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera
 
Dmrc Fiber Optics Transmission System
Dmrc Fiber Optics Transmission SystemDmrc Fiber Optics Transmission System
Dmrc Fiber Optics Transmission System
 
5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes5G_NR_Overview_Architecture_and_Operating_Modes
5G_NR_Overview_Architecture_and_Operating_Modes
 
alm.pdf
alm.pdfalm.pdf
alm.pdf
 
alm.pdf
alm.pdfalm.pdf
alm.pdf
 
Latency considerations in_lte
Latency considerations in_lteLatency considerations in_lte
Latency considerations in_lte
 
Global Fire Equipment Networking Fire Detection Systems
Global Fire Equipment  Networking Fire Detection SystemsGlobal Fire Equipment  Networking Fire Detection Systems
Global Fire Equipment Networking Fire Detection Systems
 

More from Jiunn-Jer Sun

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Jiunn-Jer Sun
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Jiunn-Jer Sun
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Jiunn-Jer Sun
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Jiunn-Jer Sun
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Jiunn-Jer Sun
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Jiunn-Jer Sun
 
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018Jiunn-Jer Sun
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...Jiunn-Jer Sun
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Jiunn-Jer Sun
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Jiunn-Jer Sun
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Jiunn-Jer Sun
 
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...Jiunn-Jer Sun
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Jiunn-Jer Sun
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 
Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Jiunn-Jer Sun
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Jiunn-Jer Sun
 
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Jiunn-Jer Sun
 
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016Jiunn-Jer Sun
 
Flying You From Wired To Wireless - Product Brochure 2013
Flying You From Wired To Wireless - Product Brochure 2013Flying You From Wired To Wireless - Product Brochure 2013
Flying You From Wired To Wireless - Product Brochure 2013Jiunn-Jer Sun
 
Complete Onboard Wireless And IP Network Solutions - Public Transportation Br...
Complete Onboard Wireless And IP Network Solutions - Public Transportation Br...Complete Onboard Wireless And IP Network Solutions - Public Transportation Br...
Complete Onboard Wireless And IP Network Solutions - Public Transportation Br...Jiunn-Jer Sun
 

More from Jiunn-Jer Sun (20)

Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014Make The Impossible Possible - Industrial PoE Brochure 2014
Make The Impossible Possible - Industrial PoE Brochure 2014
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018Market Trend And Korenix IIoT Vision - 2018
Market Trend And Korenix IIoT Vision - 2018
 
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
 
Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019Secure Reliable Quality Networking Solutions for Railway 2019
Secure Reliable Quality Networking Solutions for Railway 2019
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
 
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
 
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...Outstanding In Redundancy And Security  - Korenix Ethernet Switches Brochure ...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
 
Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019Beijer Korenix Connected - Beijer Sales Kit 2019
Beijer Korenix Connected - Beijer Sales Kit 2019
 
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
 
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training ...
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019Protect The Fundamental of IP Networking - Network Security Features 2019
Protect The Fundamental of IP Networking - Network Security Features 2019
 
Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013Wireless AP and Antenna Quick Selection Guide 2013
Wireless AP and Antenna Quick Selection Guide 2013
 
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
 
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
 
Flying You From Wired To Wireless - Product Brochure 2013
Flying You From Wired To Wireless - Product Brochure 2013Flying You From Wired To Wireless - Product Brochure 2013
Flying You From Wired To Wireless - Product Brochure 2013
 
Complete Onboard Wireless And IP Network Solutions - Public Transportation Br...
Complete Onboard Wireless And IP Network Solutions - Public Transportation Br...Complete Onboard Wireless And IP Network Solutions - Public Transportation Br...
Complete Onboard Wireless And IP Network Solutions - Public Transportation Br...
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Ensuring Network Reliabilty And Quality For IP Surveillance 2012

  • 1. Your Best Partner of IP Surveillance 1 Along with the emerging market of IP surveillance, network plays increasingly important role in a video surveillance system. The network in its turn, determines the reliability and quality of video delivery. This paper describes the importance of network redundancy for IP surveillance network. It gives a clear idea of how Korenix patented MSR redundancy technology outstands from other protocols and describes all the exceptional benefits that it can give to the IP surveillance system. Network Redundancy is Critical for IP Surveillance Legacy IP surveillance network is connected into a star topology where video streams are transmitted from cameras to the monitoring room. Closer is the link to the monitoring room, more video streams are carried through a single Ethernet cable. A single link failure will result in serious loss of images which is not acceptable for a surveillance system. As a result, network redundancy is critical for IP surveillance.   Figure 1. A link failure occurred in an IP surveillance network results serious loss of images. Ensuring Network Reliability and Quality for IP Surveillance Korenix MSR: The Most Reliable and High Quality IP Surveillance Network Your Best Partner of IP Surveillance
  • 2. Your Best Partner of IP Surveillance www.korenixsecurity.com 2  The Best Choice of Network Redundancy Technology To protect a surveillance network from failure, a redundancy technology is required. RSTP (Rapid Spanning Tree Protocol, IEEE 802.1w) is commonly chosen for network redundancy. While RSTP can provide redundancy, its original design is for interconnectivity: to connect network devices from different vendors in any topology without problem. Since RSTP requires a complex algorithm to handle this, it cannot guarantee the failure recovery time which can take up to few seconds. Lots of images can be lost while RSTP recovers the failure. Furthermore, the scalability of an RSTP network is limited. According to the standard, the maximum level of switches connected from the central room to the cameras is limited to 20. This constrains RSTP from constructing a large scale surveillance system.      RSTP Korenix MSR Standard IEEE 802.1w Korenix Patented Purpose Interconnectivity Redundancy Topology Any Ring Algorithm Complex Simple Failure Recovery Not Deterministic, <5s Deterministic, < 5ms Failure Restoration (Upon the failure is fixed) Packet loss Topology change Seamless Restoration No packet loss No loop No topology change Scalability 20 in depth 250 in a ring Table 1. Comparison of RSTP and Korenix MSR redundant ring To solve these problems, Korenix introduces MSR (Multiple Super Ring), the surveillance redundant ring technology, which is specifically designed for building the most reliable, high quality and scalable IP surveillance networks. With the simplest network architecture, Korenix MSR guarantees the failure recovery time within 5ms. Video streams are protected from any network failure and can be resumed even without being noticed.
  • 3. Your Best Partner of IP Surveillance www.korenixsecurity.com 3  Figure 2: Korenix MSR protects an IP surveillance network from link failure. Video resumes from a failure with in 5ms. The maximum number of switches in a single Korenix surveillance redundant ring is 250. Several rings can be connected together for larger surveillance network. Unlike RSTP, which treats all LAN devices as a single system, each of Korenix surveillance redundant rings operates independently. The influence of any network failure is limited within the ring itself and will not spread to the other parts. As a result, MSR provides the most scalable IP surveillance network and high quality video transmission.     Figure 3: Even with the same topology, RSTP treats all rings as a single network. Any link failure affects the whole network and the recovery time is longer because of its complexity. On the contrary, Korenix redundant ring works independently and guarantees the failure recovery time within 5ms. In addition, RSTP results in packet loss and topology change when a network failure is restored. A topology change leads to image loss and packet flooding to everywhere. This prolongs system downtime, consumes bandwidth and downgrades the video quality. Korenix MSR introduces an error-free restoration procedure, Seamless Restoration. There will be no any packet loss, no loop and no topology change when restoring a broken ring to its original redundant-guarantee state. The patented mechanism eliminates any unstable status and guarantees the best quality and smooth video delivery.
  • 4. Your Best Partner of IP Surveillance www.korenixsecurity.com 4  Figure 4. Compared to other protocols, Korenix MSR guarantees the most reliable and quality video delivery How Korenix Surveillance Redundant Ring Works There are 5 stages in the ring operation: Setup, Normal, Failure Recovery, Abnormal, and Restoration. 1. Setup State: The switches are linked into a ring topology. One of the switches is selected as RM (Ring Master) to manage the ring. RM blocks one of its ring paths for redundancy. 2. Normal State: RM starts to monitor the live status of ring in case of any network failure. 3. Failure Recovery: Following the failure, either caused by a link break, device down, or system maintenance, RM notices the failure and recovers the network connectivity by activating its redundant path immediately. The video resumes through the redundant path. IT staff can be notified of the failure event through alarm, email, or SNMP trap. 4. Abnormal State: The ring is broken and has no redundancy capability. IT staff starts trouble shooting and requires restoring the failure in the shortest period. RSTP and Other Ring Protocols Failure recovery < 50ms Failure recovery > 1s Broadcast Storm Other protocols require longer recovery time. The longer it recovers the more images are loss. During restoration, some ring protocols result in broadcast storm which overwhelms the network. No images can be seen. Korenix MSR Technology Rapid failure recovery < 5ms Seamless Restoration Video streams resume even without being noticed. Restoration time = 0, no packet loss, no broadcast storm and no topology change. Video continues smoothly.
  • 5. Your Best Partner of IP Surveillance www.korenixsecurity.com 5  5. Restoration: IT staff fixes the failure and the ring regains its redundant capability. The Most Reliable, High Quality and Scalable IP Surveillance Network Compared to other protocols, Korenix patented redundant ring is superior in all stages to provide the most reliable and high quality IP surveillance network. 1. Easy Setup: Korenix MSR provides a simple and time-saving setup mechanism with auto selection of the RM and of the best redundant route. The deployment of a ring is easy and does not require professional network knowledge. 2. Efficient Control: Korenix MSR monitors the ring status with minimum bandwidth consumption, less than 1kbps. The efficient design reserves the network resources for video surveillance demands. Korenix MSR Other Rings RSTP Setup RM auto selection Redundant path auto selection Manual configuration Complex parameter setting Link Failure 5 ms recovery Multiple redundancy < 300ms Not deterministicFailure Recovery Device Failure 5 ms recovery RM redundancy < 300ms No RM redundancy Not deterministic Failure Detection Failure notification Failure Positioning Failure notification Topology change notification Failure Restoration Seamless Restoration No packet loss No broadcast storm No topology change Topology change Broadcast storm Topology change Packet loss Table 2. Comparison of redundancy technologies in all stages of ring operation 3. Rapid Failure Recovery and RM Redundancy: Korenix MSR guarantees the recovery of a network failure, either link or device failure, within 5ms; video streams continue smoothly. The exclusive RM redundancy mechanism ensures the ring’s reliability even when the RM fails. 4. Failure Notification and Positioning: In addition to the event warnings, such as alarm, email, or SNMP trap, Korenix MSR points out the failure location by the LED indicator. The Korenix network management software, JetView Pro, also helps IT staff to do fast trouble-shooting by the visualized network topology layout. All these management features help to detect and react to the failure promptly. 5. Seamless Restoration: The patented mechanism has 0 ms restoration time and eliminates the packet loss, loop, and topology change problems of other protocols when restoring a failed network to its original state. It guarantees the highest quality video transmission for an IP surveillance system.
  • 6. Your Best Partner of IP Surveillance www.korenixsecurity.com 6  6. Truly Scalable: Korenix MSR includes TrunkRing and MultiRing mechanism to fit the needs for the increasing bandwidth and the expansion of a surveillance system. TrunkRing increases the bandwidth on the ring by link aggregation mechanism. Multiple gigabit links trunked together are capable of delivering hundreds of megapixel images in a large surveillance system. TrunkRing also enhances network reliability; the trunked ring fails only when all the aggregated links are broken. MultiRing provides easier connectivity between two ring networks. MultiRing technology simply extends the network coverage of an IP surveillance network.   Figure 5. TrunkRing mechanism increases the bandwidth and the reliability as well. Figure 6. MultiRing can easily expand the network to form a larger IP surveillance system. 7. Fully Cisco Compatible: Korenix MSR is fully compatible with Cisco switches. It can connect to Cisco switches easily and flexibly. Multiple redundancies are achieved by connecting more than one single link. Link aggregation is also integrated for greater network capacity. Figure 7. Korenix ring connects to the switches in the central room easily and flexibly with multiple redundant capabilities.
  • 7. Your Best Partner of IP Surveillance www.korenixsecurity.com 7  Summary MSR, the Korenix surveillance redundant ring technology, is easy to use and assures the most reliable, scalable and high quality IP surveillance network. It is applied to Korenix PoE switches, Ethernet switches, Surveillance and security networking computers to deliver quality videos in a reliable surveillance network from the IP cameras to the central room. It is the most suitable for airport surveillance, transportation surveillance, city surveillance, highway surveillance, casino surveillance, harbor surveillance, bank surveillance, campus surveillance, retail surveillance, etc. Appendix: Korenix Patents for Surveillance Ring Technology Rapid Super Ring Dual Homing Dual Homing II Multiple Super Ring with MultiRing, TrunkRing, AnyRing Seamless Ring Restoration with ZERO Restoration Time Rapid Dual Homing II Fast Recovery Mechanism for Trunk Ring A Fast Redundant Path Moving Mechanism for Network Coupling About Korenix Korenix, the network leader, is dedicated in providing the most reliable and high quality PoE switch, Ethernet switch, weatherproof Ethernet switch, wireless outdoor AP and embedded computer for IP video surveillance anytime, anywhere and for any purpose. Copyright © 2009 by Korenix Technology Co., Ltd All rights are reserved. Any redistribution or reproduction of materials herein is prohibited without the permission from Korenix Technology Co., Ltd.