The communications format of choice

June 2009 Infrastructure

Radio communications will become even more attractive in the future, despite the arrival of other communications media.

Despite the new technologies being introduced into the market, radio continues to be the communications format of choice for large and small security companies alike. It continues to be the most failsafe method of transmitting data from an alarm installation to alert security companies that an alarm has been triggered and that the necessary response is required.

The technology was first introduced because traditional telephone lines were vulnerable to being cut by criminals and often took many days or even weeks to be fixed when they were out of order. This was not an option for security purposes as the signal has to work every time in emergency situations. With crime statistics as they are, a person about to become a victim of crime must be able to rely on their panic signal reaching help quickly and reliably.

Today, many houses rely purely on cellular phones for general voice communications and do not have a landline which could be used for security communication. Although GSM communication from an alarm installation to the control room has its place, it is not ideal as a primary means of communication because of the threat of blocking. It is ideal however as secondary communication in high-end installations where a lot of additional information is required and as a backup.

GSM is however ideal for carrying the large amounts of data required through radio networks once signals have been received from the installation. Network equipment is generally hosted in unknown locations and is therefore difficult to block. GSM is ideally used in conjunction with traditional radio. On the downside, a completely radio-based system is easy to control and maintain. Security companies are in control of all their own equipment and can quickly react to faults that may occur, minimising downtime. With GSM however, security companies are left in the hands of the cellular providers to sort out problems and therefore lose some of the control over their networks.

The availability of radio frequencies is however a problem, particularly in the major metropolitan areas. Technology has provided some answers to these issues. Equipment suppliers like RDC, have continually developed new ways of using frequencies spectrum in the most efficient ways. Because of RDC’s multi-user technology which it introduced into the market, many security companies can use a single frequency to reliably communicate alarm signals without interfering with each other. This gives new companies an easy way to start up as RDC runs multi-user frequencies for this purpose countrywide. Security companies can grow their client base without the hassle of applying for frequencies and running networks.

Despite the weakness in the local economy, and the trend for security companies to upgrade existing transmitters in the field and re-use them rather than buying new equipment, RDC has continued to see an overall growth in the number of transmitters being installed in the field. With the global economy set to worsen or at least recover very slowly, security companies will be looking for ways to save their customers money and offer better value. Radio communication remains the most cost effective format with both unrivalled hardware costs and no charges per signal – a sharp contrast to GSM communication fees and other newer technologies.

For more information contact Brett Andreka, Radio Data Communications, +27 (0)11 616 6865, www.rdcomms.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...
Partnership delivers 40% storage savings for surveillance
Surveillance Infrastructure
Large-scale video surveillance users and applications demanding extended storage periods will benefit from up to 40% savings on video storage hardware stacks thanks to a new partnership between IDIS and Secure Logiq.

Read more...
How smart video is transforming storage at the edge
Infrastructure Surveillance
As these technologies come together, they are impacting the architecture of the edge and what we require from data storage. More specifically, they are driving a demand for specialised storage.

Read more...
VPS hosting set to dominate in 2025
Infrastructure
SME market growth and the increasing need for a digital footprint are pushing VPS growth in South Africa, especially since it is now perceived as a viable business tool, scalable by nature, with improved performance.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Highest capacity ePMR HDDs
Infrastructure Products & Solutions
Western Digital has announced that it is now shipping the world’s highest capacity UltraSMR HDD with up to 32TB leveraging the time-tested, reliable energy-assisted PMR (ePMR) recording technology for hyperscalers, CSPs and enterprises.

Read more...