leungchopan - Fotolia
Internet Protocol is essential to support video infrastructures now and in the future. IP is absolutely the wave of the future.
Assuming you're using video for collaboration and conferencing, the most important step when working with video is to look at the health of your network. IP allows for the retransmission of data; and unless something is really wrong -- like a bad network interface card or bad cable -- you normally won't notice the retransmissions. However, with video infrastructure, the retransmissions become visual and audible with pixilation and audio issues.
A network analyzer can determine if you're experiencing retransmissions and make sure the ports are running at the speed you predicted for your video infrastructure. Beyond that, you'll want to plan for the increased bandwidth demands that will occur when video collaboration comes onto the network.
With video collaboration, for part of the session, the Ethernet traffic is not as bursty as it is for file transfers alone. Remember, it's not how often a network resource is used, it's how fast and reliable it is when in use. Therefore, port utilization is a poor indicator of how well your network will support real-time communications, such as voice and video.
Another consideration for video infrastructure is the amount of storage you want to provide and the period of time you may store the video. This is going to vary greatly, depending on the equipment you use, the level of video compression you find acceptable and the amount of video you wish to store. The good news is video storage is relatively inexpensive these days.
Do you have a question for Carrie Higbie Goetz or any other experts? Ask your enterprise-specific questions today! All questions are treated anonymously.
Flexible video infrastructure unlocks key benefits
The challenges of integrating video with a UC architecture
Cloud video cuts costs and extends conferencing
Dig Deeper on Business Video Conferencing and Telepresence Technology
Related Q&A from Carrie Higbie Goetz
An unguarded VoIP system could be vulnerable to attack. Learn what security measures can help prevent VoIP security threats from affecting your ... Continue Reading
Traditional and cloud SIP trunking perform the same tasks of initiating and ending call sessions, but the method and costs of access create distinct ... Continue Reading
The rules around E911 location tracking have evolved as more businesses move away from traditional wired connections to VoIP. Here's how to stay ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.