Why New Jersey Physical Security Installers Need Network Expertise
It’s a scenario that’s becoming far too common across South Jersey and Southeast Pennsylvania. A business or school invests in a new IP video surveillance system to enhance safety, but immediately after the installation, the entire computer network grinds to a halt. Applications stop working, files are inaccessible, and internet access slows to a crawl.
This is exactly what happened to a local private school in New Jersey that called Systems Integrations in a panic.
The Problem: A Network at a Standstill
The school had just had a new IP camera system installed by another provider. Almost immediately, they began experiencing severe performance issues. When they contacted their original installer, they were told, “Your network just can’t handle the additional bandwidth from the cameras.”
This diagnosis left the school feeling stuck, believing they were now facing an expensive and unexpected network upgrade. Unconvinced, they reached out to the camera manufacturer for guidance. The manufacturer recommended Systems Integrations—a licensed New Jersey security integrator with over 20 years of combined security and IT expertise—for a second opinion.
The Investigation: Not a Bandwidth Issue, but a Network Loop
Our certified team was dispatched to the school to review the system and, most importantly, the network configuration. It didn’t take long to find the real culprit.
The previous installer had added a new, unmanaged network switch to connect the cameras. In a critical error, they had connected two uplink cables from this new switch back to the school’s main network.
This created a network loop.
When we brought this to the previous provider’s attention, their response was alarming: “We do this all the time for extra bandwidth.”
This statement is not just incorrect—it’s dangerous and demonstrates a profound lack of networking fundamentals.
What is a Network Loop (And Why Is It So Bad)?
In simple terms, a network loop creates a “broadcast storm.”
Think of it like a traffic circle with no exits. A single piece of network data (a “packet”) enters the new switch and is sent out to the main network. Because of the second uplink, that same packet is sent right back to the switch, which then broadcasts it out again, and again, and again.
This single packet multiplies exponentially, creating a data storm that consumes 100% of the network’s resources. The network becomes so congested with its own looping data that no legitimate traffic can get through.
The school’s network wasn’t suffering from a lack of bandwidth—it was being actively suffocated by a catastrophic and completely avoidable configuration error.
The “Just Enough Knowledge to Be Dangerous” Problem
This incident is a perfect example of an unqualified technician installing IP devices. Today’s security systems—from IP cameras to card access controllers—are not just “security” devices; they are network-connected IT devices.
The previous installer may have had just enough knowledge to assign an IP address to a camera and set recording parameters, but they were not experienced or qualified enough to touch an enterprise network.
Connecting a device to a modern network requires a deep understanding of:
- Network architecture, including subnetting to properly segment traffic
- Managed vs. unmanaged switches and why using an unmanaged switch in this way is a critical error
- Protocols like Spanning Tree (STP), which are designed specifically to prevent these exact loops
- VLANs (Virtual LANs) to isolate camera traffic from other critical data
- Video-specific traffic needs, such as multicasting
- Cybersecurity basics, including changing default passwords, performing firmware updates, and disabling unused ports
Your Security Partner Must Understand Your Network
Installing a security device is not “plug-and-play.” Every device added to your network is a new variable that affects performance and security.
Your security integrator must be proficient in modern networking. Without a solid understanding of VLANs, subnetting, and basic cybersecurity hygiene, they aren’t just installing a security system—they are creating a new and significant liability.
At Systems Integrations, our team holds Security Industry Association Cybersecurity Certification and brings over 20 years of combined experience in both security integration and managed IT services. We understand the convergence of physical security and information technology because we live it every day.
We were able to resolve the school’s issue quickly by simply removing the faulty second uplink and properly configuring their equipment. Their network performance was restored instantly—no expensive upgrades required.
