This page contains a Flash digital edition of a book.
FEATURE: CONFERENCE VENUES


terms of security.” But system purchasers


may wish to go deep into the details before making a selection because there are differences of opinion across the market. For example, Den Heuvel remarks: “RF-based systems with proper encryption have a much higher level of security as they have better management on the connection of devices and avoid audio touting to unlisted devices which can be used to eavesdrop a meeting.”


using the technologies that make this all possible. And the third is security: the conference network is a self-contained eco-system that is guarded from outside intrusion by the central unit. The latter acts as a guard, but also as a bridge to the outside world through its LAN connection and Dante interface.” Most conference system


manufacturers seem to be innovating in this area: for example Xavtel, with its “so- called net deployment, [with which] there is no way to just add a piece of hardware to the system without knowing it”; or Bosch, whose OMNEO platform provides “proven encryption technology and smart key management” in its IP-enabled systems.


‘[IR is] the preferred medium to distribute translated languages’ Thomas Giczy, AKG


5. INTEGRATION WITH NETWORKED SYSTEMS WILL DEEPEN. The drift in favour of a unified AV/IT philosophy also has implications for security. In particular, conference venue operators will want to think carefully about the architecture of the systems they specify.


“This brings us right to the question – an open or a closed conference network architecture?” says Henry. With its uniCOS multimedia product, Televic has opted to keep the delegate side of the conference network closed and to only allow interfacing with the outside world through the central unit (“third-party network hardware or software is not allowed, nor supported on the conference bus”). This design “warrants its


failsafe operation and avoids situations where it is difficult to attribute responsibility in cases of issues”, he explains. “The second benefit of a closed network is its performance. With an open architecture, it would have been impossible to achieve the extremely low latency for the video and scale- independent responsiveness since it would have prevented


34 July 2014


6. SYSTEM EXPANSION WILL GET EVEN EASIER. Wired or wireless, system expansion in the networked era looks set to become even easier with manufacturers consistently emphasising scalability to match the application. “I do not see a problem [with regard to system expansion],” says Giczy, adding that AKG’s CS5 system has a “ring configuration. You open the ring where needed, add or take away units as required, close it again and you are ready to go – without change of any security standards.” An IP-based approach can


also pay dividends. “Using IP as a platform makes our system highly flexible and expandable for the future,” says Den Heuvel. “From a security aspect here too, access to and from the network can be well managed. The same counts for upgrading the system from, for example, a remote location.” Ultimately, it comes down to “well- managed network security handled by professionals in the IT department”. Stephens also highlights the importance of appropriately trained personnel. “The main threats to the security of networked systems are poor implementation of the overall network infrastructure and internal leaks from personnel with security clearance on the systems in question,” he says.


7. NEW REQUIREMENTS WILL CONTINUE TO EMERGE. The flexibility of IP and wireless means that systems based around these principles will continue to


BRÄHLER PROTOCOL DELIVERS ROBUSTNESS, SECURITY FOR QNCC


One of the Middle East’s most prestigious conference venues, the Qatar National Convention Centre, was recently equipped with a new communications system in its main auditorium, incorporating more than 400 Digimic wireless microphones manufactured by Brähler. Robustness and security


of operation were among the reasons that led to the specification of Digimic. Benefits include Brähler’s patented APRON (Intelligent Adaptive Proprietary Narrow Band) WiFi protocol, which features FHSS (Frequency


emerge. One implication of more complex systems is that convenience and ease of use will be very highly prized. But new customers will also want to think about issues such as remote participation and its ramifications for security.


“The emerging requirement lies between the growing demand for flexibility of system design like remote participation or site coupling versus the security aspects of these kind of flexible topologies,”


Hopping, Spread Spectrum) technology to deliver transmission that is claimed to be more robust to interference than that utilised by DSSS technology.


“FHSS offers a number of benefits over a fixed frequency system,” says Simon Sainsbury, MD of Brähler ICS UK. “Firstly, spread-spectrum signals are very resistant to narrowband interference. Secondly, they are challenging to intercept; anyone wanting to intercept the transmission would have to know the pseudorandom sequence. Finally, spread-


says Den Heuvel. “Therefore IP-based systems offer unique advantages as security can be well- managed by standard IT security measures while additional encryption technologies with advanced key management further secure this type of solution.” Youjie Shao is


marketing manager for Gonsin, whose latest solutions for conference include the DCS-1020 Daya Distributed Congress System and large conference system-oriented DCS-2020. Invited to consider the next


paradigm shift for conference technology, Shao responds: “From a macro point of view, conference systems will be horizontally expanded from single AV technology to adjacent industries, and will be integrated into large smart platforms such as the Internet of Things and the Smart City. From the micro point of view, conference systems will change from excessive pursuit of unconventional technical innovations to more practical micro-innovations, such as more convenience for disabled people to use the equipment, lower costs in running the equipment, less difficulty in management, and greater ease of installation.” All of which, it seems fair to surmise, will be keeping R&D teams very busy for many years to come.


HIGH STAKES


Our case studies on a recent nuclear


spectrum transmissions facilitate more efficient use of bandwidth as they can share a frequency band with many types of conventional transmissions… and all of this with minimal interference.” Brähler’s ability to deliver such a large number of units (in excess of 400) also informed the QNCC’s decision. “In addition, we’ve put some systems into hall 3, which is the main exhibition space,” notes Sainsbury. “The feedback from the operators has been very positive; the new system really gives them a lot of flexibility.”


security summit and a prestigious Middle Eastern conference facility underline the fact that the stakes for conference system security can be very high indeed. But there is no mistaking that this is a period of transition: wireless and IP systems are coming through, but some of the technologies involved need to be more clearly explained to overcome the (understandable?) concerns of some end-users. With no shortage of different approaches, potential customers may need to make more exact calculations than ever before about their specific requirements vis-à- vis capacity, expandability and security. 


www.akg.com www.audio-technica.com www.boschsecurity.com www.braehler.com www.gonsin.com www.jacot.nl www.televic.com www.xavtel.com


The CDM-T5, part of Xavtel’s Senator series


www.installation-international.com


CASE STUDY


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60
Produced with Yudu - www.yudu.com