Bandwidth and storage considerations

August 2012 Surveillance

Axis Communications explains storage and bandwidth considerations for surveillance.

Network bandwidth and storage requirements are important considerations when designing a video surveillance system. The factors include the number of cameras, the image resolution used, the compression type and ratio, frame rates and scene complexity. This article provides some guidelines on designing a system, along with information on storage solutions and various system configurations.

Network video products use network bandwidth and storage space based on their configuration. As mentioned earlier, this depends on the following:

* Number of cameras.

* Whether recording will be continuous or event-based.

* Number of hours per day the camera will be recording.

* Frames per second.

* Image resolution.

* Video compression type: Motion JPEG, MPEG-4, H.264.

* Scenery: Image complexity (e.g. grey wall or a forest), lighting ­conditions and amount of motion (office environment or crowded train stations).

* How long data must be stored.

Bandwidth needs

In a small surveillance system involving eight to 10 cameras, a basic 100-megabit (Mbit) network switch can be used without having to consider bandwidth limitations. Most companies can implement a surveillance system of this size using their existing network.

When implementing 10 or more cameras, the network load can be estimated using a few rules of thumb:

* A camera that is configured to deliver high-quality images at high frame rates will use approx. 2 to 3 Mbit/s of the available network bandwidth.

* With more than 12 to 15 cameras, consider using a switch with a gigabit backbone. If a gigabit-supporting switch is used, the server that runs the video management software should have a gigabit network adaptor installed.

Technologies that enable the management of bandwidth consumption include the use of VLANs on a switched network, quality of service (QoS) and event-based recordings.

Calculating storage needs

As mentioned earlier, the type of video compression used is one of the factors affecting storage requirements. The H.264 compression format is by far the most efficient video compression technique available today. Without compromising image quality, an H.264 encoder can reduce the size of a digital video file by more than 80% compared with the Motion JPEG format and as much as 50% more than with the MPEG-4 (Part 2) standard. This means much less network bandwidth and storage space are required for an H.264 video file.

Sample storage calculations for all three compression formats are provided in the tables below. Because of a number of variables that affect average bit rate levels, calculations are not so clear cut for H.264 and MPEG-4. With Motion JPEG, there is a clear formula because Motion JPEG consists of one individual file for each image. Storage requirements for Motion JPEG recordings vary depending on the frame rate, resolution and level of compression.

H.264 calculation

Approximate bit rate/8(bits in a byte) x 3600s = KB per hour/1000 = MB per hour

MB per hour x hours of operation per day/1000 = GB per day

GB per day x requested period of storage = Storage need

(See Table 1).

Table 1<br>
The figures above are based on lots of motion in a scene. With fewer changes in a scene, the figures can be 20% lower. The amount of motion in a scene can have a big impact on the amount of storage required.
Table 1
The figures above are based on lots of motion in a scene. With fewer changes in a scene, the figures can be 20% lower. The amount of motion in a scene can have a big impact on the amount of storage required.

MPEG-4 calculation

Approximate bit rate/8(bits in a byte) x 3600s = KB per hour/1000 = MB per hour

MB per hour x hours of operation per day/1000 = GB per day

GB per day x requested period of storage = Storage need

Note: The formula does not take into account the amount of motion, which is an important factor that can influence the size of storage required.

(See Table 2).

Table 2
Table 2

Motion JPEG calculation

Image size x frames per second x 3600s = KB per hour/1000 = MB per hour

MB per hour x hours of operation per day/1000 = GB per day

GB per day x requested period of storage = Storage need

(See Table 3).

Table 3
Table 3

A helpful tool in estimating requirements for bandwidth and storage is the AXIS Design Tool, found at www.axis.com/products/video/design_tool/.

Server-based storage

Depending on a PC server’s central processing unit (CPU), network card and internal RAM (Random Access Memory), a server can handle a certain number of cameras, frames per second and size of images. Most PCs can hold between two and four hard disks, and each disk can be up to approx. 300 GB. In a small to medium-sized installation, the PC that runs the video management software is also used for video recording. This is called a direct-attached storage.

With the AXIS Camera Station video management software, for instance, one hard disk is suitable for storing recordings from six to eight cameras. With more than 12 to 15 cameras, at least two hard disks should be used to split the load. For 50 or more cameras, the use of a second server is recommended.

NAS and SAN

When the amount of stored data and management requirements exceed the limitations of a direct-attached storage, a network-attached storage (NAS) or storage area network (SAN) allows for increased storage space, flexibility and recoverability.

NAS provides a single storage device that is directly attached to a LAN and offers shared storage to all clients on the network. A NAS device is simple to install and easy to administer, providing a low-cost storage solution. However, it provides limited throughput for incoming data because it has only one network connection, which can become problematic in high-performance systems.

SANs are high-speed, special-purpose networks for storage, typically connected to one or more servers via fibre. Users can access any of the storage devices on the SAN through the servers, and the storage is scalable to hundreds of terabytes. Centralised storage reduces administration and provides a high performance, flexible storage system for use in multi-server environments. Fibre Channel technology is commonly used to provide data transfers at four gigabits per second and to allow large amounts of data to be stored with a high level of redundancy.

Redundant storage

SAN systems build redundancy into the storage device. Redundancy in a storage system allows video, or any other data, to be saved simultaneously in more than one location. This provides a backup for recovering video if a portion of the storage system becomes unreadable. There are a number of options for providing this added storage layer in an IP-Surveillance system, including a Redundant Array of Independent Disks (RAID), data replication, server clustering and multiple video recipients.

RAID

RAID is a method of arranging standard, off-the-shelf hard drives such that the operating system sees them as one large hard disk. A RAID setup spans data over multiple hard disk drives with enough redundancy so that data can be recovered if one disk fails. There are different levels of RAID, ranging from practically no redundancy to a full-mirrored solution in which there is no disruption and no loss of data in the event of a hard disk failure.

Data replication

This is a common feature in many network operating systems. File servers in a network are configured to replicate data among each other, providing a backup if one server fails.

Server clustering

A common server clustering method is to have two servers work with the same storage device, such as a RAID system. When one server fails, the other identically configured server takes over. These servers can even share the same IP address, which makes the so-called “fail-over” completely transparent for users.

Multiple video recipients

A common method to ensure disaster recovery and off-site storage in network video is to simultaneously send the video to two different servers in separate locations. These servers can be equipped with RAID, work in clusters, or replicate their data with servers even further away. This is an especially useful approach when surveillance systems are in hazardous or not easily accessible areas, such as in mass-transit installations or industrial facilities.

System configurations

Small system (1 to 30 cameras)

A small system usually consists of one server running a surveillance application that records the video to a local hard disk. The video is viewed and managed by the same server. Although most viewing and management will be done at the server, a client (local or remote) can be connected for the same purpose.

Medium system (25 to 100 cameras)

A typical, medium-sized installation has a server with additional storage attached to it. The storage is usually configured with RAID in order to increase performance and reliability. The video is normally viewed and managed from a client rather than from the recording server itself.

Large centralised system (50 to +1000 cameras)

A large-sized installation requires high performance and reliability in order to manage the large amount of data and bandwidth. This requires multiple servers with dedicated tasks. A master server controls the system and decides what kind of video is stored at what storage server. As there are dedicated storage servers, it is possible to do load balancing. In such a setup, it is also possible to scale up the system by adding more storage servers when needed and do maintenance without bringing down the entire system.

Large distributed system (25 to +1000 cameras)

When multiple sites require surveillance with centralised management, distributed recording systems may be used. Each site records and stores the video from local cameras. The master controller can view and manage recordings at each site.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.