Purpose-built storage

August 2013 Surveillance

The increasing adoption of HD and megapixel cameras is placing new and challenging demands on video storage systems. The exponential growth in data storage requirements is forcing IT and video security vendors to develop new solutions to keep up with all that video data.

Some video surveillance applications may be well served by traditional IT storage architectures. In actual practice, however, digital video storage is unique and differs from traditional data in the following ways:

* Database size.

* Write-intensive applications.

* Intolerant of system latencies.

* Constant first-in, first-out (FIFO) of recorded footage with sustained bit-rate streaming.

Database size

Network administrators are experts at managing storage farms. However, most IT professionals are not accustomed to dealing with the massive capacities that video storage requires. For example, a 100-camera system with seven days of storage, recording 24 hours per day at 15 images per second, using MJPEG compression could require more than 30 terabytes (TB) of storage.

To put this figure into perspective, the entire amount of storage used at the Pelco by Schneider Electric Clovis, California facility – with 1500 PC users; software and databases required to sustain the needs of full-blown fabrication and assembly factories; inventory management and logistics systems to support five warehouses around the world; and storage capacity needed for sales, accounting, and CRM systems – is only 32 TB. In fact, most enterprise-class IT storage systems are well under 100 TB of total capacity.

Now consider installations that have hundreds or thousands of cameras, or installations that require 365 days of online video storage. Well-designed video storage systems must be capable of efficiently scaling from a few gigabytes to petabytes. What’s more, storage systems designed for video must offer the same degree of data protection and safeguards as enterprise-class IT storage systems, but at a fraction of the price.

Write-intensive operations

Surveillance cameras never cease streaming content – and when doing so, nearly 95% of the operations executed on a hard disk drive are write operations. However, most applications in an enterprise work on the principle of 'write once, read many', meaning a file is written once, and then accessed hundreds of times. For this reason, most storage systems are designed to support fast access times for read operations while compromising access time allocated for write operations. Consequently, the write intensive operations of video comprise a complete reversal of what most enterprise-class storage solutions are designed to do.

If the storage sub-system is not tuned for massive amounts of write operations, the cost of deploying a storage solution increases dramatically. To accommodate a lack of write operation throughput, network video recorder (NVR) servers need to buffer incoming streams. Not only do more servers increase capital expenditures, but they also consume additional power, cooling, network ports, and rack space that increase the ongoing operational budget of the system.

Intolerance of system latency

Video surveillance systems are designed to reduce end-to-end latency as much as possible. As such, components including the camera, recorder, and decoder have very little buffer space available. Conversely, buffer and retransmit schemes are used widely in enterprise storage systems to accommodate asynchronous requests from various servers. Therefore, while enterprise storage systems have very impressive throughput numbers, the ability to service an incoming request from a given server is not a deterministic activity. The asynchronous manner in which storage systems service incoming requests can wreak havoc on a video surveillance system.

Averaging is what makes this approach dangerous for video surveillance storage. Server number one’s allocation of 100 megabits per second (Mbps) can easily take the form of 1 gigabyte per second (GBps) for a second and nothing for the next 9 seconds (1000 Mbps/10 seconds = 100 Mbps on average). In this example, the storage controller is well within its specified operational parameters. But from a camera’s perspective, something must now buffer nine seconds worth of video or the result will be dropped video frames.

The server running the NVR software can typically buffer some of this video traffic, but as different cameras come into play and different storage topologies are introduced, the NVR server must either be significantly over-resourced (read higher cost) to accommodate the variation in load or have a strict limit as to the number and type of cameras that each server can support. As one of the elements of a well-designed storage solution is to reduce cost, requiring more servers to accommodate a given number of cameras is again in direct opposition to the effort to minimise total cost of ownership.

Constant FIFO of recorded footage with sustained bit-rate streaming

Most surveillance systems configure storage arrays based on set parameters such as camera bit-rate, recording schedule, number of cameras, and retention period needed. Once the system is commissioned, video is recorded and the hard drives begin to fill. If initial storage calculations were done correctly, the drives will begin to overwrite once the retention period is reached, deleting the oldest video files to make room for new ones – e.g. first-in, first out (FIFO).

When PC users delete information from hard drives, fragments are left behind, and so PC users must occasionally run a defragmentation utility to optimise their drive. Now imagine a video storage array whose steady state is a constant overwrite scenario. As fragmentation builds, it will eventually choke off the remaining capacity of the drives. Ultimately, if no additional storage capacity remains, the NVR will cease to write new files, in an effort to protect the data that is already on the drives.

While fragmentation cannot easily be avoided, its effects can be mitigated. One such way is to leverage a file system that is less prone to fragmentation and can recover faster. XFS is an example of a file system built for performance and equipped with tools to easily recover from fragmentation issues. As video systems are constantly overwriting data, having a robust file system is critical to a properly designed video storage solution.

Source: Pelco Press Summer 2013. Used with permission.

For more information contact Pelco, +27 (0)12 254 6400, malcom.govender@schneider-electric.com, www.pelco.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.