DVRs versus NVRs

May 2006 Surveillance

Shawn Ciccarelli, product manager IP at Reditron, highlights the differences between digital video recorders (DVRs) and network video recorders (NVRs), and the implications for systems designers and end users.

First came the camera and monitor, closely followed by the video cassette recorder (VCR), recording one video stream to a three-hour tape at 25 frames per second and often triggered by an input device (raid button in a bank, for example).

Technology then brought us the multiplexer, which allowed several streams of video to be recorded onto the same tape and separated out into discrete, viewable streams on replay and the time-lapse VCR which enabled the dropping of frames and in so doing permitted a three-hour tape to be used over much longer periods, albeit at the cost of lost information.

The DVR

The rapid development of video compression algorithms (JPEG, MJPEG, MPEG-4, etc), computer processing speeds and a rapid reduction in data storage costs then gave rise to the digital video recorder. This you could consider as being the functionality of a multiplexer together with a computer disk for storage in place of tape, all housed in the same box together with some additional ports for connectivity.

The DVR provides a convenient, if limited, replacement for the multiplexer + VCR combination and provides non-linear access to recorded material usually selected by camera ID, time and date. The consistency of quality of recorded material will in general be higher than that obtained with analog tape although the actual quality achieved may or may not be better, depending on the compression algorithm and individual configuration.

In general, more programmable options for individual video stream recording parameters, (picture resolution, number of frames per second, trigger options, start/stop times etc), are available, but a DVR is only useful where the analog cameras are all cabled back to the DVR's location.

Competent DVRs now feature UDP (CAT 5) network ports so that the device can be provided with an IP address and thereby become accessible over an Ethernet network.

Many limitations still apply, however, not the least of which being that if it fails you will have most probably lost all your recordings (or they may not even have been made in the first place). This is not true of NVRs, which can be used in 'mirror' mode - see below.

On the subject of reliability if you are going to use a DVR make sure that the one you are proposing incorporates an industrial grade hard disk drive (HDD) and not a domestic one, or failure might be a lot sooner than you think (most DVR failures arise from overworked and overheated hard drives) - ask the manufacturer which drives he uses.

Like most other things in this world the actual performance obtained from a DVR, its ease of use and reliability will depend upon the manufacturer, individual model selected and price paid.

The NVR

The network video recorder heralds the arrival of the next natural point in the development of recording technology.

It is important to differentiate between DVRs and NVRs, as both are often termed 'digital'. A DVR digitally compresses analog video feeds and stores them on a hard-drive, the term 'digital' referring to the compression and storage technology, not the transmitted video images. The DVR therefore has to be located near the analog feeds. In contrast, an NVR stores digital images directly from the IP network. Therefore the most obvious difference between the DVR and NVR is that whereas the DVR records from analog streams provided from analog cameras the NVR records video streams that have already been encoded at the cameras. Thus you find no video connectors anywhere on a NVR; its input and output is IP data comprising compressed and encoded video. This will typically be in MPEG-4 format, which has enjoyed widespread adoption in the CCTV industry as the current compression technology of choice, due largely to its efficiency.

The huge advantage of architecture based on NVRs is that they can be located anywhere on a network - at the monitoring centre, adjacent to camera clusters, on the edge of a network, collected together in a hardened environment, indeed anywhere at all. In use their location is transparent to an operator - he or she simply calls up the recorded video stream to be viewed and, provided that they have the necessary authorisation there it is.

NVRs record and replay simultaneously, and recordings on any one machine can be remotely viewed by a number of authorised operators spread across the network simultaneously, all totally independently and without affecting each other.

The importance of the independence of physical location, well away from the cameras if necessary, should not be underestimated - IT managers are notoriously zealous in safeguarding their network capacity and rightly so, but by calculating the data flow requirement across the network and strategically placing NVRs accordingly, the impact of video streaming on bandwidth usage can be minimised.

Typically, an NVR might be placed on a local area network (LAN) and near (in network terms, not necessarily physically) a camera cluster so that the load is carried by the local LAN capable of absorbing it easily, thus saving capacity on other, perhaps more restricted, parts of the network. The IT manager can specify what level of bandwidth he is prepared to make available for video streaming and this can be set as a cap, so that it is not exceeded under worst-case conditions when in operation.

Then, when a recording is required at any other point on the network (typically 'at centre', but not necessarily so) it can be called up seamlessly by the operator, streamed down and then analysed, viewed (not the same thing) and acted upon accordingly.

To assist in the calculation of data flow requirement and disk storage capacity requirement spreadsheet-based calculators are available enabling these numbers to be calculated on a camera-by-camera basis using such parameters as the scene type (busy street/internal corridor etc), functionality of the camera (PTZ under continuous operator control/static for ID purposes etc), picture resolution and update rate in frames-per-second requirement, and if motion-sensing is used the motion frequency and type.

Competent NVRs now embody features such as:

* Hot-swappable disks.

* Simple network management protocol (SNMP) support.

* Built-in diagnostics (much beloved of IT managers).

* Protection of files against deletion (whether accidental or otherwise).

* Built-in firewall for the protection of data against unauthorised access.

* File export function that embodies the watermarking and digital signature based on individual video frames and audit trail for security.

* Synchronised audio and video recording and playback.

* Hard-disk temperature monitoring.

* Dual, fully redundant power supplies and network connections, the latter providing uninterrupted and continued operation in the event of a single power supply or network failure.

'Mirroring' techniques are now often used to duplicate the recording of video streams on additional NVRs located at different parts of the network, which provides a high level of protection against network failure; if one part goes down the other is there as a backup. You can have as many NVRs across a system as you like - adding another is just a matter of plugging it in and configuring it. There is no requirement for additional video cabling.

This feature really comes into its own during the consolidation of several independent systems into one managed environment, or in system rationalisation or expansion as it reduces system complexity and removes all of the cost associated with re-cabling.

Activity controlled framerate (ACF) is also used to reduce the size (and hence the cost) of disks.

This facility relies on processing at the camera encoder. In use, should no movement be detected in the camera scene then the recorder falls back to a low recording rate (typically one frame per second). However, when movement is detected in the scene it speeds back up to its pre-programmed recording rate, achieving this in typically only 100 ms (or 1/10th of a second). This feature is most effective in places where low activity occurs, such as in corridors or on fire escapes, or internally in buildings which are unoccupied at night, and can save as much as 50% of the disk storage capacity that would otherwise be required.

So what can we expect for the future?

Many tools are already available to assist the operator identify and replay events of interest from a recording. IndigoVision's 'Control Center' Video & Alarm Management software, for example, analyses movement in a scene and on command from an operator displays thumbnails on the screen that represent frames from recordings containing the specified movement. Clicking on one of the thumbnails then replays that section of video. The system can search 24 hours of recorded video and display these thumbnails in just a few seconds. Changing the search variables allows the operator to sift through vast quantities of recorded material quickly and efficiently.

Analytics software then searches for the events requested, saving the operator to concentrate on more specialised and immediate tasks. These are not just features that benefit the user but they also help to reduce the overall demand on the network.

This is just the tip of the iceberg - new developments encompass, for example congestion detection (too many people in too small a space), motion detection (person or vehicle moving, say, from left to right across a scene), abandoned object detection (suitcase abandoned in an air terminal), counter flow (person moving against an immigration route), virtual tripwire (detection and alarm upon breach of a defined line), shape-based detection (vehicle), object tracking and theft detection (object removed from a busy scene).

It can be expected that huge productivity improvements will result from using analytics software during the searching of recorded material in post-event analysis, and for which the network video recorder is the key.

For more information contact Shawn Ciccarelli, Reditron, 011 887 1546, www.reditron.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five signs your storage is holding you back
Infrastructure Surveillance
In the drive for business growth, organisations across South Africa are investing heavily in talent, applications, and strategy. Yet the foundational technology that underpins every digital interaction - data storage - is often overlooked.

Read more...
Dahua expands wireless 4G security monitoring
Products & Solutions Surveillance Smart Home Automation
Dahua Technology has launched a new wireless 4G security camera under its WITHS series, designed to deliver simplified deployment, continuous monitoring, and dependable performance in remote and power-limited environments.

Read more...
IQSight SmartSuite integration with XProtect
Surveillance News & Events AI & Data Analytics
Milestone Systems and IQSight have strengthened their collaboration with the release of SmartSuite, a consolidated plug-in suite for Milestone XProtect video management software, to cut installation time for system integrators by 70%.

Read more...
Smart port monitoring and automated container tracking
LD Africa AI & Data Analytics Surveillance Logistics (Industry)
A leading shipping port set out to improve visibility, security, and operational efficiency across its site, turning to an advanced monitoring solution powered by Axxon PSIM.

Read more...
When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Smarter surveillance in a connected world
Securex South Africa Surveillance IoT & Automation
The security sector is moving rapidly towards integrated, intelligence-led environments. Organisations want systems that communicate with each other, deliver meaningful insight, and support operational efficiency without compromising cybersecurity or privacy.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.