Bandwidth and storage considerations

March 2010 Information Security

This article, courtesy of Axis Communications, provides some guidelines on what users require in terms of bandwidth and storage when implementing a multicamera IP surveillance solution.

Network bandwidth and storage requirements are important considerations when designing a video surveillance system. The factors include the number of cameras, the image resolution used, the compression type and ratio, frame rates and scene complexity. Network video products utilise network bandwidth and storage space based on their configuration. Factors that influence this include:

* Number of cameras.

* Whether recording will be continuous or event-based.

* Number of hours per day the camera will be recording.

* Frames per second.

* Image resolution.

* Video compression type: Motion JPEG, MPEG-4, H.264.

* Scenery: image complexity (eg, grey wall or a forest), lighting conditions and amount of motion (office environment or crowded train stations).

* How long data must be stored.

Bandwidth needs

In a small surveillance system involving eight to 10 cameras, a basic 100 Mbit network switch can be used without having to consider bandwidth limitations. Most companies can implement a surveillance system of this size using their existing network.

When implementing 10 or more cameras, the network load can be estimated using a few rules of thumb:

* A camera that is configured to deliver high-quality images at high frame rates will use approximately 2 to 3 Mbit/s of the available network bandwidth.

* With more than 12 to 15 cameras, consider using a switch with a gigabit backbone. If a gigabit-supporting switch is used, the server that runs the video management software should have a gigabit network adapter installed.

Technologies that enable the management of bandwidth consumption include the use of VLANs on a switched network, Quality of Service and event-based recordings.

Calculating storage needs

As mentioned earlier, the type of video compression used is one of the factors affecting storage requirements. The H.264 compression format is by far the most efficient video compression technique available today. Without compromising image quality, an H.264 encoder can reduce the size of a digital video file by more than 80% compared with the Motion JPEG format and as much as 50% more than with the MPEG-4 (Part 2) standard. This means much less network bandwidth and storage space are required for an H.264 video file.

Sample storage calculations for all three compression formats are provided in the tables. Because of a number of variables that affect average bit rate levels, calculations are not so clearcut for H.264 and MPEG-4. With Motion JPEG, there is a clear formula because Motion JPEG consists of one individual file for each image. Storage requirements for Motion JPEG recordings vary depending on the frame rate, resolution and level of compression.

H.264 calculation

* Approx. bit rate/8(bits in a byte) x 3600s = KB per hour/1000 = MB per hour.

* MB per hour x hours of operation per day/1000 = GB per day.

* GB per day x requested period of storage = Storage need.

The figures above are based on a lot of motion in a scene. With fewer changes in a scene, the figures can be 20% lower. The amount of motion in a scene can have a big impact on the amount of storage required. See Table 1.

Table 1
Table 1

MPEG-4 calculation

* Approx. bit rate/8(bits in a byte) x 3600s = KB per hour/1000 = MB per hour.

* MB per hour x hours of operation per day/1000 = GB per day.

* GB per day x requested period of storage = Storage need.

Note: The formula does not take into account the amount of motion, which is an important factor that can influence the size of storage required. See Table 2.

Table 2
Table 2

Motion JPEG calculation

* Image size x frames per second x 3600s = KB per hour/1000 = MB per hour.

* MB per hour x hours of operation per day/1000 = GB per day.

* GB per day x requested period of storage = Storage need. See Table 3.

Table 2
Table 2

A helpful tool in estimating requirements for bandwidth and storage is the Axis Design Tool, which is accessible at www.axis.com/products/video/design_tool/.

Server-based storage

Depending on a PC server’s central processing unit (CPU), network card and internal RAM (random access memory), a server can handle a certain number of cameras, frames per second and size of images. Most PCs can hold between two and four hard disks, and each disk can be up to approx. 300 GB. In a small to medium-sized installation, the PC that runs the video management software is also used for video recording. This is called a direct-attached storage.

With the Axis Camera Station video management software, for instance, one hard disk is suitable for storing recordings from six to eight cameras. With more than 12 to 15 cameras, at least two hard disks should be used to split the load. For 50 or more cameras, the use of a second server is recommended.

NAS and SAN

When the amount of stored data and management requirements exceed the limitations of a direct-attached storage, a network-attached storage (NAS) or storage area network (SAN) allows for increased storage space, flexibility and recoverability.

NAS provides a single storage device that is directly attached to a LAN and offers shared storage to all clients on the network. A NAS device is simple to install and easy to administer, providing a low-cost storage solution. However, it provides limited throughput for incoming data because it has only one network connection, which can become problematic in high-performance systems.

SANs are high-speed, special-purpose networks for storage, typically connected to one or more servers via fibre. Users can access any of the storage devices on the SAN through the servers, and the storage is scalable to hundreds of terabytes. Centralised storage reduces administration and provides a high performance, flexible storage system for use in multi-server environments. Fibre channel technology is commonly used to provide data transfers at four gigabits per second and to allow large amounts of data to be stored with a high level of redundancy.

Redundant storage

SAN systems build redundancy into the storage device. Redundancy in a storage system allows video, or any other data, to be saved simultaneously in more than one location. This provides a backup for recovering video if a portion of the storage system becomes unreadable. There are a number of options for providing this added storage layer in an IP-surveillance system, including a Redundant Array of Independent Disks (RAID), data replication, server clustering and multiple video recipients.

RAID

This is a method of arranging standard, off-the-shelf hard drives such that the operating system sees them as one large hard disk. A RAID setup spans data over multiple hard disk drives with enough redundancy so that data can be recovered if one disk fails. There are different levels of RAID, ranging from practically no redundancy to a full-mirrored solution in which there is no disruption and no loss of data in the event of a hard disk failure.

Data replication

This is a common feature in many network operating systems. File servers in a network are configured to replicate data among each other, providing a backup if one server fails.

Server clustering

A common server clustering method is to have two servers work with the same storage device, such as a RAID system. When one server fails, the other identically configured server takes over. These servers can even share the same IP address, which makes the so-called ‘fail-over’ completely transparent for users.

Multiple video recipients

A common method to ensure disaster recovery and off-site storage in network video is to simultaneously send the video to two different servers in separate locations. These servers can be equipped with RAID, work in clusters, or replicate their data with servers even further away. This is an especially useful approach when surveillance systems are in hazardous or not easily accessible areas, such as in mass-transit installations or industrial facilities.

System configurations

Small system (1 to 30 cameras)

A small system usually consists of one server running a surveillance application that records the video to a local hard disk. The video is viewed and managed by the same server. Although most viewing and management will be done at the server, a client (local or remote) can be connected for the same purpose.

Medium system (25 to 100 cameras)

A typical, medium-sized installation has a server with additional storage attached to it. The storage is usually configured with RAID in order to increase performance and reliability. The video is normally viewed and managed from a client rather than from the recording server itself.

Large centralised system (50 to +1000 cameras)

A large-sized installation requires high performance and reliability in order to manage the large amount of data and bandwidth. This requires multiple servers with dedicated tasks. A master server controls the system and decides what kind of video is stored at what storage server. As there are dedicated storage servers, it is possible to do load balancing. In such a setup, it is also possible to scale up the system by adding more storage servers when needed and do maintenance without bringing down the entire system.

Large distributed system (25 to +1000 cameras)

When multiple sites require surveillance with centralised management, distributed recording systems may be used. Each site records and stores the video from local cameras. The master controller can view and manage recordings at each site.

Source: http://www.axis.com/products/video/about_networkvideo/bandwidth.htm.

For more information contact Roy Alves, Axis Communications, +27 (0)11 548 6780, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
Are we over the edge?
SMART Security Solutions Axis Communications SA Hikvision South Africa IoT & Automation
SMART Security Solutions speaks to Axis Communications and Hikvision to learn what is happening on the edge of surveillance solutions. Is everything now in the cloud, or are edge devices still in demand?

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...