DAS, NAS, SAN, RAID - who cares?

March 2012 Information Security, Infrastructure

Eventually, it always happens with a technology discussion; we get to the alphabet soup section. Although the need for storage of your surveillance is evident, it is not always clear which solution is right for your organisation.

There are a variety of storage options available, the most prevalent being direct-attached storage (DAS), network-attached storage (NAS) and storage area networks (SAN). Several key criteria to consider include:

* Capacity – the amount of data (images) that needs to be stored and shared.

* Performance – I/O and throughput requirements.

* Scalability – long-term surveillance system growth.

* Availability and reliability – how important are your recordings?

* Data protection – backup and recovery requirements.

* IT staff and resources available.

* Budget concerns.

While one type of storage media is usually sufficient for smaller companies, large enterprises will often have a mixed storage environment, implementing different mediums for specific departments, workgroups and remote offices.

Milind Borkar
Milind Borkar

DAS: ideal for local data sharing requirements

Direct-attached storage (DAS) is the most basic level of storage. The storage devices are part of the host computer, like the drive in your laptop, or directly connected to a single server, as you typically find in a small office, in which the workstation must access the server (typically one of the workstations) in order to connect to the storage device.

This is in contrast to networked storage such as NAS and SAN, which are connected to workstations and servers over a network. That is what you find being used in large companies. For all the local user knows, the storage devices could be in Singapore or San Francisco.

In the DAS model, if the server is down or experiencing problems, users cannot store and access data. Surveillance images cannot be retrieved or stored. If the organisation grows and needs new servers, storage for each server must be administered separately. That can get quite messy. They will want to move to a networked storage solution as quickly as possible.

Thankfully, organisations transitioning to networked storage can protect their investment in their legacy DAS system. The most popular option is to place it on the network via a bridge device. As a result, the current storage resource can be used in a new networked infrastructure without incurring the immediate costs of networked storage. Once the transition is made, DAS can still be used locally to store less critical data, such as keeping images from the cameras watching over the building’s hallways.

Fred Zagurski
Fred Zagurski

NAS: file-level data sharing across the enterprise

For those systems that must store a large amount of images for many days, NAS is a good option. Network-attached storage (NAS) is a special purpose device, comprised of both hard disks and management software. It is 100% dedicated to serving files over a network. As a result, NAS relieves the server of storage and file serving responsibilities and provides a lot more flexibility in data access by virtue of being independent.

NAS and storage area networks (SAN) are sometimes competitive when creating a system but just as likely to become part of a NAS/SAN convergence scheme. High reliability features, such as RAID and hot swappable drives and components (covered below), are standard even in lower end NAS systems, while midrange offerings provide enterprise data protection features such as replication and mirroring for business continuance.

NAS is an attractive investment that provides tremendous value, considering that the main alternatives are adding new servers, which is an expensive proposition, or expanding the capacity of existing servers, a long and arduous process that is usually more trouble than it is worth. NAS systems can provide many terabytes of storage in high-density form factors, making efficient use of data centre space.

SAN: high availability for block-level data transfer

A storage area network (SAN) is a dedicated, high-performance storage network that transfers data between servers and storage devices, separate from the local area network. With their high degree of sophistication, management complexity and cost, SANs are traditionally implemented for mission-critical applications in the enterprise space.

In contrast to DAS or NAS, which are optimised for data sharing at the file level, the strength of a SAN lies in its ability to move large blocks of data or images. This is especially important for bandwidth-intensive applications such as large IP/megapixel camera system recording. The distributed architecture of a SAN also enables it to offer higher levels of performance and availability than any other storage medium. By dynamically balancing loads across the network, SANs provide fast data transfer while reducing latency and server workload. Large numbers of users can simultaneously access images without creating bottlenecks on the local area network and servers.

SANs ensure predictable performance and 24x7 data availability and reliability. They also offer excellent scalability for large enterprises that anticipate significant growth in surveillance storage requirements. And unlike DAS, excess capacity in SANs can be pooled, resulting in a very high utilisation of resources.

There has been much debate in recent times about choosing SAN or NAS in the purchasing decision, but the truth is that the two technologies can prove quite complementary. Today, SANs are increasingly implemented in conjunction with NAS. With SAN/NAS convergence, companies can consolidate block-level and file-level data on common arrays.

What are RAID 1 and RAID 5?

RAID (redundant array of independent disks – originally redundant array of inexpensive disks) is often used as an umbrella term for computer data storage schemes that can divide and replicate data among multiple physical drives. It is a storage technology that provides increased reliability and functions through redundancy. Multiple disk drive components are combined into a single logical unit. Data is distributed across the drives.

Surveillance systems tend to use either RAID 1 or RAID 5. RAID 1 data is written identically to multiple drives, thereby producing a ‘mirrored set’. The array continues to operate as long as at least one drive is functioning. RAID 5 distributes parity along with the data and requires all drives, but one to be present to operate. Thus, the array is not destroyed by a single drive failure.

Assuring continuous recording

Hot swapping is used when one wants to change the configuration or repair a working system without interrupting its operation. It may simply be for convenience, to avoid the delay and nuisance of shutting down and then restarting complex equipment, or because it is essential that the equipment be permanently available.

For instance, hot swapping may be used to add or remove hard drives without interrupting equipment operation. For example, computer RAID disk arrays allow a faulty disk to be hot-swapped for a new one; the new one is configured to become part of the array automatically or by user command.

Options to increase time stored

In the perfect world, you would be able to save all recordings forever; assuring that key evidence would always be available. However, budgets dictate otherwise. Therefore, some simple options that let recordings be stored longer include adding more drives to the system. Many lower their frame-rate over time, with older recordings being kept at a lower frame-rate than newer recordings. For example, video can initially be viewed and stored at 8 fps. Then after a week, every other frame is deleted, leaving 4 fps of storage. A week later, the same thing occurs, leaving 2 fps, and so on.

Storing surveillance recordings is like operating any complex filing system. The size of the container must fit the application. Unfortunately, no practical universal storage medium exists and all forms of storage have some drawbacks. And, we can never forget a key role for the recordings – they must stand up in court. They must be crisp and be able to show that they have experienced no tampering.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Kaspersky KATA 7.0 for targeted attack protection
Information Security Products & Solutions
] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.

Read more...
The role of advanced technologies in ransomware recovery
Information Security
As businesses increasingly adopt cloud technologies, the complexities of maintaining resilience and ensuring rapid recovery from such incidents become even more pronounced. The integration of advanced technologies is essential to navigate these challenges effectively.

Read more...