DAS, NAS, SAN, RAID - who cares?

March 2012 Information Security, Infrastructure

Eventually, it always happens with a technology discussion; we get to the alphabet soup section. Although the need for storage of your surveillance is evident, it is not always clear which solution is right for your organisation.

There are a variety of storage options available, the most prevalent being direct-attached storage (DAS), network-attached storage (NAS) and storage area networks (SAN). Several key criteria to consider include:

* Capacity – the amount of data (images) that needs to be stored and shared.

* Performance – I/O and throughput requirements.

* Scalability – long-term surveillance system growth.

* Availability and reliability – how important are your recordings?

* Data protection – backup and recovery requirements.

* IT staff and resources available.

* Budget concerns.

While one type of storage media is usually sufficient for smaller companies, large enterprises will often have a mixed storage environment, implementing different mediums for specific departments, workgroups and remote offices.

Milind Borkar
Milind Borkar

DAS: ideal for local data sharing requirements

Direct-attached storage (DAS) is the most basic level of storage. The storage devices are part of the host computer, like the drive in your laptop, or directly connected to a single server, as you typically find in a small office, in which the workstation must access the server (typically one of the workstations) in order to connect to the storage device.

This is in contrast to networked storage such as NAS and SAN, which are connected to workstations and servers over a network. That is what you find being used in large companies. For all the local user knows, the storage devices could be in Singapore or San Francisco.

In the DAS model, if the server is down or experiencing problems, users cannot store and access data. Surveillance images cannot be retrieved or stored. If the organisation grows and needs new servers, storage for each server must be administered separately. That can get quite messy. They will want to move to a networked storage solution as quickly as possible.

Thankfully, organisations transitioning to networked storage can protect their investment in their legacy DAS system. The most popular option is to place it on the network via a bridge device. As a result, the current storage resource can be used in a new networked infrastructure without incurring the immediate costs of networked storage. Once the transition is made, DAS can still be used locally to store less critical data, such as keeping images from the cameras watching over the building’s hallways.

Fred Zagurski
Fred Zagurski

NAS: file-level data sharing across the enterprise

For those systems that must store a large amount of images for many days, NAS is a good option. Network-attached storage (NAS) is a special purpose device, comprised of both hard disks and management software. It is 100% dedicated to serving files over a network. As a result, NAS relieves the server of storage and file serving responsibilities and provides a lot more flexibility in data access by virtue of being independent.

NAS and storage area networks (SAN) are sometimes competitive when creating a system but just as likely to become part of a NAS/SAN convergence scheme. High reliability features, such as RAID and hot swappable drives and components (covered below), are standard even in lower end NAS systems, while midrange offerings provide enterprise data protection features such as replication and mirroring for business continuance.

NAS is an attractive investment that provides tremendous value, considering that the main alternatives are adding new servers, which is an expensive proposition, or expanding the capacity of existing servers, a long and arduous process that is usually more trouble than it is worth. NAS systems can provide many terabytes of storage in high-density form factors, making efficient use of data centre space.

SAN: high availability for block-level data transfer

A storage area network (SAN) is a dedicated, high-performance storage network that transfers data between servers and storage devices, separate from the local area network. With their high degree of sophistication, management complexity and cost, SANs are traditionally implemented for mission-critical applications in the enterprise space.

In contrast to DAS or NAS, which are optimised for data sharing at the file level, the strength of a SAN lies in its ability to move large blocks of data or images. This is especially important for bandwidth-intensive applications such as large IP/megapixel camera system recording. The distributed architecture of a SAN also enables it to offer higher levels of performance and availability than any other storage medium. By dynamically balancing loads across the network, SANs provide fast data transfer while reducing latency and server workload. Large numbers of users can simultaneously access images without creating bottlenecks on the local area network and servers.

SANs ensure predictable performance and 24x7 data availability and reliability. They also offer excellent scalability for large enterprises that anticipate significant growth in surveillance storage requirements. And unlike DAS, excess capacity in SANs can be pooled, resulting in a very high utilisation of resources.

There has been much debate in recent times about choosing SAN or NAS in the purchasing decision, but the truth is that the two technologies can prove quite complementary. Today, SANs are increasingly implemented in conjunction with NAS. With SAN/NAS convergence, companies can consolidate block-level and file-level data on common arrays.

What are RAID 1 and RAID 5?

RAID (redundant array of independent disks – originally redundant array of inexpensive disks) is often used as an umbrella term for computer data storage schemes that can divide and replicate data among multiple physical drives. It is a storage technology that provides increased reliability and functions through redundancy. Multiple disk drive components are combined into a single logical unit. Data is distributed across the drives.

Surveillance systems tend to use either RAID 1 or RAID 5. RAID 1 data is written identically to multiple drives, thereby producing a ‘mirrored set’. The array continues to operate as long as at least one drive is functioning. RAID 5 distributes parity along with the data and requires all drives, but one to be present to operate. Thus, the array is not destroyed by a single drive failure.

Assuring continuous recording

Hot swapping is used when one wants to change the configuration or repair a working system without interrupting its operation. It may simply be for convenience, to avoid the delay and nuisance of shutting down and then restarting complex equipment, or because it is essential that the equipment be permanently available.

For instance, hot swapping may be used to add or remove hard drives without interrupting equipment operation. For example, computer RAID disk arrays allow a faulty disk to be hot-swapped for a new one; the new one is configured to become part of the array automatically or by user command.

Options to increase time stored

In the perfect world, you would be able to save all recordings forever; assuring that key evidence would always be available. However, budgets dictate otherwise. Therefore, some simple options that let recordings be stored longer include adding more drives to the system. Many lower their frame-rate over time, with older recordings being kept at a lower frame-rate than newer recordings. For example, video can initially be viewed and stored at 8 fps. Then after a week, every other frame is deleted, leaving 4 fps of storage. A week later, the same thing occurs, leaving 2 fps, and so on.

Storing surveillance recordings is like operating any complex filing system. The size of the container must fit the application. Unfortunately, no practical universal storage medium exists and all forms of storage have some drawbacks. And, we can never forget a key role for the recordings – they must stand up in court. They must be crisp and be able to show that they have experienced no tampering.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
Fastest PCIe Gen 5.0 NVMe SSD
Products & Solutions Infrastructure
Sandisk has unveiled the WD_BLACK SN8100 NVMe SSD with PCIe Gen 5.0 technology, an internal SSD delivering speeds up to 14 900 MB/s and capacities up to 4 TB, with 8 TB solutions available soon.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Unified storage solution
Products & Solutions Infrastructure
CASA Software has announced the local availability of Nexsan’s upgraded unified storage solution, Unity NV4000, which is ideal for mixed workloads, from virtualisation and video surveillance to secure backup and recovery.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.