Storage makes the leap to IP

CCTV Handbook 2011 Information Security

The implications of digital video on storage needs and image management.

With the growth of video surveillance and the coexistence of analogue and digital as a measured step to the transition to digital video surveillance continuing, there is another leap to take involving storage, retrieval and image management. Storage, it turns out has both a price and a growing role to play in evolving systems. There are different uses and purposes of stored video, various locations where images can be stored, a myriad of storage types and business and operations issues to consider.

We will share the thoughts and experiences of CSO Terry Jones and Helena Smith, his second-in-command, who work for a mid-sized enterprise. They now face the options of storage for their current security video solutions, as well as anticipation of future technological changes and management needs.

Terry and Helena both know storage and video solutions have come a long way. They also know that their current storage needs and especially future IP video developments, using megapixel cameras, have purchase, maintenance and operations costs, too. In many ways, it is a matter of capacity, when it comes to storage.

That is what it is all about. In the world of computers, where digital security video resides, there are three types of memory: video, storage and RAM. Storage memory is on your hard drive and is used to store everything that is software or virtual on your computer, such as programs, files, settings, etc. There are bits, kilobytes, megabytes, gigabytes, terabytes and petabytes. A petabyte is 1024 terabytes. Google, for example, processes about 24 petabytes of data per day, much of it video through YouTube.

Within security applications, it is apparent that with more cameras, more megapixel and high definition cameras, coupled with the need to look at more details for investigations and liability reasons, there are more security video bytes to place in storage.

Security video storage

Intrusion detection, fire alarm and electronic access control systems have vastly less storage needs when compared to what a video and audio content security system produces. Few things can create data bits more rapidly than a digital video or analogue signals converted to digital information. Compression can allow storage devices to hold more data as well as let transmission infrastructure handle more information within the limits of bandwidth.

During a planning meeting on security video storage, Helena points out to Terry that storing and recalling even highly compressed video involves data rates of millions of bits per second. And the video, with the addition of metadata – labels for light or heavy intelligent retrieval and analytics – is often compressed for practical storage. Each purpose spawns its own set of technical and economic requirements, costs and approaches. Archived security video, for instance, can involve video at several quality levels.

Retrieval of video from storage is a key function and one that has grown more important thanks to the use of megapixel and high definition cameras which has spurred forensics applications in which more details allow security or law enforcement to see more of what happened. There are many different measures for evaluating the performance of video and image retrieval systems but all require a collection of data in storage and a query, often through a video management system or physical security information management system (PSIM). Every piece of an image is known to be either relevant or non-relevant to a particular query, but there are shades of relevancy.

Total cost of ownership of storage involves a diversity of elements. There is the cost of the devices themselves as well as their functionalities. Different types of storage are differently priced.

There are tools to determine storage. For instance, in a typical surveillance project, there are several factors that affect the amount of storage required, including:

* Type of camera, analogue or IP.

* Resolution, 1,3 megapixel, 3 megapixel, or others.

* CODEC, MJPEG, H.264, or others.

* Frame rate, 5 fps, 30 fps, or others.

* Dual streaming, separate streams for viewing and recording.

* Motion in the scene.

* Recording periods during the day.

* Levels of activity through the week.

Storing bits is like operating any complex filing system. The size of the container must fit the application. But, as Helena points out, no practical universal storage medium exists, and all forms of storage have some drawbacks. She says that, when evaluating storage options, core characteristics are volatility, mutability, accessibility, and addressability. And high density, low cost, high reliability, and fast read and write times are all needed for many video applications.

Future proofing the storage

Scalability is another storage issue. Security video systems tend to grow and change, especially in regard to coexistence of analogue and IP video, when migrating to all digital video and with megapixel and high definition cameras. Data storage at the edge can be useful when facing bandwidth challenges or in building in redundancy. Digital video recorders (DVRs) are among the most used security video storage devices. Still, when it comes to scaling, DVRs can add to cost since they handle a set number of cameras within a set geography.

DVRs are generally available with 4, 8, 16 or 32 inputs while network video recorders may have limits based upon licences. In both cases, the amount of storage space needed may affect selection. For example, Terry has some 16-camera DVRs with only eight cameras so that he can take advantage of the larger hard drive size.

Some DVRs are limited in the number or capacities of hard drives they can handle. Some require two to three minutes of rebooting when installing new hard drives. Others have hot-swappable hard drives, which mean no rebooting is necessary. The drives can be installed while another hard drive in the DVR is being used. The ability to add external hard drives also is an important factor.

Specific types of storage

Videotape and time-lapse recorders are an historic means of image storage for consumers and security operations. Videotape is certainly not yet dead. It is cheap, ubiquitously available, portable and highly reliable, not to mention quite familiar. But, when compared to other techniques, it suffers from limited shelf life and long seek times that make nonlinear read/write impractical.

Flash memory is a non-volatile computer storage that can be electronically erased and reprogrammed for memory cards and USB flash drives for storage and transfer of data between computers and other digital devices. Flash memory stores information in an array of memory cells made from floating-gate transistors. Flash memory costs far less than other technical approaches and is the dominant technology wherever a significant amount of non-volatile, solid state storage is needed in digital cameras, for instance.

Since flash memory is non-volatile, no power is needed to maintain the information stored in the chip. In addition, flash memory offers fast read access times and better shock resistance than, say, hard disks. It is useful for embedded applications. Yet, flash has storage size limitations (though there are 256 gigabyte units) and has a finite number of erase-write cycles.

SD cards in the camera

A type of flash memory, secure digital (SD) is a card format originally developed by Panasonic, SanDisk, and Toshiba for use in portable devices. Standard SD cards have a maximum of 4-gigabyte capacity. SDHC high capacity cards can often hold 32 gigabytes while even newer SDXC extended capacity cards handle two terabytes of storage. SD is there to trigger recording when there is an alarm, among other techniques.

Video cameras equipped with an SDHC card can often store a couple of days worth of video recorded at 30 frames per second. In the event that greater recording time is needed, some video cameras have a connection for a hard drive or other external storage unit.

A hard disk drive (HDD) is a non-volatile storage device that stores data on rapidly rotating rigid (hence the hard part) platters with magnetic surfaces. HHDs are in personal and desktop computers and some now can hold up to two terabytes of storage. Laptop units hold much less. A typical hard drive has two electric motors, one to spin the disks and one to position the read/write head assembly; and because of that, there is a lifespan for all HDDs.

When it comes to optical devices, there are CDs and DVDs and their read/writers, often used to capture security video of incidents for forensics and law enforcement use. The best DVDs hold about nine or so gigabytes. Newer blu-ray technology handles high definition.

Embedded and network DVRs

A digital video recorder (DVR) is a device that records video in a digital format. It has software and personal computer hardware, which enables video capture and playback to and from disk. DVRs can be stand-alone but more often these days, points out Helena, are part of an overall security video network or hang from the overall corporate network infrastructure. Thanks to such consumer applications as TiVo and satellite/cable set-top boxes, when it comes to security applications, many DVRs have a myriad of advanced functions such as searches by event, time, date and camera. There is also much more control over quality and frame rate allowing disk space use to be optimised and the DVR can also be set to overwrite the oldest security footage should the disk become full. Some include compression capabilities and/or video analytics firmware.

Security DVRs are either PC-based or embedded. A PC-based DVR’s architecture is a classical personal computer with video capture cards. An embedded device is specifically designed to have its own operating system and application software contained in firmware or read only memory. Embedded operating systems may be less susceptible to an outside attack. If the recorder uses a non-embedded operating system, protection software, such as anti-virus, may be installed.

A network video recorder or NVR is an Internet protocol-based device that sits on a security or enterprise network. NVRs can be managed remotely via a local area network or over the Internet. NVRs are used in IT-based systems to expand capacity beyond DVRs.

Most DVRs and NVRs have the ability to be remotely accessed either over a LAN, WAN, the Internet either by using proprietary licensed software or through a Web browser.

From DAS to NAS to SAN

At this point, Helena provided a quick technology briefing on direct and networked storage.

Direct-attached storage (DAS) is traditional mass storage, Helena reports, that does not use any network.

Network-attached storage (NAS) is mass storage attached to a computer which another computer can access at file level over a local area network, a private wide area network, or, in the case of online file storage, over the Internet.

Storage area network (SAN) is specialised network storage that provides other computers with storage capacity. The crucial difference between NAS and SAN is, NAS presents and manages file systems to client computers, while SAN provides access at block-addressing (raw) level, leaving it to attaching systems to manage data or file systems within the provided capacity. SAN is commonly associated with fibre networks. In other words, NAS solutions are computers dedicated to data storage. SANs are networks of storage devices that could include servers and digital tape libraries that may be remotely located but can be accessed as if they are locally attached.

Serial attached small computer system interface (SCSI or SAS) is a computer bus, which moves data to and from computer storage devices such as hard drives. SAS depends on a point-to-point serial protocol that replaces the parallel SCSI bus technology from the 1980s. Serial ATA or SATA is also a computer bus interface for connecting host bus adapters to mass storage devices such as hard disk drives and optical drives.

SAS is full duplex, SATA is half-duplex. SATA follows the ATA command set and thus supports hard drives and CD/DVD drives.

In addition, Internet small computer system interface (iSCSI) is an IP-based storage networking standard for linking data storage facilities. By carrying SCSI commands over IP networks, iSCSI facilitates data transfers over intranets and manages storage over long distances. It is used to transmit data over local area networks, wide area networks, or the Internet and can enable location-independent data storage and retrieval. Unlike traditional fibre channel, with its special-purpose cabling, iSCSI runs over long distances using existing network infrastructure.

RAID or mirroring?

Another ‘buzzy’ word, according to Helena, is RAID and aims at storage reliability and input/output performance. Redundant array of inexpensive disks (RAID) permits high levels of storage reliability from low-cost and less reliable PC-class disk drives. Various RAID data storage schemes divide and replicate data among multiple hard disk drives. Data can be distributed across multiple disks, while the array is seen by the user and operating system as one single disk. Some systems create backups automatically, called mirroring. Different types of RAID recording are specified by numbers. A popular RAID recording method practiced in the security industry for video surveillance is RAID 5. Terry and Helena’s integrator has recommended RAID 5 instead of mirroring. Mirroring is using one additional hard drive to make a backup copy instead of several. When several hard drives are used for backup, they can all be writing portions of the data at the same time. The risk of loss of the recorded security video data also is spread over several or more drives. Because mirroring uses a single hard drive for backup it can be slower in comparison.

Near the end of the tech briefing, Terry asks about the cloud for storing and retrieving security video. A cloud example he is familiar with is Gmail from Google. Gmail for business, for example, offers 25 gigabytes of storage per user. Cloud computing is Internet-based computing, in which shared resources, software and information are provided to computers and other devices on-demand, like a public utility.

Among those things that both Terry and Helena agree is to forget about how many terabytes to buy. Instead they will use proposal terminology such as ‘system to record 210 cameras at 4 CIF RAID 5 for no less than 20 days’.

Practical needs on top of technological ones

There are practical approaches to security video storage beyond the various technological ones. When you can store seemingly unlimited quantities of video, Terry figures, the question becomes how much do you really need and at what frame speed and resolution.

It may be that larger hard drives are not the one answer. Often in smaller installations or in remote locations, a smaller DVR will do the job, especially if the frames per second recorded is small. Sometimes an integrator will use a consumer grade PC to build a recorder to handle cameras but there are obvious dangers in this approach.

In the case of IP and high definition cameras, storage needs change to external options. Here DVRs can feature multiple, reasonably inexpensive SATA hard drive bays. And with MPEG4 and H.264, a lot of video data can be stored at real-time image rates. Simplicity of set up and operation for the end user means a one-box embedded solution can be a winner for some.

Motion detection and lower frame rate can make a storage difference. Picking higher quality cameras and digital noise control can also impact storage requirements. And good cabling also helps. In such cases, there are fewer pixels of distortion to store. Preferences, corporate rules, liability concerns and government regulations all may impact how long, how easy to retrieve and in what condition images are stored.

What about resolution and frame rate?

Quality of images also affects storage needs and pricing, although less so as storage capacity increases while prices drop. Helena again points out that with analogue cameras co-existing with a digital recording system, if we do not do it right, there will be noise which will generate additional storage requirements. Measures of video resolution, such as 480 horizontal lines, 640 x 480 pixels, or 4 CIF, may not provide a complete picture. Helena suggests they measure the visual details that remain in the picture during playback after recording, which is totally different.

Image or frame rates also affect storage. No doubt, full-motion video at 30 fps is not used in many applications because less may be sufficient. It may also depend on how many cameras get recorded by a DVR, with the ability to adjust frames per second for each camera based on its location and scenes. In that gaming example, a casino camera would be 30 fps, as opposed to a backroom operations camera, which would record at 15 fps or lower.

Terry wants it both ways: low frame rate when nothing is happening, but when motion detection or an alarmed event occurs, recording is at high resolution and maximum frame rate.

Video storage needs are in part determined by the security video compression method. Newer compression tech such as MPEG-4 and its variant H.264 refresh only the parts of the screen that change from one frame to the next, helpful for maximum recording speed and longer storage capacity.

Another element in the security video storage equation is the organisation’s IT department, which may have standards and hardware testing before a storage device can hang from the network. Some security executives welcome the involvement and ownership by IT of various parts of a video surveillance system while others see value in owning most of their gear.

This article has been shortened.

For more information contact Infinova, [email protected], www.infinova.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...