A lot has changed since VHS tapes were the universal medium for CCTV recording, with digital systems now starting to predominate. But what's the current state of the art in digital recording - and what new developments are just around the corner? Siemens Building Technologies, Security Products Jon Hill has the answers.

Today, there would be very few, if any, CCTV
Preference for digital recording systems is significantly increasing 
specifiers who would choose anything other than digital recording for a new system. But digital recording technology is developing very rapidly and there's much more variation between products than there ever was in the days of VHS tape. It is, therefore, important for users to know what to look for in today's systems and to have an idea of the trends that will shape systems in the future.

One of the first issues to address is the classification of digital recorders. In theory, digital recordings can be made on tape, and this system is, in fact, used in some consumer camcorders. In the CCTV field, however, digital recording today invariably means recording on hard disks similar to - but, as we shall see, not necessarily identical with - those used in office computer systems.

Key features: Digital Video Recorders vs. Network Video Recorders

Digital recorders are divided into two principal categories: Digital Video Recorders (or DVRs) and Network Video Recorders (or NVRs). These names are a little confusing because both DVRs and NVRs use digital recording, and DVRs are often connected to networks.

The difference is in the way that the cameras are connected to the recorder. In principle, with a DVR, the cameras are usually analogue types linked to the recorder by ordinary coaxial cables. With an NVR, however, the cameras are linked to the recorder by network connections.

In practice, many modern DVRs are hybrid types that can work with both analogue and networked cameras. It's also worth noting that it's perfectly possible to use analogue cameras with a true NVR, provided that the cameras are fitted with

Digital video recorders are ideal for small installations  
 Digital video recorders interface easily with legacy equipment
network interface modules. For delivering live and recorded pictures to one or more monitoring stations and for handling control functions, many DVRs and all NVRs can use a network connection.

As networked installations, at least in theory, offer lower installation costs and enhanced flexibility, the current trend is for systems to be increasingly designed around NVRs rather than DVRs. In fact, for the largest systems there may be little option, as DVRs are typically only available with up to 32 camera inputs, whereas NVRs can be configured to handle a much larger number of cameras.

However, because of their versatility, their convenience in small installations and their ability to interface more easily with legacy equipment, DVRs are sure to be around for a long while to come.

Digital video recorders - storage capacity

Another area of particular interest with all types of digital recorders is storage capacity. Undoubtedly the general trend, as the price per gigabyte of storage falls, is to provide more and more capacity, but there are a few pitfalls for the unwary.

The storage capacity in gigabytes of any particular recorder will be a known quantity, but what this actually means in terms of hours of images stored may be less well-defined, as many factors influence this figure. The frame rate of the recording is an obvious example - in round terms, halving the frame rate doubles the length of time for which images can be recorded on a disk of given capacity.

Effect of frame rate and picture resolution on storage capacity 

The frame rate chosen will obviously depend on the application. In an office or a retail outlet, for example, two frames per second (fps) may well be adequate, but in a casino where it's necessary to capture events lasting only a fraction of a second, live motion recording (25 fps) is likely to be needed. One point worth noting is that for systems that include audio recording, a frame rate of at least 12.5 fps will be needed to achieve lip-sync sound.

 The storage capacity in gigabytes of any particular recorder will be a known quantity, but what this actually means in terms of hours of images stored may be less well defined, as many factors influence this figure
Frame rate and picture resolution must be taken into consideration when deciding storage needs 
Picture resolution also directly affects the storage capacity needed. The lowest resolution in common use is CIF (352x288 pixels), but 2CIF (704x288), 4CIF (704x576) and D1 (720x576) are now specified increasingly often, and there is also considerable growth in the use of megapixel cameras that, as the name suggests, deliver even higher resolutions.


As a rough guide, CIF images recorded using MPEG-4 compression are around 10Kb, 4CIF images around 40Kb and megapixel images somewhere in the range 80 to 200Kb each. These figures are for a single frame.

It's easy to see that higher resolution images require much more storage capacity but, in a real installation things may not be quite so straightforward. There is a tendency, for example, to use just a few megapixel cameras to cover large areas rather than a greater number of lower resolution cameras.

This is justified on the basis that the few megapixel cameras will capture as much if not more detail than the larger number of low-resolution cameras. Clearly, if this approach is adopted, it must be taken into account when calculating the storage capacity needed.

Image data: compression techniques

In all digital video recorders, image data is compressed before being written to the disk. Over the years, there have been numerous developments in compression techniques, and these are still continuing. Today, probably the most commonly used system is MPEG-4, although it is worth noting that this is not, in fact, a single system - MPEG-4 compression comes in many versions. MPEG-4 Part 10, for example, is better known as H.264 and is starting to find favour for applications involving high-resolution images.

While it's certainly not necessary to go into the technicalities and relative merits of the various compression systems, it is

 For a given system, applying more compression will undoubtedly provide a longer recording time for a particular size of hard disk, but it will also mean that more detail is lost from the recorded images

important to note one particular point: none of the systems are lossless. This means that, for a given system, applying more compression will undoubtedly provide a longer recording time for a particular size of hard disk, but it will also mean that more detail is lost from the recorded images.

This leads to an invaluable rule of thumb - if the recording capacity of a given digital video recorder seems too good to be true, it probably is, especially if the recorder also has an alluringly low price tag. The high capacity will almost certainly have been achieved by using excessive compression, which will inevitably mean poor playback quality.

Digital video recorders - hardware

Now let's move on to hardware. Until recently, the hard drive assemblies used in digital video recorders were virtually identical to those used in office PCs. Now, however, the best recorders use assemblies that are optimised for CCTV applications.

The key considerations for these optimised assemblies are reliability and thermal management. The hard drive systems for recorders will be designed with 24/7 operation in mind and also to run cool even if the recorder itself is shut away in a poorly ventilated enclosure, as so many of them are.

Reliability is, of course, a critical issue in CCTV recording. In the best of modern equipment this is often addressed by configuring the hard drives as a RAID (redundant array of inexpensive disks) system. However, there are several RAID configurations in common use, not all of which increase data security.

RAID 0 systems are often used to increase writing speed, so that images from more cameras can be recorded simultaneously or higher quality images can be recorded. RAID 0 systems don't provide any extra data security; for that, RAID 1 or RAID 5 systems are used. With RAID 1, all CCTV images are written to two disks. That doubles the number of disks needed, but it also means that if one disk fails, no images are lost because the copy on the other disk is still available.

RAID 5 is somewhat more complicated. Data for the images is divided - the technical word is ‘striped' - over several disks. The system also produces and stores additional parity data. If a disk fails, it can use this parity data to rebuild the images that would otherwise be lost. RAID 5 systems need fewer disks than RAID 1 systems, but they often have a lower writing speed. RAID configurations other than 0, 1 and 5 exist, but are rarely used in CCTV applications.

Removable storage for modern DVRs

Many recorders now also support removable storage, usually in the form of disk cassettes, which are also available in various RAID configurations. While these cassettes can be very useful when, for example, the police need to impound images, it's worth noting that they are inherently less secure than internal storage. It's a lot easier to make a disk cassette ‘disappear' than a whole digital video recorder!

 Digital video recording systems are developing very rapidly and it is, in fact, something of a challenge for manufacturers to keep up with the opportunities offered by emerging technologies

Next, let's take a look at making recordings available for external use, such as presentations in court. Most modern recorders will have facilities for transferring selected recordings to a DVD, and provision for recording to high-capacity, high-definition Blu-Ray disks is certain to appear in the very near future - Blu-Ray drives are already readily available for use with PCs.

Unfortunately, the high-technology solution is not always the one that's needed. The UK court system is notoriously slow to adopt new technology and even now few courts have facilities for using video recordings in any format other than on VHS tape! For this reason, it may be necessary to look at digital recorders that support this obsolescent legacy format.

Finally, it's worth touching on the topic of video analytics. The increased processing power made available by modern computer chips is making it possible to implement very sophisticated image analysis systems that go far beyond mere motion detection. A good example is ‘left object' detection where the system can automatically pick out an extra object that has been left in the scene.

Features of this type can be used not only to generate real-time alerts but also to flag sections of a recording that merit closer inspection, thereby avoiding the need for operators to manually trawl through hours of images to find a particular event.

As we said at the outset, digital video recording systems are developing very rapidly and it is, in fact, something of a challenge for manufacturers to keep up with the opportunities offered by emerging technologies. Nevertheless, this article has hopefully highlighted some of the most important considerations for systems available today - and provided a few useful pointers for developments that can be expected in the near future.Jon Hill, Siemens Building Technologies Security Products


Jon Hill
Siemens Bulding Technologies, Security Products

Download PDF version Download PDF version

In case you missed it

How soon will access control cards become extinct and why?
How soon will access control cards become extinct and why?

Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why? 

Addressing the Internet Of Things (IoT) and challenges in device design using a comprehensive approach
Addressing the Internet Of Things (IoT) and challenges in device design using a comprehensive approach

As the number of connected devices increases worldwide, the ways that they are being used, designed, and tested have also expanded. The rise of connected devices is demanding engineers to harness the power of the internet of things, which is expected to hit 28 billion by 2025. A comprehensive approach to device design is needed more than ever to address the challenges that this rapid growth will bring. Why engineers should be using IoT technology in product design The demand for devices designed to use the Internet of Things (IoT) technology is increasing as more industries are finding expanded ways to put them into use. Industries such as healthcare, automobiles, and agriculture are becoming more dependent on cloud capabilities and are therefore in need of new devices able to connect to it. Due to this rise in demand, an increasing amount of devices are delivering a multitude of benefits both to consumers and companies. However, this new wave of products has led to a growing list of challenges for engineers as they are forced to address IoT tech in regards to connectivity, regulations, longevity, and security. Ways to use IoT in the development process Engineers are facing these new challenges along with the normal pressure of deadlines and test considerations. By approaching all of these issues from a comprehensive point-of-view, the solutions become clearer and new device capabilities can be born. Let’s look at the challenges individually as well as possible solutions for them. Improving connectivity IoT enables data to be transferred between infrastructure, the cloud, and devices, making the process smooth  Because IoT is based around connection, it’s no surprise that the primary challenge for engineers to overcome is the improvement of connectivity between devices. IoT enables data to be transferred between infrastructure, the cloud, and devices, so making this process as smooth as possible is crucial. The main challenges involved with connectivity have to do with development and product testing while meeting industry standards and best practices. Additionally, many companies lack the necessary equipment and technology to develop new IoT devices, which makes it difficult to create scalable prototypes and test new products. Suggested solutions To address the issue of not having the expertise and necessary tools for testing, we suggest outsourcing the prototyping and evaluation process instead of attempting to tackle this in-house. By doing this, you’re able to free up resources that would otherwise be needed for expensive equipment and qualified staff. Helping comply with regulations When working with devices that are connected across the world, there is a complex web of regulations and conformance standards that can lead to challenges for engineers. The necessity of complying with these regulations while also pushing to meet deadlines can be burdensome and lead to an increase in production time and expenses. Failure to comply with global and regional laws, as well as system and carrier requirements, can lead to fines and costly setbacks. This type of failure can destroy a company’s reputation on top of causing financial losses, often leading to the loss of business. Suggested solutions By testing the IoT device design and components early, engineers can address any pre-compliance issues that may arise. During the early stages of development, we suggest using scalable and automated test systems readily available in the marketplace. Improved communication with other devices New challenges arise as new devices hit the market and existing technologies are redesigned to offer a better experience In the rapidly growing number of connected devices, new challenges will arise as new devices hit the market and existing technologies are redesigned to offer a better user experience. This rapid growth in devices will lead to congested networks leading to the necessity of devices being able to function in the midst of increased traffic and interference. Failure to do this will lead to delayed responses which could prove to be fatal. Suggested solutions The best solution for this issue is found in the evaluation process and supporting test methods that the Institute of Electrical and Electronics Engineers (IEEE) published in the American National Standard for Evaluation of Wireless Coexistence (ANSI). This process addresses the interconnectivity issues present in radio frequency environments. The outlined process involves defining the environment and evaluating the wireless performance of the equipment through thorough testing. An in-depth version can be found in its entirety online. Increasing the longevity of devices IoT devices are being used in vital industries such as healthcare and automotive so battery life and power consumption are two challenges that engineers must take seriously. A failure in this area could potentially lead to loss of life or safety concerns on the road. As new firmware and software are being designed to address these factors, engineers must be implementing them into IoT devices with the ability to be continually updated. Suggested solutions Longevity should be addressed in all aspects of the design process and tested thoroughly using a wide range of currents. By doing this, an engineer can simulate consumer applications to best predict performance. Security Security and privacy are concerns with any technology, but with the use of IoT in medical devices, it’s paramount Security has been a controversial issue for IoT since its inception. Security and privacy are concerns with any technology, but with the widespread use of IoT in medical devices, smart home appliances, and access control and surveillance, it’s paramount. For example, medical devices may store information about health parameters, medications, and prescriber information. In some cases, these devices may be controlled by an app, such as a smart pacemaker, to prevent heart arrhythmias. Naturally, a security issue in these devices could be devastating. Another example of dangerous security concern is with surveillance cameras and access control, such as for home or business security systems. These intelligent door locking systems contain locks, lock access controllers, and associated devices that communicate with each other. Suspicious activities are flagged with alerts and notifications, but if a hacker gains access, it can lead to real-world, physical danger. Security design points Here are some key points for security design: Physical security: IoT devices may be in external, isolated locations that are vulnerable to attack from not only hackers but by human contact. Embedding security protection on every IoT device is expensive, but it’s important for general security and data safety. Security of data exchange: Data protection is also important because data gets transmitted from IoT devices to the gateway, then onto the cloud. With surveillance and access control information or sensitive medical information, and encryption is vital to protecting data from a breach. Cloud storage security: Similar to data exchange, the information stored in medical devices, surveillance and access control systems, and some smart appliances with payment features, must be protected. This includes encryption and device authentication through access control, which can police what resources can be accessed and used. Update: Security vulnerabilities will always occur, so the key to addressing them is having a plan to address errors and release patches. Customers should also have options to secure devices quickly and effectively. Suggested solutions Engineers can include security and protection into IoT devices with early and perpetual testing throughout the design process. Most security breaches occur at endpoints or during updates, giving engineers a starting point for how to address them. Creating more secure devices Ensuring the security of connected devices should be of supreme importance for engineers as these devices are vulnerable to security breaches. The ultimate security of devices goes beyond the scope of engineering as the network and enterprise levels must also be secure to protect against potential threats. However, engineers play a role in this protection as well and should consider device security in the design process. Suggested solutions On a device level, engineers can help protect IoT devices from vulnerabilities by implementing early testing and continuing it throughout the design process. Most security transgressions occur at endpoints so this continual testing can, and should, create barriers to breaches. Regulations and compliance For IoT engineers, the complex web of regulations and compliance standards present new challenges Regulations and compliance surrounding data and technology are nothing new, but for IoT engineers, the complex web of regulations and compliance standards present new challenges. Engineers are already addressing obstacles in security and connectivity, all while meeting deadlines, and working around regulations adds time and expense to the process. Unfortunately, a failure to comply with global, regional, or local laws can lead to setbacks and fines. In addition to time lost in production and possible fines, the damage to a company’s reputation can lead to even more losses. Suggested solutions Compliance should be considered early and often in the design process. In the early stages of development, the IoT device or components can be tested to address and compliance issues. If possible, use a scalable and automated test system. The comprehensive solution As we stare at an uncertain future full of possibilities, it’s clear to see that new challenges will continue to be presented as technology evolves and new innovative devices are designed by engineers. By addressing these issues early and often, solutions can be implemented and problems prevented before they even have a chance to occur thanks to sound engineering and solid design.

Everbridge provides the critical event management platform to help organisations manage the full lifecycle of a crisis
Everbridge provides the critical event management platform to help organisations manage the full lifecycle of a crisis

The UK Government is consulting on plans to introduce a new law requiring operators of public spaces to consider the risk of a terrorist attack and take proportionate and reasonable measures to prepare for and protect the public from such an attack. Under the proposals outlined in the consultation document, those responsible for a publicly accessible location will have a ‘protect duty.’ The protect duty would apply to certain publicly accessible locations, widely defined as ‘any place to which the public or any section of the public has access, on payment or otherwise, as of right or by virtue of express or implied permission.’ Publicly accessible locations Publicly accessible locations include a wide variety of everyday locations such as: Sports stadiums, festivals and music venues, hotels, public houses, clubs, bars, casinos, high streets, retail stores, shopping centres, markets, schools, universities, medical centres, hospitals, places of worship, government offices, job centres, transport hubs, parks, beaches, public squares, other open spaces. This list is by no means exhaustive, but it does demonstrate the diverse nature of publicly accessible locations. To manage these challenges, some organisations are relying on guarding and manual solutions or processes Organisations responsible for publicly accessible locations have many challenges they need to overcome while at the same time ensuring that safety and security is visible, yet non-intrusive. To manage these challenges, some organisations are relying on guarding and manual solutions or processes, whereas other organisations have invested heavily in diverse security technologies: CCTV, access control, intruder alarms, fire detection, intercoms and more. Managing public safety Effectively managing public safety and security is difficult and can be costly. Potential liabilities are something to seriously consider, based on forthcoming regulation and prevailing public expectations. When a critical event unfolds public reactions can be difficult to safely manage, however this is now a must do. Public space operators need to get the right information to the right people at the right time to protect all people, including every single member of the public. Their work with public and private sector clients around the world has enabled them to understand ‘protecting the public’ challenges and offer solutions that meet the specific requirements. Public space operators and organisations must keep track of all emerging threats and assess the potential impacts of when, not if, they will experience a critical event. Unpredictable threat environment Security executives have the challenge of protecting people, facilities and assets With an increasingly complex and unpredictable threat environment, it has never been more imperative to act faster. With more complete intelligence, organisations can increase their speed and decisiveness to assess risks and prevent those risks from harming people or disrupting operations. Leisure and entertainment is a prominent UK industry, that is also one of the most vulnerable to safety and security threats. Security executives have the challenge of protecting people, facilities and assets, while also maintaining friendly and welcoming services to visitors. Public venues and retailers must provide non-intrusive client safety and security. For the would-be criminal, safety and security provision should be a visible deterrent. Balancing these needs is where Everbridge can help organisations. Everbridge provides the critical event management platform to help organisations manage the full lifecycle of a crisis. Facilitating device activation Their platform correlates events from disparate safety and security systems into a common operating picture to focus people’s attention on what really matters. The platform provides users with actionable alerts, next step actions, and automated reporting to better manage risks, ensure compliance with operating procedures and support the business continuity. Automated workflows ensure rapid, consistent responses, reducing the risk of human error Automated workflows ensure rapid, consistent responses, reducing the risk of human error. It also facilitates device activation to ensure they are always in operational control and protecting the people. Dynamic reports and dashboards provide real-time actionable insights for the operations teams and senior executives. Benefits include: Real-time situational awareness. Reduces risk. Accelerates response times. Avoids technology lock-ins. Prevents information overload. Keeps stakeholders informed. With Everbridge, the organisation can deliver the public protect duty. Now and in the future.