What do users want from their surveillance system? Ask any security professional, and you will hear answers like these: sharp, high quality images; widespread camera coverage; real-time analytics; fast search and retrieval of video footage with minimal, if any, intervention from people in the information technology department.

In other words, they want the tools they need to do their job. Delivering those tools requires an underlying technology infrastructure that includes a storage file system—preferably, one designed for video applications.

How do you know if one storage solution is better suited for video than another? What makes a file system ideal for video applications? There are several factors to think about.

Optimising for write operations

What type of work do you expect the storage system to perform? It’s important to know because some systems are designed to handle certain types of work better than others.

Traditional information technology (IT) workloads consist of high volumes of transactions. Files are written to disk and then many read operations are performed. File systems that are optimised for read operations perform well for this type of workload, but they are not ideal for surveillance systems.

Surveillance workloads are different from typical transaction-based workloads. Streaming video and sensor data, from a network of hundreds or even thousands of multifunction cameras, flows continuously. Video management software (VMS) is used to manage the process—from image acquisition through visualisation, analysis, and storage—while performing real-time analytics and metadata generation.

According to IHS, adoption of network cameras is moving quickly, and unit shipments of HD cameras are increasing

In storage terms, that means the file system should be optimised for write operations, not read operations. To perform well, the file system must be capable of ingesting streaming video from many cameras concurrently and performing simultaneous write operations without creating input/output bottlenecks.

Multiple tiers of video storage

How much storage capacity is needed to support a surveillance system? It depends on how many cameras are installed, what type of cameras they are, and how long the video must be retained.

High-definition (HD) cameras require more storage than analogue cameras. Thanks to dropping camera prices, more organisations are replacing older cameras with digital units and expanding their surveillance coverage. According to IHS, adoption of network cameras is moving quickly, and unit shipments of HD cameras are increasing. By the time we reach 2019, according to IHS, 2.5 exabytes of surveillance data will be produced every day.

Since storage costs can account for as much as 60% of the budget for a surveillance system, the storage configuration must balance capacity, performance, and cost. That’s best accomplished by implementing multiple tiers of storage where older video files can be stored on a lower cost medium such as tape. The way files are managed between tiers, however, can make a big difference when working with video.

Managing video data storage

What method does the file system use to manage data and storage? The advantage of a multi-tier storage architecture is that you can make better use of high-performance disk by moving older files off to tape, lowering your storage costs, but still be able to retrieve them later if needed.

Many information technology-centric storage solutions use a process called information lifecycle management (ILM) to manage data and storage. With ILM, usage policies are created for files. When the policy conditions are met, the file is moved to another tier of storage using an archive or data mover application.

Since storage costs can account for as much as 60% of the budget for a surveillance system, the storage configuration must balance capacity, performance, and cost
Thanks to dropping camera prices, more organisations are replacing older cameras with digital units and expanding their surveillance coverage

This process is not ideal when working with video. High-resolution cameras generate large files. When ILM policy conditions are met, the video files are copied across the same ingest network to another tier, which impacts system performance. To lessen the impact, the data often is saved to a lower resolution (a process called grooming) before it is moved.

Using the ILM method, if a file resides on archive storage, it must be restored back to the VMS system before it can be searched. That adds complexity and time. Plus, if the file has been groomed, the image quality is not as clear and sharp because of the lower resolution.

File systems for video surveillance

When security professionals need to access recorded video, they want an easy way to search, find, and view it at the highest image quality possible, regardless of where the files are stored. Working in the timeline is important to security professionals. They want to perform their job from within the VMS application, not bounce between the VMS and an archive or data mover application to restore files.

Using the ILM method, if a file resides on archive storage, it must be restored back to the VMS system before it can be searched

File systems designed specifically for video applications meet these criteria. Like ILM, multiple tiers of storage are incorporated, and usage policies dictate when files are moved between tiers. The method used to manage data and storage, however, is better suited for video files.

These file systems can write multiple copies of the files at the same time. For example, when a file is written to disk it is simultaneously written to a tape device residing on a separate network. That way, when the usage policy is met, the data doesn’t need to be groomed and copied across the ingest network; the copy already resides on tape, so the storage management software just releases the blocks on disk, avoiding any performance issues.

Choosing file systems for video performance

In addition, file systems designed for video applications are integrated with the VMS software and don’t require a separate archive or data mover application to move files between tiers. From the user’s perspective, they see one drive letter—a single name space—that represents all storage, instead of separate drive letters for each tier. That makes searching files easier. Plus, if the file that a user wants resides on tape, it doesn’t have to be restored before it can be searched. The user works within the VMS system without worrying about where the file is located, and the storage management software does the rest.

Evaluating a file system to determine if it will perform well for video applications requires digging into the details. You need to examine the architecture and understand how the file system operates – but the results are worth the effort.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

Author profile

Wayne Arvidson Vice President, Strategic Alliances, Pivot3, Inc.

Wayne Arvidson is Vice President, Strategic Alliances at Pivot3 where he is responsible for managing the company’s key technology partnerships and identifying emerging players in the market. He has vast experience on best practices for video management, and is helping to drive industry transformation by educating the market on the role hyperconverged platforms can play as the foundation of a safe and smart infrastructure. He sits on the Security Industry Association’s International Relations and Government Affairs Committees, Working Groups on Body-Worn Video Technology and Homeland Security. He is also a member of the International Association of Chiefs of Police where he is active with the Law Enforcement Information Management group.

In case you missed it

How intelligent video surveillance supports smart mobility
How intelligent video surveillance supports smart mobility

The ease of getting from point A to point B, the effective movement of goods and services, and the flexibility and integration of various modes of transportation are key aspects of mobility today. Smart Mobility has been a key theme in the transportation industry for a while. The idea is to keep traffic flowing and help people to get where they need to be, in a smarter way. To this end, industry players are now innovating and introducing advanced technologies and solutions. Examples include intelligent traffic management systems, free-flow tolls, autonomous driving, smart location solutions, and more. At the same time, traffic congestion, aging infrastructure, rapid urbanisation, and increasing sustainability demands are also intensifying the need for smart mobility solutions. One way to overcome these obstacles is to use intelligent video surveillance technology for improved traffic management, making the roads safer and more efficient for every user, while also reducing emissions. Perceptive intersections Relying on intelligent video analytics, traffic video cameras identify traffic build ups at intersections by counting numbers of vehicles crossing an intersection and detecting their speed, while also counting the number of vehicles queueing in real-time. Aggregated data informs the system when to switch traffic lights to red or green. Intelligent optimisation for traffic signals ensures more effective traffic flow.Aggregated data informs the system when to switch traffic lights to red or green The benefits? Improved safety on the roadways; intersection reconstruction can be avoided; drivers can be advised about the speed of their route, forecasted by traffic signals; reduced wait times and stress for commuters; reduction of harmful emissions; and positive impact on public satisfaction. Road safety Traffic incidents can be disastrous, not merely for causing congestion on the roads but sometimes far worse – resulting in injuries and even fatalities. These incidents have many causes, not the least of which is drivers willfully violating traffic laws. Video technology can aid in detecting all kinds of events – for example, illegal parking, running a red light, wrong-way driving, speeding, and making illegal U-turns can all be detected by smart camera technology. By using deep learning technology, cameras can recognise these events and traffic authorities can be immediately notified and take necessary actions even before traffic incidents occur. Scenarios include stopping a driver who is occupying an emergency lane, or notifying a driver who parked their car illegally. Furthermore, ticketing systems can be incorporated to further regulate driving behaviors. Benefits here include incident prevention, better driver performance, and increased safety on the roads and streets, to name just a few. Scenarios include stopping a driver who is occupying an emergency lane, or notifying a driver who parked their car illegally Public information Sharing information is key to keeping city drivers and travelers informed. Intelligent communication about warnings and updates helps everyone save time, avoid frustration, and simplify everyday mobility. This can be done via traffic guidance screens displayed at highly visible locationsThis can be done via traffic guidance screens displayed at highly visible locations, such as congested areas, transportation hubs, shopping malls, and city plazas – or even at your fingertips on your favorite mobile apps! Traffic video cameras generate real-time data of traffic flow and incidents, sending it to a central platform to further fuse with data from third-party systems such as radar and GPS systems. They also disseminate traffic information, including traffic status, warning and advisory notices, as well as parking status.  The benefits are improved public awareness of traffic information, improved travel convenience, overall enhancement of mobility in the city, and more. The Hikvision practice Hikvision has accumulated sophisticated experience in traffic management both at home and abroad. Product lines offer versatile solutions to resolve multitudes of problems in urban traffic management, traffic incident management, highway management, and more. Going deeper, it’s essential to note that efficient signal control management is dependent on the quality of traffic data, system algorithms, and the hardware devices in use; it is also closely related to the mobile environment, such as road conditions, historical traffic conditions, and urban infrastructure. Because of this, no single solution solves traffic congestion everywhere. Hikvision believes that only by working closely with city authorities, public safety organisations, consultants, even academia and other relevant stakeholders, can applications and operational processes be developed to achieve the best possible outcomes. The possibilities for traffic video data are endless, especially now that it can employ artificial intelligence for advanced functionality. Harnessing its power will make all the difference, but the ultimate goal remains the same: safe and smooth traffic, smart mobility, and improved quality of human life.

What impact are data analytics having on security?
What impact are data analytics having on security?

We live in an era of Big Data. Surrounded by a flood of information, more companies are looking for ways to analyse that information (data) and systematically extract intelligence that can help them operate more efficiently and profitably. The data obsession has extended to the physical security industry, too, where large amounts of data have historically been a little-used byproduct of our access control and even video systems. But the picture is changing. We asked this week's Expert Panel Roundtable: What impact are data analytics having on the security market?

Embracing digital transformation in the security industry
Embracing digital transformation in the security industry

Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change programme, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programmes continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security  The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with access As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessto valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence  The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasise the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programmes. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programmes.