Digital Video Part 2
Digital Video Part 2
Brought to You by
Part 2 of 4
JULY 2004 www.securitysales.com A1
Part 2 of 4
Essentials of
AT A GLANCE
Video images require a lot of storage space
nyone who has lived at the same location for more than five years can relate to this statement: Too much stuff and not enough room. This holds true for video as well. Welcome to the second chapter in the four-part Digital Video for D.U.M.I.E.S. series (see page A2 of the March issue for Part 1 of the series, Essentials of Digital Video Compression). D.U.M.I.E.S. stands for dealers, users, managers, installers, engineers and salespeople. This installment, brought to you by Honeywell, explains the different methods of storing digital information and explores emerging authentication techniques.
IP-based systems use network attached storage and storage area networks
A2
As an example, let us calculate the file size of a 640 X 480 image with a 24-bit depth: 640 X 480 X 24 = 7,372,800 / 8 = 921,600 / 1024 = 900K Lets go one step further and determine the amount of storage for this example for just 1 second, which consists of 30 images: 1 second of uncompressed video = 900K X 30 Storage required = 27MB /second This example surely explains the need for video compression as explored in Part 1 of this series. With that explained, we can now move on to the many different forms of storage incorporated throughout the industry. (Note: The listing is alphanumerical and does not indicate the authors choice or preference.)
Write A
Tape
in standard videocassette recorders. For this reason, it is generally only used in environments where high capacity is the primary requirement. The tape in a helical scan system is pulled from a two-reel cartridge and wrapped halfway around a cylindrical drum containing two read heads and two write heads, arranged alternately. The read heads verify the data written by the write heads. The cylinder head is tilted slightly in relation to the tape, and spins at 2,000 rpm. Short diagonal tracks are written across the width of the tape, about eight-times longer than the width, and contain about 128KB of data with error correction. DAT tapes are available in two formats: DDS and DataDAT. The DDS protocol is the most common, and is represented by several standards, all of which are backward compatible. DAT is often used for archiving or backing up data with storage capacity of up to 40GB. However, because of the wide wrap angle of the tape and the consequent degree of physical contact, both the head and the media are prone to wear and tear.
except the tape is 1/ 2-inch wide and the DLT drives offer a faster data transfer rate than other tape drive achieving rates of 2.5MBps. Today, we have the next generation of technology known as super digital linear tape (SDLT). With storage up 160GB (320 compressed) and data transfer speed in the 16MBps range, this form of storage offers an extremely cost-effective method for archiving large amounts of data for extended periods of time.
Actuator w/Read/Write Heads Disk-based solutions are typically better suited to backup and, particularly, recovery operations, whereas tape is extremely cost-effective for archiving.
man Co. of Newtown, Conn., more and more companies are turning to disk-based media for backup and recovery. In those settings, tape is used primarily as an archiving technology, and the amount of data that needs to be archived is growing rapidly. Disk-based solutions are typically better suited to backup and, particularly, recovery operations, whereas tape is extremely cost-effective for archiving. Moreover, an intermediate disk layer can provide a steadier stream of data to the tape drive, thus improving performance.
formation from it. The sliders are mounted onto arms, all of which are mechanically connected into a single assembly and positioned over the surface of the disk by the actuator. A logic board controls the activity of the other components and communicates with the rest of the digital recorder.
The advantages of DVDs are that they are not prone to the wear and tape noise that sometimes affects DAT and DLT storage units. However, they are limited in the amount of storage available per disc.
Disk 1 Write
Disk 1 Mirror
Disk mirroring is a technique in which data is written to two duplicate disks simultaneously. With this method, if one disk fails the system can automatically switch over to the other drive without causing any loss of recorded or retrieved video information.
You can connect as many as seven SCSI devices to the adapter, without the computers knowledge. The adapter keeps track of the data flow across the SCSI bus. Each device gets its own SCSI address. Each device can talk with the other SCSI devices across the bus, all independent from the computer, which, in a nutshell, means SCSI drives increase the operating speed and performance of a computing device. Which one is the right for you? IDE drives are less costly, and have a slower transfer rate and less flexibility (unable to expand above four drives in a system) than SCSI drives. SCSI drives, on the other hand, offer faster transfer speeds and greater system flexibility. However, all this comes with an increase in equipment costs. The bottom line is if you want it cheap and simple with good performance, use IDE drives. If you want maximum performance and flexibility and have the money to pay for it, then use SCSI.
on the application and degree of fault required for that application. Mirroring is a technique in which data is written to two duplicate disks simultaneously. With this method, if one disk fails the system can automat-
ically switch over to the other drive without causing any loss of recorded or retrieved video information. Striping is a method of combining multiple drives into a single logical storage unit. Striping involves parti-
Comeo
pres-
sed
Vid-
Info-
rma-
tion
Disk 1
Disk 2
Disk 3
Disk 4
Disk 1
Disk 2
ECC
ECC
Disk 1
Disk 2
Disk 3
Parity
Here we see three of the five common random array of independent disk (RAID) levels. In RAID-0 (top ), data is broken down into blocks and each block is written to a separate disk drive, resulting in higher data throughput. In RAID-2 (middle ), each piece of data has a hamming error correction code (ECC) word recorded on the ECC disks. When reading, the ECC verifies correct data or corrects single disk errors. In RAID-3 (bottom ) the data block is subdivided (striped) and written on the data disks. Stripe parity is generated during writing, recorded on the parity disk and checked on reads.
A5
tioning each drives storage area into stripes, which are then interleaved so the combined video storage consists of alternate stripes from each disk in the array. The more drives in the array, the more the average access time for the array approaches the worst-case single-drive access time. Synchronized spindles assure every drive in the array reaches its data at the same time. As mentioned, RAID-0 is not redundant, hence does not truly fit the RAID acronym. In Level 0, data is broken down into blocks and each block is written to a separate disk drive, resulting in higher data throughput. Since no redundant information is stored, performance is very good but the failure of any disk in the array results in data loss. RAID-1 provides redundancy by writing all data to two or more drives. The performance of a Level-1 array tends to be faster on reads and slower on writes compared to a single drive, but if either drive fails, no data is lost. The main disadvantage is that the cost per megabyte of storage is higher since one drive is used to store a duplicate of the data. This level is commonly referred to as mirroring. In RAID-2, each bit of data is written to a data disk drive. Each piece of data has a hamming error correction code (ECC) word recorded on the ECC disks. When reading, the ECC verifies correct data or corrects single disk errors. This form of RAID is intended for use with drives that do not have builtin error detection. All SCSI drives support built-in error detection, so this level is of little use when using them. In RAID-3, the data block is subdivided (striped) and written on the data disks. Stripe parity is generated during writing, recorded on the parity disk and checked on reads. Byte-level striping requires hardware support for efficient use. RAID-4 stripes data at a block level across several drives, with parity stored on one drive. The parity information allows recovery from the failure of any single drive. The performance of a Level-4 array is very good for reads (the
A6 www.securitysales.com JULY 2004
Storage
Storage
Storage
Storage Storage
SAN
LAN
NAS Device
Storage
Storage
Storage
Storage Storage
Network attached storage (NAS) is a data configuration or medium using storage devices that connect directly to a network. These devices are IP-addressable and be accessed by operators via a server that acts as a gateway to the video information. A storage area network (SAN) represents a way to separate the server and storage into two independently managed systems, thereby simplifying the complexity of the overall IT infrastructure.
same as Level 0). Writes, however, require parity data be updated each time. This slows small random writes, in particular, though large writes or sequential writes are fairly fast. Because only one drive in the array stores redundant data, the cost per megabyte of a Level-4 array can be fairly low. RAID-5, which stripes both data and parity information across three or more drives, is the most popular RAID level. It is similar to RAID-4 except that it exchanges the dedicated parity drive for a distributed parity algorithm, writing data and parity blocks across all the drives in the array. Fault tolerance is maintained by ensuring that the parity information for any given block of data is placed on a drive separate from those used to store the data itself.
addressable and be accessed by operators via a server that acts as a gateway to the video information. The advantage of NAS is the storage can be centralized, easily expanded and managed. Additional NAS boxes can be plugged into the network to handle an increased number of system operators as well as the need for increased storage. NAS deals with storage at the file level, and is utilized for general purpose file sharing. However, it does not address the problem of backup. A storage area network (SAN) represents a way to separate the server and storage into two independently managed systems, thereby simplifying the complexity of the overall IT infrastructure. SANs use special switches as a mechanism to connect the devices. These switches make it possible for devices to communicate with each other on a separate network, which offers
less crowding of a standard network. According to Framingham, Mass.headquartered research company International Data Corp. (IDC), SANs will account for 70 percent of all network storage by the end of this year. NAS provides a quick and easy way to add general-purpose, shareable storage space to users and groups, while SAN separates the server and storage into two systems, making the overall network infrastructure simpler. With all of this digitally stored information, more and more people are wondering how it can be protected from being altered in any way ( see sidebar below). Anyone who has used digital cameras and image software can appreciate this potential vulnerability. It does not require much training for anyone to have the capability to alter an image. Every photo software program offers features from removing red-eye to plac-
ing your photo anywhere in the world. This is a great tool for the photographic society; however, it can cause a great many problems in the security field. History has shown that recorded video information on standard VHS tape has been accepted by the court system as evidence. The alignment of the magnetic particle on the tape as well as the video signal equalization pulses embedded in the tape make it impossible to alter the tape without being noticed. The next installment of the Digital Video for D.U.M.I.E.S. series will discuss the parts and pieces of DVRs and their ever-increasing features. Look for it in the SSI s special September 2004 ASIS Show Issue.
Robert (Bob) Wimmer is president of Video Security Consultants and has more than 33 years of experience in CCTV. He has been a training consultant for several of the industrys leading CCTV manufacturers and other organizations. He has also written numerous articles on CCTV applications and advancing equipment technology.
o date, there have been no challenges of the digital video evidence that has been submitted and accepted in U.S. courts. However, this does not mean DVR manufacturers have forgotten or eliminated image authentication for their equipment. In order to satisfy the Daubert Criteria a legal ruling that states a judge must decide whether scientific evidence is relevant and reliable digital video authentication technology must demonstrate it conforms to recognized standards, and that error rates have been deemed acceptable by the scientific community. Since there are currently no standards for digital video authentication, FIPS-140-2 (Federal Information Processing Standard) certification for the signature software has been (in some circles) identified as a foundation for building the necessary acceptance. Efforts have also been made to define high-level guidelines by organizations such as the Law Enforcement and Emergency Services Video Association (LEVA), Scientific Working Group on Digital Evidence (SWGDE) and Scientific Working Group on Imaging Technology (SWGIT). Many of the manufacturers are incorporating these recommendations as well as suggestions from countries that have been subjected to court approvals. The main comment is that the image for evidence shall be original.That means special post-enhancement image programs could not be incorporated when using a video clip as evidence in a court of law.The other statements made included terms
such as write once, read many (WORM), check sum and digital watermarking: WORM a form of optical disk authentication technology that allows data to be written onto a disk just once. After that, the data is permanent and can only be read.There is no standard for WORM disks, which means they can only be read by the same type of drive that wrote them.This may hamper their acceptance in the DVR industry.WORM is also called CD-R. Check sum a method that analyzes the building blocks of a video image its pixels or picture elements.Once digitized,each pixel will be represented by a numeric value. After each row of pixels a count is made of the total value and this number is encoded and stored. Upon authentication, the numeric value is compared and if the values are different, it indicates that the image is no longer original. Some use a total of all pixel values, while some store each row of the recorded image. Digital watermarking a method in which information such as date/time or other verifications are inserted into a digital image file that identifies the files authenticity.The name comes from the faintly visible watermarks imprinted on stationery that identify the manufacturer of the stationery. The actual bits representing the watermark must be scattered throughout the file in such a way that they cannot be identified and manipulated.The digital watermark must be robust enough so that it can withstand normal changes to the file, such as reductions from lossy compression algorithms.
A7
Fusion is more than a standard DVR Series. It is an intelligent, world-class digital management system combining multiplexing, motion detection, audio, text insertion, mapping and remote notification into one extremely versatile, upgradeable unit.
8 to 32 camera units Capture rates up to 480 ips Live viewing up to 480 ips Multiplexed analog output Remote accessibility/notification Text insertion interface
With its advanced compression algorithms, fast capture rates and flexible GUI, Fusion is truly the next generation of DVR technology.
Display maps of facilities Smart Search Index Search Easy installation and operation
For more information on these and other Honeywell Video Systems products, please call our Sales Support Center at 1.800.796.CCTV. Reader Service Card No. 103
www.honeywellvideo.com