Government Security
Network Security Resources

Jump to content


Monitoring Of Storage Three Pattern

- - - - - security networking server network advanced cache distributed
  • Please log in to reply
1 reply to this topic

#1 iacemomo


    Private First Class

  • Members
  • 54 posts

Posted 07 August 2012 - 01:11 AM

Monitoring of storage three pattern
First, the front-end storage pattern
The so-called front-end storage, built-in storage unit in the IP video monitoring system, front-end equipment (such as network video encoder or network camera) directly by the front-end equipment to complete the local recording monitor image and save.
Front-end storage has several advantages: First, through the deployment of distributed storage, to relieve the capacity of the pressure brought about by the centralized storage; can effectively alleviate the pressure of centralized storage network traffic; avoided centralized storage in The image is lost when the network failure.
Large ones due to a single front-end coding equipment are usually carried by monitoring points for front-end storage, not the storage time is not long, so the storage capacity do not ask, IP camera generally use CF card or SD card, video servers for general use built-in hard drive . This is compared with the previous stand-alone store, basically no difference.
With the previous stand-alone storage is essentially different, in order to ensure the flexibility and convenience of the user access to all front-end storage in the network video surveillance systems in addition to be able to provide point-to-point stand-alone access, but also through a unified The interface provides centralized sharing of all content. To this end, the IP video monitoring system through the central business platform for all front-end storage management and scheduling, and network storage space and storage content. In this way, users can either log in directly on-demand playback of video data of a single front-end equipment can also be unified Center business platform for the centralized retrieval and playback of all front-end video information.
Second, the center storage pattern
Deployed in the network video surveillance system is the central storage. Monitor front-end equipment acquisition point image compression coding processing into a digital surveillance stream, and then sent to the central business platform through the network from a central service platform will stream distributed network video recording unit for centralized storage.
Many large-scale video surveillance networking applications can be multi-level distribution center storage, sub-center storage, so that on the one hand can reduce the pressure of the storage capacity of a central point centralized storage and network traffic, on the one hand greatly enhance the reliability of the system.
Use the center / sub-center stores, has obvious advantages: First, retrieve and call recording resources is more convenient for users, in the following areas; the integrity of the stored content is easier to ensure a front-end equipment will not theft or damage caused by the loss of important content; reasonable resource scheduling, storage space for the front-end equipment according to need, thereby saving resources; Fourth, the development of a variety of storage strategies to meet the individual needs of users ; five easy maintenance, easy centralized detection and timely investigation.
Large ones for monitoring point less storage time requirements of the applications, the center / sub-center storage can be used this relatively simple way to deploy server plug hard disk or external disk cabinet, known as DAS (Direct Access Storage), and The standalone similar. With the advantages of network video surveillance is widely recognized, and now began to appear more and more large and even very large video surveillance system, such as the social aspects of security monitoring systems in the construction of the "Green City", China Telecom and China Netcom is continuing to "Global Eye" and "wide horizon" of these two carrier-class video surveillance system, these monitoring systems are faced with the demand for centralized storage of large-scale access and high-capacity front-end equipment. The previous stand-alone storage can not meet the flexibility to expand system capacity needs of the application, must adopt a more advanced network storage devices and storage technology, a typical SAN, NAS, and iSCSI.
SAN (Storage Area Network) originated in the last century the late nineties, and DAS, SAN based on Fibre Channel technology, servers and storage arrays through the Fibre Channel switch connected to form a LAN dedicated to data storage. SAN using network-oriented storage structure, the separation of data processing and data storage, easy to expand storage space, flexible addressing long-distance transmission of data, the I / O performance and utilization of higher storage device characteristics, is a new storage architecture.
Specialized Fibre Channel protocol and SAN based on the interconnection of servers and storage arrays, NAS (network access storage) IP-based network, using TCP / IP protocol for communication and data transfer, file-level I / O modes.
In contrast, NAS equipment installation, commissioning, use and management, deployment costs are relatively low.
iSCSI is a new IETF standard protocol for SCSI block data over IP networks, converted into a transfer standard for network packets, like it and NAS through the IP network to transmit data, but in the way of data access , and NAS and SAN BlockProtocol agreement. Thus, the value of iSCSI to the user is: First, iSCSI enables SCSI data packets in an Ethernet network transmission possible, the SAN to get rid of the expensive fiber-optic network, the original function can be realized through an IP network, both to reduce management complexity and reduce costs; Second, due to the complexity of the user's application requirements, often simultaneous deployment of both SAN and NAS storage networking and iSCSI you can both integrate.
iSCSI, these features are very fit now, the video surveillance status and direction, especially in the field of carrier-class video surveillance, storage scale and high input, based on the current mature IP network center / sub-centers of the storage system build, iSCSI technology is undoubtedly a good reference.
Third, the application storage pattern
Video surveillance systems often used in storage networking architecture DAS, NAS, SAN, and IP-SAN storage device types are often used in SCSI Disk Array, Fibre Channel and iSCSI devices. The maturity of the technology of these devices, simple structure, the implementation is also very convenient to install. However, these devices have a common drawback is the storage device in a video surveillance system can only play a simple data storage capabilities, and can not be replaced by the server to run specific applications, video surveillance systems still need a dedicated server.
In fact, with the rapid development of chip technology, computation and processing speed of the CPU or a dedicated ASIC chip has doubled and redoubled, and the overall price of storage devices continue to reduce. For equipment replacement considerations in equipment selection and purchase, the user generally will choose a slightly higher level of storage devices. Furthermore, the relatively small price difference to the user when the investment is sufficient. Thus, in many applications, the user purchasing storage equipment performance are often higher than the real needs of actual business systems, and even exceeded several times.
In a number of small and medium-sized video surveillance system, the system performance bottlenecks often occur in the video server instead of the storage device side, the storage device can provide bandwidth video surveillance of the actual total bandwidth of twice or three times, IOPS is the actual demand 3 to 5 times. The storage device controller for a long time in the semi-load state, a large number of high-performance resources being wasted. Are generally designed for the protection of the controller part of the high-availability, efficiency, stability and security, storage devices, and use a dedicated processor and cache, its technical parameters and performance were higher than normal PC server. In order to effectively use the storage of surplus resources can be embedded in the special features of the application software in the controller part of the storage device, storage devices, not only for the system to provide data storage server, but also provide some software application server, storage devices known as application storage.

#2 infiltrator


    Staff Sergeant

  • Sergeant Major
  • 421 posts

Posted 07 August 2012 - 04:44 PM

You should have formatted the text a bit better, to make it easy for everyone to read. Apart from that, its all good, thanks for sharing.

Also tagged with one or more of these keywords: security, networking, server, network, advanced, cache, distributed