|
How to choose the right monitor storage mode
|
Posted: August 12, 2014 |
Online file backup storage market is divided into two kinds Sharing and collaboration, online file storage market is currently in the development phase. Cloud storage industry chain, including upstream of the underlying storage services vendors, end-users of telecommunications service providers and midstream IDC file storage service providers, distributors and downstream. Among them, the online file storage for collaborative teams, upstream storage service vendors and telecom service providers operating expenses IDC constitute a major operating cost (part of a collaborative cloud storage service online file storage team will hire a collaborative online file storage, further reducing operating costs), due to the collaborative online file storage and more for premium services, storage and bandwidth costs can be effectively covered. From the point of view of social effects, cloud storage, cloud computing is to enhance the core management capabilities, with intensive nature, facilitate centralized management, lower social costs. For SMEs, via cloud computing or cloud storage and large enterprises can stand on the same starting line in information technology, cloud computing, centralized management of information technology can greatly reduce the cost of individual SMEs. Currently, security is still the biggest obstacle facing the development of cloud storage, most users psychologically cloud storage security concerns still exist. In this regard, in addition to the constant improvement of technology, government-driven certification will also help to enhance recognition and cloud storage market space. In the security industry, the video surveillance storage is also changing with the arrival of the network, from the beginning of the analog surveillance cameras connected to DVR directly stored, and later a network-based monitoring systems or stored in third-party servers, digital storage process is such changing. And these changes is nothing more than the advent of the era of digital surveillance, based NVR PC mode change storage mode, the video image edge storage and cloud storage will become an important trend.
NVR can be based on PC architecture or embedded systems, depending on the architecture you can choose Windows or Linux storage technology. This allows the system integrator or end user to choose the most suitable storage system according to the needs and budget. NVR has scalability, NVR storage also have such features, it can be tailored to the exclusive storage performance monitoring system based on actual needs. Even redundant technology can also be a perfect interpretation of all the recorded data will be lost. However, in many cases, real-time video NVR will not record. For example, surveillance cameras do not support the front-end intelligent capture, you need to transfer videos to the back-end device, which is most of the monitoring system problems to be faced. Or problems occur during transmission because of many reasons the system failure, network. If you achieve a more optimized storage solution, which can effectively prevent this problem from occurring.
Ethernet networks edge storage edge recording instead of the entire transmission network dataset to the image processing NVR the marginalization. Essentially, the concept is dispersed storage, data and device isolation. Its working principle is the recorded video information is stored directly to the device, such as a support network surveillance cameras SD card storage, or built-in mini hard drives flash memory. Advanced storage architecture brings the possibility of another monitor of choice. By supporting low bandwidth monitoring and high-quality local video, users can optimize bandwidth limitations, still get high quality video information for a detailed incident investigation. The three main benefits of edge storage is: decentralized storage, redundancy and low bandwidth. Scattered-site server storage solution pressure, reducing the cost of recording video NVR or PC required. It can start when dispersed storage network surveillance cameras and back-end server off the network, thus reducing the problems caused by the fault, the transfer of video storage path. But some people think that this storage method is not reliable. Because the network surveillance cameras easily stolen, if all of the recordings are stored in the front-end, which means the loss of all important audio and video files. In addition, depending on the SD card capacity and recording settings, video capture or video if you can only keep seven days or less, which does not comply with the relevant provisions of the current monitoring and management. In addition, the front-end storage SD card reader is hard to find work schedule and equipment status, end users do not know the life of the SD card, whether the video will be recorded and can not be viewed in real time. Another disadvantage includes not able to view the video recording from a network surveillance cameras, if the network interrupts can not be recorded by one central server to control the video, and integration with third-party settlement of the conflict faced, so to some more harm than good. More importantly, if the surveillance camera to be multiple calls to the same period of the video image, the retrieval process is more complex, the need to view each location point.
Cloud storage is usually provided in the form of monitoring services to users, this service allows users to reduce investment in back-end hardware interrupt devices, since these audio and video data to be recorded will be stored in the service provider there. Cloud storage is purchased based service, paid regularly to the video service provider. Alternatively, the user investment and network surveillance cameras to reduce the cost of storage and maintenance of equipment provided by the outsourcing project. However, the views of cloud storage will also appear divided. Although the low initial investment and low maintenance characteristics have attracted a lot of families and smaller businesses, many of the security industry insiders believe that cloud storage is more suited to smaller, less demanding security applications. Cloud storage more popular home security users and small business users, as it provides a more flexible remote management. But its organizational structure in security, data management and bandwidth challenges remain is not a small problem. In the shade of image data storage management, the introduction of third-party cloud storage dangers remain. Cloud storage is high network bandwidth requirements, especially when end-users need full HD real-time monitoring and recording, for such a request, each camera needs more than 20Mbps data transfer, even if the network can support the transfer of image data to 1Gbps, only maintain the transmission capacity of 600 to 700Mbps, so the potential end-users in the cloud storage is limited to a maximum of 35 sets of surveillance cameras, which still require special network under the circumstances, bandwidth is not under any restrictions ideal value. Cloud storage on the one hand to solve the difficult problem of storage, but also brought to the privacy leakage problem, cloud storage is an emerging information storage solutions, users can move the terminal, such as smart phones, tablet PCs, etc., anytime, anywhere photographs and video transmission over the network cloud storage tray, place in other networks, you can very easily retrieve photos by page or a computer client. But the attendant problem is that users are able to upload all of the information is not stored encrypted, for this part of the file is not encrypted, the administrator can view and delete from the service side of the platform. This with the "initiative" management model, once the administrator guilty of professional misconduct occurs, it may result in serious consequences. Internationally there are three modes for network privacy protection, the first one is the typical American industry self-regulation model, its core philosophy is: industry self-regulation, reduce legal restrictions, to encourage and promote the development of the Internet industry, reduce network service Manufacturers of pressure; second is the technical protection mode, the user privacy to the user's own hopes, to protect themselves through some privacy software; third is the Legislation of the model to the European Union, represented by the State through legislation advocated the basic principles established online privacy protection from the law and the specific legal provisions, institutions, and the establishment of appropriate judicial or administrative remedies on this basis.
|
|
|
| Posted By: | ShenZhen Apexis Electronic Co.,Ltd | Description: | Apexis is a high-tech company specializing in manufacturing ip cameras.supply ip camera,network camera,surveillance camera,wireless ip camera,wireless webcam,security ip camera,wifi ip camera,mini ip camera,poe ip camera,box ip camera,ptz ip came... | Phone: | 86-755-26509025 | City: | Shenzhen, China | Website: | http://www.apexis.cc | |
|
|
|