Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Getting the Low-down on High-end Digital Video

By John Mesenbrink
May 8, 2002
What constitutes high-end digital video? Campus settings, multiple networked sites, Fortune 1000 companies or government facilities could all fall under the “high-end” digital application. The Colorado-based, Loronix, associates low-end video with low frame rates and poor compression methods, whereas high-end video can activate an alarm on behavioral recognition, for example. Features such as frame rate, compression, storage and scalability are important.

“High-end applications will tend to require very large storage capacities, advanced networking capabilities and options available to support unique integration, such as audio and data capture,” says Carl Bracken, central region sales manager, Sanyo Security Products.

Peter Wilenius, vice president and general manager of video solutions, March Networks, Ontario, Canada, points out that the return on investment (ROI) is also notable. “The ROI can be measured in reduction of travel for both service technicians and investigators, reduction in retrieval time and cost and reduction in overall cost of system for long-term storage.”

“Specific ROI calculations can get complicated and vary from installation to installation. Advantages of high-end digital recorders make return on investment for systems much higher than at first glance. Over time, the benefits from increased personnel productivity, asset and personnel protection, lawsuits not filed and the emerging advantages of video content analysis to the bottom line all combine to create a favorable return on investment,” says Jonathan Moav, director of product marketing for NICE Systems, Rutherford, N.J.

Most low-end systems are multiplexers that record either a limited number of channels (one or two) at a high frame rate, or more channels at a significantly lower frame rate (16 channels at 1-2 fps). High-end systems can accommodate a large number of channels at a high frame per second (fps) recording rate—tens of channels at 30 fps real-time, suggests Moav.

“While low-end DVR units are capable of attaining high frame rates, it is usually at the expense of the other inputs on the unit. High-end DVR, enterprise-level systems are able to attain high frame rates on all inputs simultaneously and can distribute the frame rate variably across the inputs,” says Peter Wilenius, vice president and general manager of video solutions, March Networks, Ontario, Canada.

Storage Necessities

Lower-end DVR systems tend to have a fixed limitation in the amount of storage that can be contained within the unit itself. At the higher-end, the systems tend to have a higher capacity internal the unit and also have the ability to connect to large external storage devices, says Wilenius.

Transferring video locally to CD-RW or similar media sparks visions of the VHS dark ages. According to Wilenius, the best solution today is to keep the video stored at the remote site on high availability RAID disk arrays.

Current HDD (hard disk drive) technology is rapidly advancing total available storage capacities, as well as disk performance and reliability. Current HD’s form the backbone of the primary storage found in virtually all-industrial DVR’s currently on the market. Optical media, such as CD-R/RW, DVR-R, DVD-RAM, currently lack the capacity to match the storage found on the typical DVR internal disk array. Tape-based archival solutions such as DAT, can match up to some of the smaller DVR capacities, however, tape-based back-up options can present a challenge due to the time required to archive a large storage volume. In addition, tape-based archival typically requires a full-restore process in order to review the stored image data. Network-based storage solutions can be a viable solution for an application demanding large amounts of archive capacity. Considerations to available network bandwidth, and specific DVR support of network-based storage will factor in to the application of network-based archival, says Bracken.

System Scalability

“Low-end DVRs are usually stand-alone, off-the-shelf systems. The high-end systems are typically constructed to meet exact specifications and can be integrated with other security applications such as access control, fire and various other alarms and databases,” says Moav.

“With a networked digital video system, integration with existing databases, such as financial institutions or even an access control system, becomes a reality. The ability to associate video with existing data, and search based on that data, provides additional benefits to customers,” says Wilenius. And these units are configurable and maintainable from a central location.

Compression Schemes

“When talking about weeks of storage, you want a system that is capable of archiving gigabytes of video with the best compression technologies available,” says Jon Williamson, product marketing manager, Andover Controls, Andover, Mass. The best compression method to select is one that will allow the user to tune the system to best meet their needs. Cost of storage is significantly higher if the video is compressed using a less sophisticated algorithm. With compression algorithms used in high-end systems, the video data is compressed more efficiently taking up less storage for the same time period.

The user must first decide the main function of the DVR; remote monitoring with video transmission or local recording. If used primarily for remote monitoring, the compression algorithms must be tuned to best utilize the network bandwidth available so the remote operator can get the best image at a manageable frame rate. If local recording is the primary function of the DVR, then the compression algorithms would be tuned to utilize the available storage in the most efficient way. If sufficient storage is available, then the compression parameters could be set such that high quality video would be stored. With H.263 compression, the parameters can be tuned to meet the needs of both remote monitoring and local recording. Higher-end processors can support compression schemes that both compress the video to a smaller amount of data and allow the video to decompress more efficiently.

Industrial DVR’s currently are typically designed around either JPEG/MJPEG- or Wavelet-based compression methods. These compression methods differ significantly in how images are processed, impacting both the throughput capability as well as image quality. Wavelet-based image compression can easily produce a 400:1 ratio while MJPEG based methods currently top out around 200:1. The net result for comparable image quality is a smaller file size for each frame of video; this directly impacts the storage requirements and performance as well as remote communications requiring image transmission, offers Bracken.

Most users want to utilize their existing network and avoid spending money on upgrading or expanding the network. This has become a hot topic, as the network system has to be able to cope with large quantities of information, multiple users working in a multi-site environment and increasing amounts of video that needs to be moved on the network at frequent intervals. This all must be accomplished with minimal bandwidth pressure, says Moav.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Mesenbrink is managing editor for SECURITY Magazine. He can be reached at 630-694-4026

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • High-, Low-end Access Systems

    See More
  • Why the High-End Camera Market Keeps Growing

    See More
  • security-officer-freepik1170.jpg

    The problem with low end bids in the security guard industry

    See More

Related Products

See More Products
  • High-Rise Security and Fire Life Safety, 3rd edition

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing