Key Technical Design Considerations for Large-Scale Video Surveillance Systems
2026-04-06 05:12:48··#1
With the popularization of broadband networks and the increasing demand from industry management departments for improved management capabilities, the demand for large-scale networked security and video surveillance platforms within cities has also increased significantly in the past two years, particularly from urban public security and the financial sector. In the urban public security field, public security departments are vigorously promoting the construction of demonstration cities for technology-driven policing. The first batch of 22 cities has already implemented urban security monitoring systems, and by 2008, the number of demonstration cities for technology-driven policing will reach 180. Ultimately, all 660 cities and 1642 counties in my country will need to implement network-based public security and image monitoring systems. In the financial sector, in the past few years, major state-owned banks and commercial banks have completed the construction and transformation of digital monitoring systems in a large number of grassroots branches in accordance with the requirements of the People's Bank of China and the Ministry of Public Security regarding the digital transformation of bank image monitoring systems. Pilot projects for the transformation of various networked monitoring and management systems have also begun. With the maturity of network transmission technology and image encoding and decoding technology, significant breakthroughs have been achieved in meeting the needs of these emerging industry clients, and large-scale video surveillance systems are being rapidly built across the country. I. Characteristics of Large-Scale Surveillance Systems With the development of urban and industry-specific security systems, we can see that these large-scale surveillance systems share some common characteristics: 1. Platform-centric, network-linked: The scale and planning of our current security systems are somewhat daunting, or even daunting for users. How to monitor the images captured by numerous cameras? How to manage the numerous encoding and decoding devices? How to coordinate and manage the numerous backend servers? Human resources are no longer sufficient to solve the management problems of large-scale surveillance systems, making the need for a management platform extremely urgent. A good management platform can manage all cameras, all alarm points, all encoding and decoding devices, and all backend servers, enabling the entire system to operate smoothly. However, managing the entire surveillance system with a platform at its core requires a prerequisite: a network with sufficient bandwidth (or sufficient bandwidth after management) to connect these devices and servers. Without a network, everything is meaningless. 2. Interoperability with Multiple Devices: Due to the historical state of the security industry (primarily small-scale, independent applications), there are numerous equipment manufacturers, each with its own encoding/decoding and network transmission methods. This situation is highly detrimental to building large networks. However, this very situation necessitates that our large-scale monitoring system platform be able to connect to devices from multiple manufacturers. This serves two purposes: firstly, protecting the user's existing investment; and secondly, providing a solution to reduce investment when users build new systems. Currently, both existing and under-construction large-scale monitoring systems have made significant efforts in this regard, integrating video encoding/decoding equipment from mainstream domestic manufacturers, and achieving basic transparency regarding equipment manufacturers and models at the user end. 3. Increasingly Close Integration of Security and Business Applications: As a specialized business within security (protection) systems, security systems have historically maintained a certain distance from other applications in the industry. However, with the deepening of network monitoring and the refinement of management levels, increasing demands indicate that security systems need to be more closely integrated with other business applications in the industry. Here are some simple examples: internet cafe monitoring. Internet cafes have typical industry characteristics. At the business level, internet cafe operators focus on the operational status of the cafe, while public security departments and industrial and commercial administration departments focus on whether the cafe is operating illegally. Therefore, the needs of these two aspects for video surveillance in internet cafes are different. From a regulatory perspective, general security monitoring systems should be able to meet certain requirements. However, from the operator's perspective, ordinary security monitoring systems obviously cannot meet their needs (and will increase their investment). Therefore, how to integrate security systems with the business systems of internet cafes, reduce investment, and increase application benefits is what our security system needs to consider. Only by solving this problem can our security system be welcomed by everyone, thus helping customers succeed. II. Technical Points of Large-Scale Monitoring Systems Based on these characteristics, we can analyze the technical points of large-scale video surveillance systems: 1. Platform Itself 1.1 Centralized Management Centralized management is reflected in the fact that a system is managed uniformly by a central management and control server. Any configuration changes in the system and the addition of new units are uniformly authenticated, allocated, and scheduled by this central management server, thereby ensuring system consistency, availability, and security, and ensuring that each unit connected to the system receives timely and consistent information and instructions. In this system, load balancing for all other servers is managed by a central management server. When server changes occur, the central management server promptly performs load transfer to achieve a reasonable distribution and balance of system resources. Centralized management is also reflected in the fact that system administrators can manage all devices in the system from their desks, as well as the servers and client units, without needing to stand in front of any managed object. Centralized management simplifies the system architecture, ensures system reliability, facilitates client unit access, and streamlines authentication and access control. Requests with control contention can be handled using a unified strategy, ensuring information consistency. Centralized management is also reflected in a multi-level management system within an organization. A central control domain with a central control server is established, and lower-level sub-domains with their own control servers are established. Instructions from the higher-level center can be issued to lower-level centers, and information and requests from lower-level centers can be submitted to the higher-level center for centralized distribution. Users are managed according to a unified organizational structure, enabling management of multiple lower-level areas. Cross-domain requests can be arbitrated by the higher-level system, granting interconnection between the two domains. 1.2 Distributed Services Since a single server cannot handle a large number of device accesses, a multi-server architecture can be used to provide distributed services to ensure a high level of concurrent access. Different access types should also be handled by different servers. Multiple application servers exist within a domain, allowing for dynamic addition or removal of servers. When a server connects to the central control server, it becomes available. The central control server coordinates the load (DVR access distribution) among servers according to a specific strategy. The system allows for dynamic addition or removal of servers. If a server disconnects, its load is automatically distributed to other active servers. When the central control server fails, the application servers remain operational. After troubleshooting, when the application servers reconnect to the control server, they report the current status of the DVR devices and the access status of clients. When a client requests system access, it receives the connection information from the central control server, automatically connects to the management server of the device to be accessed, and submits the access request. 1.3 Tiered storage consists of multi-domain storage and front-end storage. Each domain manages its own devices, with multiple storage servers within a domain. This balances device load and stores data resources under a unified path using a unified directory access protocol. Therefore, different storage servers access the same resource via the same path, achieving the goal of centralized storage. Secondly, local storage is also provided on the front-end devices to store video locally, primarily to ensure continuous storage even when the network is offline. Different strategies can be employed to store necessary, long-term data centrally, while storing short-term, comprehensive video data on the front-end devices. 1.4 Media Data Forwarding: Due to the significant repetition in video surveillance, the system uses a forwarding server-based transmission method for real-time video distribution to clients. Multiple network interface cards (NICs) isolate the device and client network segments, with the device network segment using secure TCP connections. This avoids conflicts between the two types of network segments, ensures the integrity of the data source, and increases the actual bandwidth of the server network. Historical recordings on the DVR are viewed by forwarding video data to user requests through a streaming media on-demand server. The system uses TCP for transmission, ensuring the integrity of the video data. To address the large number of video viewing requests, the server also implemented caching and hit strategies. This significantly reduced duplicate requests to the DVR for viewing the same video segment and ensured the timeliness of data access for the client. 1.5 System Scalability The system employs distributed services and dynamically adds and removes services, enabling dynamic system expansion. Furthermore, the separation of different service types and service registration/deregistration mechanisms further enhance the system's dynamic scalability. 2 Device Access 2.1 Unified Access Protocol To connect devices from different manufacturers to a large-scale monitoring system, the devices must communicate using the system's unified device access protocol. Only when all devices in the system speak the same language can the entire system achieve interoperability. Therefore, defining a universal and scalable device access protocol is a crucial technical task for large-scale monitoring systems. 2.2 Providing a Video Development Kit Our unified communication protocol does not mean that all system interoperability issues have been solved. Due to various reasons, there are many differences in audio and video data encoding formats among different manufacturers. Requiring all manufacturers to output audio and video data according to a unified encoding format and a unified data encapsulation format is clearly overly demanding. Therefore, a better approach is to decode the data encoded by devices from different manufacturers using the decoding library (decoding device) provided by that manufacturer. Thus, if devices are to be integrated into a large-scale monitoring system, the device manufacturers need to provide video development kits. 3. The middleware technology industry is diverse, and customer requirements vary greatly. Integrating security systems into other business application systems will be a future trend. Therefore, the management platform upon which our large-scale monitoring system is based needs to be a highly open platform, capable of providing various development interfaces: input, output, intermediate control, etc. Therefore, building the basic platform of the security system into a middleware platform is a better solution. This middleware platform provides centralized management, device access, media forwarding, centralized storage, electronic map services, alarm access, etc. Editor: He Shiping