Research some of the newest security technology in edge-based video surveillance by going to this article: Living on the edge. https://www.securityinfowatch.com/video-surveillance/article/10946600/t

Nipulkumar Hitenchandra Patel 

Edge-based security

COLLAPSE

Top of Form

How does edge-based security affect the cost, functionality, and maintenance requirements of a surveillance system?

            Security continues to be a very necessary part of our lives. Barriers and other cautionary measures are always employed to protect people and their belongings from outside threats and attacks. One of the ways to get additional protection is by using video surveillance. This provides security by monitoring all that is happening at a certain location and providing evidence if need be. There is a growing need for high-resolution video surveillance has led to advancements in video camera technology. However, high-resolution videos require a lot of financial investment while security budgets are still tight. There also arises a need to have better networking structures due to the use of IP cameras (Gorski, 2013). These cameras transmit all their recordings to a central server which needs the capability to store all the high resolutions recordings. Organizations are then required to have quality and multiple servers which can process the high-resolution videos recorded which add to the overall costs. Most times, these videos are compressed which in turn means that they are not ideal for forensic purposes.

            Edge-based security has become a better solution “for greater accuracy, more detailed images, and more intuitive capabilities” (Gorski, 2013). Edge-based surveillance used the camera for storage on an SD or memory card. The storage is sufficient enough for the day-to-day recordings. The storage can also be added as needed without incurring many additional costs. Furthermore, newer versions of these cameras have advanced storage settings where they only start recording if triggered such as using noise or motion (Gorski, 2013). The users can also purchase the cameras based on their needs such as size and surveillance needs.

            These systems also reduce costs due to scalability where if more cameras are added, the only thing needed is additional storage, and no recording software licenses are required. They also provide less costly maintenance. This is because, there are “no server maintenance, no complex proprietary hardware and software, and no storage or scaling limitations” (Gorski, 2013). This then requires very little maintenance.

Bottom of Form

Shamimul Islam 

Week 7 discussion

COLLAPSE

Top of Form

Security Technology in Edge-based Video Surveillance

Initially, analog CCTVs were used for surveillance. Then later, IP cameras were introduced for the same, where videos were relayed over network cables (centralized approach). With the digitization of videos, developers would cleverly use algorithms to analyze digital videos automatically (Alalouff, 2020). In the recent past, many trends have been observed towards more analytics occurring at the camera end, a concept called the network's edge. It has the benefit of analyzing videos locally without sending them over networks and consuming much bandwidth. Still, instead, the analytics results are sent to the Video Management Software (VMS) in use as lightweight information (Alalouff, 2020). The amount of storage space and bandwidth required for the practice is reduced. Also, there is no need to have an operator monitor the moves when nothing is going on.

The high-resolution video demanded much from the central server and the whole network. When more cameras are loaded to the set-up, the restriction becomes greater, decelerating the entire network, and the users are therefore forced to spend more resources on more servers (Gorski, 2013). Besides, constraints on bandwidth force an organization to compress the visual data from the cameras with high resolutions. Even though compressing videos makes it easy for storage and transferring, the resultant video after compression is not ideal for forensic investigative purposes.

 In the edge-based security approach, on the other hand, video intelligence is driven to the network's edge, an aspect that has a great result on the cost, maintenance, and functionality needs of a surveillance system (Gorski, 2013). The costly nature of the centralized systems is countered in edge-based systems by minimizing the number of cameras used in the system, thus reducing the cost of purchases. The maintenance of edge-based systems is also less costly as compared to a centralized system. This happens because there is no central server, and complex software, hardware system, and scaling and storage limitations are involved.

Bottom of Form